Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Innovate Direct problem; tried self-help page, used Rkill, but can't proceed


  • Please log in to reply
16 replies to this topic

#1 A-K

A-K

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 03 April 2016 - 02:32 PM

This is my first post so 'hello' to everyone and 'thanks' in advance. Although I'm a novice, I'll attempt things if there are clear instructions and I know how to run scans, etc., but I don't have much experience beyond that. Also, I have read the forum rules and hope not to make any mistakes, but please forgive me if I do as this is all new to me. Thanks. Now for the problem:
My desktop pc has been infected with a browser hijacker from Innovate Direct. I used the self-help page on this site to try and remove it. I managed to download Rkill and it did its thing, but when I tried the next step by downloading Malwarebytes, it would not allow me to do so and kept hijacking my browser. There isn't really anything important on the desktop, in fact there isn't much at all on there, so a friend of mine is suggesting re-installing Windows 10.  Would this be the best option or should I try removing the malware? And if so, how would I do that if it keeps hijacking my browser? Many thanks
 
Oo I feel like a fibber, I've just found out that I have posted on this forum before.  It was 8+ years ago so I had totally forgotten.  That said, I'm sure I know even less now than I did then, which can't be a good thing. Anyway, I just felt I needed to clarify that. Thanks again :)

Edit: Moved topic from Virus, Trojan, Spyware, and Malware Removal Logs to the more appropriate forum. ~ Animal

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 03 April 2016 - 10:20 PM

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2. SecurityCheck may produce some false warning(s), so leave the results reading to me.
NOTE 3. If you receive UNSUPPORTED OPERATING SYSTEM! ABORTED! message restart computer and Security Check should run

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size
  • List Restore Points

Click Go and post the result.

p22002970.gif Please download Malwarebytes Anti-Malware (MBAM) to your desktop.
NOTE. If you already have MBAM 2.0 installed scroll down.

  • Double-click mb3-setup-1878.1878-3.4.5.2467.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:

    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.

  • Click Finish.
  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.



If you already have MBAM 2.0 installed:

  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.


How to get logs:
(Export log to save as txt)


  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the Scan Log which shows the Date and time of the scan just performed.
  • Click 'Export'.
  • Click 'Text file (*.txt)'
  • In the Save File dialog box which appears, click on Desktop.
  • In the File name: box type a name for your scan log.
  • A message box named 'File Saved' should appear stating "Your file has been successfully exported".
  • Click Ok
  • Attach that saved log to your next reply.



(Copy to clipboard for pasting into forum replies or tickets)

  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the Scan Log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.


p22002970.gifDownload 51a5f31352b88-icon_MBAR.pngMalwarebytes Anti-Rootkit (MBAR) to your desktop.
  • Warning! Malwarebytes Anti-Rootkit needs to be run from an account with administrator rights.
  • Double click on downloaded file. OK self extracting prompt.
  • MBAR will start. Click "Next" to continue.
  • Click in the following screen "Update" to obtain the latest malware definitions.
  • Once the update is complete select "Next" and click "Scan".
  • When the scan is finished and no malware has been found select "Exit".
  • If malware was detected, make sure to check all the items and click "Cleanup". Reboot your computer.
  • Open the MBAR folder located on your Desktop and paste the content of the following files in your next reply:
  • "mbar-log-{date} (xx-xx-xx).txt"
  • "system-log.txt"


NOTE. If you see This version requires you to completely exit the Anti Malware application message right click on the Malwarebytes Anti-Malware icon in the system tray and click on Exit.

p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Windows Vista, 7 or 8 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.
Do NOT use spoilers.
Do NOT edit your reply to post additional logs. Create new reply. I'll not get any email notifications about edits so I won't know you posted something new.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 07 April 2016 - 11:48 AM

Hi Broni, thanks very much for your fast and helpful response.  Sorry for my delayed reply but I wasn't able to finish all the steps in your post until today.  I struggled a bit with the first few steps as my browser kept being hijacked.  However, I persevered and managed to get all 6 of the scan logs that you requested in your post.  I'm having a few problems trying to attach them to this reply, partly because I was using Microsoft Edge but mainly because I've never done it before.  I've now switched to Internet Explorer so hopefully I will be able to attach them and get this reply posted.  Again, many thanks for your help.

 

Broni, I'm so sorry but I can't find the correct way to include these logs.  A box pops up saying it's because of my security settings and that I should use the keyboard combination of Ctrl/Cmd+V to paste within the box.  I have searched the internet, which is where I found the information to change from Microsoft Edge to Internet Explorer, but the same thing is happening and I cannot find the correct combination of keys that will allow me to use the paste function.  If you could help me with this it would be much appreciated.  Sorry, I know this is very basic stuff :)



#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 07 April 2016 - 08:00 PM

You can't attach anything in this forum.

Copy/paste all logs.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 08 April 2016 - 08:05 AM

 Hi Broni, here are the 6 logs you requested:

 

1.

 

Results of screen317's Security Check version 0.99.93 
   x86 (UAC is enabled) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
Windows Defender  
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
````````Process Check: objlist.exe by Laurent```````` 
 Windows Defender MSMpEng.exe
 Windows Defender MpCmdRun.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:  %
````````````````````End of Log``````````````````````

 

2.

 

Farbar Service Scanner Version: 27-01-2016
Ran by wow (administrator) on 04-04-2016 at 13:56:57
Running from "C:\Users\wow\AppData\Local\Microsoft\Windows\INetCache\IE\485IMOZ3"
Microsoft Windows 10 Home  (X86)
Boot Mode: Normal
****************************************************************
 
Internet Services:
============
 
Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.
 

Windows Firewall:
=============
 
Firewall Disabled Policy:
==================
 

System Restore:
============
 
System Restore Policy:
========================
 

Security Center:
============
 

Windows Update:
============
 
Windows Autoupdate Disabled Policy:
============================
 

Windows Defender:
==============
 
Other Services:
==============
 

File Check:
========
C:\WINDOWS\system32\nsisvc.dll => File is digitally signed
C:\WINDOWS\system32\Drivers\nsiproxy.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\afd.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\tdx.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\tcpip.sys => File is digitally signed
C:\WINDOWS\system32\dnsrslvr.dll => File is digitally signed
C:\WINDOWS\system32\dnsapi.dll => File is digitally signed
C:\WINDOWS\system32\mpssvc.dll => File is digitally signed
C:\WINDOWS\system32\bfe.dll => File is digitally signed
C:\WINDOWS\system32\Drivers\mpsdrv.sys => File is digitally signed
C:\WINDOWS\system32\SDRSVC.dll => File is digitally signed
C:\WINDOWS\system32\vssvc.exe => File is digitally signed
C:\WINDOWS\system32\wscsvc.dll => File is digitally signed
C:\WINDOWS\system32\wbem\WMIsvc.dll => File is digitally signed
C:\WINDOWS\system32\wuaueng.dll => File is digitally signed
C:\WINDOWS\system32\qmgr.dll => File is digitally signed
C:\WINDOWS\system32\es.dll => File is digitally signed
C:\WINDOWS\system32\cryptsvc.dll => File is digitally signed
C:\Program Files\Windows Defender\MpSvc.dll => File is digitally signed
C:\WINDOWS\system32\ipnathlp.dll => File is digitally signed
C:\WINDOWS\system32\iphlpsvc.dll => File is digitally signed
C:\WINDOWS\system32\svchost.exe => File is digitally signed
C:\WINDOWS\system32\rpcss.dll => File is digitally signed
 

**** End of log ****

 

3.

