PC Health Kit Performance Monitor

nhoj

Member
I have this come up PC Health Kit Performance Monitor and I have never installed it. How do you get raid of this?


Also how do you change your HOME PAGE back to what it was? I keep getting Goggle Chrome and it should be Centurylink.
 

johnb35

Administrator
Staff member
I would say you are infected. Please do the following.

1.

Please download AdwCleaner by Xplode onto your Desktop.



•Please close all open programs and internet browsers.
•Double click on adwcleaner.exe to run the tool.
•Click on Scan.
•After the scan you will need to click on clean for it to delete the adware.
•Your computer will be rebooted automatically. A text file will open after the restart.
•Please post the content of that logfile in your reply.
•You can find the logfile at C:\AdwCleaner[Sn].txt as well - n is the order number.

2.

Please download Malwarebytes' Anti-Malware from here or here and save it to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version. Please keep updating until it says you have the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.
  • A log will be saved automatically which you can access by clicking on the Logs tab within Malwarebytes' Anti-Malware

If for some reason Malwarebytes will not install or run please download and run Rkill.scr, Rkill.exe, or Rkill.com. If you are still having issues running rkill then try downloading these renamed versions of the same program.

EXPLORER.EXE
IEXPLORE.EXE
USERINIT.EXE
WINLOGON.EXE

But DO NOT reboot the system and then try installing or running Malwarebytes. If Rkill (which is a black box) appears and then disappears right away or you get a message saying rkill is infected, keep trying to run rkill until it over powers the infection and temporarily kills it. Once a log appears on the screen, you can try running malwarebytes or downloading other programs.



Download the HijackThis installer from here.
Run the installer and choose Install, indicating that you accept the licence agreement. The installer will place a shortcut on your desktop and launch HijackThis.

Vista and Windows 7 users must right click on the hijackthis icon and click on run as. If the run as option doesn't appear then press and hold the shift key while right clicking on the icon to get it to appear.


Click Do a system scan and save a logfile

Most of what HijackThis lists will be harmless or even essential, don't fix anything yet.

When the hijackthis log appears in a notepad file, click on the edit menu, click select all, then click on the edit menu again and click on copy. Come back to your reply and right click on your mouse and click on paste.

Post the logfile that HijackThis produces along with the Malwarebytes Anti-Malware log
 

nhoj

Member
I am using avast Antivirus.

I don't know anything about AdwCleaner can you explain this program?

Not sure what HijackThis is ether?
 

S.T.A.R.S.

banned
According to what you told us,I must agree with johnb35 and say that you are probably infected.
Do what johnb35 said in his post with instructions.
 

nhoj

Member
I am using avast Antivirus.

I don't know anything about AdwCleaner can you explain this program?

Not sure what HijackThis is ether?


I got Reg Clean Pro and it told me that I had 419 Errors and if I would buy the Full version it would clean my Computer, and if I took the Free version it would clean 15 of them. Any time you have to buy something all they are doing is pushing there product.

My question is did I download something that I did not want?



And also I got a window asking me to back up my files, is this something that I don't need?

Everything else went OK.

Just need to clean everything up so that I don't get all this juck.
 

johnb35

Administrator
Staff member
Reg clean pro is junk. I really need you to do what I posted and post the logs for review. That is the only way your system will get cleaned up. And just because you have avast doesn't mean you can't get infected.
 

nhoj

Member
I believe I need to start all over again and YES do what you have told me to do.

I was OK up until I get to that Reg Clean Pro and I do not know where that came from.

What do I need to correct everything now?


You have been very good in helping me. I am not a Computer expert.

As far as backed how impotent is it? I have never done this before.

I might be asking some doom questions, but you are the expert on this.

By post the requested logs were do you put them?
 
Last edited:

nhoj

Member
You post the logs in your reply.

I can get everyone but when it comes to HijackThis I cannot download it. I get FileHippo

I have Windows 7 and I went there and it's been downloading for 6 hours so far and it is still downloading. Am I in the right one?

