Jump to content

Adware.SwiftBrowse.CH


Recommended Posts

Do the following:

Download AdwCleaner and save it on your desktop.

  • Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  • Double click on adwcleaner.exe to run the tool.
  • Click on the Scan button.
  • After the scan has finished, click on the Clean button.
  • Confirm each time with OK.
  • You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  • Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
  • If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.
Download Junkware Removal Tool and save it on your desktop.
  • Shut down your anti-virus, anti-spyware, and firewall software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log is saved to your desktop and will automatically open.
  • Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
Copy the below code to Notepad; Save As fixlist.txt to your Desktop.
() C:\ProgramData\makulitsidwe\1.1.0.29\coz32host.exe
() C:\ProgramData\makulitsidwe\1.1.0.29\coz64host.exe
() C:\ProgramData\makulitsidwe\1.1.0.29\cozahost.exe
() C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe
ProxyEnable: [S-1-5-21-2660585490-3330176343-3231039735-1000] => Internet Explorer proxy is enabled.
ProxyServer: [S-1-5-21-2660585490-3330176343-3231039735-1000] => http=127.0.0.1:49175;https=127.0.0.1:49175
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKU\S-1-5-21-2660585490-3330176343-3231039735-1000 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = 
SearchScopes: HKU\S-1-5-21-2660585490-3330176343-3231039735-1000 -> {343A4D0C-3232-43BB-8D9A-963C3A85C897} URL = 
R2 cozaghost; C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe [463872 2015-01-21] () [File not signed]
R2 cozwdhost; C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe [240128 2015-01-21] () [File not signed]
2015-01-22 14:04 - 2015-01-22 14:04 - 00003492 _____ () C:\Windows\System32\Tasks\ProPCCleaner_Popup
2015-01-22 14:04 - 2015-01-22 14:04 - 00003228 _____ () C:\Windows\System32\Tasks\ProPCCleaner_Start
2015-01-22 14:04 - 2015-01-22 14:04 - 00000064 _____ () C:\Users\Aaron K Ruppel\AppData\Local\2d5aeda4da3fb68acd94fcec15bc4d73
2015-01-22 14:04 - 2015-01-22 14:04 - 00000000 ____D () C:\Users\Aaron K Ruppel\AppData\Local\Pro_PC_Cleaner
2015-01-22 14:04 - 2015-01-22 14:04 - 00000000 ____D () C:\Users\Aaron K Ruppel\AppData\Local\globalUpdate
2015-01-22 14:04 - 2015-01-22 14:04 - 00000000 ____D () C:\Users\Aaron K Ruppel\AppData\Local\GeniusBox
2015-01-22 14:02 - 2015-01-22 14:02 - 00000000 ____D () C:\ProgramData\makulitsidwe
2014-12-30 15:55 - 2014-12-30 15:55 - 0000422 _____ () C:\Users\Aaron K Ruppel\AppData\Roaming\1_and_1_redirect.xml
2015-01-22 14:04 - 2015-01-22 14:04 - 0000064 _____ () C:\Users\Aaron K Ruppel\AppData\Local\2d5aeda4da3fb68acd94fcec15bc4d73
C:\Users\Aaron K Ruppel\AppData\Local\Temp\1.tmp.exe
C:\Users\Aaron K Ruppel\AppData\Local\Temp\ose00000.exe
C:\Windows\System32\Drivers\{20915d52-1148-4fc2-8788-129eeb5e27dd}Gw64.sys
Task: {2DF46731-FC62-488A-932B-1024777EF2E4} - System32\Tasks\ProPCCleaner_Popup => C:\Program Files (x86)\Pro PC Cleaner\Splash.exe
Task: {4094BC55-FB25-4374-8191-08A5C47D6DD1} - System32\Tasks\Check Updates => C:\Users\Aaron K Ruppel\AppData\Local\GeniusBox\updater.exe [2015-01-22] ()
Task: {4F75E6E5-4BF5-448D-8C92-CA7DB7357D1F} - System32\Tasks\ProPCCleaner_Start => C:\Program Files (x86)\Pro PC Cleaner\ProPCCleaner.exe
Task: {665FA813-8878-44E7-845F-3B39549AC1BC} - System32\Tasks\GeniusBox => cmd.exe /C start "" "C:\Users\Aaron K Ruppel\AppData\Local\GeniusBox\client.exe"
2015-01-21 01:54 - 2015-01-21 01:54 - 00932352 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\zoompicl64.dll
2015-01-21 01:53 - 2015-01-21 01:53 - 00240128 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe
2015-01-21 08:24 - 2015-01-22 09:31 - 01858272 _____ () C:\Users\Aaron K Ruppel\AppData\Local\GeniusBox\Client.exe
2015-01-21 01:54 - 2015-01-21 01:54 - 00153600 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\coz32host.exe
2015-01-21 01:54 - 2015-01-21 01:54 - 00236032 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\coz64host.exe
2015-01-21 01:53 - 2015-01-21 01:53 - 00191488 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\cozahost.exe
2015-01-21 01:54 - 2015-01-21 01:54 - 00463872 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe
2015-01-21 01:54 - 2015-01-21 01:54 - 00340992 _____ () C:\ProgramData\makulitsidwe\1.1.0.29\zoompicl32.dll
AlternateDataStreams: C:\Windows\SysWOW64\MSIHANDLE:5016
AlternateDataStreams: C:\Windows\SysWOW64\MSIHANDLE:5058
AlternateDataStreams: C:\Windows\SysWOW64\MSIHANDLE:5156
AlternateDataStreams: C:\Users\Aaron K Ruppel\Desktop\Farbar Recovery Scan Tool:com.dropbox.attributes
Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Link to post
Share on other sites

