So Many ads and Pups!

Discussion in 'Malware Help (A Specialist Will Reply)' started by lazaruss, May 6, 2014.

  1. lazaruss

    lazaruss Private E-2

    Hey chaps!

    Before I say anything I would like to stress that this is not my laptop, it is a friends kids! This laptop was so full of popups and pups it was totally unusable! it was quite impressive really! :confused

    Anyway, the scans seem to have fixed the main issues but I suspect with the amount of popups and pups there were there's a lot more to be removed.

    Im afraid I had to zip up hitman pro logs as it was over the forum limit!yeah, there were alot of alerts! :confused

    Thanks
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes still alot to do.

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\elliott\Desktop\Torch.lnk
    C:\Users\elliott\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Torch.lnk
    C:\Users\elliott\AppData\LocalLow\MySearchDial
    C:\ProgramData\BitGuard
    C:\Program Files (x86)\AdTrustMedia
    C:\Program Files (x86)\MediaBuzzV1
    C:\Program Files (x86)\MediaViewV1
    C:\Program Files (x86)\MediaWatchV1
    C:\Program Files (x86)\Mobogenie
    C:\Program Files (x86)\Music Toolbar
    C:\Program Files (x86)\Nosibay
    C:\ProgramData\BrowserProtect
    C:\Users\elliott\AppData\Local\Mobogenie
    C:\Users\elliott\AppData\LocalLow\DataMngr
    C:\Users\elliott\AppData\LocalLow\IminentToolbar
    C:\Users\elliott\Documents\Optimizer Pro
    C:\Users\elliott\AppData\Local\Torch
    C:\ProgramData\Adtrustmedia
    C:\ProgramData\boost_interprocess
    C:\ProgramData\TorchCrashHandler
    C:\ProgramData\Updater
    C:\ProgramData\Wincert
    C:\ProgramData\RHelpers
    C:\Users\elliott\AppData\Local\Pokki
    C:\Users\elliott\AppData\Local\Temp\*.*
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{C292AD0A-C11F-479B-B8DB-743E72D283B0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{C292AD0A-C11F-479B-B8DB-743E72D283B0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4ED063C9-4A0B-4B44-A9DC-23AFF424A0D3}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C358B3D0-B911-41E3-A276-E7D43A6BA56D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\MySearchDial]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\escort.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\escortEng.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\esrv.EXE]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8E9F2D02-6B06-4EBA-92C2-68438EADED28}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\i]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{050000CE-F9D5-4145-9490-DB9E7E40FDF9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1B730ACF-26A3-447B-9994-14AEE0EB72CC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{476DAA21-E0C3-4EEB-B27B-5F4123334ABA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{7DE6769A-E482-4AB7-8ED9-0CAFEA11D687}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{813F8915-C940-44ED-ADED-8B782D85FA87}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8D182E50-D646-49FF-B518-34B09BDF5375}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9563917C-2D1F-4E92-A90F-01E470099B68}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{A182C848-76B5-4473-B742-A688D38982A1}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AC5C40D0-DC3A-4406-A35C-9102C5FA4D7E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C336533A-5E74-457F-AD87-9598F4AADF49}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C8C14216-4D34-4866-B66E-BC25B98FCCCA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E54B3747-7507-43B0-8537-A64189F28B35}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F761BABE-0622-4DCE-A1B0-9D1BCA75DFEF}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F98F0DE1-9B6F-4C87-8E08-6EE5928D8558}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{05660A04-00F1-3A04-AB3B-BC1074B84D67}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{37AC0F3B-749F-3B22-811B-5A019EED2E85}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{4392A6CC-7940-310E-8E16-799A8D93A438}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{66DF7821-ED6D-3534-893C-0E89E74B0F91}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{755CAFCC-F016-3B06-8F22-945EAA3AD10D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{76552F88-640C-314D-82B6-0D8A740907F7}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{903F9872-E87F-3B74-83B0-DBE10073B29D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{9558EEB4-CDA6-3778-B53B-98076F0A1E90}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{B25AA9BA-FD52-3E5E-BFE3-9B106779DA6E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{C852CF9F-37DC-35AC-926A-7E6CFFF7C501}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{C9777796-4378-3C90-B52D-7238FFFC2A5C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{DB1BC8B2-FDBF-30E7-BE1C-AFF9160059E6}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{F3D5729C-7DEB-3850-A026-D0E323ECFEF5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Record\{FEC70973-CB8B-351C-8047-CAE1274CE249}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{5563BEFE-3B03-43B1-8041-64A9745DAA56}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{6A4BCABA-C437-4C76-A54E-AF31B8A76CB9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8E9F2D02-6B06-4EBA-92C2-68438EADED28}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\escort.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\escortEng.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\esrv.EXE]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{8E9F2D02-6B06-4EBA-92C2-68438EADED28}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{99E71BF1-5F51-4AF9-830B-67015D59640D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9FD0C1D9-180B-4834-B80B-4B7325AF90E1}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{050000CE-F9D5-4145-9490-DB9E7E40FDF9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1B730ACF-26A3-447B-9994-14AEE0EB72CC}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{476DAA21-E0C3-4EEB-B27B-5F4123334ABA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7DE6769A-E482-4AB7-8ED9-0CAFEA11D687}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{813F8915-C940-44ED-ADED-8B782D85FA87}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8D182E50-D646-49FF-B518-34B09BDF5375}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9563917C-2D1F-4E92-A90F-01E470099B68}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A182C848-76B5-4473-B742-A688D38982A1}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AC5C40D0-DC3A-4406-A35C-9102C5FA4D7E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C336533A-5E74-457F-AD87-9598F4AADF49}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C8C14216-4D34-4866-B66E-BC25B98FCCCA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E54B3747-7507-43B0-8537-A64189F28B35}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F761BABE-0622-4DCE-A1B0-9D1BCA75DFEF}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F98F0DE1-9B6F-4C87-8E08-6EE5928D8558}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{5563BEFE-3B03-43B1-8041-64A9745DAA56}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{6A4BCABA-C437-4C76-A54E-AF31B8A76CB9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{8E9F2D02-6B06-4EBA-92C2-68438EADED28}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{460C3D19-B3D4-4964-A550-77D263B0CCCB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2459}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Datamngr]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2459}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mobilegeni daemon (Rocketfuel)
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\{6791A2F3-FC80-475C-A002-C014AF797E9C}]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Conduit]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Microsoft\Internet Explorer\Approved Extensions\{A40DC6C5-79D0-4CA8-A185-8FF989AF1115}]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Microsoft\Internet Explorer\SearchScopes\{460C3D19-B3D4-4964-A550-77D263B0CCCB}]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Microsoft\Internet Explorer\SearchScopes\{77AA745B-F4F8-45DA-9B14-61D2D95054C8}]
    [-HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2459}]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]
    "Application Restart #1"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "mobilegeni daemon"=-
    "ComodoFSChrome"=-
    "PrivDogService"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "mobilegeni daemon"=-
    "ComodoFSChrome"=-
    "PrivDogService"=-
    [HKEY_USERS\S-1-5-21-426484911-2148737994-2153144629-1001\Software\Microsoft\Windows\CurrentVersion\runonce]
    "Application Restart #1"=-
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2459}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{460C3D19-B3D4-4964-A550-77D263B0CCCB}"
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{77AA745B-F4F8-45DA-9B14-61D2D95054C8}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2459}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{A33DB9FD-7A8A-496E-92D3-9CFCF9D9E1C9}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{A6F21DFA-E7A1-4869-BBA3-649A3DCCB73D}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. lazaruss

    lazaruss Private E-2

    Hi Chaslang!

    I have done as instructed, please find logs attached as requested

    The ad issue seems to have been resolved (well as much as a 5 minute test can tell anyway) However I do notice an issue with chrome. I don't know if this is related or not but it seems to grind to a halt when trying to load pages occasionally, then it times out and shows the default chrome is unable to display the page error. after a couple of refreshes you can see the loading circle on the tab suddenly speed up and it loads the page. Like I say, not sure if this is related to malware but would appreciate your opinion.

    Thanks
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not sure but we do have some more work to do so let's see what happens later.

    Uninstall the below program. If you do not find it or it will not uninstall, just keep going.
    PrivDog

    Also if you notice anything from McAfee installed then try to uninstall it. One item that is related to McAfee but may not be labeled that way is So uninstall it too.


    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    :Services
    MgAssistService
    Util Bizzybolt
     
    :Files
    C:\ProgramData\McAfee
    C:\Program Files (x86)\McAfee
    C:\Program Files (x86)\Bizzybolt
    C:\Program Files (x86)\AdTrustMedia
    
    :Reg
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "mcui_exe"=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{EF79C448-6946-4D71-8134-03407888C054}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{EF79C448-6946-4D71-8134-03407888C054}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\PrivDog]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  5. lazaruss

    lazaruss Private E-2

    Hi

    Please find attached log files. MGTools GetLogs.bat didnt take long to run and it seemed to exit without any warning, different to the last times i ran it.

    Thanks
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Shutdown your protection software and try again. Make sure that you use Right Click and Select Run As Administrator.


    Also you did not tell me how things are running!
     
  7. lazaruss

    lazaruss Private E-2

    Hi Chaslang

    Sorry about that, not sure what happened there, GetLogs worked fine this time?? Please find attached

    Also, everything seems fine now. Dont seem to be having any connection issues now but im on a different wireless so it was likely my connection, just seemed a bit strange because I hadnt seen it act like that before.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds