Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help please?


  • Please log in to reply
10 replies to this topic

#1 Mrb0unZz

Mrb0unZz

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 06 May 2017 - 12:50 AM

Hey guys,

               

              Seriously thought I was out of luck until I found this site, kinda struggling to pick through everything now and see where I should be posting or who I should be asking or whatever (I'm not very technical at all when it comes to PCs, I play a lot of online games and stuff but as soon as it gets beyond the basic stuff I'm screwed) so here goes....

 

               Recently I've been having a problem with a weird interaction between Battle.net Launcher (Blizzard's game launcher for Hearthstone, Heroes of the Storm, Starcraft, WOW etc, as you probably already know) and Google Chrome. When I have the launcher open, I am getting random attacks (sometimes immediate and sometimes like 20/30 mins into having the game open) where it will start spamming my chrome, opening new tabs that seem like ads or something (I've never actually seen one of these pages load as there are generally like 40+ tabs open within 3-4 seconds and it ends up slowing everything down to a snails pace). If I manage to close chrome (either manually or through Task Manager), chrome re-opens itself and continues at the same pace. I've tried running Windows Defender full scan, and Malwarebytes on a full scan (the latter found infections but the problem persists after they have been removed) and I'm kind of at a loss what to do.....

               

               I've searched the official forums and tried a few things suggested by Blizzard 'blue' (admin) posters but to no avail, they seem to respond to one every few years by the looks of things and none of the stuff they recommended has helped me any. I also tried completely uninstalling Battle.net app and all of the games it launches and re-downloading it and not only did I get a couple of ad-based redirects while trying (enough to put me off to the point of googling the launcher download page directly and checking the security signature on the page) but the second I opened the app it started the spam on chrome again.....PLEASE help, I would be very grateful if you could!

 

Kind Regards

Mr b0unZz

 



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • BC Advisor
  • 12,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:37 AM

Posted 06 May 2017 - 05:15 AM

Welcome to BC....

 

I know you have used MBAM. Run it again using the directions below.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Directions for using MBAM:

Open MBAM and Update. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.

  • If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
  • The Scan log is available throughout History ->Application logs. Please post it contents in your next reply.

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#3 Mrb0unZz

Mrb0unZz
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 07 May 2017 - 04:50 PM

Hey dude, did all of this stuff last night and am still having the issues today, will post the logs below this message as requested. I might be totally wrong here but I feel like it's someone attacking my system directly rather than a bot or something as we (my partner and me) noticed a pattern in the attacks and that they don't happen at all during the day. I played Blizzard games earlier (HotS and HearthStone) and purposely left the 'launcher' app open after playing and had no problems for at least 4 hours.....we have noticed that this only ever seems to happen at night so maybe someone is doing this (like using a trojan) rather than it being a bot or virus or something, unless it would be timed to work at certain times or something I dunno, just thought the information might be useful.....anyway, still having the same problems as before, here are the logs - thanks very much for your help dude it means a lot!

 

Kind Regards

Mr b0unZz

 

 

LOGS

 

Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 5/7/17
Scan Time: 2:48 AM
Logfile: 
Administrator: Yes
 
-Software Information-
Version: 3.0.6.1469
Components Version: 1.0.103
Update Package Version: 1.0.1884
License: Free
 
-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: DESKTOP-9U7ECAL\abby smith
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 388500
Time Elapsed: 19 min, 54 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
-Scan Details-
Process: 1
Adware.Agent.Generic, C:\PROGRAMDATA\{685DC7BB-DFF6-7010-93F0-7AFE961761F2}\3E0F5DA8-89A4-EA03-B9E3-4E2776D2733E.exe, Quarantined, [1363], [331038],1.0.1884
 
Module: 1
Adware.Agent.Generic, C:\PROGRAMDATA\{685DC7BB-DFF6-7010-93F0-7AFE961761F2}\3E0F5DA8-89A4-EA03-B9E3-4E2776D2733E.exe, Quarantined, [1363], [331038],1.0.1884
 
Registry Key: 3
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Delete-on-Reboot, [28], [260247],1.0.1884
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Delete-on-Reboot, [28], [260247],1.0.1884
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{50cb6c7e}, Delete-on-Reboot, [28], [260250],1.0.1884
 
Registry Value: 4
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{09b415ea-0d10-425e-98d3-45747ff50f2e}|NAMESERVER, Delete-on-Reboot, [6307], [260227],1.0.1884
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{21d63cea-07a0-4289-aec1-2138c8f2678e}|NAMESERVER, Delete-on-Reboot, [6307], [260227],1.0.1884
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|NAMESERVER, Delete-on-Reboot, [6307], [260227],1.0.1884
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{50cb6c7e}|1, Delete-on-Reboot, [28], [260250],1.0.1884
 
