Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

get a clip


  • This topic is locked This topic is locked
6 replies to this topic

#1 Jazzdad51

Jazzdad51

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:07:25 PM

Posted 28 February 2016 - 11:04 PM

Hello, I am new to this forum. I am having some serious problems and I think I have traced it to a program that I cannot remove called get a clip. It is causing pop ups telling me to call an 800 number to fix the problem. I need help to remove the problem. Thanks.

Edited by Queen-Evie, 28 February 2016 - 11:06 PM.
moved from Windows 7 to Am I Infected


BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,313 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:25 PM

Posted 29 February 2016 - 10:32 AM

Welcome to BC....DON'T CALL ANY PHONE NUMBER USE THE PROGRAMS BELOW TO FIND AND REMOVE ADWARE AND MALWARE.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 Jazzdad51

Jazzdad51
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:07:25 PM

Posted 29 February 2016 - 01:40 PM

Thanks Buddy. I think this has taken care of the problems. It was a pretty nasty infection. I'll go ahead and post the scans here. I had to cancel the first scan so I will post both of them. Thanks again.

 

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 2/29/2016
Scan Time: 11:03 AM
Logfile: scan1.txt
Administrator: Yes

Version: 2.2.0.1024
Malware Database: v2016.02.29.03
Rootkit Database: v2016.02.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Stuart

Scan Type: Threat Scan
Result: Cancelled
Objects Scanned: 53382
Time Elapsed: 4 min, 17 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 6
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [185f13533f5ae452058a129425ddaa56],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [185f13533f5ae452058a129425ddaa56],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [185f13533f5ae452058a129425ddaa56],
PUP.Optional.Babylon, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}, Quarantined, [adcad690d5c4b87e5cb7c7e2ea182fd1],
PUP.Optional.Spigot, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{34A0D84B-CDDC-4EC4-AFDD-4F1DDE1D14E5}, Quarantined, [bfb87beb8d0c8baba3e2f695bb4756aa],
PUP.Optional.Spigot, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{34A0D84B-CDDC-4EC4-AFDD-4F1DDE1D14E5}, Quarantined, [bfb87beb8d0c8baba3e2f695bb4756aa],

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 1
PUP.Optional.Wajam, C:\Program Files (x86)\YourHelper\wj.exe, Quarantined, [72052b3b1089ef471e423b9a8e7354ac],

Physical Sectors: 0
(No malicious items detected)

(end)

 

 

Second completed scan:

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 2/29/2016
Scan Time: 11:59 AM
Logfile: scan2.txt
Administrator: Yes

Version: 2.2.0.1024
Malware Database: v2016.02.29.04
Rootkit Database: v2016.02.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Stuart

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 341994
Time Elapsed: 24 min, 30 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 10
PUP.Optional.WebDiscoverBrowser, HKLM\SOFTWARE\WebDiscoverBrowser, Quarantined, [037520464752072fe2f0ee7159ab13ed],
PUP.Optional.DataMngr.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\DataMngr, Quarantined, [afc93b2b39602b0b95d33b23030145bb],
PUP.Optional.BundleInstaller, HKLM\SOFTWARE\WOW6432NODE\VITTALIA\AxtanInstaller, Quarantined, [740473f3c0d96acc9665bb2cbc47e719],
PUP.Optional.DataMngr.AppFlsh, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\DataMngr, Quarantined, [b6c2b1b5b1e80531372faeb018ec966a],
PUP.Optional.WebDiscoverBrowser, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\WebDiscoverBrowser, Quarantined, [3f39bea8a6f32214c7085b047f85bf41],
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\APPDATALOW\SOFTWARE\SETTINGS MANAGER, Quarantined, [41376303188149eddccab3b66b997987],
PUP.Optional.InetStat, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\INETSTAT, Quarantined, [4f293432702946f052b64ce0a262b54b],
PUP.Optional.Conduit, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}, Quarantined, [186096d0465316200b70816aa75c16ea],
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7613B2F9-31F8-46BB-A0DE-0E03367E805C}, Quarantined, [8bedcd990c8d2115b9bd71a5d2328c74],
PUP.Optional.BProtector, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\bProtectSettings, Quarantined, [6c0c6204d5c4db5b3e807a6b946f3cc4],

Registry Values: 9
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{1CEA1E07-124E-4738-99A8-5B995D1373FE}|NameServer, 82.163.142.7 95.211.158.134, Quarantined, [096f83e39cfd96a00b2780eab74df808]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{DAA485CD-C2C1-422D-B2CB-3E6F73CAA54B}|NameServer, 82.163.142.7 95.211.158.134, Quarantined, [64141d4997024beb131f571313f1b947]
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\APPDATALOW\SOFTWARE\SETTINGS MANAGER|HP_IE, https://search.yahoo.com/?type=937811&fr=spigot-yhp-ie, Quarantined, [41376303188149eddccab3b66b997987]
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\APPDATALOW\SOFTWARE\SETTINGS MANAGER|HP_FF, https://search.yahoo.com/?type=937811&fr=spigot-yhp-ff, Quarantined, [354398ce0e8b9c9ab5f1660357ade31d]
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\APPDATALOW\SOFTWARE\SETTINGS MANAGER|HP_GC, https://search.yahoo.com/?type=937811&fr=spigot-yhp-ch, Quarantined, [82f6df87663360d6ddc9e980bc48d42c]
PUP.Optional.InetStat, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\INETSTAT|status, Quarantined, [4f293432702946f052b64ce0a262b54b],
PUP.Optional.Conduit, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|URL, http://www.bing.com/search?pc=COSP&ptag=D010716-A6EC39D5B4CB74905A0F&form=CONBDF&conlogo=CT3332023&q={searchTerms}, Quarantined, [186096d0465316200b70816aa75c16ea]
PUP.Optional.Conduit, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|TopResultURL, http://www.bing.com/search?pc=COSP&ptag=D010716-A6EC39D5B4CB74905A0F&form=CONBDF&conlogo=CT3332023&q={searchTerms}, Quarantined, [f385a6c0b7e2db5bcfac559631d21be5]
PUP.Optional.Spigot, HKU\S-1-5-21-1995501055-2899037972-3326893948-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{7613B2F9-31F8-46BB-A0DE-0E03367E805C}|URL, https://search.yahoo.com/search?fr=chr-greentree_ie&ei=utf-8&ilc=12&type=937811&p={searchTerms}, Quarantined, [8bedcd990c8d2115b9bd71a5d2328c74]

Registry Data: 1
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, 82.163.142.7 95.211.158.134, Good: (8.8.8.8), Bad: (82.163.142.7 95.211.158.134),Replaced,[0f6972f4b0e996a0fa761be5b74e7a86]

Folders: 38
PUP.Optional.OptimizerPro, C:\Users\Stuart\Documents\Optimizer Pro, Quarantined, [d4a4e680cecb023449f4ff0a7094c63a],
Rogue.Multiple, C:\ProgramData\374311380, Quarantined, [5028491de0b9f5410178ead242c0d729],
PUP.Optional.OpenCandy, C:\Users\Stuart\AppData\Roaming\OpenCandy, Quarantined, [a9cfaabce8b154e2fead488043bf7987],
PUP.Optional.OpenCandy, C:\Users\Stuart\AppData\Roaming\OpenCandy\29ED299A658847EF9A30ACA847FCC813, Quarantined, [a9cfaabce8b154e2fead488043bf7987],
PUP.Optional.FastAndSafe, C:\ProgramData\Fast And Safe, Quarantined, [1365fe682e6bc47224d230b10ef41fe1],
PUP.Optional.PureLeads, C:\ProgramData\PureLeads, Quarantined, [5820bda9a8f1bd79a05006e8d1314ab6],
PUP.Optional.PureLeads, C:\Program Files (x86)\PureLeads, Quarantined, [4b2d3c2a2d6c03336091d8166a98cb35],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\GC, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\Res, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\LocalLow\Search Settings, Quarantined, [3840ff6774254fe741158371847eb050],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\LocalLow\Search Settings\res, Quarantined, [3840ff6774254fe741158371847eb050],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\LocalLow\Search Settings\temp, Quarantined, [3840ff6774254fe741158371847eb050],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\Local\Slick Savings, Quarantined, [d3a5570ff8a1b77f6b84d029ae547a86],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\Roaming\Slick Savings, Quarantined, [e2963135cacf23136d84a455e81afe02],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Storage, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension Rules, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\L, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\U, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Quarantined, [98e00066326775c15f41ff03dd239967],
Trojan.0Access, c:\Program Files (x86)\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Delete-on-Reboot, [14646204efaa2e083c6503ff5ca4a858],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\419b6b75-0717-0, Quarantined, [443499cda9f06cca2a0550dbd332837d],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\419b6b75-53f1-0, Quarantined, [5b1deb7b79206cca092659d242c306fa],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{04218de6-612c-1}, Quarantined, [80f8c2a4c0d9a195f8380625c93cf30d],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{0a605153-412c-0}, Quarantined, [b7c16afc1782e1557ab6cf5cd92cda26],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{10068f2d-312c-0}, Quarantined, [760296d08415c76f8da344e7fb0a24dc],

Files: 76
PUP.Optional.OptimizerPro, C:\Users\Stuart\Documents\Optimizer Pro\CookiesException.txt, Quarantined, [d4a4e680cecb023449f4ff0a7094c63a],
PUP.Optional.PureLeads, C:\ProgramData\PureLeads\config.pureleads, Quarantined, [5820bda9a8f1bd79a05006e8d1314ab6],
PUP.Optional.PureLeads, C:\ProgramData\PureLeads\pureleads.log, Quarantined, [5820bda9a8f1bd79a05006e8d1314ab6],
PUP.Optional.PureLeads, C:\Program Files (x86)\PureLeads\PAD_FILE.xml, Quarantined, [4b2d3c2a2d6c03336091d8166a98cb35],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\GC\ErrorAssistant_1.2.crx, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\GC\saamazon_1.0.crx, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\GC\saebay_1.1.crx, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\baidu_ff.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\baidu_ie.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\searchcom_ff.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\searchcom_ie.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\yahoo_ff.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\yahoo_ie.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\yandex_ff.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\yandex_ie.xml, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Program Files (x86)\Common Files\Spigot\Search Settings\{58d2a791-6199-482f-a9aa-9b725ec61362}.xpi, Quarantined, [7dfb95d1ddbc2b0b9b9d926249b941bf],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\Local\Slick Savings\coupons.crx, Quarantined, [d3a5570ff8a1b77f6b84d029ae547a86],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\Roaming\Slick Savings\coupons_2.4.crx, Quarantined, [e2963135cacf23136d84a455e81afe02],
PUP.Optional.Spigot, C:\Users\Stuart\AppData\Roaming\Slick Savings\coupons_2.8.xpi, Quarantined, [e2963135cacf23136d84a455e81afe02],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Cookies-journal, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Local State, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Bloom, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Bloom Prefix Set, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Cookies, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Csd Whitelist, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Download, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Download Whitelist, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing Extension Blacklist, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Safe Browsing IP Blacklist, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Favicons, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\ChromeDWriteFontCache, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cookies, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cookies-journal, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Preferences, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\README, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Secure Preferences, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Top Sites, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Visited Links, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Web Data, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Web Data-journal, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\History, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\History-journal, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Storage\chrome-extension_aaffhmecfaelkngcbnfdkcckmillnoki_0.localstorage, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Storage\chrome-extension_aaffhmecfaelkngcbnfdkcckmillnoki_0.localstorage-journal, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Storage\chrome-extension_pafkbggdmjlpgkdkcbjmhmfcdpncadgh_0.localstorage, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\data_0, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\data_1, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\data_2, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\data_3, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001ba, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001bb, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001bc, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001bd, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001be, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\f_0001bf, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Cache\index, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension Rules\000023.log, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension Rules\LOCK, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension Rules\LOG, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension Rules\MANIFEST-000001, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State\000029.ldb, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State\000030.log, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State\LOCK, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State\LOG, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Extension State\MANIFEST-000001, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh\000003.ldb, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh\000028.log, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh\LOCK, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh\LOG, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.WebDiscoverBrowser, C:\Users\Stuart\AppData\Local\WebDiscoverBrowser\User Data\Default\Local Extension Settings\pafkbggdmjlpgkdkcbjmhmfcdpncadgh\MANIFEST-000001, Quarantined, [ee8a32349bfe42f4f73c4bb4b250669a],
PUP.Optional.Conduit, C:\prefs.js, Quarantined, [5a1ef6700594bd798bac2ffb07fe29d7],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\419b6b75-0717-0\419b6b75-0717-0.d, Quarantined, [443499cda9f06cca2a0550dbd332837d],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\419b6b75-53f1-0\419b6b75-53f1-0.d, Quarantined, [5b1deb7b79206cca092659d242c306fa],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{04218de6-612c-1}\{04218de6-612c-1}.d, Quarantined, [80f8c2a4c0d9a195f8380625c93cf30d],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{0a605153-412c-0}\{0a605153-412c-0}.d, Quarantined, [b7c16afc1782e1557ab6cf5cd92cda26],
PUP.Optional.DNSUnlocker.BrwsrFlsh, C:\ProgramData\{10068f2d-312c-0}\{10068f2d-312c-0}.d, Quarantined, [760296d08415c76f8da344e7fb0a24dc],

