|
Post by cajunlikdat on Mar 28, 2017 19:58:15 GMT -8
Apologies if all this text is unnecessary. A friend and I have been searching the web for a similar reference of this virus, but it seems it may be relatively new. I hope this helps in anyway.
Recently I started getting Norton pop-ups from the auto-detect that it is blocking a heuristic virus with the threat name referenced in the subject line. Apparently the threat started this Saturday, but I did not notice since I mainly play video games with my computer which puts Norton into silent mode. It normally takes about 2-3 minutes for Norton to start blocking the virus with the pop-ups.
Looking at the Norton Security History, the source of the activity blocked is in the user/appdata/local/hwifisvc/appf/uninstall.exe. I looked in the updater folder per that file path and saw that Norton was deleting the appf folder but it seems the virus keeps re-creating it. I also checked task manager, and in the processes tab there is a process called WifiUpg.exe *32 with some foreign language as the description which is what I am assuming Norton is continually stopping, however the .exe keeps trying to restart itself.
I have the free version of malware bytes, although I hadn't used that program in a year or two. I ran a scan using the Malware Bytes and it picked up 8 high risk threats and 90 PUPS. I might be wrong but it seems many of the PUPS were related to this hwifisvc location. I tried deleting the 8 high risk threats using Malware Bytes yesterday. today I ran the scan, and Malware Bytes is picking up 5 high risk threats.
I ran Norton full system scan today, but it did not pick up anything.
Another thing I noticed, but not sure if it is related to this virus, looking at the security history log when I was trying to figure out when this started, I noticed there are a few logs classified as medium threat detailed as unauthorized access blocked (Access Process Data). In one case, the Actor is showing to be C:\WINDOWS\SYSTEM32\CONHOST.EXE and the target is C:\Program Files (x86)Norton Antivirus\Engine32\22.9.1.12\tuih.exe. This is one of several attempts that I saw in 5 pages of logs which span over 7 days that started 3 days prior to the heuristic virus showing up. Each time the actor is slightly different and targeting different .exe files in the \22.9.1.12\ file path.
looking back at the date when Norton started blocking this, the only thing I did that day was play a game off of steam at the time Norton said it started processing this virus in silent mode. the only thing I can think of is this particular virus incident that is occurring is due to something else that has been on my system or this virus wasn't active until that particular date and time for some reason.
I am not experiencing any performance or abnormal activity on my PC that I am aware of other than the Norton blocking pop-ups and the details I provided above.
Here are the Wikisend links: wikisend.com/download/157734/FRST.txt wikisend.com/download/576776/Addition.txt
Please advise what additional steps I need to take and thank you for any assistance you can provide.
|
|
dbrisen
Malware Removalists
Posts: 3,688
|
Post by dbrisen on Mar 29, 2017 21:02:03 GMT -8
Let's see what we can do for you. Thank you for the explanation and details. FIRST >>>>Open notepad by pressing the Windows Key + R key, typing notepad in the Run box and pressing Enter. Please copy the contents of the quote box below. To do this highlight the contents of the box and right click on it and select copy. Paste this into the open notepad. Save it to your desktop as fixlist.txtNOTE. It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating systemStart FRST that is on the desktop by right clicking on file and selecting "Run as Administrator..." and press the Fix button just once and wait. If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run. When finished FRST will generate a log on the Desktop (Fixlog.txt). Please post it to your reply. SECOND >>>>Junkware Removal ToolPlease download JRT from here to your desktop. Note: Temporarily disable/shut down your protection software now to avoid potential conflicts, how to do so can be read here.Double click the JRT.exe file to run the application. The application will open an Command Prompt window and run from there (this is normal for this program, so not to be alarmed). When it is asked, press any key to allow the program to continue / run. This will create a log on the desktop; please copy and paste the JRT.txt log text in your next post. Note: After the log file is created, please enable your protection software / reboot your system and verify your protection software is enabled.LAST >>>>AdwCleaner by XplodeDownload AdwCleaner from here or from here. Save the file to the desktop. NOTE: If you are using IE 8 or above you may get a warning that stops the program from downloading. Just click on the warning and allow the download to complete. Close all open windows and browsers.[/b][/color] Right click the AdwCleaner icon on the desktop, click Run as administrator and accept the UAC prompt to run AdwCleaner. You will see the following console: Click the Scan button and wait for the scan to finish. After the Scan has finished the window may or may not show what it found and above, in the progress bar, you will see: Waiting for action. Please uncheck elements you don't want to remove.Click the Clean button. Everything checked will be deleted. When the program has finished cleaning a report appears. Once done it will ask to reboot, allow this On reboot a log will be produced please copy / paste that in your next reply. This report is also saved to C:\AdwCleaner\AdwCleaner[C#].txt[/ul] Optional: NOTE: If you see AVG Secure Search being targeted for deletion, Here's Why and Here. You can always Reinstall it.
