Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Viruses infecting my computer. Please help!!!


  • This topic is locked This topic is locked
5 replies to this topic

#1 therpizz

therpizz

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:07 PM

Posted 26 May 2017 - 07:55 PM

Hello,

 

Please help! Ran a scan on Avira Free Antivirus and it detected 6 viruses/trojans/threats on my computer. I'm currently running on Windows XP (yes, I am aware that this operating system is outdated). I am not very tech-savvy so I do not know what to do. Any help or advice would be greatly appreciated! Thank you very much! I will attach the report from Avira below:

 

Free Antivirus
Report file date: Wednesday, May 24, 2017  15:16


The program is running as an unrestricted full version.
Online services are available.

Licensee        : Free
Serial number   : 0000149996-AVHOE-0000001
Platform        : Microsoft Windows XP
Windows version : (Service Pack 3)  [5.1.2600]
Boot mode       : Normally booted
Username        : Compaq_Administrator
Computer name   : COMPAQ

Version information:
build.dat       : 15.0.19.164    92923 Bytes   8/18/2016 15:52:00
AVSCAN.EXE      : 15.0.19.163  1271904 Bytes   8/18/2016 23:52:01
AVSCANRC.DLL    : 15.0.19.153    56992 Bytes   8/18/2016 23:52:01
LUKE.DLL        : 15.0.19.153    68864 Bytes   8/18/2016 23:52:04
AVSCPLR.DLL     : 15.0.19.163   132760 Bytes   8/18/2016 23:52:01
REPAIR.DLL      : 15.0.19.163   678624 Bytes   8/18/2016 23:52:01
repair.rdf      : 1.0.19.32    1723833 Bytes    5/3/2017 19:04:38
AVREG.DLL       : 15.0.19.163   354168 Bytes   8/18/2016 23:52:01
avlode.dll      : 15.0.19.163   735304 Bytes   8/18/2016 23:52:00
avlode.rdf      : 14.0.5.42     101832 Bytes    5/3/2017 19:04:34
XBV00003.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:04
XBV00004.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00005.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00006.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00007.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00008.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00009.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00010.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00011.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00012.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00013.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:05
XBV00014.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00015.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00016.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00017.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00018.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00019.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00020.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00021.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00022.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00023.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:06
XBV00024.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00025.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00026.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00027.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00028.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00029.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:07
XBV00030.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00031.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00032.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00033.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00034.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00035.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00036.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00037.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00038.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00039.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00040.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:08
XBV00041.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:09
XBV00110.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00111.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00112.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00113.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00114.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00115.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00116.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00117.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:47
XBV00118.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00119.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00120.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00121.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00122.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00123.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00124.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00125.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:48
