Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Error code 0x80042405-0xA001A trying to back up Windows on USB


  • Please log in to reply
17 replies to this topic

#1 dashelter

dashelter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 12 December 2017 - 08:07 AM

Hello,
My Surface Pro 4 is infected.
Trying to back up windows on USB flash drive 32 GB formatted to Fat 32.
Using Microsoft Media Creation Tool 64 bit for Windows 10.
 
I keep getting : " There was a problem running this tool. Error code: 0x80042405-0xA001A.
 
Tried just about everything, including trying multiple, different flash drives. Same error.
 
Need help fixing this.
Thanks

Edited by Al1000, 12 December 2017 - 03:01 PM.
moved from Win 10 Support


BC AdBot (Login to Remove)

 


#2 mikey11

mikey11

  • Members
  • 1,207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Psychiatric Ward @ Beelitz-Heilstatten Hospital, Beelitz, Germany
  • Local time:08:09 AM

Posted 12 December 2017 - 08:25 AM

that tool is not designed for backups,

 

that tool is used to create a bootable USB stick so you can INSTALL windows on your computer



#3 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 12 December 2017 - 09:59 AM

I can't access the Recovery Environment therefore I need to create a Windows installation or repair media.

Laptop is infected.

 

Please advise...of alternatives to create a media.

Thanks.



#4 mikey11

mikey11

  • Members
  • 1,207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Psychiatric Ward @ Beelitz-Heilstatten Hospital, Beelitz, Germany
  • Local time:08:09 AM

Posted 12 December 2017 - 10:02 AM

what is it your trying to accomplish?

 

going by your original post it sounded like you were trying to backup files?



#5 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 12 December 2017 - 10:25 AM

my SP4 is infected with malware. ZI was told to try to get to recovery options to proceed with repairing the SP4.

Since I cannot access Recovery Options for Windows 10 regardless of which way to do it, I was told to create a Windows 10 installation or repair media....since Laptop is infected..

Then run Farbar Recovery with a fix.

 

Now, I can't even use Windows 10 Media Creation Tool.



#6 mikey11

mikey11

  • Members
  • 1,207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Psychiatric Ward @ Beelitz-Heilstatten Hospital, Beelitz, Germany
  • Local time:08:09 AM

Posted 12 December 2017 - 10:31 AM

my SP4 is infected with malware. ZI was told to try to get to recovery options to proceed with repairing the SP4.

Since I cannot access Recovery Options for Windows 10 regardless of which way to do it, I was told to create a Windows 10 installation or repair media....since Laptop is infected..

Then run Farbar Recovery with a fix.

 

Now, I can't even use Windows 10 Media Creation Tool.

 

 

so you want to re-install windows?

 

you will lose all your files, documents etc etc,

 

as long as you are okay with that i can help you



#7 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 12 December 2017 - 10:42 AM

yes and i can back tha up on a usb flash drive, correct?



#8 mikey11

mikey11

  • Members
  • 1,207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Psychiatric Ward @ Beelitz-Heilstatten Hospital, Beelitz, Germany
  • Local time:08:09 AM

Posted 12 December 2017 - 10:52 AM

backup anything you want to save on an external hard drive OR usb stick,

 

after you have done that you need to download a windows 10 ISO file,

 

after that, you need to create a bootable installation usb drive with that ISO file, so you will need 2 seperate usb sticks, one for backup, one for install


Edited by mikey11, 12 December 2017 - 10:56 AM.


#9 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,274 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:09 PM

Posted 12 December 2017 - 11:38 AM

If this computer is infected I'm not sure that saving files from it is a good idea.  You could windup reinfecting the computer with those files.  Who or what indicated that this computer is infected?

 

I would suggest trying to get rid of whatever infection you are dealing with, and then see what else needs to be addressed.  In order to do this I need the following information.
 
Can you boot into Windows?
 
Can you navigate and download and programs?
 


Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#10 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 12 December 2017 - 02:34 PM

I can boot into windows.



