Kevin Zoll

Emsisoft Employee
  • Content Count

    18822
  • Joined

  • Last visited

  • Days Won

    177

Posts posted by Kevin Zoll


  1. Something is causing Explorer to crash.  Look at your logs it is not Malware related.  You will need to examine the crash dumps to determine what is causing Explorer.exe to crash.

    Error: (04/21/2020 02:41:23 AM) (Source: Application Error) (EventID: 1000) (User: )
    Description: Faulting application name: Explorer.EXE, version: 6.1.7601.23537, time stamp: 0x57c44efe
    Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
    Exception code: 0xc0000005
    Fault offset: 0x0000000004c50fd8
    Faulting process id: 0x1f9c
    Faulting application start time: 0x01d6178fe100edc0
    Faulting application path: C:\Windows\Explorer.EXE
    Faulting module path: unknown
    Report Id: 7f01b831-83a3-11ea-8ddc-d050993d8a37
    
    Error: (04/20/2020 10:49:31 PM) (Source: Application Error) (EventID: 1000) (User: )
    Description: Faulting application name: Explorer.EXE, version: 6.1.7601.23537, time stamp: 0x57c44efe
    Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
    Exception code: 0xc0000005
    Fault offset: 0x0000000005680fd8
    Faulting process id: 0x1450
    Faulting application start time: 0x01d6178739703377
    Faulting application path: C:\Windows\Explorer.EXE
    Faulting module path: unknown
    Report Id: 1ad0dbdf-8383-11ea-8ddc-d050993d8a37

     


  2.  

    Copy the below code to NotepadSave As fixlist.txt to your Desktop.

     

    GroupPolicy\User: Restriction ? <==== ATTENTION
    HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = 
    HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = 
    HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = 
    HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = 
    HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = 
    HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = 
    HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = 
    2020-04-15 13:26 - 2020-04-15 13:26 - 000000000 ____D C:\Users\alx\AppData\LocalLow\HitmanPro.Alert
    2020-04-15 10:50 - 2020-04-15 10:50 - 000000000 ____D C:\Program Files\Malwarebytes
    2020-04-14 18:15 - 2020-04-14 18:15 - 000000000 ____D C:\Program Files\NoVirusThanks
    2020-04-14 10:10 - 2020-04-14 10:10 - 000000000 ____D C:\Users\alx\AppData\Local\Sophos
    2020-04-14 09:47 - 2020-04-16 18:59 - 000000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VoodooShield
    2020-04-14 09:46 - 2020-04-16 18:59 - 000000000 ____D C:\Program Files\VoodooShield
    2020-04-14 09:46 - 2020-04-16 17:47 - 000000000 ____D C:\ProgramData\VoodooShield
    2020-04-14 08:29 - 2020-04-16 01:29 - 000000000 ____D C:\ProgramData\HitmanPro.Alert
    2020-04-14 08:29 - 2020-04-16 01:29 - 000000000 ____D C:\Program Files (x86)\HitmanPro.Alert
    2020-04-14 08:29 - 2020-04-16 00:06 - 000000000 ____D C:\Windows\CryptoGuard
    2020-04-14 08:27 - 2020-04-16 01:29 - 000000000 ____D C:\Program Files\Sophos
    2020-04-14 08:27 - 2020-04-14 08:27 - 000000000 ____D C:\Program Files\Common Files\Sophos
    2020-04-14 08:24 - 2020-04-14 08:29 - 000000000 ____D C:\ProgramData\Sophos
    2020-04-14 08:24 - 2020-04-14 08:29 - 000000000 ____D C:\Program Files (x86)\Sophos
    2020-04-13 11:44 - 2020-04-16 18:59 - 000000000 ____D C:\Program Files\Macrium
    2020-04-13 11:42 - 2020-04-16 18:59 - 000000000 ____D C:\Users\alx\Downloads\Macrium
    2020-04-07 20:26 - 2020-04-16 10:06 - 000000000 ____D C:\ProgramData\Macrium
    ContextMenuHandlers5: [igfxcui] -> {3AB1675A-CCFF-11D2-8B20-00A0C93CB1F4} =>  -> No File

     

    Close Notepad.