Registry Data: 11
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{09b415ea-0d10-425e-98d3-45747ff50f2e}|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{09b415ea-0d10-425e-98d3-45747ff50f2e}|DhcpNameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{21d63cea-07a0-4289-aec1-2138c8f2678e}|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{21d63cea-07a0-4289-aec1-2138c8f2678e}|DhcpNameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{26b11a49-585f-4b43-a90c-9af3c3d7b25b}|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|DhcpNameServer, Replace-on-Reboot, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{ed24825c-86f9-11e6-ac6e-806e6f6e6963}|NameServer, Replace-on-Reboot, [28], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NAMESERVER, Replace-on-Reboot, [6307], [293494],1.0.1884
 
Data Stream: 0
(No malicious items detected)
 
Folder: 1
Adware.Agent.Generic, C:\PROGRAMDATA\{685DC7BB-DFF6-7010-93F0-7AFE961761F2}, Delete-on-Reboot, [1363], [331038],1.0.1884
 
File: 1
Adware.Agent.Generic, C:\PROGRAMDATA\{685DC7BB-DFF6-7010-93F0-7AFE961761F2}\3E0F5DA8-89A4-EA03-B9E3-4E2776D2733E.exe, Delete-on-Reboot, [1363], [331038],1.0.1884
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 
 
 
 
 
 
 
-------------------------------------------------------------------------------------------------------------------------------------------
 
 
 
 
# AdwCleaner v6.046 - Logfile created 07/05/2017 at 03:30:00
# Updated on 24/04/2017 by Malwarebytes
# Database : 2017-05-05.1 [Server]
# Operating System : Windows 10 Home  (X64)
# Username : abby smith - DESKTOP-9U7ECAL
# Running from : C:\Users\abby smith\Downloads\adwcleaner_6.046.exe
# Mode: Scan
 
 
 
***** [ Services ] *****
 
No malicious services found.
 
 
***** [ Folders ] *****
 
Folder Found:  C:\ProgramData\50cb6c7e
 
 
***** [ Files ] *****
 
No malicious files found.
 
 
***** [ DLL ] *****
 
No malicious DLLs found.
 
 
***** [ WMI ] *****
 
No malicious keys found.
 
 
***** [ Shortcuts ] *****
 
No infected shortcut found.
 
 
***** [ Scheduled Tasks ] *****
 
No malicious task found.
 
 
***** [ Registry ] *****
 
Key Found:  HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\11598763487076930564
 
 
***** [ Web browsers ] *****
 
No malicious Firefox based browser items found.
Chrome pref Found:  [C:\Users\abby smith\AppData\Local\Google\Chrome\User Data\Default\Web data] - uk.ask.com
 
*************************
 
C:\AdwCleaner\AdwCleaner[C0].txt - [6931 Bytes] - [21/01/2017 17:31:57]
C:\AdwCleaner\AdwCleaner[C2].txt - [1750 Bytes] - [22/01/2017 18:01:14]
C:\AdwCleaner\AdwCleaner[C3].txt - [1427 Bytes] - [29/01/2017 16:50:28]
C:\AdwCleaner\AdwCleaner[S0].txt - [6751 Bytes] - [21/01/2017 17:30:55]
C:\AdwCleaner\AdwCleaner[S1].txt - [1805 Bytes] - [22/01/2017 18:00:24]
C:\AdwCleaner\AdwCleaner[S2].txt - [1517 Bytes] - [29/01/2017 16:50:06]
C:\AdwCleaner\AdwCleaner[S3].txt - [1572 Bytes] - [07/05/2017 03:30:00]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S3].txt - [1645 Bytes] ##########
 
 
 
--------------------------------------------------------------------------------------------------------------------------------
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.3 (04.10.2017)
Operating System: Windows 10 Home x64 
Ran by abby smith (Administrator) on 07/05/2017 at  3:38:35.35
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 0 
 
 
 
 
Registry: 0 
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 07/05/2017 at  3:42:11.19
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
----------------------------------------------------------------------------------------------------------------------------------
 
This is the ESET one, didn't have a header so just making sure you weren't like wtf is that :) 
 
 
 
C:\AdwCleaner\quarantine\files\thvxzgceypivnmywkqmrenyeqjqlfzct\6ce971a3.dll a variant of Win32/Kryptik.FRFK trojan cleaned by deleting
C:\Program Files (x86)\Kingsoft\WPS Office\9.1.0.5113\wtoolex\wpsnotify.exe a variant of Win32/KingSoft.D potentially unwanted application cleaned by deleting
C:\Program Files (x86)\Kingsoft\WPS Office\9.1.0.5113\wtoolex\wpsupdate.exe a variant of Win32/KingSoft.D potentially unwanted application cleaned by deleting


#4 buddy215

buddy215

  • BC Advisor
  • 12,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:37 AM

Posted 07 May 2017 - 06:47 PM

Flush DNS.....Windows 10: How to Flush and Reset the DNS Cache

 

Download 51a5f31352b88-icon_MBAR.pngMalwarebytes Anti-Rootkit (MBAR) to your desktop.