#11 mikey11

mikey11

  • Members
  • 1,207 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Psychiatric Ward @ Beelitz-Heilstatten Hospital, Beelitz, Germany
  • Local time:08:09 AM

Posted 12 December 2017 - 02:38 PM

go to the download section on this site.....

 

download and run ADWCleaner....next, download, install, update, and run Malwarebytes Anti-Malware


Edited by mikey11, 12 December 2017 - 02:38 PM.


#12 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,274 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:09 PM

Posted 12 December 2017 - 02:43 PM

Ok, you can boot into Windows, but can you get online and download?
 
I'm going to take the chance that the answer is yes.  I'm going to request that this topic be moved to the Am I Infected, What Do I Do? forum.  The scans you need to run are now allowed in the Windows forums.
 
If you can please download and run the scans below in the order they are requested and post the logs in the same order.  Post these logs in your topic, do not use a host website to post these.
 

 

Please run the scans suggested below in the order that they are requested, this is a must for RKill.  Post the logs generated by these scans in your topic in the order they were run.  Please do not wrap your logs in quotes or code brackets or use use spoilers.


Please download and run RKill

RKill attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections.  RKill will not remove any of the processes it stops, you will need to run security scans to remove any malware found.  These settings will remain until the computer is rebooted, for this reason you must run your security applications before the computer is rebooted.  

Please download RKill and install it.

When RKill is run it will display a console screen similar to the one below:

icHPxaT.png

After this has run you will see another image explaining that RKill has finished running and you should be able to run the scan.  You need to click/tap on OK.

2Q1rnlf.png

When RKill has finished running a log will be displayed showing all of the processes that were terminated by RKill.

AttentionAt this time you need to run your security applications listed below.  When the scan has finished running a lot will be posted in Notepad.  Copy and paste this log in your topic.

Importanat: There is a possibility that malware may recognize RKill and keep it from running, if this is the case do the following.

If while RKill is running you may see a message from the malware stating that the program could not be run because it is a virus or is infected.  This is the malware trying to protect itself.  Two methods that you can try to get past this and allow RKill to run are:

1)  Rename Rkill so that it has a .com extension.

2)  Download a version that is already renamed as files that are commonly white-listed by malware. The main Rkill download page contains individual links to renamed versions.  

After the application has run successfully and you have run the requested scans you should reboot the computer to restore the processes and Windows Registry entries.


Please run TDSSKiller.
 
Please download TDSSKiller from here and save it to your Desktop.

The log for the TDSSKiller can be very long.  If you go to the bottom of the log to where you find Scan finished you will see the results of the scan.  If it shows Detected object count: 0 and Actual detected object count: 0, this means that nothing malicious was found and you will not need to post the log.
 
1.  Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
 
2.  Check Loaded Modules, Verify Driver Digital Signature, and Detect TDLFS file system.
 
If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now.
 
3.  Click Start Scan and allow the scan process to run.

yEt9i3P.png
 
4.  If threats are detected select Cure (if available) for all of them unless otherwise instructed.  If threats are found you will see a screen like the one below.

I4wmZOI.png
 
***Do NOT select Delete!

Click on Continue.
 
5.  Click on Reboot computer.
 
Please copy the TDSSKiller.[Version]_[Date]_[Time]_log.txt file found in your root directory (in most cases this is c: Drive) and paste it into your next reply.

Note:  The log may be very long.  You may need to break it into parts to post the whole log in your topic.



Please run Malwarebytes AntiMalware

Please download Malwarebytes Anti-Malware 2.2.

1)  Double-click on mbam-setup.exe, then click on Run to install the application, follow the prompts through the installation.

2)  Malwarebytes will automatically open.  You will see an image like the one below, click on Update Now.  

4YSU8ND.png

3)  Click on Settings, you will see a image like the one below.