Physical Sectors: 0
(No malicious items detected)

(end)

 

 

Adwcleaner scan:

 

# AdwCleaner v5.037 - Logfile created 29/02/2016 at 12:44:10
# Updated 28/02/2016 by Xplode
# Database : 2016-02-28.2 [Server]
# Operating system : Windows 7 Home Premium Service Pack 1 (x64)
# Username : Stuart - STUART-PC
# Running from : C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56VN1WM6\AdwCleaner.exe
# Option : Clean
# Support : http://toolslib.net/forum

***** [ Services ] *****

***** [ Folders ] *****

[-] Folder Deleted : C:\Program Files\WebDiscoverBrowser
[-] Folder Deleted : C:\Program Files (x86)\GreenTree Applications
[-] Folder Deleted : C:\Program Files (x86)\YTD Toolbar
[-] Folder Deleted : C:\Program Files (x86)\Free Youtube Downloader
[-] Folder Deleted : C:\ProgramData\Babylon
[-] Folder Deleted : C:\ProgramData\33f4804c-06b7-0
[-] Folder Deleted : C:\ProgramData\33f4804c-3b77-1
[-] Folder Deleted : C:\ProgramData\f4ac14c1403d6e2
[-] Folder Deleted : C:\Users\Stuart\AppData\Local\YSearchUtil
[-] Folder Deleted : C:\Users\Stuart\AppData\Roaming\Babylon
[-] Folder Deleted : C:\Users\Stuart\AppData\Roaming\pccustubinstaller
[-] Folder Deleted : C:\Users\Stuart\AppData\Roaming\Settings Manager
[-] Folder Deleted : C:\Users\Stuart\AppData\Roaming\Update Manager
[-] Folder Deleted : C:\windows\SysWOW64\config\systemprofile\AppData\Local\YSearchUtil

***** [ Files ] *****

[-] File Deleted : C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bakijjialdiiboeaknfpmflphhmljfkd_0.localstorage
[-] File Deleted : C:\windows\SysNative\LavasoftTcpService64.dll
[-] File Deleted : C:\windows\SysNative\LavasoftTcpServiceOff.ini
[-] File Deleted : C:\windows\SysWOW64\lavasofttcpservice.dll
[-] File Deleted : C:\windows\SysWOW64\LavasoftTcpServiceOff.ini

***** [ DLLs ] *****

***** [ Shortcuts ] *****

***** [ Scheduled tasks ] *****

***** [ Registry ] *****

[-] Key Deleted : HKCU\Software\f6de8ce768e417
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC}
[-] Key Deleted : HKLM\SOFTWARE\Babylon
[-] Key Deleted : HKLM\SOFTWARE\Vittalia
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Yahoo! SearchSet

***** [ Web browsers ] *****

[-] [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : aol.com
[-] [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com

*************************

:: "Tracing" keys removed
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C1].txt - [2651 bytes] - [29/02/2016 12:44:10]
C:\AdwCleaner\AdwCleaner[S1].txt - [2558 bytes] - [29/02/2016 12:42:11]

########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [2797 bytes] ##########

 

Jrt Scan:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.3 (02.09.2016)
Operating System: Windows 7 Home Premium x64
Ran by Stuart (Administrator) on Mon 02/29/2016 at 12:52:02.38
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