According to FileHippo I have 8 updates, I am totally confused when I get to HijackThis?

Am I doing something worn? At this point.
 
Last edited:

johnb35

Administrator
Staff member
When the file hippo page loads, click up top right on the green arrow where it says download latest version. That is the hijackthis software.
 

nhoj

Member
When the file hippo page loads, click up top right on the green arrow where it says download latest version. That is the hijackthis software.


Thank-You every much for helping me with this. I have completed everything now.

Hope that this all FREE. Malwarebytes Anti-Malware tells me that I have 0 days remaining. Am I to do something to keep this working or up to date?

Everything else is working OK so far.
 

johnb35

Administrator
Staff member
I need you to post the logs requested as you may have other issues that need to be fixed.

You just enabled the trial version of malwarebytes. All you need to do is end trial and disable malwarebytes from running at bootup. You should be able to do that by right clicking on the icon in the system tray down by the clock.

But as I said, please post the logs.
 

nhoj

Member
I need you to post the logs requested as you may have other issues that need to be fixed.

You just enabled the trial version of malwarebytes. All you need to do is end trial and disable malwarebytes from running at bootup. You should be able to do that by right clicking on the icon in the system tray down by the clock.

But as I said, please post the logs.

I hope that this is what you wanted


Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.10.12.07

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
John Wilhelm :: JOHNWILHELM-HP [administrator]

10/14/2013 7:03:19 PM
mbam-log-2013-10-14 (19-03-19).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 208845
Time elapsed: 3 minute(s), 51 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
 

johnb35

Administrator
Staff member
You ran it just a bit ago, didn't you? I need the log that actually removed the infections. Open malwarebytes, click on the logs tab, open the log that removed the infections and copy and paste back here. I also need the hijackthis log along with the adwcleaner log.
 

nhoj

Member
You ran it just a bit ago, didn't you? I need the log that actually removed the infections. Open malwarebytes, click on the logs tab, open the log that removed the infections and copy and paste back here. I also need the hijackthis log along with the adwcleaner log.

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.10.12.03

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
John Wilhelm :: JOHNWILHELM-HP [administrator]

10/12/2013 6:51:39 AM
mbam-log-2013-10-12 (06-51-39).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 208252
Time elapsed: 3 minute(s), 46 second(s)

Memory Processes Detected: 4
C:\Program Files (x86)\bomlabio\updatebomlabio.exe (PUP.Optional.Bomlabio.A) -> 2156 -> Delete on reboot.
C:\Program Files (x86)\bomlabio\bin\utilbomlabio.exe (PUP.Optional.Bomlabio.A) -> 2308 -> Delete on reboot.
C:\Program Files (x86)\PC Health Kit\PCHKReminder.exe (Rogue.PCHealthKit) -> 3372 -> Delete on reboot.
C:\Program Files (x86)\PC Health Kit\PCHKSmartScan.exe (Rogue.PCHealthKit) -> 3192 -> Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 20
HKLM\SYSTEM\CurrentControlSet\Services\Update bomlabio (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Services\Util bomlabio (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKCR\CLSID\{9593d220-8a70-4dce-9e80-16668c228bef} (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKCR\TypeLib\{cb36d5fd-991d-4f82-bff6-84c414999f58} (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKCR\Interface\{0B060FEE-10D2-437D-A13F-93B6B59E3BE8} (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9593D220-8A70-4DCE-9E80-16668C228BEF} (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKCR\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} (PUP.Optional.BrowseFox.A) -> Quarantined and deleted successfully.
HKCR\CLSID\{CF190686-9E72-403C-B99D-682ABDB63C5B} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCR\CLSID\{A7A9D7E7-E0C0-4202-9F13-6A06BD073CDA} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A7A9D7E7-E0C0-4202-9F13-6A06BD073CDA} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCR\TypeLib\{39A17362-9C1D-4907-9428-0D28A94DC79D} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCR\Interface\{627A968A-03E6-41C7-B11B-4E442B376F95} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{CF190686-9E72-403C-B99D-682ABDB63C5B} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C1C3E833-420E-4D78-9BA7-86AEBB272384} (Adware.GameVance) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PC Health Kit_is1 (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C1C3E833-420E-4D78-9BA7-86AEBB272384} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
HKCU\Software\bomlabio (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
HKCU\Software\PC Health Kit (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\TidyNetwork.com (PUP.TidyNetwork) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\SWEETIM (PUP.Optional.SweetIM.A) -> Quarantined and deleted successfully.

