Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Pokki wont stop installing on my computer


  • Please log in to reply
4 replies to this topic

#1 michaelk123456

michaelk123456

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:47 AM

Posted 27 September 2017 - 07:12 PM

Last time I was on my computer, a window appeared that said Pokki has been updated. I had never downloaded anything called Pokki, so I went to the Control Panel and uninstalled it. When I turned on my computer today, Pokki was back. I have Windows 8.1  Windows Smart Screen blocked installation of Farbar tool. 



BC AdBot (Login to Remove)

 


#2 hamluis

hamluis

    Moderator


  • Moderator
  • 55,874 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:12:47 AM

Posted 27 September 2017 - 07:39 PM

FWIW:  https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Pokki.aspx

 

Moved from MRL to Am I Infected.

 

Louis



#3 buddy215

buddy215

  • Moderator
  • 13,196 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:47 AM

Posted 27 September 2017 - 07:48 PM

There is probably some leftover Pokki in your startup or tasks. Suggest you use the programs below to clean, remove adware and remove malware.

Check your browser(s) extensions for Pokki.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Malwarebytes - Clean Mode

  • Download and install the free version of Malwarebytes
    Note: If you have Malwarebytes already installed, you don't need to install it again. Simply start from the next bullet point
  • Once Malwarebytes is installed, launch it and let it update his database. You might have to click on the little arrow by Scan Status in the middle right pane for it to do so
  • Once the database update is complete, click on the Scan tab, then select the Threat Scan button and click on Start Scan
  • Let the scan run, the time required to complete the scan depends of your system and computer specs
  • Once the scan is complete, make sure that the first checkbox at the top is checked (which will automatically check every detected item), then click on the Quarantine Selected button
    • If it asks you to restart your computer to complete the removal, do so
  • Click on Export Summary after the deletion (in the bottom-left corner) and select Copy to Clipboard. Paste the content in your next reply

If you are unable to run a scan using MBAM:

Follow the instructions in the thread below. Make sure to download the MBAR linked in it. Let me know if you're not able to launch it and run a scan.
https://forums.malwarebytes.com/topic/198907-requested-resource-is-in-use-error-unable-to-start-malwarebytes/

 

 

Download AdwCleaner by Xplode onto your desktop. (compatible with Windows 7, 8 and 10)

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message

Edited by buddy215, 27 September 2017 - 07:58 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#4 michaelk123456

michaelk123456
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:47 AM

Posted 28 September 2017 - 05:06 AM

I think its gone now, thanks

Malwarebytes

www.malwarebytes.com
 
-Log Details-
Scan Date: 9/28/17
Scan Time: 4:07 AM
Log File: 675568b2-a42c-11e7-850b-2c600c64c5d0.json
Administrator: Yes
 
-Software Information-
Version: 3.2.2.2029
Components Version: 1.0.188
Update Package Version: 1.0.2903
License: Trial
 
-System Information-
OS: Windows 8.1
CPU: x64
File System: NTFS
User: MichaelsPC\Michael
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 321206
Threats Detected: 35
Threats Quarantined: 35
Time Elapsed: 2 min, 17 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 22
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{981b174d-7733-4e7f-b89d-6545a7c21838}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKU\S-1-5-21-122190874-1027529274-2030002682-1001\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{981B174D-7733-4E7F-B89D-6545A7C21838}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{BD6ECB00-7C4A-4F97-B425-44117F2A7AAE}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\AmazonAppIE.AppGateway, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{BD6ECB00-7C4A-4F97-B425-44117F2A7AAE}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\TYPELIB\{EB2BEAEF-150C-4DE4-9D09-F16403C22769}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{3268A00F-D329-42E1-ABF0-E78D5656BA2A}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{571139B2-8D93-4B29-9AA9-496EF27D6AF8}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{BC87ADED-E2FC-4B7E-B21B-F2578F51D78E}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{3268A00F-D329-42E1-ABF0-E78D5656BA2A}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{571139B2-8D93-4B29-9AA9-496EF27D6AF8}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{BC87ADED-E2FC-4B7E-B21B-F2578F51D78E}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{EB2BEAEF-150C-4DE4-9D09-F16403C22769}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{EB2BEAEF-150C-4DE4-9D09-F16403C22769}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKU\S-1-5-21-122190874-1027529274-2030002682-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{BD6ECB00-7C4A-4F97-B425-44117F2A7AAE}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{BD6ECB00-7C4A-4F97-B425-44117F2A7AAE}\InprocServer32, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E4ADC61E-D06A-4E0E-8582-78C809CC8450}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\AmazonAppIE.GadgetGateway, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{E4ADC61E-D06A-4E0E-8582-78C809CC8450}, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{E4ADC61E-D06A-4E0E-8582-78C809CC8450}\InprocServer32, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{BD6ECB00-7C4A-4F97-B425-44117F2A7AAE}\InprocServer32, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{E4ADC61E-D06A-4E0E-8582-78C809CC8450}\InprocServer32, Quarantined, [1472], [333344],1.0.2903
 
Registry Value: 2
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|APPINIT_DLLS, Quarantined, [1472], [-1],0.0.0
PUP.Optional.Amazon1Button.AppFlsh, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|APPINIT_DLLS, Quarantined, [1472], [-1],0.0.0
 