XBV00126.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00127.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00128.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00129.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00130.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00131.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00132.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00133.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:49
XBV00134.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00135.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00136.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00137.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00138.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00139.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00140.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:50
XBV00141.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00142.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00143.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00144.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00145.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00146.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:51
XBV00147.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00148.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00149.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00150.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00151.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00152.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00153.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00154.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:52
XBV00155.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00156.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00157.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00158.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00159.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00160.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00161.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00162.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:53
XBV00163.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:54
XBV00164.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:54
XBV00165.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:54
XBV00166.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:54
XBV00167.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:54
XBV00168.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00169.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00170.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00171.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00172.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00173.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00174.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:55
XBV00175.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00176.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00177.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00178.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00179.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00180.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00181.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00182.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00183.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:56
XBV00184.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:57
XBV00185.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:57
XBV00186.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:57
XBV00187.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:57
XBV00188.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:58
XBV00189.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:58
XBV00190.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:58
XBV00191.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:58
XBV00192.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:58
XBV00193.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00194.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00195.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00196.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00197.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00198.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:14:59
XBV00199.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00200.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00201.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00202.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00203.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00204.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:00
XBV00205.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:01
XBV00206.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:01
XBV00207.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:01
XBV00208.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:01
XBV00209.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00210.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00211.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00212.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00213.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00214.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:02
XBV00215.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:03
XBV00216.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:03
XBV00217.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:03
XBV00218.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:03
XBV00219.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00220.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00221.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00222.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00223.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00224.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00225.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:04
XBV00226.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00227.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00228.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00229.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00230.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00231.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00232.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:05
XBV00233.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:08
XBV00234.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:09
XBV00235.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:09
XBV00236.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:10
XBV00237.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:10
XBV00238.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:11
XBV00239.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:11
XBV00240.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:12
XBV00241.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:12
XBV00242.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:12
XBV00243.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:13
XBV00244.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:13
XBV00245.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:14
XBV00246.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:14
XBV00247.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:14
XBV00248.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:14
XBV00249.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:14
XBV00250.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:15
XBV00251.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:15
XBV00252.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:16
XBV00253.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:16
XBV00254.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:17
XBV00255.VDF    : 8.14.1.166      2048 Bytes   4/25/2017 19:15:17
XBV00000.VDF    : 7.14.1.132  155588096 Bytes   4/25/2017 19:13:59
XBV00001.VDF    : 7.14.1.133      2048 Bytes   4/25/2017 19:14:04
XBV00002.VDF    : 7.14.1.134      2048 Bytes   4/25/2017 19:14:04
XBV00042.VDF    : 8.14.1.166   7377920 Bytes   4/25/2017 19:14:32
XBV00043.VDF    : 8.14.1.186      2048 Bytes   4/25/2017 19:14:32
XBV00044.VDF    : 8.14.1.190      3072 Bytes   4/25/2017 19:14:32
XBV00045.VDF    : 8.14.1.192      2048 Bytes   4/25/2017 19:14:33
XBV00046.VDF    : 8.14.1.194      2048 Bytes   4/25/2017 19:14:33
XBV00047.VDF    : 8.14.1.196      2048 Bytes   4/25/2017 19:14:33
XBV00048.VDF    : 8.14.1.200     22016 Bytes   4/26/2017 19:14:33
XBV00049.VDF    : 8.14.2.40       2048 Bytes   4/26/2017 19:14:33
XBV00050.VDF    : 8.14.2.42       2048 Bytes   4/26/2017 19:14:33
XBV00051.VDF    : 8.14.2.44     135168 Bytes   4/26/2017 19:14:34
XBV00052.VDF    : 8.14.2.46     111616 Bytes   4/26/2017 19:14:34
XBV00053.VDF    : 8.14.2.48      82432 Bytes   4/26/2017 19:14:35
XBV00054.VDF    : 8.14.2.68     122368 Bytes   4/26/2017 19:14:35
XBV00055.VDF    : 8.14.2.112    168960 Bytes   4/27/2017 19:14:36
XBV00056.VDF    : 8.14.2.132     35840 Bytes   4/27/2017 19:14:36
XBV00057.VDF    : 8.14.2.152     23552 Bytes   4/27/2017 19:14:36
XBV00058.VDF    : 8.14.2.154     16384 Bytes   4/27/2017 19:14:37
XBV00059.VDF    : 8.14.2.160     24576 Bytes   4/27/2017 19:14:37
XBV00060.VDF    : 8.14.2.162     14848 Bytes   4/27/2017 19:14:37
XBV00061.VDF    : 8.14.2.164     14336 Bytes   4/27/2017 19:14:37
XBV00062.VDF    : 8.14.2.166     13824 Bytes   4/27/2017 19:14:37
XBV00063.VDF    : 8.14.2.170    100864 Bytes   4/28/2017 19:14:37
