Jump to content

Recommended Posts

Hi can someone please help i used this program many years ago along with cw shredder and one from trend micro used in safe mode (cant remember the name) with XP and have not used it in awhile so i need some help in sorting through my HJ log any help would be much appreciated .... all so i think  i may have been keylogged are there any programs around that can help me check?????

 

I have uploaded my log file to be viewed if anyone can help???? hijackthis.log

Link to post
Share on other sites

Hello and welcome to Malwarebytes,

Please be aware the following P2P/Piracy Warning is a standard opening reply made here at Malwarebytes, we make no accusations but do make you aware of Forum Protocol....

If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here.Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.


Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...

 

HJT is outdated and of no practical use to systems post XP, continue as follows:

Please open Malwarebytes Anti-Malware.

  • On the Settings tab > Detection and Protection sub tab, Detection Options, tick the box "Scan for rootkits".
  • Under Non-Malware Protection sub tab Change PUP and PUM entries to Treat detections as Malware
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may or may not see this message box.

            'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.



To get the log from Malwarebytes do the following:

  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have three options:

      Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
      Text file (*.txt)        - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
      XML file (*.xml)      - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…




If Malwarebytes is not installed follow these instructions first:

Download Malwarebytes Anti-Malware to your desktop.

  • Double-click mbam-setup and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
  • Launch Malwarebytes Anti-Malware
  • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish. Follow the instructions above....


Next,

Download AdwCleaner by Xplode onto your Desktop.

  • Double click on Adwcleaner.exe to run the tool.
  • Click on the Scan in the Actions box
  • Please wait fot the scan to finish..
  • When "Waiting for action.Please uncheck elements you want to keep" shows in top line..
  • Click on the Cleaning box.
  • Next click OK on the "Closing Programs" pop up box.
  • Click OK on the Information box & again OK to allow the necessary reboot
  • After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...



Next,

Download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.


  • Double-click to run it. When the tool opens click Yes to disclaimer.
    (Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make logs named (Addition.txt) and Shortcut.txt Please attach those logs to your reply.



Let me see those logs in your next reply...

Thank you,

Kevin...
 

Link to post
Share on other sites

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 1/16/2016
Scan Time: 3/15:40
Logfile:
Administrator: Yes

Version: 2.2.0.1024
Malware Database: v2016.01.16.02
Rootkit Database: v2016.01.09.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Owner

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 431962
Time Elapsed: 1 hr, 51 min, 14 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 6
PUM.Optional.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE, Quarantined, [c78b61d9c3d68ea873ad7da1a95b59a7],
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68828F30-021F-4B4B-B8C3-EF7BBD5E8002}, Quarantined, [a3af0d2dd3c6b97d4b14fab7e41fb54b],
PUM.Optional.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE, Quarantined, [ada51327adeca78f54cc62bc25df9c64],
Trojan.ZeroAccess.GU, HKLM\SYSTEM\CONTROLSET001\SERVICES\‮etadpug, Delete-on-Reboot, [7cd640fa673203334d5f966cc040f30d],
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-1402326060-2913057618-853579718-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{300155DE-4CBF-4740-BA90-2FA789768C7B}, Quarantined, [1c363cfe35642c0a73eb654c4bb89b65],
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-1402326060-2913057618-853579718-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68828F30-021F-4B4B-B8C3-EF7BBD5E8002}, Quarantined, [e9694bef47523cfa61fd1e93d132c13f],

Registry Values: 5
PUM.Optional.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, Quarantined, [c78b61d9c3d68ea873ad7da1a95b59a7]
PUP.Optional.ConduitTB.Gen, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68828F30-021F-4B4B-B8C3-EF7BBD5E8002}|AppPath, C:\Users\Owner\AppData\Local\Conduit\CT3225826, Quarantined, [a3af0d2dd3c6b97d4b14fab7e41fb54b]
PUM.Optional.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, Quarantined, [ada51327adeca78f54cc62bc25df9c64]
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-1402326060-2913057618-853579718-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{300155DE-4CBF-4740-BA90-2FA789768C7B}|AppPath, C:\Users\Owner\AppData\Local\Conduit\CT3225826, Quarantined, [1c363cfe35642c0a73eb654c4bb89b65]
PUP.Optional.ConduitTB.Gen, HKU\S-1-5-21-1402326060-2913057618-853579718-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68828F30-021F-4B4B-B8C3-EF7BBD5E8002}|AppPath, C:\Users\Owner\AppData\Local\Conduit\CT3225826, Quarantined, [e9694bef47523cfa61fd1e93d132c13f]