File System: 126

Failed to delete: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SYDJ7YWF (Temporary Internet Files Folder)
Failed to delete: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTIMXV5V (Temporary Internet Files Folder)
Failed to delete: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TU7KZ3LZ (Temporary Internet Files Folder)
Failed to delete: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS703N0F (Temporary Internet Files Folder)
Failed to delete: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZN0I5457 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{057C97C2-E08F-41F0-9148-66C823C848CB} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{0A8F3C25-B3BF-4594-97D3-C9C1DEF2C390} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{122ACDD4-2726-4314-8F8D-D8CBFA96F536} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{13900828-C7C3-4C9E-A301-F7762D717D6C} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{17CCAF25-3BFA-4EEA-B3E9-0AE03A83EE80} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{1ECA7F8B-EC37-4C53-80B8-88397B54C0C6} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{2161AA18-5422-4413-95B4-97088BDE9DDF} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{2CC23194-D1B4-45E1-9BE0-72B76FF850BA} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{3058CD75-8CA5-48E1-9BC1-C1248BADC511} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{32B0A8E0-F20F-4D2E-9523-E7F88F7D82AC} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{3B6780BB-4613-4BB0-88AA-60D41CB6631B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{40793069-CB44-401E-959E-5471380D8990} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{4233948C-3AC2-42E7-AF33-293591273DF6} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{432CEE0F-929E-4FDA-A5C3-5F989734970B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{4C30EF85-DBAC-4306-A528-D63D36A50385} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{4E175D7E-D467-46B7-8836-136DF975FD03} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{4F47A283-C015-437F-9B82-6B7FA52C0554} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{56D731D9-88C6-4584-98AC-C1D9E3FF7F66} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{57017C75-1B16-4B12-AC5A-6EFC00878DFE} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{58814CCA-0824-4D7F-BC8F-33794A44EA81} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{5EF940E7-6BD7-4897-95BF-41C1D4E93E93} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{6BD80820-A45D-437E-A38C-79405F56C5D1} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{764C509B-2B0D-4834-A8CE-F73D631603C3} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{7854A780-4BA9-4E04-BB05-A98C32011229} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{7CBC3C8E-5809-4749-BE4F-183B65A5537B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{7FF86018-355E-4E3C-8F5B-83273FAA8568} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{813E7CDF-6743-4CB2-8713-731532BF4291} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{8225FC3F-5BB8-4099-9EC9-BA2EC94CECA4} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{872626BC-33E1-4D78-B73E-C76B59FA3DDF} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{8A6F7F63-5F25-4762-AD00-9263DA5B2875} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{946FC255-539C-4085-9480-35332BB0ED92} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{9F09FDD1-FFA7-440A-A365-AFE9A4AC1495} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{A4011B5E-DC65-4757-8923-FC7C2A742E3F} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{A8534160-273E-4207-BD29-A9B5A2D312D3} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{B77858A7-AEB6-41B2-8D20-52D25EE3E7A3} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{B79E2EFB-B1C7-4B34-9FB1-7B706FB142F5} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{C0B573C0-AB72-44EC-A74E-D2E2EEAC94D5} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{C2399EF5-AB80-47E0-B513-E3B7F5F81A4B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{C9553B48-FC89-4C14-9F1F-AF148E084526} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{CB233075-16D5-42E9-9419-FB595EDF8C6C} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{CD3ED781-B05C-4FCD-9EE9-92F425BD5BAC} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{D599331D-1350-42B6-9335-E4B0888A1BF3} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{DAA44425-B229-4D43-9F17-8915F8F51300} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{DF83B958-7FF1-4BBE-96AC-79364C56F228} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{E16AE5D5-CC02-4862-9A55-0E7CC2F1438B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{E2602866-CC1A-4DF9-9B29-B145BBE1E49F} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{EC27BE6E-970A-44F7-BAC7-A7527318550F} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{ED11DA67-1C08-49E8-802C-8B5B9DCC9B40} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{ED3BBBE7-6495-4AC4-BB65-C3DD575D9BFE} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{EEE3B44F-B09A-4D3D-BFA3-CB71C95FF183} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{F22237F0-2BD6-4968-A8DE-DB49EFB883C1} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{F35EAE97-344B-4EB6-B891-2306447ECE7B} (Empty Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\{FA5FDC4A-42F5-4AE1-9AD2-41A559F438A2} (Empty Folder)
Successfully deleted: C:\Users\Stuart\Appdata\LocalLow\ytd (Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0B2GG17I (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0CWIQ6YV (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\15KH0VE5 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4SX7KJ24 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56VN1WM6 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\71DCHNAW (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AGTH16VX (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C35HDT1B (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C3ZXHYQ9 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CUAJVUBP (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CZ514NBW (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D5D27UT7 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EZSNDDA6 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FH3VF2BB (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HIW4UNN3 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JDSL11EG (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LHSXSG8C (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPK0K2L1 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M39EW117 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M5SFWZYM (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NS97X130 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OVZFMAZX (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q3HZMXYR (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS9GEPZI (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1CQH85B (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7FI4WMK (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YPRKSRJ1 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0B2GG17I (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0CWIQ6YV (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\15KH0VE5 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4SX7KJ24 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56VN1WM6 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\71DCHNAW (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AGTH16VX (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C35HDT1B (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C3ZXHYQ9 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CUAJVUBP (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CZ514NBW (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D5D27UT7 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EZSNDDA6 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FH3VF2BB (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HIW4UNN3 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JDSL11EG (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LHSXSG8C (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPK0K2L1 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M39EW117 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M5SFWZYM (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NS97X130 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OVZFMAZX (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q3HZMXYR (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS9GEPZI (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R1CQH85B (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SYDJ7YWF (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7FI4WMK (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTIMXV5V (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TU7KZ3LZ (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WS703N0F (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YPRKSRJ1 (Temporary Internet Files Folder)
Successfully deleted: C:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZN0I5457 (Temporary Internet Files Folder)