Registry Values Detected: 2
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|PC Health Kit (Rogue.PCHealthKit) -> Data: C:\Program Files (x86)\PC Health Kit\PCHKLauncher.exe -> Quarantined and deleted successfully.
HKLM\Software\SweetIM|simapp_id (PUP.Optional.SweetIM.A) -> Data: {AAC9C9ED-23DC-11E3-9EBB-AC162D0C0B25} -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 18
C:\Program Files (x86)\PC Health Kit (Rogue.PCHealthKit) -> Delete on reboot.
C:\Users\John Wilhelm\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TopArcadeHits (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio (PUP.Optional.Bomlabio.A) -> Delete on reboot.
C:\Program Files (x86)\bomlabio\bin (PUP.Optional.Bomlabio.A) -> Delete on reboot.
C:\Program Files (x86)\bomlabio\bin\plugins (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\update (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3} (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\chrome (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\chrome\content (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\skin (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663 (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\plugins (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847 (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\plugins (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\CT3297927 (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511 (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\plugins (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.

Files Detected: 143
C:\Program Files (x86)\bomlabio\updatebomlabio.exe (PUP.Optional.Bomlabio.A) -> Delete on reboot.
C:\Program Files (x86)\bomlabio\bin\utilbomlabio.exe (PUP.Optional.Bomlabio.A) -> Delete on reboot.
C:\Program Files (x86)\bomlabio\bomlabioBHO.dll (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\Toparcadehits.dll (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\air89DF.exe (PUP.Optional.DefaultTab.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\airBF42.exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\dlLogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\Installer.exe (PUP.Optional.SmartBar.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\mgsqlite3.7z (PUP.Optional.SweetIM) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\mgsqlite3.dll (PUP.Optional.SweetIM) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsd123C.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsd159F.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsdDD78.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsdEE9C.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nseE05B.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsi82C9.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsiE111.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsn1A69.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsnF27F.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsp6B3F.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsu3F2D.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsuEB66.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsx850A.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\nsy69F2.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\OptimizerProDynamic.exe (PUP.Optional.OptimizePro.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\QuickShare1.exe (PUP.Optional.QuickShare.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\Shortcut_sweetpacks_conduit_942013.exe (PUP.Optional.SweetIM) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\SPStub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\SweetIMInstallValidator.exe (PUP.Optional.Conduit) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\Toparcadehits_setup.exe (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\toparcadesetup.exe (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\WSSetup.exe (PUP.Optional.Perion.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\chLogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\ctbe.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\ieLogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\spch.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\statisticsStub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\stub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\chlogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\ctbe.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\ielogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\statisticsStub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\CT3297927\spch.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\chLogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\ctbe.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\ieLogic.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\sl.exe (PUP.Optional.Conduit) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\spch.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\statisticsStub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\stub.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\ClasifiedsSetup (1).exe (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\ClasifiedsSetup (2).exe (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\ClasifiedsSetup.exe (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\coolreader_freely_d163113(1).exe (PUP.Optional.InstallIQ) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\coolreader_freely_d163113.exe (PUP.Optional.InstallIQ) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\Mapit_1_B2.exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\rcpsetup_dcnew_util_300_pd.exe (PUP.Optional.RegCleanerPro) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Downloads\rcpsetup_matomy_my40945.exe (PUP.Optional.RegCleanerPro) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\uninstaller.exe (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\updater.exe (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\G046CQFT\checktbexist[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\G046CQFT\Inbox[1].cab (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\G046CQFT\InternetHelper3.1[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\G046CQFT\mgsqlite3[1].7z (PUP.Optional.SweetIM) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\G046CQFT\SweetPacks[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\HRXI0Z14\Setup[1].exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\HRXI0Z14\SPSetup[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\HRXI0Z14\WhiteSmoke_New[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\HRXI0Z14\WhiteSmoke_New_wpf[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\checktbexist[1].exe (PUP.Optional.Conduit) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\DefaultTabSetupf[1].exe (PUP.Optional.DefaultTab.