 

MiniToolBox by Farbar  Version: 07-02-2016 01
Ran by wow (administrator) on 04-04-2016 at 14:05:34
Running from "C:\Users\wow\AppData\Local\Microsoft\Windows\INetCache\IE\L2Z60OF5"
Microsoft Windows 10 Home  (X86)
Model: Dell DXP051 Manufacturer: Dell Inc.
Boot Mode: Normal
***************************************************************************
 
========================= IE Proxy Settings: ==============================
 
Proxy is not enabled.
No Proxy Server is set.
========================= Hosts content: =================================
========================= IP Configuration: ================================
 
Linksys WMP600N Wireless-N PCI Adapter with Dual-Band = Wireless Network Connection (Connected)
Intel® PRO/1000 PL Network Connection = Local Area Connection (Media disconnected)
Bluetooth Device (Personal Area Network) = Bluetooth Network Connection (Media disconnected)
 

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global
set interface interface="Local Area Connection" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 7" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 2" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Bluetooth Network Connection" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Wireless Network Connection 2" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
set interface interface="Local Area Connection* 1" forwarding=enabled advertise=enabled nud=enabled ignoredefaultroutes=disabled
 

popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : wow-PC
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : dlink.com
 
Ethernet adapter Local Area Connection:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Intel® PRO/1000 PL Network Connection
   Physical Address. . . . . . . . . : 00-13-72-16-B7-FF
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 7:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft Hosted Network Virtual Adapter
   Physical Address. . . . . . . . . : 00-25-9C-0A-89-35
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wireless Network Connection:
 
   Connection-specific DNS Suffix  . : dlink.com
   Description . . . . . . . . . . . : Linksys WMP600N Wireless-N PCI Adapter with Dual-Band
   Physical Address. . . . . . . . . : 00-25-9C-0A-89-34
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::8192:a175:de0d:d31f%12(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.5(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Sunday, April 3, 2016 5:39:13 PM
   Lease Expires . . . . . . . . . . : Tuesday, April 5, 2016 1:02:51 PM
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 167781788
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1D-82-7F-BF-00-13-72-16-B7-FF
   DNS Servers . . . . . . . . . . . : 82.163.143.177
                                       82.163.142.179
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Bluetooth Network Connection:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 00-1F-81-00-08-30
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter isatap.dlink.com:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : dlink.com
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Teredo Tunneling Pseudo-Interface:
 
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fb:1c51:522:3f57:fefa(Preferred)
   Link-local IPv6 Address . . . . . : fe80::1c51:522:3f57:fefa%2(Preferred)
   Default Gateway . . . . . . . . . : ::
   DHCPv6 IAID . . . . . . . . . . . : 402653184
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1D-82-7F-BF-00-13-72-16-B7-FF
   NetBIOS over Tcpip. . . . . . . . : Disabled
Server:  UnKnown
Address:  82.163.143.177
 
Name:    google.com
Addresses:  2a00:1450:4008:802::200e
   216.58.213.174
 

Pinging google.com [216.58.213.174] with 32 bytes of data:
Reply from 216.58.213.174: bytes=32 time=32ms TTL=55
Reply from 216.58.213.174: bytes=32 time=32ms TTL=55
 
Ping statistics for 216.58.213.174:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 32ms, Maximum = 32ms, Average = 32ms
Server:  UnKnown
Address:  82.163.143.177
 
Name:    yahoo.com
Addresses:  2001:4998:44:204::a7
   2001:4998:c:a06::2:4008
   2001:4998:58:c02::a9
   98.138.253.109
   206.190.36.45
   98.139.183.24
 

Pinging yahoo.com [206.190.36.45] with 32 bytes of data:
Reply from 206.190.36.45: bytes=32 time=187ms TTL=52
Reply from 206.190.36.45: bytes=32 time=184ms TTL=52
 
Ping statistics for 206.190.36.45:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 184ms, Maximum = 187ms, Average = 185ms
 
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
Ping statistics for 127.0.0.1:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
  9...00 13 72 16 b7 ff ......Intel® PRO/1000 PL Network Connection
  4...00 25 9c 0a 89 35 ......Microsoft Hosted Network Virtual Adapter
 12...00 25 9c 0a 89 34 ......Linksys WMP600N Wireless-N PCI Adapter with Dual-Band
  6...00 1f 81 00 08 30 ......Bluetooth Device (Personal Area Network)
  1...........................Software Loopback Interface 1
 11...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
  2...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.5     25
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link       192.168.1.5    281
      192.168.1.5  255.255.255.255         On-link       192.168.1.5    281
    192.168.1.255  255.255.255.255         On-link       192.168.1.5    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link       192.168.1.5    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link       192.168.1.5    281
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  2    306 ::/0                     On-link
  1    306 ::1/128                  On-link
  2    306 2001::/32                On-link
  2    306 2001:0:5ef5:79fb:1c51:522:3f57:fefa/128
                                    On-link
 12    281 fe80::/64                On-link
  2    306 fe80::/64                On-link
  2    306 fe80::1c51:522:3f57:fefa/128
                                    On-link
 12    281 fe80::8192:a175:de0d:d31f/128
                                    On-link
  1    306 ff00::/8                 On-link
 12    281 ff00::/8                 On-link
  2    306 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
 
Catalog5 01 C:\WINDOWS\system32\napinsp.dll [55808] (Microsoft Corporation)
Catalog5 02 C:\WINDOWS\system32\pnrpnsp.dll [70656] (Microsoft Corporation)
Catalog5 03 C:\WINDOWS\system32\pnrpnsp.dll [70656] (Microsoft Corporation)
Catalog5 04 C:\WINDOWS\system32\NLAapi.dll [65024] (Microsoft Corporation)
Catalog5 05 C:\WINDOWS\system32\winrnr.dll [23552] (Microsoft Corporation)
Catalog5 06 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog5 07 C:\WINDOWS\system32\wshbth.dll [51712] (Microsoft Corporation)
Catalog9 01 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 02 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 03 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 04 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 05 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 06 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 07 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 08 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 09 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 10 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 11 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
Catalog9 12 C:\WINDOWS\system32\mswsock.dll [317280] (Microsoft Corporation)
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (04/04/2016 01:49:23 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 1a3c
 
Start Time: 01d18e7050b84b65
 
Termination Time: 59
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: a5a1d25c-fa63-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/04/2016 01:48:41 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 1090
 
Start Time: 01d18e702e0af0d4
 
Termination Time: 65
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: 8c0d6514-fa63-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/03/2016 07:11:18 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 1524
 
Start Time: 01d18dd41dff7eb6
 
Termination Time: 49
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: 73da2aba-f9c7-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/03/2016 07:10:34 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 1b9c
 
Start Time: 01d18dd3fc7406e0
 
Termination Time: 66
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: 59a8fa4a-f9c7-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/03/2016 07:09:38 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 16b0
 
Start Time: 01d18dd3dc76a2af
 
Termination Time: 58
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: 381d8bf4-f9c7-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/03/2016 07:08:44 PM) (Source: Application Hang) (User: )
Description: The program iexplore.exe version 11.0.10586.20 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Security and Maintenance control panel.
 
Process ID: 131c
 
Start Time: 01d18dd380ee0912
 
Termination Time: 128
 
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
 
Report Id: 1800b1aa-f9c7-11e5-93eb-001f81000830
 
Faulting package full name:
 
Faulting package-relative application ID:
 
Error: (04/03/2016 06:09:02 PM) (Source: Application Error) (User: )
Description: Faulting application name: SkypeHost.exe, version: 10.1.2123.10, time stamp: 0x569054dc
Faulting module name: SkyWrap.dll, version: 10.1.2123.10, time stamp: 0x569054c9
Exception code: 0xc0000005
Fault offset: 0x00ac6197
Faulting process id: 0x9a0
Faulting application start time: 0xSkypeHost.exe0
Faulting application path: SkypeHost.exe1
Faulting module path: SkypeHost.exe2
Report Id: SkypeHost.exe3
Faulting package full name: SkypeHost.exe4
Faulting package-relative application ID: SkypeHost.exe5
 
Error: (03/31/2016 11:33:41 PM) (Source: Microsoft-Windows-CAPI2) (User: )
Description: Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.
 

Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
 
System Error:
Access is denied.
.
 
Error: (03/31/2016 11:33:11 PM) (Source: Perflib) (User: )
Description: BITSC:\Windows\System32\bitsperf.dll4
 
Error: (03/21/2016 01:36:51 AM) (Source: Perflib) (User: )
Description: BITSC:\Windows\System32\bitsperf.dll4
 

System errors:
=============
Error: (04/04/2016 01:02:50 PM) (Source: BTHUSB) (User: )
Description: The Bluetooth driver expected an HCI event with a certain size but did not receive it.
 
Error: (04/03/2016 09:00:25 PM) (Source: DCOM) (User: WOW-PC)
Description: {0002DF02-0000-0000-C000-000000000046}
 
Error: (04/03/2016 09:00:20 PM) (Source: Service Control Manager) (User: )
Description: The User Data Access_35355 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 10000 milliseconds: Restart the service.
 
Error: (04/03/2016 09:00:20 PM) (Source: Service Control Manager) (User: )
Description: The User Data Storage_35355 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 10000 milliseconds: Restart the service.
 
Error: (04/03/2016 09:00:20 PM) (Source: Service Control Manager) (User: )
Description: The Contact Data_35355 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 10000 milliseconds: Restart the service.
 
Error: (04/03/2016 09:00:20 PM) (Source: Service Control Manager) (User: )
Description: The Sync Host_35355 service terminated unexpectedly.  It has done this 1 time(s).  The following corrective action will be taken in 10000 milliseconds: Restart the service.
 
