Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't install malwarebytes - I need fixlist.txt


  • This topic is locked This topic is locked
24 replies to this topic

#1 fianp

fianp

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 03 June 2017 - 08:46 PM

It always shown "This app has been blocked for your protection". Once I delete all untrusted certificate, it appear again.

 

here's the log

Attached Files



BC AdBot (Login to Remove)

 


#2 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 04 June 2017 - 12:00 AM

Hi fianp :)

My name is Aura and I'll be assisting you with your malware issue. Since we'll be working together, you can call me Aura or Yoan, which is my real name, it's up to you! Now that we've broke the ice, I'll just ask you a few things during the time we'll be working together to clean your system and get it back to an operational state.
  • As you'll notice, the logs we are asking for here are quite lenghty, so it's normal for me to not reply exactly after you post them. This is because I need some time to analyse them and then act accordingly. However, I'll always reply within 24 hours, 48 hours at most if something unexpected happens;
  • As long as I'm assisting you on BleepingComputer, in this thread, I'll ask you to not seek assistance anywhere else for any issue related to the system we are working on. If you have an issue, question, etc. about your computer, please ask it in this thread and I'll assist you;
  • The same principle applies to any modifications you make to your system, I would like you to ask me before you do any manipulations that aren't in the instructions I posted. This is to ensure that we are operating in sync and I know exactly what's happening on your system;
  • If you aren't sure about an instruction I'm giving you, ask me about it. This is to ensure that the clean-up process goes without any issue. I'll answer you and even give you more precise instructions/explanations if you need. There's no shame in asking questions here, better be safe than sorry!;
  • If you don't reply to your thread within 3 days, I'll bump this thread to let you know that I'm waiting for you. If you don't reply after 5 days, it'll be closed. If you return after that period, you can send me a PM to get it unlocked and we'll continue where we left off;
  • Since malware can work quickly, we want to get rid of them as fast as we can, before they make unknown changes to the system. This being said, I would appreciate if you could reply to this thread within 24 hours of me posting. This way, we'll have a good clean-up rhythm and the chances of complications will be reduced;
  • I'm against any form of pirated, illegal and counterfeit software and material. So if you have any installed on your system, I'll ask you to uninstall them right now. You don't have to tell me if you indeed had some or not, I'll give you the benefit of the doubt. Plus, this would be against BleepingComputer's rules;
  • In the end, you are the one asking for assistance here. So if you wish to go a different way during the clean-up, like format and reinstall Windows, you are free to do so. I would appreciate you to let me know about it first, and if you need, I can also assist you in the process;
  • I would appreciate if you were to stay with me until the end, which means, until I declare your system clean. Just because your system isn't behaving weirdly anymore, or is running better than before, it doesn't mean that the infection is completely gone;
    This being said, I have a full time job so sometimes it'll take longer for me to reply to you. Don't worry, you'll be my first priority as soon as I get home and have time to look at your thread;
This being said, it's time to clean-up some malware, so let's get started, shall we? :)

I'll take a look at your logs this morning when I wake up.

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#3 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 04 June 2017 - 10:12 AM

Hi Aura, thanks for your reply

yes, we can work together

 

btw, i didn't speak english fluently sorry for any miss word



#4 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 04 June 2017 - 11:22 AM

No problem :)

After running the FRST fix below, two files should have been created on your desktop: Export1.reg and Export2.reg. Please attach them in your next reply.

iO3R662.pngFarbar Recovery Scan Tool (FRST) - Fix mode
Follow the instructions below to execute a fix on your system using FRST, and provide the log in your next reply.
  • Download the attached fixlist.txt file, and save it on your Desktop (or wherever your FRST.exe/FRST64.exe executable is located);
  • Right-click on the FRST executable and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Click on the Fix button;
    NYA5Cbr.png
  • On completion, a message will come up saying that the fix has been completed and it'll open a log in Notepad;
  • Copy and paste its content in your next reply;
Your next reply(ies) should include:
  • Attached Export1.reg and Export2.reg files;
  • Copy/pasted content of FRST's fixlog.txt;

Attached Files


unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#5 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 04 June 2017 - 07:52 PM

