Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Random Web Pages keep opening up when internet is accessed.


  • Please log in to reply
7 replies to this topic

#1 Bungy1952

Bungy1952

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 21 January 2016 - 05:32 AM

Hi,

 

I have a problem. 

 

The minute I start my web browser (Chrome, IE, Motzilla) I am constantly bombarded by random web sites/p.ages

I am currently running Windows10 and using Trend Micro - Titanium internet security.

 

Initally I thought it was Chrome giving me a problem so I uninstalled it. 

That's where I am now and I'm still in trouble and would appreciate any help I can get.

 

(hope I've done this the right way)

Bungy1952



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • BC Advisor
  • 12,883 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:42 AM

Posted 21 January 2016 - 07:30 AM

Welcome to BC...

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#3 Bungy1952

Bungy1952
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 22 January 2016 - 06:53 PM

Hi sorry for the delay.

 

Here are the logs requested.  I had a bit of trouble with my service and hopefully this is what was required.

 

=======================================================================================================

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 1/22/2016
Scan Time: 1:13 AM
Logfile: anti 1.txt
Administrator: Yes

Version: 2.2.0.1024
Malware Database: v2016.01.21.02
Rootkit Database: v2016.01.20.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 10
CPU: x64
File System: NTFS
User: Glenn

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 466497
Time Elapsed: 1 hr, 53 min, 52 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 7
Adware.EoRezo, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe, 10016, Delete-on-Reboot, [bc8a8bb1e5b4ee4847329c2752afdf21]
Adware.EoRezo, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe, 9968, Delete-on-Reboot, [64e256e6a3f690a660b23f4710f1867a]
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\WindoWeather.exe, 740, Delete-on-Reboot, [b39350ece7b24aeca7093a19b44c0af6]
Adware.CloudGuard, C:\Program Files (x86)\DNS Unlocker\dnslafayette.exe, 9152, Delete-on-Reboot, [65e1a993445565d1ec096b6c59a8ae52]
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe, 9968, Delete-on-Reboot, [271fbc80b8e1ab8b177c5c72bb4855ab]
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\dnslafayette.exe, 9152, Delete-on-Reboot, [c97d3a02712873c3d2b2ddc559a9e41c]
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe, 10016, Delete-on-Reboot, [43038fadadec59dd51779c1d26dc4bb5]

Modules: 0
(No malicious items detected)

Registry Keys: 16
PUP.Optional.TrailerTime, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\TrailerTime, Quarantined, [9da96bd15c3d87af8c38d9f3778a46ba],
PUP.Optional.CloudScout, HKLM\SOFTWARE\5da059a482fd494db3f252126fbc3d5b, Quarantined, [d4722814e2b71a1c1669a750ee15ec14],
PUP.Optional.DNSUnlocker, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Quarantined, [76d0bc808217dd595a8e0530a1631be5],
PUP.Optional.ClousdScout.BrwsrFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\DNSLAFAYETTE, Delete-on-Reboot, [c77f45f74851072f10b8d007738f9a66],
PUP.Optional.CloudScout, HKLM\SOFTWARE\WOW6432NODE\5da059a482fd494db3f252126fbc3d5b, Quarantined, [113528142772a690c6b910e7e122916f],
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MYBESTOFFERSTODAY, Quarantined, [cf773507d7c2171fbed7b71720e3be42],
PUP.Optional.DNSUnlocker, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Quarantined, [2f17a5975d3c0234fdebd75e2ed65fa1],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\mbot_au_014010213_is1, Quarantined, [8bbbbf7d5b3eb086fe576bc99a6a44bc],
PUP.Optional.MySearch123, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC}, Quarantined, [a0a60b319efb77bf80e8c166788ca25e],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS, Quarantined, [60e651ebcbce201609462abf5ca7a65a],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-413847034-2287798085-3529804025-1002\SOFTWARE\TutoTag, Quarantined, [1c2a4eeeb7e23204193258917c8738c8],
PUP.Optional.TrailerTime, HKU\S-1-5-21-413847034-2287798085-3529804025-1002\SOFTWARE\APPDATALOW\SOFTWARE\TrailerTime, Quarantined, [3d09e854bcdd7eb801a7d164da2ace32],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-413847034-2287798085-3529804025-1002\SOFTWARE\TUTORIALS\updatetutorialeshp, Quarantined, [de6855e7cdcc2016d87001e8857e3ec2],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-413847034-2287798085-3529804025-1002\SOFTWARE\TUTORIALS\updatetutorialshp, Quarantined, [1531a8942574eb4b4405ab3e48bb12ee],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-413847034-2287798085-3529804025-1002\SOFTWARE\TUTORIALS\updv, Quarantined, [6dd99ba1ddbce6501d2d4b9ed33052ae],
PUP.Optional.DNSUnlocker.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{E1527582-8509-4011-B922-29E3FB548882}_is1, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],