     

    NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

     

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

     

    IMPORTANT: Save all of your work, as the next step may reboot your computer.

     

    Run FRST and press the Fix button just once and wait.

     

    If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

     

    The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

     

    NOTE: If the tool warns you about an outdated version please download and run the updated version.

     

    Also, let me know how the machine is running now, and what remaining issues you've noticed.


  3.  

    Copy the below code to NotepadSave As fixlist.txt to your Desktop.

     

    HKLM\...\Winlogon: [Shell] C:\Windows\system32\explorer.exe [3229696 2016-08-29] (Microsoft Windows -> Microsoft Corporation)
    Task: {3953CC3B-F2BB-4BC2-A948-B43467C153B0} - System32\Tasks\{72252C91-D20C-4671-ACC8-03CB8AC020C9} => C:\Windows\system32\pcalua.exe -a C:\Users\Angie\AppData\Local\Temp\jre-8u151-windows-au.exe -d C:\Windows\SysWOW64 -c /installmethod=jau FAMILYUPGRADE=1 <==== ATTENTION
    Task: {B8F3DAB8-8B0E-4FFB-B1AB-66B89A98C7B0} - System32\Tasks\{0E892750-4C72-45A6-AEC9-C1BC1B60D4E9} => C:\Windows\system32\pcalua.exe -a E:\Users\Angie\Documents\Downloads\Adobe\AcroRdrDC1901220036_en_US.exe -d E:\Users\Angie\Documents\Downloads\Adobe
    Task: {E5E6CBA0-9F07-425C-9117-99FB6794396F} - System32\Tasks\{E5836DFB-2E19-4E4B-923A-658BDD3062B9} => C:\Windows\system32\pcalua.exe -a 
    Task: {F1775FD4-A7C0-4787-9020-E5A777E825C0} - System32\Tasks\{112AA8D9-1CD8-41E8-B8CC-9B5490790DEA} => E:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
    2020-04-11 22:33 - 2020-04-11 22:33 - 000003352 _____ C:\Windows\system32\Tasks\{E5836DFB-2E19-4E4B-923A-658BDD3062B9}
    2020-04-17 17:43 - 2017-05-03 22:22 - 000008218 _____ C:\Windows\system32\Tasks\{5F6010C8-60E5-41f3-BF5B-C3AF5DBE12D4}
    2019-03-08 14:20 - 2019-03-08 14:20 - 000000000 _____ () C:\Users\Angie\AppData\Local\{00D69DC6-5BB4-4471-BE10-27184B9DBD44}
    2019-08-14 18:20 - 2019-08-14 18:20 - 000000000 _____ () C:\Users\Angie\AppData\Local\{7DE83350-EA52-4739-9434-D75A5272FD99}
    2018-12-27 15:32 - 2018-12-27 15:32 - 000000000 _____ () C:\Users\Angie\AppData\Local\{B8B9FA99-74B2-42E6-8743-A3260308815B}
    2019-05-01 01:16 - 2019-05-01 01:16 - 000000000 _____ () C:\Users\Angie\AppData\Local\{E15E2D84-D0F0-4F31-9DE7-797C0DA1FF7E}
    ContextMenuHandlers1: [###MegaContextMenuExt] -> {0229E5E7-09E9-45CF-9228-0228EC7D5F17} =>  -> No File
    ContextMenuHandlers4: [###MegaContextMenuExt] -> {0229E5E7-09E9-45CF-9228-0228EC7D5F17} =>  -> No File
    AlternateDataStreams: C:\Windows\SysWOW64\zlib.dll:DocumentSummaryInformation [63]
    AlternateDataStreams: C:\Windows\SysWOW64\zlib.dll:SummaryInformation [63]
    MSCONFIG\Services: MBAMService => 3
    MSCONFIG\startupreg: Malwarebytes TrayApp => E:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\mbamtray.exe
    FirewallRules: [TCP Query User{84B02445-6312-4D1C-A3C1-924FB7D61DF7}G:\games\steam\steamapps\common\fallout 4\fallout4.exe] => (Allow) G:\games\steam\steamapps\common\fallout 4\fallout4.exe No File
    FirewallRules: [UDP Query User{9E5E90D1-391D-440E-89B4-DE9855697D86}G:\games\steam\steamapps\common\fallout 4\fallout4.exe] => (Allow) G:\games\steam\steamapps\common\fallout 4\fallout4.exe No File
    FirewallRules: [{BE5BD611-C726-4B35-8050-6E3D69C0C712}] => (Allow) C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe No File
    FirewallRules: [{EC76E52B-55A6-44C9-8BC9-8917696BE326}] => (Allow) C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe No File
    FirewallRules: [{F9835A7F-58A6-4F37-999E-8A34D7C7E89D}] => (Allow) C:\Users\Angie\AppData\Local\Temp\WZSE0.TMP\Common\EpsonNet Setup\ENEasyApp.exe No File
    FirewallRules: [{AA0947B6-C999-401C-821C-EBED21A5DD39}] => (Allow) C:\Users\Angie\AppData\Local\Temp\WZSE0.TMP\Common\EpsonNet Setup\ENEasyApp.exe No File
    E:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
    E:\Program Files (x86)\Malwarebytes Anti-Malware
    E:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe
    E:\Program Files\Malwarebytes\Anti-Malware