  • Warning! Malwarebytes Anti-Rootkit needs to be run from an account with administrator rights.
  • Double click on downloaded file. OK self extracting prompt.
  • MBAR will start. Click "Next" to continue.
  • Click in the following screen "Update" to obtain the latest malware definitions.
  • Once the update is complete select "Next" and click "Scan".
  • When the scan is finished and no malware has been found select "Exit".
  • If malware was detected, make sure to check all the items and click "Cleanup". Reboot your computer.
  • Open the MBAR folder located on your Desktop and paste the content of the following files in your next reply:
  • "mbar-log-{date} (xx-xx-xx).txt"
  • "system-log.txt"

NOTE. If you see This version requires you to completely exit the Anti Malware application message right click on the Malwarebytes Anti-Malware icon in the system tray and click on Exit.

 

Run another scan using MBAM after doing the above.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#5 Mrb0unZz

Mrb0unZz
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 08 May 2017 - 01:18 AM

Hey man, did all the steps above, here are the logs :) 

 

Kind Regards

Mr b0unZz

 

 

Malwarebytes Anti-Rootkit BETA 1.9.3.1001
www.malwarebytes.org
 
Database version:
  main:    v2017.05.08.01
  rootkit: v2017.04.02.01
 
Windows 10 x64 NTFS
Internet Explorer 11.1066.14393.0
abby smith :: DESKTOP-9U7ECAL [administrator]
 
08/05/2017 05:48:17
mbar-log-2017-05-08 (05-48-17).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 314158
Time elapsed: 44 minute(s), 11 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 3
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{09b415ea-0d10-425e-98d3-45747ff50f2e}|NameServer (Trojan.DNSChanger.ACMB2) -> Data: 82.163.143.176 82.163.142.178 -> Delete on reboot. [ad04b06554555bdb0861a34d887a926e]
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{21d63cea-07a0-4289-aec1-2138c8f2678e}|NameServer (Trojan.DNSChanger.ACMB2) -> Data: 82.163.143.176 82.163.142.178 -> Delete on reboot. [4d64779e00a989ad4524ee0261a101ff]
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|NameServer (Trojan.DNSChanger.ACMB2) -> Data: 82.163.143.176 82.163.142.178 -> Delete on reboot. [9819a86dd5d4cf67eb7e39b7bf4316ea]
 
Registry Data Items Detected: 1
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer (Trojan.DNSChanger.ACMB2) -> Bad: (82.163.143.176 82.163.142.178) Good: (8.8.8.8) -> Replace on reboot. [238efe17e5c4989ea4f2b26b70937888]
 
Folders Detected: 1
C:\ProgramData\{702FB636-C784-019D-8364-718EAA33DC98} (Adware.Agent.Generic) -> Delete on reboot. [674acf46ccdd3bfbeb8d92a8fe022bd5]
 
Files Detected: 1
C:\ProgramData\{702FB636-C784-019D-8364-718EAA33DC98}\647820C9-D3D3-9762-FD2F-9CC141097F71.exe (Adware.Agent.Generic) -> Delete on reboot. [674acf46ccdd3bfbeb8d92a8fe022bd5]
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)
 
 
 
----------------------------------------------------------------------------------------------------------------------------
 
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.09.3.1001
 
© Malwarebytes Corporation 2011-2012
 
OS version: 10.0.9200 Windows 10 x64
 
Account is Administrative
 
Internet Explorer version: 11.1066.14393.0
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 1.896000 GHz
Memory total: 8501211136, free: 4109299712
 