XBV00064.VDF    : 8.14.2.190     34304 Bytes   4/28/2017 19:14:38
XBV00065.VDF    : 8.14.2.208      7168 Bytes   4/28/2017 19:14:38
XBV00066.VDF    : 8.14.2.226      2048 Bytes   4/28/2017 19:14:38
XBV00067.VDF    : 8.14.2.244     36352 Bytes   4/28/2017 19:14:38
XBV00068.VDF    : 8.14.3.6       14336 Bytes   4/28/2017 19:14:38
XBV00069.VDF    : 8.14.3.24       7168 Bytes   4/28/2017 19:14:38
XBV00070.VDF    : 8.14.3.42      16896 Bytes   4/28/2017 19:14:39
XBV00071.VDF    : 8.14.3.44      17408 Bytes   4/28/2017 19:14:39
XBV00072.VDF    : 8.14.3.46      14848 Bytes   4/28/2017 19:14:39
XBV00073.VDF    : 8.14.3.52     206336 Bytes   4/29/2017 19:14:40
XBV00074.VDF    : 8.14.3.54      27648 Bytes   4/29/2017 19:14:40
XBV00075.VDF    : 8.14.3.56      16896 Bytes   4/29/2017 19:14:40
XBV00076.VDF    : 8.14.3.58       8192 Bytes   4/29/2017 19:14:40
XBV00077.VDF    : 8.14.3.60     138752 Bytes   4/30/2017 19:14:41
XBV00078.VDF    : 8.14.3.62      11776 Bytes   4/30/2017 19:14:41
XBV00079.VDF    : 8.14.3.66       2048 Bytes   4/30/2017 19:14:41
XBV00080.VDF    : 8.14.3.68      23040 Bytes   4/30/2017 19:14:42
XBV00081.VDF    : 8.14.3.70      14848 Bytes   4/30/2017 19:14:42
XBV00082.VDF    : 8.14.3.72     120832 Bytes    5/1/2017 19:14:42
XBV00083.VDF    : 8.14.3.90       4608 Bytes    5/1/2017 19:14:42
XBV00084.VDF    : 8.14.3.108     15872 Bytes    5/1/2017 19:14:43
XBV00085.VDF    : 8.14.3.126     10752 Bytes    5/1/2017 19:14:43
XBV00086.VDF    : 8.14.3.144      9728 Bytes    5/1/2017 19:14:43
XBV00087.VDF    : 8.14.3.146      6656 Bytes    5/1/2017 19:14:43
XBV00088.VDF    : 8.14.3.148    102912 Bytes    5/2/2017 19:14:43
XBV00089.VDF    : 8.14.3.150      9728 Bytes    5/2/2017 19:14:43
XBV00090.VDF    : 8.14.3.152     10752 Bytes    5/2/2017 19:14:44
XBV00091.VDF    : 8.14.3.154     12800 Bytes    5/2/2017 19:14:44
XBV00092.VDF    : 8.14.3.156     30720 Bytes    5/2/2017 19:14:44
XBV00093.VDF    : 8.14.3.158     31232 Bytes    5/2/2017 19:14:44
XBV00094.VDF    : 8.14.3.160      7168 Bytes    5/2/2017 19:14:44
XBV00095.VDF    : 8.14.3.162     14336 Bytes    5/2/2017 19:14:44
XBV00096.VDF    : 8.14.3.164      2048 Bytes    5/2/2017 19:14:45
XBV00097.VDF    : 8.14.3.166     36352 Bytes    5/2/2017 19:14:45
XBV00098.VDF    : 8.14.3.168      8704 Bytes    5/2/2017 19:14:45
XBV00099.VDF    : 8.14.3.172    110592 Bytes    5/3/2017 19:14:45
XBV00100.VDF    : 8.14.3.174     10752 Bytes    5/3/2017 19:14:45
XBV00101.VDF    : 8.14.3.176      7680 Bytes    5/3/2017 19:14:45
XBV00102.VDF    : 8.14.3.178      7168 Bytes    5/3/2017 19:14:46
XBV00103.VDF    : 8.14.3.180     10752 Bytes    5/3/2017 19:14:46
XBV00104.VDF    : 8.14.3.182     16384 Bytes    5/3/2017 19:14:46
XBV00105.VDF    : 8.14.3.184     24576 Bytes    5/3/2017 19:14:46
XBV00106.VDF    : 8.14.3.186     10240 Bytes    5/3/2017 19:14:46
XBV00107.VDF    : 8.14.3.188     10752 Bytes    5/3/2017 19:14:46
XBV00108.VDF    : 8.14.3.190     14848 Bytes    5/3/2017 19:14:46
XBV00109.VDF    : 8.14.3.194     21504 Bytes    5/3/2017 19:14:46
LOCAL000.VDF    : 8.14.3.194  170144768 Bytes    5/3/2017 19:21:45
Engine version  : 8.3.44.52
AEBB.DLL        : 8.1.3.0        59296 Bytes   8/18/2016 23:51:59
AECORE.DLL      : 8.3.12.8      262328 Bytes    5/3/2017 19:15:17
AECRYPTO.DLL    : 8.2.1.0       129904 Bytes    5/3/2017 19:15:42
AEDROID.DLL     : 8.4.3.392    2746280 Bytes    5/3/2017 19:15:45
AEEMU.DLL       : 8.1.3.8       404328 Bytes   8/18/2016 23:51:59
AEEXP.DLL       : 8.4.4.4       333728 Bytes    5/3/2017 19:15:41
AEGEN.DLL       : 8.1.8.322     678648 Bytes    5/3/2017 19:15:18
AEHELP.DLL      : 8.3.2.12      284584 Bytes    5/3/2017 19:15:19
AEHEUR.DLL      : 8.1.4.2840  11041520 Bytes    5/3/2017 19:15:33
AELIBINF.DLL    : 8.2.1.4        68464 Bytes   8/18/2016 23:51:59
AEMOBILE.DLL    : 8.1.18.4      346872 Bytes    5/3/2017 19:15:46
AEOFFICE.DLL    : 8.3.7.4       614096 Bytes    5/3/2017 19:15:34
AEPACK.DLL      : 8.4.2.58      835856 Bytes    5/3/2017 19:15:35
AERDL.DLL       : 8.2.1.54      813808 Bytes    5/3/2017 19:15:37
AESBX.DLL       : 8.2.22.10    1665568 Bytes    5/3/2017 19:15:40
AESCN.DLL       : 8.3.4.8       152768 Bytes    5/3/2017 19:15:37
AESCRIPT.DLL    : 8.3.2.142     885728 Bytes    5/3/2017 19:15:38
AEVDF.DLL       : 8.3.3.4       142184 Bytes   8/18/2016 23:51:59
AVWINLL.DLL     : 15.0.19.153    29200 Bytes   8/18/2016 23:52:02
AVPREF.DLL      : 15.0.19.153    55456 Bytes   8/18/2016 23:52:01
AVREP.DLL       : 15.0.19.153   223400 Bytes   8/18/2016 23:52:01
AVARKT.DLL      : 15.0.19.153   230544 Bytes   8/18/2016 23:52:00
SQLITE3.DLL     : 15.0.19.153   461264 Bytes   8/18/2016 23:52:05
AVSMTP.DLL      : 15.0.19.153    81712 Bytes   8/18/2016 23:52:02
NETNT.DLL       : 15.0.19.153    18392 Bytes   8/18/2016 23:52:05
CommonImageRc.dll: 15.0.19.153  4307808 Bytes   8/18/2016 23:52:05
CommonTextRc.dll: 15.0.19.153    69376 Bytes   8/18/2016 23:52:05