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\Inbox_dll[1].cab (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\OptimizerPro[1].exe (PUP.Optional.OptimizePro.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\statisticsstub[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\SI1QCUFK\stublogic[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\bomlabio_ai[1].exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\conduitinstaller[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\Inbox64[1].cab (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\InternetHelper3_1_wpf[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\QuickShare1[1].exe (PUP.Optional.QuickShare.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\SweetPacks_wpf[1].exe (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\Local Settings\Temporary Internet Files\Content.IE5\WKZYB7J3\Toparcadehits_setup[1].exe (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHealthKit.chm (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\CookiesException.txt (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\English.ini (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\file_id.diz (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\HomePage.url (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHealthKit.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHKGuard.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHKLauncher.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHKReminder.exe (Rogue.PCHealthKit) -> Delete on reboot.
C:\Program Files (x86)\PC Health Kit\PCHKSchedule.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\PCHKSmartScan.exe (Rogue.PCHealthKit) -> Delete on reboot.
C:\Program Files (x86)\PC Health Kit\PCHKUninstaller.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\scan.gif (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\sqlite3.dll (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\StartupList.txt (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\unins000.dat (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Program Files (x86)\PC Health Kit\unins000.exe (Rogue.PCHealthKit) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TopArcadeHits\Play Toparcadehits Online.url (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\TopArcadeHits\Uninstall Toparcadehits.lnk (Adware.GameVance) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\tah.config (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\uninstaller.exe (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\TopArcadeHits\updater.exe (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Windows\Tasks\TopArcadeHits.job (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\updatebomlabio.InstallState (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bomlabio.Common.dll (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bomlabio.ico (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bomlabioUninstall.exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\ljidjdddaoiogpbmniipclcppkoembao.crx (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\Microsoft.Win32.TaskScheduler.dll (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\sqlite3.exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bin\utilbomlabio.InstallState (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bin\plugins\bomlabio.FFUpdate.dll (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\bin\plugins\bomlabio.IEUpdate.dll (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Program Files (x86)\bomlabio\update\n1iiuvuo.e4s.exe (PUP.Optional.Bomlabio.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\chrome.manifest (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\icon.png (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\install.rdf (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\chrome\content\browser.xul (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\chrome\content\toparcadehits.js (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Roaming\Mozilla\Extensions\{ec8030f7-c20a-464f-9b0e-13a3a9e97384}\{0113D088-8ED1-468C-B225-585A9C53B5E3}\skin\style.css (PUP.Optional.TopArcadeHits.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\chromeid.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\CT3289663.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\initData.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\manifest.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\setup.ini.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289663\plugins\TBVerifier.dll (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\chromeid.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\CT3289847.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\initData.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\manifest.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\setup.ini.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3289847\plugins\TBVerifier.dll (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\CT3297927\CT3297927.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\CT3297927\initData.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\CT3297927\manifest.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\chromeid.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\CT3310511.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\initData.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\manifest.json (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\setup.ini.txt (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.
C:\Users\John Wilhelm\AppData\Local\Temp\ct3310511\plugins\TBVerifier.dll (PUP.Optional.Conduit.A) -> Quarantined and deleted successfully.

(end)
 

johnb35

Administrator
Staff member
If you have not done so already please do the following.

