Adware/malware

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by edpolakoff, Feb 16, 2015.

  1. edpolakoff

    edpolakoff Private First Class

    Hey guys,

    Need a little help again. My daughter in law gave me her computer to work on. I don't think I've ever seen so much adware and malware installed on one machine. I went through and uninstalled all the suspicious programs, but it appears there is still more.

    Chrome comes up with pcfixing1.info telling me the computer has adware/spyware on it and ads from lowpricesapp. Fake windows firewall warnings and phone numbers to call. Lots of fun!

    Just got unwanted video ads popping up too...

    Thanks in advance!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please rerun RogueKiller and have it fix these items:
    Code:
    ¤¤¤ Registry : 63 ¤¤¤
    [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{ccb24e92-62c4-4c53-95d2-65f9eed476bc} -> Found
    [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d40c654d-7c51-4eb3-95b2-1e23905c2a2d} -> Found
    [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b} -> Found
    [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d40c654d-7c51-4eb3-95b2-1e23905c2a2d} -> Found
    [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe  -> Found
    [PUP] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe  -> Found
    [PUP] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe  -> Found
    [PUP] (X64) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | TBHostSupport : "C:\windows\SysWOW64\Rundll32.exe" "C:\Users\Anya B\AppData\Local\TBHostSupport\TBHostSupport.dll",DLLRunTBHostSupportPlugin  -> Found
    [PUP] (X64) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | APISupport : "C:\windows\SysWOW64\Rundll32.exe" "C:\Users\Anya B\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport  -> Found
    [PUP] (X64) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\updater.exe  -> Found
    [PUP] (X86) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | TBHostSupport : "C:\windows\SysWOW64\Rundll32.exe" "C:\Users\Anya B\AppData\Local\TBHostSupport\TBHostSupport.dll",DLLRunTBHostSupportPlugin  -> Found
    [PUP] (X86) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | APISupport : "C:\windows\SysWOW64\Rundll32.exe" "C:\Users\Anya B\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport  -> Found
    [PUP] (X86) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\updater.exe  -> Found
    [PUP] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe  -> Found
    [PUP] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe  -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\qodukyqu (C:\Users\Anya B\AppData\Roaming\VOPackage\nsqA0B5.tmp) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\rcores (C:\windows\rcore.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\serverjo (C:\Users\Anya B\AppData\Roaming\VOPackage\JOSrv.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\serversu (C:\Users\Anya B\AppData\Roaming\SoftwareUpdater\SUsrv.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WebCake Desktop Updater (C:\Program Files (x86)\Betcat\WBDesktop.Updater.1.0.0.16.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\qodukyqu (C:\Users\Anya B\AppData\Roaming\VOPackage\nsqA0B5.tmp) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\rcores (C:\windows\rcore.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\serverjo (C:\Users\Anya B\AppData\Roaming\VOPackage\JOSrv.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\serversu (C:\Users\Anya B\AppData\Roaming\SoftwareUpdater\SUsrv.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\WebCake Desktop Updater (C:\Program Files (x86)\Betcat\WBDesktop.Updater.1.0.0.16.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdate (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /svc) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\globalUpdatem (C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe /medsvc) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qodukyqu (C:\Users\Anya B\AppData\Roaming\VOPackage\nsqA0B5.tmp) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\rcores (C:\windows\rcore.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\serverjo (C:\Users\Anya B\AppData\Roaming\VOPackage\JOSrv.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\serversu (C:\Users\Anya B\AppData\Roaming\SoftwareUpdater\SUsrv.exe) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\WebCake Desktop Updater (C:\Program Files (x86)\Betcat\WBDesktop.Updater.1.0.0.16.exe) -> Found
    [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://feed.snapdo.com/?p=mKO_AwFzXIpYRa4j3q-3hUPE4m9xhqQak5vac5ErPiSM-JjlIAx4rfanvgbPXVldMrfZX6uYgDDX49N1m4k65rc9AL_OqXh_S3QHE9M9vWaF86rIVOZCgtVkCQdzPVGu9EC-hDAC5s4beASWVWy_wJ_ko8vqoo6iecL8WFOojaw,  -> Found
    [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://feed.snapdo.com/?p=mKO_AwFzXIpYRa4j3q-3hUPE4m9xhqQak5vac5ErPiSM-JjlIAx4rfanvgbPXVldMrfZX6uYgDDX49N1m4k65rc9AL_OqXh_S3QHE9M9vWaF86rIVOZCgtVkCQdzPVGu9EC-hDAC5s4beASWVWy_wJ_ko8vqoo6iecL8WFOojaw,  -> Found
    [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Internet Explorer\Main | Search Page : http://feed.sonic-search.com/?p=mKO_AwFzXIpYRa4j3q-3hUPE4m9xhqQak5vac5ErPiSM-JjlIAx4rfanvgbPXVldMrfZX6uYgDDX49N1m4k65rc9AL_OqXh_S3QHE9M9vWaF86rIWPgEkGay2naiqDhaU0_85AKdKojSMtimoiGY8DDH2I9PgrcnvE0igPqrSh8,&q={searchTerms}  -> Found
    [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-2173164016-2552515248-2917875956-1000\Software\Microsoft\Internet Explorer\Main | Search Page : http://feed.sonic-search.com/?p=mKO_AwFzXIpYRa4j3q-3hUPE4m9xhqQak5vac5ErPiSM-JjlIAx4rfanvgbPXVldMrfZX6uYgDDX49N1m4k65rc9AL_OqXh_S3QHE9M9vWaF86rIWPgEkGay2naiqDhaU0_85AKdKojSMtimoiGY8DDH2I9PgrcnvE0igPqrSh8,&q={searchTerms}  -> Found
    Then fix these items:
    Code:
    ¤¤¤ Tasks : 2 ¤¤¤
    [Suspicious.Path] AmiUpdXp.job -- C:\Users\Anya B\AppData\Local\15370\a274.exe -> Found
    [Suspicious.Path] \\AmiUpdXp -- C:\Users\Anya B\AppData\Local\15370\a274.exe -> Found
    Now rerun Hitman and have it fix everything it finds.