Error: (04/03/2016 05:52:47 PM) (Source: DCOM) (User: WOW-PC)
Description: application-specificLocalActivation{9E175B6D-F52A-11D8-B9A5-505054503030}{9E175B9C-F52A-11D8-B9A5-505054503030}wow-PCwowS-1-5-21-1893840283-2175900051-2165317247-1001LocalHost (Using LRPC)Microsoft.MicrosoftEdge_25.10586.0.0_neutral__8wekyb3d8bbweS-1-15-2-3624051433-2125758914-1423191267-1740899205-1073925389-3782572162-737981194
 
Error: (04/03/2016 05:52:45 PM) (Source: DCOM) (User: WOW-PC)
Description: application-specificLocalActivation{9E175B6D-F52A-11D8-B9A5-505054503030}{9E175B9C-F52A-11D8-B9A5-505054503030}wow-PCwowS-1-5-21-1893840283-2175900051-2165317247-1001LocalHost (Using LRPC)Microsoft.MicrosoftEdge_25.10586.0.0_neutral__8wekyb3d8bbweS-1-15-2-3624051433-2125758914-1423191267-1740899205-1073925389-3782572162-737981194-4256926629-1688279915-2739229046-3928706915
 
Error: (04/03/2016 05:39:09 PM) (Source: Service Control Manager) (User: )
Description: The NetTcpActivator service depends on the NetTcpPortSharing service which failed to start because of the following error:
%%1058
 
Error: (04/03/2016 05:39:01 PM) (Source: BTHUSB) (User: )
Description: The Bluetooth driver expected an HCI event with a certain size but did not receive it.
 

Microsoft Office Sessions:
=========================
Error: (04/04/2016 01:49:23 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.201a3c01d18e7050b84b6559C:\Program Files\Internet Explorer\iexplore.exea5a1d25c-fa63-11e5-93eb-001f81000830
 
Error: (04/04/2016 01:48:41 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.20109001d18e702e0af0d465C:\Program Files\Internet Explorer\iexplore.exe8c0d6514-fa63-11e5-93eb-001f81000830
 
Error: (04/03/2016 07:11:18 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.20152401d18dd41dff7eb649C:\Program Files\Internet Explorer\iexplore.exe73da2aba-f9c7-11e5-93eb-001f81000830
 
Error: (04/03/2016 07:10:34 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.201b9c01d18dd3fc7406e066C:\Program Files\Internet Explorer\iexplore.exe59a8fa4a-f9c7-11e5-93eb-001f81000830
 
Error: (04/03/2016 07:09:38 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.2016b001d18dd3dc76a2af58C:\Program Files\Internet Explorer\iexplore.exe381d8bf4-f9c7-11e5-93eb-001f81000830
 
Error: (04/03/2016 07:08:44 PM) (Source: Application Hang)(User: )
Description: iexplore.exe11.0.10586.20131c01d18dd380ee0912128C:\Program Files\Internet Explorer\iexplore.exe1800b1aa-f9c7-11e5-93eb-001f81000830
 
Error: (04/03/2016 06:09:02 PM) (Source: Application Error)(User: )
Description: SkypeHost.exe10.1.2123.10569054dcSkyWrap.dll10.1.2123.10569054c9c000000500ac61979a001d18dc7980dfb72C:\Program Files\WindowsApps\Microsoft.Messaging_2.13.20000.0_x86__8wekyb3d8bbwe\SkypeHost.exeC:\Program Files\WindowsApps\Microsoft.Messaging_2.13.20000.0_x86__8wekyb3d8bbwe\SkyWrap.dll6d087293-338e-40f8-a778-cf7cf5db5ef9Microsoft.Messaging_2.13.20000.0_x86__8wekyb3d8bbweppleae38af2e007f4358a809ac99a64a67c1
 
Error: (03/31/2016 11:33:41 PM) (Source: Microsoft-Windows-CAPI2)(User: )
Description:
Details:
AddLegacyDriverFiles: Unable to back up image of binary Microsoft Link-Layer Discovery Protocol.
 
System Error:
Access is denied.
 
Error: (03/31/2016 11:33:11 PM) (Source: Perflib)(User: )
Description: BITSC:\Windows\System32\bitsperf.dll4
 
Error: (03/21/2016 01:36:51 AM) (Source: Perflib)(User: )
Description: BITSC:\Windows\System32\bitsperf.dll4
 

CodeIntegrity Errors:
===================================
  Date: 2016-04-01 23:16:23.191
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-31 23:34:41.797
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-14 23:13:33.183
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-10 21:04:43.962
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-03 21:46:23.434
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-02 23:23:26.694
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-03-01 18:59:36.593
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-14 15:17:29.522
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-02-01 08:44:56.421
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 
  Date: 2016-01-15 16:02:37.780
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\efswrt.dll because the set of per-page image hashes could not be found on the system.
 

=========================== Installed Programs ============================
 
Battle.net (HKLM\...\Battle.net) (Version:  - Blizzard Entertainment)
Catalyst Control Center InstallProxy (HKLM\...\{4AE43811-B442-9756-3FD8-AF544B8E248E}) (Version: 2015.0803.1559.26924 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center InstallProxy (HKLM\...\{C28E8D4A-C424-71CF-DFBE-597810641712}) (Version: 2015.0821.2209.38003 - Advanced Micro Devices, Inc.) Hidden
Catalyst Control Center InstallProxy (HKLM\...\{D7D20EB4-BD89-05C0-05C6-33E5B762989E}) (Version: 2015.1104.1643.30033 - Advanced Micro Devices, Inc.) Hidden
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 (HKLM\...\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}) (Version: 11.0.61030.0 - Microsoft Corporation)
Setup (HKLM\...\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC}) (Version:  - )
World of Warcraft (HKLM\...\World of Warcraft) (Version:  - Blizzard Entertainment)
 
========================= Devices: ================================
 
Name: Multimedia Audio Controller
Description: Multimedia Audio Controller
Class Guid:
Manufacturer:
Service:
Device ID: PCI\VEN_1102&DEV_0005&SUBSYS_10031102&REV_00\4&5855BE9&0&20F0
Problem: : The drivers for this device are not installed. (Code 28)
Resolution: To install the drivers for this device, click "Update Driver", which starts the Hardware Update wizard.
 

========================= Memory info: ===================================
 
Percentage of memory in use: 34%
Total physical RAM: 3582.16 MB
Available physical RAM: 2328.99 MB
Total Virtual: 7166.16 MB
Available Virtual: 5830.55 MB
 
========================= Partitions: =====================================
 
1 Drive c: () (Fixed) (Total:297.55 GB) (Free:190.96 GB) NTFS
 
========================= Users: ========================================
 
User accounts for \\WOW-PC
 
Administrator            DefaultAccount           Guest                   
wow                     
 
========================= Restore Points ==================================
 
14-03-2016 00:40:18 Windows Update
31-03-2016 22:32:48 Windows Update
 
**** End of log ****

 

4.

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 4/4/2016
Scan Time: 3:24 PM
Logfile: mbamscanforbc.txt
Administrator: Yes
 
Version: 2.2.1.1043
Malware Database: v2016.04.04.05
Rootkit Database: v2016.04.03.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 10
CPU: x86
File System: NTFS
User: wow
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 300361
Time Elapsed: 9 min, 50 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 4
Adware.EoRezo, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe, 6516, Delete-on-Reboot, [82538327c7d29a9c2347ce0ba1608d73]
Adware.EoRezo, C:\Program Files\dply_en_015020286\dply_en_015020286.exe, 7232, Delete-on-Reboot, [9540beec6930023446f7d8c4649dd828]
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286\dply_en_015020286.exe, 7232, Delete-on-Reboot, [12c3634748518babbba377d29b69728e]
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe, 6516, Delete-on-Reboot, [369f7a3031688aacb38ee738689ba65a]
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 38
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\APPID\{4031db0c-b05e-43bd-ac1b-e1f4d5da0516}, Quarantined, [d4012189d7c2979fb268a63f14ee9868],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\APPID\{ab25d3c2-9787-4788-99a1-32a4c1208c11}, Quarantined, [9e37d6d46336a690d942aa3be81a8779],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\APPID\{bdd1eed2-cb3a-4308-ae94-cc92cea53ac5}, Quarantined, [95405d4d6e2b69cdfcd01c93867c3ac6],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\APPID\{f2111ef1-fbe5-4370-85a6-4ceee56af79a}, Quarantined, [6471b8f292078ea8b01d268942c054ac],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\CLSID\{4944affb-e1c2-4ffb-a3c7-e424ea82e577}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\TYPELIB\{194b8204-3eae-47e4-8daf-1852e7a82638}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\INTERFACE\{16879EC5-9228-448E-89C2-84B8A31A8E06}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Yontoo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{4944AFFB-E1C2-4FFB-A3C7-E424EA82E577}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Yontoo, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{4944AFFB-E1C2-4FFB-A3C7-E424EA82E577}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Yontoo, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{4944AFFB-E1C2-4FFB-A3C7-E424EA82E577}, Quarantined, [d9fc4b5f6c2d2e0811b9832ce41e11ef],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\CLASSES\CLSID\{8FF10FED-2F0A-4F7F-BE87-B04F1DCD4319}, Quarantined, [85505a5071289c9a2629786dd62cd927],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\CLSID\{F83D1872-D9FF-47F8-B5A0-49CC51E24EE8}, Quarantined, [dff6bceea2f70135cb1db8f8a95906fa],
PUP.Optional.DeskTopPlay, HKLM\SOFTWARE\DESKTOPPLAY\dply_en_015020286, Quarantined, [e1f49c0e178289ad57065aef9e66ce32],
PUP.Optional.Yontoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472F-A0FF-E1416B8B2E3A}, Quarantined, [686db8f2f3a6f5415f59aaa4a460cf31],
PUP.Optional.DNSUnlocker, HKLM\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CERTIFICATES\26D9E607FFF0C58C7844B47FF8B6E079E5A2220E, Quarantined, [a332fbaf00998fa75fe6dfad9470c33d],
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASAPI32, Quarantined, [676eaefcf1a870c6b8bd4807a55fce32],
PUP.Optional.DeskBar, HKLM\SOFTWARE\MICROSOFT\TRACING\DeskBar_RASMANCS, Quarantined, [4f868b1f1b7ee94d62138fc0ca3a5ba5],
PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{BA062B1A-501B-467D-9B31-7BE7046CF161}, Delete-on-Reboot, [d7fe7e2cd8c192a4d6c64a4b18ecce32],
PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\IBUpd2, Delete-on-Reboot, [1db8f9b1afea4cea52da1477b64e10f0],
PUP.Optional.MySearch123, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC}, Quarantined, [657077339ffafc3a9a3f037b49bba858],
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\TUTORIALS, Quarantined, [9d3808a2b6e394a24b7f320f34d07b85],
PUP.Optional.DNSUnlocker.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{E1527582-8509-4011-B922-29E3FB548882}_is1, Quarantined, [b3223872eeab6bcb9c8f870f20e40ef2],
PUP.Optional.SearchModule, HKLM\SOFTWARE\WOW6432NODE\SEARCHMODULE\SMUpd, Quarantined, [5a7b6e3ca1f8e45234453bfc07fd53ad],
PUP.Optional.Nosibay, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\Nosibay, Quarantined, [9540a802cecbdd598f5662cbbc48e719],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\TutoTag, Quarantined, [b322c0ea7f1a2d097a4c80c1a460718f],
PUP.Optional.Searching, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\jlcgehabolcakkjhgmgpkagpolbjlhfa, Quarantined, [0bca17934752e84ebbe3ec479370fe02],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\OTUT, Quarantined, [63724268990080b67bccebaca75dfa06],
PUP.Optional.WindApp, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\STORE\WindApp Tag, Quarantined, [ba1b8c1ebedb96a0f9539aaca75d0df3],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\TUTORIALS\updatetutorialeshp, Quarantined, [82533f6bf6a3999ddbe89fa27d87d927],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\TUTORIALS\updatetutorialshp, Quarantined, [12c30f9be8b1a39302c20d3453b134cc],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\TUTORIALS\updv, Quarantined, [9540a9018415bc7affc60041b45026da],
PUP.Optional.SelectionTool, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\WTOOLS\Selection Tools Tag, Quarantined, [4590a208a1f82a0cbac03afea46041bf],
PUP.Optional.Yontoo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{da8dfa05-93a3-4617-8c86-bbfc625f8fa7}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\CLSID\{DA8DFA05-93A3-4617-8C86-BBFC625F8FA7}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\TYPELIB\{84853b69-2d54-4cf5-989f-be2a792b2505}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
PUP.Optional.Yontoo, HKLM\SOFTWARE\CLASSES\INTERFACE\{E3DAED89-1BEA-46E1-9EE0-5FC86D45DE91}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
PUP.Optional.Yontoo, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{DA8DFA05-93A3-4617-8C86-BBFC625F8FA7}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
PUP.Optional.Yontoo, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{DA8DFA05-93A3-4617-8C86-BBFC625F8FA7}, Quarantined, [a43109a1f2a748ee35cc2213a3627d83],
 
Registry Values: 21
Adware.EoRezo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|updply_en_015020286.exe, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe -runonce, Quarantined, [82538327c7d29a9c2347ce0ba1608d73]
Adware.EoRezo, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|dply_en_015020286, "C:\Program Files\dply_en_015020286\dply_en_015020286.exe", Quarantined, [9540beec6930023446f7d8c4649dd828]
PUP.Optional.Yontoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DoNotAskAgain, searchinterneat-a.akamaihd.net, Quarantined, [f8dde9c10099fd3998f3104023e18779]
PUP.Optional.Yontoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}|URL, http://searchinterneat-a.akamaihd.net/s?eq=U0EeE1xZE1oZB1ZEfQxaAF1HFVcTbQgLBwpcFQZCdRRaUFxJDARBJAtdB1hEGVBCJh9aFQQTSEcFME0FCFwEURNNfWpdAEsSSWJGInJWDk4=&q={searchTerms}, Quarantined, [686db8f2f3a6f5415f59aaa4a460cf31]
PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{BA062B1A-501B-467D-9B31-7BE7046CF161}|Path, \IBUpd2, Delete-on-Reboot, [d7fe7e2cd8c192a4d6c64a4b18ecce32]
PUP.Optional.DeskTopPlay, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|dply_en_015020286, "C:\Program Files\dply_en_015020286\dply_en_015020286.exe", Quarantined, [12c3634748518babbba377d29b69728e]
PUP.Optional.Tuto4PC, HKLM\SOFTWARE\TUTORIALS|HostGUID, F608F83C-32D6-4C60-B8EC-48B447708B06, Quarantined, [9d3808a2b6e394a24b7f320f34d07b85]
Hijack.AutoConfigURL.PrxySvrRST, HKLM\SYSTEM\CONTROLSET001\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, 0http://unblockservice.com/wpad.dat?317d702f3ce0b15345192f37699b9ad05259034, Quarantined, [12c36149d3c62f07a4b15245a65e45bb]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{60d25c10-ee75-4b23-bebd-6294cea9bf78}|NameServer, 82.163.143.177,82.163.142.179, Quarantined, [795ccddddabf2b0bc22e43480bf952ae]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{86561f85-b537-488d-a48d-381f1ef4fead}|NameServer, 82.163.143.177,82.163.142.179, Quarantined, [f0e5446621786cca4fa112798084718f]
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{c4a0c9d6-de9b-4f59-a1fa-7e73047bccb3}|NameServer, 82.163.143.177,82.163.142.179, Quarantined, [6174cdddaeebb77f6e828605e71d3bc5]
PUP.Optional.DeskBar, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, Quarantined, [379ed0da0d8c6ec87646f790b153b749]
PUP.Optional.SelectionTools, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|Selection Tools.exe, 11000, Quarantined, [2ea7c7e3cfca6bcb64850c7cf80c27d9]
PUP.Optional.WebBar, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|wbmain.exe, 11000, Quarantined, [fadb09a14950ac8a1f98c6d408fc50b0]
PUP.Optional.Yontoo, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DoNotAskAgain, searchinterneat-a.akamaihd.net, Quarantined, [7362e2c88316d660e1ed9eb17193ce32]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\OTUT|product, tutoproduct, Quarantined, [63724268990080b67bccebaca75dfa06]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\OTUT|partner, tuto, Quarantined, [894c5a50cacf7cbafd4a4a4dda2a9f61]
Hijack.AutoConfigURL.PrxySvrRST, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|AutoConfigUrl, http://unblockservice.com/wpad.dat?317d702f3ce0b15345192f37699b9ad05259034, Quarantined, [a3328228d6c3a492e7d31517768dc13f]
PUP.Optional.WindApp, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|WindApp, "C:\Users\wow\AppData\Roaming\Store\WindApp\WindApp.exe" /winstartup, Quarantined, [c114b0fa2f6aea4c25250d3900042ed2]
PUP.Optional.SelectionTools, HKU\S-1-5-21-1893840283-2175900051-2165317247-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Selection Tools, "C:\Users\wow\AppData\Roaming\WTools\Selection Tools\Selection Tools.exe" /winstartup, Quarantined, [4b8acae019806cca6520db5dd52f728e]
PUP.Optional.DeskTopPlay, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|updply_en_015020286.exe, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe -runonce, Quarantined, [369f7a3031688aacb38ee738689ba65a]
 