|
|
|
Post by cajunlikdat on Mar 29, 2017 22:39:10 GMT -8
Thank you for the instructions. I hope this is ok, I posted each report in a different color to identify the start and stop of them easier. Here are the report logs:
FixLog
Fix result of Farbar Recovery Scan Tool (x64) Version: 15-03-2017 Ran by R & D FABRICATORS (30-03-2017 00:50:11) Run:1 Running from C:\Users\R & D FABRICATORS\Desktop Loaded Profiles: R & D FABRICATORS (Available Profiles: R & D FABRICATORS) Boot Mode: Normal ==============================================
fixlist content: ***************** Start CreateRestorePoint: CloseProcesses: C:\Users\R & D FABRICATORS\AppData\Local\hwifisvc HKLM-x32\...\Run: [] => [X] HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\...\Run: [Google Update] => C:\Users\R & D FABRICATORS\AppData\Local\Google\Update\1.3.32.7\GoogleUpdateCore.exe [601752 2016-12-17] (Google Inc.) ProxyServer: [S-1-5-21-1360142460-1499946298-1873140786-1002] => SearchScopes: HKLM-x32 -> DefaultScope value is missing SearchScopes: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002 -> {438DA083-6487-455F-9792-DEC47A1D7A18} URL = hxxps://search.yahoo.com/search?p={searchTerms}&fr=yset_ie_syc_oracle&type=orcl_default BHO: No Name -> {F31C66B4-5AE5-3C39-C1FC-7268BB8C12BC} -> No File BHO: No Name -> {FA146AA8-4DCE-3B0C-DEFD-1968BB8C12BC} -> No File BHO-x32: No Name -> {95B7759C-8C7F-4BF1-B163-73684A933233} -> No File Toolbar: HKLM - No Name - {B6698C28-202B-45D1-B412-A5133BC9C117} - No File FF Plugin: @microsoft.com/GENUINE -> disabled [No File] FF Plugin: wacom.com/WacomTabletPlugin -> C:\Program Files\TabletPlugins\npWacomTabletPlugin.dll [No File] FF Plugin-x32: @microsoft.com/GENUINE -> disabled [No File] FF Plugin-x32: wacom.com/WacomTabletPlugin -> C:\Program Files (x86)\TabletPlugins\npWacomTabletPlugin.dll [No File] CHR HKLM-x32\...\Chrome\Extension: [bhfhojbhbnajajgihpicejdalbjlpcep] - hxxps://clients2.google.com/service/update2/crx CHR HKLM-x32\...\Chrome\Extension: [eoalfhodgifhbkgmbbdafcihjpdldpll] - hxxps://clients2.google.com/service/update2/crx R2 hwifisvc; c:\users\r & d fabricators\appdata\local\hwifisvc\hwifisvc.dll [150656 2017-02-24] () R1 HWifiNetPro; c:\users\r & d fabricators\appdata\local\hwifisvc\HWifiNetPro64.sys [146752 2017-03-13] () S3 AIDA64Driver; \??\C:\Users\R & D FABRICATORS\Desktop\Test-Software\Aida64\kerneld.x64 [X] S3 dbx; system32\DRIVERS\dbx.sys [X] S3 EagleX64; \??\C:\Windows\system32\drivers\EagleX64.sys [X] S3 GPU-Z; \??\C:\Users\R&DFAB~1\AppData\Local\Temp\GPU-Z.sys [X] <==== ATTENTION S3 hxsyol; \??\E:\Aura Kingdom\AuraKingdom\avital\hxsy64.sys [X] S3 WacHidRouter; system32\DRIVERS\wachidrouter.sys [X] S3 wacomrouterfilter; system32\DRIVERS\wacomrouterfilter.sys [X] S3 X6va012; \??\C:\Windows\SysWOW64\Drivers\X6va012 [X] S3 X6va017; \??\C:\Windows\SysWOW64\Drivers\X6va017 [X] S3 xhunter1; \??\C:\Windows\xhunter1.sys [X] C:\Users\R & D FABRICATORS\Desktop\Test-Software\Aida64\kerneld.x64 C:\Windows\system32\DRIVERS\dbx.sys C:\Windows\system32\drivers\EagleX64.sys C:\Users\R&DFAB~1\AppData\Local\Temp\GPU-Z.sys E:\Aura Kingdom\AuraKingdom\avital\hxsy64.sys C:\Windows\system32\DRIVERS\wachidrouter.sys C:\Windows\system32\DRIVERS\wacomrouterfilter.sys C:\Windows\SysWOW64\Drivers\X6va012 C:\Windows\SysWOW64\Drivers\X6va017 C:\Windows\xhunter1.sys 2017-03-25 15:17 - 2017-03-28 21:31 - 00000000 ____D C:\Users\R & D FABRICATORS\AppData\Local\hwifisvc 2015-02-07 23:16 - 2014-12-09 23:16 - 0000032 ____R () C:\ProgramData\hash.dat 2015-10-26 21:37 - 2015-10-26 21:37 - 0000000 ____H () C:\ProgramData\DP45977C.lfl C:\ProgramData\hash.dat C:\Users\R\NvTelemetry.dll C:\Users\R\NvTelemetryAPI32.dll C:\Users\R\NvTelemetryAPI64.dll CustomCLSID: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002_Classes\CLSID\{59B55F04-DE14-4BB8-92FF-C4A22EF2E5F4}\InprocServer32 -> C:\Users\R & D FABRICATORS\AppData\Local\Google\Update\1.3.31.5\psuser_64.dll => No File Task: {1668BD40-B6DE-4CFA-BF45-6224CDFFB18B} - System32\Tasks\0814tbUpdateInfo => C:\ProgramData\Avg_Update_0814tb\0814tb_{8DBF4329-DCFE-45CD-992C-228CA2E5DC31}.exe [2014-08-26] () Task: {2A718B45-59D0-4651-BE66-4CC74C8462A3} - System32\Tasks\{640019DA-F8DA-4F40-BD06-AFD1FE0490BE} => pcalua.exe -a "C:\Users\R & D FABRICATORS\Desktop\Work Mouse\wow_legend_mouse.exe" -d "C:\Users\R & D FABRICATORS\Desktop\Work Mouse" Task: {43127133-C902-427C-A135-C2C99411EA52} - System32\Tasks\{CD07B8B3-006B-499E-A897-1572814EE19F} => pcalua.exe -a "C:\Users\R & D FABRICATORS\Downloads\chromeinstall-8u25 (2).exe" -d "C:\Users\R & D FABRICATORS\Downloads" Task: {46D0A164-D1B8-40A7-B410-18472DC0084C} - System32\Tasks\{025A6F9E-19B0-4C84-9858-1AECB7F7EC9B} => pcalua.exe -a "C:\Users\R & D FABRICATORS\Downloads\chromeinstall-8u25 (1).exe" -d "C:\Users\R & D FABRICATORS\Downloads" Task: {51E7019A-8516-4F35-A900-1D736FC18590} - \HelperApps Update -> No File <==== ATTENTION Task: {7E914BB1-75B0-4D33-9F2C-79D9B391746C} - \TidyNetwork Update -> No File <==== ATTENTION cmd: ipconfig /flushdns cmd: netsh advfirewall reset cmd: netsh advfirewall set allprofiles state on Reg: reg delete HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f Reg: reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f CMD: bitsadmin /reset /allusers RemoveProxy: EmptyTemp: Reboot: end
*****************
Restore point was successfully created. Processes closed successfully. C:\Users\R & D FABRICATORS\AppData\Local\hwifisvc => moved successfully HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\ => value removed successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Microsoft\Windows\CurrentVersion\Run\\Google Update => value removed successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer => value removed successfully HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value restored successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{438DA083-6487-455F-9792-DEC47A1D7A18} => key removed successfully HKCR\CLSID\{438DA083-6487-455F-9792-DEC47A1D7A18} => key not found. HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F31C66B4-5AE5-3C39-C1FC-7268BB8C12BC} => key removed successfully HKCR\CLSID\{F31C66B4-5AE5-3C39-C1FC-7268BB8C12BC} => key not found. HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FA146AA8-4DCE-3B0C-DEFD-1968BB8C12BC} => key removed successfully HKCR\CLSID\{FA146AA8-4DCE-3B0C-DEFD-1968BB8C12BC} => key not found. HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233} => key removed successfully HKCR\Wow6432Node\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233} => key not found. HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{B6698C28-202B-45D1-B412-A5133BC9C117} => value removed successfully HKCR\CLSID\{B6698C28-202B-45D1-B412-A5133BC9C117} => key not found. HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE => key removed successfully HKLM\Software\MozillaPlugins\wacom.com/WacomTabletPlugin => key removed successfully