     

    Close Notepad.

     

    NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

     

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

     

    IMPORTANT: Save all of your work, as the next step may reboot your computer.

     

    Run FRST and press the Fix button just once and wait.

     

    If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

     

    The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

     

    NOTE: If the tool warns you about an outdated version please download and run the updated version.

     

    Also, let me know how the machine is running now, and what remaining issues you've noticed.


  4. Close all programs and disconnect any USB or external drives before running the tool.

    • Double-click RogueKiller.exe to run the tool again.
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished".
      • Select the following items:
    [PUP.ByteFence|PUP.Gen1 (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\ByteFence -- N/A -> Found
    [PUP.ByteFence|PUP.Gen1 (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\ByteFence -- N/A -> Found
    [PUP.ByteFence|PUP.Gen1 (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-38456885-260547489-3915582780-1001\Software\ByteFence -- N/A -> Found
    [PUP.ByteFence|PUP.Gen1 (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\ByteFence -- N/A -> Found
    [Tr.Gen0 (Malicious)] (file) 5.txt -- C:\Users\Carol\AppData\Local\Temp\5.txt -> Found
    [PUP.PCProtect (Potentially Malicious)] (folder) TotalAV -- C:\ProgramData\TotalAV -> Found
    [PUP.ByteFence|PUP.Gen1 (Potentially Malicious)] (shortcut) $RUXHOWW.lnk -- C:\$Recycle.Bin\S-1-5-21-38456885-260547489-3915582780-1001\$RUXHOWW.lnk => C:\Program Files\ByteFence\ByteFence.exe -> Found
      • Click the Delete button.
    • Attach the RogueKiller report to your next reply.
      • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex.txt)
      • The highest number of [X], is the most recent Delete log.

  5. Changing tools.

    Download RogueKiller from https://www.fosshub.com/RogueKiller.html and save it to your desktop.

    • Double-click on setup.exe to install RogueKiller.

     

    Close all programs and disconnect any USB or external drives before running the tool.

     

    • Right-click RogueKiller.exe and select Run As Administrator to run the tool.
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished", click on the "Report" button and attach the scan log to your reply.

  6. Hello,

     

    Welcome to the Emsisoft Support Forums. Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions.

     

    All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:

     

    NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

     

    The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

     

    The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer.

    • Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed. We reserve the right to refuse help to anyone who is unwilling to uninstall Pirated/Illegal software
    • We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system.
    • Start only one thread requesting help. Keep all your questions in your thread. DO NOT start a new topic.
    • If you don't know, stop and ask! Don't keep going on.
    • Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there)
    • Once your case has been solved, the thread will be closed.
    • Your thread will be closed after 72-hours of no activity.
    • DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response.
    • DO NOT post any logs without first completing the steps in this guide, they will be deleted.
    • DO NOT copy and paste logs into your threads. All logs are to be attached to your post.

     

    Download to your Desktop:

     

    NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

     

    NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

     

    All scans are to be run in Normal Mode.

     

    WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

     

    Let's get started:

     

    • Install and Run Emsisoft Emergency Kit (EEK):

     

    IMPORTANT If you have Emsisoft Anti-Malware (EAM) Installed do not install and use EEK. Instead run a custom scan with EAM and provided the EAM Scan report.

     

      • Double click EmergencyKitScanner.exe to install EEK
      • When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection.
      • Click "Yes" to Update Emsisoft Emergency Kit
      • Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
      • Save the scan log somewhere that you can find it.
      • Exit Emsisoft Emergency Kit.
    • Run Farbar Recovery Scan Tool (FRST):
      • Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings.
      • Press the Scan button.
      • Farbar Recovery Scan Tool will produce the following logs:
        • FRST.txt
        • Addition.txt
    • Attach the following logs to your reply:
      • Emsisoft Emergency Kit log (C:\EEK\Reports)
      • FRST.txt
      • Addition.txt

     

    IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way.

     

    Once a Malware Removal Specialist has replied to your request for malware removal, they will handle your case from start to finish. You will have 72 hours to reply to any instructions given by the Malware Removal Specialist handling your case. Failure to comply with requests for information or instructions from the Malware Removal Specialist handling your case will result in the locking of your thread.


  7.  

    Copy the below code to NotepadSave As fixlist.txt to your Desktop.

    S2 Dell SupportAssist Remediation; "C:\Program Files\Dell\SARemediation\agent\DellSupportAssistRemedationService.exe" [X]
    S2 DellDigitalDelivery; "C:\Program Files (x86)\Dell Digital Delivery\DeliveryService.exe" [X]
    S3 RNDBWM; "C:\Program Files\Rivet Networks\SmartByte\RNDBWMService.exe" [X]
    S2 SmartByte Network Service x64; "C:\Program Files\Rivet Networks\SmartByte\SmartByteNetworkService.exe" [X]
    2020-04-04 17:33 - 2020-04-04 17:33 - 000000000 ____D C:\ProgramData\ByteFence
    2020-04-04 16:48 - 2020-04-08 13:52 - 000000000 ____D C:\Program Files (x86)\VemoPCAP
    2020-04-04 16:48 - 2020-04-04 16:48 - 000000000 ____D C:\Users\Carol\AppData\Local\VemoPCAP
    2020-04-04 16:48 - 2020-04-04 16:48 - 000000000 ____D C:\ProgramData\VemoPCAP
    2020-04-04 16:48 - 2020-04-04 16:48 - 000000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VemoPCAP
    2020-04-04 16:47 - 2020-04-08 13:23 - 000000000 ____D C:\Users\Carol\AppData\Local\OneUpdater
    2020-04-04 16:47 - 2020-04-04 16:49 - 000000000 ____D C:\Users\Carol\AppData\Local\PCAP_Logic_dir
    2020-04-04 16:47 - 2020-04-04 16:47 - 000000000 ____D C:\Users\Carol\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneUpdater
    2020-04-04 16:46 - 2020-04-08 12:43 - 000000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ByteFence Anti-Malware
    SmartByte -> C:\Program Files\WindowsApps\RivetNetworks.SmartByte_2.5.713.0_x64__rh07ty8m5nkag [2019-04-27] (Rivet Networks LLC)
    AlternateDataStreams: C:\Users\Carol\Desktop\cc.jpeg:3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard 2.jpeg:3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard.jpeg:3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\Fireplace Form.jpeg:3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\Nations Ford Rd. Contract.jpeg:3or4kl4x13tuuug3Byamue2s4b [91]

     

    Close Notepad.

     

    NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

     

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

     

    IMPORTANT: Save all of your work, as the next step may reboot your computer.

     

    Run FRST and press the Fix button just once and wait.

     

    If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

     

    The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

     

    NOTE: If the tool warns you about an outdated version please download and run the updated version.

     

    Uninstall the following:

    ByteFence Anti-Malware
    OneUpdater
    SmartByte Drivers and Services
    SSOption
    VemoPCAP

     

    Also, let me know how the machine is running now, and what remaining issues you've noticed.