 
Folders: 30
PUP.Optional.Goobzo, C:\ProgramData\SearchModule, Quarantined, [4e87ecbec8d15bdb0520a49dd82ba759],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\dext, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Installer, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\pls, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\VisualElements, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\Temp, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Local Extension Settings, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Local Storage, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\pnacl, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Roaming\Nosibay, Quarantined, [b025911917821d191ecc49c843c0ae52],
PUP.Optional.OasisSpace, C:\Program Files\Oasis Space, Quarantined, [7c5905a5f0a945f1e419c34e9a69f907],
PUP.Optional.OasisSpace, C:\Users\wow\AppData\Local\Temp\Oasis Space, Quarantined, [765f8921b2e7b87e6f8ff021d03347b9],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286, Delete-on-Reboot, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\Download, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\dply_en_015020286, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\dply_en_015020286\1.20, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286, Delete-on-Reboot, [eaeb2387b0e91a1c49f9b669956e817f],
PUP.Optional.Amonetize, C:\ProgramData\c94140c6-3cd5-0, Quarantined, [00d5dfcb5247c96dba0a141208fb3cc4],
PUP.Optional.Amonetize, C:\ProgramData\c94140c6-5241-1, Quarantined, [ae27c9e18c0d54e2af158b9b887b1de3],
 
Files: 173
Adware.EoRezo, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe, Delete-on-Reboot, [82538327c7d29a9c2347ce0ba1608d73],
Adware.EoRezo, C:\Program Files\dply_en_015020286\dply_en_015020286.exe, Delete-on-Reboot, [9540beec6930023446f7d8c4649dd828],
PUP.Optional.Tuto4PC, C:\Program Files\dply_en_015020286\desktopplay_widget.exe, Quarantined, [6d68f7b3d4c5d66015712a2903fd2fd1],
Adware.EoRezo, C:\Program Files\dply_en_015020286\predm.exe, Quarantined, [dbfab0fa57421a1cfad00d4cd12f02fe],
Adware.EoRezo.Gen, C:\Users\wow\AppData\Local\Temp\0771-d1a1-729b-4520.exe, Quarantined, [16bf8723a7f2290d692bc3268e73827e],
Trojan.Graftor, C:\Users\wow\AppData\Local\Temp\Pee3BE2.tmp, Quarantined, [597caa00e9b0102603f5194228d8bf41],
PUP.Optional.Yontoo, C:\Users\wow\AppData\Local\Temp\{9C5D7539-03CA-40C5-9D5E-439950883948}.dll, Quarantined, [f9dc2d7d0f8a74c2f25446b70001956b],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Local\Temp\cR35JoUApM.exe, Quarantined, [33a20d9d4f4a9d99935dda73cb3a60a0],
PUP.Optional.DNSUnlocker, C:\Users\wow\AppData\Local\Temp\d008-24a7-322b-0edb.exe, Quarantined, [e1f4fcaefe9b9c9a75d162bc5ca9d12f],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Local\Temp\d3fe-0dbc-af9b-a38f.exe, Quarantined, [ebea4e5ce7b288ae4ea2430a7a8b46ba],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Local\Temp\301201632635\Selection Tools Uninstall.exe, Quarantined, [90456a406336b086a24eef5eb451e31d],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Local\Temp\301201632721\WindApp Uninstall.exe, Quarantined, [3a9b2882b0e92b0b20d070dda85d40c0],
PUP.Optional.Nosibay, C:\Users\wow\AppData\Local\Temp\301201632738\Bubble Dock Uninstall.exe, Quarantined, [10c5f9b14b4ecf672dc3024b58ad8f71],
PUP.Optional.Yontoo, C:\Users\wow\AppData\Local\Temp\54qQ8IM3L2yRDxcUs\102\setup.exe, Quarantined, [26af02a865349a9cead0a95b8d756b95],
PUP.Optional.Yontoo, C:\Users\wow\AppData\Local\Temp\54qQ8IM3L2yRDxcUs\125\setup.exe, Quarantined, [60753e6c8d0ca393a09b8581bd450df3],
PUP.Optional.Goobzo, C:\ProgramData\SearchModule\smhe.js, Quarantined, [4e87ecbec8d15bdb0520a49dd82ba759],
PUP.Optional.BubbleDock, C:\Users\wow\AppData\Roaming\Bubble Dock.boostrap.log, Quarantined, [1abb01a98217d462789b47c7c83cb848],
PUP.Optional.BubbleDock, C:\Users\wow\AppData\Roaming\Bubble Dock.installation.log, Quarantined, [ab2a6e3c30693ff79c77e92519eb13ed],
PUP.Optional.BubbleDock, C:\Users\wow\AppData\Local\Temp\Bubble Dock.txt, Quarantined, [dcf93f6b8e0b0036bb5a719d43c1bd43],
PUP.Optional.BubbleDock, C:\Users\wow\AppData\Local\Temp\LBubble Dock.txt, Quarantined, [bf16d7d317823df948cf6aa4e420a759],
PUP.Optional.SelectionTools, C:\Users\wow\AppData\Roaming\Selection Tools.installation.log, Quarantined, [09cc6644d1c83ff7ec9595a348bcfb05],
PUP.Optional.WindApp, C:\Users\wow\AppData\Roaming\WindApp.boostrap.log, Quarantined, [9144adfd72270d29252434122bd95ba5],
PUP.Optional.WindApp, C:\Users\wow\AppData\Roaming\WindApp.installation.log, Quarantined, [d2038624c1d850e60643dc6a62a28d73],
PUP.Optional.FakeIELaunch, C:\Users\wow\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet-Explorer Browser.lnk, Quarantined, [65705e4cd7c2e254090e410f2adae818],
PUP.Optional.MyBrowser, C:\Windows\System32\Tasks\IBUpd2, Quarantined, [5382189243564ee82bff7e0d37cd44bc],
PUP.Optional.Amonetize.Gen, C:\ProgramData\c94140c6-3cd5-0\BIT9714.tmp, Quarantined, [8352b5f55e3bab8bdaa5deb608fcf010],
PUP.Optional.Amonetize.Gen, C:\ProgramData\c94140c6-5241-1\BIT96D5.tmp, Quarantined, [488da505d5c458de6e11dbb9d4300000],
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286\dply_en_015020286.exe, Delete-on-Reboot, [12c3634748518babbba377d29b69728e],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\VisualElementsManifest.xml, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\libglesv2.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\47.0.0.3.manifest, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\chrome.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\chrome_100_percent.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\chrome_200_percent.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\chrome_child.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\chrome_elf.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\d3dcompiler_46.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\delegate_execute.exe, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\ffmpegsumo.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\icudtl.dat, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\libegl.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\libexif.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\metro_driver.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\mksnapshot.ia32.exe.assert.manifest, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\nacl64.exe, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\nacl_irt_x86_32.nexe, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\nacl_irt_x86_64.nexe, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\pdf.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\ppgooglenaclpluginchrome.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\resources.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\secondarytile.png, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\dext\dext.json, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\dext\ShopBrowser.crx, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\dext\t.crx, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Installer\chrome.7z, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Installer\setup.exe, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\hi.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\am.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ar.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\bg.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\bn.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ca.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\cs.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\da.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\de.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\el.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\en-GB.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\en-US.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\es-419.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\es.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\et.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\fa.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\fi.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\fil.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\fr.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\gu.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\he.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\hr.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\hu.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\id.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\it.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ja.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\kn.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ko.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\lt.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\lv.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ml.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\mr.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ms.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\nb.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\nl.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\pl.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\pt-BR.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\pt-PT.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ro.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ru.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\sk.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\sl.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\sr.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\sv.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\sw.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\ta.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\te.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\th.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\tr.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\uk.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\vi.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\zh-CN.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\Locales\zh-TW.pak, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\pls\flash.dll, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\pls\manifest.json, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\VisualElements\logo.png, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\VisualElements\smalllogo.png, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\Application\47.0.0.3\VisualElements\splash-620x300.png, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\First Run, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Local State, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Safe Browsing Cookies, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Safe Browsing Cookies-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Login Data, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Archived History, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Archived History-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Cookies, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Cookies-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Current Session, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Favicons, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Favicons-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Google Profile.ico, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\History, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\History Provider Cache, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\History-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Login Data-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Network Action Predictor, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Network Action Predictor-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Preferences, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Protected Preferences, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Shortcuts, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Shortcuts-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Top Sites, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Top Sites-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Visited Links, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Web Data, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Web Data-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State\000003.log, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State\CURRENT, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State\LOCK, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State\LOG, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extension State\MANIFEST-000002, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\appConfig.js, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\background.js, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\config.json, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\database1_0_0.json, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\helper.js, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\injection.js, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\logo128.png, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\manifest.json, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Extensions\oglkphaaklhadjmojangahdlganfbajd\1.0.1.6_0\utils.js, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache\data_0, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache\data_1, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache\data_2, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache\data_3, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\GPUCache\index, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Local Storage\chrome-extension_pafkbggdmjlpgkdkcbjmhmfcdpncadgh_0.localstorage, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.BrowserAir, C:\Users\wow\AppData\Local\BrowserAir\User Data\Default\Local Storage\chrome-extension_pafkbggdmjlpgkdkcbjmhmfcdpncadgh_0.localstorage-journal, Quarantined, [84511e8c1a7f3df9237bc33a1ee44ab6],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.cyl, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\updply_en_015020286.exe, Delete-on-Reboot, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\user_profil.cyp, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\Download\setup_rec_gb_238.exe, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\Download\wizzupdater.exe, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\dply_en_015020286\1.20\cnf.cyl, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Users\wow\AppData\Local\dply_en_015020286\dply_en_015020286\1.20\eorezo.cyl, Quarantined, [369f7a3031688aacb38ee738689ba65a],
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286\dply_en_015020286 - uninstall.dat, Quarantined, [eaeb2387b0e91a1c49f9b669956e817f],
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286\dply_en_015020286 - uninstall.exe, Quarantined, [eaeb2387b0e91a1c49f9b669956e817f],
PUP.Optional.DeskTopPlay, C:\Program Files\dply_en_015020286\predm.exe, Quarantined, [eaeb2387b0e91a1c49f9b669956e817f],
 