Downloaded database version: v2017.05.08.01
Downloaded database version: v2017.04.02.01
Downloaded database version: v2017.04.03.01
=======================================
Initializing...
------------ Kernel report ------------
     05/08/2017 05:48:05
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kd.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\System32\drivers\werkernel.sys
\SystemRoot\System32\drivers\CLFS.SYS
\SystemRoot\System32\drivers\tm.sys
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\System32\drivers\FLTMGR.SYS
\SystemRoot\System32\drivers\msrpc.sys
\SystemRoot\System32\drivers\ksecdd.sys
\SystemRoot\System32\drivers\clipsp.sys
\SystemRoot\System32\drivers\cmimcext.sys
\SystemRoot\System32\drivers\ntosext.sys
\SystemRoot\system32\CI.dll
\SystemRoot\System32\drivers\cng.sys
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\System32\Drivers\acpiex.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
\SystemRoot\System32\drivers\ACPI.sys
\SystemRoot\System32\drivers\WMILIB.SYS
\SystemRoot\System32\drivers\msisadrv.sys
\SystemRoot\System32\drivers\pci.sys
\SystemRoot\System32\drivers\tpm.sys
\SystemRoot\System32\drivers\intelpep.sys
\SystemRoot\system32\drivers\WindowsTrustedRT.sys
\SystemRoot\System32\drivers\WindowsTrustedRTProxy.sys
\SystemRoot\System32\drivers\pcw.sys
\SystemRoot\System32\drivers\vdrvroot.sys
\SystemRoot\system32\drivers\pdc.sys
\SystemRoot\system32\drivers\CEA.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\System32\drivers\spaceport.sys
\SystemRoot\System32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\System32\drivers\iaStorA.sys
\SystemRoot\System32\drivers\storport.sys
\SystemRoot\System32\drivers\EhStorClass.sys
\SystemRoot\System32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\Wof.sys
\SystemRoot\system32\drivers\WdFilter.sys
\SystemRoot\System32\Drivers\NTFS.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\System32\drivers\wfplwfs.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\System32\drivers\volume.sys
\SystemRoot\System32\drivers\volsnap.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\system32\drivers\iorate.sys
\SystemRoot\System32\drivers\disk.sys
\SystemRoot\System32\drivers\CLASSPNP.SYS
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\drivers\cdrom.sys
\SystemRoot\system32\drivers\filecrypt.sys
\SystemRoot\system32\drivers\tbs.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\BasicDisplay.sys
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\BasicRender.sys
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\drivers\vwififlt.sys
\SystemRoot\System32\drivers\pacer.sys
\SystemRoot\system32\drivers\netbios.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\??\C:\WINDOWS\System32\drivers\zamguard64.sys
\??\C:\WINDOWS\System32\drivers\zam64.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\System32\drivers\npsvctrig.sys
\SystemRoot\System32\drivers\mssmbios.sys
\??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{D2808E50-3450-413E-B260-A1FA529A639E}\MpKsle1871596.sys
\SystemRoot\System32\drivers\gpuenergydrv.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\ahcache.sys
\SystemRoot\system32\drivers\SaiBus.sys
\SystemRoot\System32\DriverStore\FileRepository\compositebus.inf_amd64_a140581a8f8b58b7\CompositeBus.sys
\SystemRoot\System32\drivers\kdnic.sys
\SystemRoot\System32\drivers\umbus.sys
\SystemRoot\system32\DRIVERS\igdkmd64.sys
\SystemRoot\System32\drivers\HDAudBus.sys
\SystemRoot\System32\drivers\portcls.sys
\SystemRoot\System32\drivers\drmk.sys
\SystemRoot\System32\drivers\ks.sys
\SystemRoot\System32\drivers\dptf_cpu.sys
\SystemRoot\System32\drivers\USBXHCI.SYS
\SystemRoot\system32\drivers\ucx01000.sys
\SystemRoot\System32\drivers\TeeDriverW8x64.sys
\SystemRoot\System32\drivers\rt640x64.sys
\SystemRoot\System32\drivers\rtwlane.sys
\SystemRoot\system32\DRIVERS\wdiwifi.sys
\SystemRoot\System32\drivers\vwifibus.sys
\SystemRoot\System32\drivers\i8042prt.sys
\SystemRoot\system32\DRIVERS\SynTP.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\System32\drivers\kbdclass.sys
\SystemRoot\System32\drivers\mouclass.sys
\SystemRoot\System32\drivers\CmBatt.sys
\SystemRoot\System32\drivers\BATTC.SYS
\SystemRoot\system32\DRIVERS\Smb_driver_Intel.sys
\SystemRoot\System32\drivers\dptf_pch.sys
\SystemRoot\System32\drivers\intelppm.sys
\SystemRoot\System32\drivers\acpipagr.sys
\SystemRoot\System32\drivers\WirelessButtonDriver64.sys
\SystemRoot\System32\drivers\HIDCLASS.SYS
\SystemRoot\System32\drivers\HIDPARSE.SYS
\SystemRoot\System32\drivers\wmiacpi.sys
\SystemRoot\System32\drivers\UEFI.sys
\SystemRoot\System32\drivers\NdisVirtualBus.sys
\SystemRoot\System32\drivers\swenum.sys
\SystemRoot\System32\drivers\rdpbus.sys
\SystemRoot\system32\DRIVERS\clwvd6.sys
\SystemRoot\system32\drivers\ksthunk.sys
\SystemRoot\System32\drivers\SaiMini.sys
\SystemRoot\System32\drivers\UsbHub3.sys
\SystemRoot\system32\drivers\RTKVHD64.sys
\SystemRoot\System32\drivers\kbdhid.sys
\SystemRoot\System32\drivers\usbccgp.sys
\SystemRoot\System32\drivers\hidusb.sys
\SystemRoot\System32\drivers\mouhid.sys
\SystemRoot\system32\DRIVERS\RtkBtfilter.sys
\SystemRoot\System32\drivers\BTHUSB.sys
\SystemRoot\System32\drivers\bthport.sys
\SystemRoot\System32\Drivers\usbvideo.sys
\SystemRoot\System32\Drivers\fastfat.SYS
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\win32kfull.sys
\SystemRoot\System32\win32kbase.sys
\SystemRoot\System32\Drivers\dump_diskdump.sys
\SystemRoot\System32\Drivers\dump_iaStorA.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\System32\drivers\dxgmms2.sys
\SystemRoot\System32\drivers\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\drivers\wcifs.sys
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\drivers\storqosflt.sys
\SystemRoot\system32\drivers\wcnfs.sys
\SystemRoot\System32\drivers\registry.sys
\SystemRoot\system32\DRIVERS\esif_lf.sys
\SystemRoot\system32\DRIVERS\WUDFRd.sys
\SystemRoot\system32\drivers\mmcss.sys
\SystemRoot\system32\drivers\lltdio.sys
\SystemRoot\system32\drivers\mslldp.sys
\SystemRoot\system32\drivers\rspndr.sys
\SystemRoot\System32\DRIVERS\wanarp.sys
\SystemRoot\system32\drivers\ndisuio.sys
\SystemRoot\system32\DRIVERS\nwifi.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\drivers\Ndu.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\System32\drivers\condrv.sys
\SystemRoot\System32\drivers\vwifimp.sys
\SystemRoot\System32\drivers\tunnel.sys
\SystemRoot\system32\Drivers\WdNisDrv.sys
\??\C:\WINDOWS\system32\drivers\MBAMSwissArmy.sys
\??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{321E976E-0227-479D-9954-8B6F0F27F945}\MpKslcca016a5.sys
\??\C:\WINDOWS\system32\drivers\mbamchameleon.sys
----------- End -----------
Done!
 