  8. I would like you to run a third-party tool that aggressively targets Adware and Junkware.

    Download AdwCleaner and save it on your Desktop.

    1. Close all open programs and Internet browsers (you may want to print out or write down these instructions first).
    2. Double click on adwcleaner.exe to run the tool.
    3. Click on the Scan button.
    4. After the scan has finished, click on the Clean button.
    5. Confirm each time with OK.
    6. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your Desktop.
    7. Attach that log file to your reply.

     

    NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.


  9. Hello,

     

    Welcome to the Emsisoft Support Forums.

     

     

    Copy the below code to NotepadSave As fixlist.txt to your Desktop.

     

    Task: {4397C738-BC2F-4CA4-BBC4-3F5DBB3750FC} - \WebDiscover Browser Launch Task -> No File <==== ATTENTION
    Task: {B1E2AFBC-5126-4326-95B6-16F9D837FCC2} - \WebDiscover Browser Update Task -> No File <==== ATTENTION
    HKU\S-1-5-21-38456885-260547489-3915582780-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uE1YmjidysZgkHPzrSrtgB%2FdaAYAPUFwzrfwoy0yARbjRxvm4Stt%2Btz06avB63xegs1TV%2FHxb385rX%2BzEHZJAIrnLMdXSq94LIgjoioHMpErMz%2B87K3fe3FSC7XJ10%2FjeGKYR0%2FzYpYdmESTujwP%2FSG%2FNHFBiQTcT20AF4ztGrxbX60s1kF6E%2FxDhuXc%2F%2F%2BA%2B4vtMN6TXBbJjpcScwXAJ5Q%3D%3D
    HKU\S-1-5-21-38456885-260547489-3915582780-1003\Software\Microsoft\Internet Explorer\Main,Start Page = hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uE1YmjidysZgkHPzrSrtgB%2FdaAYAPUFwzrfwoy0yARbjRxvm4Stt%2Btz06avB63xegs1TV%2FHxb385rX%2BzEHZJAIrnLMdXSq94LIgjoioHMpErMz%2B87K3fe3FSC7XJ10%2FjeGKYR0%2FzYpYdmESTujwP%2FSG%2FNHFBiQTcT20AF4ztGrxbX60s1kF6E%2FxDhuXc%2F%2F%2BA%2B4vtMN6TXBbJjpcScwXAJ5Q%3D%3D
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1001 -> DefaultScope {8430D776-5C59-4B75-B94B-3D17947BCFF1} URL = hxxps://us.search.yahoo.com/yhs/search?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3ubNumM3Cick8jzUJwAc7LIJgf93wLOZKFsKWcKnx1595gPDmAcOdrrnsrzoZLhr%2BrKdOmeqzHtXP0%2FPeiZHcFdF488hRDmsUSo2y32o32ayKcB%2BUNDt37LgczvfdFmPhpXcf96L2sx5dV2YJSDM3Stm1oOjlsgX0V0ex0PC7ksaSdu%2BjQlH6hugcJiM%2BQZ5tWC8z1AajDn8Squ%2FGZNz%2Bc7Q%3D%3D&p={searchTerms}
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1001 -> {8430D776-5C59-4B75-B94B-3D17947BCFF1} URL = hxxps://us.search.yahoo.com/yhs/search?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3ubNumM3Cick8jzUJwAc7LIJgf93wLOZKFsKWcKnx1595gPDmAcOdrrnsrzoZLhr%2BrKdOmeqzHtXP0%2FPeiZHcFdF488hRDmsUSo2y32o32ayKcB%2BUNDt37LgczvfdFmPhpXcf96L2sx5dV2YJSDM3Stm1oOjlsgX0V0ex0PC7ksaSdu%2BjQlH6hugcJiM%2BQZ5tWC8z1AajDn8Squ%2FGZNz%2Bc7Q%3D%3D&p={searchTerms}