Fix result of Farbar Recovery Scan Tool (x64) Version: 02-06-2017
Ran by Windows 10 (05-06-2017 07:31:22) Run:2
Running from C:\Users\Windows 10\Downloads
Loaded Profiles: Windows 10 (Available Profiles: Windows 10 & Administrator)
Boot Mode: Normal
==============================================

fixlist content:
*****************
CloseProcesses:
CreateRestorePoint:

REG: REG EXPORT "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates" "%userprofile%\Desktop\Export1.reg"
REG: REG EXPORT "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates" "%userprofile%\Desktop\Export2.reg"

HKLM\...\RunOnce: [BAYUTEKNISI-PC] => C:\Windows\Temp\g74A2.tmp.exe [307200 2017-06-02] () <===== ATTENTION

HKLM\ DisallowedCertificates: 03D22C9C66915D58C88912B64C1F984B8344EF09 (Comodo Security Solutions) <==== ATTENTION
HKLM\ DisallowedCertificates: 0F684EC1163281085C6AF20528878103ACEFCAAB (F-Secure Corporation) <==== ATTENTION
HKLM\ DisallowedCertificates: 1667908C9E22EFBD0590E088715CC74BE4C60884 (U)
HKLM\ DisallowedCertificates: 18DEA4EFA93B06AE997D234411F3FD72A677EECE (U)
HKLM\ DisallowedCertificates: 2026D13756EB0DB753DF26CB3B7EEBE3E70BB2CF (U)
HKLM\ DisallowedCertificates: 249BDA38A611CD746A132FA2AF995A2D3C941264 (Malwarebytes Corporation) <==== ATTENTION
HKLM\ DisallowedCertificates: 31AC96A6C17C425222C46D55C3CCA6BA12E54DAF (U)
HKLM\ DisallowedCertificates: 331E2046A1CCA7BFEF766724394BE6112B4CA3F7 (Trend Micro) <==== ATTENTION
HKLM\ DisallowedCertificates: 3353EA609334A9F23A701B9159E30CB6C22D4C59 (U)
HKLM\ DisallowedCertificates: 373C33726722D3A5D1EDD1F1585D5D25B39BEA1A (SUPERAntiSpyware.com) <==== ATTENTION
HKLM\ DisallowedCertificates: 3850EDD77CC74EC9F4829AE406BBF9C21E0DA87F (Kaspersky Lab) <==== ATTENTION
HKLM\ DisallowedCertificates: 3D496FA682E65FC122351EC29B55AB94F3BB03FC (AVG Technologies CZ) <==== ATTENTION
HKLM\ DisallowedCertificates: 4243A03DB4C3C15149CEA8B38EEA1DA4F26BD159 (PC Tools) <==== ATTENTION
HKLM\ DisallowedCertificates: 42727E052C0C2E1B35AB53E1005FD9EDC9DE8F01 (K7 Computing Pvt Ltd) <==== ATTENTION
HKLM\ DisallowedCertificates: 4420C99742DF11DD0795BC15B7B0ABF090DC84DF (Doctor Web Ltd.) <==== ATTENTION
HKLM\ DisallowedCertificates: 4C0AF5719009B7C9D85C5EAEDFA3B7F090FE5FFF (U)
HKLM\ DisallowedCertificates: 5240AB5B05D11B37900AC7712A3C6AE42F377C8C (Check Point Software Technologies Ltd.) <==== ATTENTION
HKLM\ DisallowedCertificates: 5DD3D41810F28B2A13E9A004E6412061E28FA48D (Emsisoft Ltd) <==== ATTENTION
HKLM\ DisallowedCertificates: 7457A3793086DBB58B3858D6476889E3311E550E (U)
HKLM\ DisallowedCertificates: 76A9295EF4343E12DFC5FE05DC57227C1AB00D29 (BullGuard Ltd) <==== ATTENTION
