Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hello! I appear to have a small problem.


  • Please log in to reply
17 replies to this topic

#1 Lehr

Lehr

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 11 October 2013 - 01:06 PM

# AdwCleaner v3.007 - Report created 11/10/2013 at 03:22:05
# Updated 09/10/2013 by Xplode
# Operating System : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# Username : Shawn Hegedus - GAMER-PC
# Running from : C:\Users\Sammy ******\Documents\Anti spybot and toolbar program\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

[!] Folder Deleted : C:\Users\Shawn Hegedus\AppData\Local\eSupport.com

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{058F0E48-61CA-4964-9FBA-1978A1BB060D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{18F33C35-8EF2-40D7-8BA4-932B0121B472}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16514


-\\ Mozilla Firefox v24.0 (en-US)

[ File : C:\Users\Shawn Hegedus\AppData\Roaming\Mozilla\Firefox\Profiles\9pm8z92i.default\prefs.js ]


-\\ Google Chrome v30.0.1599.69

[ File : C:\Users\Shawn Hegedus\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1195 octets] - [07/09/2013 12:05:58]
AdwCleaner[R10].txt - [1868 octets] - [20/09/2013 15:37:32]
AdwCleaner[R11].txt - [1929 octets] - [20/09/2013 15:42:44]
AdwCleaner[R12].txt - [1815 octets] - [20/09/2013 21:05:36]
AdwCleaner[R13].txt - [1876 octets] - [27/09/2013 02:30:12]
AdwCleaner[R14].txt - [2014 octets] - [28/09/2013 01:14:42]
AdwCleaner[R15].txt - [2058 octets] - [28/09/2013 12:50:48]
AdwCleaner[R16].txt - [2119 octets] - [30/09/2013 20:28:51]
AdwCleaner[R17].txt - [2180 octets] - [03/10/2013 20:25:13]
AdwCleaner[R18].txt - [2241 octets] - [04/10/2013 21:28:51]
AdwCleaner[R19].txt - [2302 octets] - [05/10/2013 19:43:16]
AdwCleaner[R1].txt - [1092 octets] - [07/09/2013 12:13:39]
AdwCleaner[R20].txt - [2331 octets] - [05/10/2013 19:48:48]
AdwCleaner[R21].txt - [2392 octets] - [05/10/2013 19:50:22]
AdwCleaner[R22].txt - [2453 octets] - [05/10/2013 19:54:18]
AdwCleaner[R23].txt - [2514 octets] - [05/10/2013 23:43:22]
AdwCleaner[R24].txt - [2607 octets] - [06/10/2013 01:27:10]
AdwCleaner[R25].txt - [2903 octets] - [07/10/2013 00:18:42]
AdwCleaner[R26].txt - [2789 octets] - [07/10/2013 17:06:04]
AdwCleaner[R27].txt - [2850 octets] - [07/10/2013 22:41:36]
AdwCleaner[R28].txt - [2911 octets] - [09/10/2013 12:44:31]
AdwCleaner[R29].txt - [3081 octets] - [11/10/2013 02:56:09]
AdwCleaner[R2].txt - [1152 octets] - [07/09/2013 21:05:20]
AdwCleaner[R30].txt - [3420 octets] - [11/10/2013 03:01:46]
AdwCleaner[R31].txt - [3513 octets] - [11/10/2013 03:21:20]
AdwCleaner[R3].txt - [1213 octets] - [08/09/2013 13:35:20]
AdwCleaner[R4].txt - [1273 octets] - [12/09/2013 10:55:09]
AdwCleaner[R5].txt - [1333 octets] - [14/09/2013 21:19:23]
AdwCleaner[R6].txt - [1393 octets] - [15/09/2013 23:38:09]
AdwCleaner[R7].txt - [1453 octets] - [16/09/2013 20:12:06]
AdwCleaner[R8].txt - [1513 octets] - [18/09/2013 15:08:59]
AdwCleaner[R9].txt - [1806 octets] - [20/09/2013 15:33:42]
AdwCleaner[S0].txt - [1221 octets] - [07/09/2013 12:07:05]
AdwCleaner[S1].txt - [1993 octets] - [20/09/2013 15:43:04]
AdwCleaner[S2].txt - [2076 octets] - [28/09/2013 01:16:17]
AdwCleaner[S3].txt - [2967 octets] - [07/10/2013 00:35:04]
AdwCleaner[S4].txt - [3361 octets] - [11/10/2013 03:22:05]

########## EOF - C:\AdwCleaner\AdwCleaner[S4].txt - [3421 octets] ##########
 

 

 

Now, one may assume that this isn't an issue seeing as adware cleaner found it, but things like this continue to appear in my registry. Malwarebytes/Spybot search and destry/norton/Superantispybot have found nothing. Nor has malwarebytes anti rootkit. Should I assume that the listed objects above are from my browsing of the internet?



BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 11 October 2013 - 04:14 PM

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 11 October 2013 - 05:49 PM

http://pastebin.com/g0RZe3M1 - FSS

 

http://pastebin.com/LM662y6P - Minitoolbox

 

 http://pastebin.com/KaYizFRA - Rkill

 

Security check of the year: http://pastebin.com/chf9zENU

 

Malwarebytes: http://pastebin.com/aBdyQFqY

 

Malwarebytes anti root-kit came up clean.



#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 11 October 2013 - 06:30 PM

I need all logs to be pasted here.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 11 October 2013 - 07:16 PM

Okay.

 



Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
 
Database version: v2013.10.11.03
 
Windows Vista Service Pack 2 x64 NTFS
Internet Explorer 9.0.8112.16421
Shawn Hegedus :: GAMER-PC [administrator]
 
10/11/2013 6:27:09 PM
mbam-log-2013-10-11 (18-27-09).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 213938
Time elapsed: 5 minute(s), 4 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)
 
 
------------------
 



 Results of screen317's Security Check version 0.99.74  
 Windows Vista Service Pack 2 x64 (UAC is enabled)  
 Internet Explorer 9  
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
Norton Internet Security  
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 MVPS Hosts File  
 Spybot - Search & Destroy
 Malwarebytes Anti-Malware version 1.75.0.1300  
 Java 7 Update 25  
 Java version out of Date!
 Adobe Flash Player     11.9.900.117  
 Mozilla Firefox (24.0)
 Google Chrome 29.0.1547.76  
 Google Chrome 30.0.1599.69  
````````Process Check: objlist.exe by Laurent````````  
 Norton ccSvcHst.exe
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 9 % Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````

 

 

-------

 



Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
 
Program started at: 10/11/2013 06:19:48 PM in x64 mode.
Windows Version: Windows Vista ™ Home Premium Service Pack 2
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * No malware processes found to kill.
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
 
Performing miscellaneous checks:
 
 * Windows Defender Disabled
 
   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001
 
Checking Windows Service Integrity:
 
 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Automatic
 
Searching for Missing Digital Signatures:
 
 * No issues found.
 
Checking HOSTS File:
 
 * Cannot edit the HOSTS file.
 * Permissions Fixed. Administrators can now edit the HOSTS file.
 
 * HOSTS file entries found:
 
  127.0.0.1       localhost
  ::1             localhost
  127.0.0.1     www.007guard.com
  127.0.0.1     007guard.com
  127.0.0.1     008i.com
  127.0.0.1     www.008k.com
  127.0.0.1     008k.com
  127.0.0.1     www.00hq.com
  127.0.0.1     00hq.com
  127.0.0.1     010402.com
  127.0.0.1     www.032439.com
  127.0.0.1     032439.com
  127.0.0.1     www.0scan.com
  127.0.0.1     0scan.com
  127.0.0.1     1000gratisproben.com
  127.0.0.1     www.1000gratisproben.com
  127.0.0.1     1001namen.com
  127.0.0.1     www.1001namen.com
  127.0.0.1     100888290cs.com
  127.0.0.1     www.100888290cs.com
 
  20 out of 15492 HOSTS entries shown.
  Please review HOSTS file for further entries.
 
Program finished at: 10/11/2013 06:20:25 PM
Execution time: 0 hours(s), 0 minute(s), and 36 seconds(s)
 
--------
 



t myMiniToolBox by Farbar  Version: 13-07-2013
Ran by Shawn Hegedus (administrator) on 11-10-2013 at 18:11:36
Running from "C:\Users\Shawn Hegedus\Documents\Anti spybot and toolbar program"
Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X64)
Boot Mode: Normal
***************************************************************************
 
========================= IE Proxy Settings: ==============================
 
Proxy is not enabled.
No Proxy Server is set.
 
========================= FF Proxy Settings: ==============================
 
========================= Hosts content: =================================
 
::1             localhost
 
127.0.0.1       localhost
127.0.0.1       www.007guard.com
127.0.0.1       007guard.com
127.0.0.1       008i.com
127.0.0.1       www.008k.com
127.0.0.1       008k.com
127.0.0.1       www.00hq.com
127.0.0.1       00hq.com
127.0.0.1       010402.com
127.0.0.1       www.032439.com
127.0.0.1       032439.com
127.0.0.1       www.0scan.com
127.0.0.1       0scan.com
127.0.0.1       1000gratisproben.com
127.0.0.1       www.1000gratisproben.com
127.0.0.1       1001namen.com
127.0.0.1       www.1001namen.com
127.0.0.1       100888290cs.com
127.0.0.1       www.100888290cs.com
 
There are 15471 more lines starting with "127.0.0.1"
 
========================= IP Configuration: ================================
 
Intel® 82567LF-2 Gigabit Network Connection = Local Area Connection (Connected)
 
 
# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4
 
reset
set global icmpredirects=enabled
 
 
popd
# End of IPv4 configuration
 
 
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : Gamer-PC
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : gateway.2wire.net
 
Ethernet adapter Local Area Connection:
 
   Connection-specific DNS Suffix  . : gateway.2wire.net
   Description . . . . . . . . . . . : Intel® 82567LF-2 Gigabit Network Connection
   Physical Address. . . . . . . . . : 00-24-E8-08-25-26
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::dd3b:dc54:3794:2142%11(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.69(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Friday, October 11, 2013 11:18:16 AM
   Lease Expires . . . . . . . . . . : Saturday, October 12, 2013 11:18:14 AM
   Default Gateway . . . . . . . . . : 192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DHCPv6 IAID . . . . . . . . . . . : 251667688
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-11-77-6A-A3-00-24-E8-08-25-26
   DNS Servers . . . . . . . . . . . : 192.168.1.254
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Tunnel adapter Local Area Connection* 6:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.Gamer-PC
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
 
Tunnel adapter Local Area Connection* 7:
 
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:90d7:c95:2db8:3f57:feba(Preferred)
   Link-local IPv6 Address . . . . . : fe80::c95:2db8:3f57:feba%10(Preferred)
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled
 
Tunnel adapter Local Area Connection* 13:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : gateway.2wire.net
   Description . . . . . . . . . . . : isatap.gateway.2wire.net
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  homeportal
