Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My Grandson did it.


  • Please log in to reply
22 replies to this topic

#1 tootieteachey

tootieteachey

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 14 September 2015 - 06:29 PM

My wife let our 8 year old grandson use her laptop to play minecraft. He has it so loaded down with crap it is nearly un-useable. It takes forever to load anything and whenever the internet finally loads I get safesearch and 1 pop up after another. Can someone help me? She is running Windows 7 and has the problem with all 3 browsers on her laptop ... IE, Chrome, and Firefox.



BC AdBot (Login to Remove)

 


#2 crisis2k

crisis2k

  • Members
  • 121 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:39 PM

Posted 14 September 2015 - 07:44 PM

hi follow this process 1st please.

 

  . download ART and run it with administrator permission and click the yes i agree button

    click the scan button and click clean button when you have scan finished

    clean next button when you have clean finished and then click 

 

   reset internet explorer icon

    reset google chrome icon

    reset mozilla firefox icon

 

   when you have done all of it then click next button to close art

 

reboot and try surfing with internet explorer, chrom, firefox for test and send me a symptoms left thank you


:welcome: My Name is Philip You Can Call Me Phil
Thank You I'll be there anytime you need help :rolleyes:


#3 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 14 September 2015 - 08:31 PM

I have run ART and in Chrome I am still getting AssistPoint Ads and ShopwithBoost popup ads. In IE I am getting a virus scam ad from "supportcenterhq." and the same AssistPoint crap.  Also I cannot log onto your site in IE because every time i click anywhere on the page of Bleeping, it opens another IE window with another virus alert scam ad. Firefox seems to be the most stable of the 3 with no additional ads or pops at this time



#4 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 15 September 2015 - 05:34 AM

Hello there,

Please run these tools to get some information about your computer.

MiniToolbox by Farbar

Disable your antivirus if it does not allow you to download the tool!
Please download MiniToolBox, save it to your desktop and run it.
Place a checkmark in Select all, then click Go and post the result (MTB.txt). A copy of Result.txt will be saved in the same directory the tool is run.

===

Security Check by screen317
  • Download Security Check by screen317 from here or here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
A Notepad document should open automatically called checkup.txt. Please copy and paste the contents of the log in your next reply.

Regards,
Alex

#5 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 15 September 2015 - 10:27 AM

A guy named crisis2k started helping me last night but I just noticed he has less than 100 posts.  Is he legit?  Anyway ...

 

Here is MTB.txt

 

MiniToolBox by Farbar  Version: 25-07-2015 01
Ran by Doris (administrator) on 15-09-2015 at 11:14:56
Running from "C:\Users\Doris\Desktop\Bleeping"
Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X64)
Model: Studio 1737 Manufacturer: Dell Inc.
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================


"Reset FF Proxy Settings": Firefox Proxy settings were reset.

========================= Hosts content: =================================

::1             localhost

127.0.0.1 activate.adobe.com
127.0.0.1       localhost

========================= IP Configuration: ================================

Dell Wireless 1397 WLAN Mini-Card = Wireless Network Connection (Connected)
Broadcom NetLink ™ Gigabit Ethernet = Local Area Connection (Media disconnected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

   Host Name . . . . . . . . . . . . : Doris-Laptop
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : gateway.pace.com

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . : gateway.pace.com
   Description . . . . . . . . . . . : Dell Wireless 1397 WLAN Mini-Card
   Physical Address. . . . . . . . . : 00-23-4E-8D-46-31
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2602:304:aeb6:ef90:8c78:f088:2058:99ba(Preferred)
   Temporary IPv6 Address. . . . . . : 2602:304:aeb6:ef90:5523:dfb1:4617:7412(Preferred)
   Link-local IPv6 Address . . . . . : fe80::8c78:f088:2058:99ba%12(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.65(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Tuesday, September 15, 2015 10:28:38 AM
   Lease Expires . . . . . . . . . . : Wednesday, September 16, 2015 10:28:30 AM
   Default Gateway . . . . . . . . . : fe80::96c1:50ff:fe6b:9fb9%12
                                       192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DNS Servers . . . . . . . . . . . : 192.168.1.254
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 0030365.lodgenet.net
   Description . . . . . . . . . . . : Broadcom NetLink ™ Gigabit Ethernet
   Physical Address. . . . . . . . . : 00-21-70-90-37-E4
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : gateway.pace.com
   Description . . . . . . . . . . . : isatap.gateway.pace.com
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 13:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.0030365.lodgenet.net
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
DNS request timed out.
    timeout was 2 seconds.
Server:  UnKnown
Address:  192.168.1.254

Name:    google.com
Addresses:  2607:f8b0:4002:c09::64
      74.125.21.102
      74.125.21.101
      74.125.21.138
      74.125.21.100
      74.125.21.139
      74.125.21.113



Pinging google.com [2607:f8b0:4002:c03::71] from 2602:304:aeb6:ef90:5523:dfb1:4617:7412 with 32 bytes of data:

Reply from 2607:f8b0:4002:c03::71: time=2469ms

Reply from 2607:f8b0:4002:c03::71: time=49ms



Ping statistics for 2607:f8b0:4002:c03::71:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 49ms, Maximum = 2469ms, Average = 1259ms

Server:  homeportal
Address:  192.168.1.254

Name:    yahoo.com
Addresses:  2001:4998:58:c02::a9
      2001:4998:c:a06::2:4008
      2001:4998:44:204::a7
      206.190.36.45
      98.138.253.109
      98.139.183.24



Pinging yahoo.com [2001:4998:44:204::a7] from 2602:304:aeb6:ef90:5523:dfb1:4617:7412 with 32 bytes of data:

Reply from 2001:4998:44:204::a7: time=108ms

Reply from 2001:4998:44:204::a7: time=83ms



Ping statistics for 2001:4998:44:204::a7:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 83ms, Maximum = 108ms, Average = 95ms



Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
 12 ...00 23 4e 8d 46 31 ...... Dell Wireless 1397 WLAN Mini-Card
 11 ...00 21 70 90 37 e4 ...... Broadcom NetLink ™ Gigabit Ethernet
  1 ........................... Software Loopback Interface 1
 10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 13 ...00 00 00 00 00 00 00 e0  Microsoft ISATAP Adapter #2
 16 ...00 00 00 00 00 00 00 e0  isatap.gateway.pace.com
 14 ...00 00 00 00 00 00 00 e0  isatap.0030365.lodgenet.net
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.65     25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link      192.168.1.65    281
     192.168.1.65  255.255.255.255         On-link      192.168.1.65    281
    192.168.1.255  255.255.255.255         On-link      192.168.1.65    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link      192.168.1.65    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link      192.168.1.65    281
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 12    281 ::/0                     fe80::96c1:50ff:fe6b:9fb9
  1    306 ::1/128                  On-link
 12     33 2602:304:aeb6:ef90::/64  On-link
 12    281 2602:304:aeb6:ef90:5523:dfb1:4617:7412/128
                                    On-link
 12    281 2602:304:aeb6:ef90:8c78:f088:2058:99ba/128
                                    On-link
 12    281 fe80::/64                On-link
 12    281 fe80::8c78:f088:2058:99ba/128
                                    On-link
  1    306 ff00::/8                 On-link
 12    281 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [48640] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\winrnr.dll [19968] (Microsoft Corporation)
Catalog9 01 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [61440] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\napinsp.dll [62976] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\winrnr.dll [27648] (Microsoft Corporation)
x64-Catalog9 01 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (09/15/2015 10:29:47 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 10:28:52 AM) (Source: BstHdAndroidSvc) (User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/15/2015 03:21:20 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 03:21:08 AM) (Source: BstHdAndroidSvc) (User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/15/2015 12:10:24 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 12:09:17 AM) (Source: BstHdAndroidSvc) (User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/14/2015 11:15:41 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 9.0.8112.16685 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Problem Reports and Solutions control panel.
Process ID: 1590
Start Time: 01d0ef64b05bc547
Termination Time: 13

Error: (09/14/2015 11:14:52 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 9.0.8112.16685 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Problem Reports and Solutions control panel.
Process ID: 158c
Start Time: 01d0ef647a2a2ca7
Termination Time: 8

Error: (09/14/2015 11:10:11 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 9.0.8112.16685 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Problem Reports and Solutions control panel.
Process ID: f74
Start Time: 01d0ef6392db1627
Termination Time: 3

Error: (09/14/2015 11:05:24 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


System errors:
=============

Microsoft Office Sessions:
=========================
Error: (09/15/2015 10:29:47 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 10:28:52 AM) (Source: BstHdAndroidSvc)(User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/15/2015 03:21:20 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 03:21:08 AM) (Source: BstHdAndroidSvc)(User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/15/2015 12:10:24 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (09/15/2015 12:09:17 AM) (Source: BstHdAndroidSvc)(User: )
Description: Service cannot be started. System.ApplicationException: Cannot start service.  Service did not stop gracefully the last time it was run.
   at BlueStacks.hyperDroid.Service.Service.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (09/14/2015 11:15:41 PM) (Source: Application Hang)(User: )
Description: iexplore.exe9.0.8112.16685159001d0ef64b05bc54713

Error: (09/14/2015 11:14:52 PM) (Source: Application Hang)(User: )
Description: iexplore.exe9.0.8112.16685158c01d0ef647a2a2ca78

Error: (09/14/2015 11:10:11 PM) (Source: Application Hang)(User: )
Description: iexplore.exe9.0.8112.16685f7401d0ef6392db16273

Error: (09/14/2015 11:05:24 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


CodeIntegrity Errors:
===================================
  Date: 2015-09-13 22:12:54.067
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Program Files (x86)\360\Total Security\deepscan\360FsFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:12:53.817
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Program Files (x86)\360\Total Security\deepscan\360FsFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:12:53.340
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Program Files (x86)\360\Total Security\deepscan\360FsFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:12:52.942
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Program Files (x86)\360\Total Security\deepscan\360FsFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:56.937
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:56.648
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:56.348
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:56.049
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:55.716
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.

  Date: 2015-09-13 22:10:55.383
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\360AvFlt.sys because the set of per-page image hashes could not be found on the system.


=========================== Installed Programs ============================

Amazon Kindle (HKCU\...\Amazon Kindle) (Version:  - Amazon)
Amazon Kindle (HKCU-x32\...\Amazon Kindle) (Version:  - Amazon)
ccc-utility64 (HKLM-x32\...\{18CFBCD3-2EAD-4F49-FC0F-9039B23043A2}) (Version: 2008.0703.2236.38526 - ATI) Hidden
Dell Dock (HKLM\...\{F6CB42B9-F033-4152-8813-FF11DA8E6A78}) (Version: 1.0.0 - Dell)
Dell Dock (HKLM-x32\...\{F6CB42B9-F033-4152-8813-FF11DA8E6A78}) (Version: 1.0.0 - Dell)
Dell Touchpad (HKLM\...\{9F72EF8B-AEC9-4CA5-B483-143980AFD6FD}) (Version: 7.102.101.211 - Alps Electric)
Dell Touchpad (HKLM-x32\...\{9F72EF8B-AEC9-4CA5-B483-143980AFD6FD}) (Version: 7.102.101.211 - Alps Electric)
Dell Wireless WLAN Card Utility (HKLM\...\Broadcom 802.11b Network Adapter) (Version: 4.170.77.13 - Dell Inc.)
Dell Wireless WLAN Card Utility (HKLM-x32\...\Broadcom 802.11b Network Adapter) (Version: 4.170.77.13 - Dell Inc.)
Google Chrome (HKCU\...\Google Chrome) (Version: 45.0.2454.85 - Google Inc.)
Google Chrome (HKCU-x32\...\Google Chrome) (Version: 45.0.2454.85 - Google Inc.)
HP Officejet Pro 8600 Basic Device Software (HKLM\...\{791A06E2-340F-43B0-8FAB-62D151339362}) (Version: 28.0.1315.0 - Hewlett-Packard Co.)
HP Officejet Pro 8600 Basic Device Software (HKLM-x32\...\{791A06E2-340F-43B0-8FAB-62D151339362}) (Version: 28.0.1315.0 - Hewlett-Packard Co.)
Integrated Webcam Driver (1.06.03.0309)   (HKLM\...\Creative OA001) (Version: 1.06.03.0309 - Creative Technology Ltd.)
Integrated Webcam Driver (1.06.03.0309)   (HKLM-x32\...\Creative OA001) (Version: 1.06.03.0309 - Creative Technology Ltd.)
McAfee Security Scan Plus (HKLM\...\McAfee Security Scan) (Version: 3.8.150.1 - McAfee, Inc.)
McAfee Security Scan Plus (HKLM-x32\...\McAfee Security Scan) (Version: 3.8.150.1 - McAfee, Inc.)
Microsoft .NET Framework 3.5 SP1 (HKLM\...\Microsoft .NET Framework 3.5 SP1) (Version:  - Microsoft Corporation)
Microsoft .NET Framework 3.5 SP1 (HKLM-x32\...\Microsoft .NET Framework 3.5 SP1) (Version:  - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft .NET Framework 4.5.1 (HKLM-x32\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (HKLM\...\{B6E3757B-5E77-3915-866A-CCFC4B8D194C}) (Version: 8.0.50727.4053 - Microsoft Corporation)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (HKLM-x32\...\{B6E3757B-5E77-3915-866A-CCFC4B8D194C}) (Version: 8.0.50727.4053 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) - KB2467175 (HKLM\...\{aac9fcc4-dd9e-4add-901c-b5496a07ab2e}) (Version: 8.0.51011 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) - KB2467175 (HKLM-x32\...\{aac9fcc4-dd9e-4add-901c-b5496a07ab2e}) (Version: 8.0.51011 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM\...\{071c9b48-7c32-4621-a0ac-3f809523288f}) (Version: 8.0.56336 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM\...\{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}) (Version: 8.0.61000 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM-x32\...\{071c9b48-7c32-4621-a0ac-3f809523288f}) (Version: 8.0.56336 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM-x32\...\{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}) (Version: 8.0.61000 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022.218 (HKLM\...\{BBBE35B2-9349-3C48-BD3D-F574B17C7924}) (Version: 9.0.21022.218 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022.218 (HKLM-x32\...\{BBBE35B2-9349-3C48-BD3D-F574B17C7924}) (Version: 9.0.21022.218 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM-x32\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM-x32\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Minecraft Packages (HKCU\...\Minecraft Packages) (Version:  - )
Minecraft Packages (HKCU-x32\...\Minecraft Packages) (Version:  - )
Minecraft Packages 21 (HKCU\...\Minecraft Packages 21) (Version:  - )
Minecraft Packages 21 (HKCU-x32\...\Minecraft Packages 21) (Version:  - )
Quickset (HKLM\...\{87CF757E-C1F1-4D22-865C-00C6950B5258}) (Version: 9.2.8 - Dell Inc.)
Quickset (HKLM-x32\...\{87CF757E-C1F1-4D22-865C-00C6950B5258}) (Version: 9.2.8 - Dell Inc.)