HKLM\ DisallowedCertificates: 775B373B33B9D15B58BC02B184704332B97C3CAF (McAfee) <==== ATTENTION
HKLM\ DisallowedCertificates: 872CD334B7E7B3C3D1C6114CD6B221026D505EAB (Comodo Security Solutions) <==== ATTENTION
HKLM\ DisallowedCertificates: 88AD5DFE24126872B33175D1778687B642323ACF (McAfee) <==== ATTENTION
HKLM\ DisallowedCertificates: 9132E8B079D080E01D52631690BE18EBC2347C1E (Adaware Software) <==== ATTENTION
HKLM\ DisallowedCertificates: 982D98951CF3C0CA2A02814D474A976CBFF6BDB1 (Safer Networking Ltd.) <==== ATTENTION
HKLM\ DisallowedCertificates: 9A08641F7C5F2CCA0888388BE3E5DBDDAAA3B361 (Webroot Inc.) <==== ATTENTION
HKLM\ DisallowedCertificates: 9C43F665E690AB4D486D4717B456C5554D4BCEB5 (U)
HKLM\ DisallowedCertificates: 9E3F95577B37C74CA2F70C1E1859E798B7FC6B13 (U)
HKLM\ DisallowedCertificates: A1F8DCB086E461E2ABB4B46ADCFA0B48C58B6E99 (Avira Operations GmbH & Co. KG) <==== ATTENTION
HKLM\ DisallowedCertificates: A5341949ABE1407DD7BF7DFE75460D9608FBC309 (U)
HKLM\ DisallowedCertificates: A59CC32724DD07A6FC33F7806945481A2D13CA2F (ESET) <==== ATTENTION
HKLM\ DisallowedCertificates: AB7E760DA2485EA9EF5A6EEE7647748D4BA6B947 (AVG Technologies CZ) <==== ATTENTION
HKLM\ DisallowedCertificates: AD4C5429E10F4FF6C01840C20ABA344D7401209F (Avast Antivirus/Software) <==== ATTENTION
HKLM\ DisallowedCertificates: AD96BB64BA36379D2E354660780C2067B81DA2E0 (Symantec Corporation) <==== ATTENTION
HKLM\ DisallowedCertificates: B8EBF0E696AF77F51C96DB4D044586E2F4F8FD84 (U)
HKLM\ DisallowedCertificates: CDC37C22FE9272D8F2610206AD397A45040326B8 (U)
HKLM\ DisallowedCertificates: D3F78D747E7C5D6D3AE8ABFDDA7522BFB4CBD598 (Kaspersky Lab) <==== ATTENTION
HKLM\ DisallowedCertificates: DB303C9B61282DE525DC754A535CA2D6A9BD3D87 (ThreatTrack Security) <==== ATTENTION
HKLM\ DisallowedCertificates: DB77E5CFEC34459146748B667C97B185619251BA (Avast Antivirus/Software) <==== ATTENTION
HKLM\ DisallowedCertificates: E22240E837B52E691C71DF248F12D27F96441C00 (U)
HKLM\ DisallowedCertificates: E513EAB8610CFFD7C87E00BCA15C23AAB407FCEF (AVG Technologies CZ) <==== ATTENTION
HKLM\ DisallowedCertificates: ED841A61C0F76025598421BC1B00E24189E68D54 (Bitdefender SRL) <==== ATTENTION
HKLM\ DisallowedCertificates: F83099622B4A9F72CB5081F742164AD1B8D048C9 (ESET) <==== ATTENTION
HKLM\ DisallowedCertificates: FBB42F089AF2D570F2BF6F493D107A3255A9BB1A (Panda Security S.L) <==== ATTENTION
HKLM\ DisallowedCertificates: FFFA650F2CB2ABC0D80527B524DD3F9FC172C138 (Doctor Web Ltd.) <==== ATTENTION
GroupPolicy: Restriction <======= ATTENTION
GroupPolicyScripts: Restriction <======= ATTENTION
CHR HKLM\SOFTWARE\Policies\Google: Restriction <======= ATTENTION

HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxps://id.search.yahoo.com/yhs/web?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D1%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxps://id.search.yahoo.com/yhs/web?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D1%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro
HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://www.google.com/ie
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKLM -> {0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wnf_dnldastr_16_49&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwincy%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByDtFtCtFyDtBtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2SyCyE0AyD0FtB0CzztGtCyCyB0AtGyE0AzztAtGyBtBzzyEtGtBtCyE0FyC0CyEyCtBzzzytB2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1247542350%26a%3Dwnf_dnldastr_16_49%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldastr_16_49_dopc&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwinyahoo%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByEtFtByBtFyDtDtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2StAtA0F0C0FtCyB0FtGyByDtD0CtGtDzytAzytGtAyByEtDtGtAtB0A0EtAyB0DyC0FyByCzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1951891761%26a%3Dwny_dnldastr_16_49_dopc%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKLM-x32 -> {0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} URL = hxxps://id.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wnf_dnldastr_16_49&param1=1&param2=f%3D4%26b%3DIE%26cc%3Did%26pa%3Dwincy%26cd%3D2XzuyEtN2Y1L1Qzu0C0E0BtD0D0AyDtCyByB0B0D0F0F0C0AtN0D0Tzu0StCzztDyDtN1L2XzutAtFtByDtFtCtFyDtBtN1L1Czu1TtN1L1G1B1V1N2Y1L1Qzu2SyCyE0AyD0FtB0CzztGtCyCyB0AtGyE0AzztAtGyBtBzzyEtGtBtCyE0FyC0CyEyCtBzzzytB2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0DyDzz0AzyyEzy0AtG0CzyyE0AtGyEzzyBtAtGzyyEtBtCtGtDtByB0EyBtDzzyBtD0C0AyE2QtN0A0LzuyE%26cr%3D1247542350%26a%3Dwnf_dnldastr_16_49%26os_ver%3D10.0%26os%3DWindows%2B10%2BPro&p={searchTerms}
SearchScopes: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001 -> {0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} URL =
SearchScopes: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001 -> {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.google.com/search?q={sear

FF SelectedSearchEngine: Mozilla\Firefox\Profiles\sx1d6n4r.default -> Yahoo! Powered Search
FF NetworkProxy: Mozilla\Firefox\Profiles\sx1d6n4r.default -> proxy_over_tls", false
FF NetworkProxy: Mozilla\Firefox\Profiles\sx1d6n4r.default -> type", 4

CHR DefaultSearchURL: Default -> hxxp://srch.bar/{searchTerms}
CHR DefaultSuggestURL: Default -> hxxp://srch.bar/?s={searchTerms}
CHR HKLM\...\Chrome\Extension: [pilplloabdedfmialnfchjomjmpjcoej] - hxxps://clients2.google.com/service/update2/crx
CHR HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [pilplloabdedfmialnfchjomjmpjcoej] - hxxps://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [pilplloabdedfmialnfchjomjmpjcoej] - hxxps://clients2.google.com/service/update2/crx

R2 Service KMSELDI; C:\Program Files\KMSpico\Service_KMS.exe [745664 2016-01-12] (@ByELDI) [File not signed]

Task: {5E60E44C-7C4E-45DD-9BED-274DE7D1B90B} - System32\Tasks\AutoPico Daily Restart => C:\Program Files\KMSpico\AutoPico.exe [2016-01-12] (@ByELDI)
Task: {78B01752-086F-4EA9-9EE3-6251775AC7F9} - System32\Tasks\Optimize Thumbnail Cache Files => Wscript.exe //nologo //E:jscript //B C:\ProgramData\InstallShield\Update\isuspm.ini <==== ATTENTION

C:\Program Files\KMSpico
C:\ProgramData\InstallShield\Update\isuspm.ini
C:\Windows\SECOH-QAD.dll
C:\Windows\Temp\g74C3.tmp.exe
C:\Windows\Temp\g74A2.tmp.exe

EmptyTemp:
*****************

Processes closed successfully.
Error: (0) Failed to create a restore point.

========= REG EXPORT "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates" "%userprofile%\Desktop\Export1.reg" =========

The operation completed successfully.



========= End of Reg: =========


========= REG EXPORT "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates" "%userprofile%\Desktop\Export2.reg" =========

The operation completed successfully.



========= End of Reg: =========

HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\\BAYUTEKNISI-PC => value removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\03D22C9C66915D58C88912B64C1F984B8344EF09 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\0F684EC1163281085C6AF20528878103ACEFCAAB => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\1667908C9E22EFBD0590E088715CC74BE4C60884 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\18DEA4EFA93B06AE997D234411F3FD72A677EECE => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\2026D13756EB0DB753DF26CB3B7EEBE3E70BB2CF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\249BDA38A611CD746A132FA2AF995A2D3C941264 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\31AC96A6C17C425222C46D55C3CCA6BA12E54DAF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\331E2046A1CCA7BFEF766724394BE6112B4CA3F7 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\3353EA609334A9F23A701B9159E30CB6C22D4C59 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\373C33726722D3A5D1EDD1F1585D5D25B39BEA1A => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\3850EDD77CC74EC9F4829AE406BBF9C21E0DA87F => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\3D496FA682E65FC122351EC29B55AB94F3BB03FC => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\4243A03DB4C3C15149CEA8B38EEA1DA4F26BD159 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\42727E052C0C2E1B35AB53E1005FD9EDC9DE8F01 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\4420C99742DF11DD0795BC15B7B0ABF090DC84DF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\4C0AF5719009B7C9D85C5EAEDFA3B7F090FE5FFF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\5240AB5B05D11B37900AC7712A3C6AE42F377C8C => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\5DD3D41810F28B2A13E9A004E6412061E28FA48D => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\7457A3793086DBB58B3858D6476889E3311E550E => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\76A9295EF4343E12DFC5FE05DC57227C1AB00D29 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\775B373B33B9D15B58BC02B184704332B97C3CAF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\872CD334B7E7B3C3D1C6114CD6B221026D505EAB => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\88AD5DFE24126872B33175D1778687B642323ACF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\9132E8B079D080E01D52631690BE18EBC2347C1E => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\982D98951CF3C0CA2A02814D474A976CBFF6BDB1 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\9A08641F7C5F2CCA0888388BE3E5DBDDAAA3B361 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\9C43F665E690AB4D486D4717B456C5554D4BCEB5 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\9E3F95577B37C74CA2F70C1E1859E798B7FC6B13 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\A1F8DCB086E461E2ABB4B46ADCFA0B48C58B6E99 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\A5341949ABE1407DD7BF7DFE75460D9608FBC309 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\A59CC32724DD07A6FC33F7806945481A2D13CA2F => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\AB7E760DA2485EA9EF5A6EEE7647748D4BA6B947 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\AD4C5429E10F4FF6C01840C20ABA344D7401209F => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\AD96BB64BA36379D2E354660780C2067B81DA2E0 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\B8EBF0E696AF77F51C96DB4D044586E2F4F8FD84 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\CDC37C22FE9272D8F2610206AD397A45040326B8 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\D3F78D747E7C5D6D3AE8ABFDDA7522BFB4CBD598 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\DB303C9B61282DE525DC754A535CA2D6A9BD3D87 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\DB77E5CFEC34459146748B667C97B185619251BA => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\E22240E837B52E691C71DF248F12D27F96441C00 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\E513EAB8610CFFD7C87E00BCA15C23AAB407FCEF => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\ED841A61C0F76025598421BC1B00E24189E68D54 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\F83099622B4A9F72CB5081F742164AD1B8D048C9 => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\FBB42F089AF2D570F2BF6F493D107A3255A9BB1A => key removed successfully
HKLM\Software\Microsoft\SystemCertificates\Disallowed\Certificates\FFFA650F2CB2ABC0D80527B524DD3F9FC172C138 => key removed successfully
C:\Windows\system32\GroupPolicy\Machine => moved successfully
C:\Windows\system32\GroupPolicy\GPT.ini => moved successfully
C:\Windows\SysWOW64\GroupPolicy\GPT.ini => moved successfully
"C:\Windows\system32\GroupPolicy\Machine" => not found.
HKLM\SOFTWARE\Policies\Google => key removed successfully
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer => key removed successfully
HKLM\Software\\Microsoft\Internet Explorer\Main\\Start Page => value restored successfully
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Start Page => value restored successfully
HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\Software\Microsoft\Internet Explorer\Main\\Default_Search_URL => value restored successfully
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value restored successfully
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key removed successfully
HKCR\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key removed successfully
HKCR\CLSID\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value restored successfully
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key removed successfully
HKCR\Wow6432Node\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key removed successfully
HKCR\Wow6432Node\CLSID\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key not found.
HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key removed successfully
HKCR\CLSID\{0CE02FFA-A6B0-46F6-BA2F-BD32C3630126} => key not found.
HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990} => key removed successfully
HKCR\CLSID\{6A1806CD-94D4-4689-BA73-E35EA1EA9990} => key not found.
Firefox SelectedSearchEngine removed successfully
Firefox Proxy settings were reset.
FF NetworkProxy: Mozilla\Firefox\Profiles\sx1d6n4r.default -> type", 4 => not found
Chrome DefaultSearchURL => removed successfully
Chrome DefaultSuggestURL => removed successfully
HKLM\SOFTWARE\Google\Chrome\Extensions\pilplloabdedfmialnfchjomjmpjcoej => key removed successfully
HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\Google\Chrome\Extensions\pilplloabdedfmialnfchjomjmpjcoej => key removed successfully
HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\pilplloabdedfmialnfchjomjmpjcoej => key removed successfully
HKLM\System\CurrentControlSet\Services\Service KMSELDI => key removed successfully
Service KMSELDI => service removed successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{5E60E44C-7C4E-45DD-9BED-274DE7D1B90B} => key removed successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{5E60E44C-7C4E-45DD-9BED-274DE7D1B90B} => key removed successfully
C:\Windows\System32\Tasks\AutoPico Daily Restart => moved successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\AutoPico Daily Restart => key removed successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{78B01752-086F-4EA9-9EE3-6251775AC7F9} => key removed successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{78B01752-086F-4EA9-9EE3-6251775AC7F9} => key removed successfully
C:\Windows\System32\Tasks\Optimize Thumbnail Cache Files => moved successfully
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Optimize Thumbnail Cache Files => key removed successfully
C:\Program Files\KMSpico => moved successfully
C:\ProgramData\InstallShield\Update\isuspm.ini => moved successfully
C:\Windows\SECOH-QAD.dll => moved successfully
"C:\Windows\Temp\g74C3.tmp.exe" => not found.
C:\Windows\Temp\g74A2.tmp.exe => moved successfully