Physical Sectors: 0
(No malicious items detected)
 

(end)

 

5.

 

Malwarebytes Anti-Rootkit BETA 1.9.3.1001
www.malwarebytes.org
 
Database version:
  main:    v2016.04.04.05
  rootkit: v2016.04.03.01
 
Windows 10 x86 NTFS
Internet Explorer 11.162.10586.0
wow :: WOW-PC [administrator]
 
4/4/2016 3:52:41 PM
mbar-log-2016-04-04 (15-52-41).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 300465
Time elapsed: 17 minute(s), 5 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)

 

6.

 

Rkill 2.8.4 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2016 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html
 
Program started at: 04/07/2016 02:07:37 PM in x86 mode.
Windows Version: Windows 10 Home
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * No malware processes found to kill.
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
 
Performing miscellaneous checks:
 
 * No issues found.
 
Checking Windows Service Integrity:
 
 * b06bdrv [Missing Service]
 * ebdrv [Missing Service]
 * iaLPSSi_GPIO [Missing Service]
 * iaLPSSi_I2C [Missing Service]
 * ibbus [Missing Service]
 * ksthunk [Missing Service]
 * mlx4_bus [Missing Service]
 * ndfltr [Missing Service]
 * PerfHost [Missing Service]
 * vpci [Missing Service]
 * WinMad [Missing Service]
 * WinVerbs [Missing Service]
 
 * NetTcpPortSharing => %systemroot%\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe [Incorrect ImagePath]
 
 * PrintNotify => C:\WINDOWS\system32\spool\drivers\W32X86\3\PrintConfig.dll [Incorrect ServiceDLL]
 
Searching for Missing Digital Signatures:
 
 * No issues found.
 
Checking HOSTS File:
 
 * No issues found.
 
Program finished at: 04/07/2016 02:08:17 PM
Execution time: 0 hours(s), 0 minute(s), and 40 seconds(s)
 
I hope I've provided the correct info.  Many thanks :)


#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 08 April 2016 - 05:54 PM

p22002970.gif Download Temp File Cleaner (TFC)
Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

p22002970.gif Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.


p22002970.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.


p22002970.gif Download Sophos Free Virus Removal Tool and save it to your desktop.
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 16 April 2016 - 01:45 PM

Hi Broni.  To be on the safe side, I'm going to update you on recent events in case it has any bearing on this clean-up process.

The desktop with the problem actually belongs to a friend of mine, but as it was my fault it got infected I offered to try and clean it up first, as my friend wanted to remove/reinstall windows 10 to solve the problem.

Until yesterday, this is what I thought had happened:  I was halfway through the second set of instructions you gave me and had to postpone finishing them for a couple of days.  Before I could get back to it my friend checked/un-checked some boxes to block third-party cookies and one or two other boxes which I didn't know about.  One of those other boxes may have been to block third-party programs (so someone at MS told him) because MS Edge disappeared.  He contacted the MS Remote Help Team and they had him reset something (he hasn't ever created any restore points himself), although I don't know what.  MS Edge came back but so did the original browser hijacker that you had helped me remove.  I got him to run the Malwarebytes again which fixed the 20-30 PuPs it found.

Although I had been halfway through the second set of instructions you gave me (I had ran the TFC and the AdwCleaner), I thought it best to start them again.  So I ran the TFC and AdwCleaner and when the PC restarted after AdwCleaner, MS Edge had disappeared again.

So now I am wondering whether it was my friend who caused it to disappear in the first place, or whether it was something to do with AdwCleaner.  The last time MS Edge disappeared was after I ran AdwCleaner the first time, only I didn't notice it because I switched the PC off after the restart.  It was only when I went back to finish the scans that I noticed it was gone and my friend started checking boxes.

I thought it best to post the two AdwCleaner scan logs before I carried on with the clean-up process.

If these events have compromised the progress I have made so far, it might be best for my friend to create his own BC account and start again.  If not, I am happy to continue.  Many thanks.

# AdwCleaner v5.110 - Logfile created 10/04/2016 at 20:51:01
# Updated 10/04/2016 by Xplode
# Database : 2016-04-10.2 [Server]
# Operating system : Windows 10 Home  (X86)
# Username : wow - WOW-PC
# Running from : C:\Users\wow\AppData\Local\Microsoft\Windows\INetCache\IE\IFWMIFBM\adwcleaner_5.110.exe
# Option : Clean
# Support : http://toolslib.net/forum
 
***** [ Services ] *****
 
[-] Service Deleted : sdfhgdf
 
***** [ Folders ] *****
 
[-] Folder Deleted : C:\Users\wow\AppData\Roaming\Store
[-] Folder Deleted : C:\Users\wow\AppData\Roaming\WTools
 
***** [ Files ] *****
 
[-] File Deleted : C:\WINDOWS\system32\drivers\sdfhgdf.sys
 
***** [ DLLs ] *****
 

***** [ Shortcuts ] *****
 

***** [ Scheduled tasks ] *****
 

***** [ Registry ] *****
 
[-] Key Deleted : HKCU\Software\Store
[-] Key Deleted : HKCU\Software\Tutorials
[-] Key Deleted : HKCU\Software\WTools
[-] Key Deleted : HKLM\SOFTWARE\DESKTOPPLAY
[-] Key Deleted : HKLM\SOFTWARE\SearchModule
[-] Key Deleted : HKLM\SOFTWARE\SimpleFiles
[-] Key Deleted : HKLM\SOFTWARE\WebBar
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\11598763487076930564
 
***** [ Web browsers ] *****
 

*************************
 
:: "Tracing" keys deleted
:: Winsock settings cleared
 
*************************
 
C:\AdwCleaner\AdwCleaner[C1].txt - [1328 bytes] - [10/04/2016 20:51:01]
C:\AdwCleaner\AdwCleaner[S1].txt - [1561 bytes] - [10/04/2016 20:41:03]
 
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [1474 bytes] ##########

 

 

The second scan:

 

# AdwCleaner v5.110 - Logfile created 10/04/2016 at 20:51:01
# Updated 10/04/2016 by Xplode
# Database : 2016-04-10.2 [Server]
# Operating system : Windows 10 Home  (X86)
# Username : wow - WOW-PC
# Running from : C:\Users\wow\AppData\Local\Microsoft\Windows\INetCache\IE\IFWMIFBM\adwcleaner_5.110.exe
# Option : Clean
# Support : http://toolslib.net/forum
 
***** [ Services ] *****
 
[-] Service Deleted : sdfhgdf
 
***** [ Folders ] *****
 
[-] Folder Deleted : C:\Users\wow\AppData\Roaming\Store
[-] Folder Deleted : C:\Users\wow\AppData\Roaming\WTools
 
***** [ Files ] *****
 
[-] File Deleted : C:\WINDOWS\system32\drivers\sdfhgdf.sys
 
***** [ DLLs ] *****
 

***** [ Shortcuts ] *****
 

***** [ Scheduled tasks ] *****
 

***** [ Registry ] *****
 
[-] Key Deleted : HKCU\Software\Store
[-] Key Deleted : HKCU\Software\Tutorials
[-] Key Deleted : HKCU\Software\WTools
[-] Key Deleted : HKLM\SOFTWARE\DESKTOPPLAY
[-] Key Deleted : HKLM\SOFTWARE\SearchModule
[-] Key Deleted : HKLM\SOFTWARE\SimpleFiles
[-] Key Deleted : HKLM\SOFTWARE\WebBar
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\11598763487076930564
 
***** [ Web browsers ] *****
 

*************************
 
:: "Tracing" keys deleted
:: Winsock settings cleared
 
*************************
 
C:\AdwCleaner\AdwCleaner[C1].txt - [1328 bytes] - [10/04/2016 20:51:01]
C:\AdwCleaner\AdwCleaner[S1].txt - [1561 bytes] - [10/04/2016 20:41:03]
 
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [1474 bytes] ##########
# AdwCleaner v5.111 - Logfile created 15/04/2016 at 20:56:55
# Updated 14/04/2016 by Xplode
# Database : 2016-04-15.1 [Server]
# Operating system : Windows 10 Home  (X86)
# Username : wow - WOW-PC
# Running from : C:\Users\wow\AppData\Local\Microsoft\Windows\INetCache\IE\P0OW17KQ\adwcleaner_5.111.exe
# Option : Clean
# Support : http://toolslib.net/forum
 
***** [ Services ] *****
 
[-] Service Deleted : sdfhgdf
 
***** [ Folders ] *****
 

***** [ Files ] *****
 
[-] File Deleted : C:\WINDOWS\system32\drivers\sdfhgdf.sys
 
***** [ DLLs ] *****
 

***** [ Shortcuts ] *****
 

***** [ Scheduled tasks ] *****
 

***** [ Registry ] *****
 
[-] Key Deleted : HKCU\Software\Store
[-] Key Deleted : HKCU\Software\WTools
[-] Key Deleted : HKLM\SOFTWARE\SearchModule
[-] Key Deleted : HKLM\SOFTWARE\SimpleFiles
[-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\www-searching.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\d19tqk5t6qcjac.cloudfront.net
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\d3l3lkinz3f56t.cloudfront.net
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\qbittorrent.en.softonic.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\softonic.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www-searching.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\d19tqk5t6qcjac.cloudfront.net
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\d3l3lkinz3f56t.cloudfront.net
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\qbittorrent.en.softonic.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\softonic.com
[-] Key Deleted : HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www-searching.com
 
***** [ Web browsers ] *****
 

*************************
 
:: "Tracing" keys deleted
:: Winsock settings cleared
 
*************************
 
C:\AdwCleaner\AdwCleaner[C1].txt - [4886 bytes] - [10/04/2016 20:51:01]
C:\AdwCleaner\AdwCleaner[S1].txt - [5087 bytes] - [10/04/2016 20:41:03]
 
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [5032 bytes] ##########


#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 16 April 2016 - 07:50 PM

Go on...


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 17 April 2016 - 04:04 PM

Thanks, will do :)



#10 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 19 April 2016 - 01:49 PM

Hi Broni, here is the log from the JRT scan.  The Virus Removal Tool from Sophos didn't find anything. Thankyou.

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.4 (03.14.2016)
Operating System: Windows 10 Home x86
Ran by wow (Administrator) on Tue 04/19/2016 at 16:41:55.07
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 

File System: 1
 
Successfully deleted: C:\WINDOWS\System32\${logfile} (File)
 
 
 
Registry: 0
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Tue 04/19/2016 at 16:43:40.36
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 19 April 2016 - 07:49 PM

Your computer is clean p3879546.jpg

1. This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...
This is a very crucial step so make sure you don't skip it.
Download 51a5ce45263de-delfix.pngDelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

Double-click Delfix.exe to start the tool.
Make sure the following items are checked:

  • Activate UAC (optional; some users prefer to keep it off)
  • Remove disinfection tools
  • Create registry backup
  • Purge System Restore
  • Reset system settings

Now click "Run" and wait patiently.
Once finished a logfile will be created. You don't have to attach it to your next reply.

2. Make sure Windows Updates are current.

3. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

4. Check if your browser plugins are up to date.
Firefox - https://www.mozilla.org/en-US/plugincheck/
other browsers: https://browsercheck.qualys.com/ (click on "Scan without installing plugin" and then on "Scan now")

5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

7. Run Temporary File Cleaner (TFC), AdwCleaner and Junkware Removal Tool (JRT) weekly (you need to redownload these tools since they were removed by DelFix).

8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

10. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

11. Read:
How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/
About those Toolbars and Add-ons - Potentially Unwanted Programs (PUPs) which change your browser settings: http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/#entry3187642

12. Please, let me know, how your computer is doing.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 20 April 2016 - 03:21 PM

Hi Broni.  Thanks for all your help so far  :).  Regarding these final steps....I am a little concerned about starting them, in particular creating a restore point, as MS Edge is still AWOL.  I don't understand why it disappears after running AdwCleaner, and don't really want to create a restore point until things are back to how they should be.  I don't know enough about these things to know if I am worrying unnecessarily or not, sorry.  I'm sure that you know that when you use MS Edge with Windows 10, that you can just search from the search bar in the bottom left-hand corner of the screen.  However, when I do this it says...."We can't connect to web search right now but you can still search your stuff. Make sure you are currently connected to the internet."  When I click the start button and click on MS Edge from there, a white page with a search bar on it comes up, with the words, "Where to next?" above the search bar.  However, when I search for something another white page comes up saying, "Hmm, we can't reach this page.  Try this: * Make sure you've got the right web address: https://www.bing.com; * refresh the page; * search for what you want.  As I mentioned in my last post, to bring MS Edge back last time, the guy from the Remote Help Team at Microsoft went back to an earlier restore point, but this also brought back the browser hijacker.  So my problem now is 'where has MS Edge gone?' and 'how do I get it back?'.  Thanks Broni


Edited by A-K, 20 April 2016 - 03:39 PM.


#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 20 April 2016 - 05:53 PM

Download Windows Repair (All in One) from this site

Install the program then run it.

NOTE 1. In Windows Vista, 7 and 8 right click on the program, click "Run As Administrator".
NOTE 2. Disable your antivirus program before running Windows Repair.


Go to Step 3 and click on Check button next to 1. See If Check Disk Is Needed.
If the tool that the Check Disk is needed click on Do It button next to 2. Check Disk.
In that case make sure you restart computer.

p22012121.gif


Once the above is done go to Step 4 and allow it to run System File Check by clicking on Do It button:

p22012122.gif


Go to Step 5 and under "System Restore" click on Create button:

p22012123.gif


Go to Repairs tab and click Open Repairs button.

p22012124.gif

In next window....
Leave all checkmarks as they're.
Click on Start Repairs button.

p22012126.gif

Post Windows Repair log which is located in the following folder:
64-bit systems - C:\Program Files (x86)\Tweaking.com\Windows Repair (All in One)\Logs
32-bit systems - C:\Program Files\Tweaking.com\Windows Repair (All in One)\Logs


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#14 A-K

A-K
  • Topic Starter

  • Members
  • 33 posts
  • OFFLINE
  •  
  • Location:Cheshire, UK
  • Local time:04:36 PM

Posted 22 April 2016 - 01:55 PM

Hi Broni.  It was fascinating to watch that tool at work, I only wish I understood it.  I don't know if this is of any relevance, but the Administrative System File Check found some problems that it could not repair.  As for the final logs that you asked me to post, in the Logs folder there are 3 items listed: 2 text documents and a file folder.  The text docs are called i) chkdsk_full_log, and ii) chkdsk_log, and the file folder has 18 text documents in it.  The first text doc in the file folder is called: _Windows_Repair_Log.  This is the one that I am posting.  Do I need to post any or all of the others in the Logs folder? Once again, many thanks :)

 

Tweaking.com - Windows Repair v3.8.6
--------------------------------------------------------------------------------
 
System Variables
--------------------------------------------------------------------------------
OS: Windows 10 Home
OS Architecture: 32-bit
OS Version: 10.0.10586
OS Service Pack:
Computer Name: WOW-PC
Windows Drive: C:\
Windows Path: C:\WINDOWS
Program Files: C:\Program Files
Current Profile: C:\Users\wow
Current Profile SID: S-1-5-21-1893840283-2175900051-2165317247-1001
Current Profile Classes: S-1-5-21-1893840283-2175900051-2165317247-1001_Classes
Profiles Location: C:\Users
Profiles Location 2: C:\WINDOWS\ServiceProfiles
Local Settings AppData: C:\Users\wow\AppData\Local
--------------------------------------------------------------------------------
 
System Information
--------------------------------------------------------------------------------
System Up Time: 0 Days 00:08:58
 
Process Count: 48
Commit Total: 922.33 MB
Commit Limit: 7.00 GB
Commit Peak: 1.37 GB
Handle Count: 23255
Kernel Total: 184.19 MB
Kernel Paged: 136.11 MB
Kernel Non Paged: 48.08 MB
System Cache: 1.57 GB
Thread Count: 1047
--------------------------------------------------------------------------------
 
Memory Before Cleaning with CleanMem
--------------------------------------------------------------------------------
Memory Total: 3.50 GB
Memory Used: 893.74 MB(24.9498%)
Memory Avail.: 2.63 GB
--------------------------------------------------------------------------------
 
Cleaning Memory Before Starting Repairs...
 
Memory After Cleaning with CleanMem
--------------------------------------------------------------------------------
Memory Total: 3.50 GB
Memory Used: 686.43 MB(19.1625%)
Memory Avail.: 2.83 GB
--------------------------------------------------------------------------------
 
Starting Repairs...
   Started at (4/22/2016 5:30:13 PM)
 
Setting Any Missing 'InstallDate' From Uninstall Sections Before Running Repair...
Total Missing 'InstallDate' Fixed: 48
 
01 - Reset Registry Permissions
   Restore Windows 7/8/10 Default Registry Permissions
   Start (4/22/2016 5:30:15 PM)
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\hku.7z
Done,  0.62 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\hklm.7z
Done,  6.48 seconds.
 
   Running Repair Under System Account
   Done (4/22/2016 5:35:54 PM)
 
Reset File Permissions: C:
   C: & Sub Folders
   Start (4/22/2016 5:35:55 PM)
 
   Running Repair Under Current User Account
   Done (4/22/2016 5:44:58 PM)
 
Reset File Permissions
   Restore Windows 7/8/10 Default File Permissions
   Start (4/22/2016 5:44:58 PM)
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\default.7z
Done,  0.22 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\profile.7z
Done,  0.33 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\program_files.7z
Done,  0.79 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\program_files_x86.7z
Done,  0.21 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\programdata.7z
Done,  0.27 seconds.
 

Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\windows.7z
Done,  3.93 seconds.
 
   Running Repair Under Current User Account
   Done (4/22/2016 5:50:06 PM)
 
Reset File Permissions: Cleanup
   Repairing Restricted Folders Permissions To Avoid Infinite Loops
   Start (4/22/2016 5:50:06 PM)
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:50:09 PM)
 
03 - Reset Service Permissions
   Start (4/22/2016 5:50:09 PM)
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:50:44 PM)
 
04 - Register System Files
   Start (4/22/2016 5:50:44 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:51:26 PM)
 
05 - Repair WMI
   Start (4/22/2016 5:51:26 PM)
 
   Starting Security Center So We Can Export The Security Info.
 
   Exporting Antivirus Info...
   Exporting 3rd Party Firewall Info...
   Running Repair Under Current User Account
   Done (4/22/2016 5:56:03 PM)
 
06 - Repair Windows Firewall
   Start (4/22/2016 5:56:03 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.27 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:56:42 PM)
 
07 - Repair Internet Explorer
   Start (4/22/2016 5:56:42 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:57:02 PM)
 
08 - Repair MDAC/MS Jet
   Start (4/22/2016 5:57:02 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:57:11 PM)
 
09 - Repair Hosts File
   Start (4/22/2016 5:57:11 PM)
   Running Repair Under System Account
   Done (4/22/2016 5:57:12 PM)
 
10 - Remove Policies Set By Infections
   Start (4/22/2016 5:57:12 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:57:18 PM)
 
11 - Repair Start Menu Icons Removed By Infections
   Start (4/22/2016 5:57:18 PM)
   Running Repair Under System Account
   Done (4/22/2016 5:57:19 PM)
 
12 - Repair Icons
   Start (4/22/2016 5:57:19 PM)
   Running Repair Under Current User Account
   Done (4/22/2016 5:57:20 PM)
 
13 - Repair Network
   Start (4/22/2016 5:57:20 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.52 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:58:17 PM)
 
14 - Remove Temp Files
   Start (4/22/2016 5:58:17 PM)
   Running Repair Under System Account
   Done (4/22/2016 5:58:18 PM)
 
15 - Repair Proxy Settings
   Start (4/22/2016 5:58:18 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:58:20 PM)
 
17 - Repair Windows Updates
   Start (4/22/2016 5:58:20 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.27 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Setting Windows Updates Files That Are In Use To Be Removed At Next Boot.
   Done (4/22/2016 5:59:09 PM)
 
18 - Repair CD/DVD Missing/Not Working
   Start (4/22/2016 5:59:10 PM)
   iTunes or GEARAspiWDM.sys not found, not applying UpperFilters iTunes Reg Key
   Done (4/22/2016 5:59:10 PM)
 
19 - Repair Volume Shadow Copy Service
   Start (4/22/2016 5:59:10 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.27 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:59:39 PM)
 
20 - Repair Windows Sidebar/Gadgets
   Start (4/22/2016 5:59:39 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:59:41 PM)
 
21 - Repair MSI (Windows Installer)
   Start (4/22/2016 5:59:41 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.3 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 5:59:59 PM)
 
22 - Repair Windows Snipping Tool
   Start (4/22/2016 5:59:59 PM)
   Done (4/22/2016 5:59:59 PM)
 
23.01 - Repair bat Association
   Start (4/22/2016 6:00:00 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:02 PM)
 
23.02 - Repair cmd Association
   Start (4/22/2016 6:00:02 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:04 PM)
 
23.03 - Repair com Association
   Start (4/22/2016 6:00:04 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:06 PM)
 
23.04 - Repair Directory Association
   Start (4/22/2016 6:00:07 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:09 PM)
 
23.05 - Repair Drive Association
   Start (4/22/2016 6:00:09 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:11 PM)
 
23.06 - Repair exe Association
   Start (4/22/2016 6:00:11 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:13 PM)
 
23.07 - Repair Folder Association
   Start (4/22/2016 6:00:14 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:16 PM)
 
23.08 - Repair inf Association
   Start (4/22/2016 6:00:16 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:18 PM)
 
23.09 - Repair lnk (Shortcuts) Association
   Start (4/22/2016 6:00:18 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:20 PM)
 
23.10 - Repair msc Association
   Start (4/22/2016 6:00:21 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:23 PM)
 
23.11 - Repair reg Association
   Start (4/22/2016 6:00:23 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:25 PM)
 
23.12 - Repair scr Association
   Start (4/22/2016 6:00:25 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:27 PM)
 
24 - Repair Windows Safe Mode
   Start (4/22/2016 6:00:28 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:30 PM)
 
25 - Repair Print Spooler
   Start (4/22/2016 6:00:30 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.27 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:00:52 PM)
 
26 - Restore Important Windows Services
   Start (4/22/2016 6:00:52 PM)
 
Decompressing & Updating Windows Permission File C:\Program Files\Tweaking.com\Windows Repair (All in One)\files\permissions\10\services.7z
Done,  0.27 seconds.
 
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:01:11 PM)
 
27 - Set Windows Services To Default Startup
   Start (4/22/2016 6:01:12 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:01:23 PM)
 
   Skipping Repair.
   Due to a bug in the Windows 10 build 10586 the powershell command used to reinstall the apps and app store instead breaks them and deletes their install folders. Till Microsoft fixes this bug this repair is skipped for this version of Windows.
   Current version: 10.0.10586
 
29 - Repair Windows 8/10 Component Store
   Start (4/22/2016 6:01:23 PM)
   Running Repair Under Current User Account
   Done (4/22/2016 6:10:26 PM)
 
30 - Restore Windows 8/10 COM+ Unmarshalers
   Start (4/22/2016 6:10:26 PM)
   Running Repair Under System Account
[X] -----Job Complete-----      Items Done: 1     
   Done (4/22/2016 6:10:28 PM)
 
31 - Repair Windows 'New' Submenu
   Start (4/22/2016 6:10:28 PM)
   Running Repair Under Current User Account
   Running Repair Under System Account
   Done (4/22/2016 6:10:30 PM)
 
   Skipping Repair.
   Repair is for Windows v6 (Windows Vista & Newer) or higher.
   Current version: 10.0.10586
 
33 - Repair Performance Counters
   Start (4/22/2016 6:10:30 PM)
   Running Repair Under Current User Account
   Done (4/22/2016 6:10:39 PM)
 
Cleaning up empty logs...
 
All Selected Repairs Done.
   Done at (4/22/2016 6:10:39 PM)
   Total Repair Time: 00:40:28
 

...YOU MUST RESTART YOUR SYSTEM...


#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,611 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:36 PM

Posted 22 April 2016 - 08:37 PM

Still same issue?

If so then because of this: "Administrative System File Check found some problems that it could not repair." I suggest new topic in Windows forum.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users