35AFYEE.png

When Settings opens click on Detection and Protection, then under Non-Malware Protection, click on the down arrow for PUP (Potentially Unwanted Programs) detections and select Treat detections as malware.  Under Detection Options place a check in the box for Scan for rootkits

4)  Click on Scan (next to Settings), then click on Scan Now.  The scan will automatically run now.

5)  When the scan is complete the results will be displayed.  Click on Delete All.

jEVtTTK.png

6)  Please post the Malwarebytes log.

To find the Malwarebytes log do the following.  Copy and paste the log in your topic.

*Open Malwarebytes Anti-Malware.
*Click the Scan Tab at the top.
*Click the View detailed log link on the right.
*Click Copy to Clipboard at the bottom...come back to this thread, click Add Reply, then right-click and choose Paste.
*Alternatively, you can click Export and save the log as a .txt file on yout Desktop or another location.
*Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.


Please download AdwCleaner and install it.

When AdwCleaner opens click on Scan to start the scan.

ZQk62WV.png

Once the search is complete a list of the pending items will be displayed.  If you see any which you do not want removed, remove the check mark next to it.

If there are no malicious programs are found you will receive a message informing you of this.  
 
Click on Clean to remove the selected items.  If you have any questions about any items in the list please copy and paste the list in your topic so we can review it.  

CsqnoTW.png
 
You will receive a message telling you that all programs will be closed so that the infections can be removed.  Click on OK.  The computer will be restarted to complete the cleaning process.
 
When the cleaning process is complete a log of what was removed will be presented.  Please copy and the paste this log in your topic.


Please run the ESET OnlineScan

This scan takes quite a long time to run, so be prepared to allow this to run
till it is completed.

***Please note. If you run this scan using Internet Explorer you won't need
to download the Eset Smartinstaller.***

ESET Online Scanner

  • Click here to download the installer for ESET Online Scanner and save it to your Desktop.
  • Disable all your antivirus and antimalware software - see how to do that
    here
    .
  • Right click on esetsmartinstaller_enu.exe and select Run as Administrator.
  • Place a checkmark in YES, I accept the Terms of Use, then click Start. Wait for ESET Online Scanner to load its components.
  • Select Enable detection of potentially unwanted applications.
  • Click Advanced Settings, then place a checkmark in the following:
    • Remove found threats
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology

  • Click Start to begin scanning.
  • ESET Online Scanner will start downloading signatures and scan. Please be patient, as this scan can take quite some time.
  • If threats are found click on Save to text file in Documents.
  • Open Documents, find the report, copy and paste it in your topic.


Edited by dc3, 12 December 2017 - 02:48 PM.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#13 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 13 December 2017 - 09:21 AM

Here are the 5 logs you requested for review.

Please note thast I encountered some issues with Malwarebytes, as it updated to latest version. Malwares found were not removed.

 

 

A- Rkill 2.9.1 by Lawrence Abrams (Grinler)
Copyright 2008-2017 BleepingComputer.com
More Information about Rkill can be found at this link:
 
Program started at: 12/13/2017 06:31:34 AM in x64 mode.
Windows Version: Windows 10 Pro 
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * No malware processes found to kill.
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
 
Performing miscellaneous checks:
 
 * No issues found.
 
Searching for Missing Digital Signatures: 
 
 * No issues found.
 
Checking HOSTS File: 
 
 * Cannot edit the HOSTS file.
 * Permissions Fixed. Administrators can now edit the HOSTS file.
 
 * HOSTS file entries found: 
 
  127.0.0.1         app.drivereasy.com
 
Program finished at: 12/13/2017 06:31:42 AM
Execution time: 0 hours(s), 0 minute(s), and 7 seconds(s)
 
B- No threats found with TDSS Killer
 
C- MBAM Log with Removal of 3 Malware Failed
 
Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 12/13/17
Scan Time: 8:04 AM
Log File: 2ab16fd0-e006-11e7-9985-985fd3463516.json
Administrator: Yes
 
