Jump to content

Virus / Trojan or Windows Defender False Positive? (Trojan:Win32/Tiggre!rf)


Go to solution Solved by kevinf80,

Recommended Posts

My computer was acting a bit funny (Youtube video skipping and computer was slow and unresponsive while doing simple browsing) on Monday so I ran a Windows Defender virus scan.

A full scan found Trojan:Win32/Tiggre!rfn, but it was unable to remove it and only said it was “remediation incomplete”. I then ran a WD offline scan and it didn't come back with any messages.

I located the file(s) that WD said contained the virus and deleted them myself and then ran disk cleanup.

Following a post on the Microsoft forum, I ran the following:

Malwarebytes Full Scan: No viruses or malware found.

Malwarebytes ADWCleaner: No viruses or malware found.

Kapersky TDSSKiller: No viruses or malware found.

Microsoft Malicious Removal Tool: No viruses or malware found.

Another Microsoft stand alone tool (Forget the name): No viruses or malware found.

ESET Full System Scan: No viruses or malware found.

Downloaded and ran AVG Antivirus Free: No viruses or malware found.

I then ran another WD full scan today and still get the following for the third time (See attached images).

The only tool that still shows this virus is Windows Defender. So is it still there or is this a false positive? I'm wondering if WD just keeps finding it because it found it before (like not clearing a browser's cache)?

Please help, I have spent the past two days trying anything that I can to get rid of it. Any and all help is greatly appreciated!

1.png

2.png

Link to post
Share on other sites
Hello Mike22 and welcome to Malwarebytes,

Continue with the following:

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
 
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
    user posted image
     
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.


Let me see those logs in your reply...

Thank you,

Kevin....
Link to post
Share on other sites
  • Solution

Hiya Mike22,

Thanks for those logs, continue:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

user posted image

Next,

Open Malwarebytes, select > small cog wheel top right hand corner, that will open "settings" from there select "Security" tab.

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Clsoe out the settings window, this will take you back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
 
  • Click on the Detection History tab > from main interface.
  • Then click on "History" that will open to a historical list
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
 
  • Right-click on AdwCleaner.exe and select http://i.imgur.com/Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.

If your security alerts to this scan either accept the alert or turn off your security to allow Sophos to run and complete.....

Please Do Not use your PC whilst the scan is in progress.... This scan is very thorough so may take several hours...
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....



The Virus Removal Tool scans the following areas of your computer:
  • Memory, including system memory on 32-bit (x86) versions of Windows
  • The Windows registry
  • All local hard drives, fixed and removable
  • Mapped network drives are not scanned.


Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.

Let me see those logs in your reply...

Thank you,

Kevin..

fixlist.txt

Link to post
Share on other sites

Hiya Mike22,

No one can ever give you a 100% guarantee, all I can tell you is i`ve never bricked a system yet. When the first step is started FRST will create a Restore Point before making any changes to your system.

Cheers,

Kevin...

Link to post
Share on other sites

So I ran FRST and I've attached the log.

Malwarebytes: No viruses found.

ADWCleaner: No viruses found (Attached the log).

Sophos: No viruses found.

One of the programs (either Malwarebytes or Sophos) didn't make a log as there were no detections, let me know if you want me to try to get the log from the other one.

So should it be clean? I haven't ran Windows Defender again, so I don't know if it's still showing that detection or not.

FRST LOG:

Fix result of Farbar Recovery Scan Tool (x64) Version: 02-12-2020
Ran by M (03-12-2020 16:23:32) Run:1
Running from C:\Users\M\Downloads
Loaded Profiles: M
Boot Mode: Normal
==============================================