Ronnie,

Changing tools.

Download RogueKiller from one of the following links and save it to your desktop:

  • Link 1
  • Link 2
    • Close all programs and disconnect any USB or external drives before running the tool.
    • Double-click RogueKiller.exe to run the tool (Vista or 7 users: Right-click and select Run As Administrator).
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything!
    • Attach the RogueKiller report to your next reply.
      • The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex)
      • The highest number of [X], is the most recent Scan
Link to post
Share on other sites

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista or 7 users: Right-click and select Run As Administrator).
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Click the Registry Tab and select the following items:
      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\cozaghost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe" /ts2=1) -> Found

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\cozwdhost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe" -scm) -> Found

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\cozaghost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe" /ts2=1) -> Found

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\cozwdhost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe" -scm) -> Found

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\cozaghost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe" /ts2=1) -> Found

      [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\cozwdhost ("C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe" -scm) -> Found

      [PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-2660585490-3330176343-3231039735-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Found

      [PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-2660585490-3330176343-3231039735-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Found

      [PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found

      [PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found

      [PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found

      [PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found

    • Click the Tasks Tab and select the following items:
      [Suspicious.Path] \\Validate Installation -- C:\Users\Aaron K Ruppel\AppData\Local\GeniusBox\uninstall.exe (/ValidateInstall=true) -> Found
    • Click the Delete button.
  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex)
    • The highest number of [X], is the most recent Delete
Link to post
Share on other sites

Thanks Kevin,

 

   I re-ran RogueKiller and selected and deleted the items you had listed above. The log is attached. Once that process completed, I rebooted the PC and attempted to load several webpages using both Chrome and Internet Explorer. Neither experienced any unusual pop-ups, redirects, nor ad insertions. I will watch it for the next few days and report any issues... but i think that took care of it.

Thanks again.

 

-Ronnie

RKreport_DEL_01272015_180906.log

Link to post
Share on other sites

Good to hear that it killed the popups, but the malware is still on the system, though it is no longer active.

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Link to post
Share on other sites

Thread Closed

Reason: Lack of Response

PM either Kevin, Elise, or Arthur to have this thread reopened.

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread.

Link to post
Share on other sites

Ronnie,

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKU\.DEFAULT -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKU\S-1-5-19 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKU\S-1-5-20 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
2015-01-27 18:17 - 2015-01-27 18:17 - 00000328 _____ () C:\Windows\Tasks\Tempo Runner coz32host.job
2015-01-27 18:05 - 2015-01-27 18:17 - 00000328 _____ () C:\Windows\Tasks\Tempo Runner coz64host.job
2015-01-27 18:05 - 2015-01-27 18:05 - 00002802 _____ () C:\Windows\System32\Tasks\Tempo Runner coz64host
2015-01-23 17:49 - 2015-01-23 17:49 - 00000000 ____D () C:\ProgramData\makulitsidwe
2015-01-23 14:02 - 2015-01-23 14:02 - 01654617 _____ () C:\Windows\shost.bin
Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Link to post
Share on other sites

Thread Closed

Reason: Lack of Response

PM either Kevin, Elise, or Arthur to have this thread reopened.

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread.

Link to post
Share on other sites
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...