-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.3480
License: Trial
 
-System Information-
OS: Windows 10 (Build 16299.125)
CPU: x64
File System: NTFS
User: DESKTOP-SOQDGGC\jbcon
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 320326
Threats Detected: 3
Threats Quarantined: 0
(No malicious items detected)
Time Elapsed: 2 min, 53 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 1
Rootkit.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR, Removal Failed, [1243], [466343],1.0.3480
 
Registry Value: 1
Rootkit.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR|IMAGEPATH, Removal Failed, [1243], [466343],1.0.3480
 
Registry Data: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 0
(No malicious items detected)
 
File: 1
Trojan.ProxyAgent, C:\USERS\JBCON\APPDATA\LOCAL\IGFXMTC\IGFXMTC.EXE, Removal Failed, [194], [466355],1.0.3480
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 
D- ADWCleaner Log here:
 
# AdwCleaner 7.0.5.0 - Logfile created on Wed Dec 13 13:15:39 2017
# Updated on 2017/29/11 by Malwarebytes 
# Running on Windows 10 Pro (X64)
# Mode: clean
 
***** [ Services ] *****
 
No malicious services deleted.
 
***** [ Folders ] *****
 
No malicious folders deleted.
 
***** [ Files ] *****
 
No malicious files deleted.
 
***** [ DLL ] *****
 
No malicious DLLs cleaned.
 
***** [ WMI ] *****
 
No malicious WMI cleaned.
 
***** [ Shortcuts ] *****
 
No malicious shortcuts cleaned.
 
***** [ Tasks ] *****
 
No malicious tasks deleted.
 
***** [ Registry ] *****
 
No malicious registry entries deleted.
 
***** [ Firefox (and derivatives) ] *****
 
No malicious Firefox entries deleted.
 
***** [ Chromium (and derivatives) ] *****
 
Plugin deleted: Google Quick Scroll - 
 
 
*************************
 
::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0
 
 
 
*************************
 
C:/AdwCleaner/AdwCleaner[S0].txt - [1110 B] - [2017/12/13 13:15:12]
 
 
########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########
 
 
E- ESET Online Log here: (Do I remove ESET completely out of the system after this scan?)
 
 
C:\Users\All Users\RogueKiller\Quarantine\240F2786E1188F08.vir Win64/HackKMS.C potentially unsafe application
C:\FRST\Quarantine\C\Program Files (x86)\Cor\acclimatize.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\Cor\purchaser.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\Executed\acclimatize.dll a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\Executed\acclimatize.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\Executed\Executed.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\hughson\hughson.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\hughson\purchaser.dll a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\hughson\purchaser.exe a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Program Files (x86)\nori\preindustrial.exe Win32/Adware.Dotdo.R application cleaned by deleting
C:\FRST\Quarantine\C\Users\jbcon\AppData\Local\acclimatize.exe.xBAD a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\FRST\Quarantine\C\Users\jbcon\AppData\Local\purchaser.exe.xBAD a variant of MSIL/TrojanClicker.Agent.NSN trojan cleaned by deleting
C:\Program Files (x86)\Adobe\Acrobat DC\Acrobat\amtlib.dll a variant of Win32/HackTool.Crack.EM potentially unsafe application cleaned by deleting
C:\ProgramData\RogueKiller\Quarantine\240F2786E1188F08.vir Win64/HackKMS.C potentially unsafe application cleaned by deleting
C:\Users\jbcon\AppData\Local\Temp\Rar$EXa7488.9465\Easy driver-Cyberweb Pty507\Crack\Keygen\Keygen.exe MSIL/Keygen.A potentially unsafe application cleaned by deleting
C:\Users\jbcon\Downloads\ccsetup537.exe Win32/Bundled.Toolbar.Google.D potentially unsafe application cleaned by deleting
C:\Users\jbcon\Downloads\KMSpico_for_office2016.zip a variant of MSIL/HackTool.IdleKMS.E potentially unsafe application deleted
C:\Windows\SECOH-QAD.dll Win64/HackKMS.D potentially unsafe application cleaned by deleting
 
I still cannot turn on virus detection and protection with Windows Defender. Seems like there is still an active virus preventing to do so.
 
