John Lange

CLOSED Application.AppInstall (A) [226553] C:\ProgramData\simplitec

Recommended Posts

Hi Kevin,

I read a similar thread with a similar issue, in my case I got a persistent folder that comes up in my main PC and another two laptops...

The location that shows is C:\ProgramData\simplitec and the tread is an Application.AppInstall (A)

Note that, that folder is empty and it seems is a low risk thread.

Please find attached the report and log that came up from Emsisoft.

I really appreciated all your help and thank you very much in advance.

Kind regards,

John Lange

Forensics_171120-135057.txt

scan_171120-132841.txt

Share this post


Link to post
Share on other sites

Hi John,

I will need 2 additional logs, before I begin cleaning up your system.

Download Farbar Recovery Scan Tool and save it to your desktop.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to your desktop.
For x64 (x64) bit systems download Farbar Recovery Scan Tool x64 and save it to your desktop.

Note: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to the disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

Share this post


Link to post
Share on other sites

John,

Do the following:

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

HKLM-x32\...\Run: [] => [X]
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page =
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page =
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL =
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL =
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL =
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL =
HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Local Page =
URLSearchHook: HKLM-x32 - Freecorder Toolbar - {1392b8d2-5c05-419f-a8f6-b9f15a596612} - C:\Program Files (x86)\Freecorder\tbFree.dll No File
URLSearchHook: HKU\S-1-5-21-1370685322-1198290777-1211605888-1001 - Freecorder Toolbar - {1392b8d2-5c05-419f-a8f6-b9f15a596612} - C:\Program Files (x86)\Freecorder\tbFree.dll No File
BHO: VIPRE Search Guard Helper -> {963C8283-AE7F-4AA6-9B3B-847A8FC62C5E} -> C:\Program Files (x86)\VIPRE\x64\VSGx64.dll => No File
BHO-x32: VIPRE Search Guard Helper -> {963C8283-AE7F-4AA6-9B3B-847A8FC62C5E} -> C:\Program Files (x86)\VIPRE\VSG.dll => No File
Toolbar: HKLM - VIPRE Search Guard Toolbar - {A924C17A-5E94-4E02-BED5-49720BA6F7FA} -  No File
Toolbar: HKLM-x32 - VIPRE Search Guard Toolbar - {A924C17A-5E94-4E02-BED5-49720BA6F7FA} -  No File
Toolbar: HKLM-x32 - Freecorder Toolbar - {1392b8d2-5c05-419f-a8f6-b9f15a596612} - C:\Program Files (x86)\Freecorder\tbFree.dll No File
Toolbar: HKU\S-1-5-21-1370685322-1198290777-1211605888-1001 -> No Name - {1392B8D2-5C05-419F-A8F6-B9F15A596612} -  No File
Handler: vipresg - {47BE2E5B-703B-444F-ABD3-05717D2191C6} - C:\Program Files (x86)\VIPRE\VSG.dll No File
Handler: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll No File
FF Plugin-x32: @microsoft.com/WLPG,version=16.4.3528.0331 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [No File]
R3 ALSysIO; C:\Users\John\AppData\Local\Temp\ALSysIO64.sys [17416 2017-11-21] (Arthur Liberman) <==== ATTENTION
C:\ProgramData\simplitec

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Share this post


Link to post
Share on other sites

You can start threads for each system, or what till we are done with this system and then we can work on the next.

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Be sure to let me know how things are running.

Share this post


Link to post
Share on other sites

Hi,

Let's get a fresh set logs for the current system.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Share this post


Link to post
Share on other sites

John,

Changing tools.

Download RogueKiller from https://www.fosshub.com/RogueKiller.html and save it to your desktop.

• Double-click on setup.exe to install RogueKiller.

Close all programs and disconnect any USB or external drives before running the tool.

• Right-click RogueKiller.exe and select Run As Administrator to run the tool.
• Once the Prescan has finished, click Scan.
• Once the Status box shows "Scan Finished", click on the "Report" button and attach the scan log to your reply.

Share this post


Link to post
Share on other sites

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista/7/8/10 users: Right-click and select Run As Administrator).
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Click the Registry Tab and select the following items:
      [PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-1370685322-1198290777-1211605888-1001\Software\Microsoft\Internet Explorer\Main | Search Bar : Preserve  -> Found
      [PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-1370685322-1198290777-1211605888-1001\Software\Microsoft\Internet Explorer\Main | Search Bar : Preserve  -> Found
    • Click the Files Tab and select the following items:
      [PUP.Gen1][Folder] C:\ProgramData\simplitec -> Found
      [PUP.Gen1][Folder] C:\ProgramData\simplitec -> Found
    • Click the Delete button.

  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex.txt)
    • The highest number of [X], is the most recent Delete log.


Share this post


Link to post
Share on other sites

John,

Go ahead and have RogueKiller delete these as well

¤¤¤ Registry : 9 ¤¤¤
[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-1370685322-1198290777-1211605888-1001\Software\Microsoft\Internet Explorer\Main | Search Bar : Preserve  -> Not selected
[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-1370685322-1198290777-1211605888-1001\Software\Microsoft\Internet Explorer\Main | Search Bar : Preserve  -> Not selected
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0  -> Not selected
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0  -> Not selected

Share this post


Link to post
Share on other sites

Hi John,

After that Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Share this post


Link to post
Share on other sites

Changing tools.