Registry Values: 9
Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|upmbot_au_014010213.exe, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe -runonce, Quarantined, [bc8a8bb1e5b4ee4847329c2752afdf21]
Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|mbot_au_014010213, "C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe", Quarantined, [64e256e6a3f690a660b23f4710f1867a]
PUP.Optional.WindoWeather, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|WindoWeather, "C:\Program Files (x86)\WindoWeather\WindoWeather.exe" monetize, Quarantined, [b39350ece7b24aeca7093a19b44c0af6]
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|mbot_au_014010213, "C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe", Quarantined, [271fbc80b8e1ab8b177c5c72bb4855ab]
PUP.Optional.TrailerTime, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\TRAILERTIME|DisplayName, TrailerTime - TrailerTime for Desktop, Quarantined, [a2a4a597d5c4d660c9908da857ad8080]
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\WOW6432NODE\TUTORIALS|HostGUID, AB6D67F7-EBDF-4C14-9F3D-DC2401F6FF2F, Quarantined, [60e651ebcbce201609462abf5ca7a65a]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{46f11f5b-a110-4f86-b895-8990500568f3}|NameServer, 82.163.143.165,82.163.142.167, Quarantined, [82c477c58d0c01355142161f93715ba5]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{ea59132d-b9a6-47b3-bdf1-757eb2a983b4}|NameServer, 82.163.143.165,82.163.142.167, Quarantined, [ff4770cceeab49ed8f0450e5ad57f60a]
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|upmbot_au_014010213.exe, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe -runonce, Quarantined, [43038fadadec59dd51779c1d26dc4bb5]

Registry Data: 0
(No malicious items detected)

Folders: 12
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime, Quarantined, [c4826dcfe7b2e0560b218fa6e61ed12f],
PUP.Optional.WindoWeather, C:\Users\Glenn\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WindoWeather, Quarantined, [1036112b38614aeca09a1e174abae31d],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker, Delete-on-Reboot, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213, Delete-on-Reboot, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\Download, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\mbot_au_014010213, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\mbot_au_014010213\1.10, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213, Delete-on-Reboot, [49fd42fa0f8a3bfbad1cd4e5738fc739],
PUP.Optional.MBot, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MYBESTOFFERSTODAY, Quarantined, [fd49320a3564eb4b5773dbde7191748c],
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig, Quarantined, [86c058e48c0d191dc8e9ca07b74bdf21],

