Jump to content

Machiavelli

Honorary Members
  • Posts

    90
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Hello, all. I just wanted to inform you that MBAM has render issues on 4k screen. I have a 4k laptop and when I open MBAM it opens up with a very small window where you can not read anything - you would need to max it out to be able to see something. Just wanted to inform you about this in case it is an unknown issue.
  2. Hello, in my opinion your PC is clean. If you would like to donate some money to me that I can buy some beer, then click on the button . I'd really appreciate it, my friend. We need to remove the tools we've used during cleaning your machine. Download Delfix from here and run it (If you have Windows Vista / Windows 7 / Windows 8 please do a Right click on the Delfix icon and select Run as Administrator).Ensure Remove disinfection tools is ticked Also tick: Create registry backupPurge system restoreClick RunThe program will run for a few moments and then notepad will open with a log. Please paste the log in your next reply Exercise common sense Having security programs installed is very helpful to you, but none of them have the gift of human thought. The best way to make sure you don't get infected is to look before you leap. Be careful of what websites you visit - if a site looks suspicious, trust your instincts and get out of there. Be careful of what attachments you open in emails and files you download from websites - check them over carefully and look at the file extensions to make sure that you know what you're getting. Using peer-to-peer file sharing programs or downloading cracks and keygens is something else to avoid - the files you will be downloading are infected in the vast majority of cases, and the benefits simply aren't worth the risk to your computer. Keep up on Windows updates Along with keeping all of the security programs that you choose to use updated, it is also important to keep up on system updates from Microsoft, as these patch critical security vulnerabilities and help to keep you safe. Typically the windows update icon will appear in your taskbar when new updates are available, whenever you see it you should open the menu up and install the updates that are available. Although it may be an annoyance, that little bit of extra time it takes to stay updated is very well worth it instead of getting infected from an exploit and having to clean your PC again. Slow computer? If your computer begins to slow down again in the future for no particular reason, your first step should not be to come back to the malware forum. As your computer ages and is used, its parts wear, files and programs accumulate, and its performance speed can decrease. To restore your computer's performance to its best possible level, follow the steps in this guide written by tech expert Artellos. Keep Safe! :thumbsup:
  3. How is your system running? I'm away until Thursday.
  4. Good day, IMPORTANT: You MUST use Internet Explorer for this step! Visit the ESET Online Scanner Web PageSelect the blue Run ESET Online Scanner button: Tick the box next to YES, I accept the Terms of Use and click Start When asked, allow the ActiveX control to install.Select Enable detection of potentially unwanted applications and select Advanced Settings: Make sure to check the options Remove found threats and Enable Anti-Stealth technology are checked: Click Start. (This scan can take several hours, so please be patient): Once the scan is completed, select List of found threats: Select Export to text file... and save the file as ESETlog.txt on your Desktop: Click the Back button.Click the Finish button: Use Notepad to open the saved log file (on your Desktop- ESET.txt)Copy and paste that log as a reply to this topic.
  5. Good day, Run FRST. (if you have Windows Vista / Windows 7 / Windows 8: Please do a Right click on the FRST icon and select Run as Administrator)Click Scan to start FRST.When FRST finishes scanning, a log, FRST.txt, will open.Copy (Ctrl+C) and Paste (Ctrl+V) the contents of this log into your next post please.
  6. Can you please split the log into more posts because I can not download attachments on my personal computer. Thank you.
  7. Hello raxxo3, welcome to Malwarebytes forum! My name is Machiavelli. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Ensure you read through my instructions thoroughly, and carry out each step in the order specified.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in providing the best set of instructions for you.Please backup important files before proceeding with my instructions. Malware removal can be unpredictable at times. If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.Topics are locked if no response is made after 4 days. Please inform me if you require additional time to complete my instructions.I will notify you when I believe your computer is free of malware. Please bear in mind, absence of symptoms does not necessarily correlate to absence of malware, so please wait until the "All Clean". Ensure you are following this topic. Click at the top of the page. ====================================================== Please run the following diagnostic scans so I can ascertain the state of your computer. STEP 1 Farbar Recovery Scan Tool (FRST) Scan Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.Right-Click FRST.exe or FRST64.exe and select Run as administrator to run the programme.Click Yes to the disclaimer.Ensure the Addition.txt box is checked.Click the Scan button and let the programme run.Upon completion, click OK, then OK on the Addition.txt pop up screen.Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply.====================================================== STEP 2 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. FRST.txtAddition.txt
