Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antivirus Security Pro Removal


  • This topic is locked This topic is locked
32 replies to this topic

#1 jttpo

jttpo

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 14 October 2013 - 10:21 PM

i have a virus in my desktop called Antivirus Security Pro.  I have been uable to remove it using your guides.  I am communicating using my laptop.  Can you help me please.



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 14 October 2013 - 11:01 PM


Hello jttpo

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
I want you to poste the FRST.txt report into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 10:27 AM

Hello Gringo,

 

I have gone through your instructions and the one I am unable to do is back up existing files.  The virus blocks me from doing anything as far as I can see.  There is information on the desktop that I don't want to lose.  I have determined that the desktop is a 32 bit and I have downloaded the Farbar Recovery Scan tool on to a flash drive using my laptop.  What should I do next?  Please keep in mind my computer abilities are limited 



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 15 October 2013 - 11:03 AM

go ahead and run frst and when we get the computer running with some normality you can then back things up
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 12:46 PM

Gringo,

I didn't get too far.  I got into the Advanced Boot options and then Repair your computer and then US- all OK.  The next window that came up is System Recovery options.  In the window it says To Access Recovery Options log in as a local user or To Access Command Prompt as well, log in using an Administrator.  In that window it then asks for user name: options are Home Group Users or Tom.  If I use Home Group Users it wants a password.  If I use Tom it opens another window called System Recovery Options.  The options are Start up Repair, System Restore, System Image Recovery, Windows Memory Diagnosis, Command Prompt.  These are not worded the same as your instructions, so I am not sure which to use.  The desk top runs on Windows 7



#6 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 04:24 PM

I went back at this again on my desktop and making some guesses I got through to the end of your instructions. I copied the FRST.txt report, but could find no way to send it to you. i tried to find a way in safe mode and couln't and then I restarted using the restart in safe mode which put me into normal windows and the virus was still there and wouldn't let me do anything.

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 15 October 2013 - 04:24 PM

Hello

from my instructions

Select Command Prompt <- this is what you need
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 04:39 PM

Ok, I got past the command prompt and put a new posting up regarding how to send the FRST.txt report to you. 

I looked at my settings under jttpo and says to follow.  I am not sure where I changed the setting to unfollow?



#9 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 05:01 PM

I finally figured out that a copy of the FRST.txt that you want is on my flashdrive. I copied and pased it below as requested


Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 03-10-2013
Ran by SYSTEM on MININT-MTUCU5Q on 15-10-2013 15:52:26
Running from E:\
Windows 7 Ultimate (X86) OS Language: English(US)
Internet Explorer Version 8
Boot Mode: Recovery