Configuration settings for the scan:
Jobname.............................: Full scan
Configuration file..................: C:\Program Files\Avira\Antivirus\sysscan.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Skipped files.......................:

Start of the scan: Wednesday, May 24, 2017  15:16

Start scanning boot sectors:
Boot sector 'HDD0(C:, D:)'
    [INFO]      No virus was found!

Starting search for hidden objects.

The scan of running processes will be started:
Scan process 'plugin-container.exe' - '103' Module(s) have been scanned
Scan process 'firefox.exe' - '158' Module(s) have been scanned
Scan process 'dllhost.exe' - '45' Module(s) have been scanned
Scan process 'vssvc.exe' - '47' Module(s) have been scanned
Scan process 'avscan.exe' - '106' Module(s) have been scanned
Scan process 'avcenter.exe' - '114' Module(s) have been scanned
Scan process 'hpsysdrv.exe' - '14' Module(s) have been scanned
Scan process 'atiptaxx.exe' - '33' Module(s) have been scanned
Scan process 'ALCXMNTR.EXE' - '31' Module(s) have been scanned
Scan process 'avira_system_speedup.tmp' - '26' Module(s) have been scanned
Scan process 'avira_system_speedup.exe' - '23' Module(s) have been scanned
Scan process 'DiscStreamHub.exe' - '87' Module(s) have been scanned
Scan process 'alg.exe' - '35' Module(s) have been scanned
Scan process 'WPFFontCache_v0400.exe' - '15' Module(s) have been scanned
Scan process 'iPodService.exe' - '30' Module(s) have been scanned
Scan process 'dllhost.exe' - '44' Module(s) have been scanned
Scan process 'avshadow.exe' - '27' Module(s) have been scanned
Scan process 'wscntfy.exe' - '18' Module(s) have been scanned
Scan process 'ViewMgr.exe' - '63' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '50' Module(s) have been scanned
Scan process 'Avira.Systray.exe' - '152' Module(s) have been scanned
Scan process 'ehmsas.exe' - '22' Module(s) have been scanned
Scan process 'mcrdsvc.exe' - '30' Module(s) have been scanned
Scan process 'wlan111t.exe' - '43' Module(s) have been scanned
Scan process 'ctfmon.exe' - '25' Module(s) have been scanned
Scan process 'Avira.ServiceHost.exe' - '127' Module(s) have been scanned
Scan process 'ViewpointService.exe' - '19' Module(s) have been scanned
Scan process 'ycommon.exe' - '46' Module(s) have been scanned
Scan process 'avgnt.exe' - '65' Module(s) have been scanned
Scan process 'svchost.exe' - '37' Module(s) have been scanned
Scan process 'jusched.exe' - '25' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '65' Module(s) have been scanned
Scan process 'HPWuSchd2.exe' - '18' Module(s) have been scanned
Scan process 'KBD.EXE' - '63' Module(s) have been scanned
Scan process 'DISCover.exe' - '54' Module(s) have been scanned
Scan process 'ybrwicon.exe' - '29' Module(s) have been scanned
Scan process 'MDM.EXE' - '21' Module(s) have been scanned
Scan process 'DMAScheduler.exe' - '50' Module(s) have been scanned
Scan process 'ARPWRMSG.EXE' - '14' Module(s) have been scanned
Scan process 'ehtray.exe' - '45' Module(s) have been scanned
Scan process 'LSSrvc.exe' - '16' Module(s) have been scanned
Scan process 'ehSched.exe' - '21' Module(s) have been scanned
Scan process 'ehRecvr.exe' - '44' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '29' Module(s) have been scanned
Scan process 'arservice.exe' - '24' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '58' Module(s) have been scanned
Scan process 'avguard.exe' - '92' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '73' Module(s) have been scanned
Scan process 'spoolsv.exe' - '58' Module(s) have been scanned
Scan process 'Explorer.EXE' - '91' Module(s) have been scanned
Scan process 'Ati2evxx.exe' - '20' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '177' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '51' Module(s) have been scanned
Scan process 'Ati2evxx.exe' - '15' Module(s) have been scanned
Scan process 'lsass.exe' - '59' Module(s) have been scanned
Scan process 'services.exe' - '36' Module(s) have been scanned
Scan process 'winlogon.exe' - '74' Module(s) have been scanned
Scan process 'csrss.exe' - '12' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting to scan executable files (registry):
The registry was scanned ( '1854' files ).


Starting the file scan:

Begin scan in 'C:\' <PRESARIO>
C:\Documents and Settings\Compaq_Administrator\Application Data\FrostWire\.AppSpecialShare\frostwire-5.0.8.windows.exe
    [0] Archive type: NSIS
    --> Object
        [DETECTION] Contains patterns of software PUA/OpenCandy.Gen
        [WARNING]   Infected files in archives cannot be repaired
C:\Program Files\Online Services\PeoplePC\BartShel.exe
  [DETECTION] Is the TR/Crypt.ZPACK.Gen7 Trojan
C:\Program Files\Online Services\PeoplePC\Browser\BartShel.exe
  [DETECTION] Is the TR/Crypt.ZPACK.Gen7 Trojan
    [0] Archive type: Runtime Packed
    --> C:\Program Files\Common Files\Real\GToolbar\GoogleToolbarInstaller98.exe
        [1] Archive type: RSRC
      --> C:\Program Files\Online Services\PeoplePC\ISP5900\Branding\ppal3ppc.exe
          [2] Archive type: NSIS
        --> [ProgramFilesDir]/PeoplePC/Toolbar/PPCToolbar.dll
            [DETECTION] Contains virus patterns of Adware ADWARE/Agent.180224.A
            [WARNING]   Infected files in archives cannot be repaired
C:\Program Files\Online Services\PeoplePC\ISP5900\Branding\ppal3ppc.exe
  [DETECTION] Contains virus patterns of Adware ADWARE/Agent.180224.A
C:\Program Files\Online Services\PeoplePC\ISP5900\System\unPPC.exe
  [DETECTION] Is the TR/Agent.66048.153 Trojan
Begin scan in 'D:\' <PRESARIO_RP>

