Having the same issues as many others with the continuous popups that won’t cease. Already ran Farbar Recovery Scan Tool and have the logs available. Please let me know if you can help - I will be grateful for any assistance on this one.
Already ran Farbar Recovery Scan Tool and have the logs available.attach logs ... We need those logs to be able to help you
Malware removal team will then assist you when online
Here you go.
FIRST >>>>
Please move FRST64.exe from Downloads to the Desktop. To do this, right click on the file in the Downloads folder (C:\Users\Home\Downloads) and select CUT. Then right click on a blank spot on your desktop and select PASTE.
I will return in a moment with a script to start repairs.
Did you get the Malwarebytes and aswMBR scans done yet?
SECOND >>>>
Open notepad by pressing the Windows Key + R Key, typing in Notepad in the Run dialog and then pressing Enter. Please copy the contents of the Code box below. To do this highlight the contents of the box by clicking [Select] next to Code: , then right click on any of the highlighted text and select copy. Paste this into the open notepad. Save it to your desktop as fixlist.txt
Start
CreateRestorePoint:
CloseProcesses:
HKLM-x32\...\Run: [] => [X]
Winlogon\Notify\DeviceNP-x32: DeviceNP.dll [X]
HKU\S-1-5-21-302004940-2661372876-3484607943-1001\...\MountPoints2: {2a9dcbce-8236-11e3-b743-48d2249cb4fd} - D:\VZW_Software_upgrade_assistant.exe
HKU\S-1-5-21-302004940-2661372876-3484607943-1001\...\MountPoints2: {9f64097a-56e7-11e5-900a-48d2249cb4fd} - D:\VZW_Software_upgrade_assistant.exe
HKU\S-1-5-21-302004940-2661372876-3484607943-1001\...\MountPoints2: {ef3a5554-ec54-11e3-ad78-48d2249cb4fd} - D:\VZW_Software_upgrade_assistant_installer.exe
HKU\S-1-5-21-302004940-2661372876-3484607943-1001\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
Startup: C:\Users\Home\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JL Victorian Calendar.lnk [2016-02-22]
ShortcutTarget: JL Victorian Calendar.lnk -> C:\Program Files (x86)\JL Victorian Calendar\JL Victorian Calendar.exe (No File)
C:\Program Files (x86)\JL Victorian Calendar
Hosts:
BHO-x32: File Sanitizer for HP ProtectTools -> {3134413B-49B4-425C-98A5-893C1F195601} -> C:\Program Files (x86)\Hewlett-Packard\File Sanitizer\IEBHO.dll => No File
Toolbar: HKLM - No Name - {CC1A175A-E45B-41ED-A30C-C9B1D7A0C02F} - No File
FF Plugin: @microsoft.com/GENUINE -> disabled [No File]
FF Plugin-x32: @microsoft.com/GENUINE -> disabled [No File]
CHR HomePage: Default -> hxxp://www.msn.com/en-us/?pc=__PARAM__&ocid=__PARAM__DHP
CHR DefaultSearchURL: Default -> hxxp://www.bing.com/search?FORM=__PARAM__DF&PC=__PARAM__&q={searchTerms}
CHR HKU\S-1-5-21-302004940-2661372876-3484607943-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [fcfenmboojpjinhpgggodefccipikbpd] - hxxps://clients2.google.com/service/update2/crx
C:\Users\Home\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpvhlzpu.dll
C:\Users\Home\AppData\Local\Temp\dsHostCheckerSetup.exe
C:\Users\Home\AppData\Local\Temp\e8_m56mr.dll
C:\Users\Home\AppData\Local\Temp\file.exe
C:\Users\Home\AppData\Local\Temp\i4jdel0.exe
C:\Users\Home\AppData\Local\Temp\JuniperSetupClientInstaller.exe
C:\Users\Home\AppData\Local\Temp\lrhodrf.dll
C:\Users\Home\AppData\Local\Temp\MouseKeyboardCenterx64_1033.exe
C:\Users\Home\AppData\Local\Temp\neoNCSetup64.exe
C:\Users\Home\AppData\Local\Temp\SkypeSetup.exe
CustomCLSID: HKU\S-1-5-21-302004940-2661372876-3484607943-1001_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32 -> rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 250 more characters). <==== Poweliks?
cmd: ipconfig /flushdns
cmd: netsh advfirewall reset
cmd: netsh advfirewall set allprofiles state on
Reg: reg delete HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
Reg: reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
CMD: bitsadmin /reset /allusers
RemoveProxy:
EmptyTemp:
Reboot:
end
NOTE. It’s important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
Run FRST64 by right clicking on the FRST64.exe file, selecting “Run as Administrator…”. The User Account Control may open up; if it does, select Yes to continue to let FRST open and load.
The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on. Press the Fix button just once and wait. The tool will create a restore point, process the script and ask for a restart of your system.
If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.
When finished FRST will generate a log on the Desktop (Fixlog.txt). Please attach it to your reply post. Also, tell me how your system is running now.
THIRD >>>>
Junkware Removal Tool
Please download JRT from here to your desktop.
Note: Temporarily disable/shut down your protection software now to avoid potential conflicts, how to do so can be read here.
Double click the JRT.exe file to run the application.
The application will open an Command Prompt window and run from there (this is normal for this program, so not to be alarmed).
When it is asked, press any key to allow the program to continue / run.
This will create a log on the desktop; please copy and paste the JRT.txt log text in your next post.
Note: After the log file is created, please enable your protection software / reboot your system and verify your protection software is enabled.
LAST >>>>
AdwCleaner by Xplode
Download AdwCleaner from here or from here. Save the file to the desktop.
NOTE: If you are using IE 8 or above you may get a warning that stops the program from downloading. Just click on the warning and allow the download to complete.
Close all open windows and browsers.
- [b]Vista/7/8 users:[/b] Right click the [b]AdwCleaner[/b] icon on the desktop, click [b]Run as administrator[/b] and accept the UAC prompt to run AdwCleaner.
You will see the following console:
- Click the [b]Scan[/b] button and wait for the scan to finish.
- After the Scan has finished the window may or may not show what it found and above, in the progress bar, you will see: [b]Waiting for action. Please uncheck elements you don't want to remove.[/b]
- Click the [b]Clean[/b] button.
- [b]Everything checked[/b] will be deleted.
- When the program has finished cleaning a report appears.
- Once done it will ask to reboot, allow this
- On reboot a log will be produced; please attach that in your next reply. This report is also saved to [b]C:\AdwCleaner\AdwCleaner[C0].txt[/b]
Optional:
NOTE: If you see AVG Secure Search being targeted for deletion, Here’s Why and Here. You can always Reinstall it.