Registry Data: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 2
PUP.Optional.Amazon1Button.AppFlsh, C:\PROGRAM FILES (X86)\AMAZON\AMAZON1BUTTONAPP, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Booking, C:\PROGRAM FILES\BOOKING.COM, Quarantined, [410], [310593],1.0.2903
 
File: 9
PUP.Optional.Amazon1Button.AppFlsh, C:\PROGRAM FILES (X86)\AMAZON\AMAZON1BUTTONAPP\Amazon1ButtonTaskbarApp.exe, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, C:\Program Files (x86)\Amazon\Amazon1ButtonApp\Amazon1ButtonUpdater.exe, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, C:\Program Files (x86)\Amazon\Amazon1ButtonApp\AmazonAppIE.dll, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Amazon1Button.AppFlsh, C:\Program Files (x86)\Amazon\Amazon1ButtonApp\InstallAction.exe, Quarantined, [1472], [333344],1.0.2903
PUP.Optional.Booking, C:\USERS\PUBLIC\DESKTOP\BOOKING.COM.LNK, Quarantined, [410], [310601],1.0.2903
PUP.Optional.Booking, C:\Program Files\Booking.COM\Booking.com.lnk, Quarantined, [410], [310593],1.0.2903
PUP.Optional.Booking, C:\Program Files\Booking.COM\Booking.ico, Quarantined, [410], [310593],1.0.2903
PUP.Optional.Booking, C:\Program Files\Booking.COM\StartURL.exe, Quarantined, [410], [310593],1.0.2903
PUP.Optional.Booking, C:\Program Files\Booking.COM\Version.txt, Quarantined, [410], [310593],1.0.2903
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 AdwCleaner 7.0.2.1 - Logfile created on Thu Sep 28 09:23:58 2017
# Updated on 2017/29/08 by Malwarebytes 
# Database: 09-27-2017.1
# Running on Windows 8.1 (X64)
# Mode: scan
 
***** [ Services ] *****
 
No malicious services found.
 
***** [ Folders ] *****
 
PUP.Optional.Legacy, C:\Users\Michael\AppData\Local\SweetLabs App Platform
PUP.Optional.Legacy, C:\ProgramData\Pokki
PUP.Optional.Legacy, C:\ProgramData\Application Data\Pokki
PUP.Optional.Legacy, C:\Users\All Users\Pokki
PUP.Optional.Legacy, C:\Users\Default\AppData\Local\Pokki
PUP.Optional.Legacy, C:\Users\Default User\AppData\Local\Pokki
PUP.Optional.Legacy, C:\Users\Public\Pokki
 
 
***** [ Files ] *****
 
PUP.Optional.Legacy, C:\Users\All Users\Desktop\eBay.lnk
PUP.Optional.Legacy, C:\Users\Public\Desktop\eBay.lnk
PUP.Optional.PCAppStore, C:\Users\Michael\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnk
 
 
***** [ DLL ] *****
 
No malicious DLLs found.
 
***** [ WMI ] *****
 
No malicious WMI found.
 
***** [ Shortcuts ] *****
 
No malicious shortcuts found.
 
***** [ Tasks ] *****
 
PUP.Optional.Legacy, SweetLabs App Platform
 
 
***** [ Registry ] *****
 
PUP.Optional.Legacy, [Key] - HKU\S-1-5-21-122190874-1027529274-2030002682-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall\SweetLabs_AP
PUP.Optional.Legacy, [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\SweetLabs_AP
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{7BCA6879-A9F8-47DE-AE05-F5CE7EA3A474}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\TypeLib\{ADF1FA2A-6EAA-4A97-A55F-3C8B92843EF5}
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\AllFileSystemObjects\shell\pokki
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Directory\shell\pokki
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\Drive\shell\pokki
PUP.Optional.Legacy, [Key] - HKCU\Software\Classes\lnkfile\shell\pokki
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\AppID\OverlayIcon.DLL
Adware.pokki, [Key] - HKU\S-1-5-21-122190874-1027529274-2030002682-1001\Software\SweetLabs App Platform
Adware.pokki, [Key] - HKCU\Software\SweetLabs App Platform
 
 
***** [ Firefox (and derivatives) ] *****
 
No malicious Firefox entries.
 
***** [ Chromium (and derivatives) ] *****
 
No malicious Chromium entries.
 
*************************
 
 
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.4 (07.09.2017)
Operating System: Windows 8.1 x64 
Ran by Michael (Administrator) on Thu 09/28/2017 at  4:45:52.99
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 0 
 
 
 
 
Registry: 5 
 
Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{6AFBC435-91EF-407D-993C-3DB06EA9C709} (Registry Key)
Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C} (Registry Key)
Successfully deleted: HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} (Registry Key)
Successfully deleted: HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C} (Registry Key)
Successfully deleted: HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} (Registry Key)
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Thu 09/28/2017 at  4:48:41.97
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 


#5 buddy215

buddy215

  • Moderator
  • 13,196 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:47 AM

Posted 28 September 2017 - 05:35 AM

The AdwCleaner log doesn't show you removed what it found. Though I think you did since Pokki is gone. Rerun AdwCleaner

as it often finds more on second run. Be sure to choose Clean when scan finishes if it finds anything.

 

Last scan...Security Check

 

  • download Security Check by glax24 and save the file to the Desktop
  • Run the tool by accepting all the Security prompts
  • when complete the tool will produce a log file C:\SecurityCheck\SecurityCheck.txt and also copy the contents to the Clipboard
  • Simply Paste the log to your reply

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users