Collooch 0 Posted August 28, 2015 Report Share Posted August 28, 2015 Hi there, Elise sent me a couple of links. Here are the attached reports. both scans found nothing but the virus definitely active. Any help here would be much appreciated. Thanks Christian scan_150828-104704.txt Addition.txt FRST.txt Link to post Share on other sites
Kevin Zoll 309 Posted August 28, 2015 Report Share Posted August 28, 2015 Christian, Do the following: Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKLM-x32\...\Run: [] => [X] ShellIconOverlayIdentifiers-x32: ["DropboxExt1"] -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt2"] -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt3"] -> {FB314EDD-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt4"] -> {FB314EDE-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt5"] -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt6"] -> {FB314EDF-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt7"] -> {FB314EDC-A251-47B7-93E1-CDD82E34AF8B} => No File ShellIconOverlayIdentifiers-x32: ["DropboxExt8"] -> {FB314EE0-A251-47B7-93E1-CDD82E34AF8B} => No File GroupPolicy: Group Policy on Chrome detected <======= ATTENTION CHR HKU\S-1-5-21-2354075437-3744231763-2042566630-1002\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION CHR HKU\S-1-5-21-2354075437-3744231763-2042566630-1005\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 2015-08-28 05:05 - 2015-03-29 05:05 - 00001334 _____ C:\Windows\Tasks\QGYN.job 2015-08-26 11:33 - 2015-06-01 13:17 - 00000358 _____ C:\Windows\Tasks\DriverToolkit Autorun.job 2015-08-18 04:05 - 2015-02-17 17:49 - 00000000 ____D C:\ProgramData\10115085283705826562 2009-08-04 13:24 - 2009-08-04 13:24 - 0000087 ____C () C:\Program Files (x86)\AUTORUN.INF 2009-01-23 14:55 - 2009-01-23 14:55 - 0184320 ____C () C:\Program Files (x86)\SecSNMP.dll 2006-12-20 06:42 - 2006-12-20 06:42 - 0016948 ____C () C:\Program Files (x86)\Setup.dat 2009-08-11 17:48 - 2009-08-11 17:48 - 0777320 ____C () C:\Program Files (x86)\Setup.exe 2015-03-26 15:14 - 2015-03-26 15:14 - 0005542 ___HC () C:\Users\Admin\AppData\Roaming\ETMSKM 2015-03-26 15:14 - 2015-03-26 15:14 - 0005542 ___HC () C:\Users\Admin\AppData\Roaming\QGYN 2015-02-17 17:49 - 2015-02-17 17:49 - 0354952 ___HC (AnySend.com) C:\Users\Admin\AppData\Local\nslE2D2.tmp 2015-03-31 10:21 - 2015-03-31 10:21 - 0000017 ___HC () C:\Users\Admin\AppData\Local\resmon.resmoncfg 2010-09-17 12:19 - 2014-05-05 09:58 - 0006766 _____ () C:\ProgramData\hpzinstall.log C:\Users\Admin\AppData\Local\Temp\BlackBerryDeviceManager.exe C:\Users\Admin\AppData\Local\Temp\BlackBerryLauncher.exe C:\Users\Admin\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpgj2hjd.dll C:\Users\Admin\AppData\Local\Temp\sqlite3.dll C:\Users\Instant Imprints\AppData\Local\Temp\FlashPlayerUpdate.exe C:\Users\Instant Imprints\AppData\Local\Temp\FP_AX_MSI_INSTALLER.exe C:\Users\Instant Imprints\AppData\Local\Temp\RCReadCookies.exe C:\Users\Instant Imprints\AppData\Local\Temp\zlib.dll C:\Users\Instant Imprints\AppData\Local\Temp\_is76A5.exe C:\Users\Instant Imprints\AppData\Local\Temp\_isB8E3.exe Task: {0106D237-0BCF-445E-8CC5-50DC1F305727} - System32\Tasks\CXFYCNE => C:\ProgramData\2abfacb28a86414db67072195669c416\2abfacb28a86414db67072195669c416.exe <==== ATTENTION Task: {0FEA2875-CA2B-4F3E-AAB9-A76B55FE94F5} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-3 -> No File <==== ATTENTION Task: {1276A4B3-6438-442D-8DDB-813E022A9D14} - \globalUpdateUpdateTaskMachineUA -> No File <==== ATTENTION Task: {152537CB-0B2F-4763-8947-EDD8B3148D3B} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-1-7 -> No File <==== ATTENTION Task: {1C09A49B-21CC-4E31-B7B8-B3BE7EE36F63} - System32\Tasks\DriverToolkit Autorun => C:\Program Files (x86)\DriverToolkit\DriverToolkit.exe Task: {26484470-F311-4FC3-80BA-8F5D66998055} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-5_user -> No File <==== ATTENTION Task: {2665474C-E271-47ED-A04E-15C8FD8A712F} - \BlockAndSurf Update -> No File <==== ATTENTION Task: {27A3A3C5-4679-46C0-951E-82E6EE1EACB8} - System32\Tasks\QGYN => C:\Users\Admin\AppData\Roaming\QGYN.exe <==== ATTENTION Task: {34E901A5-F1A5-4D67-B348-9AE71A0185F5} - System32\Tasks\Microsoft\Windows Defender\MpIdleTask => c:\program files\windows defender\MpCmdRun.exe Task: {3CCEFAEC-E2DD-41DC-BE96-22B1090C3B06} - \LaunchSignup -> No File <==== ATTENTION Task: {3EAE5EB8-3EE4-4780-9518-BE88917C183B} - \Microsoft\Windows\Maintenance\Advanced IC Updating -> No File <==== ATTENTION Task: {455FAE65-5C3C-4EFF-A80F-50E1C0F5554A} - System32\Tasks\Microsoft\Windows Defender\MP Scheduled Scan => c:\program files\windows defender\MpCmdRun.exe Task: {5416A6B5-979E-4491-8A9B-9C87F7DB7DDC} - \Special IC Runner -> No File <==== ATTENTION Task: {5448F063-0B1E-4AD4-853B-0448FD601A16} - \APSnotifierPP1 -> No File <==== ATTENTION Task: {69029301-B20E-428D-A2AB-6AEED9C0DCFE} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-1-6 -> No File <==== ATTENTION Task: {6B519B27-1A72-44D6-A1B1-A91C37F65D6E} - \ProPCCleaner_Start -> No File <==== ATTENTION Task: {96518014-4C45-4E53-8229-7232219FB9FE} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-6 -> No File <==== ATTENTION Task: {9EFB8907-106C-4287-8BAD-85D2E3D6C943} - \APSnotifierPP2 -> No File <==== ATTENTION Task: {A9BE8489-EDFB-4943-A65F-F870A7518898} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-7 -> No File <==== ATTENTION Task: {D1763831-1BB4-4D0E-9A63-39411182D4F2} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-10_user -> No File <==== ATTENTION Task: {DDE03927-7D6F-48F1-85F1-CB78C7266446} - \globalUpdateUpdateTaskMachineCore -> No File <==== ATTENTION Task: {E3542C77-F941-4407-8ABE-5BE8866391CB} - \APSnotifierPP3 -> No File <==== ATTENTION Task: {EF1F706C-7629-4FB3-AF6E-ADC8CCE73B85} - \51202ba7-afb6-4b72-8080-6cb631f1e2cb-5 -> No File <==== ATTENTION Task: C:\Windows\Tasks\DriverToolkit Autorun.job => C:\Program Files (x86)\DriverToolkit\DriverToolkit.exe Task: C:\Windows\Tasks\ETMSKM.job => C:\Users\Admin\AppData\Roaming\ETMSKM.exe <==== ATTENTION Task: C:\Windows\Tasks\MyPC Backup Updater.job => C:\Program Files (x86)\MyPC Backup\updater\updater.exe <==== ATTENTION Task: C:\Windows\Tasks\QGYN.job => C:\Users\Admin\AppData\Roaming\QGYN.exe <==== ATTENTIONClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
Kevin Zoll 309 Posted August 31, 2015 Report Share Posted August 31, 2015 Thread Closed Reason: Lack of Response PM either Kevin, Elise, or Arthur to have this thread reopened. The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread. Link to post Share on other sites
Elise 277 Posted September 1, 2015 Report Share Posted September 1, 2015 Topic reopened as requested, please provide the requested log. Link to post Share on other sites
Collooch 0 Posted September 1, 2015 Author Report Share Posted September 1, 2015 Hi there Thanks, Elise, Here are the attached files. Thanks Christian Fixlog.txt Link to post Share on other sites
Collooch 0 Posted September 2, 2015 Author Report Share Posted September 2, 2015 Hi There I rebooted again and ran fresh scans this morning. here are the reports thanks FRST.txt scan_150901-155858.txt Link to post Share on other sites
Kevin Zoll 309 Posted September 2, 2015 Report Share Posted September 2, 2015 Christian, Your logs look fine. How are things running? Link to post Share on other sites
Collooch 0 Posted September 3, 2015 Author Report Share Posted September 3, 2015 Hi Kevin, The virus is still active. I ran the fix this morning and rescanned the system. This is an active bugger. It is also redirecting me to a PC support window every other time I click a web link or type a web address. When I close the window and refresh the page it works fine, but the next time I click a link or type and address it goes back to this pc support window. I close and refresh and start the process over. Not sure how to kill this too. Anyhow I ran the FRST and the EEK scan again. EEK was clear, and the fixlog and addition reports are attached from the FRST scan. Now what? Thanks Christian Addition.txt Fixlog.txt FRST.txt scan_150903-084231.txt Link to post Share on other sites
Kevin Zoll 309 Posted September 3, 2015 Report Share Posted September 3, 2015 Christian, Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply. NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop.Run the tool by double-clicking it. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Link to post Share on other sites
Collooch 0 Posted September 3, 2015 Author Report Share Posted September 3, 2015 Hi Kevin, Here are the attached files after running both Scans. JRT shows nothings. ADW did a few things, but I still have it...there are still DNS unlocker ads Thanks Christian AdwCleanerC2.txt JRT.txt Link to post Share on other sites
Kevin Zoll 309 Posted September 3, 2015 Report Share Posted September 3, 2015 Christian, Copy the below code to Notepad; Save As fixlist.txt to your Desktop. SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = Tcpip\..\Interfaces\{8FAA46D8-69FA-4159-8926-B8D23373BD67}: [NameServer] 82.163.143.169,82.163.142.171 Tcpip\..\Interfaces\{9EA677F5-8AEC-4277-A0FD-6ED8DDEEF03A}: [NameServer] 82.163.143.169,82.163.142.171 2015-09-03 08:38 - 2013-09-23 14:58 - 00070239 ____C C:\ads_err.adt 2015-09-03 08:38 - 2013-09-23 14:58 - 00004096 ____C C:\ads_err.adiClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