Beginning disinfection:
C:\Program Files\Online Services\PeoplePC\ISP5900\System\unPPC.exe
  [DETECTION] Is the TR/Agent.66048.153 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '5c0ef44d.qua'!
C:\Program Files\Online Services\PeoplePC\ISP5900\Branding\ppal3ppc.exe
  [DETECTION] Contains virus patterns of Adware ADWARE/Agent.180224.A
  [NOTE]      The file was moved to the quarantine directory under the name '4468da5d.qua'!
C:\Program Files\Online Services\PeoplePC\Browser\BartShel.exe
  [DETECTION] Is the TR/Crypt.ZPACK.Gen7 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '162880cc.qua'!
C:\Program Files\Online Services\PeoplePC\BartShel.exe
  [DETECTION] Is the TR/Crypt.ZPACK.Gen7 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '701fccdc.qua'!
C:\Documents and Settings\Compaq_Administrator\Application Data\FrostWire\.AppSpecialShare\frostwire-5.0.8.windows.exe
  [DETECTION] Contains patterns of software PUA/OpenCandy.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '3596e181.qua'!


End of the scan: Wednesday, May 24, 2017  20:39
Used time:  4:18:30 Hour(s)

The scan has been done completely.

  12234 Scanned directories
 636796 Files were scanned
      6 Viruses and/or unwanted programs were found
      0 Files were classified as suspicious
      0 Files were deleted
      0 Viruses and unwanted programs were repaired
      5 Files were moved to quarantine
      0 Files were renamed
      0 Files cannot be scanned
 636790 Files not concerned
  19680 Archives were scanned
      2 Warnings
      5 Notes
 502597 Objects were scanned with rootkit scan
      0 Hidden objects were found



BC AdBot (Login to Remove)

 


#2 therpizz

therpizz
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:07 PM

Posted 26 May 2017 - 10:38 PM

If it helps, I also ran MalwareBytes and have attached the report down below. Please let me know if my computer is infected and if there is anything I can do to get rid of the viruses/trojans. Thank you!

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 5/26/17
Scan Time: 2:10 PM
Log File:
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.122
Update Package Version: 1.0.2027
License: Trial

-System Information-
OS: Windows XP Service Pack 3
CPU: x86
File System: NTFS
User: COMPAQ\Compaq_Administrator

-Scan Summary-
Scan Type: Custom Scan
Result: Completed
Objects Scanned: 180147
Threats Detected: 161
Threats Quarantined: 161
Time Elapsed: 5 hr, 31 min, 34 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 62
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{7F23E6E5-0E79-4aee-B723-B1463805D5A9}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WTVis.WTVisReceiver, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WTVis.WTVisReceiver.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{7F23E6E5-0E79-4aee-B723-B1463805D5A9}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{B9BA256A-075B-49ea-B9E2-7DBC2EF021D5}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WTVis.WTVisSender, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WTVis.WTVisSender.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{B9BA256A-075B-49ea-B9E2-7DBC2EF021D5}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{FA13A9FA-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WT3D.WT, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WT3D.WT.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\TYPELIB\{FA13AA2E-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{05EF74A5-E109-11D2-A566-444553540000}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{0E7AE465-EE8D-11D2-A566-444553540000}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{1113C0B6-5300-4D5D-B2D7-35C14B28341B}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{111D8B01-96C5-46DD-94D1-C6E8B1F69F44}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{16410859-886F-4579-BC1F-330A139D0F0F}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{35ED7DFB-A8ED-4216-A4BB-BC08C326EF08}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{399A8818-2000-436C-9A55-0016E5E3D227}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{52889E01-CB46-11D2-96BC-00104B242E64}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{5C49CBD2-8ED7-439B-8668-32149F84A235}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{6E6CF8E5-D795-11D2-A566-444553540000}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{79884200-3ADE-11D3-AC39-00105A2057FA}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{810E95C2-F908-4E02-9B28-B92C3A778D0D}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{AA0C96F9-A994-42D7-9543-842CF85E1BA7}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{B57613B6-EF02-4D96-99C6-70C9A2014A14}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{BDB9B021-CAFF-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{BDB9B022-CAFF-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{C1DA7AB8-54FC-4971-9AFB-1BCB9AFC3AA2}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{C3A156D4-503F-4779-A673-657308D94FAF}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{D72AC8E7-F41D-11D2-A566-444553540000}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{DE3E540A-F0F2-4761-99BE-AFC6DC427E30}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{EA6F254D-1A8C-4518-8FE0-E9B94FD134ED}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{EC914A5C-7C4B-4AC8-8C86-C10FF5C0D23D}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{F10493C1-D0B6-11D2-A566-444553540000}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA3A-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA3E-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA40-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA44-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA46-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AA50-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA13AAFA-CA9B-11D2-9780-00104B242EA3}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{FECA7CFA-1083-4073-A98A-CF3389FCAF6A}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{FA13A9FA-CA9B-11D2-9780-00104B242EA3}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WDMHHost.WTHoster, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WDMHHost.WTHoster.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\TYPELIB\{B7E20302-C22C-4AF2-9D75-C3EB6EEE9DD8}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{3F44B498-8FD4-4A1E-852C-170156ED27C0}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{0c097121-c5d6-47eb-841d-30bff71a71c4}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WT.WTMultiplayer, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\WT.WTMultiplayer.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\TYPELIB\{B162D478-EF46-4475-B1FE-216BDEDB7FAD}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{5DD15C3E-FC35-4E6F-B34C-E030D6439469}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{8DB2BC32-56E9-4349-B125-CB2561A06626}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\INTERFACE\{A73F5102-3782-4945-BF97-889F9B6DC9A5}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{0c097121-c5d6-47eb-841d-30bff71a71c4}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{8ECF83A0-1AC9-11D4-8501-00A0CC5D1F63}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{8ECF83A0-1AC9-11D4-8501-00A0CC5D1F63}\InprocServer32, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, HKLM\SOFTWARE\CLASSES\CLSID\{ECFBE6E0-1AC8-11D4-8501-00A0CC5D1F63}\InprocServer32, Quarantined, [1272], [391143],1.0.2027

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 26
PUP.Optional.VisiCoupons, C:\DOCUMENTS AND SETTINGS\COMPAQ_ADMINISTRATOR\LOCAL SETTINGS\APPLICATION DATA\VISI_COUPON, Quarantined, [12750], [244561],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\controlpanel, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\install, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\controlpanel, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\controlpanel, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\update_info, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\legacy, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\wtwebdriver\update_info, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\install, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\install, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\wtwebdriver, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\wtupdater, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\updater, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\WT, Quarantined, [1272], [391143],1.0.2027

File: 73
PUP.Optional.OpenCandy, C:\DOCUMENTS AND SETTINGS\COMPAQ_ADMINISTRATOR\.FROSTWIRE5\UPDATES\FROSTWIRE-5.7.6.WINDOWS.COC.PREMIUM.EXE, Quarantined, [522], [297667],1.0.2027
PUP.Optional.VisiCoupons, C:\DOCUMENTS AND SETTINGS\COMPAQ_ADMINISTRATOR\LOCAL SETTINGS\APPLICATION DATA\VISI_COUPON\MERCHANTS.DAT2, Quarantined, [12750], [244561],1.0.2027
PUP.Optional.VisiCoupons, C:\Documents and Settings\Compaq_Administrator\Local Settings\Application Data\visi_coupon\merchants.dat, Quarantined, [12750], [244561],1.0.2027
PUP.Optional.OpenCandy, C:\SYSTEM VOLUME INFORMATION\_RESTORE{106CF321-99A3-4E3A-9103-1BD027606A99}\RP1170\A0255927.EXE, Quarantined, [522], [297667],1.0.2027
Adware.WildTangent, C:\WINDOWS\WT\UPDATER\WCMDMGRL.EXE, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\updater\wcmdmgr.exe, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\updater\wt.ini, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\actorobject.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\dx5drv.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\dx7drv.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\objectbundle.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\sound.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wdcaps.ded, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wdengine.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\webdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wthost.exe, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wthostctl.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wtmulti.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wtmulti.jar, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wtwmplug.ax, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\4.1.1\wtwmplug.ini, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\jdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\rdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver\wildtangent.jar, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\controlpanel\index.html, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\DRM0302.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\DRM0302Java.jar, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\jDRM0302.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\files\rDRM0302.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\install\DRM0302.cdanfo, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\DRM\3.2.0.19\install\DRM0302_Uninstall.cdas, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\controlpanel\index.html, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\legacy\data.wts, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\legacy\webdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\legacy\wt3d.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\update_info\data.wts, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\Webd331_fileList.cdas, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\actorobject.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\dx5drv.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\dx7drv.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\jdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\npWTHost.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\nsIWTHostPlugin.xpt, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\ObjectBundle.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\rdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\Sound.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wdcaps.ded, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wdengine.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\Webd331.cdanfo, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\Webd331_Uninstall.cdas, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\webdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wildtangent.jar, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wt3d.ini, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\WTHost.exe, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\WTHostCtl.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtmulti.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtmulti.jar, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtvh.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtwmplug.ax, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\files\wtwmplug.ini, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\install\Webd4_1_1.cdanfo, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\webd\4.1.1\install\Webd4_1_1_Uninstall.cdas, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\controlpanel\index.html, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\install\WireControl.cdanfo, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\install\WireControl_Uninstall.cdas, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\WireControl\1.0.0.63\files\WireControl.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\wtupdater\appinfo.dat, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtupdates\wtwebdriver\update_info\data.wts, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\data.wts, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\webdriver.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wt3d.dll, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wt3d.ini, Quarantined, [1272], [391143],1.0.2027
Adware.WildTangent, C:\WINDOWS\wt\wtvh.dll, Quarantined, [1272], [391143],1.0.2027

Physical Sector: 0
(No malicious items detected)


(end)



#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:07 PM

Posted 28 May 2017 - 08:57 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

How to attach a file to your reply:
In the Reply section in the bottom of the topic Click the "more reply Options" button.
attachlogs.png

Attach the file.
Select the "Choose a File" navigate to the location of the File.
Click the file you wish to Attach.
Click Attach this file.
Click the Add reply button.
===


Please post the logs.

Wait for further instructions.

#4 therpizz

therpizz
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:07 PM

Posted 31 May 2017 - 12:45 PM

Thank you for your quick reply! Attached is the log from Farbar:

 

Farbar Service Scanner Version: 27-01-2016
Ran by Compaq_Administrator (administrator) on 31-05-2017 at 10:39:09
Running from "C:\Documents and Settings\Compaq_Administrator\My Documents\Downloads"
Microsoft Windows XP Professional Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============
Dnscache Service is not running. Checking service configuration:
The start type of Dnscache service is set to Disabled. The default start type is Auto.
The ImagePath of Dnscache service is OK.
The ServiceDll of Dnscache service is OK.


Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============

System Restore Policy:
========================


Security Center:
============


Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


Other Services:
==============


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll => File is digitally signed
C:\WINDOWS\system32\Drivers\afd.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\netbt.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\tcpip.sys => File is digitally signed
C:\WINDOWS\system32\Drivers\ipsec.sys => File is digitally signed
C:\WINDOWS\system32\dnsrslvr.dll => File is digitally signed
C:\WINDOWS\system32\dnsapi.dll => File is digitally signed
C:\WINDOWS\system32\ipnathlp.dll => File is digitally signed
C:\WINDOWS\system32\netman.dll => File is digitally signed
C:\WINDOWS\system32\wbem\WMIsvc.dll => File is digitally signed
C:\WINDOWS\system32\srsvc.dll => File is digitally signed
C:\WINDOWS\system32\Drivers\sr.sys => File is digitally signed
C:\WINDOWS\system32\wscsvc.dll => File is digitally signed
C:\WINDOWS\system32\wbem\WMIsvc.dll => File is digitally signed
C:\WINDOWS\system32\wuauserv.dll => File is digitally signed
C:\WINDOWS\system32\qmgr.dll => File is digitally signed
C:\WINDOWS\system32\es.dll => File is digitally signed
C:\WINDOWS\system32\cryptsvc.dll => File is digitally signed
C:\WINDOWS\system32\svchost.exe => File is digitally signed
C:\WINDOWS\system32\rpcss.dll => File is digitally signed
C:\WINDOWS\system32\services.exe => File is digitally signed

Extra List:
=======
AegisP(9) Gpc(6) IPSec(4) NetBT(5) PSched(7) Tcpip(3)
0x09000000040000000100000002000000030000000800000005000000060000000700000009000000
IpSec Tag value is correct.

**** End of log ****



#5 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:07 PM

Posted 31 May 2017 - 12:57 PM

Sorry but this is not the tool I suggested you download and run.

Try again.

#6 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:07 PM

Posted 06 June 2017 - 07:52 AM

Are you still with me?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users