Jump to content

Welcome to Geeks to Go
Geeks to Go Welcome
Create Account Login to Account
Photo

Removal instructions for Price Fountain

- - - - -

  • Please log in to reply
No replies to this topic

#1
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 32,369 posts
Content is republished with permission from Malwarebytes.

What is Price Fountain?

The Malwarebytes research team has determined that Price Fountain is adware. These adware applications display advertisements not originating from the sites you are browsing.

How do I know if my computer is affected by Price Fountain?

You may see these entries in your list of installed programs:

warning4.png

these shortcuts on your desktop and in your taskbar:

icons.png

and these Scheduled Tasks:

warning3.png

Note: part of the Tasks name includes the {username} of the current user.

How did Price Fountain get on my computer?

Adware applications use different methods for distributing themselves. This particular one was bundled with other software.

How do I remove Price Fountain?

Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.
  • Please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-version.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Enable free trial of Malwarebytes Anti-Malware Premium
    • Launch Malwarebytes Anti-Malware
  • Then click Finish.
  • If an update is found, you will be prompted to download and install the latest version.
  • Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
  • When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
  • Reboot your computer if prompted.
Is there anything else I need to do to get rid of Price Fountain?
  • No, Malwarebytes' Anti-Malware removes Price Fountain completely.
  • Any leftover unwanted shortcuts can be unpinned and removed.
  • This PUP creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks.
How would the full version of Malwarebytes Anti-Malware help protect me?

We hope our application and this guide have helped you eradicate this hijacker.

Technical details for experts

Possible signs in FRST logs:
 C:\Windows\System32\Tasks\{username}RecidivisticTerrificallyV2
 C:\Windows\System32\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB}
 C:\Users\{username}\Desktop\Aliexpress.URL
 C:\Users\{username}\Desktop\Booking.URL
 C:\Windows\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job
 C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB}
 C:\Users\{username}\AppData\Local\RecidivisticTerrifically
 C:\Users\{username}\AppData\Local\Temp\YonkersDialectal.dll