HKLM\Software\Wow6432Node\MozillaPlugins\@microsoft.com/GENUINE => key removed successfully HKLM\Software\Wow6432Node\MozillaPlugins\wacom.com/WacomTabletPlugin => key removed successfully HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\bhfhojbhbnajajgihpicejdalbjlpcep => key removed successfully HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\eoalfhodgifhbkgmbbdafcihjpdldpll => key removed successfully HKLM\System\CurrentControlSet\Services\hwifisvc => key removed successfully hwifisvc => service removed successfully HWifiNetPro => Service stopped successfully. HKLM\System\CurrentControlSet\Services\HWifiNetPro => key removed successfully HWifiNetPro => service removed successfully HKLM\System\CurrentControlSet\Services\AIDA64Driver => key removed successfully AIDA64Driver => service removed successfully HKLM\System\CurrentControlSet\Services\dbx => key removed successfully dbx => service removed successfully HKLM\System\CurrentControlSet\Services\EagleX64 => key removed successfully EagleX64 => service removed successfully HKLM\System\CurrentControlSet\Services\GPU-Z => key removed successfully GPU-Z => service removed successfully HKLM\System\CurrentControlSet\Services\hxsyol => key removed successfully hxsyol => service removed successfully HKLM\System\CurrentControlSet\Services\WacHidRouter => key removed successfully WacHidRouter => service removed successfully HKLM\System\CurrentControlSet\Services\wacomrouterfilter => key removed successfully wacomrouterfilter => service removed successfully HKLM\System\CurrentControlSet\Services\X6va012 => key removed successfully X6va012 => service removed successfully HKLM\System\CurrentControlSet\Services\X6va017 => key removed successfully X6va017 => service removed successfully HKLM\System\CurrentControlSet\Services\xhunter1 => key removed successfully xhunter1 => service removed successfully "C:\Users\R & D FABRICATORS\Desktop\Test-Software\Aida64\kerneld.x64" => not found. "C:\Windows\system32\DRIVERS\dbx.sys" => not found. "C:\Windows\system32\drivers\EagleX64.sys" => not found. "C:\Users\R&DFAB~1\AppData\Local\Temp\GPU-Z.sys" => not found. "E:\Aura Kingdom\AuraKingdom\avital\hxsy64.sys" => not found. "C:\Windows\system32\DRIVERS\wachidrouter.sys" => not found. "C:\Windows\system32\DRIVERS\wacomrouterfilter.sys" => not found. "C:\Windows\SysWOW64\Drivers\X6va012" => not found. "C:\Windows\SysWOW64\Drivers\X6va017" => not found. "C:\Windows\xhunter1.sys" => not found. "C:\Users\R & D FABRICATORS\AppData\Local\hwifisvc" => not found. C:\ProgramData\hash.dat => moved successfully C:\ProgramData\DP45977C.lfl => moved successfully "C:\ProgramData\hash.dat" => not found. C:\Users\R\NvTelemetry.dll => moved successfully C:\Users\R\NvTelemetryAPI32.dll => moved successfully C:\Users\R\NvTelemetryAPI64.dll => moved successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002_Classes\CLSID\{59B55F04-DE14-4BB8-92FF-C4A22EF2E5F4} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{1668BD40-B6DE-4CFA-BF45-6224CDFFB18B} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{1668BD40-B6DE-4CFA-BF45-6224CDFFB18B} => key removed successfully C:\Windows\System32\Tasks\0814tbUpdateInfo => moved successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\0814tbUpdateInfo => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{2A718B45-59D0-4651-BE66-4CC74C8462A3} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2A718B45-59D0-4651-BE66-4CC74C8462A3} => key removed successfully