Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Zone Alarm Fails to update and Norton Installer Encounters an Error


  • This topic is locked This topic is locked
15 replies to this topic

#1 yMidnite

yMidnite

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 12 April 2015 - 08:30 PM

Originally my friend sent this to me because he was not able to connect to the internet. He lives out of state, so I was not able to see the problem at his location. I am currently not having any connection issues, however, Zone Alarm Update errors and Norton Security Scan installer errors and does not install. I ran multiple scans with Malwarebytes, Superantispyware, Emsisoft, and Hitman Pro. All of these produced similar results. I removed the hard drive and attached it to another computer running Avast and another running ZA, nothing to note from either scan. I have uninstalled and reinstalled ZA and still cannot get it to update and Norton Security scan will not install. I am thinking that there is something I cannot find. Thanks in advance for your help.

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 12-04-2015
Ran by Petty (administrator) on PETTY-ACER on 12-04-2015 18:50:34
Running from C:\Users\Petty\Downloads
Loaded Profiles: Petty (Available profiles: Petty)
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: English (United States)
Internet Explorer Version 11 (Default browser: Chrome)
Boot Mode: Normal
 
==================== Processes (Whitelisted) =================
 
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
 
(AMD) C:\Windows\System32\atiesrxx.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Check Point Software Technologies Ltd.) C:\Program Files (x86)\CheckPoint\ZoneAlarm\vsmon.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\AKL\AkSVC.exe
(ELAN Microelectronics Corp.) C:\Program Files\Elantech\ETDCtrl.exe
(Dritek System Inc.) C:\Program Files (x86)\Launch Manager\dsiwmis.exe
(Acer Incorporated) C:\Program Files\Acer\Acer ePower Management\ePowerSvc.exe
(Dritek System Inc.) C:\Program Files (x86)\Launch Manager\LMworker.exe
(Acer Incorporated) C:\Program Files (x86)\Acer\Registration\GREGsvc.exe
(Dritek System Inc.) C:\Program Files (x86)\Launch Manager\LMutilps32.exe
() C:\Program Files (x86)\Canon\IJPLM\ijplmsvc.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Acer Incorporated) C:\Program Files\Acer\Acer Updater\UpdaterService.exe
(NTI Corporation) C:\Program Files (x86)\NTI\Acer Backup Manager\IScheduleSvc.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftvsa.exe
(TeamViewer GmbH) C:\Program Files (x86)\TeamViewer\Version9\TeamViewer_Service.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\AKL\AkSA.exe
(TomTom) C:\Program Files (x86)\TomTom HOME 2\TomTomHOMEService.exe
(Check Point Software Technologies, Ltd.) C:\Program Files (x86)\CheckPoint\ZoneAlarm\ZAPrivacyService.exe
(NTI Corporation) C:\Program Files (x86)\NTI\Acer Backup Manager\BackupManagerTray.exe
(Check Point Software Technologies Ltd.) C:\Program Files (x86)\CheckPoint\AntiTheft\Antitheft.exe
(Dritek System Inc.) C:\Program Files (x86)\Launch Manager\LManager.exe
(Dolby Laboratories Inc.) C:\Dolby PCEE4\pcee4.exe
(Dritek System Inc.) C:\Program Files (x86)\Launch Manager\MMDx64Fx.exe
(CANON INC.) C:\Program Files (x86)\Canon\Quick Menu\CNQMMAIN.EXE
(CANON INC.) C:\Program Files (x86)\Canon\IJ Network Scanner Selector EX\CNMNSST.exe
(Check Point Software Technologies Ltd.) C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe
(Check Point Software Technologies, Ltd.) C:\Program Files (x86)\CheckPoint\ZoneAlarm\ThreatEmulation.exe
(CyberLink Corp.) C:\Program Files (x86)\Acer\clear.fi\MVP\clear.fiAgent.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft Application Virtualization Client\sftlist.exe
(CyberLink) C:\Program Files (x86)\Acer\clear.fi\MVP\Kernel\DMR\DMREngine.exe
(Microsoft Corporation) C:\Program Files (x86)\Common Files\microsoft shared\Virtualization Handler\CVHSVC.EXE
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(ELAN Microelectronics Corp.) C:\Program Files\Elantech\ETDCtrlHelper.exe
(Microsoft Corporation) C:\Windows\splwow64.exe
(CANON INC.) C:\Program Files (x86)\Canon\Quick Menu\CNQMUPDT.EXE
(CANON INC.) C:\Program Files (x86)\Canon\Quick Menu\CNQMSWCS.EXE
(Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
(ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
(Google Inc.) C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
(Trend Micro Inc.) C:\Users\Petty\Downloads\HijackThis.exe
(Google Inc.) C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
 
 
==================== Registry (Whitelisted) ==================
 
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
 
HKLM\...\Run: [ETDCtrl] => C:\Program Files\Elantech\ETDCtrl.exe [2589992 2011-04-05] (ELAN Microelectronics Corp.)
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [12673128 2011-08-16] (Realtek Semiconductor)
HKLM\...\Run: [RtHDVBg_Dolby] => C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe [2277480 2011-08-16] (Realtek Semiconductor)
HKLM\...\Run: [ISW] => C:\Program Files (x86)\CheckPoint\AKL\AkSA.exe [935544 2014-07-17] (Check Point Software Technologies LTD)
HKLM-x32\...\Run: [BackupManagerTray] => C:\Program Files (x86)\NTI\Acer Backup Manager\BackupManagerTray.exe [297280 2011-04-23] (NTI Corporation)
HKLM-x32\...\Run: [LManager] => C:\Program Files (x86)\Launch Manager\LManager.exe [1103440 2011-06-30] (Dritek System Inc.)
HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [343168 2011-10-12] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [Dolby Advanced Audio v2] => C:\Dolby PCEE4\pcee4.exe [506712 2011-06-01] (Dolby Laboratories Inc.)
HKLM-x32\...\Run: [CanonQuickMenu] => C:\Program Files (x86)\Canon\Quick Menu\CNQMMAIN.EXE [1282120 2013-05-02] (CANON INC.)
HKLM-x32\...\Run: [IJNetworkScannerSelectorEX] => C:\Program Files (x86)\Canon\IJ Network Scanner Selector EX\CNMNSST.exe [453736 2013-02-19] (CANON INC.)
HKLM-x32\...\Run: [ZoneAlarm] => C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe [137352 2014-08-13] (Check Point Software Technologies Ltd.)
HKU\S-1-5-19\...\RunOnce: [IsMyWinLockerReboot] => msiexec.exe /qn /x{voidguid}
HKU\S-1-5-20\...\RunOnce: [IsMyWinLockerReboot] => msiexec.exe /qn /x{voidguid}
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\Run: [Google Update] => C:\Users\Petty\AppData\Local\Google\Update\GoogleUpdate.exe [116648 2012-08-27] (Google Inc.)
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {2e497db7-f037-11e1-a93c-dc0ea1230d8e} - E:\WIN\setup.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {68f35def-5c7a-11e3-863f-dc0ea1230d8e} - E:\Windows\PTMHS291LVW_V4_14_1_0.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {8b09404b-0285-11e3-bdcb-dc0ea1230d8e} - E:\win\setup.exe -phs
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\Control Panel\Desktop\\SCRNSAVE.EXE -> C:\Windows\system32\PhotoScreensaver.scr [477696 2010-11-20] (Microsoft Corporation)
HKU\S-1-5-18\...\RunOnce: [IsMyWinLockerReboot] => msiexec.exe /qn /x{voidguid}
BootExecute: autocheck autochk * bootdelete
 
==================== Internet (Whitelisted) ====================
 
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
 
ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled.
ProxyServer: [.DEFAULT] => http=127.0.0.1:55960;https=127.0.0.1:55960
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/en-us/?pc=U305&ocid=U305DHP
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://acer.msn.com
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=AARTDF&pc=MAAR&src=IE-SearchBox
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=AARTDF&pc=MAAR&src=IE-SearchBox
SearchScopes: HKLM-x32 -> DefaultScope {4AB8A1B5-D909-45A6-8E29-36071A724244} URL = 
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=AARTDF&pc=MAAR&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = 
SearchScopes: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> {4AB8A1B5-D909-45A6-8E29-36071A724244} URL = http://www.bing.com/search?FORM=U147DF&PC=U147&dt=072813&q={searchTerms}&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> {9E015857-B29C-4A23-A7DF-69AE2E506955} URL = http://search.zonealarm.com/search?src=sp&tbid=base2013&Lan=en&q={searchTerms}&gu=ed62f1f80d584d3192d8db725e8d5d05&tu=10GX0006D2B000c&sku=&tstsId=&ver=&&r=487
BHO: Canon Easy-WebPrint EX BHO -> {3785D0AD-BFFF-47F6-BF5B-A587C162FED9} -> C:\Program Files (x86)\Canon\Easy-WebPrint EX\addon64\ewpexbho.dll [2014-01-24] (CANON INC.)
BHO: SteadyVideoBHO Class -> {6C680BAE-655C-4E3D-8FC4-E6A520C3D928} -> C:\Program Files\AMD\SteadyVideo\SteadyVideo.dll [2011-06-07] (Advanced Micro Devices)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2011-03-28] (Microsoft Corp.)
BHO-x32: Canon Easy-WebPrint EX BHO -> {3785D0AD-BFFF-47F6-BF5B-A587C162FED9} -> C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexbho.dll [2014-01-24] (CANON INC.)
BHO-x32: SteadyVideoBHO Class -> {6C680BAE-655C-4E3D-8FC4-E6A520C3D928} -> C:\Program Files (x86)\amd\SteadyVideo\SteadyVideo.dll [2011-06-07] (Advanced Micro Devices)
BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre7\bin\ssv.dll [2013-12-18] (Oracle Corporation)
BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2011-03-28] (Microsoft Corp.)
BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll [2013-12-18] (Oracle Corporation)
Toolbar: HKLM - Canon Easy-WebPrint EX - {759D9886-0C6F-4498-BAB6-4A5F47C6C72F} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\addon64\ewpexhlp.dll [2014-01-24] (CANON INC.)
Toolbar: HKLM-x32 - Canon Easy-WebPrint EX - {759D9886-0C6F-4498-BAB6-4A5F47C6C72F} - C:\Program Files (x86)\Canon\Easy-WebPrint EX\ewpexhlp.dll [2014-01-24] (CANON INC.)
Toolbar: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> No Name - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} -  No File
Filter: video/mp4 - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files\AMD\SteadyVideo\VideoMIMEFilter.dll [2011-06-07] (Advanced Micro Devices)
Filter-x32: video/mp4 - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll [2011-06-07] (Advanced Micro Devices)
Filter: video/x-flv - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files\AMD\SteadyVideo\VideoMIMEFilter.dll [2011-06-07] (Advanced Micro Devices)
Filter-x32: video/x-flv - {20C75730-7C25-476B-95DC-C65810F9E489} - C:\Program Files (x86)\amd\SteadyVideo\VideoMIMEFilter.dll [2011-06-07] (Advanced Micro Devices)
Winsock: Catalog9 01 bmnet.dll File Not found ()
Winsock: Catalog9 02 bmnet.dll File Not found ()
Winsock: Catalog9 03 bmnet.dll File Not found ()
Tcpip\Parameters: [DhcpNameServer] 192.168.0.1
 
FireFox:
========
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-13] ( Microsoft Corporation)
FF Plugin-x32: @canon.com/EPPEX -> C:\Program Files (x86)\Canon\My Image Garden\AddOn\CIG\npmigfpi.dll [2011-11-30] (CANON INC.)
FF Plugin-x32: @checkpoint.com/FFApi -> C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\npFFApi.dll No File
FF Plugin-x32: @java.com/DTPlugin,version=10.51.2 -> C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll [2013-12-18] (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.51.2 -> C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll [2013-12-18] (Oracle Corporation)
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files (x86)\Microsoft Silverlight\5.1.30514.0\npctrl.dll [2014-05-13] ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~2\MICROS~4\Office14\NPSPWRAP.DLL [2010-03-24] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2011-05-13] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3538.0513 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2011-05-13] (Microsoft Corporation)
FF Plugin-x32: @WildTangent.com/GamesAppPresenceDetector,Version=1.0 -> C:\Program Files (x86)\WildTangent Games\App\BrowserIntegration\Registered\3\NP_wtapp.dll [2012-10-20] ()
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll [2014-12-03] (Adobe Systems Inc.)
FF Plugin HKU\S-1-5-21-2122515879-1497535132-2502957043-1000: @tools.google.com/Google Update;version=3 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.26.9\npGoogleUpdate3.dll [2015-02-06] (Google Inc.)
FF Plugin HKU\S-1-5-21-2122515879-1497535132-2502957043-1000: @tools.google.com/Google Update;version=9 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.26.9\npGoogleUpdate3.dll [2015-02-06] (Google Inc.)
FF HKLM-x32\...\Firefox\Extensions: [{FFB96CC1-7EB3-449D-B827-DB661701C6BB}] - C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker
 
Chrome: 
=======
CHR HomePage: Default -> hxxp://google.com/
CHR StartupUrls: Default -> "https://www.google.com/"
CHR DefaultSuggestURL: Default -> {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}
CHR Profile: C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Google Slides) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2014-09-11]
CHR Extension: (Google Docs) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2014-09-11]
CHR Extension: (Google Drive) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2014-09-11]
CHR Extension: (YouTube) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2012-08-29]
CHR Extension: (Google Search) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2014-09-11]
CHR Extension: (Google Sheets) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2014-09-11]
CHR Extension: (MSN Homepage) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\fkkcgfbgohboipdhliafmacjnhjbhmim [2014-12-18]
CHR Extension: (World of Solitaire) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\ifbnllnaaaohekjkcpfdllhhjijnidgn [2012-08-29]
CHR Extension: (Roomstyler 3D planner) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfnniehafojoidolddmhfnpnbiolbppi [2012-08-29]
CHR Extension: (Chrome Hotword Shared Module) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\lccekmodgklaepjeofjdjpbminllajkg [2015-03-14]
CHR Extension: (Google Wallet) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-08-22]
CHR Extension: (Gmail) - C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2014-09-11]
CHR HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [fkkcgfbgohboipdhliafmacjnhjbhmim] - https://clients2.google.com/service/update2/crx
StartMenuInternet: Google Chrome.S3QQH2FFYXYMMVCZJDRGW76JBM - C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
 
==================== Services (Whitelisted) =================
 
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
 
S3 CASprint; C:\Program Files (x86)\Sprint\Sprint SmartView\ConAppsSvc.exe [124224 2009-09-10] (SmithMicro Inc.)
R2 IJPLMSVC; C:\Program Files (x86)\Canon\IJPLM\IJPLMSVC.EXE [140456 2012-03-27] ()
R2 IswSvc; C:\Program Files (x86)\CheckPoint\AKL\AkSVC.exe [1144952 2014-07-17] (Check Point Software Technologies LTD)
R2 NTI IScheduleSvc; C:\Program Files (x86)\NTI\Acer Backup Manager\IScheduleSvc.exe [256832 2011-04-23] (NTI Corporation)
S3 SprintRcAppSvc; C:\Program Files (x86)\Sprint\Sprint SmartView\RcAppSvc.exe [120128 2009-09-10] (SmithMicro Inc.)
R2 vsmon; C:\Program Files (x86)\CheckPoint\ZoneAlarm\vsmon.exe [3596752 2014-08-13] (Check Point Software Technologies Ltd.)
R2 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2013-05-26] (Microsoft Corporation)
R2 ZAPrivacyService; C:\Program Files (x86)\CheckPoint\ZoneAlarm\ZaPrivacyService.exe [96272 2014-08-13] (Check Point Software Technologies, Ltd.)
R2 ZoneAlarm AntiTheft; C:\Program Files (x86)\CheckPoint\AntiTheft\Antitheft.exe [3129992 2014-08-13] (Check Point Software Technologies Ltd.)
 
==================== Drivers (Whitelisted) ====================
 
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
 
U0 BMLoad; C:\Windows\SysWOW64\drivers\BMLoad.sys [22656 2009-09-10] (Bytemobile, Inc.) [File not signed]
S3 cleanhlp; C:\EEK\bin\cleanhlp64.sys [57024 2015-04-12] (Emsisoft GmbH)
S3 hitmanpro37; C:\Windows\system32\drivers\hitmanpro37.sys [43664 2015-04-12] ()
S3 icsak; C:\Program Files (x86)\CheckPoint\AKL\ak\icsak.sys [48512 2014-07-17] (Check Point Software Technologies LTD)
R2 ISWKL; C:\Program Files (x86)\CheckPoint\AKL\ISWKL.sys [54144 2014-07-17] (Check Point Software Technologies LTD)
R0 KL1; C:\Windows\System32\DRIVERS\kl1.sys [7717984 2014-06-11] (Kaspersky Lab ZAO)
U5 klflt; C:\Windows\System32\Drivers\klflt.sys [92768 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [490592 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2014-06-11] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [54104 2014-06-11] (Kaspersky Lab)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [177760 2014-06-11] (Kaspersky Lab ZAO)
S3 PCTINDIS5X64; C:\Windows\system32\PCTINDIS5X64.SYS [43032 2009-09-10] (Smith Micro Inc.)
S3 swHSnet00; C:\Windows\System32\DRIVERS\swHSnet00.sys [377616 2013-04-30] (Sierra Wireless Incorporated)
S3 swHSser00; C:\Windows\System32\DRIVERS\swHSser00.sys [269512 2012-12-17] (Sierra Wireless Incorporated)
S3 swiwdmbx; C:\Windows\System32\DRIVERS\swiwdmbx.sys [114424 2012-12-04] (Sierra Wireless Inc.)
S3 swiwdmbxhs; C:\Windows\System32\DRIVERS\swiwdmbxhs.sys [114424 2012-12-04] (Sierra Wireless Inc.)
S3 swmsflt; C:\Windows\System32\DRIVERS\swmsflt.sys [34304 2009-09-10] ()
S3 SWNC5E00; C:\Windows\System32\DRIVERS\SWNC5E00.sys [202248 2009-09-10] (Sierra Wireless Inc.)
R3 swvspser; C:\Windows\System32\DRIVERS\swvspser.sys [34304 2009-08-13] (Sierra Wireless Inc.)
S1 tcpipBM; C:\Windows\SysWow64\Drivers\tcpipBM.sys [18816 2009-09-10] (Bytemobile, Inc.)
R1 Vsdatant; C:\Windows\System32\DRIVERS\vsdatant.sys [450456 2014-08-13] (Check Point Software Technologies Ltd.)
S1 SASDIFSV; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASDIFSV64.SYS [X]
S1 SASKUTIL; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASKUTIL64.SYS [X]
 
==================== NetSvcs (Whitelisted) ===================
 
(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)
 
 
==================== One Month Created Files and Folders ========
 
(If an entry is included in the fixlist, the file\folder will be moved.)
 
2015-04-12 18:50 - 2015-04-12 18:52 - 00020551 _____ () C:\Users\Petty\Downloads\FRST.txt
2015-04-12 18:50 - 2015-04-12 18:50 - 00000000 ____D () C:\FRST
2015-04-12 18:49 - 2015-04-12 18:49 - 02096640 _____ (Farbar) C:\Users\Petty\Downloads\FRST64.exe
2015-04-12 18:49 - 2015-04-12 18:49 - 00011168 _____ () C:\Users\Petty\Desktop\hijackthis.log
2015-04-12 18:34 - 2015-04-12 18:34 - 00011168 _____ () C:\Users\Petty\Downloads\hijackthis.log
2015-04-12 18:31 - 2015-04-12 18:32 - 00388608 _____ (Trend Micro Inc.) C:\Users\Petty\Downloads\HijackThis.exe
2015-04-12 18:21 - 2015-04-12 18:25 - 00431087 _____ () C:\Windows\system32\Drivers\vsconfig.xml
2015-04-12 18:21 - 2014-06-11 10:09 - 00177760 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kneps.sys
2015-04-12 18:21 - 2014-06-11 10:09 - 00054104 _____ (Kaspersky Lab) C:\Windows\system32\Drivers\kltdi.sys
2015-04-12 18:20 - 2015-04-12 18:20 - 00000762 _____ () C:\Users\Public\Desktop\ZoneAlarm Security.lnk
2015-04-12 18:20 - 2015-04-12 18:20 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Check Point
2015-04-12 18:20 - 2014-06-11 10:09 - 07717984 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kl1.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00490592 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00092768 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00029792 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klim6.sys
2015-04-12 18:08 - 2015-04-12 18:21 - 00000000 ____D () C:\Program Files (x86)\CheckPoint
2015-04-12 17:55 - 2015-04-12 17:55 - 00027904 _____ () C:\Windows\system32\.crusader
2015-04-12 17:43 - 2015-04-12 17:57 - 00043664 _____ () C:\Windows\system32\Drivers\hitmanpro37.sys
2015-04-12 17:42 - 2015-04-12 17:42 - 00000000 ____D () C:\Program Files\HitmanPro
2015-04-12 17:39 - 2015-04-12 17:55 - 00000000 ____D () C:\ProgramData\HitmanPro
2015-04-12 15:26 - 2015-04-12 15:28 - 00000000 ____D () C:\EEK
2015-04-12 15:26 - 2015-04-12 15:26 - 00000747 _____ () C:\Users\Petty\Desktop\Start Emsisoft Emergency Kit.lnk
2015-04-12 14:29 - 2015-04-12 14:29 - 00000000 ____D () C:\Users\Petty\AppData\Roaming\SUPERAntiSpyware.com
2015-04-12 14:29 - 2015-04-12 14:29 - 00000000 ____D () C:\ProgramData\SUPERAntiSpyware.com
2015-04-09 19:06 - 2015-04-09 19:06 - 00779704 _____ (Symantec) C:\Users\Petty\Downloads\Setup.exe
2015-04-09 15:58 - 2015-04-12 18:21 - 00000000 ____D () C:\Program Files (x86)\PC Tune-Up
2015-04-08 17:14 - 2015-04-08 17:16 - 00000000 ___SD () C:\Windows\system32\GWX
2015-04-08 17:14 - 2015-04-08 17:14 - 00000000 ___SD () C:\Windows\SysWOW64\GWX
2015-04-08 17:14 - 2015-04-08 17:14 - 00000000 ____D () C:\Windows\system32\appraiser
2015-04-08 16:16 - 2015-04-08 16:16 - 00002697 _____ () C:\Users\Public\Desktop\Skype.lnk
2015-04-08 16:16 - 2015-04-08 16:16 - 00000000 ___RD () C:\Program Files (x86)\Skype
2015-04-08 16:16 - 2015-04-08 16:16 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Skype
2015-04-08 16:14 - 2015-03-22 21:25 - 00769536 _____ (Microsoft Corporation) C:\Windows\system32\invagent.dll
2015-04-08 16:14 - 2015-03-22 21:25 - 00726528 _____ (Microsoft Corporation) C:\Windows\system32\generaltel.dll
2015-04-08 16:14 - 2015-03-22 21:24 - 00957952 _____ (Microsoft Corporation) C:\Windows\system32\appraiser.dll
2015-04-08 16:14 - 2015-03-22 21:24 - 00419840 _____ (Microsoft Corporation) C:\Windows\system32\devinv.dll
2015-04-08 16:14 - 2015-03-22 21:24 - 00227328 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2015-04-08 16:14 - 2015-03-22 21:24 - 00192000 _____ (Microsoft Corporation) C:\Windows\system32\aepic.dll
2015-04-08 16:14 - 2015-03-22 21:24 - 00030720 _____ (Microsoft Corporation) C:\Windows\system32\acmigration.dll
2015-04-08 16:14 - 2015-03-22 21:17 - 01111552 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
2015-04-08 16:14 - 2015-01-27 17:36 - 01239720 _____ (Microsoft Corporation) C:\Windows\system32\aitstatic.exe
2015-04-08 15:29 - 2015-04-08 15:29 - 00000000 ____D () C:\ProgramData\Malwarebytes
2015-04-08 15:24 - 2015-04-12 15:27 - 00000353 _____ () C:\Users\Petty\Desktop\jimtempza.txt
2015-03-31 16:19 - 2015-04-01 09:10 - 00000000 ____D () C:\MyBackup
2015-03-31 11:31 - 2015-04-12 18:21 - 00000128 _____ () C:\Windows\SysWOW64\pdfl.dat
2015-03-31 11:31 - 2015-03-31 11:31 - 00000144 _____ () C:\Windows\SysWOW64\lkfl.dat
2015-03-31 11:31 - 2015-03-31 11:31 - 00000080 _____ () C:\Windows\SysWOW64\ibfl.dat
2015-03-31 11:31 - 2014-08-13 11:21 - 00646280 _____ (Check Point Software Technologies Ltd.) C:\Windows\system32\AntiTheftCredentialProvider.dll
2015-03-31 11:22 - 2015-03-31 11:22 - 03403608 _____ (Check Point Software Technologies Ltd.) C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (2).exe
2015-03-31 11:19 - 2015-03-31 11:19 - 03403608 _____ (Check Point Software Technologies Ltd.) C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (1).exe
2015-03-31 11:17 - 2015-03-31 11:17 - 03403608 _____ (Check Point Software Technologies Ltd.) C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000.exe
2015-03-31 11:15 - 2015-03-31 11:15 - 00041128 _____ () C:\Users\Petty\Desktop\Chat Window.html
2015-03-31 11:15 - 2015-03-31 11:15 - 00000000 ____D () C:\Users\Petty\Desktop\Chat Window_files
 
==================== One Month Modified Files and Folders =======
 
(If an entry is included in the fixlist, the file\folder will be moved.)
 
2015-04-12 18:34 - 2012-08-27 01:53 - 00000908 _____ () C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2122515879-1497535132-2502957043-1000UA.job
2015-04-12 18:34 - 2012-08-26 15:21 - 00000000 ____D () C:\Users\Petty\AppData\Local\VirtualStore
2015-04-12 18:33 - 2009-07-13 22:45 - 00016976 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2015-04-12 18:33 - 2009-07-13 22:45 - 00016976 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2015-04-12 18:32 - 2011-12-15 16:52 - 01207492 _____ () C:\Windows\WindowsUpdate.log
2015-04-12 18:26 - 2012-08-26 18:40 - 00000000 ____D () C:\ProgramData\clear.fi
2015-04-12 18:25 - 2009-07-13 23:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2015-04-12 18:25 - 2009-07-13 22:51 - 00092233 _____ () C:\Windows\setupact.log
2015-04-12 18:06 - 2010-11-20 21:47 - 00705402 _____ () C:\Windows\PFRO.log
2015-04-09 15:31 - 2012-08-27 01:53 - 00000856 _____ () C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2122515879-1497535132-2502957043-1000Core.job
2015-04-09 03:25 - 2009-07-13 21:20 - 00000000 ____D () C:\Windows\AppCompat
2015-04-08 17:15 - 2011-12-15 16:40 - 00000000 ____D () C:\Windows\NAPP_Dism_Log
2015-04-08 17:14 - 2014-05-06 15:49 - 00000000 ___SD () C:\Windows\system32\CompatTel
2015-04-08 16:21 - 2011-10-17 18:33 - 00776038 _____ () C:\Windows\SysWOW64\PerfStringBackup.INI
2015-04-08 16:21 - 2009-07-13 23:13 - 00776038 _____ () C:\Windows\system32\PerfStringBackup.INI
2015-04-08 16:16 - 2011-10-17 19:13 - 00000000 ____D () C:\ProgramData\Skype
2015-04-07 17:45 - 2012-08-27 01:54 - 00002374 _____ () C:\Users\Petty\Desktop\Google Chrome.lnk
2015-04-01 08:39 - 2014-05-11 18:36 - 00000000 ____D () C:\ProgramData\CanonIJPLM
2015-03-31 17:42 - 2011-12-15 17:02 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AUPEO!
2015-03-31 17:42 - 2009-07-13 21:20 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance
2015-03-31 17:42 - 2009-07-13 21:20 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories
2015-03-31 13:50 - 2009-07-13 21:20 - 00000000 ____D () C:\Windows\rescache
2015-03-31 13:08 - 2012-09-29 08:58 - 00000000 ____D () C:\Users\Petty\AppData\Roaming\SoftGrid Client
2015-03-31 11:31 - 2012-08-27 02:15 - 00000000 ____D () C:\Users\Petty\AppData\Roaming\CheckPoint
2015-03-31 11:30 - 2012-08-27 02:09 - 00000000 ____D () C:\ProgramData\CheckPoint
 
==================== Files in the root of some directories =======
 
2011-12-15 17:11 - 2011-12-15 17:15 - 0015222 _____ () C:\ProgramData\ArcadeDeluxe5.log
 
Some content of TEMP:
====================
C:\Users\Petty\AppData\Local\Temp\AC771SDrivers.exe
C:\Users\Petty\AppData\Local\Temp\DRHelper_uninstallComplete.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u21-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u51-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\MSETUP4.EXE
C:\Users\Petty\AppData\Local\Temp\Setup.exe
C:\Users\Petty\AppData\Local\Temp\SWHelperQueryW.dll
C:\Users\Petty\AppData\Local\Temp\SWHelperWrapper.exe
C:\Users\Petty\AppData\Local\Temp\tbVgra.dll
C:\Users\Petty\AppData\Local\Temp\uninstall.exe
 
 
==================== Bamital & volsnap Check =================
 
(There is no automatic fix for files that do not pass verification.)
 
C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed
 
 
LastRegBack: 2015-04-07 17:36
 
==================== End Of Log ============================

Attached Files



BC AdBot (Login to Remove)

 


#2 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 15 April 2015 - 10:03 PM

First, uninstall the multiple Security products listed below:

 

ZoneAlarm - follow the instructions here - ZoneAlarm Removal Tool

Norton Security Scan - again instructions are here - See here for some help

HitmanPro - You may have to install HitmanPro again and then remove it with Revo Uninstaller

 

Second >>>>

After the uninstalls and reboots, run the following Fixlist script ----

Begin by moving the FRST64.exe file to the desktop (we will remove this and others when we are finished).

 

Open notepad. Please copy the contents of the quote box below. To do this highlight the contents of the box and right click on it and select copy. Paste this into the open notepad. Save it to your desktop as fixlist.txt
 

Start
CreateRestorePoint:
CloseProcesses:
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {2e497db7-f037-11e1-a93c-dc0ea1230d8e} - E:\WIN\setup.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {68f35def-5c7a-11e3-863f-dc0ea1230d8e} - E:\Windows\PTMHS291LVW_V4_14_1_0.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {8b09404b-0285-11e3-bdcb-dc0ea1230d8e} - E:\win\setup.exe -phs
ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled.
ProxyServer: [.DEFAULT] => http=127.0.0.1:55960;https=127.0.0.1:55960
SearchScopes: HKLM-x32 -> DefaultScope {4AB8A1B5-D909-45A6-8E29-36071A724244} URL =
SearchScopes: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL =
Toolbar: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> No Name - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} -  No File
Winsock: Catalog9 01 bmnet.dll File Not found ()
Winsock: Catalog9 02 bmnet.dll File Not found ()
Winsock: Catalog9 03 bmnet.dll File Not found ()
CMD: netsh winsock reset
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @checkpoint.com/FFApi -> C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\npFFApi.dll No File
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
CHR DefaultSuggestURL: Default -> {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}
StartMenuInternet: Google Chrome.S3QQH2FFYXYMMVCZJDRGW76JBM - C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
S3 hitmanpro37; C:\Windows\system32\drivers\hitmanpro37.sys [43664 2015-04-12] ()
R0 KL1; C:\Windows\System32\DRIVERS\kl1.sys [7717984 2014-06-11] (Kaspersky Lab ZAO)
U5 klflt; C:\Windows\System32\Drivers\klflt.sys [92768 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [490592 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2014-06-11] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [54104 2014-06-11] (Kaspersky Lab)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [177760 2014-06-11] (Kaspersky Lab ZAO)
S1 SASDIFSV; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASDIFSV64.SYS [X]
S1 SASKUTIL; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASKUTIL64.SYS [X]
2015-04-12 18:21 - 2014-06-11 10:09 - 00177760 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kneps.sys
2015-04-12 18:21 - 2014-06-11 10:09 - 00054104 _____ (Kaspersky Lab) C:\Windows\system32\Drivers\kltdi.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 07717984 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kl1.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00490592 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00092768 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00029792 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klim6.sys
2015-04-12 17:43 - 2015-04-12 17:57 - 00043664 _____ () C:\Windows\system32\Drivers\hitmanpro37.sys
2015-04-12 17:42 - 2015-04-12 17:42 - 00000000 ____D () C:\Program Files\HitmanPro
2015-04-12 17:39 - 2015-04-12 17:55 - 00000000 ____D () C:\ProgramData\HitmanPro
C:\Users\Petty\AppData\Local\Temp\AC771SDrivers.exe
C:\Users\Petty\AppData\Local\Temp\DRHelper_uninstallComplete.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u21-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u51-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\MSETUP4.EXE
C:\Users\Petty\AppData\Local\Temp\Setup.exe
C:\Users\Petty\AppData\Local\Temp\SWHelperQueryW.dll
C:\Users\Petty\AppData\Local\Temp\SWHelperWrapper.exe
C:\Users\Petty\AppData\Local\Temp\tbVgra.dll
C:\Users\Petty\AppData\Local\Temp\uninstall.exe
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.25.5\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.23.9\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.24.15\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{D0336C0B-7919-4C04-8CCE-2EBAE2ECE8C9}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.25.11\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.24.7\psuser_64.dll No File
Task: {A630402E-EC3E-4D8F-937D-DE29AAA36BE7} - \LaunchSignup No Task File <==== ATTENTION
C:\Program Files (x86)\Conduit\CT3293216\plugins\TBVerifier.dll
C:\Program Files (x86)\Conduit
cmd: ipconfig /flushdns
cmd: netsh advfirewall reset
cmd: netsh advfirewall set allprofiles state on
RemoveProxy:
Reboot:
end

 


NOTE. It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 by right clicking on the FRST64.exe file, selecting "Run as Administrator..".  The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.  

The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on.  Press the Fix button just once and wait.  The tool will create a restore point, process the script and ask for a restart of your system.

Press%20the%20FIX%20button_zpsdd5zi3mt.p

If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.

When finished FRST will generate a log on the Desktop (Fixlog.txt). Please post it to your reply.
 

 


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#3 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 16 April 2015 - 04:51 AM

Thank you for the information. Here is the fixlog.

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 15-04-2015 04
Ran by Petty at 2015-04-16 03:42:10 Run:1
Running from C:\Users\Petty\Desktop
Loaded Profiles: Petty (Available profiles: Petty)
Boot Mode: Normal
==============================================
 
Content of fixlist:
*****************
Start
CreateRestorePoint:
CloseProcesses:
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {2e497db7-f037-11e1-a93c-dc0ea1230d8e} - E:\WIN\setup.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {68f35def-5c7a-11e3-863f-dc0ea1230d8e} - E:\Windows\PTMHS291LVW_V4_14_1_0.exe
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\...\MountPoints2: {8b09404b-0285-11e3-bdcb-dc0ea1230d8e} - E:\win\setup.exe -phs
ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled.
ProxyServer: [.DEFAULT] => http=127.0.0.1:55960;https=127.0.0.1:55960
SearchScopes: HKLM-x32 -> DefaultScope {4AB8A1B5-D909-45A6-8E29-36071A724244} URL =
SearchScopes: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> DefaultScope {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL =
Toolbar: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000 -> No Name - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} -  No File
Winsock: Catalog9 01 bmnet.dll File Not found ()
Winsock: Catalog9 02 bmnet.dll File Not found ()
Winsock: Catalog9 03 bmnet.dll File Not found ()
CMD: netsh winsock reset
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @checkpoint.com/FFApi -> C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\npFFApi.dll No File
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
CHR DefaultSuggestURL: Default -> {google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}
StartMenuInternet: Google Chrome.S3QQH2FFYXYMMVCZJDRGW76JBM - C:\Users\Petty\AppData\Local\Google\Chrome\Application\chrome.exe
S3 hitmanpro37; C:\Windows\system32\drivers\hitmanpro37.sys [43664 2015-04-12] ()
R0 KL1; C:\Windows\System32\DRIVERS\kl1.sys [7717984 2014-06-11] (Kaspersky Lab ZAO)
U5 klflt; C:\Windows\System32\Drivers\klflt.sys [92768 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [490592 2014-06-11] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2014-06-11] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [54104 2014-06-11] (Kaspersky Lab)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [177760 2014-06-11] (Kaspersky Lab ZAO)
S1 SASDIFSV; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASDIFSV64.SYS [X]
S1 SASKUTIL; \??\C:\Users\Petty\AppData\Local\Temp\SAS_SelfExtract\SASKUTIL64.SYS [X]
2015-04-12 18:21 - 2014-06-11 10:09 - 00177760 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kneps.sys
2015-04-12 18:21 - 2014-06-11 10:09 - 00054104 _____ (Kaspersky Lab) C:\Windows\system32\Drivers\kltdi.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 07717984 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\kl1.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00490592 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00092768 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys
2015-04-12 18:20 - 2014-06-11 10:09 - 00029792 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klim6.sys
2015-04-12 17:43 - 2015-04-12 17:57 - 00043664 _____ () C:\Windows\system32\Drivers\hitmanpro37.sys
2015-04-12 17:42 - 2015-04-12 17:42 - 00000000 ____D () C:\Program Files\HitmanPro
2015-04-12 17:39 - 2015-04-12 17:55 - 00000000 ____D () C:\ProgramData\HitmanPro
C:\Users\Petty\AppData\Local\Temp\AC771SDrivers.exe
C:\Users\Petty\AppData\Local\Temp\DRHelper_uninstallComplete.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u21-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\jre-7u51-windows-i586-iftw.exe
C:\Users\Petty\AppData\Local\Temp\MSETUP4.EXE
C:\Users\Petty\AppData\Local\Temp\Setup.exe
C:\Users\Petty\AppData\Local\Temp\SWHelperQueryW.dll
C:\Users\Petty\AppData\Local\Temp\SWHelperWrapper.exe
C:\Users\Petty\AppData\Local\Temp\tbVgra.dll
C:\Users\Petty\AppData\Local\Temp\uninstall.exe
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.25.5\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.23.9\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.24.15\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{D0336C0B-7919-4C04-8CCE-2EBAE2ECE8C9}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.25.11\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}\InprocServer32 -> C:\Users\Petty\AppData\Local\Google\Update\1.3.24.7\psuser_64.dll No File
Task: {A630402E-EC3E-4D8F-937D-DE29AAA36BE7} - \LaunchSignup No Task File <==== ATTENTION
C:\Program Files (x86)\Conduit\CT3293216\plugins\TBVerifier.dll
C:\Program Files (x86)\Conduit
cmd: ipconfig /flushdns
cmd: netsh advfirewall reset
cmd: netsh advfirewall set allprofiles state on
RemoveProxy:
Reboot:
end
*****************
 
Restore point was successfully created.
Processes closed successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{2e497db7-f037-11e1-a93c-dc0ea1230d8e}" => Key deleted successfully.
HKCR\CLSID\{2e497db7-f037-11e1-a93c-dc0ea1230d8e} => Key not found. 
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{68f35def-5c7a-11e3-863f-dc0ea1230d8e}" => Key deleted successfully.
HKCR\CLSID\{68f35def-5c7a-11e3-863f-dc0ea1230d8e} => Key not found. 
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{8b09404b-0285-11e3-bdcb-dc0ea1230d8e}" => Key deleted successfully.
HKCR\CLSID\{8b09404b-0285-11e3-bdcb-dc0ea1230d8e} => Key not found. 
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable => value deleted successfully.
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer => value deleted successfully.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully.
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} => value deleted successfully.
HKCR\CLSID\{EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} => Key not found. 
Winsock: Catalog entry 000000000001 => Deleted successfully.
Winsock: Catalog entry 000000000002 => Deleted successfully.
Winsock: Catalog entry 000000000003 => Deleted successfully.
 
=========  netsh winsock reset =========
 
 
Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.
 
 
========= End of CMD: =========
 
"HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE" => Key deleted successfully.
"HKLM\Software\Wow6432Node\MozillaPlugins\@checkpoint.com/FFApi" => Key deleted successfully.
"HKLM\Software\Wow6432Node\MozillaPlugins\@microsoft.com/GENUINE" => Key deleted successfully.
Chrome DefaultSuggestURL deleted successfully.
HKLM\SOFTWARE\Clients\StartMenuInternet\Google Chrome\shell\open\command\\Default => Value was restored successfully.
hitmanpro37 => Service not found.
KL1 => Service not found.
klflt => Service deleted successfully.
KLIF => Service not found.
KLIM6 => Service not found.
kltdi => Unable to stop service
kltdi => Service deleted successfully.
kneps => Service stopped successfully.
kneps => Service deleted successfully.
SASDIFSV => Service deleted successfully.
SASKUTIL => Service deleted successfully.
C:\Windows\system32\Drivers\kneps.sys => Moved successfully.
C:\Windows\system32\Drivers\kltdi.sys => Moved successfully.
"C:\Windows\system32\Drivers\kl1.sys" => File/Directory not found.
"C:\Windows\system32\Drivers\klif.sys" => File/Directory not found.
C:\Windows\system32\Drivers\klflt.sys => Moved successfully.
"C:\Windows\system32\Drivers\klim6.sys" => File/Directory not found.
"C:\Windows\system32\Drivers\hitmanpro37.sys" => File/Directory not found.
"C:\Program Files\HitmanPro" => File/Directory not found.
"C:\ProgramData\HitmanPro" => File/Directory not found.
C:\Users\Petty\AppData\Local\Temp\AC771SDrivers.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\DRHelper_uninstallComplete.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\jre-7u21-windows-i586-iftw.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\jre-7u51-windows-i586-iftw.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\MSETUP4.EXE => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\Setup.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\SWHelperQueryW.dll => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\SWHelperWrapper.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\tbVgra.dll => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\uninstall.exe => Moved successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}" => Key deleted successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}" => Key deleted successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}" => Key deleted successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{D0336C0B-7919-4C04-8CCE-2EBAE2ECE8C9}" => Key deleted successfully.
"HKU\S-1-5-21-2122515879-1497535132-2502957043-1000_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{A630402E-EC3E-4D8F-937D-DE29AAA36BE7}" => Key deleted successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{A630402E-EC3E-4D8F-937D-DE29AAA36BE7}" => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\LaunchSignup => Key not found. 
"C:\Program Files (x86)\Conduit\CT3293216\plugins\TBVerifier.dll" => File/Directory not found.
"C:\Program Files (x86)\Conduit" => File/Directory not found.
 
=========  ipconfig /flushdns =========
 
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========= End of CMD: =========
 
 
=========  netsh advfirewall reset =========
 
Ok.
 
 
========= End of CMD: =========
 
 
=========  netsh advfirewall set allprofiles state on =========
 
Ok.
 
 
========= End of CMD: =========
 
 
========= RemoveProxy: =========
 
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value deleted successfully.
HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value deleted successfully.
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\DefaultConnectionSettings => value deleted successfully.
HKU\S-1-5-21-2122515879-1497535132-2502957043-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\\SavedLegacySettings => value deleted successfully.
 
 
========= End of RemoveProxy: =========
 
 
 
The system needed a reboot. 
 
==== End of Fixlog 03:43:27 ====


#4 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 16 April 2015 - 09:47 AM

How did the uninstalls go?  Any issues?
 
How is the system running now?  Still have problems connecting?
 

AdwCleaner by Xplode

Download AdwCleaner from here or from here. Save the file to the desktop.


NOTE: If you are using IE 8 or above you may get a warning that stops the program from downloading. Just click on the warning and allow the download to complete.

Close all open windows and browsers.

  • XP users: Double click the AdwCleaner icon to start the program.
  • Vista/7/8 users: Right click the AdwCleaner icon on the desktop, click Run as administrator and accept the UAC prompt to run AdwCleaner.
    You will see the following console:

    AdwCleaner_v4111_zpsn56hzjza.png
  • Click the Scan button and wait for the scan to finish.
  • After the Scan has finished the window may or may not show what it found and above, in the progress bar, you will see: Pending. Please uncheck elements you don't want to remove. Please Do Not delete anything at this time.
  • Click the Report button to get the log.
  • Copy and Paste it into your next reply. This report is also saved to C:\AdwCleaner\AdwCleaner[R0].txt.
  • Click the X in the upper right corner of the program or click the File menu and click Exit to close the program.

Optional:

NOTE: If you see AVG Secure Search being targeted for deletion, Here's Why and Here. You can always Reinstall it.


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#5 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 16 April 2015 - 04:14 PM

ADWCleaner Log:

 

# AdwCleaner v4.201 - Logfile created 16/04/2015 at 15:12:20
# Updated 08/04/2015 by Xplode
# Database : 2015-04-15.1 [Server]
# Operating system : Windows 7 Home Premium Service Pack 1 (x64)
# Username : Petty - PETTY-ACER
# Running from : C:\Users\Petty\Desktop\adwcleaner_4.201.exe
# Option : Scan
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
File Found : C:\END
File Found : C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.ask.com_0.localstorage
File Found : C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.ask.com_0.localstorage-journal
Folder Found : C:\Users\Petty\AppData\Local\Temp\mt_ffx
Folder Found : C:\Users\Petty\AppData\Roaming\CheckPoint\ZoneAlarm LTD Toolbar
 
***** [ Scheduled tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Data Found : HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyOverride] - <-loopback>
Key Found : HKCU\Software\Boost
Key Found : HKCU\Software\eSupport.com
Key Found : HKCU\Software\MICROSOFT\INTERNET EXPLORER\DOMSTORAGE\superfish.com
Key Found : HKCU\Software\Microsoft\Internet Explorer\DOMStorage\www.superfish.com
Key Found : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\conduit.com
Key Found : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\conduit.com
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9E015857-B29C-4A23-A7DF-69AE2E506955}
Key Found : [x64] HKCU\Software\Boost
Key Found : [x64] HKCU\Software\eSupport.com
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9E015857-B29C-4A23-A7DF-69AE2E506955}
Key Found : HKLM\SOFTWARE\Boost
Key Found : HKLM\SOFTWARE\Classes\Toolbar.CT3293216
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{EE171732-BEB4-4576-887D-CB62727F01CA}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoneAlarm LTD Toolbar
Key Found : [x64] HKLM\SOFTWARE\WebBar
 
***** [ Web browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17689
 
 
-\\ Google Chrome v
 
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] - Found [Extension] : booedmolknjekdopkepjjeckmjkdpfgl
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] - Found [Extension] : flpcjncodpafbgdpnkljologafpionhb
 
*************************
 
AdwCleaner[R0].txt - [310 bytes] - [16/04/2015 15:03:07]
AdwCleaner[R1].txt - [310 bytes] - [16/04/2015 15:04:55]
AdwCleaner[R2].txt - [310 bytes] - [16/04/2015 15:09:21]
AdwCleaner[R3].txt - [2615 bytes] - [16/04/2015 15:12:20]
 
########## EOF - C:\AdwCleaner\AdwCleaner[R3].txt - [2674 bytes] ##########


#6 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 16 April 2015 - 08:03 PM

First >>>>

Re-run AdwCleaner

Close all open windows and browsers.

  • Double click the AdwCleaner icon to run AdwCleaner. (Vista and 7 users) Right click the AdwCleaner icon, click Run as administrator and accept the UAC prompt to run AdwCleaner.
  • Click the Scan button and wait for the scan to complete.
  • When the Scan has finished the Scan button will be grayed out and the Clean button will be activated.
  • Click the Clean button.
  • Everything checked will be deleted.
  • When the program has finished cleaning a report appears.
  • Once done it will ask to reboot, allow this

    adwcleaner_delete_restart.jpg
  • On reboot a log will be produced please copy / paste that in your next reply. This report is also saved to C:\AdwCleaner\AdwCleaner[S0].txt

 

 

Second >>>>

Malwarebytes' Anti-Malware
Please download the latest version of Malwarebytes' Anti-Malware from here .

Double Click on the mbam-setup.exe file to install the application.

Do not check on the Trial of Professional version. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.

If an update is found, it will download and install the latest version.

When the main screen opens, if the database is out of date, you can click on the Fix Now banner or the Update Now link
Main%20Screen_zpsnnwza0ky.png

Once updated, please select Settings > Detection and Protection. Please ensure that "Scan for Rootkits" is selected along with Non-Malware Protection PUP and PUM are set to "Treat detections as malware"
Detection%20Settings_zpsaviydqil.png

Once the settings have been configured, select the Dashboard tab to return to the Main screen and select "Scan Now >>" to start the scan.
Main%20Screen_zpsnnwza0ky.png

The scan may take some time to finish, so please be patient.
mbam21-scaninprogress_zps38w26yvt.jpg

If any malware is found, you will be presented with a screen like the one below.
mbam21-removeselected_zpsg83p7wis.jpg

Please click on the Save Results >> link / button and select the As text file from the dropdown list. I would suggest you save the file on your desktop (as we need the report attached here for review and it is easy to find on the desktop).

After you have saved the report file, return to the Potential Threats Detected page and click on Cancel. You can close MBAM after that.

Please attach the report file to a post here; I will review the file and script what needs to be removed.


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#7 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 17 April 2015 - 05:05 AM

Adware Cleaner SO text:

 

# AdwCleaner v4.201 - Logfile created 17/04/2015 at 03:21:42
# Updated 08/04/2015 by Xplode
# Database : 2015-04-15.1 [Server]
# Operating system : Windows 7 Home Premium Service Pack 1 (x64)
# Username : Petty - PETTY-ACER
# Running from : C:\Users\Petty\Desktop\adwcleaner_4.201.exe
# Option : Cleaning
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\Users\Petty\AppData\Local\Temp\mt_ffx
Folder Deleted : C:\Users\Petty\AppData\Roaming\CheckPoint\ZoneAlarm LTD Toolbar
File Deleted : C:\END
File Deleted : C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.ask.com_0.localstorage
File Deleted : C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.ask.com_0.localstorage-journal
 
***** [ Scheduled tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKCU\Software\MICROSOFT\INTERNET EXPLORER\DOMSTORAGE\superfish.com
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\DOMStorage\www.superfish.com
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\conduit.com
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3293216
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{9E015857-B29C-4A23-A7DF-69AE2E506955}
Key Deleted : HKCU\Software\Boost
Key Deleted : HKCU\Software\eSupport.com
Key Deleted : HKLM\SOFTWARE\Boost
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{EE171732-BEB4-4576-887D-CB62727F01CA}
Key Deleted : [x64] HKLM\SOFTWARE\WebBar
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoneAlarm LTD Toolbar
Data Deleted : HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyOverride] - <-loopback>
 
***** [ Web browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17689
 
 
-\\ Google Chrome v
 
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.zonealarm.com/search?src=sp&tbid=base2013&Lan=en&q={searchTerms}&gu=ed62f1f80d584d3192d8db725e8d5d05&tu=10GX0006D2B000c&sku=&tstsId=&ver=&
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.conduit.com/Results.aspx?q={searchTerms}&SearchSource=49&CUI=UN27978710876219183&ctid=CT3293216&UM=2
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.aol.com/aol/search?q={searchTerms}
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://search.tb.ask.com/search/GGmain.jhtml?searchfor={searchTerms}&st=kwd&ptb=596D164F-ABAF-43E6-8265-B5742D31C823&n=780bfe45&ind=2014051909&p2=^HJ^xdm636^YYA^us&si=314029
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] - Deleted [Extension] : booedmolknjekdopkepjjeckmjkdpfgl
[C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] - Deleted [Extension] : flpcjncodpafbgdpnkljologafpionhb
 
*************************
 
AdwCleaner[R0].txt - [310 bytes] - [16/04/2015 15:03:07]
AdwCleaner[R1].txt - [310 bytes] - [16/04/2015 15:04:55]
AdwCleaner[R2].txt - [310 bytes] - [16/04/2015 15:09:21]
AdwCleaner[R3].txt - [2773 bytes] - [16/04/2015 15:12:20]
AdwCleaner[R4].txt - [3867 bytes] - [17/04/2015 03:19:17]
AdwCleaner[S0].txt - [3544 bytes] - [17/04/2015 03:21:42]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [3603  bytes] ##########
 

Attached Files



#8 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 17 April 2015 - 12:10 PM

This next step may take a while (just to warn you) .....

ESET Online does not work with IE 11 (Internet Explorer) at the moment (a few weeks ago anyway) so if you have IE 11, Chrome or Firefox has to be used instead.  ESET Online does work with IE 10 and earlier.

You can leave Norton Enabled even though ESET may warn about it. just makes the scan take longer. The pictures below showing what to click may be blue instead of green on the ESET website now, but the procedure is still the same

Please read carefully and Slowly, Notice all the settings listed below to check before starting the scan. Stop and ask if you have any questions.

Take note of the NO tick in the Remove found threats setting below at it needs to have the tick removed.

-------------------------------------------------------------------------------------------------------------------

Hold down Control key and click on the following link to open ESET OnlineScan in a new window.

Link =>> ESET Online Scanner  <<

Click the Run ESET Online Scanner located on the left side of the page (not the free trial).

abfacb96-0c99-4b59-b9e9-9298aa0ee3ec_zps

For browsers other than Internet Explorer only: (Microsoft Internet Explorer users can skip this step)
Click on the esetsmartinstaller link in the popup window that opens. Save it to your desktop.

Getinstallerpopup2_zps65f446a6.png

Double click on the icon on your desktop.

desktopfile_zps98a1ee89.png

Check (accept) the Terms of Use.

TOU_zps4ecd3406.png

Click the START button.
Accept any security warnings from your browser.

Now in the Computer scan settings window that appears:-
Make sure that the option Enable detection of potentially unwanted applications is selected.
Now click on Advanced Settings and configure the options as follows:

Remove found threats is Not checked
Scan archives is checked
Scan for potentially unsafe applications is checked
Enable Anti-Stealth Technology is checked


Now click on: Start
Loadsettings_2014-08-23_zps3f2d0c88.png



ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.

Downloadingsignatures_zps36c38587.png


Scanningdisplay_zpsec3aac14.png

When the scan is finished, if any threats are found you will see the screen below.  Click to view the found threats.

Threatsfound_zpsfe95fb4e.png

At the bottom of the listed threats, there is an option to save the results to a text file.  Please do this so you can attach the results here for review and removal of the items that are not false positives (these will be scripted out so do not worry).

Exporttotextfile_zps16cb487f.png

Once the log text file is saved, return to the Scan Finished screen by clicking "<<Back", then click on the uninstall button and click Finish.

UninstallcheckedandFinish_zps6fb26ad8.pn

Attach the saved log file in your next reply please.  Thanks.


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#9 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 17 April 2015 - 07:22 PM

ESET.txt attached

Attached Files



#10 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 17 April 2015 - 09:01 PM

Download the attached fixlist.txt file and save it to the Desktop.

NOTE. It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 by right clicking on the FRST64.exe file, selecting "Run as Administrator..".  The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.  

The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show that it is ready to use (meaning there is no update found) and you can continue on.  Press the Fix button just once and wait.  The tool will create a restore point, process the script and ask for a restart of your system.

Press%20the%20FIX%20button_zpsdd5zi3mt.p

If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.

When finished FRST will generate a log on the Desktop (Fixlog.txt). Please post the log in your next reply.
 

Attached Files


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#11 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 18 April 2015 - 06:00 AM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 18-04-2015 01
Ran by Petty at 2015-04-18 04:49:56 Run:2
Running from C:\Users\Petty\Desktop
Loaded Profiles: Petty (Available profiles: Petty)
Boot Mode: Normal
==============================================
 
Content of fixlist:
*****************
start
CreateRestorePoint:
CloseProcesses:
C:\Users\Petty\AppData\Local\Temp\ct3293216
C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Cache\f_013063
C:\Users\Petty\AppData\Local\Temp\a2vhKNTRiW\nXUo1Ceh07\VOPackage.exe
C:\Users\Petty\AppData\Local\Temp\{907A1104-E812-4b5c-959B-E4DAB37A96AB}\CUninstallerZA.exe
C:\Users\Petty\Downloads\clean.exe
C:\Users\Petty\Downloads\zaSetupWeb_133_209_000-5400_123.exe
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (1).exe
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (2).exe
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000.exe
EmptyTemp:
Reboot:
end
 
*****************
 
Restore point was successfully created.
Processes closed successfully.
C:\Users\Petty\AppData\Local\Temp\ct3293216 => Moved successfully.
C:\Users\Petty\AppData\Local\Google\Chrome\User Data\Default\Cache\f_013063 => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\a2vhKNTRiW\nXUo1Ceh07\VOPackage.exe => Moved successfully.
C:\Users\Petty\AppData\Local\Temp\{907A1104-E812-4b5c-959B-E4DAB37A96AB}\CUninstallerZA.exe => Moved successfully.
C:\Users\Petty\Downloads\clean.exe => Moved successfully.
C:\Users\Petty\Downloads\zaSetupWeb_133_209_000-5400_123.exe => Moved successfully.
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (1).exe => Moved successfully.
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000 (2).exe => Moved successfully.
C:\Users\Petty\Downloads\ZASPSetupWeb_133_209_000.exe => Moved successfully.
EmptyTemp: => Removed 1.8 GB temporary data.
 
 
The system needed a reboot. 
 
==== End of Fixlog 04:51:50 ====


#12 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 18 April 2015 - 04:28 PM

How is the system running now?  Does Zone Alarm Update properly?  Any other issues?


unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#13 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 19 April 2015 - 09:36 AM

Installed Zone Alarm and updates as expected. No other issues at this time!

 

Thanks!



#14 dbrisendine

dbrisendine

  • Malware Response Team
  • 508 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:BC, Canada
  • Local time:02:23 PM

Posted 20 April 2015 - 01:46 AM

All right!! :bananas: Your logs are clean and you're good to go now!! :thumbup2: We've got some final steps left to do to clean up our tools and get your system in good running condition and then you are on your way. I must say though, even though we met through less than ideal circumstances, it has been really great to work with you. :) Just run through the steps from the Cleanup of Tools to the Program Update Checker. That's it. Thanks. :cool:


Clean up of Malware Removal Tools
Now that we are through using these tools, let's clean them off your system so that should you ever need to have malware removed again (we hope not) fresh, updated copies will be downloaded.
  • Download Delfix from here to your desktop and double click it to start the program
  • Ensure Remove disinfection tools is ticked
    Also tick:
  • Activate UAC
  • Create registry backup
  • Purge system restore
  • Reset system settings
  • DelFixSelectall_zps0f04cec4.png
  • Click Run
  • The program will run for a few moments and then notepad will open with a log. Please paste the log in your next reply.
You can delete any log files left on your desktop as these are no longer needed.


Keep Windows Updated
Microsoft issues updates to Windows to close vulnerabilities as they are discovered. Staying updated helps protect your system from current exploits.
  • Click Start and then click Control Panel.
  • Click on the View by: in the upper right corner and select Large Icons (you can change this back later if you like).
  • Scroll down and click on Windows Update.
  • Click on Change settings.
  • Under Important Updates, click on Install updates automatically (recommended).
  • Select (click on) the other options on this page.
  • Select a day and time to have windows install the updates.
  • Click on Ok to change the settings.
  • If you want to change the view of the Control Panel display, click on the View by: in the upper right hand corner and select an option you prefer.
Keep other Important Programs Updated
Along with keeping Windows updated, it is a good idea to keep important programs updated. Java and Adobe Reader both need to be kept updated to the latest versions; malware writers utilize exploits in the unpatched versions to their advantages.

Java
Most security experts and the US CERT (part of the US Homeland Security) now recommend that users uninstall Java from their systems; if you don't have any programs that need Java on your system, you are safe to do this. You can read some of the articles on this here and here. I strongly suggest you uninstall Java unless you need it run certain software; in that case I would recommend that you disable or unplug Java from your web browsers and only enable it when you need it.

To disable / unplug Java in your browsers:To uninstall Java (on Win7):
  • Click Start and then click Control Panel.
  • If you need to, click View by: and select either Large Icons or Small Icons.
  • Click on Programs and Features.
  • Scroll down until you find Java and click on it to select that program.
  • (Older versions of Java may appear in the program list as J2SE, Java 2, Java SE or Java Runtime Environment.)
  • Click Uninstall.
  • If more than one version of Java shows in your program list, you should repeat the selection and uninstall until all of them are removed.
To check for the latest version of Java and installation steps:
  • Go to java.com and click on Do I have Java?.
  • On the next page, click on Verify Java Version.
  • If you get a security pop up entitled "Do you want to run this application?" with the Name: Java Detection and Publisher: Oracle America, Inc., click Run.
  • Follow the recommendations (if any) on the results screen.
  • If there is a new version (or none at all on your system), there will be a button on the page showing Agree and Start Free Download. Click on it to update or install Java.
  • The site will start a download of jxpiinstall.exe. Save the file to your desktop.
  • When the download is finished, close your browser.
  • Right click on the jxpiinstall.exe and select Run as Administrator.
  • On the opening window, check Change destination folder and then click Install>.
  • The program will now download the rest of the files needed to install Java.
  • On the Destination Folder window, click Next>.
  • On the next window, the install will present you the option of adding additional software (this is known as Foistware).
  • Uncheck the Set and keep Ask as my default search provider.
  • Uncheck the Install the Ask Toolbar.
  • Click Next> to finish the install.
  • When the installation is finished, you will be taken to a web page that will check to see if Java is working properly.
Adobe Reader
Adobe Reader is the second most targeted (by malware) common software. If all you ever do with Adobe Reader is view PDF files, then please consider replacing it with a lighter, free PDF reader that is not exploitable. One that I recommend is Sumatra PDF.

To update Adobe Reader:
  • Launch your Adobe Reader.
  • Click Help and then click on About Adobe Reader from the menu list.
  • If the version is 11.0.10 then you are up to date. If it is less than this and you are keeping Adobe Reader, you should update to the latest version.
  • The best place to get Adobe Reader is from Adobe (click on Adobe to go there now).
  • Click on Download in the menu bar on top of the Adobe web page.
  • Click on Adobe Reader in the list on the right hand side of the page.
  • On the next page, click on the check mark (to turn it off) beside the option to include the McAfee scanner in the download and install. Make sure the check is NOT marked (this is another example of Foistware).
  • Click the Install Now button and follow the directions on next page.
  • If you are prompted to Save the installer file, choose to save it to your desktop. Once it is saved, right click on the file and select Run as Administrator.
  • When the installation is finished, you can delete the installer file on your desktop.
Consider a program that will check for out-of-date programs on your system
Some programs don't have update checks built in or make you run the application to start the check for updates process. An easier way to stay on top of the current versions of your installed programs is to use a version checking program like Update Checker from FileHippo.com (you can get the software from here and read more about it on the same page).


You are now done! :thumbup2: :grinner: :thumbup2: :grinner: :smilers:

Now some information on programs to help keep you safe:

First, an Antivirus program. You NEED one; free is just as good as paid-for as long as you keep them updated. ONLY use one at a time as having more than that will cause system problems. Here are some free ones to check out:
Microsoft Security Essentials
Avast! Free Antivirus

Next, a firewall is a must have now-a-days. The built in firewall in Windows 7 is fine (just make sure it is turned on (Start > Control Panel > Windows Firewall)). Or, if you like, you could choose one of the free ones listed here:
Emsisoft Online Armor - installs as trialware which converts to freeware in 30 days
Zone Alarm Free Firewall - installer includes foistware so read the options very carefully

=== options ====
Unchecky is a small service that runs in the background to help keep those "extra toolbars" and tag along search engines from automatically installing. By automatically directing you to a custom install with all the options unchecked, only what you manually choose and confirm gets installed.

CryptoPrevent is a free program that prevents CryptoLocker / ransomware from infecting your PC by locking down the OS so the malware can not get a grip on your system. You can read the details about this program here.

Also, consider adding MalwareBytes Antimalware to your arsenal of safe keeping programs. Use the free version (not the paid or trial version) and you won't have a problem with your antivirus scanner program. Keep it updated and run a scan with it once a week.

Lastly, if you use Firefox as your main web browser, consider adding the NoScript and AdBlockPlus add-ons to the browser to block scripting hijacks and remove unwanted ads from the pages you view.

You may also find some information and tips at this thread:
How did I get infected in the first place?
and
COMPUTER SECURITY - a short quide to staying safer online

_____________________________________________________________________

Please come back and paste the DelFix.txt log when you can. After that, if you have no more questions, you are good to go. Surf safe, my friend!!

unite_blue_zpsba2e96f7.png
 
Please do not ask for Malware help via PM (Private Messages).  Please post in the forum boards instead.  Thanks.

My help is always free but if you would like to help encourage me or show your thanks -----> btn_donate_LG.gif


#15 yMidnite

yMidnite
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:03:23 PM

Posted 20 April 2015 - 04:12 AM

Here is the final log. Thanks again!

 

# DelFix v10.9 - Logfile created 20/04/2015 at 03:06:06
# Updated 27/02/2015 by Xplode
# Username : Petty - PETTY-ACER
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
 
~ Activating UAC ... OK
 
~ Removing disinfection tools ...
 
Deleted : C:\FRST
Deleted : C:\AdwCleaner
Deleted : C:\Users\Petty\Desktop\FRST-OlderVersion
Deleted : C:\Users\Petty\Desktop\Addition.txt
Deleted : C:\Users\Petty\Desktop\adwcleaner_4.201.exe
Deleted : C:\Users\Petty\Desktop\esetsmartinstaller_enu.exe
Deleted : C:\Users\Petty\Desktop\Fixlog.txt
Deleted : C:\Users\Petty\Desktop\FRST.txt
Deleted : C:\Users\Petty\Desktop\FRST64.exe
Deleted : C:\Users\Petty\Desktop\hijackthis.log
Deleted : C:\Users\Petty\Downloads\HijackThis.exe
Deleted : C:\Users\Petty\Downloads\hijackthis.log
Deleted : HKLM\SOFTWARE\AdwCleaner
 
~ Creating registry backup ... OK
 
~ Cleaning system restore ...
 
Deleted : RP #209 [Scheduled Checkpoint | 04/07/2015 23:43:24]
Deleted : RP #210 [Windows Update | 04/08/2015 22:14:53]
Deleted : RP #211 [Checkpoint by HitmanPro | 04/12/2015 23:53:22]
Deleted : RP #212 [Checkpoint by HitmanPro | 04/12/2015 23:54:44]
Deleted : RP #214 [Revo Uninstaller Pro's restore point - HitmanPro 3.7 | 04/16/2015 09:31:17]
Deleted : RP #216 [Restore Point Created by FRST | 04/16/2015 09:42:22]
Deleted : RP #218 [Restore Point Created by FRST | 04/18/2015 10:50:04]
Deleted : RP #219 [Windows Update | 04/19/2015 13:10:03]
 
New restore point created !
 
~ Resetting system settings ... OK
 
########## - EOF - ##########





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users