Registry Data: 1
PUP.Optional.Conduit, HKU\S-1-5-21-1402326060-2913057618-853579718-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, http://search.conduit.com?SearchSource=10&ctid=CT3225826, Good: (www.google.com), Bad: (http://search.conduit.com?SearchSource=10&ctid=CT3225826),Delete-on-Reboot,[0a482515cbce3cfa9c48c2ee679d8c74]

Folders: 8
Trojan.0Access, c:\Program Files (x86)\Google\Desktop\Install\{cd7802cc-a39a-b44f-b31f-f3425259e786}, Delete-on-Reboot, [3f1355e5e3b69f97b6e8e81ab54b50b0],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\db, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\dll, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\img, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb, Quarantined, [d37f36048514c47293fc37a72dd7e11f],

Files: 27
PUP.Optional.OpenCandy, C:\Users\Owner\Desktop\New folder\windows.7.codec.pack.v4.1.0.setup.exe, Quarantined, [74de95a5fe9b5dd98b357db0f40c08f8],
HackTool.WpaKill, C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\Remove Windows Activation Technologies 2.2.6.exe, Quarantined, [b49ec7731f7aeb4b8c675cd047ba9c64],
RiskWare.Tool.CK, C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\Se7en Activator v3.exe, Quarantined, [69e91b1f712801354416dfe1fb09d927],
HackTool.Agent, C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\Windows Loader 1.9.3 (Reccomended)\724_Windows_Loader_.rar, Quarantined, [a6ac112952479e9831faab7ae31e0af6],
HackTool.Agent, C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\Windows Loader 1.9.3 (Reccomended)\Windows Loader 1.9.3.exe, Quarantined, [5bf71d1db8e1f442a18a59ccab56c838],
PUP.Optional.Delta.ShrtCln, C:\Users\Owner\Desktop\Seagate\80G\Security\Unlocker1.9.2.exe, Quarantined, [163cfe3c079283b3a7985c3e748c12ee],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\manifest.json, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\background.html, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\popup.html, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\db\db_block_whitelist.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\db\db_redirect.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\dll\NPAdbExternal.dll, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering\domainset.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering\filternormalizer.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering\filteroptions.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering\filterset.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\filtering\filtertypes.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\img\icon128.png, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\adblock_start_chrome.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\adblock_start_common.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\background.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\functions.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\google_adsbygoogle.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\google_gpt.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\google_show_ads.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\popup.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],
PUP.Optional.HijackModifiedExtension, C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\lfgjbmhakaffflkjecineeaadpidgikb\1.0.0_0\js\port.js, Quarantined, [d37f36048514c47293fc37a72dd7e11f],

Physical Sectors: 0
(No malicious items detected)


(end)

 

Adw Cleaner

***** [ Services ] *****


***** [ Folders ] *****


***** [ Files ] *****


***** [ DLLs ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****

[-] Data Restored : HKCU\Software\Microsoft\Internet Explorer\Main [start Page]
[-] Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{443789B7-F39C-4b5c-9287-DA72D38F4FE6}
[-] Data Restored : HKCU\Software\Microsoft\Internet Explorer\SearchScopes [DefaultScope]

***** [ Web browsers ] *****


*************************

:: "Tracing" keys removed
:: Winsock settings cleared

########## EOF - C:\AdwCleaner\AdwCleaner[C2].txt - [957 bytes] ##########

FRST.txtAddition.txt

Link to post
Share on other sites

Thanks for those logs, continue please:

 

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into.
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.
 

Next,

 

Uninstall anything related to the following:

 

IObit

 

That software is very dubious and should be removed ASAP

 

Next,

 

thisisujrt.gif Please download Junkware Removal Tool to your desktop.
 

  • Shut down your protection software now to avoid potential conflicts. (re-enable when done)
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

 

Next

 

grayhitmanpro_16px.png Scan with HitmanPro

In any case don't remove on your own anything that Hitman Pro detects!
This scanner, as it is a really good for checking, has been known for deleting files instead od curing them, which in some cases may render the machine unbootable.
Any removals will be done manually after careful analysis of the scan results!