Download AdwCleaner and save it on your desktop.

  1. Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  2. Double click on adwcleaner.exe to run the tool.
  3. Click on the Scan button.
  4. After the scan has finished, click on the Clean button.
  5. Confirm each time with OK.
  6. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  7. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
    NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.

Share this post


Link to post
Share on other sites

Well, that came back clean.

Let's take a deeper look.

Download avz4.zip from here

  • Unzip it to your desktop to a folder named avz4
  • Double click on AVZ.exe to run it.
  • Run an update by clicking the Auto Update button on the Right of the Log window: avz-update-button.png
  • Click Start to begin the update
    Note: If you receive an error message, chose a different source, then click Start again/*]
  • After the update, from the "File" menu, choose "Standard Scripts"
  • Put a check next to item 2: Advanced System Analysis
  • Click Execute selected scripts
  • At the next prompt, click the OK button
  • Let the scan run and click "OK" when the completion prompt pops up
  • Now Close out of the Standard Scripts window, and exit AVZ
  • Navigate to the avz4 folder and locate the folder LOG
  • Inside the LOG folder you will find virusinfo_syscheck.htm, virusinfo_syscheck.htm and virusinfo_syscheck.zip
  • Attach the Compressed file, virusinfo_syscheck.zip, to your next reply.

Share this post


Link to post
Share on other sites

AVZ has not removed anything, as I have not given you a custom script for AVZ to load and execute.

Close all windows then double click on AVZ.exe

  • Click File > Custom scripts
  • Copy & paste the below code in to the text box in the program
    Note: When you run the script, your PC will be restarted
    begin
    BC_Activate;
     BC_DeleteFile('C:\ProgramData\simplitec');
    RebootWindows(true);
    ExecuteSysClean;
    end.
  • Click Run
  • Restart your PC if it doesn't do it automatically.


Run a fresh scan with EEK, attach the new EEK log to your reply.

Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

Share this post


Link to post
Share on other sites

Going to try an older tool.

  • Download The Avenger by Swandog46 from here.
  • Unzip/extract it to a folder on your desktop.
  • Double click on avenger.exe to run The Avenger.
  • Click OK.
  • Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.
  • Copy all of the text in the below code box to the clipboard by highlighting it and then pressing Ctrl+C.
    Folders to delete:
    C:\ProgramData\simplitec
  • In the avenger window, click the Paste Script from Clipboard, pastets4.png button.
  • Click the Execute button.
  • You will be asked Are you sure you want to execute the current script?.
  • Click Yes.
  • You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot.  Reboot now?.
  • Click Yes.
  • Your PC will now be rebooted.
  • Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.
  • After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).
  • Please post this log in your next reply.

Share this post


Link to post
Share on other sites

Hi John,

Avenger normally saves a log to the Root folder of the system drive.  Typically the system drive is drive C.  The Avenger log should be located at C:\avenger.txt.  Open Windows Explorer and click on Drive C to open the directory listing for the drive.

Share this post


Link to post
Share on other sites

Kevin,

I'm not sure if this folder was created by avenger when I unpacked at the desktop even though it has a log folder in it... I'll attached for you those logs and also a snapshot of the folder.

Please let me know if aren't those... how to find them or if I can run it again.

Kind regards,

John

virusinfo_syscheck.htm

virusinfo_syscheck.xml

Capture.JPG
Download Image

Share this post


Link to post
Share on other sites

John,

Run a fresh scan with EEK, attach the new EEK scan log to your reply.  That will tell us in Avenger successfully removed that folder or not.

Share this post


Link to post
Share on other sites

John,

Something is recreating that folder, it may be a legitimate program.

Please download SystemLook (x64) http://jpshortstuff.247fixes.com/SystemLook_x64.exe and save it to your desktop.

• Double-click SystemLook_X64.exe to run it.
• Copy the content of the following codebox into the main textfield:

:dir
C:\ProgramData\simplitec /s /md5
C:\Users\All Users\simplitec /s /md5

• Click the Look button to start the scan.


• When finished, a notepad window will open with the results of the scan. Please attach this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Share this post


Link to post
Share on other sites

Unless you are having problems, it is time to do the final steps.

Now to remove most of the tools that we have used in fixing your machine:

Download Delfix from here and save it to your desktop.

  • Ensure Remove disinfection tools is checked.
  • Also place a checkmark next to:
    • Create registry backup
    • Purge system restore
  • Click the Run button.

When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad.

Empty the Recycle Bin

You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

To Remove EEK simple delete the EEK for in the of your System Drive, normally C:\EEK

Run Windows Update and update your Windows Operating System.

Articles to Read:
How to Protect Your Computer From Malware
How to keep you and your Windows PC happy
Web, email, chat, password and kids safety
How Did I Get Infected?

That should take care of everything.

Safe Surfing!

Share this post


Link to post
Share on other sites

John,

Glad to be of assistance.

Merry Christmas and Happy New Year.

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only.  Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair.  Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.