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1001 -> {84C0D776-5C59-4B75-B94B-3D17947BCFF1} URL = 
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1003 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://us.search.yahoo.com/yhs/search?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3ubNumM3Cick8jzUJwAc7LIJgf93wLOZKFsKWcKnx1595gPDmAcOdrrnsrzoZLhr%2BrKdOmeqzHtXP0%2FPeiZHcFdF488hRDmsUSo2y32o32ayKcB%2BUNDt37LgczvfdFmPhpXcf96L2sx5dV2YJSDM3Stm1oOjlsgX0V0ex0PC7ksaSdu%2BjQlH6hugcJiM%2BQZ5tWC8z1AajDn8Squ%2FGZNz%2Bc7Q%3D%3D&p={searchTerms}
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1003 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxps://us.search.yahoo.com/yhs/search?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3ubNumM3Cick8jzUJwAc7LIJgf93wLOZKFsKWcKnx1595gPDmAcOdrrnsrzoZLhr%2BrKdOmeqzHtXP0%2FPeiZHcFdF488hRDmsUSo2y32o32ayKcB%2BUNDt37LgczvfdFmPhpXcf96L2sx5dV2YJSDM3Stm1oOjlsgX0V0ex0PC7ksaSdu%2BjQlH6hugcJiM%2BQZ5tWC8z1AajDn8Squ%2FGZNz%2Bc7Q%3D%3D&p={searchTerms}
    SearchScopes: HKU\S-1-5-21-38456885-260547489-3915582780-1003 -> {0A33EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
    CHR StartupUrls: Default -> "hxxps://news.google.com/news/?gl=US&ned=us&hl=en","hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uPLD3SefbDh%2BMU1t9OjtOA6ebCmoNa2d8MiJng9LW%2BDnGbQSa%2Fep0qEae%2FvZ7FVbtQZYZJ6HTKU8MYVNI47o9xhtWxCk5P0agOzM9GG30TxV35JIc6%2BZmc7SLw%2Fw5V5gMrcN5J4ERkWRDHUPQCVEKULHdHQbKj%2B6DO0yUx45Cq2qMrSl97hN8rI5YHFLaPDr6N5%2FNlezL1rUch3lLYOKR%2B97ypxupB0JkiWM4StsiAho%3D"
    CHR NewTab: Default ->  Not-active:"chrome-extension://kbgjbpddgbobnkfdoejkcnleiiadlnfh/index.html"
    CHR DefaultSearchURL: Default -> hxxps://us.search.yahoo.com/yhs/search?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uaYGjZiE5twUcdpZuknnAUk5IACkazxsGmzjMt5iXTP%2FCKR6nKCPwlVOIsHantH2spjpNCJ43sikwH7oG3r0RGfmw1vN4wJG5VhCFKdROWOw5%2FfQ%2BrsCPsiT%2B7rcKFwm6L1N02fl06jB2v1pY7BVybbwErDlxwk7tP%2B%2FWcsIlbK3oTiXtdHLcsuf40uLIA2nleQn5A%2Bl06nYcZ5aR7FfdRuFX92NQaHcGS3%2Ba%2BxFUX4E%3D&p={searchTerms}
    CHR DefaultNewTabURL: Default -> hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uHSggdiZG8Ti%2F5VL%2FM1BFkN3KQLfkR9BvCWQIQfIJDtXzn7aHy7rFMQXgeOdhnb80fqpnPMfboid5hFxhSYk1Ld9QUEGvCLVYsIAd0RNOtt641gkJ3jTrdsG%2BrgRAaaklxnUKWYuaGZtbrUnpS87U8i5jXq8hLRCJHIF3Z%2Ffpg4dladPLwPFAqWM0kbVedYB3BdiAluBocaPTbw6i1aRZzFvo9I%2B3fh13glSaZXOTAiQ%3D
    CHR DefaultSuggestURL: Default -> hxxps://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command={searchTerms}
