Redirect Virus not fully removed by removal guide

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
Hello,

I got some kind of redirect virus a short while ago. After scanning with many AV programs I found this guide and gave it a try

http://malwaretips.com/blogs/remove-browser-redirect-virus/

I followed ALL the steps and the virus appeared to be removed. I am running Firefox and Adblock. I've been having some problems clicking links and images lately so I tried disabling AdBlock to see if that fixed it. It didn't, and the virus has returned but not as bad as originally.

The virus does a few things

1. Sometimes I will click a link and new ad tab will open

2j21.jpg


vykh.jpg


2. Random text words will become links to popup ads

sqb4.jpg


3. Popups like this appear

nan4.jpg



AdBlock stops the virus totally, but I have some problems, not sure if they are because or the virus or not.
For example, I can't click any pictures on ebay or zoom or enlarge

wc79.jpg


This problem occurs in Firefox and Chrome, but not in IE.

Thanks for any help and tell me if I need to provide any additional info. I am running Windows 7, 64 bit.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Hi and welcome to the malwaretips.com forums!

I'm Kuttus and I am going to try to assist you with your problem. Please take note of the below:
  • I will start working on your malware issues, this may or may not, solve other issues you have with your machine.
  • The fixes are specific to your problem and should only be used for this issue on this machine!
  • The process is not instant. Please continue to review my answers until I tell you your machine is clear. Absence of symptoms does not mean that everything is clear.
  • If you don't know, stop and ask! Don't keep going on.
  • Please reply to this thread. Do not start a new topic.
  • Refrain from running self fixes as this will hinder the malware removal process.
  • It may prove beneficial if you print of the following instructions or save them to notepad as I post them.
Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.


Before we start:
Please be aware that removing malware is a potentially hazardous undertaking. I will take care not to knowingly suggest courses of action that might damage your computer. However it is impossible for me to foresee all interactions that may happen between the software on your computer and those we'll use to clear you of infection, and I cannot guarantee the safety of your system. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system, or to necessitate you taking your computer to a repair shop.

[size=medium]Because of this, I advise you to backup any personal files and folders before you start. [/size]

------------------------------------------------------------------------------------------------------------------------------

STEP 1: Run a scan with Farbar Recovery Scan Tool

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them.
Only one of them will run on your system, that will be the right version.


  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

------------------------------------------------------------------------------------------------------------------------------
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
Here you go
 

Attachments

  • Addition.txt
    916 bytes · Views: 103
  • FRST.txt
    69.4 KB · Views: 156

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Download attached fixlist.txt on the same location as FRST (otherwise the fix won't work)


Open FRST, and click Fix. Attach me that report after it is finished.
 

Attachments

  • fixlist.txt
    1.4 KB · Views: 105

kuttus

Level 2
Verified
Oct 5, 2012
2,697
STEP 1: Run a scan with AdwCleaner
  • Download AdwCleaner from the below link.
    ADWCLEANER DOWNLAOD LINK (This link will automatically download Security Check on your computer)
  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan,then confirm each time with Ok
  • After the Scan is Over press on Clean ,then confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

STEP 2: Run a scan with Junkware Removal Tool

Please download Junkware Removal Tool to your desktop from here
  • Turn off your antivirus software now to avoid potential conflicts
  • Double-click to run the tool. For Windows Vista or 7 users, right-click the file and select Run as Administrator
  • The tool will open and start scanning your system
  • Please be patient as this can take a while to complete depending on your system's specifications
  • On completion, a log (JRT.txt) will be saved to your desktop and will automatically open
  • Post the contents of JRT.txt into your next reply
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
STEP 1

# AdwCleaner v3.015 - Report created 12/12/2013 at 11:24:55
# Updated 10/12/2013 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Joe - JOE-PC
# Running from : C:\Users\Joe\Downloads\adwcleaner.exe
# Option : Clean

***** [ Services ] *****

Service Deleted : Level Quality Watcher
[#] Service Deleted : vToolbarUpdater17.1.2

***** [ Files / Folders ] *****

Folder Deleted : C:\Program Files\Level Quality Watcher
Folder Deleted : C:\Program Files\ScorpionSaver Services
File Deleted : C:\Windows\SysWOW64\AdpeakProxy.ini
File Deleted : C:\Windows\SysWOW64\AdpeakProxyOff.ini
File Deleted : C:\Windows\System32\AdpeakProxy.ini
File Deleted : C:\Windows\System32\AdpeakProxyOff.ini

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9DC8FA51-B596-4F77-802C-5B295919C205}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3E28F712-0D6C-4EE3-AC8C-8F060F5D7C33}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6CE321DA-DC11-45C6-A0FC-4E8A7D978ABC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6EEBC7FF-67DA-4B90-9251-C2C5696E4B48}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{74137531-80F7-406F-9543-7D11385FA8C8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{832599B2-55BF-4437-8F3E-030CF5AEB262}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9B7B034B-944A-4261-B487-862F642F7615}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{AE91F9CE-0900-4E2A-B673-F3F6E4FC54D9}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B1A429DB-FB06-4645-B7C0-0CC405EAD3CD}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DD67706E-819E-4EBD-BF8D-6D6147CC7A49}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F62A4AF9-58B4-4FEC-89CC-D717A547D8E8}
Key Deleted : HKCU\Software\Adpeak, Inc.
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKCU\Software\AppDataLow\Software\Scorpion Saver
Key Deleted : HKLM\Software\Adpeak, Inc.
Key Deleted : [x64] HKLM\SOFTWARE\Adpeak, Inc.
Key Deleted : [x64] HKLM\SOFTWARE\Scorpion Saver
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6E810AB6-F34E-49A3-A93F-9E503660F718}
Key Deleted : HKLM\Software\Classes\Installer\Features\6BA018E6E43F3A949AF3E90563067F81
Key Deleted : HKLM\Software\Classes\Installer\Products\6BA018E6E43F3A949AF3E90563067F81

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.16428


-\\ Mozilla Firefox v26.0 (en-US)

[ File : C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\prefs.js ]

Line Deleted : user_pref("browser.startup.homepage", "hxxps://mail.google.com/mail/u/0/?shva=1#inbox|hxxp://apexforums.freeforums.org/index.php?sid=5ecb2cc76115a336dea995ae93eafee5|hxxp://www.autoblog.com/");

-\\ Google Chrome v31.0.1650.63

[ File : C:\Users\Joe\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [7527 octets] - [30/11/2013 09:31:50]
AdwCleaner[R1].txt - [3231 octets] - [12/12/2013 11:24:17]
AdwCleaner[S0].txt - [7507 octets] - [30/11/2013 09:32:51]
AdwCleaner[S1].txt - [3120 octets] - [12/12/2013 11:24:55]

########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [3180 octets] ##########

STEP 2


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Windows 7 Home Premium x64
Ran by Joe on Thu 12/12/2013 at 11:33:52.37
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\AppDataLow\software\adawarebp



~~~ Files



~~~ Folders



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Thu 12/12/2013 at 11:41:11.03
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
Seems to be gone, for now at least. I'll let you know if it comes back, thanks a lot.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Download Malwarebytes Anti-Rootkit from here to your Desktop
  • Unzip the contents to a folder on your Desktop.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Make sure there is a check next to Create Restore Point and click the Cleanup button to remove any threats. Reboot if prompted to do so.
  • After the reboot, perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If there are threats, click Cleanup once more and reboot.
  • When done, please post the two logs in the MBAR folder(mbar-log.txt and system-log.txt)



Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • When it prompts you to try their 30-day trail, click decline
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

-------------------------------------------------------

STEP 2: Run a HitmanPro scan
  1. Download the latest official version of HitmanPro.
    HITMANPRO DOWNLOAD LINK (This link will open a download page in a new window from where you can download HitmanPro)
  2. Start HitmanPro by double clicking on the previously downloaded file. and then following the prompts.
    hpro4.png
  3. Once the scan is complete, a screen displaying all the malicious files that the program found will be shown as seen in the image below.After reviewing each malicious object click Next .
    rsz_hpro5.png
  4. Click Activate free license to start the free 30 days trial and remove the malicious files.
    hpro6.png
  5. HitmanPro will now start removing the infected objects, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.
Add to your next reply, any log that HitmanPro might generate.
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
STEP 1

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.12.12.06

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 11.0.9600.16476
Joe :: JOE-PC [administrator]

12/12/2013 1:50:56 PM
mbam-log-2013-12-12 (13-50-56).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 218799
Time elapsed: 3 minute(s), 58 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 4
HKCR\AppID\AdpeakProxy.exe (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
HKCR\Wow6432Node\AppID\AdpeakProxy.exe (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Wow6432Node\Wow6432Node\Adpeak, Inc. (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\AdpeakProxy (PUP.Optional.ScorpionSaver) -> Quarantined and deleted successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 11
C:\Temp\InstallServices64.msi (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Temp\scorpionsaver.exe (PUP.Optional.ScorpionSaver) -> Quarantined and deleted successfully.
C:\Temp\ScorpionSaver.msi (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Windows\System32\AdpeakProxy.dll (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Users\Joe\Downloads\SoftonicDownloader_for_xpadder(1).exe (PUP.Optional.Softonic.A) -> Quarantined and deleted successfully.
C:\Users\Joe\Downloads\SoftonicDownloader_for_xpadder.exe (PUP.Optional.Softonic.A) -> Quarantined and deleted successfully.
C:\Windows\Installer\17f80935.msi (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Windows\Installer\188219f.msi (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Windows\SysWOW64\AdpeakProxy.dll (PUP.Optional.Adpeak) -> Quarantined and deleted successfully.
C:\Windows\Temp\AdpeakProxy.log (PUP.Optional.AdpeakProxy) -> Quarantined and deleted successfully.
C:\Windows\Temp\AdpeakProxyr.log (PUP.Optional.AdpeakProxy) -> Quarantined and deleted successfully.

(end)
 

Attachments

  • mbar-log-2013-12-12 (13-22-22).txt
    2 KB · Views: 87
  • system-log.txt
    21.7 KB · Views: 86

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
Code:
HitmanPro 3.7.8.208
www.hitmanpro.com

  Computer name . . . . : JOE-PC
  Windows . . . . . . . : 6.1.1.7601.X64/4
  User name . . . . . . : Joe-PC\Joe
  UAC . . . . . . . . . : Enabled
  License . . . . . . . : Free

  Scan date . . . . . . : 2013-12-12 14:03:42
  Scan mode . . . . . . : Normal
  Scan duration . . . . : 9m 53s
  Disk access mode  . . : Direct disk access (SRB)
  Cloud . . . . . . . . : Internet
  Reboot  . . . . . . . : No

  Threats . . . . . . . : 0
  Traces  . . . . . . . : 53

  Objects scanned . . . : 1,763,371
  Files scanned . . . . : 39,037
  Remnants scanned  . . : 420,687 files / 1,303,647 keys

Cookies _____________________________________________________________________

  C:\Users\Joe\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com
  C:\Users\Joe\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
  C:\Users\Joe\AppData\Local\Google\Chrome\User Data\Default\Cookies:googleadservices.com
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\1QUDH4DJ.txt
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\61R793UZ.txt
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\7PN47BHP.txt
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\CK2WUNI8.txt
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\GOER2J9S.txt
  C:\Users\Joe\AppData\Roaming\Microsoft\Windows\Cookies\YJWXUK3R.txt
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ad.360yield.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ads.pointroll.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ads.pubmatic.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ads.stickyadstv.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ads.undertone.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ads.yahoo.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:adserving.cpmgo.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:adtechus.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:advertising.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ar.atwola.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:at.atwola.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:atdmt.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:atwola.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:burstnet.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:c1.atdmt.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:casalemedia.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:collective-media.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:doubleclick.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:fastclick.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:gmchevrolet.112.2o7.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:googleadservices.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:hearstmagazines.112.2o7.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:interclick.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:invitemedia.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:media6degrees.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:mediaplex.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:myroitracking.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:network.realmedia.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:paypal.112.2o7.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:pointroll.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:questionmarket.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:realmedia.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:revsci.net
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:ru4.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:serving-sys.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:smartadserver.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:statcounter.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:stats.adotube.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:stats.paypal.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:tacoda.at.atwola.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:track.prd.inpwrd.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:tribalfusion.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:www.burstnet.com
  C:\Users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\d0erxuwd.default-1386804714723\cookies.sqlite:www.googleadservices.com
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
STEP 1: Run a scan with ESET Online Scanner
  1. Download ESET Online Scanner utility from the below link
    ESET ONLINE SCANNER DOWNLOAD LINK (This link will automatically download ESET Online Scanner on your computer.)
  2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
  3. Check Yes, I accept the Terms of Use
  4. Click the Start button.
  5. Check Scan archives
  6. Push the Start button.
  7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  8. When the scan completes, push List of found threats
  9. Push Export to Text file and save the file to your desktop using a unique name, such as ESET Scan. Include the contents of this report in your next reply.Note - when ESET doesn't find any threats, no report will be created.
  10. Push the back button.
  11. Push Finish
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
C:\AdwCleaner\Quarantine\C\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher32.exe.vir Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\Level Quality Watcher\v1.01\levelqualitywatcher64.exe.vir Win64/Adware.Adpeak.B application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\ScorpionSaver Services\AdpeakProxy.exe.vir Win32/AdWare.Adpeak.A application cleaned by deleting - quarantined
C:\FRST\Quarantine\ScorpionSaver\bootstrap.js Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
C:\FRST\Quarantine\ScorpionSaver\bootstrap.js.old Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
C:\FRST\Quarantine\ScorpionSaver\CustomActionInstall a variant of Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
C:\FRST\Quarantine\ScorpionSaver\CustomActionUninstall a variant of Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
C:\FRST\Quarantine\ScorpionSaver\manifest.json Win32/AdWare.Adpeak.B application cleaned by deleting - quarantined
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
STEP 3: Run a scan with Kaspersky Virus Removal Tool
  1. Download Kaspersky Virus Removal Tool from the below link and then double click on it to start this utility.
    KASPERSKY VIRUS REMOVAL TOOL (This link open an new webpage from where you can download Kaspersky Virus Removal Tool on your computer.)
  2. Follow the onscreen prompts until it is installed
  3. Click the Options button (the 'Gear' icon), then make sure only the following are ticked:
    • System Memory
    • Hidden startup objects
    • Disk boot sectors
    • Local Disk (C: )
    • Also any other drives (Removable that you may have)
  4. Then click on Actions on the left hand side
  5. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
  6. Click on Automatic Scan
  7. Now click the Start Scanning button, to run the scan
  8. After the scan is complete, click the reports button ('Paper icon', next to the 'Gear' icon) on the right hand side
  9. Click Detected threats on the left
  10. Now click the Save button, and save it as kaslog.txt to your Desktop
  11. Please attach kaslog.txt in your next reply.
 

joe831

New Member
Thread author
Verified
Dec 11, 2013
15
Does this one also make no report if no threats are found? No threats were found and I don't see any report.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top