=========== EmptyTemp: ==========

BITS transfer queue => 583195 B
DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 478496141 B
Java, Flash, Steam htmlcache => 506 B
Windows/system/drivers => 114634427 B
Edge => 10045144 B
Chrome => 7064732 B
Firefox => 373416867 B
Opera => 116274528 B

Temp, IE cache, history, cookies, recent:
Default => 7168 B
Users => 0 B
ProgramData => 0 B
Public => 0 B
systemprofile => 25091 B
systemprofile32 => 128 B
LocalService => 904 B
NetworkService => 22163930 B
Windows 10 => 1686361345 B
Administrator => 20521443 B

RecycleBin => 2278551682 B
EmptyTemp: => 4.8 GB temporary data Removed.

================================


The system needed a reboot.

==== End of Fixlog 07:36:33 ====

 

 

Attached Files



#6 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 04 June 2017 - 08:09 PM

Good. Now you should be able to install and run a scan with Malwarebytes.

j1Bynr2.pngMalwarebytes - Clean Mode
  • Download and install the free version of Malwarebytes
    Note: If you have Malwarebytes already installed, you don't need to install it again. Simply start from the next bullet point;
  • Once Malwarebytes is installed, launch it and let it update his database. You might have to click on the little arrow by Scan Status in the middle right pane for it to do so;
  • Once the database update is complete, click on the Scan tab, then select the Threat Scan button and click on Start Scan;
  • Let the scan run, the time required to complete the scan depends of your system and computer specs;
  • Once the scan is complete, make sure that the first checkbox at the top is checked (which will automatically check every detected item), then click on the Quarantine Selected button;
    • If it asks you to restart your computer to complete the removal, do so;
  • Click on Export Summary after the deletion (in the bottom-left corner) and select Copy to Clipboard. Paste the content in your next reply;

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#7 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 05 June 2017 - 04:44 AM

Thanks Aura, its worked now.