========================= Devices: ================================


========================= Memory info: ===================================

Percentage of memory in use: 50%
Total physical RAM: 4059.98 MB
Available physical RAM: 2006.42 MB
Total Virtual: 8345.25 MB
Available Virtual: 6067.35 MB

========================= Partitions: =====================================

1 Drive c: (OS) (Fixed) (Total:287.95 GB) (Free:168 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:10 GB) (Free:3 GB) NTFS

========================= Users: ========================================

User accounts for \\DORIS-LAPTOP

Administrator            Doris                    Guest                    
Hill                     

========================= Minidump Files ==================================

C:\Windows\Minidump\Mini032414-01.dmp
C:\Windows\Minidump\Mini093014-01.dmp
========================= Restore Points ==================================

03-06-2015 04:00:02 Scheduled Checkpoint
05-06-2015 04:00:01 Scheduled Checkpoint
15-06-2015 02:32:08 Scheduled Checkpoint
16-06-2015 04:00:01 Scheduled Checkpoint
16-06-2015 07:00:15 Windows Update
03-07-2015 23:17:07 Scheduled Checkpoint
06-07-2015 04:00:04 Scheduled Checkpoint
07-07-2015 04:00:01 Scheduled Checkpoint
08-07-2015 04:00:01 Scheduled Checkpoint
10-07-2015 04:00:03 Scheduled Checkpoint
11-07-2015 04:00:03 Scheduled Checkpoint
15-07-2015 04:00:05 Scheduled Checkpoint
15-07-2015 07:00:19 Windows Update
17-07-2015 15:21:02 Scheduled Checkpoint
01-08-2015 07:01:19 Windows Update
21-08-2015 22:47:27 Windows Update
22-08-2015 07:00:13 Windows Update
14-09-2015 02:39:54 Removed GeekBuddy.
14-09-2015 02:44:29 Removed BlueStacks Notification Center
14-09-2015 02:47:00 Removed BlueStacks Notification Center
15-09-2015 02:54:34 Ultra Adware Killer adware removal
15-09-2015 03:54:07 JRT Pre-Junkware Removal
15-09-2015 07:00:17 Windows Update

**** End of log ****
 

 

 

Here is checkup.txt

 