Files: 112
Adware.EoRezo, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe, Delete-on-Reboot, [bc8a8bb1e5b4ee4847329c2752afdf21],
Adware.EoRezo, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe, Delete-on-Reboot, [64e256e6a3f690a660b23f4710f1867a],
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\WindoWeather.exe, Delete-on-Reboot, [b39350ece7b24aeca7093a19b44c0af6],
Adware.CloudGuard, C:\Program Files (x86)\DNS Unlocker\dnslafayette.exe, Delete-on-Reboot, [65e1a993445565d1ec096b6c59a8ae52],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\Uninstall.exe, Quarantined, [9da96bd15c3d87af8c38d9f3778a46ba],
PUP.Optional.WindoWeather, C:\Program Files (x86)\WindoWeather\uninst.exe, Quarantined, [e75fd46892079c9a8a60369548b92fd1],
Adware.EoRezo, C:\Program Files (x86)\mbot_au_014010213\mybestofferstoday_widget.exe, Quarantined, [e4621527c7d2b58186bf834b639e1ae6],
Adware.EoRezo, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\381.exe, Quarantined, [b4929f9dbadfad893ae10fbcb44d3cc4],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\420.exe, Quarantined, [7fc7bb81aeeb171f8403ac23c93857a9],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\623.exe, Quarantined, [94b276c6d7c2b18589fe854ab34e6b95],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\643.exe, Quarantined, [ab9b23196b2ea88e1e693e91986926da],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\666.exe, Quarantined, [81c5bd7fa5f45cda4146e4eb966b8a76],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\700.exe, Quarantined, [aa9c0b316039a0967b0c9a3507fa06fa],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\711.exe, Quarantined, [fd4937054e4ba5913453bc13827ffc04],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\713.exe, Quarantined, [2b1b1d1fa7f2270fe5a299368e73b848],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\720.exe, Quarantined, [b4926dcf9405b3837413b41b21e0fc04],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\721.exe, Quarantined, [22244bf17f1afd399ee9bb144eb33ac6],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\package_AnySend_installer_multilang.exe, Quarantined, [8db9a5974752f5410582af20af528c74],
Adware.EoRezo.Gen, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\package_SByoutube_installer_multilang.exe, Quarantined, [a79ffe3e0594f343e7a07e51bb4634cc],
Adware.EoRezo, C:\Users\Glenn\AppData\Local\Temp\is-U6RTF.tmp\package_vuupc_installer_multilang.exe, Quarantined, [0b3be15ba4f5a591a3a1cc02d1303cc4],
PUP.Optional.Tuto4PC, C:\Users\Glenn\AppData\Local\Temp\is-VQHUC.tmp\gentlemjmp_irow.exe, Quarantined, [3e08a597f5a42d09f7086540b74ac63a],
PUP.Optional.InstallCore, C:\Users\Glenn\Downloads\dupeguru.exe, Quarantined, [8db91824ddbccf670858c56f5ea335cb],
PUP.Optional.Tuto4PC, C:\Users\Glenn\AppData\Local\mbot_au_014010213\Download\majmp_gentlerow.exe, Quarantined, [85c12f0dc3d653e3749a11a9ba474cb4],
PUP.Optional.ClousdScout.BrwsrFlsh, C:\Windows\System32\Tasks\DNSLAFAYETTE, Quarantined, [87bfc07c4653013552745e7953af2bd5],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\AutoUpdater.Config, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\au.exe, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\ffmpegsumo.dll, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\icudtl.dat, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\nw.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\storage.json, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\hr.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\am.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ar.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\bg.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\bn.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ca.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\cs.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\da.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\de.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\el.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\en-GB.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\en-US.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\es-419.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\es.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\et.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\fa.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\fi.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\fil.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\fr.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\gu.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\hi.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\hu.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\id.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\it.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\iw.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ja.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\kn.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ko.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\lt.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\lv.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ml.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\mr.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ms.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\nl.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\no.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\pl.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\pt-BR.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\pt-PT.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ro.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ru.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\sk.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\sl.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\sr.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\sv.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\sw.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\ta.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\te.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\th.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\tr.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\uk.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\vi.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\zh-CN.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\TrailerTime\locales\zh-TW.pak, Quarantined, [2620e05c1c7d86b0be6cf63f8f75c23e],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime\Uninstall.lnk, Quarantined, [c4826dcfe7b2e0560b218fa6e61ed12f],
PUP.Optional.TrailerTime, C:\Users\Glenn\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TrailerTime\TrailerTime.lnk, Quarantined, [c4826dcfe7b2e0560b218fa6e61ed12f],
PUP.Optional.WindoWeather, C:\Users\Glenn\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WindoWeather\WindoWeather.lnk, Quarantined, [1036112b38614aeca09a1e174abae31d],
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213.exe, Delete-on-Reboot, [271fbc80b8e1ab8b177c5c72bb4855ab],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\config.ini, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\ConsoleApplication1.dll, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\DNSLAFAYETTE.cer, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\dnslafayette.exe, Delete-on-Reboot, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\Info.rtf, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\License.rtf, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\LogoBlack.ico, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\LogoGreen.ico, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\LogoYellow.ico, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\Microsoft.Win32.TaskScheduler.dll, Delete-on-Reboot, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\settings.ini, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\unins000.dat, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\unins000.exe, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\Program Files (x86)\DNS Unlocker\ZonaTools.XPlorerBar.dll, Quarantined, [c97d3a02712873c3d2b2ddc559a9e41c],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.cyl, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\upmbot_au_014010213.exe, Delete-on-Reboot, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\user_profil.cyp, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\mbot_au_014010213\1.10\cnf.cyl, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Users\Glenn\AppData\Local\mbot_au_014010213\mbot_au_014010213\1.10\eorezo.cyl, Quarantined, [43038fadadec59dd51779c1d26dc4bb5],
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213 - uninstall.dat, Quarantined, [49fd42fa0f8a3bfbad1cd4e5738fc739],
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213\mbot_au_014010213 - uninstall.exe, Quarantined, [49fd42fa0f8a3bfbad1cd4e5738fc739],
PUP.Optional.MBot, C:\Program Files (x86)\mbot_au_014010213\mybestofferstoday_widget.exe, Quarantined, [49fd42fa0f8a3bfbad1cd4e5738fc739],
PUP.Optional.MBot, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MYBESTOFFERSTODAY\MyBestOffersToday.lnk, Quarantined, [fd49320a3564eb4b5773dbde7191748c],
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig\Enable.json, Quarantined, [86c058e48c0d191dc8e9ca07b74bdf21],
PUP.Optional.WindoWeather, C:\ProgramData\WindoWeatherConfig\Sample.json, Quarantined, [86c058e48c0d191dc8e9ca07b74bdf21],