  8. Hello kellylikesmusic, welcome to Malwarebytes forum! My name is Machiavelli. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Ensure you read through my instructions thoroughly, and carry out each step in the order specified.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in providing the best set of instructions for you.Please backup important files before proceeding with my instructions. Malware removal can be unpredictable at times. If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.Topics are locked if no response is made after 4 days. Please inform me if you require additional time to complete my instructions.I will notify you when I believe your computer is free of malware. Please bear in mind, absence of symptoms does not necessarily correlate to absence of malware, so please wait until the "All Clean". Ensure you are following this topic. Click at the top of the page. ====================================================== On April 8th 2014, Microsoft officially declared Windows XP as unsupported, and consequently ceased the production and release of Windows XP Updates and Security Patches. Please refer to the following articles for more information. End Of Support For Windows XP SP3 is April 8, 2014Windows XP - The Elephant In The RoomWith XP ending, what are your alternatives?Without Windows Updates, your computer will be continuously susceptible to malware infection. In the past, vulnerabilities found in the Windows XP software were patched shortly after by Microsoft issuing an Update. Now that XP is no long supported with Updates, once a vulnerability is discovered, it will not be patched; allowing malware authors to freely distribute their exploit in the knowledge the vulnerability will not be patched. Keeping an Internet-connected Windows XP machine free of malware is unpractical. The only solution is to upgrade to a supported Operating System (Windows Vista/7/8). Please let me know if you have any questions. ====================================================== STEP 1 Farbar Recovery Scan Tool (FRST) Script Press the Windows Key + r on your keyboard at the same time. Type Notepad and click OK.Copy the entire contents of the codebox below and paste into the Notepad document. start CreateRestorePoint:CHR HKU\S-1-5-21-1614895754-682003330-725345543-1003\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTIONHKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTIONHKU\S-1-5-21-1614895754-682003330-725345543-1003\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTIONRemoveProxy:HKLM\SOFTWARE\Microsoft\Internet Explorer\AboutURLs,Tabs: "about:newtab" <======= ATTENTIONBHO: No Name -> {02478D38-C3F9-4efb-9B51-7695ECA05670} -> No FileToolbar: HKLM - No Name - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No FileToolbar: HKU\S-1-5-21-1614895754-682003330-725345543-1003 -> No Name - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No FileToolbar: HKU\S-1-5-21-1614895754-682003330-725345543-1003 -> No Name - {E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39} - No FileHandler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - No FileHandler: viprotocol - {B658800C-F66E-4EF3-AB85-6C0C227862A9} - No FileFF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll No File2010-04-06 07:32 - 2010-04-06 07:32 - 0015276 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\25771803882010-04-06 07:32 - 2010-04-06 14:26 - 0015284 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\3Yfi2010-04-06 07:32 - 2010-04-06 07:32 - 0015276 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\40194321852010-03-15 14:47 - 2010-03-16 10:53 - 0014016 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\4GCn8U72010-03-23 08:55 - 2010-03-23 08:57 - 0014210 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\Mh3jm32txN2010-03-26 14:40 - 2010-03-26 17:49 - 0012106 ___SH () C:\Documents and Settings\Kerry Strand\Local Settings\Application Data\YGvcpA571WxAlternateDataStreams: C:\Documents and Settings\All Users\Application Data\TEMP:0B4227B4HKU\.DEFAULT\Software\Classes\.exe: exefile => <===== ATTENTION!HKU\.DEFAULT\Software\Classes\secfile: Application <===== ATTENTION!EmptyTemp:endClick File, Save As and type fixlist.txt as the File Name. Important: The file must be saved in the same location as FRST64.exe. NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System. Right-Click FRST64.exe and select Run as administrator to run the programme.Click Fix.A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply. STEP 2 Malwarebytes Anti-Malware (MBAM) Open Malwarebytes Anti-Malware and click Update Now.Once updated, click the Settings tab, followed by Detection and Protection and tick Scan for rootkits.Click the Scan tab, ensure Threat Scan is selected and click Start Scan.Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards. If threats are detected, click Remove Selected. If you are prompted to reboot, click Yes.Upon completion of the scan (or after the reboot), click the History tab.Click Application Logs and double-click the Scan Log.Click Copy to Clipboard and paste the log in your next reply. STEP 3 Junkware Removal Tool (JRT) Please download Junkware Removal Tool and save the file to your Desktop.Create a System Restore Point. For instructions, please refer to the following link (W8) | link (W7) | link (Vista).Temporarily disable your anti-virus software. For instructions, please refer to the following link.Right-Click JRT.exe and select Run as administrator to run the programme.Follow the prompts and allow the scan to run uninterrupted. Upon completion, a log (JRT.txt) will open on your desktop.Re-enable your anti-virus software.Copy the contents of JRT.txt and paste in your next reply. STEP 4 AdwCleaner Please download AdwCleaner and save the file to your Desktop.Right-Click AdwCleaner.exe and select Run as administrator to run the programme.Follow the prompts. Click Scan. Upon completion, click Report. A log (AdwCleaner[R0].txt) will open. Briefly check the log for anything you know to be legitimate. Ensure anything you know to be legitimate does not have a checkmark, and click Clean. Follow the prompts and allow your computer to reboot. After rebooting, a log (AdwCleaner[s0].txt) will open. Copy the contents of the log and paste in your next reply.-- File and folder backups are made for items removed using this tool. Should a legitimate file or folder be removed (otherwise known as a 'false-positive'), simple steps can be taken to restore the item. Please do not overly concern yourself with the contents of AdwCleaner[R0].txt. ====================================================== STEP 5 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. Fixlog.txtMBAM logJRT.txtAdwCleaner[s0].txt
  9. Hello, in my opinion your PC is clean. We need to remove the tools we've used during cleaning your machine Download Delfix from here and run it (If you have Windows Vista / Windows 7 / Windows 8 please do a Right click on the Delfix icon and select Run as Administrator).Ensure Remove disinfection tools is ticked Also tick: Create registry backupPurge system restoreClick RunThe program will run for a few moments and then notepad will open with a log. Please paste the log in your next reply Exercise common sense Having security programs installed is very helpful to you, but none of them have the gift of human thought. The best way to make sure you don't get infected is to look before you leap. Be careful of what websites you visit - if a site looks suspicious, trust your instincts and get out of there. Be careful of what attachments you open in emails and files you download from websites - check them over carefully and look at the file extensions to make sure that you know what you're getting. Using peer-to-peer file sharing programs or downloading cracks and keygens is something else to avoid - the files you will be downloading are infected in the vast majority of cases, and the benefits simply aren't worth the risk to your computer. Keep up on Windows updates Along with keeping all of the security programs that you choose to use updated, it is also important to keep up on system updates from Microsoft, as these patch critical security vulnerabilities and help to keep you safe. Typically the windows update icon will appear in your taskbar when new updates are available, whenever you see it you should open the menu up and install the updates that are available. Although it may be an annoyance, that little bit of extra time it takes to stay updated is very well worth it instead of getting infected from an exploit and having to clean your PC again. Slow computer? If your computer begins to slow down again in the future for no particular reason, your first step should not be to come back to the malware forum. As your computer ages and is used, its parts wear, files and programs accumulate, and its performance speed can decrease. To restore your computer's performance to its best possible level, follow the steps in this guide written by tech expert Artellos. Keep Safe! :thumbsup:
  10. OK I'm also a teenager I will wait for the feedback of your son.
  11. Please follow these instructions here to reset chrome. Step 1: FRST Fix Please download the attached fixlist.txt file and save it to the same location as FRST Note: It's important that both files, FRST.exe/FRST64.exe and fixlist.txt are in the same location or the fix will not work NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system​ Run FRST.exe/FRST64.exe and press the Fix button just once and waitIf for some reason the tool needs a restart, please make sure you let the system restart normally, then let the tool complete its runWhen finished, FRST will generate a log (Fixlog.txt) in the same location the tool was run, please post it to your replyStep 2: FRST ScanRun FRST. (if you have Windows Vista / Windows 7 / Windows 8: Please do a Right click on the FRST icon and select Run as Administrator)Click Scan to start FRST.When FRST finishes scanning, a log, FRST.txt, will open.Copy (Ctrl+C) and Paste (Ctrl+V) the contents of this log into your next post please.Step 3: ESET Please run a free online scan with the ESET Online Scanner: IMPORTANT: You MUST use Internet Explorer for this step! Visit the ESET Online Scanner Web PageSelect the blue Run ESET Online Scanner button: Tick the box next to YES, I accept the Terms of Use and click Start When asked, allow the ActiveX control to install.Select Enable detection of potentially unwanted applications and select Advanced Settings: Make sure to check the options Remove found threats and Enable Anti-Stealth technology are checked: Click Start. (This scan can take several hours, so please be patient): Once the scan is completed, select List of found threats: Select Export to text file... and save the file as ESETlog.txt on your Desktop: Click the Back button.Click the Finish button: Use Notepad to open the saved log file (on your Desktop- ESET.txt)Copy and paste that log as a reply to this topic.Step 4: Question How is your PC running? fixlist.txt
  12. Yes, there is much, much Adware. Step 1: Adwarecleaner Please download AdwCleaner (by Xplode) from the link below and save it to your Desktop: Download Mirror #1 Right-click on AdwCleaner.exe and select Run as administrator. (If you have Windows XP the just run it)Click Scan and let the scan run.When it finishes, click Clean, following the on screen promptsAfter your computer reboots, a log will open. Please Copy (Ctrl+C) and Paste (Ctrl+V) this into your next post.Note: The log can also be found in here: C:\AdwCleaner\ Step 2: Malwarebytes Please download Malwarebytes Anti-Malware to your desktop Install the progamme and select update Once it has updated select Settings > Detection and Protection Tick Scan for rootkits Go back to the Dashboard and select Scan Now If threats are detected, click the Apply Actions button, MBAM will ask for a reboot. On completion of the scan (or after the reboot) select View Detailed Log Select Export > Select text file and save to the desktop Attach/Post that log Step 3: Junkware Removal Tool Please download Junkware Removal Tool to your desktop. Shut down your protection software now to avoid potential conflicts.Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".The tool will open and start scanning your system.Please be patient as this can take a while to complete depending on your system's specifications.On completion, a log (JRT.txt) is saved to your desktop and will automatically open.Post the contents of JRT.txt into your next message.Step 4: FRST ScanRun FRST. (if you have Windows Vista / Windows 7 / Windows 8: Please do a Right click on the FRST icon and select Run as Administrator)Click Scan to start FRST.When FRST finishes scanning, a log, FRST.txt, will open.Copy (Ctrl+C) and Paste (Ctrl+V) the contents of this log into your next post please.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.