 Results of screen317's Security Check version 1.008  
 Windows Vista Service Pack 2 x64 (UAC is enabled)  
 Internet Explorer 9  
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Disabled!  
Norton Security   
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 Java™ 6 Update 7  
 Java version 32-bit out of Date!
 Adobe Flash Player     18.0.0.232  
 Adobe Reader 9 Adobe Reader out of Date!
 Mozilla Firefox 38.0.1 Firefox out of Date!  
 Google Chrome (44.0.2403.157)
 Google Chrome (45.0.2454.85)
````````Process Check: objlist.exe by Laurent````````  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 2 % Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````
 



#6 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 15 September 2015 - 10:56 AM

Hi there,

Please uninstall the following software from Programs and Features:

McAfee Security Scan Plus (HKLM\...\McAfee Security Scan) (Version: 3.8.150.1 - McAfee, Inc.)

If you run into any issues, let me know.

===

Do you have any active antivirus software right now? The MiniToolbox log did not list any AVs installed on your system.

===

Please run this and see what it catches.

AdwCleaner by Xplode

Please download AdwCleaner by Xplode and save to your Desktop.
  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8/10 users right-click and select Run As Administrator
  • The tool will start to update the database, please wait a bit.
  • Click on I agree button.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • DO NOT CLEAN ANYTHING! Removal will be done after analysis of the log.
  • After the scan has finished, click on the Logfile button...a logfile (AdwCleaner[S#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
  • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
Regards,
Alex

Edited by Alexstrasza, 15 September 2015 - 10:56 AM.


#7 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 15 September 2015 - 11:19 AM

I did not have an antivirus running but have now installed Norton

 

The other guy already had me run this and check the "cleaning" button without any analysis. I think maybe he did not know what he was doing.  This is logfile from the second run today.

 

 

 

# AdwCleaner v5.007 - Logfile created 15/09/2015 at 12:13:32
# Updated 08/09/2015 by Xplode
# Database : 2015-09-10.1 [Server]
# Operating system : Windows ™ Vista Home Premium Service Pack 2 (x64)
# Username : Doris - DORIS-LAPTOP
# Running from : C:\Users\Doris\Desktop\Bleeping\AdwCleaner.exe
# Option : Scan
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****


***** [ Files ] *****

File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_klibnahbojhkanfgaglnlalfkgpcppfi_0
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klibnahbojhkanfgaglnlalfkgpcppfi
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_nemfjadlboooiffmcelkafilagddogim_0
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nemfjadlboooiffmcelkafilagddogim
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_static.boostsaves.com_0.localstorage
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_static.boostsaves.com_0.localstorage-journal

***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****

Task Found : BrowserDefendert
Task Found : ConsumerInputUpdateTaskMachineCore
Task Found : Desk 365 RunAsStdUser
Task Found : LaunchSignup
Task Found : PC SpeedUp Service Deactivator
Task Found : Super Optimizer Schedule

***** [ Registry ] *****


***** [ Web browsers ] *****

[C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Found : kfecnpmgnlnbmipaogfhoacoioifjgko

########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [1754 bytes] ##########
 



#8 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 15 September 2015 - 11:30 AM

Hello there,

AdwCleaner - Scan & Clean

Please download AdwCleaner by Xplode and save to your Desktop.
  • Double click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator
  • The tool will start to update the database, please wait a bit.
  • Click on the Scan button.
  • AdwCleaner will begin to scan your computer like it did before.
  • After the scan has finished, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[C#].txt) will open automatically (where the largest value of # represents the most recent report).
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
===

Junkware Removal Tool by Malwarebytes Corporation

thisisujrt.gif Please download Junkware Removal Tool to your desktop.
  • Disable all your antivirus and antimalware software - see how to do that here.
  • Right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
To recap, I will need the cleaning log from AdwCleaner and the log from JRT in your next reply. Feel free to use multiple posts if they are too long for one post.

Regards,
Alex

#9 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 15 September 2015 - 11:54 AM

Here is the adware cleaner log

 

# AdwCleaner v5.007 - Logfile created 15/09/2015 at 12:13:32
# Updated 08/09/2015 by Xplode
# Database : 2015-09-10.1 [Server]
# Operating system : Windows ™ Vista Home Premium Service Pack 2 (x64)
# Username : Doris - DORIS-LAPTOP
# Running from : C:\Users\Doris\Desktop\Bleeping\AdwCleaner.exe
# Option : Scan
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****


***** [ Files ] *****

File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_klibnahbojhkanfgaglnlalfkgpcppfi_0
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klibnahbojhkanfgaglnlalfkgpcppfi
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_nemfjadlboooiffmcelkafilagddogim_0
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nemfjadlboooiffmcelkafilagddogim
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_static.boostsaves.com_0.localstorage
File Found : C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_static.boostsaves.com_0.localstorage-journal

***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****

Task Found : BrowserDefendert
Task Found : ConsumerInputUpdateTaskMachineCore
Task Found : Desk 365 RunAsStdUser
Task Found : LaunchSignup
Task Found : PC SpeedUp Service Deactivator
Task Found : Super Optimizer Schedule

***** [ Registry ] *****


***** [ Web browsers ] *****

[C:\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Found : kfecnpmgnlnbmipaogfhoacoioifjgko

########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [1754 bytes] ##########
 

 

 

Here is the JRT log

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.6.1 (09.08.2015:1)
OS: Windows ™ Vista Home Premium x64
Ran by Doris on Tue 09/15/2015 at 12:45:53.74
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Tasks



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] (Default)    REG_SZ    Fast Browser



~~~ Files

Successfully deleted: [File] C:\Users\Doris\Appdata\Local\google\chrome\user data\default\local storage\hxxps_static.boostsaves.com_0.localstorage
Successfully deleted: [File] C:\Users\Doris\Appdata\Local\google\chrome\user data\default\local storage\hxxps_static.boostsaves.com_0.localstorage-journal



~~~ Folders



~~~ Chrome


[C:\Users\Doris\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - default search provider reset

[C:\Users\Doris\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:

[C:\Users\Doris\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset

[C:\Users\Doris\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:
[]





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Tue 09/15/2015 at 12:51:43.48
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 



#10 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 15 September 2015 - 12:15 PM

Hi there,

Emsisoft Emergency Kit

Please download Emsisoft Emergency Kit and save it to your desktop. Double click on the EmsisoftEmergencyKit file you downloaded to extract its contents and create a shortcut on the desktop. Leave all settings as they are and click the Extract button at the bottom. A folder named EEK will be created in the root of the drive (usually c:\).
  • After extraction please double-click on the new Start Emsisoft Emergency Kit icon on your desktop.
  • The first time you launch it, Emsisoft Emergency Kit will recommend that you allow it to download updates. Please click Yes so that it downloads the latest database updates.
  • When update is complete, click Malware Scan. When asked if you want the scanner to scan for Potentially Unwanted Programs, click Yes. Emsisoft Emergency Kit will start scanning.
  • When the scan is completed click Quarantine selected objects. Note, this option is only available if malicious objects were detected during the scan.
  • When the threats have been quarantined, click the View report button in the lower-right corner, and the scan log will be opened in Notepad.
  • Please save the log in Notepad on your desktop and post the contents in your next reply.
  • When you close Emsisoft Emergency Kit, it will give you an option to sign up for a newsletter. This is optional, and is not necessary for the malware removal process.
Let me know how the computer is doing after Emsisoft finished cleaning.