C:\Windows\System32\Tasks\{640019DA-F8DA-4F40-BD06-AFD1FE0490BE} => moved successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{640019DA-F8DA-4F40-BD06-AFD1FE0490BE} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{43127133-C902-427C-A135-C2C99411EA52} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{43127133-C902-427C-A135-C2C99411EA52} => key removed successfully C:\Windows\System32\Tasks\{CD07B8B3-006B-499E-A897-1572814EE19F} => moved successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{CD07B8B3-006B-499E-A897-1572814EE19F} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{46D0A164-D1B8-40A7-B410-18472DC0084C} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{46D0A164-D1B8-40A7-B410-18472DC0084C} => key removed successfully C:\Windows\System32\Tasks\{025A6F9E-19B0-4C84-9858-1AECB7F7EC9B} => moved successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{025A6F9E-19B0-4C84-9858-1AECB7F7EC9B} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{51E7019A-8516-4F35-A900-1D736FC18590} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{51E7019A-8516-4F35-A900-1D736FC18590} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\HelperApps Update => key not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{7E914BB1-75B0-4D33-9F2C-79D9B391746C} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{7E914BB1-75B0-4D33-9F2C-79D9B391746C} => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\TidyNetwork Update => key not found.
========= ipconfig /flushdns =========
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
========= End of CMD: =========
========= netsh advfirewall reset =========
Ok.
========= End of CMD: =========
========= netsh advfirewall set allprofiles state on =========
Ok.
========= End of CMD: =========
========= reg delete HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f =========
The operation completed successfully.
========= End of Reg: =========
========= reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f =========
The operation completed successfully.
========= End of Reg: =========
========= bitsadmin /reset /allusers =========
BITSADMIN version 3.0 [ 7.5.7601 ] BITS administration utility. (C) Copyright 2000-2006 Microsoft Corp.
BITSAdmin is deprecated and is not guaranteed to be available in future versions of Windows. Administrative tools for the BITS service are now provided by BITS PowerShell cmdlets.
0 out of 0 jobs canceled.
========= End of CMD: =========
========= RemoveProxy: =========
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value removed successfully HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value removed successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value removed successfully HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value removed successfully
========= End of RemoveProxy: =========
=========== EmptyTemp: ==========
BITS transfer queue => 12582912 B DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 21971918 B Java, Flash, Steam htmlcache => 445804120 B Windows/system/drivers => 443351 B Edge => 0 B Chrome => 0 B Firefox => 0 B Opera => 0 B
Temp, IE cache, history, cookies, recent: Users => 0 B Default => 0 B Public => 0 B ProgramData => 0 B systemprofile => 42342792 B systemprofile32 => 78213 B LocalService => 22195 B NetworkService => 66228 B R & D FABRICATORS => 132686663 B
RecycleBin => 0 B EmptyTemp: => 625.6 MB temporary data Removed.
================================
The system needed a reboot.