Collooch 0 Posted September 3, 2015 Author Report Share Posted September 3, 2015 Hi Kevin, I ran the FRST, here is the fix log. This baby is still hanging on. I had to refresh the emsisoft support page 6 times before I could get to this thread to reply. Best, Christian Fixlog.txt Link to post Share on other sites
Collooch 0 Posted September 4, 2015 Author Report Share Posted September 4, 2015 Good Morning. I thought that for kicks I would run a new FRST scan. Attached are the results. Best, Christian FRST.txt Link to post Share on other sites
Collooch 0 Posted September 4, 2015 Author Report Share Posted September 4, 2015 Hi Kevin, I ran another scan with a competitive product in Malwarebytes this morning just to see if there was anything and I ran hitman pro as well. The Malware scan did find the dnsunlocker and quarantined the file. I have attached both the logs from hitman and malwarebytes so you can see the locations where they hang out, that may help make it better to remove the code. Can I get a script to run on FRST to make sure the registry edits are not just quarantined but properly removed? So far the computer is running much better this am, but I would like to make sure this is eradicated. Thanks Christian malwarebytes scan log.txt HitmanPro_20150904_0927.log Link to post Share on other sites
Kevin Zoll 309 Posted September 4, 2015 Report Share Posted September 4, 2015 Christian, I am going to have you reset the TCP/IP Stack, Winsock, and flush the DNS cache. Close all windows Do the following: Start -> All Programs -> Accessories -> Right click "Command Prompt" -> "Run as administrator" Click"OK" on any alerts. The Command Console will open Enter the following commands, at the Command Prompt. Commands must be entered exactly as shown. Press the Enter Key after each command. Wait for each command to finish before proceeding to the next command. ipconfig /flushdns ipconfig /release ipconfig /renew netsh winsock reset catalog netsh int ip reset reset.log ExitRestart your PC.Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Be sure to let me know how things are running? Link to post Share on other sites
Collooch 0 Posted September 7, 2015 Author Report Share Posted September 7, 2015 Hi Kevin, I hope you had a beauty long weekend. I want to say thanks for all you help through this. Support has been very good!. I ran those commands in command prompt. Re-ran the scans with EEK and FRST. EEK found something, 2 files and I quarantined them. So far the system appears to be running much better, and not with any of the annoying traits from before! I am not sure what the attached reports will tell you, so any light you can shed on that would be appreciated. Much thanks Christian Addition.txt FRST.txt scan_150907-092835.txt Link to post Share on other sites
Kevin Zoll 309 Posted September 7, 2015 Report Share Posted September 7, 2015 Christian, Your logs look fine. Unless you are having problems, it is time to do the final steps. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your desktop. Ensure Remove disinfection tools is checked. Also place a checkmark next to:Create registry backup Purge system restore Click the Run button. When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad. Empty the Recycle Bin Download to your Desktop: - CCleaner Portable UnZip CCleaner Portable to a folder on your Desktop named CCleanerRun CCleanerOpen the CCleaner Folder on your Desktop and double click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit) Click "Options" and choose "Advanced" Uncheck "Only delete files in Windows Temp folders older than 24 hours" Then go back to "Cleaner" and click the "RunCleaner" button. Exit CCleaner. Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore. You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. Run Windows Update and update your Windows Operating System. Install and run the Secunia Personal Software Inspector, this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated. Articles to read: How to Protect Your Computer From Malware How to keep you and your Windows PC happy Web, email, chat, password and kids safety 10 Sources of Malware Infections That should take care of everything. Safe Surfing! Link to post Share on other sites
Collooch 0 Posted September 9, 2015 Author Report Share Posted September 9, 2015 Hi Kevin, done and done. Thanks much for all your help. Christian Link to post Share on other sites
Kevin Zoll 309 Posted September 9, 2015 Report Share Posted September 9, 2015 Thread Closed Reason: Resolved The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread. Link to post Share on other sites
Recommended Posts