Please advise of next steps  to clean up this machine completely of virus/malware/trojans.
 
Many thanks and looking to your reply.
Best Regards.

Edited by dashelter, 13 December 2017 - 09:23 AM.


#14 dc3

dc3

    Bleeping Treehugger


  • Members
  • 30,274 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Sierra Foothills of Northern Ca.
  • Local time:11:09 PM

Posted 13 December 2017 - 09:46 AM

If you have not restarted this computer you should do this now.  After the computer is restarted please run Malwarebytes one more time and post the results.

 

 

Please download Emsisoft Emergency Kit and save it to your desktop.

Double click on Emsisoft Emergency Kit file on your desktop.  

The first time you launch it, Emsisoft Emergency Kit will recommend that you allow it to download updates. Please click Yes so that it downloads the latest database updates.

When the update is complete, click on MALWARE SCAN under Scan.  When asked if you want the scanner to scan for Potentially Unwanted Programs, click Yes.

Emsisoft Emergency Kit will start scanning.

When the scan is completed click on Quarantine.

When the threats have been quarantined, click the View report button in the lower-right corner, and the scan log will be opened in Notepad.  Copy the log and paste it in your topic.

Please save the log in Notepad on your desktop, and post the contents in your next reply.

When you close Emsisoft Emergency Kit, it will give you an option to sign up for a newsletter. This is optional, and is not necessary for the malware removal process.
 


Edited by dc3, 13 December 2017 - 09:49 AM.

Family and loved ones will always be a priority in my daily life.  You never know when one will leave you.

 

 

 

 


#15 dashelter

dashelter
  • Topic Starter

  • Members
  • 34 posts
  • OFFLINE
  •  
  • Local time:01:09 AM

Posted 13 December 2017 - 11:38 AM

Re-ran Malwarebytes...Same results  malware found but removal of such failed

 

Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 12/13/17
Scan Time: 11:03 AM
Log File: 177391b4-e01f-11e7-ba89-985fd3463516.json
Administrator: Yes
 
-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.3481
License: Trial
 
-System Information-
OS: Windows 10 (Build 16299.125)
CPU: x64
File System: NTFS
User: DESKTOP-SOQDGGC\jbcon
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 320543
Threats Detected: 3
Threats Quarantined: 0
(No malicious items detected)
Time Elapsed: 2 min, 18 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 1
Rootkit.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR, Removal Failed, [1246], [466343],1.0.3481
 
Registry Value: 1
Rootkit.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\UDISKMGR|IMAGEPATH, Removal Failed, [1246], [466343],1.0.3481
 
Registry Data: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 0
(No malicious items detected)
 
File: 1
Trojan.ProxyAgent, C:\USERS\JBCON\APPDATA\LOCAL\IGFXMTC\IGFXMTC.EXE, Removal Failed, [194], [466355],1.0.3481
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 
 
Emsisoft Emergency Kit - Version 2017.11
Last update: 12/13/2017 11:28:59 AM
User account: DESKTOP-SOQDGGC\jbcon
Computer name: DESKTOP-SOQDGGC
OS version: Windows 10x64 
 
Scan settings:
 
Scan type: Malware Scan
Objects: Rootkits, Memory, Traces, Files
 
Detect PUPs: On
Scan archives: Off
Scan mail archives: Off
ADS Scan: On
File extension filter: Off
Direct disk access: Off
 
Scan start: 12/13/2017 11:30:54 AM
 
Scanned 77111
Found 0
 
Scan end: 12/13/2017 11:31:42 AM
Scan time: 0:00:48
 

 

See above. Nothing found  in Emsisoft.

Awaiting next steps. No luck in Malwarebytes to remove trojan/malware found.

Windows Defender protection still of and unable to turn it back on....

 

Please advise and thanks.






2 user(s) are reading this topic

0 members, 2 guests, 0 anonymous users