fixlist content:
*****************
SystemRestore: On
CreateRestorePoint:
CloseProcesses:
GroupPolicyScripts\User: Restriction <==== ATTENTION
HKLM\SOFTWARE\Policies\Mozilla\Firefox: Restriction <==== ATTENTION
Task: {258A16CC-63E8-4ADA-96B0-B0F15C95EE52} - \Microsoft\Windows\Setup\gwx\refreshgwxcontent -> No File <==== ATTENTION
Search & Destroy 2\SDImmunize.exe [7192192 2018-04-20] (Safer-Networking Ltd. -> Safer-Networking Ltd.)
Task: {5C504037-BC24-4191-956C-25D31B0A04DF} - \SystemToolsDailyTest -> No File <==== ATTENTION
Task: {6559AE14-4B49-4A2C-B7C0-A69698E4D451} - \Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent -> No File <==== ATTENTION
Task: {920F1925-A92E-4C98-9823-308866143EDE} - \Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B -> No File <==== ATTENTION
Task: {A89F5BE3-79CE-49D6-ABD4-295D577C4910} - \Microsoft\Windows\UNP\RunCampaignManager -> No File <==== ATTENTION
Task: {C20DC73D-D9D2-4157-BDF0-3589DDC8AF1F} - \PCDEventLauncherTask -> No File <==== ATTENTION
Task: {D9B263CF-63E3-4549-9B5E-55FDAFE318AA} - \Microsoft\Windows\Setup\gwx\refreshgwxconfig -> No File <==== ATTENTION
Task: {DCDD66F4-933D-4B28-A7E1-B8005803EECE} - \Microsoft\Windows\Setup\gwx\launchtrayprocess -> No File <==== ATTENTION
S4 Dell Customer Connect; "C:\Program Files (x86)\Dell Customer Connect\DCCService.exe" [X]
S4 Dell Help & Support; "C:\Program Files\Dell\Dell Help & Support\MDLCSvc.exe" [X]
S4 DellClientManagementService; "C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe" [X]
S4 gupdate; "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc [X]
S4 gupdatem; "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /medsvc [X]
ShellIconOverlayIdentifiers: [00asw] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ShellIconOverlayIdentifiers: [00avg] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ContextMenuHandlers1: [7-Zip] -> {23170F69-40C1-278A-1000-000100020000} => -> No File
ContextMenuHandlers1: [BB FlashBack 2] -> {A8065B9E-193F-4797-B62D-8F6321E7FCCB} => -> No File
ContextMenuHandlers1: [BriefcaseMenu] -> {85BBD920-42A0-1069-A2E4-08002B30309D} => -> No File
ContextMenuHandlers1: [QuickShare] -> {A8065B9E-193F-4797-B62D-8F6321E7FCCB} => -> No File
ContextMenuHandlers3: [00avg] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ContextMenuHandlers3: [{4A7C4306-57E0-4C0C-83A9-78C1528F618C}] -> {4A7C4306-57E0-4C0C-83A9-78C1528F618C} => -> No File
ContextMenuHandlers4: [7-Zip] -> {23170F69-40C1-278A-1000-000100020000} => -> No File
ContextMenuHandlers4: [Offline Files] -> {474C98EE-CF3D-41f5-80E3-4AAB0AB04301} => -> No File
ContextMenuHandlers5: [igfxcui] -> {3AB1675A-CCFF-11D2-8B20-00A0C93CB1F4} => -> No File
ContextMenuHandlers6: [BriefcaseMenu] -> {85BBD920-42A0-1069-A2E4-08002B30309D} => -> No File
ContextMenuHandlers6: [Offline Files] -> {474C98EE-CF3D-41f5-80E3-4AAB0AB04301} => -> No File
SearchScopes: HKU\.DEFAULT -> DefaultScope {50902AD9-69B3-42D3-A6EF-C4849D3B0C61} URL =
SearchScopes: HKU\S-1-5-21-3388305930-2408197943-2136162899-1001 -> DefaultScope {50902AD9-69B3-42D3-A6EF-C4849D3B0C61} URL =
SearchScopes: HKU\S-1-5-21-3388305930-2408197943-2136162899-1001 -> {50902AD9-69B3-42D3-A6EF-C4849D3B0C61} URL =
BHO: True Key Helper -> {0F4B8786-5502-4803-8EBC-F652A1153BB6} -> C:\Program Files\Intel Security\True Key\MSIE\truekey_ie64.dll => No File
BHO: No Name -> {FD9D9B6E-8D8D-4191-B997-2BCBBB982F1E}' -> No File
BHO-x32: No Name -> {FD9D9B6E-8D8D-4191-B997-2BCBBB982F1E}' -> No File
Toolbar: HKLM - True Key - {4BAAC1B8-0800-42C9-8FA6-08B211F356B8} - C:\Program Files\Intel Security\True Key\MSIE\truekey_ie64.dll No File
FirewallRules: [{B7F52FB2-B8F9-4A58-8448-DFACE912D5A4}] => (Allow) C:\Program Files\CCleaner\CCUpdate.exe => No File
FirewallRules: [{070B4403-847F-444B-815F-E23F6AB403D9}] => (Allow) C:\Program Files\CCleaner\CCUpdate.exe => No File
FirewallRules: [{6DF2C01A-826D-4A61-90B9-7DC0C554E87B}] => (Allow) C:\Program Files (x86)\GSA Search Engine Ranker1\Search_Engine_Ranker.exe => No File