 

Registry: 6

Successfully deleted: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\\GoogleChromeAutoLaunch_C547D43CD725728C8B60ADB062C7B06A (Registry Value)
Successfully deleted: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\\GoogleChromeAutoLaunch_FE0F5847930930B9BB83159ADA8EED58 (Registry Value)
Successfully deleted: HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} (Registry Key)
Successfully deleted: HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B0932222-51E2-47D1-A4EF-CB10AE7DF086} (Registry Key)
Successfully deleted: HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} (Registry Key)
Successfully deleted: HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B0932222-51E2-47D1-A4EF-CB10AE7DF086} (Registry Key)

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 02/29/2016 at 12:55:24.21
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

Thanks again.

 





#4 buddy215

buddy215

  • Moderator
  • 13,313 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:25 PM

Posted 29 February 2016 - 02:01 PM

Because of ZeroAccess (possibly a backdoor has been created) and other malicious items found, I suggest you

start a new topic in the Malware Removal Forum. Along with the FRST logs post the below, too.

 

Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\L, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\???\???\???\{f4e27e32-d5b5-bc82-61cb-000bef51340d}\U, Quarantined, [5226e3838f0ad1657c23986a07f9728e],
Trojan.0Access, C:\Users\Stuart\AppData\Local\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Quarantined, [98e00066326775c15f41ff03dd239967],
Trojan.0Access, c:\Program Files (x86)\Google\Desktop\Install\{f4e27e32-d5b5-bc82-61cb-000bef51340d}, Delete-on-Reboot, [14646204efaa2e083c6503ff5ca4a858],

 

Usually when there is reason to suspect a backdoor has been created the advice is to do a clean install of the OS as that is the best way of removing

the damage caused by the malware. But I prefer to let the experts determine that.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

Start a new topic, give it a relevant title and post your log(s) along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. If you cannot produce any of the required logs...start the new topic anyway. Explain that you followed the Prep. Guide, were unable to create the logs, and describe what happened when you tried to create them. A member of the Malware Removal Team will walk you through, step by step, on how to clean your computer.

After doing this, please reply back in this thread with a link to the new topic so we can close this one.

 

DO NOT bump your new topic. Wait for a response from one of the Team Members.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#5 ppppssss

ppppssss

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:25 PM

Posted 01 March 2016 - 10:56 AM

Just want to chime in that I battled this and was 2 seconds away from running Kaspersky removal tool but quit and realized the system should be reconfigured completely. Everything appeared 100% clean but right after reboot system would communicate to 82.163.142.7 in Israel for only a couple seconds. Noticed this using TCPView from http://live.sysinternals.com I advise you use the same tool and after reboot immediately see all IP addresses your system communicates to. Google them and notice if they correspond to known DNS Changer IPs

#6 Jazzdad51

Jazzdad51
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Local time:07:25 PM

Posted 01 March 2016 - 02:14 PM

I have started a new post and titled it:  Infected with Trojan ZeroAccess. Thanks again for all the help.



#7 buddy215

buddy215

  • Moderator
  • 13,313 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:06:25 PM

Posted 01 March 2016 - 03:56 PM

Jazzdad51's new topic: Infected with Trojan ZeroAccess - Virus, Trojan, Spyware, and Malware Removal Logs


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users