==== End of Fixlog 00:50:23 ====
JRT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Malwarebytes Version: 8.1.2 (03.10.2017) Operating System: Windows 7 Professional x64 Ran by R & D FABRICATORS (Administrator) on Thu 03/30/2017 at 1:07:41.22 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
File System: 10
Successfully deleted: C:\ProgramData\mntemp (File) Successfully deleted: C:\ProgramData\speedypc software (Folder) Successfully deleted: C:\Users\Public\Desktop\lionsea software.url (Shortcut) Successfully deleted: C:\Users\Public\thunder network (Folder) Successfully deleted: C:\Users\R & D FABRICATORS\AppData\Local\packageaware (Folder) Successfully deleted: C:\Users\R & D FABRICATORS\AppData\Local\ysearchutil (Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3QA3F4P (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4X5C9PB (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1P8UB6D (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TL4A1A9P (Temporary Internet Files Folder)
Registry: 1
Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFBCB7E0-F91A-4951-9F31-58FEE57A25C4} (Registry Key)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on Thu 03/30/2017 at 1:08:27.10 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
AdwCleaner
# AdwCleaner v6.045 - Logfile created 30/03/2017 at 01:15:51 # Updated on 28/03/2017 by Malwarebytes # Database : 2017-03-29.1 [Server] # Operating System : Windows 7 Professional Service Pack 1 (X64) # Username : R & D FABRICATORS - AVA-382541-1 # Running from : C:\Users\R & D FABRICATORS\Desktop\AdwCleaner.exe # Mode: Clean # Support : www.malwarebytes.com/support
***** [ Services ] *****
***** [ Folders ] *****
[-] Folder deleted: C:\ProgramData\Avg_Update_0215tb [-] Folder deleted: C:\ProgramData\Avg_Update_0814tb [-] Folder deleted: C:\ProgramData\Avg_Update_1114tb [-] Folder deleted: C:\ProgramData\Avg_Update_1214tb [-] Folder deleted: C:\Users\R & D FABRICATORS\AppData\Local\DriverTuner [-] Folder deleted: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverTuner [-] Folder deleted: C:\Program Files (x86)\AVG Security Toolbar [-] Folder deleted: C:\Program Files (x86)\DriverTuner [-] Folder deleted: C:\Program Files (x86)\Yahoo!\yset [-] Folder deleted: C:\Program Files (x86)\Common Files\speedypc software [#] Folder deleted on reboot: C:\Program Files (x86)\Common Files\SpeedyPC Software [-] Folder deleted: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\YSearchUtil [-] Folder deleted: C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\AVG SafeGuard toolbar
***** [ Files ] *****
***** [ DLL ] *****
***** [ WMI ] *****
***** [ Shortcuts ] *****
***** [ Scheduled Tasks ] *****
***** [ Registry ] *****
[-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Classes\.bubbledock [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Classes\bubbledock [#] Key deleted on reboot: HKCU\Software\Classes\.bubbledock [#] Key deleted on reboot: HKCU\Software\Classes\bubbledock [-] Key deleted: HKLM\SOFTWARE\Classes\protector_dll.Protector [-] Key deleted: HKLM\SOFTWARE\Classes\protector_dll.Protector.1 [-] Key deleted: HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib [-] Key deleted: HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib.1 [-] Key deleted: HKLM\SOFTWARE\Classes\uus3url-spc [#] Key deleted on reboot: [x64] HKCU\Software\Classes\.bubbledock [#] Key deleted on reboot: [x64] HKCU\Software\Classes\bubbledock [#] Key deleted on reboot: [x64] HKLM\SOFTWARE\Classes\protector_dll.Protector [#] Key deleted on reboot: [x64] HKLM\SOFTWARE\Classes\protector_dll.Protector.1 [#] Key deleted on reboot: [x64] HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib [#] Key deleted on reboot: [x64] HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib.1 [#] Key deleted on reboot: [x64] HKLM\SOFTWARE\Classes\uus3url-spc [-] Key deleted: HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} [-] Key deleted: HKLM\SOFTWARE\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468} [-] Key deleted: HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39} [-] Key deleted: HKLM\SOFTWARE\Classes\CLSID\{D879A501-50A7-BEFC-A4C5-32DC6E0CB208} [-] Key deleted: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706} [-] Key deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706} [-] Key deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{B2BC04DF-EFBD-409A-95CA-36874E5AB92A} [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Conduit [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\DriverTuner [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\DriverTuner_Init [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Softonic [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\speedypc software [-] Key deleted: HKU\S-1-5-21-1360142460-1499946298-1873140786-1002\Software\Hotspot [#] Key deleted on reboot: HKCU\Software\Conduit [#] Key deleted on reboot: HKCU\Software\DriverTuner [#] Key deleted on reboot: HKCU\Software\DriverTuner_Init [#] Key deleted on reboot: HKCU\Software\Softonic [#] Key deleted on reboot: HKCU\Software\speedypc software [#] Key deleted on reboot: HKCU\Software\Hotspot [-] Key deleted: HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0} [-] Key deleted: HKLM\SOFTWARE\Conduit [-] Key deleted: HKLM\SOFTWARE\speedypc software [-] Key deleted: HKLM\SOFTWARE\Hotspot [-] Key deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{520C1D80-935C-42B9-9340-E883849D804F}_is1 [-] Key deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Yahoo! SearchSet [#] Key deleted on reboot: [x64] HKCU\Software\Conduit [#] Key deleted on reboot: [x64] HKCU\Software\DriverTuner [#] Key deleted on reboot: [x64] HKCU\Software\DriverTuner_Init [#] Key deleted on reboot: [x64] HKCU\Software\Softonic [#] Key deleted on reboot: [x64] HKCU\Software\speedypc software [#] Key deleted on reboot: [x64] HKCU\Software\Hotspot [-] Key deleted: [x64] HKLM\SOFTWARE\Conduit [-] Key deleted: [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1360142460-1499946298-1873140786-1002\Products\363FB0CBBA367FF4E81FEAD0F717B142 [-] Value deleted: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost [LocalWiFiService]
***** [ Web browsers ] *****
*************************
:: "Tracing" keys deleted :: Winsock settings cleared
*************************
C:\AdwCleaner\AdwCleaner[C0].txt - [5455 Bytes] - [30/03/2017 01:15:51] C:\AdwCleaner\AdwCleaner[S0].txt - [5305 Bytes] - [30/03/2017 01:14:32]
########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt - [5601 Bytes] ##########
|
|
dbrisen
Malware Removalists
Posts: 3,688
|
Post by dbrisen on Mar 31, 2017 6:45:02 GMT -8
Please download Malwarebytes to your desktop. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program. Once the program has fully updated, Proceed with the Scan options and select "Threat Scan". The Scan Pane is the introduction to scan-related options in the program. When you click Scan in the Menu Pane, you will see the screen shown below. After a scan has been executed, scan results are displayed as shown below. In this scan, three threats were detected. Put a checkmark on all detected and click on "Quarantine Selected" Selected reports may be viewed on screen, or exported to a text file for later viewing. Please note that only manual (on demand) scans are available for users of the free version of Malwarebytes. Please note that an Export button is shown at the bottom left corner of this screen. This allows you to make a copy of the log for use by other programs. You may export to your clipboard or to a text (TXT) file. Export to a .txt file and post its contents.