FirewallRules: [{226EFCFA-52F8-411D-B6E6-4AF4D773359A}] => (Allow) C:\Program Files (x86)\GSA Search Engine Ranker1\Search_Engine_Ranker.exe => No File
FirewallRules: [{06CC8FA7-DBDD-4AA7-8C12-41E66B1F00C8}] => (Allow) C:\Program Files (x86)\GSA Search Engine Ranker1\Search_Engine_Ranker.exe => No File
FirewallRules: [{144C7C40-86E5-4C9D-A80A-4F2395F0D62B}] => (Allow) C:\GSA\Search_Engine_Ranker.exe => No File
FirewallRules: [{C123D310-958E-4AEB-94FF-ED54B3539931}] => (Allow) C:\GSA\Search_Engine_Ranker.exe => No File
FirewallRules: [{E7B9B99F-FF34-4A8D-86B5-0A594691ECCE}] => (Allow) C:\GSA\Search_Engine_Ranker.exe => No File
FirewallRules: [{8D58D8E8-F2F0-4977-A64B-D37F003723E0}] => (Allow) C:\Program Files (x86)\BlueStacks\HD-Player.exe => No File
FirewallRules: [{1A813BD0-410A-4829-A454-F71D2DF60414}] => (Allow) C:\Program Files (x86)\Bignox\BigNoxVM\RT\NoxVMHandle.exe => No File
FirewallRules: [{8AA723D1-CBBF-4AA4-92C9-4DFE592388BC}] => (Allow) C:\Program Files (x86)\Nox\bin\Nox.exe => No File
FirewallRules: [{77CFF246-14EB-421F-9EB3-20C3FD407C60}] => (Block) C:\program files\android\android studio\jre\bin\java.exe => No File
FirewallRules: [{A1C44E4C-04E4-4C95-BF4E-9E52F4C5F368}] => (Block) C:\program files\android\android studio\jre\bin\java.exe => No File
FirewallRules: [UDP Query User{2188FB98-B1D1-42CE-BD41-D75C271D1E8F}C:\program files\android\android studio\jre\bin\java.exe] => (Allow) C:\program files\android\android studio\jre\bin\java.exe => No File
FirewallRules: [TCP Query User{D7DB9108-93BA-43D4-978B-59D64464F44F}C:\program files\android\android studio\jre\bin\java.exe] => (Allow) C:\program files\android\android studio\jre\bin\java.exe => No File
FirewallRules: [UDP Query User{2E33B99E-145E-457A-BA71-4C926A6633C1}C:\program files\openshot video editor\launch.exe] => (Allow) C:\program files\openshot video editor\launch.exe => No File
FirewallRules: [TCP Query User{4F12DAD0-3A40-42A2-AA06-D0E089FA8D08}C:\program files\openshot video editor\launch.exe] => (Allow) C:\program files\openshot video editor\launch.exe => No File
FirewallRules: [UDP Query User{D8F8F997-E698-4A36-B9E2-5232EE231580}C:\program files (x86)\soundwire server\soundwireserver.exe] => (Allow) C:\program files (x86)\soundwire server\soundwireserver.exe => No File
FirewallRules: [TCP Query User{02C7F10D-E5F2-4F61-A544-5ECF72196A79}C:\program files (x86)\soundwire server\soundwireserver.exe] => (Allow) C:\program files (x86)\soundwire server\soundwireserver.exe => No File
FirewallRules: [{151D2286-C1BA-4582-B22E-E5F2CA477ACF}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe => No File
FirewallRules: [{587024D9-56EB-4BA2-A7D6-EA2797BB676C}] => (Allow) C:\Program Files (x86)\Steam\bin\steamwebhelper.exe => No File
FirewallRules: [{6218AAB3-412B-4650-B889-9FC99E93CF81}] => (Allow) C:\Program Files (x86)\Steam\bin\cef\cef.win7\steamwebhelper.exe => No File
FirewallRules: [{A943A0E9-0BEB-4702-887B-9F8953EAB4B1}] => (Allow) C:\Program Files (x86)\Steam\bin\cef\cef.win7\steamwebhelper.exe => No File
FirewallRules: [TCP Query User{03C03C5E-8BBC-44FB-AC37-EDFB9CFFDA74}C:\program files (x86)\fldigi-4.1.14\fldigi.exe] => (Allow) C:\program files (x86)\fldigi-4.1.14\fldigi.exe => No File
FirewallRules: [UDP Query User{660F82D9-29FF-4DF6-A1F8-7103B7715B7B}C:\program files (x86)\fldigi-4.1.14\fldigi.exe] => (Allow) C:\program files (x86)\fldigi-4.1.14\fldigi.exe => No File
FirewallRules: [TCP Query User{03C03C5E-8BBC-44FB-AC37-EDFB9CFFDA74}C:\program files (x86)\fldigi-4.1.14\fldigi.exe] => (Allow) C:\program files (x86)\fldigi-4.1.14\fldigi.exe => No File
FirewallRules: [UDP Query User{660F82D9-29FF-4DF6-A1F8-7103B7715B7B}C:\program files (x86)\fldigi-4.1.14\fldigi.exe] => (Allow) C:\program files (x86)\fldigi-4.1.14\fldigi.exe => No File
C:\Users\M\Downloads\5f67e532b162c-thepunisher
RemoveProxie:
Hosts:
cmd: sfc /scannow
C:\Windows\Temp\*.*
EmptyTemp:

*****************

SystemRestore: On => completed
Restore point was successfully created.
Processes closed successfully.
C:\WINDOWS\system32\GroupPolicy\User => moved successfully
C:\WINDOWS\system32\GroupPolicy\GPT.ini => moved successfully
HKLM\SOFTWARE\Policies\Mozilla => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{258A16CC-63E8-4ADA-96B0-B0F15C95EE52}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{258A16CC-63E8-4ADA-96B0-B0F15C95EE52}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxcontent" => removed successfully
Search & Destroy 2\SDImmunize.exe [7192192 2018-04-20] (Safer-Networking Ltd. -> Safer-Networking Ltd.) => Error: No automatic fix found for this entry.
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{5C504037-BC24-4191-956C-25D31B0A04DF}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{5C504037-BC24-4191-956C-25D31B0A04DF}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\SystemToolsDailyTest" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{6559AE14-4B49-4A2C-B7C0-A69698E4D451}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6559AE14-4B49-4A2C-B7C0-A69698E4D451}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{920F1925-A92E-4C98-9823-308866143EDE}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{920F1925-A92E-4C98-9823-308866143EDE}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{A89F5BE3-79CE-49D6-ABD4-295D577C4910}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{A89F5BE3-79CE-49D6-ABD4-295D577C4910}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UNP\RunCampaignManager" => not found
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C20DC73D-D9D2-4157-BDF0-3589DDC8AF1F}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C20DC73D-D9D2-4157-BDF0-3589DDC8AF1F}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\PCDEventLauncherTask" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{D9B263CF-63E3-4549-9B5E-55FDAFE318AA}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{D9B263CF-63E3-4549-9B5E-55FDAFE318AA}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\refreshgwxconfig" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{DCDD66F4-933D-4B28-A7E1-B8005803EECE}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{DCDD66F4-933D-4B28-A7E1-B8005803EECE}" => removed successfully
"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Setup\gwx\launchtrayprocess" => removed successfully
HKLM\System\CurrentControlSet\Services\Dell Customer Connect => removed successfully
Dell Customer Connect => service removed successfully
HKLM\System\CurrentControlSet\Services\Dell Help & Support => removed successfully
Dell Help & Support => service removed successfully
HKLM\System\CurrentControlSet\Services\DellClientManagementService => removed successfully
DellClientManagementService => service removed successfully
HKLM\System\CurrentControlSet\Services\gupdate => removed successfully
gupdate => service removed successfully
HKLM\System\CurrentControlSet\Services\gupdatem => removed successfully
gupdatem => service removed successfully
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\00asw => removed successfully
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\00avg => removed successfully
HKLM\Software\Classes\*\ShellEx\ContextMenuHandlers\7-Zip => removed successfully
HKLM\Software\Classes\*\ShellEx\ContextMenuHandlers\BB FlashBack 2 => removed successfully
HKLM\Software\Classes\*\ShellEx\ContextMenuHandlers\BriefcaseMenu => removed successfully
"HKLM\Software\Classes\CLSID\{85BBD920-42A0-1069-A2E4-08002B30309D}" => removed successfully
HKLM\Software\Classes\*\ShellEx\ContextMenuHandlers\QuickShare => removed successfully
HKLM\Software\Classes\AllFileSystemObjects\ShellEx\ContextMenuHandlers\00avg => removed successfully
HKLM\Software\Classes\AllFileSystemObjects\ShellEx\ContextMenuHandlers\{4A7C4306-57E0-4C0C-83A9-78C1528F618C} => removed successfully
HKLM\Software\Classes\Directory\ShellEx\ContextMenuHandlers\7-Zip => removed successfully
HKLM\Software\Classes\Directory\ShellEx\ContextMenuHandlers\Offline Files => removed successfully
HKLM\Software\Classes\Directory\Background\ShellEx\ContextMenuHandlers\igfxcui => removed successfully
HKLM\Software\Classes\Folder\ShellEx\ContextMenuHandlers\BriefcaseMenu => removed successfully
HKLM\Software\Classes\Folder\ShellEx\ContextMenuHandlers\Offline Files => removed successfully
"HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope" => removed successfully
"HKU\S-1-5-21-3388305930-2408197943-2136162899-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope" => removed successfully
HKU\S-1-5-21-3388305930-2408197943-2136162899-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{50902AD9-69B3-42D3-A6EF-C4849D3B0C61} => removed successfully
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0F4B8786-5502-4803-8EBC-F652A1153BB6} => removed successfully
HKLM\Software\Classes\CLSID\{0F4B8786-5502-4803-8EBC-F652A1153BB6} => removed successfully
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD9D9B6E-8D8D-4191-B997-2BCBBB982F1E}' => removed successfully
HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD9D9B6E-8D8D-4191-B997-2BCBBB982F1E}' => removed successfully
"HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\\{4BAAC1B8-0800-42C9-8FA6-08B211F356B8}" => removed successfully
HKLM\Software\Classes\CLSID\{4BAAC1B8-0800-42C9-8FA6-08B211F356B8} => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{B7F52FB2-B8F9-4A58-8448-DFACE912D5A4}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{070B4403-847F-444B-815F-E23F6AB403D9}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{6DF2C01A-826D-4A61-90B9-7DC0C554E87B}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{226EFCFA-52F8-411D-B6E6-4AF4D773359A}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{06CC8FA7-DBDD-4AA7-8C12-41E66B1F00C8}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{144C7C40-86E5-4C9D-A80A-4F2395F0D62B}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{C123D310-958E-4AEB-94FF-ED54B3539931}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{E7B9B99F-FF34-4A8D-86B5-0A594691ECCE}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{8D58D8E8-F2F0-4977-A64B-D37F003723E0}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{1A813BD0-410A-4829-A454-F71D2DF60414}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{8AA723D1-CBBF-4AA4-92C9-4DFE592388BC}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{77CFF246-14EB-421F-9EB3-20C3FD407C60}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{A1C44E4C-04E4-4C95-BF4E-9E52F4C5F368}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\UDP Query User{2188FB98-B1D1-42CE-BD41-D75C271D1E8F}C:\program files\android\android studio\jre\bin\java.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\TCP Query User{D7DB9108-93BA-43D4-978B-59D64464F44F}C:\program files\android\android studio\jre\bin\java.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\UDP Query User{2E33B99E-145E-457A-BA71-4C926A6633C1}C:\program files\openshot video editor\launch.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\TCP Query User{4F12DAD0-3A40-42A2-AA06-D0E089FA8D08}C:\program files\openshot video editor\launch.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\UDP Query User{D8F8F997-E698-4A36-B9E2-5232EE231580}C:\program files (x86)\soundwire server\soundwireserver.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\TCP Query User{02C7F10D-E5F2-4F61-A544-5ECF72196A79}C:\program files (x86)\soundwire server\soundwireserver.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{151D2286-C1BA-4582-B22E-E5F2CA477ACF}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{587024D9-56EB-4BA2-A7D6-EA2797BB676C}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{6218AAB3-412B-4650-B889-9FC99E93CF81}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\{A943A0E9-0BEB-4702-887B-9F8953EAB4B1}" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\TCP Query User{03C03C5E-8BBC-44FB-AC37-EDFB9CFFDA74}C:\program files (x86)\fldigi-4.1.14\fldigi.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\UDP Query User{660F82D9-29FF-4DF6-A1F8-7103B7715B7B}C:\program files (x86)\fldigi-4.1.14\fldigi.exe" => removed successfully
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\TCP Query User{03C03C5E-8BBC-44FB-AC37-EDFB9CFFDA74}C:\program files (x86)\fldigi-4.1.14\fldigi.exe" => not found
"HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\\UDP Query User{660F82D9-29FF-4DF6-A1F8-7103B7715B7B}C:\program files (x86)\fldigi-4.1.14\fldigi.exe" => not found
C:\Users\M\Downloads\5f67e532b162c-thepunisher => moved successfully
RemoveProxie: => Error: No automatic fix found for this entry.
C:\Windows\System32\Drivers\etc\hosts => moved successfully
Hosts restored successfully.