Regards,
Alex

#11 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 15 September 2015 - 03:15 PM

Here is the report from emsisoft ... It would not let me post thetaching the report instead report because it says therre are too many emoticons in it.  I am attaching it instead

 

Emsisoft Emergency Kit - Version 10.0
Last update: 9/15/2015 3:56:25 PM
User account: Doris-Laptop\Doris

Scan settings:

Scan type: Malware Scan
Objects: Rootkits, Memory, Traces, Files

Detect PUPs: On
Scan archives: Off
ADS Scan: On
File extension filter: Off
Advanced caching: On
Direct disk access: Off

Scan start:    9/15/2015 3:57:45 PM
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1002\SOFTWARE\APPDATALOW\SOFTWARE\CROSSRIDER     detected: Application.Toolbar (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{1D4DB7D1-6EC9-47A3-BD87-1E41684E07BB}     detected: Adware.Win32.Hubar (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{1D4DB7D3-6EC9-47A3-BD87-1E41684E07BB}     detected: Adware.Win32.Hubar (A)
Value: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR     detected: Setting.DisableTaskMgr (A)
Value: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS     detected: Setting.DisableRegistryTools (A)
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1002\SOFTWARE\DATAMNGR     detected: Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{AB56DFDE-0C14-45B3-9DF6-7B0EBA617870}     detected: Application.AdReg (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\YT.YTNAVASSISTPLUGIN     detected: Application.AdReg (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\YT.YTNAVASSISTPLUGIN.1     detected: Application.AdReg (A)
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\TOTALRECIPESEARCH_14     detected: Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\RECIPEHUB_2JEI     detected: Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\TOTALRECIPESEARCH_14     detected: Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\TOTALRECIPESEARCH_14EI     detected: Application.InstallAd (A)
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RGG01IP\uninst.exe     detected: Trojan.Generic.11323786 (B)
C:\Users\Doris\AppData\Local\Temp\{10A3175C-1C0B-4047-A9A9-3C0CFA2C9467}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{3D2FBA1A-3F3D-45BD-90A9-0B53BBD4264B}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{2603F434-4CE4-4D29-90E6-20EB0550FA3F}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{3BBCBF14-6159-4F49-8554-5B04B0CFE0FA}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{3E3776F6-53F1-4BEF-959D-CC7F96575851}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{73EF5106-73B7-4506-98E4-2432AD379985}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{6CE2C651-2EB2-441A-A490-A99E5416877B}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{81A96EED-5F43-431B-92D9-4A0FC85B1114}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{83E1CE2B-E801-4B74-B958-77D1B5713D86}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{90FFA957-6540-4D4F-ABB0-DF42B4D2BA07}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{997F8E59-EC8D-46BE-8199-B8D3388CEF6D}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{AF10BE25-6017-42A2-BF04-4DDCCA9AEE88}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{9B8A2404-FB66-4CA9-89E3-9DC0B2335E63}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{EFEB663A-0786-4BD0-AA8F-7C56B5E0096E}.dll     detected: Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{C3D6DF91-D222-49A4-B06D-F829E16056D1}.dll     detected: Adware.BrowseFox.EK (B)