|
|
|
Post by cajunlikdat on Mar 31, 2017 19:21:58 GMT -8
Here is the report from Malwarebytes:
Malwarebytes www.malwarebytes.com
-Log Details- Scan Date: 3/31/17 Scan Time: 10:16 PM Logfile: MalwareBytesLog.txt Administrator: Yes
-Software Information- Version: 3.0.6.1469 Components Version: 1.0.96 Update Package Version: 1.0.1639 License: Trial
-System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: System
-Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 398785 Time Elapsed: 2 min, 3 sec
-Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Disabled PUM: Enabled
-Scan Details- Process: 0 (No malicious items detected)
Module: 0 (No malicious items detected)
Registry Key: 0 (No malicious items detected)
Registry Value: 0 (No malicious items detected)
Registry Data: 0 (No malicious items detected)
Data Stream: 0 (No malicious items detected)
Folder: 0 (No malicious items detected)
File: 0 (No malicious items detected)
Physical Sector: 0 (No malicious items detected)
(end)
|
|
dbrisen
Malware Removalists
Posts: 3,688
|
Post by dbrisen on Apr 1, 2017 10:10:22 GMT -8
Looks like everything has been handled (malware-wise). If your system is running well, let's remove our tools and get you on your way .... We need to remove the tools we've used during the cleaning of your machine. [/a] (Note: You may have to disable Norton briefly to run / download DelFix.) Ensure the following is ticked: - Remove disinfection tools
- Create registry backup
- Purge system restore
[/ul] Then click Run. The program will run for a few moments and then notepad will open with a log. Please paste the log in your next reply. Once you have the log file saved, please reboot your system to complete the clean up process. Your system looks clean and your logs are fine. Unless you want something else done, you are done and free to go.Final words from me: Surf safely, and watch when installing or letting anything add itself to your system. Remember, the best security is not on your system but in the chair in front of it. Take care and thanks for sticking with us in this rushed time. === options ====Unchecky is a small service that runs in the background to help keep those "extra toolbars" and tag along search engines from automatically installing. By automatically directing you to a custom install with all the options unchecked, only what you manually choose and confirm gets installed. CryptoPrevent is a free program that prevents CryptoLocker / ransomware from infecting your PC by locking down the OS so the malware can not get a grip on your system. You can read the details about this program here. Also, consider adding MalwareBytes Antimalware to your arsenal of safe keeping programs. Use the free version (not the paid or trial version) and you won't have a problem with your antivirus scanner program. Keep it updated and run a scan with it once a week. Lastly, if you use Firefox as your main web browser, consider adding the NoScript and uBlock Origin add-ons to the browser to block scripting hijacks and remove unwanted ads from the pages you view. You may also find some information and tips at this thread: How did I get infected in the first place?and COMPUTER SECURITY - a short quide to staying safer online
I'll leave this topic open for a few days so that if you have any questions you can come back here. Surf safe, my friend!!
|
|
|
Post by cajunlikdat on Apr 1, 2017 20:32:47 GMT -8
Thank you very much for your valuable time and assisting me through this process. Can't thank you enough for the work you do here. Here is the DelFix Report:
# DelFix v1.010 - Logfile created 01/04/2017 at 22:59:46 # Updated 26/04/2015 by Xplode # Username : R & D FABRICATORS - AVA-382541-1 # Operating System : Windows 7 Professional Service Pack 1 (64 bits)
~ Removing disinfection tools ...
Deleted : C:\FRST Deleted : C:\AdwCleaner Deleted : C:\Users\R & D FABRICATORS\Desktop\Addition.txt Deleted : C:\Users\R & D FABRICATORS\Desktop\AdwCleaner.exe Deleted : C:\Users\R & D FABRICATORS\Desktop\AdwCleaner[C0].txt Deleted : C:\Users\R & D FABRICATORS\Desktop\Fixlog.txt Deleted : C:\Users\R & D FABRICATORS\Desktop\FRST.exe Deleted : C:\Users\R & D FABRICATORS\Desktop\FRST.txt Deleted : C:\Users\R & D FABRICATORS\Desktop\FRST64.exe Deleted : C:\Users\R & D FABRICATORS\Desktop\JRT.exe Deleted : C:\Users\R & D FABRICATORS\Desktop\JRT.txt Deleted : C:\Users\R & D FABRICATORS\Desktop\Rkill.txt
~ Creating registry backup ... OK
~ Cleaning system restore ...
Deleted : RP #342 [Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24215 | 03/11/2017 19:37:13] Deleted : RP #343 [Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24210 | 03/11/2017 19:37:21] Deleted : RP #344 [Windows Update | 03/23/2017 02:34:30] Deleted : RP #346 [Restore Point Created by FRST | 03/30/2017 05:50:13] Deleted : RP #347 [JRT Pre-Junkware Removal | 03/30/2017 06:07:42]
New restore point created !
########## - EOF - ##########
|
|
dbrisen
Malware Removalists
Posts: 3,688
|
Post by dbrisen on Apr 1, 2017 21:32:40 GMT -8
You are welcome!!
|
|