PriceFountain (HKCU\...\RecidivisticTerrifically) (Version:  - ) <==== ATTENTION
Update for PriceFountain (HKCU\...\{77AC37BA-71E2-EAA2-2433-10652BD846BB}) (Version:  - Update for PriceFountain) <==== ATTENTION
Task: {CB9F5088-A8EC-4347-8920-97F3A1FAD959} - System32\Tasks\{username}RecidivisticTerrificallyV2 => Rundll32.exe YonkersDialectal.dll,main 7 1 <==== ATTENTION
Task: C:\Windows\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job => C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exe
Alterations made by the installer:
File system details [View: All details] (Selection)
---------------------------------------------------
    Adds the folder C:\Users\{username}\AppData\Local\RecidivisticTerrifically
       Adds the file Aliexpress .lnk"="5/6/2016 8:45 AM, 1804 bytes, A
       Adds the file Aliexpress.ico"="2/4/2016 6:48 PM, 23622 bytes, A
       Adds the file Aliexpress.lnk"="5/6/2016 8:45 AM, 1780 bytes, A
       Adds the file Aliexpress.smenu.URL"="5/6/2016 8:45 AM, 212 bytes, A
       Adds the file Aliexpress.tbar.URL"="5/6/2016 8:45 AM, 210 bytes, A
       Adds the file Booking .lnk"="5/6/2016 8:45 AM, 1786 bytes, A
       Adds the file Booking.ico"="2/22/2016 2:25 PM, 49526 bytes, A
       Adds the file Booking.lnk"="5/6/2016 8:45 AM, 1768 bytes, A
       Adds the file Booking.smenu.URL"="5/6/2016 8:45 AM, 209 bytes, A
       Adds the file Booking.tbar.URL"="5/6/2016 8:45 AM, 207 bytes, A
       Adds the file ForspentBraked.dat"="3/17/2016 9:52 PM, 1071 bytes, A
       Adds the file HedonismsIndictable.exe"="5/6/2016 8:45 AM, 89934 bytes, A
       Adds the file Rkey.dat"="5/6/2016 8:45 AM, 43 bytes, A
       Adds the file YonkersDialectal.dll"="5/4/2016 7:46 PM, 370688 bytes, A
    Adds the folder C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB}
       Adds the file config.dat"="4/21/2013 2:31 AM, 73 bytes, A
       Adds the file info.dat"="5/6/2016 8:45 AM, 104 bytes, A
       Adds the file Updater.exe"="5/2/2013 5:27 PM, 501760 bytes, A
    Adds the folder C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu
       Adds the file Aliexpress .lnk"="5/6/2016 8:45 AM, 1804 bytes, A
       Adds the file Booking .lnk"="5/6/2016 8:45 AM, 1786 bytes, A
    In the existing folder C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar
       Adds the file Aliexpress.lnk"="5/6/2016 8:45 AM, 1780 bytes, A
       Adds the file Booking.lnk"="5/6/2016 8:45 AM, 1768 bytes, A
    In the existing folder C:\Users\{username}\Desktop
       Adds the file Aliexpress.URL"="5/6/2016 8:45 AM, 306 bytes, A
       Adds the file Booking.URL"="5/6/2016 8:45 AM, 300 bytes, A
    In the existing folder C:\Windows\System32\Tasks
       Adds the file {77AC37BA-71E2-EAA2-2433-10652BD846BB}"="5/6/2016 8:45 AM, 3242 bytes, A
       Adds the file {username}RecidivisticTerrificallyV2"="5/6/2016 8:45 AM, 3482 bytes, A
    In the existing folder C:\Windows\Tasks
       Adds the file {77AC37BA-71E2-EAA2-2433-10652BD846BB}.job"="5/6/2016 8:45 AM, 286 bytes, A

Registry details [View: All details] (Selection)
------------------------------------------------
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\CompatibilityAdapter\Signatures]
       "{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job"="REG_BINARY, ................................
       "{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job.fp"="REG_DWORD", -734075900
    [HKEY_CURRENT_USER\Software\{abd7ea567574e7b4e2d1ddda13cfadbc}]
       "Channel"="REG_SZ", "ir_16_18_ff"
       "Config"="REG_SZ", "6"
       "country"="REG_SZ", "{"country_name": "{Countryname}", "country_code": "{CC}"}"
       "dll_module_name"="REG_SZ", "DLL"
       "dll-file-name"="REG_SZ", "YonkersDialectal.dll"
       "FF"="REG_SZ", "FALSE"
       "IconWebsite"="REG_SZ", "Aliexpress"
       "InstallDir"="REG_SZ", "C:\Users\{username}\AppData\Local\RecidivisticTerrifically"
       "InstallId"="REG_SZ", "abd7ea567574e7b4e2d1ddda13cfadbc"
       "Instgrp"="REG_SZ", "PF20_4"
       "OriginalCommand"="REG_SZ", "C:\Users\{username}\Desktop\pm.exe  /MUSE /PARTNER=ironpf2 /CHANNEL=ir_16_18_ff /uid=0B0CyD0F0FyEtAyDyC0FtBzy0CtA0FtB2RtBtDtCyCtDyDtDyEtCzzyEzytBtDyCyEyB"
       "Partner"="REG_SZ", "ironpf2"
       "Reason"="REG_SZ", "default"
       "TaskName"="REG_SZ", "{username}RecidivisticTerrificallyV2"
       "Uninst"="REG_SZ", "C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe"
       "Uninstalled"="REG_SZ", "FALSE"
       "Version"="REG_SZ", "PF20_4"
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\{77AC37BA-71E2-EAA2-2433-10652BD846BB}]
       "DisplayIcon"="REG_SZ", "C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exe"
       "DisplayName"="REG_SZ", "Update for PriceFountain"
       "Publisher"="REG_SZ", "Update for PriceFountain"
       "UninstallString"="REG_SZ", "C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exe /Uninstall /DelSelfDir /GID=2SyByB0A0CtAyB0B0AtGyBtC0EtBtG0E0A0AtBtGtByEtAtAtGtCtDyCyDtB0B0DzzyEyC0B0B2Q"
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\RecidivisticTerrifically]
       "DisplayName"="REG_SZ", "PriceFountain"
       "UninstallString"="REG_SZ", ""C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe""