Scanned    76752
Found    29

Scan end:    9/15/2015 4:06:56 PM
Scan time:    0:09:11

Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\YT.YTNAVASSISTPLUGIN.1    Quarantined Application.AdReg (A)
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\TOTALRECIPESEARCH_14    Quarantined Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\YT.YTNAVASSISTPLUGIN    Quarantined Application.AdReg (A)
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1002\SOFTWARE\DATAMNGR    Quarantined Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1002\SOFTWARE\APPDATALOW\SOFTWARE\CROSSRIDER    Quarantined Application.Toolbar (A)
C:\Users\Doris\AppData\Local\Temp\{73EF5106-73B7-4506-98E4-2432AD379985}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{6CE2C651-2EB2-441A-A490-A99E5416877B}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{81A96EED-5F43-431B-92D9-4A0FC85B1114}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{83E1CE2B-E801-4B74-B958-77D1B5713D86}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{90FFA957-6540-4D4F-ABB0-DF42B4D2BA07}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{AF10BE25-6017-42A2-BF04-4DDCCA9AEE88}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{3D2FBA1A-3F3D-45BD-90A9-0B53BBD4264B}.dll    Quarantined Adware.BrowseFox.EK (B)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{1D4DB7D3-6EC9-47A3-BD87-1E41684E07BB}    Quarantined Adware.Win32.Hubar (A)
C:\Users\Doris\AppData\Local\Temp\{3E3776F6-53F1-4BEF-959D-CC7F96575851}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{2603F434-4CE4-4D29-90E6-20EB0550FA3F}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{3BBCBF14-6159-4F49-8554-5B04B0CFE0FA}.dll    Quarantined Adware.BrowseFox.EK (B)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{1D4DB7D1-6EC9-47A3-BD87-1E41684E07BB}    Quarantined Adware.Win32.Hubar (A)
C:\Users\Doris\AppData\Local\Temp\{9B8A2404-FB66-4CA9-89E3-9DC0B2335E63}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{997F8E59-EC8D-46BE-8199-B8D3388CEF6D}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{C3D6DF91-D222-49A4-B06D-F829E16056D1}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{10A3175C-1C0B-4047-A9A9-3C0CFA2C9467}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\Users\Doris\AppData\Local\Temp\{EFEB663A-0786-4BD0-AA8F-7C56B5E0096E}.dll    Quarantined Adware.BrowseFox.EK (B)
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RGG01IP\uninst.exe    Quarantined Trojan.Generic.11323786 (B)
Value: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS    Quarantined Setting.DisableRegistryTools (A)
Value: HKEY_USERS\S-1-5-21-2223683546-189027032-1121247803-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR    Quarantined Setting.DisableTaskMgr (A)

Quarantined    25
 



#12 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 15 September 2015 - 03:16 PM

Finally got it to post



#13 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 15 September 2015 - 03:26 PM

Hi there,

We will run two more scans to make sure that we did not miss anything.

Malwarebytes Anti-Malware

Download Malwarebytes Anti-Malware from here.

Double click on the file mbam-setup-2.x.x.xxxx.exe to install the application. (x.x.xxxx is the version)
  • Follow the prompt. At the end place a checkmark in Launch Malwarebytes Anti-Malware, then choose Finish.
  • When MBAM opens it will says Your database is out of date. Choose Fix Now.
  • Click on the Scan tab at the top of the window, choose Threat Scan, then Scan Now.
  • If you receive a message that updates are available, choose Update Now button (the scan will start after updates are completed).
  • Please be patient as the scan will take some time.
  • If MBAM detected threats, choose Quarantine for all items, then click Apply Actions.
  • While still on the Scan tab, choose View detailed log. In the window that opens, click the Export button, choose Text file (*.txt) and save the log to your Desktop.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


===

ESET Online Scanner
  • Click here to download the installer for ESET Online Scanner and save it to your Desktop.
  • Disable all your antivirus and antimalware software - see how to do that here.
  • Right click on esetsmartinstaller_enu.exe and select Run as Administrator.
  • Place a checkmark in YES, I accept the Terms of Use, then click Start. Wait for ESET Online Scanner to load its components.
  • Select Enable detection of potentially unwanted applications.
  • Click Advanced Settings, then place a checkmark in the following:
    • Remove found threats
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click Start to begin scanning.
  • ESET Online Scanner will start downloading signatures and scan. Please be patient, as this scan can take quite some time.
  • When the scan is done, click List threats (only available if ESET Online Scanner found something).
  • Click Export, then save the file to your desktop.
  • Click Back, then Finish to exit ESET Online Scanner.
After both scans are finished, let me know how the computer is doing.

Regards,
Alex

#14 tootieteachey

tootieteachey
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:01:39 PM

Posted 16 September 2015 - 12:46 PM

UPDATE

 

After the latest scans the PC took 4:47 minutes to boot to a desktop.

Mozilla starts quickly and has no popup or redirect ads

IE takes more than 30 seconds to open to a plain goole search box. Has no popup or redirects

Chrome opems home page in 3 seconds - No popups or redirects

 

So .... Seems like boot tiime is still too long and IE still takes far too long to open a home page

 

Here is the Malwarebytes scan

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 9/15/2015
Scan Time: 8:52:17 PM
Logfile: MWBAntiMalware.txt
Administrator: Yes

Version: 2.1.8.1057
Malware Database: v2015.09.16.01
Rootkit Database: v2015.08.16.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows Vista Service Pack 2
CPU: x64
File System: NTFS
User: Doris

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 419991
Time Elapsed: 31 min, 58 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

 

 

Here is the ESET log

 