    CHR HomePage: Profile 1 -> hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uNvNywOuL6c4AsSWYa2ib09pIdyPIScFrRuR0EP%2Fs5vH4cAGTj32xjO7vcRvVOxsTUfoar4G8nzJ9WYjO9kXK3g0f9yTlZuD4%2BTO3jco284En4QkLzPdtDILQEfADpeGWdb%2Be5swzRz%2BIhOl%2F7wvtEALmGoCoIpD0XtZvE%2F%2FmNT%2Fs8yl6QssJUIa1PGLOAMKKpRl08YT7A47BIPdnYILQhcDdp8aJN2g6CewIYzs3e3o%3D
    CHR StartupUrls: Profile 1 -> "hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uPLD3SefbDh%2BMU1t9OjtOA6ebCmoNa2d8MiJng9LW%2BDnGbQSa%2Fep0qEae%2FvZ7FVbtQZYZJ6HTKU8MYVNI47o9xhtWxCk5P0agOzM9GG30TxV35JIc6%2BZmc7SLw%2Fw5V5gMrcN5J4ERkWRDHUPQCVEKULHdHQbKj%2B6DO0yUx45Cq2qMrSl97hN8rI5YHFLaPDr6N5%2FNlezL1rUch3lLYOKR%2B97ypxupB0JkiWM4StsiAho%3D"
    CHR DefaultSearchKeyword: Profile 1 -> search.yahoo.com
    CHR DefaultNewTabURL: Profile 1 -> hxxps://us.search.yahoo.com/yhs/web?hspart=omr&hsimp=yhs-001&type=863163140&param1=y6bdVFVIsvuYsgEClQfz8FBvKkXdqONxqOqRNOxENVaCsf%2BEA%2BUH%2BJwJJs9rEQ3uHSggdiZG8Ti%2F5VL%2FM1BFkN3KQLfkR9BvCWQIQfIJDtXzn7aHy7rFMQXgeOdhnb80fqpnPMfboid5hFxhSYk1Ld9QUEGvCLVYsIAd0RNOtt641gkJ3jTrdsG%2BrgRAaaklxnUKWYuaGZtbrUnpS87U8i5jXq8hLRCJHIF3Z%2Ffpg4dladPLwPFAqWM0kbVedYB3BdiAluBocaPTbw6i1aRZzFvo9I%2B3fh13glSaZXOTAiQ%3D
    CHR DefaultSuggestURL: Profile 1 -> hxxps://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command={searchTerms}
    R2 IdeaBadaga; C:\Program Files (x86)\IdeaBadaga\IdeaBadaga.exe [5392368 2018-04-05] (Apps Delivered Ltd -> Idea Badaga) [File not signed]
    2020-04-04 16:45 - 2020-04-04 16:45 - 000000000 ____D C:\Program Files (x86)\IdeaBadaga
    2020-04-04 16:45 - 2020-04-04 16:45 - 000000000 ____D C:\Program Files (x86)\Idea Badaga
    2020-03-12 16:15 - 2020-03-12 16:15 - 000000000 ____D C:\WINDOWS\{6567E9E7-5D48-4B5D-BEFF-1F8AD76846E1}
    ContextMenuHandlers5: [igfxcui] -> {3AB1675A-CCFF-11D2-8B20-00A0C93CB1F4} =>  -> No File
    AlternateDataStreams: C:\Users\Carol\Desktop\cc.jpeg:�3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\cc.jpeg:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard 2.jpeg:�3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard 2.jpeg:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard.jpeg:�3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\corner cupboard.jpeg:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0]
    AlternateDataStreams: C:\Users\Carol\Desktop\Fireplace Form.jpeg:�3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\Fireplace Form.jpeg:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0]
    AlternateDataStreams: C:\Users\Carol\Desktop\Nations Ford Rd. Contract.jpeg:�3or4kl4x13tuuug3Byamue2s4b [91]
    AlternateDataStreams: C:\Users\Carol\Desktop\Nations Ford Rd. Contract.jpeg:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0]
    C:\Program Files (x86)\IdeaBadaga\IdeaBadaga.exe
    C:\Program Files (x86)\IdeaBadaga