Malwarebytes Anti-Malware log:
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 5/6/2016
Scan Time: 3:19 PM
Logfile: mbamPriceFountain.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.05.06.04
Rootkit Database: v2016.04.17.01
License: Premium
Malware Protection: Disabled
Malicious Website Protection: Enabled
Self-protection: Enabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: {username}

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 365950
Time Elapsed: 10 min, 4 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 1
PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\YonkersDialectal.dll, Delete-on-Reboot, [109c26aca1f8a096f816f80d40c2b64a], 

Registry Keys: 3
PUP.Optional.PriceFountain, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{77AC37BA-71E2-EAA2-2433-10652BD846BB}, Quarantined, [3b71a82a33660f27ea6a36415aa6ed13], 
PUP.Optional.PriceFountain, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FC36C276-4C6B-4870-AF1A-BB3C9A426F6D}, Delete-on-Reboot, [1e8e16bcedacd2640d282193c53f956b], 
PUP.Optional.PriceFountain.Gen, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\RecidivisticTerrifically, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 

Registry Values: 2
PUP.Optional.PriceFountain, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FC36C276-4C6B-4870-AF1A-BB3C9A426F6D}|Path, \{username}RecidivisticTerrificallyV2, Delete-on-Reboot, [1e8e16bcedacd2640d282193c53f956b]
PUP.Optional.PriceFountain, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{77AC37BA-71E2-EAA2-2433-10652BD846BB}|DisplayName, Update for PriceFountain, Quarantined, [00acc909f1a8979f31f84df97a895ea2]

Registry Data: 0
(No malicious items detected)

Folders: 1
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically, Delete-on-Reboot, [7c30448e3c5d48ee110d2c571bead42c], 

Files: 21
PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\YonkersDialectal.dll, Delete-on-Reboot, [109c26aca1f8a096f816f80d40c2b64a], 
PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB}\Updater.exe, Quarantined, [3b71a82a33660f27ea6a36415aa6ed13], 
PUP.Optional.PriceFountain, C:\Users\{username}\Desktop\pm.exe, Quarantined, [ab0114be4851c6702d27086fab5555ab], 
PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\Temp\YonkersDialectal.dll, Quarantined, [0d9fcf03f8a15ed83cd243c2ad55946c], 
PUP.Optional.PriceFountain, C:\Windows\System32\Tasks\{username}RecidivisticTerrificallyV2, Quarantined, [119b379b62372c0a0f07396eeb192cd4], 
PUP.Optional.HijackedShortCuts, C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Booking.lnk, Quarantined, [1e8e23af2b6e78bebbb9516e60a46799], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Rkey.dat, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress .lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.ico, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.smenu.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.tbar.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking .lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.ico, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.smenu.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.tbar.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\ForspentBraked.dat, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], 
PUP.Optional.ShortcutHijack, C:\Users\{username}\Desktop\Aliexpress.URL, Quarantined, [8626f1e10c8d84b21c1c4242e2236898], 
PUP.Optional.ShortcutHijack, C:\Users\{username}\Desktop\Booking.URL, Quarantined, [1894b51d8910b2840b2d44409471bf41], 

Physical Sectors: 0
(No malicious items detected)


(end)
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
  • 0

Advertisements





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

featured
Malware Removal How to Guides Windows 7 System Building Download Files Register welcome

Never used a forum? Learn how.