1.

Please download AdwCleaner by Xplode onto your Desktop.



•Please close all open programs and internet browsers.
•Double click on adwcleaner.exe to run the tool.
•Click on Scan.
•After the scan you will need to click on clean for it to delete the adware.
•Your computer will be rebooted automatically. A text file will open after the restart.
•Please post the content of that logfile in your reply.
•You can find the logfile at C:\AdwCleaner[Sn].txt as well - n is the order number.

2.

Download the HijackThis installer from here.
Run the installer and choose Install, indicating that you accept the licence agreement. The installer will place a shortcut on your desktop and launch HijackThis.

Vista and Windows 7 users must right click on the hijackthis icon and click on run as. If the run as option doesn't appear then press and hold the shift key while right clicking on the icon to get it to appear.


Click Do a system scan and save a logfile

Most of what HijackThis lists will be harmless or even essential, don't fix anything yet.

When the hijackthis log appears in a notepad file, click on the edit menu, click select all, then click on the edit menu again and click on copy. Come back to your reply and right click on your mouse and click on paste.

Post the logfile that HijackThis produces
 

nhoj

Member
You ran it just a bit ago, didn't you? I need the log that actually removed the infections. Open malwarebytes, click on the logs tab, open the log that removed the infections and copy and paste back here. I also need the hijackthis log along with the adwcleaner log.



* Trend Micro HijackThis v2.0.4 *


See bottom for version history.

The different sections of hijacking possibilities have been separated into the following groups.
You can get more detailed information about an item by selecting it from the list of found items OR highlighting the relevant line below, and clicking 'Info on selected item'.

R - Registry, StartPage/SearchPage changes
R0 - Changed registry value
R1 - Created registry value
R2 - Created registry key
R3 - Created extra registry value where only one should be
F - IniFiles, autoloading entries
F0 - Changed inifile value
F1 - Created inifile value
F2 - Changed inifile value, mapped to Registry
F3 - Created inifile value, mapped to Registry
N - Netscape/Mozilla StartPage/SearchPage changes
N1 - Change in prefs.js of Netscape 4.x
N2 - Change in prefs.js of Netscape 6
N3 - Change in prefs.js of Netscape 7
N4 - Change in prefs.js of Mozilla
O - Other, several sections which represent:
O1 - Hijack of auto.search.msn.com with Hosts file
O2 - Enumeration of existing MSIE BHO's
O3 - Enumeration of existing MSIE toolbars
O4 - Enumeration of suspicious autoloading Registry entries
O5 - Blocking of loading Internet Options in Control Panel
O6 - Disabling of 'Internet Options' Main tab with Policies
O7 - Disabling of Regedit with Policies
O8 - Extra MSIE context menu items
O9 - Extra 'Tools' menuitems and buttons
O10 - Breaking of Internet access by New.Net or WebHancer
O11 - Extra options in MSIE 'Advanced' settings tab
O12 - MSIE plugins for file extensions or MIME types
O13 - Hijack of default URL prefixes
O14 - Changing of IERESET.INF
O15 - Trusted Zone Autoadd
O16 - Download Program Files item
O17 - Domain hijack
O18 - Enumeration of existing protocols and filters
O19 - User stylesheet hijack
O20 - AppInit_DLLs autorun Registry value, Winlogon Notify Registry keys
O21 - ShellServiceObjectDelayLoad (SSODL) autorun Registry key
O22 - SharedTaskScheduler autorun Registry key
O23 - Enumeration of NT Services
O24 - Enumeration of ActiveX Desktop Components

Command-line parameters:
* /autolog - automatically scan the system, save a logfile and open it
* /ihatewhitelists - ignore all internal whitelists
* /uninstall - remove all HijackThis Registry entries, backups and quit
* /silentautuolog - the same as /autolog, except with no required user intervention

* Version history *

[v2.0.4]
* Fixed parser issues on winlogon notify
* Fixed issues to handle certain environment variables
* Rename HJT generates complete scan log
[v2.00.0]
* AnalyzeThis added for log file statistics
* Recognizes Windows Vista and IE7
* Fixed a few bugs in the O23 method
* Fixed a bug in the O22 method (SharedTaskScheduler)
* Did a few tweaks on the log format
* Fixed and improved ADS Spy
* Improved Itty Bitty Procman (processes are frozen before they are killed)
* Added listing of O4 autoruns from other users
* Added listing of the Policies Run items in O4 method, used by SmitFraud trojan
* Added /silentautolog parameter for system admins
* Added /deleteonreboot [file] parameter for system admins
* Added O24 - ActiveX Desktop Components enumeration
* Added Enhanced Security Confirguration (ESC) Zones to O15 Trusted Sites check
[v1.99.1]
* Added Winlogon Notify keys to O20 listing
* Fixed crashing bug on certain Win2000 and WinXP systems at O23 listing
* Fixed lots and lots of 'unexpected error' bugs
* Fixed lots of inproper functioning bugs (i.e. stuff that didn't work)
* Added 'Delete NT Service' function in Misc Tools section
* Added ProtocolDefaults to O15 listing
* Fixed MD5 hashing not working
* Fixed 'ISTSVC' autorun entries with garbage data not being fixed
* Fixed HijackThis uninstall entry not being updated/created on new versions
* Added Uninstall Manager in Misc Tools to manage 'Add/Remove Software' list
* Added option to scan the system at startup, then show results or quit if nothing found
[v1.99]
* Added O23 (NT Services) in light of newer trojans
* Integrated ADS Spy into Misc Tools section
* Added 'Action taken' to info in 'More info on this item'
[v1.98]
* Definitive support for Japanese/Chinese/Korean systems
* Added O20 (AppInit_DLLs) in light of newer trojans
* Added O21 (ShellServiceObjectDelayLoad, SSODL) in light of newer trojans
* Added O22 (SharedTaskScheduler) in light of newer trojans
* Backups of fixed items are now saved in separate folder
* HijackThis now checks if it was started from a temp folder
* Added a small process manager (Misc Tools section)
[v1.96]
* Lots of bugfixes and small enhancements! Among others:
* Fix for Japanese IE toolbars
* Fix for searchwww.com fake CLSID trick in IE toolbars and BHO's
* Attributes on Hosts file will now be restored when scanning/fixing/restoring it.
* Added several files to the LSP whitelist
* Fixed some issues with incorrectly re-encrypting data, making R0/R1 go undetected until a restart
* All sites in the Trusted Zone are now shown, with the exception of those on the nonstandard but safe domain list
[v1.95]
* Added a new regval to check for from Whazit hijack (Start Page_bak).
* Excluded IE logo change tweak from toolbar detection (BrandBitmap and SmBrandBitmap).
* New in logfile: Running processes at time of scan.
* Checkmarks for running StartupList with /full and /complete in HijackThis UI.
* New O19 method to check for Datanotary hijack of user stylesheet.
* Google.com IP added to whitelist for Hosts file check.
[v1.94]
* Fixed a bug in the Check for Updates function that could cause corrupt downloads on certain systems.
* Fixed a bug in enumeration of toolbars (Lop toolbars are now listed!).
* Added imon.dll, drwhook.dll and wspirda.dll to LSP safelist.
* Fixed a bug where DPF could not be deleted.
* Fixed a stupid bug in enumeration of autostarting shortcuts.
* Fixed info on Netscape 6/7 and Mozilla saying '%shitbrowser%' (oops).
* Fixed bug where logfile would not auto-open on systems that don't have .log filetype registered.
* Added support for backing up F0 and F1 items (d'oh!).
[v1.93]
* Added mclsp.dll (McAfee), WPS.DLL (Sygate Firewall), zklspr.dll (Zero Knowledge) and mxavlsp.dll (OnTrack) to LSP safelist.
* Fixed a bug in LSP routine for Win95.
* Made taborder nicer.
* Fixed a bug in backup/restore of IE plugins.
* Added UltimateSearch hijack in O17 method (I think).
* Fixed a bug with detecting/removing BHO's disabled by BHODemon.
* Also fixed a bug in StartupList (now version 1.52.1).
[v1.92]
* Fixed two stupid bugs in backup restore function.
* Added DiamondCS file to LSP files safelist.
* Added a few more items to the protocol safelist.
* Log is now opened immediately after saving.
* Removed rd.yahoo.com from NSBSD list (spammers are starting to use this, no doubt spyware authors will follow).
* Updated integrated StartupList to v1.52.
* In light of SpywareNuker/BPS Spyware Remover, any strings relevant to reverse-engineers are now encrypted.
* Rudimentary proxy support for the Check for Updates function.
[v1.91]
* Added rd.yahoo.com to the Nonstandard But Safe Domains list.
* Added 8 new protocols to the protocol check safelist, as well as showing the file that handles the protocol in the log (O18).
* Added listing of programs/links in Startup folders (O4).
* Fixed 'Check for Update' not detecting new versions.
[v1.9]
* Added check for Lop.com 'Domain' hijack (O17).
* Bugfix in URLSearchHook (R3) fix.
* Improved O1 (Hosts file) check.
* Rewrote code to delete BHO's, fixing a really nasty bug with orphaned BHO keys.
* Added AutoConfigURL and proxyserver checks (R1).
* IE Extensions (Button/Tools menuitem) in HKEY_CURRENT_USER are now also detected.
* Added check for extra protocols (O18).
[v1.81]
* Added 'ignore non-standard but safe domains' option.
* Improved Winsock LSP hijackers detection.
* Integrated StartupList updated to v1.4.
[v1.8]
* Fixed a few bugs.
* Adds detecting of free.aol.com in Trusted Zone.
* Adds checking of URLSearchHooks key, which should have only one value.
* Adds listing/deleting of Download Program Files.
* Integrated StartupList into the new 'Misc Tools' section of the Config screen!
[v1.71]
* Improves detecting of O6.
* Some internal changes/improvements.
[v1.7]
* Adds backup function! Yay!
* Added check for default URL prefix
* Added check for changing of IERESET.INF
* Added check for changing of Netscape/Mozilla homepage and default search engine.
[v1.61]
* Fixes Runtime Error when Hosts file is empty.
[v1.6]
* Added enumerating of MSIE plugins
* Added check for extra options in 'Advanced' tab of 'Internet Options'.
[v1.5]
* Adds 'Uninstall & Exit' and 'Check for update online' functions.
* Expands enumeration of autoloading Registry entries (now also scans for .vbs, .js, .dll, rundll32 and service)
[v1.4]
* Adds repairing of broken Internet access (aka Winsock or LSP fix) by New.Net/WebHancer
* A few bugfixes/enhancements
[v1.3]
* Adds detecting of extra MSIE context menu items
* Added detecting of extra 'Tools' menu items and extra buttons
* Added 'Confirm deleting/ignoring items' checkbox
[v1.2]
* Adds 'Ignorelist' and 'Info' functions
[v1.1]
* Supports BHO's, some default URL changes
[v1.0]
* Original release

A good thing to do after version updates is clear your Ignore list and re-add them, as the format of detected items sometimes changes.


I hope that I got the information you wanted.
 

johnb35

Administrator
Staff member
Not sure where you got that info from but you need to follow my directions I posted. That is not the info I need.
 

nhoj

Member
Not sure where you got that info from but you need to follow my directions I posted. That is not the info I need.


I got the infro from HijackThis.

I went to see if there was any other results and I cannot find anything else.

I hope that we will get everything taken care of.

Can you tell me where you find the infro that you want from Hijackthis? I uninstalled it and than installed it again.

It woiuld not be in the AdwCleaner would it?
 
Last edited:
Top