Address:  192.168.1.254
 
Name:    google.com
Addresses:  2607:f8b0:4009:804::1005
          173.194.46.71
          173.194.46.64
          173.194.46.66
          173.194.46.73
          173.194.46.72
          173.194.46.69
          173.194.46.78
          173.194.46.65
          173.194.46.67
          173.194.46.68
          173.194.46.70
 
 
 
Pinging google.com [74.125.225.40] with 32 bytes of data:
 
Reply from 74.125.225.40: bytes=32 time=51ms TTL=52
 
Reply from 74.125.225.40: bytes=32 time=51ms TTL=52
 
 
 
Ping statistics for 74.125.225.40:
 
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
 
Approximate round trip times in milli-seconds:
 
    Minimum = 51ms, Maximum = 51ms, Average = 51ms
 
Server:  homeportal
Address:  192.168.1.254
 
Name:    yahoo.com
Addresses:  98.138.253.109
          98.139.183.24
          206.190.36.45
 
 
 
Pinging yahoo.com [206.190.36.45] with 32 bytes of data:
 
Reply from 206.190.36.45: bytes=32 time=141ms TTL=45
 
Reply from 206.190.36.45: bytes=32 time=137ms TTL=45
 
 
 
Ping statistics for 206.190.36.45:
 
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
 
Approximate round trip times in milli-seconds:
 
    Minimum = 137ms, Maximum = 141ms, Average = 139ms
 
 
 
Pinging 127.0.0.1 with 32 bytes of data:
 
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
 
 
 
Ping statistics for 127.0.0.1:
 
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
 
Approximate round trip times in milli-seconds:
 
    Minimum = 0ms, Maximum = 0ms, Average = 0ms
 
===========================================================================
Interface List
 11 ...00 24 e8 08 25 26 ...... Intel® 82567LF-2 Gigabit Network Connection
  1 ........................... Software Loopback Interface 1
 12 ...00 00 00 00 00 00 00 e0  isatap.Gamer-PC
 10 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 18 ...00 00 00 00 00 00 00 e0  isatap.gateway.2wire.net
===========================================================================
 
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.69     20
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link      192.168.1.69    276
     192.168.1.69  255.255.255.255         On-link      192.168.1.69    276
    192.168.1.255  255.255.255.255         On-link      192.168.1.69    276
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link      192.168.1.69    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link      192.168.1.69    276
===========================================================================
Persistent Routes:
  None
 
IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 10     18 ::/0                     On-link
  1    306 ::1/128                  On-link
 10     18 2001::/32                On-link
 10    266 2001:0:9d38:90d7:c95:2db8:3f57:feba/128
                                    On-link
 11    276 fe80::/64                On-link
 10    266 fe80::/64                On-link
 10    266 fe80::c95:2db8:3f57:feba/128
                                    On-link
 11    276 fe80::dd3b:dc54:3794:2142/128
                                    On-link
  1    306 ff00::/8                 On-link
 10    266 ff00::/8                 On-link
 11    276 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================
 
Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\winrnr.dll [19968] (Microsoft Corporation)
Catalog9 01 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [61440] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\napinsp.dll [62976] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\winrnr.dll [27648] (Microsoft Corporation)
x64-Catalog9 01 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
 
========================= Event log errors: ===============================
 
Application errors:
==================
Error: (10/11/2013 11:26:26 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:26:03 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:25:29 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:25:01 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:18:35 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 03:26:48 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 03:24:11 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/10/2013 11:06:54 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/10/2013 11:05:32 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/09/2013 10:45:20 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
 
System errors:
=============
Error: (10/11/2013 06:09:39 PM) (Source: Service Control Manager) (User: )
Description: Volume Shadow Copy1
 
Error: (10/11/2013 06:09:14 PM) (Source: Service Control Manager) (User: )
Description: Windows Media Player Network Sharing Service3
 
Error: (10/11/2013 11:29:16 AM) (Source: Service Control Manager) (User: )
Description: Windows Modules Installer23000001Restart the service
 
Error: (10/11/2013 11:26:31 AM) (Source: Service Control Manager) (User: )
Description: TeamViewer 83
 
Error: (10/11/2013 11:26:05 AM) (Source: Service Control Manager) (User: )
Description: TeamViewer 8220001Restart the service
 
Error: (10/11/2013 11:26:02 AM) (Source: Service Control Manager) (User: )
Description: Windows Media Player Network Sharing Service2300001Restart the service
 
Error: (10/11/2013 11:26:00 AM) (Source: Service Control Manager) (User: )
Description: Windows Live ID Sign-in Assistant3
 
Error: (10/11/2013 11:25:28 AM) (Source: Service Control Manager) (User: )
Description: Windows Live ID Sign-in Assistant2100001Restart the service
 
Error: (10/11/2013 11:25:15 AM) (Source: Service Control Manager) (User: )
Description: TeamViewer 8120001Restart the service
 
Error: (10/11/2013 11:25:09 AM) (Source: Service Control Manager) (User: )
Description: Windows Modules Installer11200001Restart the service
 
 
Microsoft Office Sessions:
=========================
Error: (10/11/2013 11:26:26 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:26:03 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:25:29 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:25:01 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 11:18:35 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 03:26:48 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/11/2013 03:24:11 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/10/2013 11:06:54 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/10/2013 11:05:32 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
Error: (10/09/2013 10:45:20 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003
 
 
CodeIntegrity Errors:
===================================
  Date: 2013-10-11 03:18:40.135