========= sfc /scannow =========

 

Beginning system scan.  This process will take some time.

 

Beginning verification phase of system scan.


Verification 0% complete.
Verification 1% complete.
Verification 1% complete.
Verification 2% complete.
Verification 3% complete.
Verification 3% complete.
Verification 4% complete.
Verification 4% complete.
Verification 5% complete.
Verification 6% complete.
Verification 6% complete.
Verification 7% complete.
Verification 8% complete.
Verification 8% complete.
Verification 9% complete.
Verification 9% complete.
Verification 10% complete.
Verification 11% complete.
Verification 11% complete.
Verification 12% complete.
Verification 13% complete.
Verification 13% complete.
Verification 14% complete.
Verification 14% complete.
Verification 15% complete.
Verification 16% complete.
Verification 16% complete.
Verification 17% complete.
Verification 18% complete.
Verification 18% complete.
Verification 19% complete.
Verification 19% complete.
Verification 20% complete.
Verification 21% complete.
Verification 21% complete.
Verification 22% complete.
Verification 23% complete.
Verification 23% complete.
Verification 24% complete.
Verification 24% complete.
Verification 25% complete.
Verification 26% complete.
Verification 26% complete.
Verification 27% complete.
Verification 28% complete.
Verification 28% complete.
Verification 29% complete.
Verification 29% complete.
Verification 30% complete.
Verification 31% complete.
Verification 31% complete.
Verification 32% complete.
Verification 32% complete.
Verification 33% complete.
Verification 34% complete.
Verification 34% complete.
Verification 35% complete.
Verification 36% complete.
Verification 36% complete.
Verification 37% complete.
Verification 37% complete.
Verification 38% complete.
Verification 39% complete.
Verification 39% complete.
Verification 40% complete.
Verification 41% complete.
Verification 41% complete.
Verification 42% complete.
Verification 42% complete.
Verification 43% complete.
Verification 44% complete.
Verification 44% complete.
Verification 45% complete.
Verification 46% complete.
Verification 46% complete.
Verification 47% complete.
Verification 47% complete.
Verification 48% complete.
Verification 49% complete.
Verification 49% complete.
Verification 50% complete.
Verification 51% complete.
Verification 51% complete.
Verification 52% complete.
Verification 52% complete.
Verification 53% complete.
Verification 54% complete.
Verification 54% complete.
Verification 55% complete.
Verification 56% complete.
Verification 56% complete.
Verification 57% complete.
Verification 57% complete.
Verification 58% complete.
Verification 59% complete.
Verification 59% complete.
Verification 60% complete.
Verification 61% complete.
Verification 61% complete.
Verification 62% complete.
Verification 62% complete.
Verification 63% complete.
Verification 64% complete.
Verification 64% complete.
Verification 65% complete.
Verification 65% complete.
Verification 66% complete.
Verification 67% complete.
Verification 67% complete.
Verification 68% complete.
Verification 69% complete.
Verification 69% complete.
Verification 70% complete.
Verification 70% complete.
Verification 71% complete.
Verification 72% complete.
Verification 72% complete.
Verification 73% complete.
Verification 74% complete.
Verification 74% complete.
Verification 75% complete.
Verification 75% complete.
Verification 76% complete.
Verification 77% complete.
Verification 77% complete.
Verification 78% complete.
Verification 79% complete.
Verification 79% complete.
Verification 80% complete.
Verification 80% complete.
Verification 81% complete.
Verification 82% complete.
Verification 82% complete.
Verification 83% complete.
Verification 84% complete.
Verification 84% complete.
Verification 85% complete.
Verification 85% complete.
Verification 86% complete.
Verification 87% complete.
Verification 87% complete.
Verification 88% complete.
Verification 89% complete.
Verification 89% complete.
Verification 90% complete.
Verification 90% complete.
Verification 91% complete.
Verification 92% complete.
Verification 92% complete.
Verification 93% complete.
Verification 93% complete.
Verification 94% complete.
Verification 95% complete.
Verification 95% complete.
Verification 96% complete.
Verification 97% complete.
Verification 97% complete.
Verification 98% complete.
Verification 98% complete.
Verification 99% complete.
Verification 100% complete.


Windows Resource Protection did not find any integrity violations.