Scan started
Database versions:
  main:    v2017.05.08.01
  rootkit: v2017.04.02.01
 
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffd206b313b060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
--------- Disk Stack ------
DevicePointer: 0xffffd206b313bae0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffd206b313b060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
DevicePointer: 0xffffd206b060db30, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffd206b0610060, DeviceName: \Device\00000037\, DriverName: \Driver\iaStorA\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
Done!
Drive 0
This is a System drive
Scanning MBR on drive 0...
Inspecting partition table:
This drive is a GPT Drive.
MBR Signature: 55AA
Disk Signature: 1A5D04E2
 
GPT Protective MBR Partition information:
 
    Partition 0 type is EFI-GPT (0xee)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 1  Numsec = 4294967295
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
GPT Partition information:
 
    GPT Header Signature 4546492050415254
    GPT Header Revision 65536 Size 92 CRC 2141601658
    GPT Header CurrentLba = 1 BackupLba 3907029167
    GPT Header FirstUsableLba 34  LastUsableLba 3907029134
    GPT Header Guid 55439f47-ac70-42ad-81dd-f35fd1fd4df6
    GPT Header Contains 128 partition entries starting at LBA 2
    GPT Header Partition entry size = 128
 
    Backup GPT header Signature 4546492050415254
    Backup GPT header Revision 65536 Size 92 CRC 2141601658
    Backup GPT header CurrentLba = 3907029167 BackupLba 1
    Backup GPT header FirstUsableLba 34  LastUsableLba 3907029134
    Backup GPT header Guid 55439f47-ac70-42ad-81dd-f35fd1fd4df6
    Backup GPT header Contains 128 partition entries starting at LBA 3907029135
    Backup GPT header Partition entry size = 128
 
    Partition 0 Type c12a7328-f81f-11d2-ba4b-0a0c93ec93b
    Partition ID b71b02b3-caf3-4c68-a9b-60edf9cbb8ac
    FirstLBA 2048  Last LBA 534527
    Attributes 0
    Partition Name                 EFI system partition
 