The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [SoundMan] - C:\Windows\SOUNDMAN.EXE [604704 2009-04-14] (Realtek Semiconductor Corp.)
HKLM\...\Run: [VTTimer] - C:\Windows\system32\VTTimer.exe [53248 2006-09-21] (S3 Graphics, Inc.)
HKLM\...\Run: [VTTrayp] - C:\Windows\system32\VTtrayp.exe [176128 2007-02-06] (S3 Graphics Co., Ltd.)
HKLM\...\Run: [GrooveMonitor] - C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe [31016 2006-10-26] (Microsoft Corporation)
HKLM\...\Run: [RecoverFromReboot] - C:\Windows\Temp\RecoverFromReboot.exe [151552 2003-07-08] (Motive Communications, Inc.) <===== ATTENTION
HKLM\...\Run: [] - [x]
HKLM\...\Run: [ApnUpdater] - C:\Program Files\Ask.com\Updater\Updater.exe [399312 2011-07-07] (Ask)
HKLM\...\Run: [SunJavaUpdateSched] - C:\Program Files\Common Files\Java\Java Update\jusched.exe [254696 2011-06-09] (Sun Microsystems, Inc.)
HKLM\...\Run: [TaskTray] - [x]
HKLM\...\Run: [Adobe Reader Speed Launcher] - C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe [37296 2012-03-27] (Adobe Systems Incorporated)
HKLM\...\Run: [Adobe ARM] - C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM\...\Run: [NPSStartup] - [x]
HKLM\...\Run: [Utility Chest Search Scope Monitor] - C:\PROGRA~1\UTILIT~2\bar\1.bin\49srchmn.exe [42536 2013-03-22] (MindSpark)
HKLM\...\Run: [UtilityChest_49 Browser Plugin Loader] - C:\PROGRA~1\UTILIT~2\bar\1.bin\49brmon.exe [30096 2013-03-22] (VER_COMPANY_NAME)
HKLM\...\Run: [APSDaemon] - C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe [59720 2013-04-21] (Apple Inc.)
HKLM\...\Run: [QuickTime Task] - C:\Program Files\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.)
HKLM\...\Run: [iTunesHelper] - C:\Program Files\iTunes\iTunesHelper.exe [152392 2013-10-01] (Apple Inc.)
HKLM\...\Run: [plistp] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\plistp.dll",GeneratorExit <===== ATTENTION
HKLM\...\Run: [redmc] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\redmc.dll",BufferError <===== ATTENTION
HKLM\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [683632 2013-10-10] ()
HKLM\...\Winlogon: [Userinit] C:\Windows\system32\userinit.exe,C:\ProgramData\gn373333\gn373333.exe -sm,
Winlogon\Notify\!SASWinLogon: C:\Program Files\SUPERAntiSpyware\SASWINLO.DLL (SUPERAntiSpyware.com)
HKU\Tom\...\Run: [Google Update] - C:\Users\Tom\AppData\Local\Google\Update\GoogleUpdate.exe [ 2012-01-03] (Google Inc.)
HKU\Tom\...\Run: [AutoStartNPSAgent] - C:\Program Files\Samsung\Samsung New PC Studio\NPSAgent.exe [ 2010-07-04] (Samsung Electronics Co., Ltd.)
HKU\Tom\...\Run: [pkmpbbfk] - C:\Users\Tom\AppData\Local\fcijenoj.exe [ 2013-10-10] ()
HKU\Tom\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [ 2013-10-10] ()

========================== Services (Whitelisted) =================

S2 !SASCORE; C:\Program Files\SUPERAntiSpyware\SASCORE.EXE [116608 2013-01-28] (SUPERAntiSpyware.com)
S2 AlotService; C:\Users\Tom\AppData\LocalLow\alotservice\alotservice.exe [256328 2013-06-05] (Inuvo Inc.)
S2 SITomcat; C:\Program Files\GM SPO\eSI\Apache Group\Tomcat 4.1\bin\tomcat.exe [65536 2003-10-27] (Alexandria Software Consulting)
S2 SITransbase; C:\Program Files\GM SPO\eSI\Transbase\tbmux32.exe [165376 2001-11-20] (TransAction Software, D 81737 Munich)
S2 UtilityChest_49Service; C:\PROGRA~1\UTILIT~2\bar\1.bin\49barsvc.exe [42504 2013-03-22] (COMPANYVERS_NAME)

==================== Drivers (Whitelisted) ====================

S3 ALCXWDM; C:\Windows\System32\drivers\RTKVAC.SYS [4172832 2009-06-18] (Realtek Semiconductor Corp.)
S0 CLFS; C:\Windows\System32\CLFS.sys [249408 2009-07-13] (Microsoft Corporation)
S2 DgiVecp; C:\Windows\System32\Drivers\DgiVecp.sys [41984 2004-05-17] (DeviceGuys, Inc.)
S3 FETNDIS; C:\Windows\System32\DRIVERS\FETN62.sys [51824 2010-09-27] (VIA Technologies, Inc. )
S3 FsUsbExDisk; C:\Windows\system32\FsUsbExDisk.SYS [36608 2010-06-14] ()
S1 SASDIFSV; C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS [12880 2011-07-22] (SUPERAdBlocker.com and SUPERAntiSpyware.com)
S1 SASKUTIL; C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS [67664 2011-07-12] (SUPERAdBlocker.com and SUPERAntiSpyware.com)
S3 viagfx; C:\Windows\System32\DRIVERS\vtmini.sys [281728 2007-03-08] (Copyright © VIA/S3 Graphics Co, Ltd.)

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-10-15 15:11 - 2013-10-15 15:11 - 00000000 ____D C:\FRST
2013-10-14 18:13 - 2013-10-14 18:21 - 00002516 _____ C:\Users\Tom\Desktop\Rkill.txt
2013-10-14 14:36 - 2013-10-14 14:36 - 00537200 _____ C:\Users\Tom\AppData\Local\lkgvranx.exe
2013-10-14 14:35 - 2013-10-14 14:35 - 00537200 _____ C:\Users\Tom\AppData\Local\gplvjsbc.exe
2013-10-14 14:34 - 2013-10-14 14:34 - 00537200 _____ C:\Users\Tom\AppData\Local\vswwfwif.exe
2013-10-14 14:33 - 2013-10-14 14:33 - 00204800 _____ () C:\Users\Tom\AppData\Local\nvbgglkv.exe
2013-10-10 20:26 - 2013-10-10 20:26 - 00065024 _____ C:\Windows\dwmions.dll
2013-10-10 20:15 - 2013-10-10 20:15 - 00056352 _____ C:\Users\Tom\AppData\Local\swdvibrb
2013-10-10 20:14 - 2013-10-15 13:16 - 00001666 _____ C:\Users\Tom\Desktop\Antivirus Security Pro.lnk
2013-10-10 20:14 - 2013-10-15 13:16 - 00000118 _____ C:\Users\Tom\Desktop\Antivirus Security Pro support.url
2013-10-10 20:14 - 2013-10-10 21:15 - 00065024 _____ C:\Windows\System32\dwmions.dll
2013-10-10 20:14 - 2013-10-10 20:14 - 00683632 _____ C:\Users\Tom\AppData\Local\wevasvef.exe
2013-10-10 20:13 - 2013-10-14 12:31 - 00000000 ____D C:\ProgramData\gn373333
2013-10-10 20:13 - 2013-10-10 20:13 - 00786432 _____ (Co.) C:\Users\Tom\AppData\Roaming\plistp.dll
2013-10-10 20:13 - 2013-10-10 20:13 - 00385024 _____ () C:\Users\Tom\AppData\Roaming\redmc.dll
2013-10-10 20:11 - 2013-10-10 20:11 - 00054784 _____ C:\Users\Tom\AppData\Local\fcijenoj.exe
2013-10-06 03:03 - 2013-10-06 03:03 - 00065536 ____H C:\Users\Tom\~archive.pst.tmp
2013-10-05 18:16 - 2013-10-05 18:16 - 00001753 _____ C:\Users\Public\Desktop\iTunes.lnk
2013-10-05 18:15 - 2013-10-05 18:16 - 00000000 ____D C:\ProgramData\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-10-05 18:15 - 2013-10-05 18:16 - 00000000 ____D C:\Program Files\iTunes
2013-10-05 18:15 - 2013-10-05 18:15 - 00000000 ____D C:\Program Files\iPod
2013-10-05 18:08 - 2013-10-05 18:08 - 00001815 _____ C:\Users\Public\Desktop\QuickTime Player.lnk
2013-10-05 18:07 - 2013-10-05 18:08 - 00000000 ____D C:\Program Files\QuickTime
2013-09-28 14:20 - 2013-09-28 14:20 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-28 Small Trailer
2013-09-16 19:23 - 2013-09-16 19:23 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-16 Edson - Sanitary Sewer Extension
2013-09-16 19:19 - 2013-09-16 19:19 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-16 Edson Sanitary Sewer

==================== One Month Modified Files and Folders =======

2013-10-15 15:11 - 2013-10-15 15:11 - 00000000 ____D C:\FRST
2013-10-15 13:47 - 2013-08-06 14:41 - 83449694 _____ C:\alotserviceruntime.log
2013-10-15 13:46 - 2009-07-13 20:39 - 00032744 _____ C:\Windows\setupact.log
2013-10-15 13:18 - 2009-07-13 20:34 - 00016944 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-10-15 13:18 - 2009-07-13 20:34 - 00016944 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-10-15 13:16 - 2013-10-10 20:14 - 00001666 _____ C:\Users\Tom\Desktop\Antivirus Security Pro.lnk
2013-10-15 13:16 - 2013-10-10 20:14 - 00000118 _____ C:\Users\Tom\Desktop\Antivirus Security Pro support.url
2013-10-14 18:23 - 2010-06-22 19:36 - 00717892 _____ C:\Windows\System32\PerfStringBackup.INI
2013-10-14 18:21 - 2013-10-14 18:13 - 00002516 _____ C:\Users\Tom\Desktop\Rkill.txt
2013-10-14 14:36 - 2013-10-14 14:36 - 00537200 _____ C:\Users\Tom\AppData\Local\lkgvranx.exe
2013-10-14 14:35 - 2013-10-14 14:35 - 00537200 _____ C:\Users\Tom\AppData\Local\gplvjsbc.exe
2013-10-14 14:34 - 2013-10-14 14:34 - 00537200 _____ C:\Users\Tom\AppData\Local\vswwfwif.exe
2013-10-14 14:33 - 2013-10-14 14:33 - 00204800 _____ () C:\Users\Tom\AppData\Local\nvbgglkv.exe
2013-10-14 12:31 - 2013-10-10 20:13 - 00000000 ____D C:\ProgramData\gn373333
2013-10-10 21:15 - 2013-10-10 20:14 - 00065024 _____ C:\Windows\System32\dwmions.dll
2013-10-10 20:26 - 2013-10-10 20:26 - 00065024 _____ C:\Windows\dwmions.dll
2013-10-10 20:15 - 2013-10-10 20:15 - 00056352 _____ C:\Users\Tom\AppData\Local\swdvibrb
2013-10-10 20:14 - 2013-10-10 20:14 - 00683632 _____ C:\Users\Tom\AppData\Local\wevasvef.exe
2013-10-10 20:14 - 2010-06-22 20:02 - 02077947 _____ C:\Windows\WindowsUpdate.log
2013-10-10 20:13 - 2013-10-10 20:13 - 00786432 _____ (Co.) C:\Users\Tom\AppData\Roaming\plistp.dll
2013-10-10 20:13 - 2013-10-10 20:13 - 00385024 _____ () C:\Users\Tom\AppData\Roaming\redmc.dll
2013-10-10 20:11 - 2013-10-10 20:11 - 00054784 _____ C:\Users\Tom\AppData\Local\fcijenoj.exe
2013-10-10 19:58 - 2012-01-25 14:14 - 89408512 _____ C:\Users\Tom\archive.pst
2013-10-09 19:26 - 2009-07-13 23:48 - 00000000 ___RD C:\Users\Public\Recorded TV
2013-10-09 05:12 - 2012-07-23 19:47 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-10-09 05:12 - 2011-05-30 17:38 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-10-06 03:03 - 2013-10-06 03:03 - 00065536 ____H C:\Users\Tom\~archive.pst.tmp
2013-10-06 03:03 - 2010-06-22 19:32 - 00000000 ____D C:\users\Tom
2013-10-05 18:16 - 2013-10-05 18:16 - 00001753 _____ C:\Users\Public\Desktop\iTunes.lnk
2013-10-05 18:16 - 2013-10-05 18:15 - 00000000 ____D C:\ProgramData\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-10-05 18:16 - 2013-10-05 18:15 - 00000000 ____D C:\Program Files\iTunes
2013-10-05 18:15 - 2013-10-05 18:15 - 00000000 ____D C:\Program Files\iPod
2013-10-05 18:15 - 2013-08-12 17:25 - 00000000 ____D C:\Program Files\Common Files\Apple
2013-10-05 18:08 - 2013-10-05 18:08 - 00001815 _____ C:\Users\Public\Desktop\QuickTime Player.lnk
2013-10-05 18:08 - 2013-10-05 18:07 - 00000000 ____D C:\Program Files\QuickTime
2013-10-04 18:50 - 2012-01-03 20:36 - 00002354 _____ C:\Users\Tom\Desktop\Google Chrome.lnk
2013-09-28 14:20 - 2013-09-28 14:20 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-28 Small Trailer
2013-09-16 19:23 - 2013-09-16 19:23 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-16 Edson - Sanitary Sewer Extension
2013-09-16 19:19 - 2013-09-16 19:19 - 00000000 ____D C:\Users\Tom\Desktop\2013-09-16 Edson Sanitary Sewer

Files to move or delete:
====================
C:\Windows\Temp\RecoverFromReboot.exe


Some content of TEMP:
====================
C:\Users\Tom\AppData\Local\Temp\6.0.20.16-EasyShrx.Dll
C:\Users\Tom\AppData\Local\Temp\GdiPlus.dll
C:\Users\Tom\AppData\Local\Temp\GoogleToolbarInstaller_en32_signed.exe
C:\Users\Tom\AppData\Local\Temp\InstallerMessageBox.exe
C:\Users\Tom\AppData\Local\Temp\jre-6u23-windows-i586-iftw-rv.exe
C:\Users\Tom\AppData\Local\Temp\NPSInstallerProxy.exe
C:\Users\Tom\AppData\Local\Temp\NPSInstallerProxyMessageBoxHookDll.dll
C:\Users\Tom\AppData\Local\Temp\OEMCFG.dll
C:\Users\Tom\AppData\Local\Temp\OEMDM.dll
C:\Users\Tom\AppData\Local\Temp\OEMIMG.dll
C:\Users\Tom\AppData\Local\Temp\OEMTW.dll
C:\Users\Tom\AppData\Local\Temp\OEMUI.dll
C:\Users\Tom\AppData\Local\Temp\ose00000.exe
C:\Users\Tom\AppData\Local\Temp\Ssdevm.dll
C:\Users\Tom\AppData\Local\Temp\Ssuiext.dll
C:\Users\Tom\AppData\Local\Temp\SSUPDATE.EXE
C:\Users\Tom\AppData\Local\Temp\Ssusbpn.dll
C:\Users\Tom\AppData\Local\Temp\Sswiadrv.dll
C:\Users\Tom\AppData\Local\Temp\WIAEH.dll
C:\Users\Tom\AppData\Local\Temp\WIAIPH.dll
C:\Users\Tom\AppData\Local\Temp\WIASTIIO.dll
C:\Users\Tom\AppData\Local\Temp\_is6E3.exe


==================== Known DLLs (Whitelisted) ============


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

6
Restore point made on: 2013-08-19 22:00:29
Restore point made on: 2013-09-03 16:48:17
Restore point made on: 2013-09-10 22:00:21
Restore point made on: 2013-09-17 22:00:24
Restore point made on: 2013-09-25 22:00:17
Restore point made on: 2013-10-03 09:27:17

==================== Memory info ===========================

Percentage of memory in use: 36%
Total physical RAM: 959.55 MB
Available physical RAM: 609.98 MB
Total Pagefile: 959.55 MB
Available Pagefile: 610.29 MB
Total Virtual: 2047.88 MB
Available Virtual: 1956.07 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:114.49 GB) (Free:56.13 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive e: (STORE N GO) (Removable) (Total:3.72 GB) (Free:3.71 GB) FAT32
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 114 GB) (Disk ID: 7C097C09)
Partition 1: (Active) - (Size=114 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (MBR Code: Windows XP) (Size: 4 GB) (Disk ID: C3072E18)
Partition 1: (Not Active) - (Size=4 GB) - (Type=0C)


LastRegBack: 2013-09-30 22:07

==================== End Of Log ============================

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 15 October 2013 - 06:52 PM



Hello jttpo



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKLM\...\Run: [plistp] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\plistp.dll",GeneratorExit <===== ATTENTION
HKLM\...\Run: [redmc] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\redmc.dll",BufferError <===== ATTENTION
HKLM\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [683632 2013-10-10] ()
HKLM\...\Winlogon: [Userinit] C:\Windows\system32\userinit.exe,C:\ProgramData\gn373333\gn373333.exe -sm,
HKU\Tom\...\Run: [pkmpbbfk] - C:\Users\Tom\AppData\Local\fcijenoj.exe [ 2013-10-10] ()
HKU\Tom\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [ 2013-10-10] ()
2013-10-10 20:14 - 2013-10-15 13:16 - 00001666 _____ C:\Users\Tom\Desktop\Antivirus Security Pro.lnk
2013-10-10 20:14 - 2013-10-15 13:16 - 00000118 _____ C:\Users\Tom\Desktop\Antivirus Security Pro support.url
2013-10-10 20:14 - 2013-10-10 21:15 - 00065024 _____ C:\Windows\System32\dwmions.dll
2013-10-10 20:14 - 2013-10-10 20:14 - 00683632 _____ C:\Users\Tom\AppData\Local\wevasvef.exe
2013-10-10 20:13 - 2013-10-14 12:31 - 00000000 ____D C:\ProgramData\gn373333
2013-10-10 20:13 - 2013-10-10 20:13 - 00786432 _____ (Co.) C:\Users\Tom\AppData\Roaming\plistp.dll
2013-10-10 20:13 - 2013-10-10 20:13 - 00385024 _____ () C:\Users\Tom\AppData\Roaming\redmc.dll
2013-10-10 20:11 - 2013-10-10 20:11 - 00054784 _____ C:\Users\Tom\AppData\Local\fcijenoj.exe
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 08:35 PM

Gringo,

Here are the fixlog results. I rebooted into normal mode and my e-mail opened OK and so did my internet. We are winning.




Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 03-10-2013
Ran by SYSTEM at 2013-10-15 19:26:59 Run:1
Running from E:\
Boot Mode: Recovery

==============================================

Content of fixlist:
*****************
HKLM\...\Run: [plistp] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\plistp.dll",GeneratorExit <===== ATTENTION
HKLM\...\Run: [redmc] - "C:\Windows\System32\rundll32.exe" "C:\Users\Tom\AppData\Roaming\redmc.dll",BufferError <===== ATTENTION
HKLM\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [683632 2013-10-10] ()
HKLM\...\Winlogon: [Userinit] C:\Windows\system32\userinit.exe,C:\ProgramData\gn373333\gn373333.exe -sm,
HKU\Tom\...\Run: [pkmpbbfk] - C:\Users\Tom\AppData\Local\fcijenoj.exe [ 2013-10-10] ()
HKU\Tom\...\Run: [AS2014] - C:\ProgramData\gn373333\gn373333.exe [ 2013-10-10] ()
2013-10-10 20:14 - 2013-10-15 13:16 - 00001666 _____ C:\Users\Tom\Desktop\Antivirus Security Pro.lnk
2013-10-10 20:14 - 2013-10-15 13:16 - 00000118 _____ C:\Users\Tom\Desktop\Antivirus Security Pro support.url
2013-10-10 20:14 - 2013-10-10 21:15 - 00065024 _____ C:\Windows\System32\dwmions.dll
2013-10-10 20:14 - 2013-10-10 20:14 - 00683632 _____ C:\Users\Tom\AppData\Local\wevasvef.exe
2013-10-10 20:13 - 2013-10-14 12:31 - 00000000 ____D C:\ProgramData\gn373333
2013-10-10 20:13 - 2013-10-10 20:13 - 00786432 _____ (Co.) C:\Users\Tom\AppData\Roaming\plistp.dll
2013-10-10 20:13 - 2013-10-10 20:13 - 00385024 _____ () C:\Users\Tom\AppData\Roaming\redmc.dll
2013-10-10 20:11 - 2013-10-10 20:11 - 00054784 _____ C:\Users\Tom\AppData\Local\fcijenoj.exe
*****************

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\plistp => Value deleted successfully.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\redmc => Value deleted successfully.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\\AS2014 => Value deleted successfully.
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Userinit => Value was restored successfully.
HKU\Tom\Software\Microsoft\Windows\CurrentVersion\Run\\pkmpbbfk => Value deleted successfully.
HKU\Tom\Software\Microsoft\Windows\CurrentVersion\Run\\AS2014 => Value deleted successfully.
C:\Users\Tom\Desktop\Antivirus Security Pro.lnk => Moved successfully.
C:\Users\Tom\Desktop\Antivirus Security Pro support.url => Moved successfully.
C:\Windows\System32\dwmions.dll => Moved successfully.
C:\Users\Tom\AppData\Local\wevasvef.exe => Moved successfully.
C:\ProgramData\gn373333 => Moved successfully.
C:\Users\Tom\AppData\Roaming\plistp.dll => Moved successfully.
C:\Users\Tom\AppData\Roaming\redmc.dll => Moved successfully.
C:\Users\Tom\AppData\Local\fcijenoj.exe => Moved successfully.

==== End of Fixlog ====

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 15 October 2013 - 08:59 PM



Hello jttpo

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 15 October 2013 - 09:59 PM


Gringo,

Here is the ADW cleaner report. I have a problem with the Junkware removal tool because I don't know how to shutdown the software protection. The one I know I have is SuperAntiSpyware and I have been through that program and I don't know how to shut it down without removing it completely. I am not sure if there are any other protection programs that I am not aware of.





# AdwCleaner v3.007 - Report created 15/10/2013 at 20:17:20
# Updated 09/10/2013 by Xplode
# Operating System : Windows 7 Ultimate (32 bits)
# Username : Tom - T-PC
# Running from : C:\Users\Tom\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

[#] Service Deleted : AlotService

***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\Ask
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Inbox Toolbar
Folder Deleted : C:\Program Files\alotappbar
Folder Deleted : C:\Program Files\Ask.com
Folder Deleted : C:\Program Files\driver-soft
Folder Deleted : C:\Program Files\Inbox Toolbar
Folder Deleted : C:\Program Files\utilitychest_49
Folder Deleted : C:\Users\Tom\AppData\Local\iac
Folder Deleted : C:\Users\Tom\AppData\Local\utilitychest_49
Folder Deleted : C:\Users\Tom\AppData\LocalLow\alotappbar
Folder Deleted : C:\Users\Tom\AppData\LocalLow\alotservice
Folder Deleted : C:\Users\Tom\AppData\LocalLow\AskToolbar
Folder Deleted : C:\Users\Tom\AppData\LocalLow\Inbox Toolbar
Folder Deleted : C:\Users\Tom\AppData\LocalLow\utilitychest_49
File Deleted : C:\alotserviceruntime.log
File Deleted : C:\Windows\System32\Tasks\Scheduled Update for Ask Toolbar

***** [ Shortcuts ] *****


***** [ Registry ] *****

[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Scheduled Update for Ask Toolbar
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{3C1CDB65-2AE1-4349-999C-010A4843C82F}
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{3C1CDB65-2AE1-4349-999C-010A4843C82F}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GenericAskToolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\GenericAskToolbar.ToolbarWnd
Key Deleted : HKLM\SOFTWARE\Classes\GenericAskToolbar.ToolbarWnd.1
Key Deleted : HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\inbox
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\alotservice_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\alotservice_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASMANCS
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [ApnUpdater]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [Utility Chest Search Scope Monitor]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [UtilityChest_49 Browser Plugin Loader]
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{06E05B40-77FA-40B6-9077-ED1A7577B1EF}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{13119113-0854-469D-807A-171568457991}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2CE4D4CF-B278-4126-AD1E-B622DA2E8339}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{33119133-0854-469D-807A-171568457991}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{58F7B5CA-1162-42E8-8BBC-D543B4EDD780}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{85F5CF95-EC8F-49FC-BB3F-38C79455CBA2}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A531D99C-5A22-449B-83DA-872725C6D0ED}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{23119123-0854-469D-807A-171568457991}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2CE4D4CF-B278-4126-AD1E-B622DA2E8339}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{03119103-0854-469D-807A-171568457991}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2996F0E7-292B-4CAE-893F-47B8B1C05B56}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06E05B40-77FA-40B6-9077-ED1A7577B1EF}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{58F7B5CA-1162-42E8-8BBC-D543B4EDD780}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{85F5CF95-EC8F-49FC-BB3F-38C79455CBA2}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{042DA63B-0933-403D-9395-B49307691690}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{06E05B40-77FA-40B6-9077-ED1A7577B1EF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{58F7B5CA-1162-42E8-8BBC-D543B4EDD780}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{85F5CF95-EC8F-49FC-BB3F-38C79455CBA2}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A531D99C-5A22-449B-83DA-872725C6D0ED}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{06E05B40-77FA-40B6-9077-ED1A7577B1EF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{58F7B5CA-1162-42E8-8BBC-D543B4EDD780}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{85F5CF95-EC8F-49FC-BB3F-38C79455CBA2}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A531D99C-5A22-449B-83DA-872725C6D0ED}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D4027C7F-154A-4066-A1AD-4243D8127440}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{343263AB-D732-4066-A274-4A487A07F108}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C42103E4-7D10-4CC9-B2B4-C546BCCF8706}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{84DC9F6C-C9A5-4C64-AB67-D6EF60F963C8}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{A531D99C-5A22-449B-83DA-872725C6D0ED}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{84DC9F6C-C9A5-4C64-AB67-D6EF60F963C8}
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{A531D99C-5A22-449B-83DA-872725C6D0ED}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D3D233D5-9F6D-436C-B6C7-E63F77503B30}]
Key Deleted : HKCU\Software\APN
Key Deleted : HKCU\Software\Ask.com
Key Deleted : HKCU\Software\IM
Key Deleted : HKCU\Software\ImInstaller
Key Deleted : HKCU\Software\Inbox Toolbar
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKCU\Software\AppDataLow\Software\alotAppbar
Key Deleted : HKCU\Software\AppDataLow\Software\AskToolbar
Key Deleted : HKLM\Software\APN
Key Deleted : HKLM\Software\AskToolbar
Key Deleted : HKLM\Software\Inbox Toolbar
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{612AD33D-9824-4E87-8396-92374E91C4BB}_is1
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\alotAppbar
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0CFE535C35F99574E8340BFA75BF92C2
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\261F213D1F55267499B1F87D0CC3BCF7
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\741B4ADF27276464790022C965AB6DA8
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7DE196B10195F5647A2B21B761F3DE01
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D4F5849367142E4685ED8C25E44C5ED
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5875B04372C19545BEB90D4D606C472
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A876D9E80B896EC44A8620248CC79296
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B66FFAB725B92594C986DE826A867888
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Features\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F928123A039649549966D4C29D35B1C9

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.7600.16385

Setting Restored : HKCU\Software\Microsoft\Internet Explorer\Main [Search Bar]

-\\ Google Chrome v

[ File : C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [12038 octets] - [15/10/2013 20:14:15]
AdwCleaner[R1].txt - [12158 octets] - [15/10/2013 20:16:26]
AdwCleaner[S0].txt - [272 octets] - [15/10/2013 20:15:38]
AdwCleaner[S1].txt - [12098 octets] - [15/10/2013 20:17:20]

########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [12159 octets] ##########

#14 jttpo

jttpo
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:44 PM

Posted 16 October 2013 - 10:15 AM

Gringo,

 

Should I run the Junkware Removal with the Super AntiSpyWare still on the computer?



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:08:44 PM

Posted 16 October 2013 - 01:34 PM

Turn it off if you can


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users