Physical Sectors: 0
(No malicious items detected)

(end)

 

=================================================================================================================

 

# AdwCleaner v5.030 - Logfile created 23/01/2016 at 09:14:49
# Updated 17/01/2016 by Xplode
# Database : 2016-01-19.2 [Server]
# Operating system : Windows 10 Home  (x64)
# Username : Glenn - GLENN-HP
# Running from : C:\Users\Glenn\Downloads\AdwCleaner.exe
# Option : Scan
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****

Folder Found : C:\Program Files (x86)\WindoWeather

***** [ Files ] *****

File Found : C:\Users\Public\Desktop\eBay.lnk

***** [ DLL ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****

Key Found : HKLM\SOFTWARE\Classes\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}
Key Found : HKCU\Software\Microsoft\Tinstalls
Key Found : HKCU\Software\Tutorials
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}

***** [ Web browsers ] *****


########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [1264 bytes] ##########
 

===================================================================================================================

 

# AdwCleaner v5.030 - Logfile created 23/01/2016 at 09:25:34
# Updated 17/01/2016 by Xplode
# Database : 2016-01-19.2 [Server]
# Operating system : Windows 10 Home  (x64)
# Username : Glenn - GLENN-HP
# Running from : C:\Users\Glenn\Downloads\AdwCleaner.exe
# Option : Cleaning
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****

[-] Folder Deleted : C:\Program Files (x86)\WindoWeather

***** [ Files ] *****

[-] File Deleted : C:\Users\Public\Desktop\eBay.lnk

***** [ DLLs ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****

[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}
[-] Key Deleted : HKCU\Software\Microsoft\Tinstalls
[-] Key Deleted : HKCU\Software\Tutorials
[-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E1527582-8509-4011-B922-29E3FB548882}_is1
[-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}

***** [ Web browsers ] *****


*************************

:: "Tracing" keys removed
:: Winsock settings cleared

########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [1410 bytes] ##########
 

 

=====================================================================================================================

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.2 (01.06.2016)
Operating System: Windows 10 Home x64
Ran by Glenn (Administrator) on Sat 01/23/2016 at  9:37:59.89
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