Please download HitmanPro by SurfRight and save it to your desktop.
Temporary disable your AntiVirus and AntiSpyware protection - instructions here.
 

  • Right-click on grayhitmanpro_16px.png icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • If the program won't run please run it while holding down the left CTRL key until it's loaded!
  • Click on the Next button. You must agree with the terms of EULA (if asked).
  • Check the box beside No, I only want to perform a one-time scan to check this computer.
  • Click on the Next button.
  • The program will start to scan the computer. It would only take several minutes.
  • When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Quaranteen.
  • If there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro!
    Navigate to C:\ProgramData\HitmanPro\Logs, open the report and include it it your next reply.
  • Click on the Next button.
  • Click on the Save Log button.
  • Save that file to your desktop.


Please include that logfile in your next reply.

Don't forget to re-enable your security!
 

 

Next,

 

Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

Ensure to get the correct version for your system....

32 Bit version:
https://www.microsoft.com/downloads/en/confirmation.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

64 Bit version:
https://www.microsoft.com/downloads/en/confirmation.aspx?FamilyId=585D2BDE-367F-495E-94E7-6349F4EFFC74&displaylang=en

Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and  Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\mrt.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....
 

Let me see those logs in your next reply...

 

One more task:

 

Google Chrome is definitely corrupt and has been more than likely exploited by malware..... we need to fix that quick!!

 

If your Chrome Bookmarks are important do this first:

Go to this link: http://www.wikihow.com/Export-Bookmarks-from-Chrome follow the instructions and Export your Bookmarks from Chrome, save to your Desktop or similar. Note the instructions can also be used to Import the bookmarks.....

Continue for a clean install:

Remove all synced data from Chrome go here: http://www.howtogeek.com/103655/how-to-delete-your-google-chrome-browser-sync-data/ follow those instructions...

Uninstall Chrome: https://support.google.com/chrome/answer/95319?hl=en-GB follow those instructions, ensure the option to "Also delete your browsing data" is selected. <<--- Very important!!

Navigate to C:\Users\Your user name\Appdata\Local  from that folder delete the folder named Google (you will need to show hidden files/folders to see the folder Appdata)

How to show hidden files and folders for windows: http://www.howtogeek.com/howto/windows-vista/show-hidden-files-and-folders-in-windows-vista/

Install Google Chrome from here: https://www.google.com/intl/en_uk/chrome/browser/desktop/index.html

Install Adblock Plus to Chrome: https://chrome.google.com/webstore/detail/adblock-plus/cfhdojbkjhnklbpkdaibdccddilifddb
 

Thank you,

 

Kevin

Fixlist.txt

Link to post
Share on other sites

Hi Kevin i have attached all the files you requested ..... however the only thing i can find on my laptop that has anything to do with Google Chrome is a shortcut????

 

i have done a search with win uninstaller and revo uninstaller and there are no traces of google chrome installed just the short cut ... the only browser i use and have used for many years is firefox.

 

i don't use ..... google chrome ...... AOL .... ask or any browser associated .....Amazon ..... Netscape .... Safari and i don't even use IE only Firefox?

 

i don't use any products associated with linux debian ect and no apple products ..... windows and android only

 

 

Fixlog.txt

HitmanPro_20160117_1159.log

JRT.txt

mrt.log

Link to post
Share on other sites

  • Root Admin

C:\Users\Owner\Desktop\New folder\IObit Advanced SystemCare PRO 8.0.3.588 Final Incl. Crack [ATOM]\

C:\Users\Owner\Desktop\New folder\IObit Advanced SystemCare PRO 8.0.3.588 Final Incl. Crack [ATOM]\advanced-systemcare-setup.exe

C:\Users\Owner\Desktop\New folder\IObit Advanced SystemCare PRO 8.0.3.588 Final Incl. Crack [ATOM]\ATOM.Install.Notes.Readme.txt

C:\Users\Owner\Desktop\New folder\IObit Advanced SystemCare PRO 8.0.3.588 Final Incl. Crack [ATOM]\Crack\

C:\Users\Owner\Desktop\New folder\IObit Advanced SystemCare PRO 8.0.3.588 Final Incl. Crack [ATOM]\Crack\OFCommon.dll

C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\

C:\Users\Owner\Desktop\New folder\Other Windows 7 Activation Tools\7Loader 1.6.exe

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.