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:39.936
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:39.728
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:39.515
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:39.305
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:39.094
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\Windows\System32\drivers\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:34.379
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.3.1.22\Definitions\BASHDefs\20130924.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:34.181
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.3.1.22\Definitions\BASHDefs\20130924.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:33.973
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.3.1.22\Definitions\BASHDefs\20130924.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.
 
  Date: 2013-10-11 03:18:33.778
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume3\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.3.1.22\Definitions\BASHDefs\20130924.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.
 
 
=========================== Installed Programs ============================
 
Alienware TactX Keyboard CI 1.00.130 (Version: 1.00.130)
AMD APP SDK Runtime (Version: 10.0.937.2)
AMD Catalyst Install Manager (Version: 8.0.877.0)
ccc-utility64 (Version: 2008.0828.2144.37162)
ccc-utility64 (Version: 2010.0202.2335.42270)
ccc-utility64 (Version: 2010.0825.2146.37182)
ccc-utility64 (Version: 2010.0930.2237.38732)
ccc-utility64 (Version: 2011.0104.2155.39304)
ccc-utility64 (Version: 2011.0126.1749.31909)
ccc-utility64 (Version: 2011.0728.1756.30366)
ccc-utility64 (Version: 2012.0405.2205.37728)
ccc-utility64 (Version: 2012.0704.122.388)
ccc-utility64 (Version: 2012.1116.1515.27190)
CDDRV_Installer (Version: 4.60)
Command Center (Version: 2.0.7.0)
CPUID HWMonitor 1.19
Dell Dock (Version: 1.0.0)
Dell Edoc Viewer (Version: 1.0.0)
Dropbox (Version: 2.0.26)
Intel® Network Connections 13.1.33.0 (Version: 13.1.33.0)
KhalInstallWrapper (Version: 2.00.0000)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6015.5000)
Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.50727.42)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.61000)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (Version: 10.0.40219)
Nexus Mod Manager (Version: 0.44.13)
SUPERAntiSpyware (Version: 5.6.1014)
TeamSpeak 3 Client (Version: 3.0.11.1)
Unity Web Player (Version: )
Ventrilo Client for Windows x64 (Version: 3.0.8.0)
Windows Live ID Sign-in Assistant (Version: 6.500.3165.0)
 
========================= Devices: ================================
 
Name: Teredo Tunneling Pseudo-Interface
Description: Microsoft Tun Miniport Adapter
Class Guid: {4d36e972-e325-11ce-bfc1-08002be10318}
Manufacturer: Microsoft
Service: tunmp
Problem: : This device cannot start. (Code10)
Resolution: Device failed to start. Click "Update Driver" to update the drivers for this device.
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.
 
 
========================= Memory info: ===================================
 
Percentage of memory in use: 57%
Total physical RAM: 6134.26 MB
Available physical RAM: 2627.3 MB
Total Pagefile: 12466.03 MB
Available Pagefile: 9306.54 MB
Total Virtual: 4095.88 MB
Available Virtual: 3992.89 MB
 
========================= Partitions: =====================================
 
1 Drive c: (OS) (Fixed) (Total:683.57 GB) (Free:460.43 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:15 GB) (Free:8.33 GB) NTFS
 
========================= Users: ========================================
 
User accounts for \\GAMER-PC
 
Administrator            Guest                    Shawn Hegedus            
 
 
**** End of log ****

-------

 



==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.
 
 
Windows Firewall:
=============
 
Firewall Disabled Policy:
==================
 
 
System Restore:
============
 
System Restore Disabled Policy:
========================
 
 
Security Center:
============
 
 
Windows Update:
============
 
Windows Autoupdate Disabled Policy:
============================
 
 
Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is OK.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.
 
 
Windows Defender Disabled Policy:
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1
 
 
Other Services:
==============
 
 
File Check:
========
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcsvc.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys => MD5 is legit
C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys
[2013-08-14 08:38] - [2013-07-05 00:45] - 1423808 ____A (Microsoft Corporation) C2CB949645C299E23FBFD26CAD3FC96E
 
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll => MD5 is legit
C:\Windows\System32\bfe.dll => MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll => MD5 is legit
C:\Windows\System32\vssvc.exe => MD5 is legit
C:\Windows\System32\wscsvc.dll => MD5 is legit
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll => MD5 is legit
C:\Windows\System32\qmgr.dll => MD5 is legit
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\System32\ipnathlp.dll => MD5 is legit
C:\Windows\System32\iphlpsvc.dll => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
 
 
**** End of log ****


#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 11 October 2013 - 07:29 PM

MBAR?


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#7 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 11 October 2013 - 07:47 PM

It didn't give me a log, but it said nothing was found.



#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 11 October 2013 - 08:03 PM

All clean so far.

 

p22002970.gif Download Temp File Cleaner (TFC)
Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

p22002970.gif Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.


=============================================================================

p22002970.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.


=======================================

p22002970.gif Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click on List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    NOTE. If Eset doesn't find any threats it'll NOT produce any log.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#9 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 11 October 2013 - 08:46 PM

While Eset scans, have these logs!

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.4 (10.06.2013:1)
OS: Windows Vista ™ Home Premium x64
Ran by Shawn Hegedus on Fri 10/11/2013 at 21:34:36.15
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{88AEBFC9-DEEA-4A91-86CD-57562B9F46CD}