C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$R7ZIA7P.exe    Win32/DownWare.Y potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RFW45U7.exe    Win32/Toolbar.Conduit potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RI35PVH.exe    a variant of Win32/Toolbar.SearchSuite.Y potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$R4O0090\89iu4ri7.default\extensions\{63252118-a9bd-41e9-aa0e-1c19a0907a48}.xpi    JS/BrowseFox.A potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$R4O0090\89iu4ri7.default\extensions\ffxtlbr@delta.com\uninstall.exe    Win32/Toolbar.Montiera.B potentially unwanted application    deleted - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$R4O0090\89iu4ri7.default\extensions\{07cbf788-1359-421b-a4e3-5a8d041b90a3}\ctypes\FirefoxCtype.dll    a variant of Win32/Conduit.SearchProtect.N potentially unwanted application    cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$R4O0090\89iu4ri7.default\extensions\{07cbf788-1359-421b-a4e3-5a8d041b90a3}\Plugins\npFirefoxPlugin.dll    a variant of Win32/Conduit.SearchProtect.N potentially unwanted application    cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RGG01IP\Simple.dll    a variant of Win32/Itsalike.C potentially unwanted application    cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-2223683546-189027032-1121247803-1001\$RHSC8TI\Like.dll    Win32/Itsalike.A potentially unwanted application    cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\Assist Point\Extensions\{63252118-a9bd-41e9-aa0e-1c19a0907a48}.xpi.vir    JS/BrowseFox.A potentially unwanted application    deleted - quarantined
C:\AdwCleaner\Quarantine\C\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Extensions\nemfjadlboooiffmcelkafilagddogim\10.16.100.4_0\plugins\ConduitChromeApiPlugin.dll.vir    a variant of Win32/Toolbar.Conduit.AH potentially unwanted application    cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Doris\AppData\Local\Google\Chrome\User Data\Default\Extensions\nemfjadlboooiffmcelkafilagddogim\10.16.100.4_0\plugins\TBVerifier.dll.vir    Win32/Toolbar.Conduit.AC potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\fe3515f5-07ae-49be-b1b7-a61219a92e39.crx    JS/Redirector.NCG trojan    deleted - quarantined
C:\Users\Doris\AppData\Local\Fast Browser\User Data\Default\Extensions\klibnahbojhkanfgaglnlalfkgpcppfi\10.16.100.4_0\plugins\ConduitChromeApiPlugin.dll    a variant of Win32/Toolbar.Conduit.AH potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Fast Browser\User Data\Default\Extensions\klibnahbojhkanfgaglnlalfkgpcppfi\10.16.100.4_0\plugins\TBVerifier.dll    Win32/Toolbar.Conduit.AC potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Fast Browser\User Data\Default\Extensions\nemfjadlboooiffmcelkafilagddogim\10.16.100.4_0\plugins\ConduitChromeApiPlugin.dll    a variant of Win32/Toolbar.Conduit.AH potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Fast Browser\User Data\Default\Extensions\nemfjadlboooiffmcelkafilagddogim\10.16.100.4_0\plugins\TBVerifier.dll    Win32/Toolbar.Conduit.AC potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\1149212.Uninstall\uninstaller.exe    a variant of Win32/InstallCore.ZC potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\in7EAD48DF\68883B85_stp\icmac.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\in7EAD48DF\6A260728_stp\RAM.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\is1107330353\2B2D7549_stp\RAM.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\is1200027963\787C083F_stp\icmac.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\is252775460\6A260728_stp\RAM.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\is972239885\160CDC1F_stp\RAM.dll    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Users\Doris\AppData\Local\Temp\~un08c43d165\u08c5a1f01.exe    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3Y6TH2O5\update[1]    a variant of Win32/Toolbar.Perion.A potentially unwanted application    deleted - quarantined
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3Y6TH2O5\update[2]    a variant of Win32/Toolbar.Perion.A potentially unwanted application    deleted - quarantined
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L2VQQRR4\ic_unchecky_setup_0375[1].exe    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L2VQQRR4\update[1]    a variant of Win32/Toolbar.Perion.A potentially unwanted application    deleted - quarantined
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S3K31KDX\update[1]    a variant of Win32/Toolbar.Perion.A potentially unwanted application    deleted - quarantined
C:\Windows\Temp\~un0\i0.exe    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Windows\Temp\~un067e0c975\i067fbc8e3.exe    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
C:\Windows\Temp\~un0f5982bdc\i0f5d263e1.exe    a variant of Win32/InstallCore.ACL potentially unwanted application    cleaned by deleting - quarantined
 

 

 

 



#15 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:06:39 PM

Posted 16 September 2015 - 02:05 PM

The long boot time can be because of a lot of applications launching on startup... let's see what we can remove.

Autoruns by Sysinternals

Please follow the instructions below to give me an Autoruns log containing your start-up entries:
  • Download Autoruns from here.
  • Extract the content of the Autoruns.zip folder on the Desktop.
  • Open the Autoruns folder, right click on Autoruns.exe and click Run as Administrator.
  • Accept the EULA on opening, then wait for all the entries to load.
  • Click on File, then Save and save the file to your Desktop.
  • Go on ge.tt and upload the Autoruns file you saved.
  • Please copy and post the download URL of your uploaded file in your next reply.
Regards,
Alex




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users