    GPT Partition 0 is bootable
    Partition 1 Type e3c9e316-b5c-4db8-817d-f92df0215ae
    Partition ID 6ab644ef-8fed-475f-bb34-f6bf7c83f5a6
    FirstLBA 534528  Last LBA 796671
    Attributes 0
    Partition Name         Microsoft reserved partition
 
    Partition 2 Type ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
    Partition ID 5942f4c4-61af-41af-836a-233cadf22d4
    FirstLBA 796672  Last LBA 3873210457
    Attributes 0
    Partition Name                 Basic data partition
 
    Partition 3 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID 57aaa402-7432-4f6d-993a-eaaad093d7d1
    FirstLBA 3873212416  Last LBA 3874965503
    Attributes 1
    Partition Name                                     
 
    Partition 4 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID a20c01cf-3904-4d66-8f74-429643497f8
    FirstLBA 3874965504  Last LBA 3907022847
    Attributes 1
    Partition Name                 Basic data partition
 
Disk Size: 2000398934016 bytes
Sector size: 512 bytes
 
Done!
File "C:\Users\abby smith\AppData\Local\Comms\UnistoreDB\store.vol" is sparse (flags = 32768)
File "C:\Windows\System32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat" is sparse (flags = 32768)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.79" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.7C" is compressed (flags = 1)
File "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache-4AE12CD6EC845963350222FF6361FAAF7BA31215.bin.83" is compressed (flags = 1)
Infected: C:\ProgramData\{702FB636-C784-019D-8364-718EAA33DC98}\647820C9-D3D3-9762-FD2F-9CC141097F71.exe --> [Adware.Agent.Generic]
Infected: C:\ProgramData\{702FB636-C784-019D-8364-718EAA33DC98} --> [Adware.Agent.Generic]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{09b415ea-0d10-425e-98d3-45747ff50f2e}|NameServer --> [Trojan.DNSChanger.ACMB2]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{21d63cea-07a0-4289-aec1-2138c8f2678e}|NameServer --> [Trojan.DNSChanger.ACMB2]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|NameServer --> [Trojan.DNSChanger.ACMB2]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer --> [Trojan.DNSChanger.ACMB2]
Scan finished
Creating System Restore point...
Cleaning up...
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Queuing an action cmd.exe
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action reg.exe...
Success!
Queuing an action reg.exe
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Executing an action cmd.exe...
Success!
Removal scheduling successful. System shutdown needed.
System shutdown occurred
=======================================
 
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.09.3.1001
 
© Malwarebytes Corporation 2011-2012
 
OS version: 10.0.14393 Windows 10 x64
 
Account is Administrative
 
Internet Explorer version: 11.1066.14393.0
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 1.896000 GHz
Memory total: 8501211136, free: 5530062848
 
=======================================
 
 
 
--------------------------------------------------------------------------------------------------------------------
 
 
 
Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 5/8/17
Scan Time: 6:45 AM
Logfile: luoytv97tyb.txt
Administrator: Yes
 
-Software Information-
Version: 3.0.6.1469
Components Version: 1.0.103
Update Package Version: 1.0.1890
License: Free
 
-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: DESKTOP-9U7ECAL\abby smith
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 388809
Time Elapsed: 22 min, 49 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 3
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Quarantined, [28], [260247],1.0.1890
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{50cb6c7e}, Quarantined, [28], [260250],1.0.1890
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Quarantined, [28], [260247],1.0.1890
 
Registry Value: 1
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{50cb6c7e}|1, Quarantined, [28], [260250],1.0.1890
 
Registry Data: 7
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{09b415ea-0d10-425e-98d3-45747ff50f2e}|DhcpNameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{21d63cea-07a0-4289-aec1-2138c8f2678e}|DhcpNameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{26b11a49-585f-4b43-a90c-9af3c3d7b25b}|NameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{b6b14be1-c6b1-41eb-83af-0c24b192642a}|DhcpNameServer, Replaced, [28], [-1],0.0.0
PUP.Optional.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{ed24825c-86f9-11e6-ac6e-806e6f6e6963}|NameServer, Replaced, [28], [-1],0.0.0
 
Data Stream: 0
(No malicious items detected)
 
Folder: 0
(No malicious items detected)
 
File: 2
PUP.Optional.CrossRider, C:\USERS\ABBY SMITH\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage, Quarantined, [237], [256629],1.0.1890
PUP.Optional.CrossRider, C:\USERS\ABBY SMITH\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal, Quarantined, [237], [256629],1.0.1890
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)


#6 buddy215

buddy215

  • BC Advisor
  • 12,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:37 AM

Posted 08 May 2017 - 05:17 AM

Run CCleaner.

 

Run another scan using MBAM. Hopefully it comes up clean this time.