========= End of CMD: =========


=========== "C:\Windows\Temp\*.*" ==========

C:\Windows\Temp\AdobeARM.log => moved successfully
C:\Windows\Temp\mat-debug-10368.log => moved successfully
C:\Windows\Temp\mat-debug-10492.log => moved successfully
C:\Windows\Temp\mat-debug-12484.log => moved successfully
C:\Windows\Temp\mat-debug-1716.log => moved successfully
C:\Windows\Temp\mat-debug-1816.log => moved successfully
C:\Windows\Temp\mat-debug-1944.log => moved successfully
C:\Windows\Temp\mat-debug-2260.log => moved successfully
C:\Windows\Temp\mat-debug-2708.log => moved successfully
C:\Windows\Temp\mat-debug-3228.log => moved successfully
C:\Windows\Temp\mat-debug-4436.log => moved successfully
C:\Windows\Temp\mat-debug-4548.log => moved successfully
C:\Windows\Temp\mat-debug-6756.log => moved successfully
C:\Windows\Temp\mat-debug-6880.log => moved successfully
C:\Windows\Temp\mat-debug-7084.log => moved successfully
C:\Windows\Temp\mat-debug-7968.log => moved successfully
C:\Windows\Temp\mat-debug-8032.log => moved successfully
C:\Windows\Temp\mat-debug-8040.log => moved successfully
C:\Windows\Temp\mat-debug-8596.log => moved successfully
C:\Windows\Temp\mat-debug-8684.log => moved successfully
C:\Windows\Temp\mat-debug-9160.log => moved successfully
C:\Windows\Temp\mat-debug-9460.log => moved successfully
C:\Windows\Temp\mbamiservice.log => moved successfully
C:\Windows\Temp\mb_errors1912.log => moved successfully
C:\Windows\Temp\mb_errors3672.log => moved successfully
C:\Windows\Temp\mb_errors800.log => moved successfully
C:\Windows\Temp\MpCmdRun.log => moved successfully
C:\Windows\Temp\MpSigStub.log => moved successfully
C:\Windows\Temp\TSpybotUpdaterThread.log => moved successfully

========= End -> "C:\Windows\Temp\*.*" ========


=========== EmptyTemp: ==========

BITS transfer queue => 11821056 B
DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 51786487 B
Java, Flash, Steam htmlcache => 85881387 B
Windows/system/drivers => 25129537 B
Edge => 18159 B
Chrome => 182189744 B
Firefox => 2202276964 B
Opera => 0 B

Temp, IE cache, history, cookies, recent:
Default => 0 B
Users => 0 B
ProgramData => 0 B
Public => 0 B
systemprofile => 0 B
systemprofile32 => 0 B
LocalService => 61490 B
NetworkService => 36331790 B
M => 61611373 B

RecycleBin => 2433292358 B
EmptyTemp: => 4.7 GB temporary data Removed.

================================


The system needed a reboot.

==== End of Fixlog 16:58:25 ====

 

 

AWDCLEANER LOG:

# -------------------------------
# Malwarebytes AdwCleaner 8.0.8.0
# -------------------------------
# Build:    10-08-2020
# Database: 2020-11-23.1 (Cloud)
# Support:  https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Scan
# -------------------------------
# Start:    12-03-2020
# Duration: 00:01:10
# OS:       Windows 10 Home
# Scanned:  31920
# Detected: 0


***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

No malicious folders found.

***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

No malicious registry entries found.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries found.

***** [ Chromium URLs ] *****

No malicious Chromium URLs found.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries found.

***** [ Firefox URLs ] *****

No malicious Firefox URLs found.

***** [ Hosts File Entries ] *****

No malicious hosts file entries found.

***** [ Preinstalled Software ] *****

No Preinstalled Software found.


AdwCleaner[S00].txt - [6519 octets] - [01/12/2020 14:44:31]
AdwCleaner[C00].txt - [6834 octets] - [01/12/2020 18:10:51]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S01].txt ##########

 

 

 

 

 

 

 

 

Link to post
Share on other sites

Hiya Mike22,

Run one more scan please:

Download "Microsoft's Safety Scanner" and save direct to the desktop
 
Ensure to get the correct version for your system....

https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download


Right click on the Tool, select Run as Administrator the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.


Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\msert.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....
 