File System: 23

Successfully deleted: C:\Users\Glenn\AppData\Local\{036B3D9E-F325-4F49-B593-6E992E660BF5} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{0E128CD2-3DC1-40F8-BA33-6B0F5E409099} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{10B24D6F-BEC5-4EDA-B1AD-2C997097CFD7} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{16576A06-BF78-4075-800D-4C47AB01E36E} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{208C7E49-4ABE-415F-B411-BF5DA6CD63C0} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{223F100B-5F67-405D-902D-8358312498B3} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{23B5403B-4C75-43B1-834D-A71184DD345F} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{2D79B055-FA63-4C81-AC66-D1F9F0297E12} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{3C8C4894-60F4-421E-8F19-D44B69BEF721} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{6B0591ED-5E86-48D8-9ECE-1B8105FAE279} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{80D7D914-4A5D-46CE-A67A-5919A4B9AC66} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{8A75A291-786E-461F-BB90-59B74F0D4E1F} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{A4F040BB-829A-4E87-AFFF-B81446B941E4} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{B1725208-B95A-4515-94D2-432A286E049F} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{BCCE1E6E-E88C-497B-80F4-2EAD06CD0541} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{C33770B8-775A-4A46-B15A-ABE1DE0C6673} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{CC453ED4-7D9A-4441-8F65-C586E0BC2C90} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{CD718884-016E-4397-A33A-2F31FEAB9C6F} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{D2E1AD2A-C3AB-4F97-ACB3-251C24183853} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{E1AB2AE9-63B8-440D-9558-B1F6FA711300} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{F31E4160-09C6-41C9-BA6F-8317C1F7D8ED} (Empty Folder)
Successfully deleted: C:\Users\Glenn\AppData\Local\{FCA0030E-A02F-4A46-9EEB-A974F2B37400} (Empty Folder)
Successfully deleted: C:\WINDOWS\wininit.ini (File)

Registry: 0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sat 01/23/2016 at  9:41:53.15
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 



#4 buddy215

buddy215

  • BC Advisor
  • 12,883 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:42 AM

Posted 22 January 2016 - 08:19 PM

A lot of adware was found and removed. I think it best to rerun MBAM and run another scan using Eset Online Scanner.

Often there is something more sinister responsible for installing the adware and Eset does a good job of finding it.

 

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#5 Bungy1952

Bungy1952
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 23 January 2016 - 04:40 AM

Copy of log file for for ESET

 

 

C:\Copy of laser\Work Computer 18 JAN 2011\Work Backup\Burn This\xx temp\Broken PC Fixup\autologon.exe    probably unknown NewHeur_PE virus    deleted
C:\Copy of laser\Work Computer 18 JAN 2011\Work Backup\Oct 2009\DATA (D)\These are for deletion\P\Backup Files 16 Mar 09\Old PC Data Transfer\Other Apps\Test Programs\repairsetup.exe    a variant of Win32/Adware.ErrorRepairPro application    cleaned by deleting
C:\Users\Glenn\Downloads\The Hunger Games Mockingjay Part 2 2015.720p.BluRay.x264.AAC.yifi\The Hunger Games Mockingjay Part 2 2015.720p.BluRay.x264.AAC.yifi.exe    NSIS/TrojanDownloader.Adload.R trojan    cleaned by deleting
 



#6 buddy215

buddy215

  • BC Advisor
  • 12,883 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:42 AM

Posted 23 January 2016 - 06:25 AM

Almost all free downloads of programs, add-ons, movies, music, pirated programs will attempt to install adware....some really nasty. Using

P2P / torrents for the same purpose is very risky as over 65% contain malware.

 

How is the computer performing...up to par? If not, what problem(s) still exist?


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#7 Bungy1952

Bungy1952
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:42 PM

Posted 23 January 2016 - 08:17 AM

Hi Back again.

 

The computer seems fine now.

 

Everything has settled down now and performing as it did before (hopefully with no nasties on board).

Are there any proceedures that you think I should do regularly to prevent this from happenning again?

 

I'd like to thank you for your great support and helping me with this problem.

It really is a fantastic service you guys provide to help us, the uneducated masses of computer users.

 

Thanks again

Bung1952.



#8 buddy215

buddy215

  • BC Advisor
  • 12,883 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:42 AM

Posted 23 January 2016 - 09:20 AM

It seems the adware and malware that infected your computer came from free stuff. If at all possible using your security programs

and the ones you have used in the last few days, scan the downloads before installing and always choose custom or advanced install

when offered. Often, choosing one of those options allows you to view what is being installed along with the program and often you can

reject the adware or decide to not install the program.

 

Enjoyed working with you....you're welcome...happy surfin'


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users