 

download Zemana AntiMalware and install it

  • Run the application
  • Click "Next" and then Scan
  • When the scan has finished click Next to remove any threats.
  • Click the bars in the top right corner to display the logs, double click your log
  • copy and paste the log into your reply
  • download Security Check by glax24 and save the file to the Desktop
  • Run the tool by accepting all the Security prompts
  • when complete the tool will produce a log file C:\SecurityCheck\SecurityCheck.txt and also copy the contents to the Clipboard
  • Simply Paste the log to your reply

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#7 Mrb0unZz

Mrb0unZz
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 08 May 2017 - 09:15 AM

Hey dude, not sure if the problem still persists, I'll try leaving the Blizzard app open through the day again and see if anything has come up by tonight.....the Malwarebytes scan came up clean this time (so not included the log if that's okay?) and I couldn't run Zemana as I've used it before in the past and it has expired it's free usage (I can't run a scan without purchasing the full version). Here is the log for Security Check.

 

SecurityCheck by glax24 & Severnyj v.1.4.0.49 [15.04.17]
WebSite: www.safezone.cc
DateLog: 08.05.2017 15:10:03
Path starting: C:\Users\abby smith\AppData\Local\Temp\SecurityCheck\SecurityCheck.exe
Log directory: C:\SecurityCheck\
IsAdmin: True
User: abby smith
VersionXML: 4.18is-07.05.2017
___________________________________________________________________________
 
Windows 10(6.3.14393) (x64) Core Release: 1607 Lang: English(0809)
Installation date OS: 30.09.2016 10:13:47
LicenseStatus: Windows®, Core edition The machine is permanently activated.
Boot Mode: Normal
Default Browser: Microsoft Edge (C:\WINDOWS\system32\LaunchWinApp.exe)
SystemDrive: C: FS: [NTFS] Capacity: [1846.5 Gb] Used: [265.8 Gb] Free: [1580.7 Gb]
------------------------------- [ Windows ] -------------------------------
Internet Explorer 11.1066.14393.0
User Account Control enabled
Windows Update (wuauserv) - The service is running
Security Center (wscsvc) - The service is running
Remote Registry (RemoteRegistry) - The service has stopped
SSDP Discovery (SSDPSRV) - The service is running
Remote Desktop Services (TermService) - The service has stopped
Windows Remote Management (WS-Management) (WinRM) - The service has stopped
------------------------------ [ MS Office ] ------------------------------
Microsoft Office 2013 x86 v.15.0.4693.1005
---------------------------- [ Antivirus_WMI ] ----------------------------
Windows Defender (enabled and up to date)
--------------------------- [ FirewallWindows ] ---------------------------
Windows Firewall (MpsSvc) - The service is running
--------------------------- [ AntiSpyware_WMI ] ---------------------------
Windows Defender (enabled and up to date)
-------------------------- [ SecurityUtilities ] --------------------------
Malwarebytes version 3.0.6.1469 v.3.0.6.1469
Zemana AntiMalware v.2.72.0.388
--------------------------- [ OtherUtilities ] ----------------------------
WinRAR 5.30 (64-bit) v.5.30.0 Warning! Download Update
--------------------------------- [ IM ] ----------------------------------
Skype™ 7.30 v.7.30.105 Warning! Download Update
^Optional update.^
--------------------------------- [ P2P ] ---------------------------------
µTorrent v.3.4.5.41865 Warning! P2P-client.
-------------------------------- [ Java ] ---------------------------------
Java 8 Update 66 (64-bit) v.8.0.660.18 Warning! Download Update
Uninstall old version and install new one (jre-8u131-windows-x64.exe).
--------------------------- [ AppleProduction ] ---------------------------
Bonjour v.3.1.0.1
iTunes v.12.5.5.5 Warning! Download Update
^Please use Apple Software Update tool.^
Bonjour Service (Bonjour Service) - The service is running
--------------------------- [ AdobeProduction ] ---------------------------
Adobe Shockwave Player 12.1 v.12.1.7.157 Warning! Download Update
------------------------------- [ Browser ] -------------------------------
Google Chrome v.58.0.3029.96
Mozilla Firefox 47.0.1 (x86 en-US) v.47.0.1 Warning! Download Update
--------------------------- [ RunningProcess ] ----------------------------
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe v.58.0.3029.96
------------------ [ AntivirusFirewallProcessServices ] -------------------
Avast SecureLine (SecureLine) - The service is running
C:\Program Files\AVAST Software\SecureLine\vpnsvc.exe v.0.0.0.0
C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe v.3.0.0.912
Malwarebytes Service (MBAMService) - The service is running
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe v.3.1.0.415
C:\Program Files\Windows Defender\MsMpEng.exe v.4.10.14393.1066
C:\Program Files\Windows Defender\MpCmdRun.exe v.4.10.14393.1066
C:\Program Files\Windows Defender\NisSrv.exe v.4.10.14393.1066
C:\Program Files\Windows Defender\MSASCuiL.exe v.4.10.14393.1066
Windows Defender Service (WinDefend) - The service is running
Windows Defender Network Inspection Service (WdNisSvc) - The service is running
ZAM Controller Service (ZAMSvc) - The service is running
C:\Program Files (x86)\Zemana AntiMalware\ZAM.exe v.2.72.0.388
---------------------------- [ UnwantedApps ] -----------------------------
WildTangent Games v.1.0.4.0 Warning! Application is distributed through the partnership programs and bundle assemblies. Uninstallation recommended. Possible you became a victim of fraud or social engineering.
Update Installer for WildTangent Games App << Hidden Warning! Application is distributed through the partnership programs and bundle assemblies. Uninstallation recommended. Possible you became a victim of fraud or social engineering.
WildTangent Games App for HP v.4.0.11.16 << Hidden Warning! Application is distributed through the partnership programs and bundle assemblies. Uninstallation recommended. Possible you became a victim of fraud or social engineering.
----------------------------- [ End of Log ] ------------------------------


#8 buddy215

buddy215

  • BC Advisor
  • 12,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:37 AM

Posted 08 May 2017 - 11:05 AM

Using uTorrent to download free stuff is VERY risky....often illegal. It is a source of adware just having it on the computer and active.

 

Uninstall

Java 8 Update 66 (64-bit) v.8.0.660.18

WildTangent Games v.1.0.4.0

Update Installer for WildTangent Games App

WildTangent Games App for HP v.4.0.11.16

 

Update Mozilla Firefox 47.0.1

 

Uninstall Zemana...use Download Revo Uninstaller Freeware to do a complete uninstall. You can use Revo to perform all of the uninstalls mentioned above.

 

For sure...let me know what problems still exist after doing the above and rebooting.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#9 Mrb0unZz

Mrb0unZz
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 08 May 2017 - 04:37 PM

I removed all the stuff on the list - the Java 8 update, WildTangent (and did the advanced scan after and removed everything attached to it), firefox (I removed it all - browser included as I use chrome), uTorrent (I fully removed it on your advice) and Zemana.....I will restart now and see what happens but prior to me coming on here and doing those steps the problem still exists. We left Chrome and the Blizzard app open for a long time (about 5 hours) and it just randomly happened at ~21:50 again. I did notice that when I used Task Manager to exit the app (the way I have been getting rid of the windows/pop-ups and stopping it), I would usually close the Blizzard app first (I assumed that was closing a port or something) and then close Chrome after......this time the problem persisted after I closed the Blizzard app itself and I noticed the Blizzard app auto updater thing was running still and closed that. The moment I closed that in Task Manager the pop-ups stopped and the computer seemed to pick up slightly in speed and responsiveness and I was able to close Chrome. I am not sure if the updater is the issue or if it is just because there was still a Blizzard app thing open 'cause of the updater (like the port was still open this time 'cause of the updater, since it has worked closing just the app before). I will restart and check if the problem is still occurring and post giving you a brief yes/no now. Thank you for your time!

 

Kind Regards

Mr b0unZz



#10 Mrb0unZz

Mrb0unZz
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:37 PM

Posted 08 May 2017 - 05:09 PM

Okay so I restarted, the Blizzard app now won't connect (when I enter my username and password and hit enter it just shows that it's 'doing something' [spinning icon] and doesn't log in). I tried removing the Blizzard app and all its components using the Revo uninstaller (thinking that might help) and when I went to the Hearthstone website to download the app, the page itself turned into a porn game advert. I then came back to this site and a similar thing happened with 'Reimage Repair' pages (or something similar) popping up. 

 

Kind Regards

Mr b0unZz



#11 buddy215

buddy215

  • BC Advisor
  • 12,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:37 AM

Posted 08 May 2017 - 05:13 PM

Time to get some professional help at the Malware Removal forum by following the directions below.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

Start a new topic, give it a relevant title and post your log(s) along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. If you cannot produce any of the required logs...start the new topic anyway. Explain that you followed the Prep. Guide, were unable to create the logs, and describe what happened when you tried to create them. A member of the Malware Removal Team will walk you through, step by step, on how to clean your computer.

After doing this, please reply back in this thread with a link to the new topic so we can close this one.

 

DO NOT bump your new topic. Wait for a response from one of the Team Members.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users