Thanks,
 
Kevin...
Link to post
Share on other sites

Thanks, I ran the scan and got the following:

Microsoft Safety Scanner v1.0, (build 1.327.2118.0)
Started On Sat Dec 05 14:32:34 2020
->Scan ERROR: resource process://pid:96,ProcessStart:132516687075578766 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:512,ProcessStart:132516687163024054 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:720,ProcessStart:132516687362301537 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:804,ProcessStart:132516687367148537 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:812,ProcessStart:132516687367253458 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:912,ProcessStart:132516687367987901 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:2156,ProcessStart:132516687384018699 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:2220,ProcessStart:132516687384880910 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:3440,ProcessStart:132516687431273268 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:4284,ProcessStart:132516687507945509 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:9808,ProcessStart:132516689152613440 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:6900,ProcessStart:132516689853782802 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:7664,ProcessStart:132516691120752277 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:10464,ProcessStart:132516691833388954 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:10724,ProcessStart:132516702792051185 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:10724,ProcessStart:132516702792051185 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:3440,ProcessStart:132516687431273268 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:10464,ProcessStart:132516691833388954 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:2156,ProcessStart:132516687384018699 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:7664,ProcessStart:132516691120752277 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:9808,ProcessStart:132516689152613440 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:6900,ProcessStart:132516689853782802 (code 0x00000005 (5))
->Scan ERROR: resource process://pid:4284,ProcessStart:132516687507945509 (code 0x00000005 (5))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\hiberfil.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\pagefile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\swapfile.sys (code 0x00000021 (33))
->Scan ERROR: resource file://C:\swapfile.sys (code 0x00000021 (33))

Quick Scan Results for 2CD792FB-5244-4B93-9B9A-C967A08C7E84:
----------------
Threat detected: VirTool:Win32/DefenderTamperingRestore
    regkeyvalue://hklm\software\microsoft\windows defender\\DisableAntiSpyware
        SigSeq: 0x0000055555C57273

Quick Scan Removal Results
----------------
Start 'remove' for regkeyvalue://hklm\software\microsoft\windows defender\\DisableAntiSpyware
Operation succeeded !


Results Summary:
----------------
Found VirTool:Win32/DefenderTamperingRestore and Removed!

 

 

Link to post
Share on other sites

So here's an update:

My computer was acting funny today (like it was when I originally started running scans). Basically the touch pad seems hard / strange to move and it seems to sometimes click on it's own (closing a window that the cursor was just hovering over the X in the upper right corner). So I ran a WD full scan and it picked up the same thing again.

Every time I try to remove it, it says that it hasn't fully removed it. What should I do now?

3.png

3 2.png

Link to post
Share on other sites

Hiya Mike22,

Those entries flagged by WD are in the FRST quarantine folder so were infact quite safe. That folder is protected hence WD could not remove the flagged entries.. They would however be removed when we remove FRST when we are satisfied your system is ok...

Reboot your system twice, see if that makes any difference to your touchpad, if not you could open Device manager and check to see if your touchpad needs a driver update...

Continue to clean up tools etc, when complete reboot again....

Uninstall the following program:

Sophos AV

http://www.askvg.com/how-to-completely-uninstall-remove-a-software-program-in-windows-without-using-3rd-party-software/

Also delete this folder if still present: C:\ProgramData\Sophos

Next,

Right click on FRST here: C:\Users\M\Downloads\FRST.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator"

If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST to uninstall

That action will remove FRST and all created files and folders...

Next,

Remove all System Restore Points: https://www.tenforums.com/tutorials/33593-delete-system-restore-points-windows-10-a.html#option2

Create clean fresh Restore Point: http://www.thewindowsclub.com/create-system-restore-point

Run Windows Disk Clean Up Utility - https://neosmart.net/wiki/disk-cleanup/

Malwarebytes Browser Guard (Free) for Firefox: https://addons.mozilla.org/en-GB/firefox/addon/malwarebytes/

Malwarebytes Browser Guard (Free) for Chrome: https://chrome.google.com/webstore/detail/malwarebytes-browser-guar/ihcjicgdanjaechkgeegckofjjedodee

PatchMyPC, keep all your software upto date - https://patchmypc.com/home-updater#download

From there you should be good to go...

Next,

Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Kevin... user posted image

 

Link to post
Share on other sites

Hiya Mike22,

You can keep Sophos, that choice is yours. I just give the option to remove stuff we have used...

If a system has been infected we always make fixes with FRST after analysing the primary logs. Before a fix is started FRST will create a new restore point, obvioulsy that RP is not clean, also any other previously created RP will be the same, if system restore is used the OS would be infected again. When fixing a PC a bad restore point is better than no restore point should the need arise. Obviously when the system is deemed clean it is the best way forward to remove all RP`s and create a fresh clean one...

Thanks,

Kevin...

Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.