     

    Close Notepad.

     

    NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

     

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

     

    IMPORTANT: Save all of your work, as the next step may reboot your computer.

     

    Run FRST and press the Fix button just once and wait.

     

    If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

     

    The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

     

    NOTE: If the tool warns you about an outdated version please download and run the updated version.

     

    Also, let me know how the machine is running now, and what remaining issues you've noticed.


  10. Hello,

    Copy the below code to NotepadSave As fixlist.txt to your Desktop.

     

    2020-03-23 23:55 - 2020-03-23 23:55 - 000001284 _____ () C:\ProgramData\SMRResults521.dat
    2017-09-30 17:09 - 2017-09-30 17:09 - 000000255 _____ () C:\Program Files (x86)\2OA5SGQD.bat
    2018-07-05 22:46 - 2018-07-05 22:46 - 000000338 _____ () C:\Program Files (x86)\temp995.bat
    ContextMenuHandlers5: [igfxcui] -> {3AB1675A-CCFF-11D2-8B20-00A0C93CB1F4} =>  -> No File
    AlternateDataStreams: C:\ProgramData\TEMP:541E1530 [154]
    C:\Users\prent\Downloads\This is a VIRUS.You computer is blocked

     

    Close Notepad.

     

    NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

     

    NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

     

    IMPORTANT: Save all of your work, as the next step may reboot your computer.

     

    Run FRST and press the Fix button just once and wait.

     

    If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

     

    The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

     

    NOTE: If the tool warns you about an outdated version please download and run the updated version.

     

    Also, let me know how the machine is running now, and what remaining issues you've noticed.


  11. We went through this with your other ticket.  Do not send me logs I did not ask for, and do not run tools I did not ask you to run.  Do not enable settings I did not ask you to enable all tools are to be run  with their default settings. You want our help or not?  Because if you continue to try and fix this yourself, then I will close this support thread.

    After looking at your FRST logs.  I will decline assisting you with this case.  Do no start a new support topic.  It will be closed with no comment.

    THREAD CLOSED


  12. Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions.

     

     

    All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:

     

    NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

     

    The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

     

    The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer.

    • Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed. We reserve the right to refuse help to anyone who is unwilling to uninstall Pirated/Illegal software
    • We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system.
    • Start only one thread requesting help. Keep all your questions in your thread. DO NOT start a new topic.
    • If you don't know, stop and ask! Don't keep going on.
    • Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there)
    • Once your case has been solved, the thread will be closed.
    • Your thread will be closed after 72-hours of no activity.
    • DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response.
    • DO NOT post any logs without first completing the steps in this guide, they will be deleted.
    • DO NOT copy and paste logs into your threads. All logs are to be attached to your post.

     

    Download to your Desktop:

     

    NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

     

    NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

     

    All scans are to be run in Normal Mode.

     

    WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

     

    Let's get started:

     

    • Install and Run Emsisoft Emergency Kit (EEK):

     

    IMPORTANT If you have Emsisoft Anti-Malware (EAM) Installed do not install and use EEK. Instead run a custom scan with EAM and provided the EAM Scan report.

     

      • Double click EmergencyKitScanner.exe to install EEK
      • When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection.
      • Click "Yes" to Update Emsisoft Emergency Kit
      • Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
      • Save the scan log somewhere that you can find it.
      • Exit Emsisoft Emergency Kit.
    • Run Farbar Recovery Scan Tool (FRST):
      • Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings.
      • Press the Scan button.
      • Farbar Recovery Scan Tool will produce the following logs:
        • FRST.txt
        • Addition.txt
    • Attach the following logs to your reply:
      • Emsisoft Emergency Kit log (C:\EEK\Reports)
      • FRST.txt
      • Addition.txt

     

    IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way.

     

    Once a Malware Removal Specialist has replied to your request for malware removal, they will handle your case from start to finish. You will have 72 hours to reply to any instructions given by the Malware Removal Specialist handling your case. Failure to comply with requests for information or instructions from the Malware Removal Specialist handling your case will result in the locking of your thread.


  13. We're done here.  For the past several days you have been asking me to assist with non-malware related issues.  This is not a PC general support site.

    All malware has been removed from the computer.  The operating system and software has been reinstalled.  So it is not an OS or software issue.  Hardware drivers have been reinstalled and you are still getting the same errors, so it's not a driver issue.  That only leaves the hardware itself.

    Since this is no longer a malware issue, this support topic is closed.


  14. Thread Closed

     

    Reason: Lack of Response

     

    PM either Kevin, or Arthur to have this thread reopened.

     

    The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

     

    All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread