Recent Posts

Pages: [1] 2 3 ... 10
1
Analysis and Malware Removal / Re: Have I been Hacked
« Last post by Corrine on Today at 09:01:09 PM »
Thank you!  Please do the following now.

1.  Double-click AdwCleaner.exe to run the tool again.
  • Click the Scan button.
  • AdwCleaner will begin to scan your computer like it did before.
Note:  Windows Vista, Windows 7/8 users right-click and select Run As Administrator.
  • After the scan has finished,
  • This time click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[CX].txt) will open automatically (where the largest value of X represents the most recent report).
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
2.  Please download Junkware Removal Tool to your desktop.
  • Disable your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it.  If you are using Windows Vista or Seven, right-mouse click it and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

3.  Please download Farbar Recovery Scan Tool (FRST) and save it to your Desktop.

Note: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Right click to run as administrator. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • The first time FRST is run, it will produce two logs in the same directory the tool is run from -- FRST.txt and (Addition.txt.
  • Please copy/paste both logs in your reply.
IMPORTANT:  Due to the length of the logs it will take at least two replies to get them to fit.  Post the AdwCleaner and Junkware Removal Tool logs in one reply.  Then proceed to run FRST and post the two logs.  (Note:  It may even take a third reply for both of the FRST logs to post.)
2
WinPatrol Help & Information / Re: WinPatrol.com not available
« Last post by winchester73 on Today at 08:49:39 PM »
Quote
It's not just you!

http://downforeveryoneorjustme.com/Winpatrol.com

Looks that way   :-\
3
WinPatrol Help & Information / WinPatrol.com not available
« Last post by Gopher John on Today at 08:36:52 PM »
https://www.winpatrol.com is not accessible currently.
4
LandzDown Lounge / Re: 5 letters Game
« Last post by Pete! on Today at 08:34:17 PM »
solar - Some occupations lack any reward.

swell
5
LandzDown Lounge / Re: The Last Two words become the First Two Words
« Last post by Pete! on Today at 08:30:19 PM »
Red wine warehouses aren't necessarily painted red.
6
LandzDown Lounge / Re: 2 Word Game
« Last post by Pete! on Today at 08:28:11 PM »
ego trip
7
Analysis and Malware Removal / Re: Have I been Hacked
« Last post by Heather Iles on Today at 08:27:52 PM »
# AdwCleaner v6.042 - Logfile created 17/01/2017 at 21:57:55
# Updated on 06/01/2017 by Malwarebytes
# Database : 2017-01-17.2 [Local]
# Operating System : Windows 10 Pro  (X64)
# Username : heather - HEATHER-HP
# Running from : C:\Users\heather\Downloads\adwcleaner_6.042 (1).exe
# Mode: Scan
# Support : https://www.malwarebytes.com/support



***** [ Services ] *****

Service Found:  EsgScanner


***** [ Folders ] *****

Folder Found:  C:\Users\heather\AppData\Local\DriverToolkit
Folder Found:  C:\Users\heather\AppData\Roaming\FileOpenerWindows
Folder Found:  C:\Program Files (x86)\DriverToolkit
Folder Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Extensions\ceopoaldcnmhechacafgagdkklcogkgd
Folder Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Extensions\bbommkhnakaddhednbjjffmcopnngpkk


***** [ Files ] *****

File Found:  C:\WINDOWS\SysNative\drivers\EsgScanner.sys
File Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ceopoaldcnmhechacafgagdkklcogkgd_0.localstorage
File Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ceopoaldcnmhechacafgagdkklcogkgd_0.localstorage-journal
File Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bbommkhnakaddhednbjjffmcopnngpkk_0.localstorage
File Found:  C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bbommkhnakaddhednbjjffmcopnngpkk_0.localstorage-journal


***** [ DLL ] *****

No malicious DLLs found.


***** [ WMI ] *****

No malicious keys found.


***** [ Shortcuts ] *****

No infected shortcut found.


***** [ Scheduled Tasks ] *****

Task Found:  DRIVERTOOLKIT AUTORUN


***** [ Registry ] *****

Key Found:  [x64] HKLM\SOFTWARE\Microsoft\Shared Tools\MSConfig\services\SlimService
Key Found:  HKLM\SOFTWARE\Classes\protector_dll.Protector
Key Found:  HKLM\SOFTWARE\Classes\protector_dll.Protector.1
Key Found:  HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib
Key Found:  HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib.1
Key Found:  HKLM\SOFTWARE\Classes\uus3url-pl
Key Found:  [x64] HKLM\SOFTWARE\Classes\protector_dll.Protector
Key Found:  [x64] HKLM\SOFTWARE\Classes\protector_dll.Protector.1
Key Found:  [x64] HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib
Key Found:  [x64] HKLM\SOFTWARE\Classes\protector_dll.ProtectorLib.1
Key Found:  [x64] HKLM\SOFTWARE\Classes\uus3url-pl
Key Found:  HKU\S-1-5-21-3195271789-3375330248-1554225971-1000\Software\DriverToolkit
Key Found:  HKCU\Software\DriverToolkit
Key Found:  [x64] HKCU\Software\DriverToolkit
Key Found:  [x64] HKLM\SOFTWARE\DtsEncodeTools
Key Found:  HKCU\Software\Microsoft\Internet Explorer\DOMStorage\castplatform.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\DOMStorage\cdn.castplatform.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\ask.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\driverupdate.net
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\fromdoctopdf.dl.tb.ask.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\izito.co.uk
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\izito.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\mysearch.avg.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\totalrecipesearch.dl.tb.ask.com
Key Found:  HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\unicef.org.uk
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\DOMStorage\castplatform.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\DOMStorage\cdn.castplatform.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\ask.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\driverupdate.net
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\fromdoctopdf.dl.tb.ask.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\izito.co.uk
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\izito.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\mysearch.avg.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\totalrecipesearch.dl.tb.ask.com
Key Found:  [x64] HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\unicef.org.uk
Value Found:  HKLM\SOFTWARE\Classes\Unknown\shell\openas\command [windowsfileopener.Dat]
Value Found:  HKLM\SOFTWARE\Classes\Unknown\shell\opendlg\command [windowsfileopener.Dat]
Key Found:  HKCU\Software\Google\Chrome\Extensions\ljibkigjccbegnbeojkoafejpoiachej
Key Found:  HKLM\SOFTWARE\Google\Chrome\Extensions\ljibkigjccbegnbeojkoafejpoiachej
Key Found:  [x64] HKCU\Software\Google\Chrome\Extensions\ljibkigjccbegnbeojkoafejpoiachej
Key Found:  [x64] HKLM\SOFTWARE\Google\Chrome\Extensions\ljibkigjccbegnbeojkoafejpoiachej


***** [ Web browsers ] *****

No malicious Firefox based browser items found.
Chrome pref Found:  [C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences ] - bbommkhnakaddhednbjjffmcopnngpkk
Chrome pref Found:  [C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences ] - ceopoaldcnmhechacafgagdkklcogkgd
Chrome pref Found:  [C:\Users\heather\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences ] - ljibkigjccbegnbeojkoafejpoiachej

*************************

C:\AdwCleaner\AdwCleaner[S0].txt - [5933 Bytes] - [17/01/2017 21:50:08]
C:\AdwCleaner\AdwCleaner[S1].txt - [5783 Bytes] - [17/01/2017 21:57:55]

########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [5856 Bytes] ##########
8
LandzDown Lounge / Re: 2 Word Game
« Last post by JDBush61 on Today at 07:51:28 PM »
wounded ego

9
LandzDown Lounge / Re: 5 letters Game
« Last post by JDBush61 on Today at 07:51:06 PM »
lunar - Let us now anticipate revolutions.

solar
10
LandzDown Lounge / Re: The Last Two words become the First Two Words
« Last post by JDBush61 on Today at 07:50:07 PM »
Fermentation vat left open at the winery, I fell in and almost drowned after drunkenly dancing around on the rim of the vat slugging down a delicious bottle of red wine.

Pages: [1] 2 3 ... 10