Trekerj Posted May 6, 2015 Report Share Posted May 6, 2015 I've been infected. When ever I move off of my home page I am getting ads that say 'powered by Browse pulse'. this is mostly affecting Fox Fire but also intermediately hits Chrome as well. I am running Emsisoft Internet Security, but this ad ware has gotten through. It's possible that it's been on my PC for a year as it is one of the same issues I had in 2014. Attached are the requested logs. I've also run Rouge Killer and JRT these are coming up with no issues. Thanks for your help. FRST.txt fixlist.txt Addition.txt a2scan_150506-140503.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 7, 2015 Report Share Posted May 7, 2015 Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKU\S-1-5-21-3536669321-2452747631-4105606700-1001\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION HKLM\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings: [ProxySettingsPerUser] 0 <======= ATTENTION (Policy Restriction on ProxySettings) FF NetworkProxy: "type", 0 2015-03-20 16:01 - 2015-03-20 16:01 - 0000038 ____H () C:\Users\Jack\AppData\Roaming\usercode.properties 2013-06-02 17:34 - 2013-06-02 17:34 - 0000017 _____ () C:\Users\Jack\AppData\Local\resmon.resmoncfg 2014-04-04 13:51 - 2015-01-15 16:41 - 0000774 _____ () C:\ProgramData\Microsoft.SqlServer.Compact.400.32.bc 2014-07-28 14:51 - 2014-08-22 16:17 - 0000063 ____H () C:\ProgramData\Ts_infos.ini Task: {2F111A6D-C598-4E8B-B41B-4EEDDA717FCD} - System32\Tasks\PastaQuotes => C:\Program Files (x86)\pastaleads\ScheduledTask.exe <==== ATTENTION AlternateDataStreams: C:\mbam-setup-2.0.2.1012.exe:BDUClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to comment Share on other sites More sharing options...
Trekerj Posted May 7, 2015 Author Report Share Posted May 7, 2015 Ran as instructed, Logs are attached. Checked Firefox and the sane ad ware program is getting through. Fixlog.txt FRST.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 8, 2015 Report Share Posted May 8, 2015 Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply. NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop.Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Link to comment Share on other sites More sharing options...
Trekerj Posted May 10, 2015 Author Report Share Posted May 10, 2015 Ran as requested and tried a few other steps as follows: Adwcleaner restart JRT restart RogueKiller restart EMsiscan After each tool all suspicious files were deleted. All logs attached, I'm still getting a window names "more deals" popping up on Firefox. Many thanks helping me through this, your support is great. AdwCleanerS1.txt JRT.txt RKreport_DEL_05092015_224536.log a2scan_150509-224942.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 11, 2015 Report Share Posted May 11, 2015 You deleted a bunch of stuff with RogueKiller that you should not have. Not everything found by RogueKiller is malicious. Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Link to comment Share on other sites More sharing options...
Trekerj Posted May 12, 2015 Author Report Share Posted May 12, 2015 re-run with fixlist provided above. I understand that not all files reported by Rogue Killer need to be deleted. I thought I only delete those that were noted as 'suspicious'. For my education can you tell me which file I deleted that I should not have. I'd appreciate it. Thanks again for your help. a2scan_150512-152443.txt FRST.txt Fixlog.txt Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 12, 2015 Report Share Posted May 12, 2015 All these items are legit and shoul dnot have been removed: ¤¤¤ Registry : 9 ¤¤¤ [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A4A87441-5D6A-48E8-8A7A-3049F40A9BC6} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DCBDEEA6-8764-4539-B632-280F03C70F16} | DhcpNameServer : 172.16.0.1 [(Private Address) (XX)] -> Replaced () ¤¤¤ Files : 7 ¤¤¤ [Suspicious.Path|Suspicious.Startup][File] FRST64[1].exe -- C:\Users\Jack\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VR1O2X6Q\FRST64[1].exe -> Deleted [Suspicious.Path|Suspicious.Startup|VT.Unknown][File] get.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\get.bat -> Deleted [Suspicious.Path|Suspicious.Startup|VT.Unknown][File] misc.bat -- C:\Users\Jack\AppData\Local\Temp\jrt\misc.bat -> Deleted [Suspicious.Startup][File] FRST64.exe -- C:\Users\Jack\Desktop\FRST64.exe -> Deleted [Suspicious.Startup][File] JRT (1).exe -- C:\Users\Jack\Desktop\JRT (1).exe -> Deleted [Suspicious.Startup][File] JRT (1).exe -- C:\Users\Jack\Downloads\JRT (1).exe -> Deleted [Suspicious.Startup][File] JRT.exe -- C:\Users\Jack\Downloads\JRT.exe -> DeletedYour logs look fine.How are things running? Link to comment Share on other sites More sharing options...
Trekerj Posted May 13, 2015 Author Report Share Posted May 13, 2015 Good so far. Thanks you guys are great and the reason I bought Emsisoft. Thanks again. Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 13, 2015 Report Share Posted May 13, 2015 Unless you are having problems, it is time to do the final steps. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your desktop. Ensure Remove disinfection tools is checked. Also place a checkmark next to:Create registry backup Purge system restore Click the Run button. When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad. Empty the Recycle Bin Download to your Desktop: - CCleaner Portable UnZip CCleaner Portable to a folder on your Desktop named CCleanerRun CCleanerOpen the CCleaner Folder on your Desktop and double click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit) Click "Options" and choose "Advanced" Uncheck "Only delete files in Windows Temp folders older than 24 hours" Then go back to "Cleaner" and click the "RunCleaner" button. Exit CCleaner. Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore. You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. Run Windows Update and update your Windows Operating System. Install and run the Secunia Personal Software Inspector, this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated. Articles to read: How to Protect Your Computer From Malware How to keep you and your Windows PC happy Web, email, chat, password and kids safety 10 Sources of Malware Infections That should take care of everything. Safe Surfing! Link to comment Share on other sites More sharing options...
ShadowPuterDude Posted May 18, 2015 Report Share Posted May 18, 2015 Thread Closed Reason: Resolved The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread. Link to comment Share on other sites More sharing options...
Recommended Posts