    Download OTM by Old Timer and save it to your Desktop.


    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :files
    C:\Users\Anya B\AppData\Local\nsn712C.tmp
    C:\ProgramData\17716157378002600645
    C:\ProgramData\agaodlemaajglkipbkigjmacjpfodpcn
    C:\ProgramData\deale4Real
    C:\ProgramData\ea285e4892e6414f98b0c9f6e4217228
    C:\ProgramData\f5dc6f4564c2c2c5
    C:\ProgramData\FlaeshCouPon
    C:\ProgramData\FLeuxeiblESHouppeR
    C:\ProgramData\greeatsaaveing
    C:\Program Files (x86)\deale4Real
    C:\Program Files (x86)\FlaeshCouPon
    C:\Program Files (x86)\FLeuxeiblESHouppeR
    C:\Program Files (x86)\globalUpdate
    C:\Program Files (x86)\greeatsaaveing
    C:\Program Files (x86)\SSaleassChecker
    C:\Users\Anya B\AppData\Local\Temp\*.*
    
    :reg
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{69640AE2-5FF3-4F0B-ACE3-C33160C792D1}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{69640AE2-5FF3-4F0B-ACE3-C33160C792D1}]
    
    :Commands
    [purity]
    [ResetHosts]
    [emptytemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.


    [​IMG] Please download Junkware Removal Tool to your desktop.

    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Reboot and rescan with both RogueKiller and Hitman and attach the new logs.

    Be sure to tell me how things are running now.
     
  3. edpolakoff

    edpolakoff Private First Class

    OK. Scans run. I'm sorry but I forgot to copy what was under the green bar in OTM for you. The log is enclosed though. Still getting ads up for free downloads of scan and destroy virus software. something wants me to update flash player and a media player. There is a notice that he page at cmdke.chenianjii.com about giving up on fixing explorer errors...I'm in Chrome

    Still has issues and just had another one dropped off to work on. I seem to be popular this week...what the heck. I do it for fun. I used to fix x-ray equipment until my back went. Playing with computers keeps me thinking.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please rerun my fix for OTM and attach the new log.
     
  5. edpolakoff

    edpolakoff Private First Class

    OK. Reran OTM. It looked like it actually ran this time. Not quite sure why it didn't the first time. When I opened Chrome this time, after a minute or so, it came up on a website www.jimisoft.com telling me there was a phishing attack ahead and that attackers on www.jimisofts.com might try and steal info.

    Thanks for the help!
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  7. edpolakoff

    edpolakoff Private First Class

    Just did the reset and things seemed to be good. First time I tried to reply to this, it took me back a page...not sure what that was about.

    Do you think it's time to put this computer back to normal? Or is there something else you'd like me to do first?
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     
  9. edpolakoff

    edpolakoff Private First Class

    Tim,

    Everything looks really good. Thank you so much. I appreciate your help!

    Ed:):):):):)
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing. :)
     
  11. edpolakoff

    edpolakoff Private First Class

    Tim,

    After we got done and I reinstalled Avast I ran a boot time scan and it found a bunch of stuff. Would you mind taking a look at this log and see if there is anything else hanging around that needs to be dealt with?

    Thanks,

    Ed
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Look at what you attached....it is not a log.
     
  13. edpolakoff

    edpolakoff Private First Class

    Sorry Tim,

    I looked up where the boot time scan log was supposed to be and I thought that was it. I don't see the log I wanted so I guess we'll call this good for now.

    Thanks again for all your help.

    Ed
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No problem. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds