Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Adware Installer Activity 7 infection


  • This topic is locked This topic is locked
7 replies to this topic

#1 jakarlsson

jakarlsson

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:04:29 AM

Posted 13 May 2015 - 09:33 AM

Don't know how to remove it.  Have run Norton Power Eraser as well as scans.  It continues to try to attack but is (so far) always blocked by Norton.  Box says system is infected but I need to do nothing.  Thanks

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,559 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:29 AM

Posted 17 May 2015 - 09:23 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===




These proxy settings are suspicious. If you did not set them I suggest you remove the lines in bold from the fix below before saving the Fixlist.txt file.
ProxyEnable: [S-1-5-21-2926960347-1281131932-2454002305-1001] => Internet Explorer proxy is enabled.
ProxyServer: [S-1-5-21-2926960347-1281131932-2454002305-1001] => http=127.0.0.1:49212;https=127.0.0.1:49212



Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below.


start

CreateRestorePoint:
CloseProcesses:

() C:\Program Files (x86)\user extensions\Client.exe
() C:\Program Files (x86)\user extensions\Client.exe
HKLM-x32\...\Run: [] => [X]
AppInit_DLLs-x32: C:\PROGRA~3\{C6D52~1\1170~1.1\loli.dll => "C:\PROGRA~3\{C6D52~1\1170~1.1\loli.dll" File Not Found
ProxyEnable: [S-1-5-21-2926960347-1281131932-2454002305-1001] => Internet Explorer proxy is enabled.
ProxyServer: [S-1-5-21-2926960347-1281131932-2454002305-1001] => http=127.0.0.1:49212;https=127.0.0.1:49212
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKLM -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKLM-x32 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM-x32 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM-x32 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = https://search.yahoo.com/search?p={searchTerms}&ei=UTF-8&fr=w3i&type=W3i_DS,136,0_0,Search,20141251,20028,0,31,0
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
BHO-x32: No Name -> {02478D38-C3F9-4efb-9B51-7695ECA05670} ->  No File
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\Windows\system32\Adobe\Director\np32dsw.dll No File
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
CHR HKLM\...\Chrome\Extension: [iikflkcanblccfahdhdonehdalibjnif] - https://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [iikflkcanblccfahdhdonehdalibjnif] - https://clients2.google.com/service/update2/crx
Task: {4452BF2B-0F34-4C24-8CBD-E06E3FC0BE0D} - System32\Tasks\Validate Installation => C:\Users\Jon\AppData\Local\GeniusBox\updater.exe <==== ATTENTION
Task: {BE51CD98-6C6E-4141-BCEC-9F28263E9724} - System32\Tasks\GeniusBox => cmd.exe /C start "" "C:\Program Files (x86)\user extensions\client.exe" <==== ATTENTION
AlternateDataStreams: C:\ProgramData\Temp:264B2CC4
AlternateDataStreams: C:\Users\Jon\Desktop\For Bert.MOV:com.dropbox.attributes

End
Save the files as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

Restart the computer normally to reset the registry.

The tool will create a log (Fixlog.txt) please post it to your reply.
===

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
POST THE LOG FOR MY REVIEW.

Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

How is the computer running now?

#3 jakarlsson

jakarlsson
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:04:29 AM

Posted 18 May 2015 - 12:28 PM

I replied to your email but received a delivery failure notification, so I will just paste my reply here also:

******************************************************** 

 

Thanks, nasdaq
The only problem I had was when I removed the lines as directed in the beginning of the instructions, after I ran the fix I was unable to open my browser.  I restored my Internet Explorer settings to default condition and everything opened fine.  So far I have had no "Adware Installer Activity 7" attacks blocked by Norton, so that is good!  Again, thank you for your help!
 
Here are the logs you requested I attach:
First, fixlog.txt:
 
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 16-05-2015 02
Ran by Jon at 2015-05-18 09:05:14 Run:1
Running from C:\Users\Jon\Desktop\bleepingcomputer
Loaded Profiles: Jon (Available profiles: Jon)
Boot Mode: Normal
==============================================
Content of fixlist:
*****************
start
CreateRestorePoint:
CloseProcesses:
() C:\Program Files (x86)\user extensions\Client.exe
() C:\Program Files (x86)\user extensions\Client.exe
HKLM-x32\...\Run: [] => [X]
AppInit_DLLs-x32: C:\PROGRA~3\{C6D52~1\1170~1.1\loli.dll => "C:\PROGRA~3\{C6D52~1\1170~1.1\loli.dll" File Not Found
SearchScopes: HKLM -> DefaultScope
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKLM -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKLM-x32 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL =
http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM-x32 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM-x32 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 ->
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://taplika.com/results.php?f=4&q={searchTerms}&a=tpl_tight25&cd=2XzuyEtN2Y1L1QzuyByE0EyDtD0ByDyDtDtDyBtCyByE0CyCtN0D0Tzu0StCtBtByEtN1L2XzutAtFtCtDtFtBtFtDtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2SyC0A0ByEzy0A0BtAtGyDyD0DyBtGzztC0A0EtGtD0ByD0EtGtC0DyEtBtC0D0CtCyE0FyCyE2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0ByDzy0AtBzz0DtGyEyEzztAtGyE0F0F0EtG0ByD0CzytGtA0EtAtA0ByEtD0FyCyCzz0D2QtN0A0LzuyE&cr=1258636553&ir=
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = https://search.yahoo.com/search?p={searchTerms}&ei=UTF-8&fr=w3i&type=W3i_DS,136,0_0,Search,20141251,20028,0,31,0
SearchScopes: HKU\S-1-5-21-2926960347-1281131932-2454002305-1001 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL
= http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
BHO-x32: No Name -> {02478D38-C3F9-4efb-9B51-7695ECA05670} ->  No File
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @adobe.com/ShockwavePlayer -> C:\Windows\system32\Adobe\Director\np32dsw.dll No File
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
CHR HKLM\...\Chrome\Extension: [iikflkcanblccfahdhdonehdalibjnif] - https://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [iikflkcanblccfahdhdonehdalibjnif] - https://clients2.google.com/service/update2/crx
Task: {4452BF2B-0F34-4C24-8CBD-E06E3FC0BE0D} - System32\Tasks\Validate Installation => C:\Users\Jon\AppData\Local\GeniusBox\updater.exe <==== ATTENTION
Task: {BE51CD98-6C6E-4141-BCEC-9F28263E9724} - System32\Tasks\GeniusBox => cmd.exe /C start "" "C:\Program Files (x86)\user extensions\client.exe" <==== ATTENTION
AlternateDataStreams:
C:\ProgramData\Temp:264B2CC4
AlternateDataStreams: C:\Users\Jon\Desktop\For Bert.MOV:com.dropbox.attributes
End
*****************
Restore point was successfully created.
 
Second, malware scan log
 
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 5/18/2015
Scan Time: 11:20:26 AM
Logfile: Malwarelog.txt
Administrator: Yes
Version: 0.00.0.0000
Malware Database: v2015.05.18.04
Rootkit Database: v2015.05.16.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Jon
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 374537
Time Elapsed: 49 min, 11 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 0
(No malicious items detected)
Registry Values: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Folders: 0
(No malicious items detected)
Files: 0
(No malicious items detected)
Physical Sectors: 0
(No malicious items detected)

(end)
 
And last, the AdwCleaner log:
 
# AdwCleaner v4.204 - Logfile created 18/05/2015 at 12:47:33
# Updated 12/05/2015 by Xplode
# Database : 2015-05-12.2 [Server]
# Operating system : Windows 7 Home Premium Service Pack 1 (x64)
# Username : Jon - JON-HP
# Running from : C:\Users\Jon\Downloads\adwcleaner_4.204.exe
# Option : Cleaning
***** [ Services ] *****

***** [ Files / Folders ] *****
Folder Deleted : C:\Users\Jon\Favorites\radio
***** [ Scheduled tasks ] *****
Task Deleted : Check Updates
***** [ Shortcuts ] *****

***** [ Registry ] *****
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{D43B3890-80C7-4010-A95D-1E77B5924DC3}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GeniusBox
Data Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyServer] - hxxp=127.0.0.1:49167;hxxps=127.0.0.1:49167
Data Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyOverride] - <-loopback>
***** [ Web browsers ] *****
-\\ Internet Explorer v11.0.9600.17801

-\\ Google Chrome v

*************************
AdwCleaner[R0].txt - [1735 bytes] - [18/05/2015 12:44:03]
AdwCleaner[S0].txt - [1417 bytes] - [18/05/2015 12:47:33]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1476  bytes] ##########

 



#4 nasdaq

nasdaq

  • Malware Response Team
  • 39,559 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:29 AM

Posted 18 May 2015 - 12:35 PM

AdwCleaner took car of it also.

Data Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyServer] - hxxp=127.0.0.1:49167;hxxps=127.0.0.1:49167


Let me know in a few days if the problem returns.

#5 jakarlsson

jakarlsson
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:04:29 AM

Posted 18 May 2015 - 10:14 PM

I have had no attempts blocked by Norton since I went through this fix process so it looks good, but is there anything that was done that would have slowed my computer so severely that it now takes long periods to load pages and sometimes not at all? It went from a fast computer blocking Adware Installer to one that seems to me slogging through molasses. Just wondering if the fix caused other problems. Thanks

#6 nasdaq

nasdaq

  • Malware Response Team
  • 39,559 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:29 AM

Posted 19 May 2015 - 08:26 AM

Restore your Windows 7 to the Last good configuration
Follow the instructions on this page.

http://windows.microsoft.com/en-ca/windows/using-last-known-good-configuration#1TC=windows-7
<<<>>>

#7 nasdaq

nasdaq

  • Malware Response Team
  • 39,559 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:29 AM

Posted 25 May 2015 - 08:16 AM

Are you still with me?

If all is well.

To learn more about how to protect yourself while on the internet read this little guide best security practices keep safe.
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/
===

#8 nasdaq

nasdaq

  • Malware Response Team
  • 39,559 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:29 AM

Posted 31 May 2015 - 07:46 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users