What is Price Fountain?
The Malwarebytes research team has determined that Price Fountain is adware. These adware applications display advertisements not originating from the sites you are browsing.
How do I know if my computer is affected by Price Fountain?
You may see these entries in your list of installed programs:

these shortcuts on your desktop and in your taskbar:

and these Scheduled Tasks:

Note: part of the Tasks name includes the {username} of the current user.
How did Price Fountain get on my computer?
Adware applications use different methods for distributing themselves. This particular one was bundled with other software.
How do I remove Price Fountain?
Our program Malwarebytes Anti-Malware can detect and remove this potentially unwanted program.
- Please download Malwarebytes Anti-Malware to your desktop.
- Double-click mbam-setup-version.exe and follow the prompts to install the program.
- At the end, be sure a check-mark is placed next to the following:
- Enable free trial of Malwarebytes Anti-Malware Premium
- Launch Malwarebytes Anti-Malware
- Then click Finish.
- If an update is found, you will be prompted to download and install the latest version.
- Once the program has loaded, select Scan now. Or select the Threat Scan from the Scan menu.
- When the scan is complete , make sure that everything is set to "Quarantine", and click Apply Actions.
- Reboot your computer if prompted.
- No, Malwarebytes' Anti-Malware removes Price Fountain completely.
- Any leftover unwanted shortcuts can be unpinned and removed.
- This PUP creates some scheduled tasks. You can read here how to check for and, if necessary, remove Scheduled Tasks.
We hope our application and this guide have helped you eradicate this hijacker.
Technical details for experts
Possible signs in FRST logs:
C:\Windows\System32\Tasks\{username}RecidivisticTerrificallyV2 C:\Windows\System32\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB} C:\Users\{username}\Desktop\Aliexpress.URL C:\Users\{username}\Desktop\Booking.URL C:\Windows\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB} C:\Users\{username}\AppData\Local\RecidivisticTerrifically C:\Users\{username}\AppData\Local\Temp\YonkersDialectal.dll PriceFountain (HKCU\...\RecidivisticTerrifically) (Version: - ) <==== ATTENTION Update for PriceFountain (HKCU\...\{77AC37BA-71E2-EAA2-2433-10652BD846BB}) (Version: - Update for PriceFountain) <==== ATTENTION Task: {CB9F5088-A8EC-4347-8920-97F3A1FAD959} - System32\Tasks\{username}RecidivisticTerrificallyV2 => Rundll32.exe YonkersDialectal.dll,main 7 1 <==== ATTENTION Task: C:\Windows\Tasks\{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job => C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exeAlterations made by the installer:
File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Users\{username}\AppData\Local\RecidivisticTerrifically Adds the file Aliexpress .lnk"="5/6/2016 8:45 AM, 1804 bytes, A Adds the file Aliexpress.ico"="2/4/2016 6:48 PM, 23622 bytes, A Adds the file Aliexpress.lnk"="5/6/2016 8:45 AM, 1780 bytes, A Adds the file Aliexpress.smenu.URL"="5/6/2016 8:45 AM, 212 bytes, A Adds the file Aliexpress.tbar.URL"="5/6/2016 8:45 AM, 210 bytes, A Adds the file Booking .lnk"="5/6/2016 8:45 AM, 1786 bytes, A Adds the file Booking.ico"="2/22/2016 2:25 PM, 49526 bytes, A Adds the file Booking.lnk"="5/6/2016 8:45 AM, 1768 bytes, A Adds the file Booking.smenu.URL"="5/6/2016 8:45 AM, 209 bytes, A Adds the file Booking.tbar.URL"="5/6/2016 8:45 AM, 207 bytes, A Adds the file ForspentBraked.dat"="3/17/2016 9:52 PM, 1071 bytes, A Adds the file HedonismsIndictable.exe"="5/6/2016 8:45 AM, 89934 bytes, A Adds the file Rkey.dat"="5/6/2016 8:45 AM, 43 bytes, A Adds the file YonkersDialectal.dll"="5/4/2016 7:46 PM, 370688 bytes, A Adds the folder C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB} Adds the file config.dat"="4/21/2013 2:31 AM, 73 bytes, A Adds the file info.dat"="5/6/2016 8:45 AM, 104 bytes, A Adds the file Updater.exe"="5/2/2013 5:27 PM, 501760 bytes, A Adds the folder C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu Adds the file Aliexpress .lnk"="5/6/2016 8:45 AM, 1804 bytes, A Adds the file Booking .lnk"="5/6/2016 8:45 AM, 1786 bytes, A In the existing folder C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar Adds the file Aliexpress.lnk"="5/6/2016 8:45 AM, 1780 bytes, A Adds the file Booking.lnk"="5/6/2016 8:45 AM, 1768 bytes, A In the existing folder C:\Users\{username}\Desktop Adds the file Aliexpress.URL"="5/6/2016 8:45 AM, 306 bytes, A Adds the file Booking.URL"="5/6/2016 8:45 AM, 300 bytes, A In the existing folder C:\Windows\System32\Tasks Adds the file {77AC37BA-71E2-EAA2-2433-10652BD846BB}"="5/6/2016 8:45 AM, 3242 bytes, A Adds the file {username}RecidivisticTerrificallyV2"="5/6/2016 8:45 AM, 3482 bytes, A In the existing folder C:\Windows\Tasks Adds the file {77AC37BA-71E2-EAA2-2433-10652BD846BB}.job"="5/6/2016 8:45 AM, 286 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\CompatibilityAdapter\Signatures] "{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job"="REG_BINARY, ................................ "{77AC37BA-71E2-EAA2-2433-10652BD846BB}.job.fp"="REG_DWORD", -734075900 [HKEY_CURRENT_USER\Software\{abd7ea567574e7b4e2d1ddda13cfadbc}] "Channel"="REG_SZ", "ir_16_18_ff" "Config"="REG_SZ", "6" "country"="REG_SZ", "{"country_name": "{Countryname}", "country_code": "{CC}"}" "dll_module_name"="REG_SZ", "DLL" "dll-file-name"="REG_SZ", "YonkersDialectal.dll" "FF"="REG_SZ", "FALSE" "IconWebsite"="REG_SZ", "Aliexpress" "InstallDir"="REG_SZ", "C:\Users\{username}\AppData\Local\RecidivisticTerrifically" "InstallId"="REG_SZ", "abd7ea567574e7b4e2d1ddda13cfadbc" "Instgrp"="REG_SZ", "PF20_4" "OriginalCommand"="REG_SZ", "C:\Users\{username}\Desktop\pm.exe /MUSE /PARTNER=ironpf2 /CHANNEL=ir_16_18_ff /uid=0B0CyD0F0FyEtAyDyC0FtBzy0CtA0FtB2RtBtDtCyCtDyDtDyEtCzzyEzytBtDyCyEyB" "Partner"="REG_SZ", "ironpf2" "Reason"="REG_SZ", "default" "TaskName"="REG_SZ", "{username}RecidivisticTerrificallyV2" "Uninst"="REG_SZ", "C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe" "Uninstalled"="REG_SZ", "FALSE" "Version"="REG_SZ", "PF20_4" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\{77AC37BA-71E2-EAA2-2433-10652BD846BB}] "DisplayIcon"="REG_SZ", "C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exe" "DisplayName"="REG_SZ", "Update for PriceFountain" "Publisher"="REG_SZ", "Update for PriceFountain" "UninstallString"="REG_SZ", "C:\Users\{username}1\AppData\Roaming\{77AC3~1\Updater.exe /Uninstall /DelSelfDir /GID=2SyByB0A0CtAyB0B0AtGyBtC0EtBtG0E0A0AtBtGtByEtAtAtGtCtDyCyDtB0B0DzzyEyC0B0B2Q" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\RecidivisticTerrifically] "DisplayName"="REG_SZ", "PriceFountain" "UninstallString"="REG_SZ", ""C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe""Malwarebytes Anti-Malware log:
Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 5/6/2016 Scan Time: 3:19 PM Logfile: mbamPriceFountain.txt Administrator: Yes Version: 2.2.1.1043 Malware Database: v2016.05.06.04 Rootkit Database: v2016.04.17.01 License: Premium Malware Protection: Disabled Malicious Website Protection: Enabled Self-protection: Enabled OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {username} Scan Type: Threat Scan Result: Completed Objects Scanned: 365950 Time Elapsed: 10 min, 4 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 1 PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\YonkersDialectal.dll, Delete-on-Reboot, [109c26aca1f8a096f816f80d40c2b64a], Registry Keys: 3 PUP.Optional.PriceFountain, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{77AC37BA-71E2-EAA2-2433-10652BD846BB}, Quarantined, [3b71a82a33660f27ea6a36415aa6ed13], PUP.Optional.PriceFountain, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FC36C276-4C6B-4870-AF1A-BB3C9A426F6D}, Delete-on-Reboot, [1e8e16bcedacd2640d282193c53f956b], PUP.Optional.PriceFountain.Gen, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\RecidivisticTerrifically, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], Registry Values: 2 PUP.Optional.PriceFountain, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{FC36C276-4C6B-4870-AF1A-BB3C9A426F6D}|Path, \{username}RecidivisticTerrificallyV2, Delete-on-Reboot, [1e8e16bcedacd2640d282193c53f956b] PUP.Optional.PriceFountain, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{77AC37BA-71E2-EAA2-2433-10652BD846BB}|DisplayName, Update for PriceFountain, Quarantined, [00acc909f1a8979f31f84df97a895ea2] Registry Data: 0 (No malicious items detected) Folders: 1 PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically, Delete-on-Reboot, [7c30448e3c5d48ee110d2c571bead42c], Files: 21 PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\YonkersDialectal.dll, Delete-on-Reboot, [109c26aca1f8a096f816f80d40c2b64a], PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Roaming\{77AC37BA-71E2-EAA2-2433-10652BD846BB}\Updater.exe, Quarantined, [3b71a82a33660f27ea6a36415aa6ed13], PUP.Optional.PriceFountain, C:\Users\{username}\Desktop\pm.exe, Quarantined, [ab0114be4851c6702d27086fab5555ab], PUP.Optional.PriceFountain, C:\Users\{username}\AppData\Local\Temp\YonkersDialectal.dll, Quarantined, [0d9fcf03f8a15ed83cd243c2ad55946c], PUP.Optional.PriceFountain, C:\Windows\System32\Tasks\{username}RecidivisticTerrificallyV2, Quarantined, [119b379b62372c0a0f07396eeb192cd4], PUP.Optional.HijackedShortCuts, C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Booking.lnk, Quarantined, [1e8e23af2b6e78bebbb9516e60a46799], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Rkey.dat, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress .lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.ico, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.smenu.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Aliexpress.tbar.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking .lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.ico, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.lnk, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.smenu.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\Booking.tbar.URL, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\ForspentBraked.dat, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.PriceFountain.Gen, C:\Users\{username}\AppData\Local\RecidivisticTerrifically\HedonismsIndictable.exe, Quarantined, [7c30448e3c5d48ee110d2c571bead42c], PUP.Optional.ShortcutHijack, C:\Users\{username}\Desktop\Aliexpress.URL, Quarantined, [8626f1e10c8d84b21c1c4242e2236898], PUP.Optional.ShortcutHijack, C:\Users\{username}\Desktop\Booking.URL, Quarantined, [1894b51d8910b2840b2d44409471bf41], Physical Sectors: 0 (No malicious items detected) (end)We use different ways of protecting your computer(s):
- Dynamically Blocks Malware Sites & Servers
- Malware Execution Prevention