~~~ Files



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\Shawn Hegedus\AppData\Roaming\mozilla\firefox\profiles\9pm8z92i.default\minidumps [84 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 10/11/2013 at 21:38:15.55
Computer was rebooted
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

# AdwCleaner v3.007 - Report created 11/10/2013 at 21:45:39
# Updated 09/10/2013 by Xplode
# Operating System : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# Username : Shawn Hegedus - GAMER-PC
# Running from : C:\Users\Shawn Hegedus\Documents\Anti spybot and toolbar program\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****


***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16514


-\\ Mozilla Firefox v24.0 (en-US)

[ File : C:\Users\Shawn Hegedus\AppData\Roaming\Mozilla\Firefox\Profiles\9pm8z92i.default\prefs.js ]


-\\ Google Chrome v30.0.1599.69

[ File : C:\Users\Shawn Hegedus\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1195 octets] - [07/09/2013 12:05:58]
AdwCleaner[R10].txt - [1868 octets] - [20/09/2013 15:37:32]
AdwCleaner[R11].txt - [1929 octets] - [20/09/2013 15:42:44]
AdwCleaner[R12].txt - [1815 octets] - [20/09/2013 21:05:36]
AdwCleaner[R13].txt - [1876 octets] - [27/09/2013 02:30:12]
AdwCleaner[R14].txt - [2014 octets] - [28/09/2013 01:14:42]
AdwCleaner[R15].txt - [2058 octets] - [28/09/2013 12:50:48]
AdwCleaner[R16].txt - [2119 octets] - [30/09/2013 20:28:51]
AdwCleaner[R17].txt - [2180 octets] - [03/10/2013 20:25:13]
AdwCleaner[R18].txt - [2241 octets] - [04/10/2013 21:28:51]
AdwCleaner[R19].txt - [2302 octets] - [05/10/2013 19:43:16]
AdwCleaner[R1].txt - [1092 octets] - [07/09/2013 12:13:39]
AdwCleaner[R20].txt - [2331 octets] - [05/10/2013 19:48:48]
AdwCleaner[R21].txt - [2392 octets] - [05/10/2013 19:50:22]
AdwCleaner[R22].txt - [2453 octets] - [05/10/2013 19:54:18]
AdwCleaner[R23].txt - [2514 octets] - [05/10/2013 23:43:22]
AdwCleaner[R24].txt - [2607 octets] - [06/10/2013 01:27:10]
AdwCleaner[R25].txt - [2903 octets] - [07/10/2013 00:18:42]
AdwCleaner[R26].txt - [2789 octets] - [07/10/2013 17:06:04]
AdwCleaner[R27].txt - [2850 octets] - [07/10/2013 22:41:36]
AdwCleaner[R28].txt - [2911 octets] - [09/10/2013 12:44:31]
AdwCleaner[R29].txt - [3081 octets] - [11/10/2013 02:56:09]
AdwCleaner[R2].txt - [1152 octets] - [07/09/2013 21:05:20]
AdwCleaner[R30].txt - [3420 octets] - [11/10/2013 03:01:46]
AdwCleaner[R31].txt - [3513 octets] - [11/10/2013 03:21:20]
AdwCleaner[R32].txt - [3215 octets] - [11/10/2013 03:33:54]
AdwCleaner[R33].txt - [3276 octets] - [11/10/2013 14:01:27]
AdwCleaner[R34].txt - [3337 octets] - [11/10/2013 15:00:09]
AdwCleaner[R35].txt - [3398 octets] - [11/10/2013 17:03:34]
AdwCleaner[R36].txt - [3459 octets] - [11/10/2013 20:32:51]
AdwCleaner[R37].txt - [3520 octets] - [11/10/2013 21:12:03]
AdwCleaner[R38].txt - [2719 octets] - [11/10/2013 21:45:39]
AdwCleaner[R3].txt - [1213 octets] - [08/09/2013 13:35:20]
AdwCleaner[R4].txt - [1273 octets] - [12/09/2013 10:55:09]
AdwCleaner[R5].txt - [1333 octets] - [14/09/2013 21:19:23]
AdwCleaner[R6].txt - [1393 octets] - [15/09/2013 23:38:09]
AdwCleaner[R7].txt - [1453 octets] - [16/09/2013 20:12:06]
AdwCleaner[R8].txt - [1513 octets] - [18/09/2013 15:08:59]
AdwCleaner[R9].txt - [1806 octets] - [20/09/2013 15:33:42]
AdwCleaner[S0].txt - [1221 octets] - [07/09/2013 12:07:05]
AdwCleaner[S1].txt - [1993 octets] - [20/09/2013 15:43:04]
AdwCleaner[S2].txt - [2076 octets] - [28/09/2013 01:16:17]
AdwCleaner[S3].txt - [2967 octets] - [07/10/2013 00:35:04]
AdwCleaner[S4].txt - [3501 octets] - [11/10/2013 03:22:05]

########## EOF - C:\AdwCleaner\AdwCleaner[R38].txt - [3500 octets] ##########
 

 

 

As for TFC: it cleaned 900mb or so. No .txt file.

 

JRT Also found a bad 'module' or something.

 

 

ESET Found nothing after four... Long... Bitter hours... Was going on five.

 

Perhaps the junk cleaner fixed it?


Edited by Lehr, 12 October 2013 - 10:55 AM.


#10 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 12 October 2013 - 10:55 AM

# AdwCleaner v3.007 - Report created 12/10/2013 at 03:42:45
# Updated 09/10/2013 by Xplode
# Operating System : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# Username : Shawn Hegedus - GAMER-PC
# Running from : C:\Users\Shawn Hegedus\Documents\Anti spybot and toolbar program\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16514


-\\ Mozilla Firefox v24.0 (en-US)

[ File : C:\Users\Shawn Hegedus\AppData\Roaming\Mozilla\Firefox\Profiles\9pm8z92i.default\prefs.js ]


-\\ Google Chrome v30.0.1599.69

[ File : C:\Users\Shawn Hegedus\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1195 octets] - [07/09/2013 12:05:58]
AdwCleaner[R10].txt - [1868 octets] - [20/09/2013 15:37:32]
AdwCleaner[R11].txt - [1929 octets] - [20/09/2013 15:42:44]
AdwCleaner[R12].txt - [1815 octets] - [20/09/2013 21:05:36]
AdwCleaner[R13].txt - [1876 octets] - [27/09/2013 02:30:12]
AdwCleaner[R14].txt - [2014 octets] - [28/09/2013 01:14:42]
AdwCleaner[R15].txt - [2058 octets] - [28/09/2013 12:50:48]
AdwCleaner[R16].txt - [2119 octets] - [30/09/2013 20:28:51]
AdwCleaner[R17].txt - [2180 octets] - [03/10/2013 20:25:13]
AdwCleaner[R18].txt - [2241 octets] - [04/10/2013 21:28:51]
AdwCleaner[R19].txt - [2302 octets] - [05/10/2013 19:43:16]
AdwCleaner[R1].txt - [1092 octets] - [07/09/2013 12:13:39]
AdwCleaner[R20].txt - [2331 octets] - [05/10/2013 19:48:48]
AdwCleaner[R21].txt - [2392 octets] - [05/10/2013 19:50:22]
AdwCleaner[R22].txt - [2453 octets] - [05/10/2013 19:54:18]
AdwCleaner[R23].txt - [2514 octets] - [05/10/2013 23:43:22]
AdwCleaner[R24].txt - [2607 octets] - [06/10/2013 01:27:10]
AdwCleaner[R25].txt - [2903 octets] - [07/10/2013 00:18:42]
AdwCleaner[R26].txt - [2789 octets] - [07/10/2013 17:06:04]
AdwCleaner[R27].txt - [2850 octets] - [07/10/2013 22:41:36]
AdwCleaner[R28].txt - [2911 octets] - [09/10/2013 12:44:31]
AdwCleaner[R29].txt - [3081 octets] - [11/10/2013 02:56:09]
AdwCleaner[R2].txt - [1152 octets] - [07/09/2013 21:05:20]
AdwCleaner[R30].txt - [3420 octets] - [11/10/2013 03:01:46]
AdwCleaner[R31].txt - [3513 octets] - [11/10/2013 03:21:20]
AdwCleaner[R32].txt - [3215 octets] - [11/10/2013 03:33:54]
AdwCleaner[R33].txt - [3276 octets] - [11/10/2013 14:01:27]
AdwCleaner[R34].txt - [3337 octets] - [11/10/2013 15:00:09]
AdwCleaner[R35].txt - [3398 octets] - [11/10/2013 17:03:34]
AdwCleaner[R36].txt - [3459 octets] - [11/10/2013 20:32:51]
AdwCleaner[R37].txt - [3520 octets] - [11/10/2013 21:12:03]
AdwCleaner[R38].txt - [3581 octets] - [11/10/2013 21:45:39]
AdwCleaner[R39].txt - [3642 octets] - [12/10/2013 00:37:15]
AdwCleaner[R3].txt - [1213 octets] - [08/09/2013 13:35:20]
AdwCleaner[R40].txt - [3703 octets] - [12/10/2013 02:13:44]
AdwCleaner[R41].txt - [3085 octets] - [12/10/2013 03:42:45]
AdwCleaner[R4].txt - [1273 octets] - [12/09/2013 10:55:09]
AdwCleaner[R5].txt - [1333 octets] - [14/09/2013 21:19:23]
AdwCleaner[R6].txt - [1393 octets] - [15/09/2013 23:38:09]
AdwCleaner[R7].txt - [1453 octets] - [16/09/2013 20:12:06]
AdwCleaner[R8].txt - [1513 octets] - [18/09/2013 15:08:59]
AdwCleaner[R9].txt - [1806 octets] - [20/09/2013 15:33:42]
AdwCleaner[S0].txt - [1221 octets] - [07/09/2013 12:07:05]
AdwCleaner[S1].txt - [1993 octets] - [20/09/2013 15:43:04]
AdwCleaner[S2].txt - [2076 octets] - [28/09/2013 01:16:17]
AdwCleaner[S3].txt - [2967 octets] - [07/10/2013 00:35:04]
AdwCleaner[S4].txt - [3501 octets] - [11/10/2013 03:22:05]

########## EOF - C:\AdwCleaner\AdwCleaner[R41].txt - [3806 octets] ##########
 

 

 

 

 

 

Okay, and suddenly that just popped up...

 

 

Second big edit:

 

 

# AdwCleaner v3.007 - Report created 12/10/2013 at 11:44:33
# Updated 09/10/2013 by Xplode
# Operating System : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# Username : Shawn Hegedus - GAMER-PC
# Running from : C:\Users\Shawn Hegedus\Documents\Anti spybot and toolbar program\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\grusskartencenter.com
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\EscDomains\grusskartencenter.com

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16514


-\\ Mozilla Firefox v24.0 (en-US)

[ File : C:\Users\Shawn Hegedus\AppData\Roaming\Mozilla\Firefox\Profiles\9pm8z92i.default\prefs.js ]


-\\ Google Chrome v30.0.1599.69

[ File : C:\Users\Shawn Hegedus\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [1195 octets] - [07/09/2013 12:05:58]
AdwCleaner[R10].txt - [1868 octets] - [20/09/2013 15:37:32]
AdwCleaner[R11].txt - [1929 octets] - [20/09/2013 15:42:44]
AdwCleaner[R12].txt - [1815 octets] - [20/09/2013 21:05:36]
AdwCleaner[R13].txt - [1876 octets] - [27/09/2013 02:30:12]
AdwCleaner[R14].txt - [2014 octets] - [28/09/2013 01:14:42]
AdwCleaner[R15].txt - [2058 octets] - [28/09/2013 12:50:48]
AdwCleaner[R16].txt - [2119 octets] - [30/09/2013 20:28:51]
AdwCleaner[R17].txt - [2180 octets] - [03/10/2013 20:25:13]
AdwCleaner[R18].txt - [2241 octets] - [04/10/2013 21:28:51]
AdwCleaner[R19].txt - [2302 octets] - [05/10/2013 19:43:16]
AdwCleaner[R1].txt - [1092 octets] - [07/09/2013 12:13:39]
AdwCleaner[R20].txt - [2331 octets] - [05/10/2013 19:48:48]
AdwCleaner[R21].txt - [2392 octets] - [05/10/2013 19:50:22]
AdwCleaner[R22].txt - [2453 octets] - [05/10/2013 19:54:18]
AdwCleaner[R23].txt - [2514 octets] - [05/10/2013 23:43:22]
AdwCleaner[R24].txt - [2607 octets] - [06/10/2013 01:27:10]
AdwCleaner[R25].txt - [2903 octets] - [07/10/2013 00:18:42]
AdwCleaner[R26].txt - [2789 octets] - [07/10/2013 17:06:04]
AdwCleaner[R27].txt - [2850 octets] - [07/10/2013 22:41:36]
AdwCleaner[R28].txt - [2911 octets] - [09/10/2013 12:44:31]
AdwCleaner[R29].txt - [3081 octets] - [11/10/2013 02:56:09]
AdwCleaner[R2].txt - [1152 octets] - [07/09/2013 21:05:20]
AdwCleaner[R30].txt - [3420 octets] - [11/10/2013 03:01:46]
AdwCleaner[R31].txt - [3513 octets] - [11/10/2013 03:21:20]
AdwCleaner[R32].txt - [3215 octets] - [11/10/2013 03:33:54]
AdwCleaner[R33].txt - [3276 octets] - [11/10/2013 14:01:27]
AdwCleaner[R34].txt - [3337 octets] - [11/10/2013 15:00:09]
AdwCleaner[R35].txt - [3398 octets] - [11/10/2013 17:03:34]
AdwCleaner[R36].txt - [3459 octets] - [11/10/2013 20:32:51]
AdwCleaner[R37].txt - [3520 octets] - [11/10/2013 21:12:03]
AdwCleaner[R38].txt - [3581 octets] - [11/10/2013 21:45:39]
AdwCleaner[R39].txt - [3642 octets] - [12/10/2013 00:37:15]
AdwCleaner[R3].txt - [1213 octets] - [08/09/2013 13:35:20]
AdwCleaner[R40].txt - [3703 octets] - [12/10/2013 02:13:44]
AdwCleaner[R41].txt - [3887 octets] - [12/10/2013 03:42:45]
AdwCleaner[R42].txt - [4008 octets] - [12/10/2013 03:49:50]
AdwCleaner[R43].txt - [4006 octets] - [12/10/2013 03:55:58]
AdwCleaner[R44].txt - [4067 octets] - [12/10/2013 10:58:32]
AdwCleaner[R45].txt - [4128 octets] - [12/10/2013 11:19:48]
AdwCleaner[R46].txt - [4189 octets] - [12/10/2013 11:20:48]
AdwCleaner[R47].txt - [4250 octets] - [12/10/2013 11:21:39]
AdwCleaner[R48].txt - [4311 octets] - [12/10/2013 11:23:05]
AdwCleaner[R49].txt - [3685 octets] - [12/10/2013 11:44:33]
AdwCleaner[R4].txt - [1273 octets] - [12/09/2013 10:55:09]
AdwCleaner[R5].txt - [1333 octets] - [14/09/2013 21:19:23]
AdwCleaner[R6].txt - [1393 octets] - [15/09/2013 23:38:09]
AdwCleaner[R7].txt - [1453 octets] - [16/09/2013 20:12:06]
AdwCleaner[R8].txt - [1513 octets] - [18/09/2013 15:08:59]
AdwCleaner[R9].txt - [1806 octets] - [20/09/2013 15:33:42]
AdwCleaner[S0].txt - [1221 octets] - [07/09/2013 12:07:05]
AdwCleaner[S1].txt - [1993 octets] - [20/09/2013 15:43:04]
AdwCleaner[S2].txt - [2076 octets] - [28/09/2013 01:16:17]
AdwCleaner[S3].txt - [2967 octets] - [07/10/2013 00:35:04]
AdwCleaner[S4].txt - [3501 octets] - [11/10/2013 03:22:05]
AdwCleaner[S5].txt - [3949 octets] - [12/10/2013 03:46:56]
AdwCleaner[S6].txt - [4070 octets] - [12/10/2013 03:53:08]

########## EOF - C:\AdwCleaner\AdwCleaner[R49].txt - [4526 octets] ##########
 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.4 (10.06.2013:1)
OS: Windows ™ Vista Home Premium x64
Ran by Shawn Hegedus on Sat 10/12/2013 at 11:46:38.77
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{11111111-1111-1111-1111-110211181104}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110211181104}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{300BEC06-B743-4D19-86B9-11DC711D7FFB}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{300BEC06-B743-4D19-86B9-11DC711D7FFB}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{300BEC06-B743-4D19-86B9-11DC711D7FFB}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{300BEC06-B743-4D19-86B9-11DC711D7FFB}



~~~ Files



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\Shawn Hegedus\AppData\Roaming\mozilla\firefox\profiles\9pm8z92i.default\minidumps [84 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sat 10/12/2013 at 11:52:46.41
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

 

 

 

Again, is it possible that these are just from me browsing the internet?



#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 12 October 2013 - 10:59 AM

How is computer doing?

 

1. Update your Java version here: http://www.java.com/en/download/manual.jsp

Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Note 2: If you're running 64-bit system make sure you install BOTH, 32-bit and 64-bit Java.

Note 3: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

2. Now, we need to remove old Java version and its remnants...

Download JavaRa to your desktop and unzip it.

  • Run JavaRa.exe (Vista and 7 users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.
  • Do NOT post JavaRa log.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 12 October 2013 - 11:04 AM

It appears to be saying 'the connection was reset' every time I try to go and download it.

 

And my PC is significantly faster in terms of boot up thanks to junkware, but as I posted just before you did these keys keep coming back.



#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 12 October 2013 - 11:05 AM

Try different browser.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#14 Lehr

Lehr
  • Topic Starter

  • Members
  • 124 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:12:52 AM

Posted 12 October 2013 - 11:07 AM

It says that for Chrome, Firefox and IE.



#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,658 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:52 PM

Posted 12 October 2013 - 11:11 AM

I got same thing.

It seems to be site issue.

Get it here: http://www.filehippo.com/search?q=java


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users