For Warrior

Having software/hardware problems? Get help here!

For Warrior

Postby [Aliens]kronenbourg » Sat May 18, 2013 3:12 pm

Hi mate

For your connection issues, lets see if malware is the cause. Do the following, and post the logs here or email me them, if you wish.

Download [url="http://oldtimer.geekstogo.com/OTL.exe"][color="red"]OTL[/color][/url] to your Desktop


  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Standard Output.
  • Select
    All Users
    LOP Check
    Purity Check
  • Under the Standard Registry box change it to All
  • Please copy the text in the code box below and paste it in the Custom Scans/Fixes box in OTL:

    Code: Select all
    netsvcs
    activex
    msconfig
    %SYSTEMDRIVE%\*.
    %PROGRAMFILES%\*.exe
    %LOCALAPPDATA%\*.exe
    %windir%\Installer\*.*
    %windir%\system32\tasks\*.*
    %windir%\system32\tasks\*.* /64
    %systemroot%\Fonts\*.exe
    %systemroot%\*. /mp /s
    /md5start
    consrv.dll
    explorer.exe
    winlogon.exe
    regedit.exe
    Userinit.exe
    svchost.exe
    services.exe
    user32.dll
    ATAPI.SYS
    /md5stop
    C:\Windows\assembly\tmp\U\*.* /s
    %Temp%\smtmp\* \s
    %Temp%\smtmp\1\*.*
    %Temp%\smtmp\2\*.*
    %Temp%\smtmp\3\*.*
    %Temp%\smtmp\4\*.*
    CREATERESTOREPOINT

  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    [COLOR="Red"]IF OTL SAYS 'NOT RESPONDING' DON'T USE THE MOUSE. IT WILL CARRY ON SCANNING AFTER A FEW MINUTES[/COLOR]

  • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time and post them in your topic
Image

Image
User avatar
[Aliens]kronenbourg
Lieutenant General
Lieutenant General
 
Posts: 4665
Joined: Thu Oct 19, 2006 7:20 am
Location: Bradford, England

Re: For Warrior

Postby [Aliens]kronenbourg » Fri May 24, 2013 7:44 pm

Download Security Check from [url="http://screen317.spywareinfoforum.org/SecurityCheck.exe"]here[/url].
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Please download Malwarebytes' Anti-Malware from [url="http://www.malwarebytes.org/mbam-download.php"][color="#2E8B57"]Here[/color][/url]

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
[color="#2E8B57"]If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediatly.[/color]






Download and scan with SUPERAntiSpyware Free Edition for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Home" button to leave the control center screen.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click Scan your computer.
  • On the left, select all fixed drives.
  • Click "Start Complete Scan" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "Continue".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "Remove Threats" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click View Scan Logs.
    • [i][color=green]Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.




Image Please download Junkware Removal Tool to your desktop.
  • [color="#FF0000"]Shut down your protection software now to avoid potential conflicts.[/color]
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.



Please download [url="http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner"]AdwCleaner[/url] by Xplode onto your desktop.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Search.
  • A logfile will automatically open after the scan has finished.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[R1].txt as well.




Please include the MBAM log, SUPERAntiSpyware Scan Log, checkup.txt, JRT.txt and adwCleaner[R1].txt in your next reply

eddie
Image

Image
User avatar
[Aliens]kronenbourg
Lieutenant General
Lieutenant General
 
Posts: 4665
Joined: Thu Oct 19, 2006 7:20 am
Location: Bradford, England

Re: For Warrior

Postby [Aliens]Warriorjock » Fri May 24, 2013 7:53 pm

Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Windows 7 Home Premium x64
Ran by Hiram on 24/05/2013 at 20:47:41.58
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\babylon
Failed to delete: [Registry Key] HKEY_CURRENT_USER\Software\datamngr
Failed to delete: [Registry Key] HKEY_LOCAL_MACHINE\Software\datamngr
Failed to delete: [Registry Key] HKEY_CURRENT_USER\Software\datamngr_toolbar
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\softonic
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\windows\currentversion\ext\bprotectsettings
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\prod.cap
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\tracing\mybabylontb_rasapi32
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\tracing\mybabylontb_rasmancs
Failed to delete: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\datamngr
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\babylon"
Successfully deleted: [Folder] "C:\Users\Hiram\AppData\Roaming\babylon"



~~~ Event Viewer Logs were cleared
Image
Image




WHO DARES WINS
[Aliens]Warriorjock
Captain
Captain
 
Posts: 1745
Joined: Mon Oct 23, 2006 11:20 am
Location: Scotland

Re: For Warrior

Postby [Aliens]Warriorjock » Fri May 24, 2013 7:58 pm

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/24/2013 at 08:56 PM

Application Version : 5.6.1020

Core Rules Database Version : 10444
Trace Rules Database Version: 8256

Scan type : Quick Scan
Total Scan Time : 00:02:00

Operating System Information
Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned : 504
Memory threats detected : 0
Registry items scanned : 59865
Registry threats detected : 0
File items scanned : 10407
File threats detected : 25

Adware.Tracking Cookie
C:\Users\Hiram\AppData\Roaming\Microsoft\Windows\Cookies\1CIUUW67.txt [ /www.virginmedia.com ]
.doubleclick.net [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\Users\Hiram\AppData\Roaming\Microsoft\Windows\Cookies\XKEU2OBK.txt [ /www.virginmedia.com ]
.invitemedia.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
.invitemedia.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\Users\Hiram\AppData\Roaming\Microsoft\Windows\Cookies\B8X7BSU7.txt [ /da.virginmedia.com ]
.invitemedia.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\Users\Hiram\AppData\Roaming\Microsoft\Windows\Cookies\D1A88P76.txt [ /virginmedia.com ]
ad.yieldmanager.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\Users\Hiram\AppData\Roaming\Microsoft\Windows\Cookies\0CTOG401.txt [ /da.virginmedia.com ]
ad.yieldmanager.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
ad.yieldmanager.com [ C:\USERS\HIRAM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\V3AP6HSN.txt [ Cookie:hiram@www.virginmedia.com/index.php/resetLegacy ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\BTTTMLOK.txt [ Cookie:hiram@www.virginmedia.com/ ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\L8YLBE18.txt [ Cookie:hiram@videogames.virginmedia.com/ ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\M3D3S88D.txt [ Cookie:hiram@da.virginmedia.com/virginmedia/vmmsu/ ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\S4REDRFW.txt [ Cookie:hiram@virginmedia.com/ ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\IYY8HFR6.txt [ Cookie:hiram@help.virginmedia.com/system/ ]
C:\USERS\HIRAM\AppData\Roaming\Microsoft\Windows\Cookies\Low\LS356NHH.txt [ Cookie:hiram@da.virginmedia.com/virginmedia/ ]
C:\USERS\HIRAM\Cookies\1CIUUW67.txt [ Cookie:hiram@www.virginmedia.com/index.php/resetLegacy ]
C:\USERS\HIRAM\Cookies\XKEU2OBK.txt [ Cookie:hiram@www.virginmedia.com/ ]
C:\USERS\HIRAM\Cookies\B8X7BSU7.txt [ Cookie:hiram@da.virginmedia.com/virginmedia/vmmsu/ ]
C:\USERS\HIRAM\Cookies\D1A88P76.txt [ Cookie:hiram@virginmedia.com/ ]
C:\USERS\HIRAM\Cookies\0CTOG401.txt [ Cookie:hiram@da.virginmedia.com/virginmedia/ ]
Image
Image




WHO DARES WINS
[Aliens]Warriorjock
Captain
Captain
 
Posts: 1745
Joined: Mon Oct 23, 2006 11:20 am
Location: Scotland

Re: For Warrior

Postby [Aliens]Warriorjock » Fri May 24, 2013 8:03 pm

# AdwCleaner v2.301 - Logfile created 05/24/2013 at 21:01:36
# Updated 16/05/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Hiram - HIRAM-PC
# Boot Mode : Normal
# Running from : C:\Users\Hiram\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F1XEEGGQ\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****

File Found : C:\Users\Hiram\AppData\Local\Temp\Uninstall.exe

***** [Registry] *****

Key Found : HKCU\Software\DataMngr
Key Found : HKCU\Software\DataMngr_Toolbar
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Found : HKCU\Software\522df88b46eba46
Key Found : HKLM\SOFTWARE\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Found : HKLM\Software\DataMngr
Key Found : HKLM\SOFTWARE\Wow6432Node\522df88b46eba46
Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Found : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16483

[OK] Registry is clean.

-\\ Google Chrome v27.0.1453.94

File : C:\Users\Hiram\AppData\Local\Google\Chrome\User Data\Default\Preferences

Found [l.357] : homepage = "hxxp://www.delta-search.com/?affID=119529&babsrc=HP_ss&mntrId=941a0bf7000000000000204e7fe966d9",
Found [l.378] : urls_to_restore_on_startup = [ "hxxp://www.delta-search.com/?affID=119529&babsrc=HP_ss&mntrId=941a0bf7000000000000204e7fe966d9" ]

*************************

AdwCleaner[R1].txt - [2095 octets] - [24/05/2013 21:01:36]

########## EOF - C:\AdwCleaner[R1].txt - [2155 octets] ##########
Image
Image




WHO DARES WINS
[Aliens]Warriorjock
Captain
Captain
 
Posts: 1745
Joined: Mon Oct 23, 2006 11:20 am
Location: Scotland

Re: For Warrior

Postby [Aliens]Warriorjock » Fri May 24, 2013 8:09 pm

# AdwCleaner v2.301 - Logfile created 05/24/2013 at 21:05:52
# Updated 16/05/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Hiram - HIRAM-PC
# Boot Mode : Normal
# Running from : C:\Users\Hiram\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F1XEEGGQ\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

File Deleted : C:\Users\Hiram\AppData\Local\Temp\Uninstall.exe

***** [Registry] *****

Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKCU\Software\522df88b46eba46
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\SOFTWARE\Wow6432Node\522df88b46eba46
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16483

[OK] Registry is clean.

-\\ Google Chrome v27.0.1453.94

File : C:\Users\Hiram\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.357] : homepage = "hxxp://www.delta-search.com/?affID=119529&babsrc=HP_ss&mntrId=941a0bf700000000000020[...]
Deleted [l.378] : urls_to_restore_on_startup = [ "hxxp://www.delta-search.com/?affID=119529&babsrc=HP_ss&mntrId[...]

*************************

AdwCleaner[R1].txt - [2218 octets] - [24/05/2013 21:01:36]
AdwCleaner[S1].txt - [2151 octets] - [24/05/2013 21:05:52]

########## EOF - C:\AdwCleaner[S1].txt - [2211 octets] ##########
Image
Image




WHO DARES WINS
[Aliens]Warriorjock
Captain
Captain
 
Posts: 1745
Joined: Mon Oct 23, 2006 11:20 am
Location: Scotland


Return to Tech-support

Who is online

Users browsing this forum: No registered users and 1 guest

cron