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 6/5/17
Scan Time: 4:24 PM
Log File:
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.139
Update Package Version: 1.0.2088
License: Trial

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: BAYUTEKNISI-PC\Windows 10

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 406242
Threats Detected: 24
Threats Quarantined: 24
Time Elapsed: 6 min, 23 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 6
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{43687A4E-5ABD-433C-A75F-CCEC64414671}, Quarantined, [277], [261682],1.0.2088
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, Quarantined, [277], [-1],0.0.0
PUP.Optional.InstallCore, HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\csastats, Quarantined, [3], [260986],1.0.2088
PUP.Optional.InstallCore, HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\ICSW1.23, Quarantined, [3], [239562],1.0.2088
PUP.Optional.ProductSetup, HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\PRODUCTSETUP, Quarantined, [14907], [242047],1.0.2088
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\InstallShield® Update Service Scheduler, Quarantined, [277], [261683],1.0.2088

Registry Value: 15
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{43687A4E-5ABD-433C-A75F-CCEC64414671}|PATH, Quarantined, [277], [261682],1.0.2088
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-20\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-4057608267-1640112046-4272586326-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKU\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYSERVER, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYSERVER, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYOVERRIDE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYOVERRIDE, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYSETTINGSPERUSER, Quarantined, [277], [-1],0.0.0
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SOFTWARE\WOW6432NODE\POLICIES\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYSETTINGSPERUSER, Quarantined, [277], [-1],0.0.0
PUP.Optional.ProductSetup, HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\SOFTWARE\PRODUCTSETUP|TB, Quarantined, [14907], [242047],1.0.2088

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 3
Trojan.Wdfload.Generic, C:\PROGRAM FILES\SHADOW ZOLUTION TIME\SHADOW ZOLUTION TIME.DLL, Quarantined, [5443], [384303],1.0.2088
PUP.Optional.GameHack, C:\PROGRAM FILES (X86)\CHEAT ENGINE 6.5.1\STANDALONEPHASE1.DAT, Quarantined, [573], [393793],1.0.2088
Hijack.AutoConfigURL.PrxySvrRST, C:\WINDOWS\SYSTEM32\TASKS\InstallShield® Update Service Scheduler, Quarantined, [277], [261680],1.0.2088

Physical Sector: 0
(No malicious items detected)


(end)



#8 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 05 June 2017 - 07:02 AM

Good :) Now let's do a sweep with JRT and ADwCleaner.

iT103hr.pngJunkware Removal Tool (JRT)
  • Download Junkware Removal Tool (JRT) and move it to your Desktop;
  • Right-click on JRT.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Press on any key to launch the scan and let it complete;
    tLsXbWy.png
    Credits : BleepingComputer.com
  • Once the scan is complete, a log will open. Please copy/paste the content of the output log in your next reply;
zcMPezJ.pngAdwCleaner - Fix Mode
  • Download AdwCleaner and move it to your Desktop;
  • Right-click on AdwCleaner.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Accept the EULA (I accept), let the database update, then click on Scan;
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Cleaning button. This will kill all the active processes;
    MV5ejgW.png
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it;
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply;
Your next reply(ies) should therefore contain:
  • Copy/pasted JRT log;
  • Copy/pasted AdwCleaner clean log;

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#9 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 05 June 2017 - 10:39 AM

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.3 (04.10.2017)
Operating System: Windows 10 Pro x64
Ran by Windows 10 (Administrator) on 05/06/2017 at 22.20.27,20
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 0




Registry: 1

Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\Search\\SearchAssistant (Registry Value)




~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 05/06/2017 at 22.23.22,40
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

|

 

 

 

|

# AdwCleaner v6.047 - Logfile created 05/06/2017 at 22:30:47
# Updated on 19/05/2017 by Malwarebytes
# Database : 2017-06-02.2 [Server]
# Operating System : Windows 10 Pro  (X64)
# Username : Windows 10 - BAYUTEKNISI-PC
# Running from : C:\Users\Windows 10\Downloads\AdwCleaner.exe
# Mode: Clean
# Support : https://www.malwarebytes.com/support



***** [ Services ] *****



***** [ Folders ] *****

[-] Folder deleted: C:\Users\Windows 10\AppData\Roaming\Hola
[-] Folder deleted: C:\Program Files\Hola
[-] Folder deleted: C:\Users\Windows 10\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\pilplloabdedfmialnfchjomjmpjcoej


***** [ Files ] *****



***** [ DLL ] *****



***** [ WMI ] *****



***** [ Shortcuts ] *****



***** [ Scheduled Tasks ] *****



***** [ Registry ] *****

[-] Key deleted: HKU\.DEFAULT\Software\Hola
[-] Key deleted: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\Software\Hola
[-] Key deleted: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001\Software\drpsu
[-] Key deleted: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-06052017163543256\Software\Hola
[-] Key deleted: HKU\S-1-5-21-4057608267-1640112046-4272586326-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-06052017163543256\Software\drpsu
[#] Key deleted on reboot: HKU\S-1-5-18\Software\Hola
[#] Key deleted on reboot: HKCU\Software\Hola
[#] Key deleted on reboot: HKCU\Software\drpsu
[#] Key deleted on reboot: [x64] HKCU\Software\Hola
[#] Key deleted on reboot: [x64] HKCU\Software\drpsu
[-] Key deleted: [x64] HKLM\SOFTWARE\Hola
[-] Value deleted: [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run [hola]


***** [ Web browsers ] *****

[-] [C:\Users\Windows 10\AppData\Local\Google\Chrome\User Data\Default] [extension] Deleted: pilplloabdedfmialnfchjomjmpjcoej
[-] [C:\Users\Windows 10\AppData\Local\Google\Chrome\User Data\Profile 1] [extension] Deleted: pilplloabdedfmialnfchjomjmpjcoej


*************************

:: "Tracing" keys deleted
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C0].txt - [2141 Bytes] - [05/06/2017 22:30:47]
C:\AdwCleaner\AdwCleaner[S0].txt - [2570 Bytes] - [05/06/2017 22:28:51]

########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt - [2287 Bytes] ##########
 



#10 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 05 June 2017 - 11:00 AM

Good! Now, please run a new scan with FRST and provide me a fresh set of logs (FRST.txt and Addition.txt) so I can check for any remnants left to remove.

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#11 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 06 June 2017 - 07:49 AM

Just scan it.

Here's the new logs

Attached Files



#12 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 07 June 2017 - 07:27 AM

Your logs looks good to me :)

How's your system behaving? Are there any other issues to address?

unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#13 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 08 June 2017 - 11:06 AM

Sorry late reply.

Now I try to installing avast, but it show "There was an error completing the setup process".
And it showed a setup log with some error and warning



#14 Aura

Aura

    Bleepin' Special Ops


  • Malware Response Team
  • 19,474 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:38 PM

Posted 08 June 2017 - 11:32 AM

Alright I know what's happening. Follow the instructions below.

iO3R662.pngFarbar Recovery Scan Tool (FRST) - Fix mode
Follow the instructions below to execute a fix on your system using FRST, and provide the log in your next reply.
  • Download the attached fixlist.txt file, and save it on your Desktop (or wherever your FRST.exe/FRST64.exe executable is located);
  • Right-click on the FRST executable and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Click on the Fix button;
    NYA5Cbr.png
  • On completion, a message will come up saying that the fix has been completed and it'll open a log in Notepad;
  • Copy and paste its content in your next reply;

Attached Files


unite_blue.png
Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura
My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM.


#15 fianp

fianp
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 08 June 2017 - 11:44 AM

Fix result of Farbar Recovery Scan Tool (x64) Version: 07-06-2017 01
Ran by Windows 10 (08-06-2017 23:41:28) Run:4
Running from C:\Users\Windows 10\Downloads
Loaded Profiles: Windows 10 (Available Profiles: Windows 10 & Administrator)
Boot Mode: Normal
==============================================

fixlist content:
*****************
Hosts:
*****************

C:\Windows\System32\Drivers\etc\hosts => moved successfully
Hosts restored successfully.

==== End of Fixlog 23:41:28 ====






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users