Jump to content

AJAvery83

Members
  • Content Count

    13
  • Joined

  • Last visited

Community Reputation

0 Neutral

About AJAvery83

  • Rank
    New Member
  1. RogueKiller V10.0.9.0 [Dec 8 2014] by Adlice Software mail : http://startsear.info -> Found [PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found [PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found ¤¤¤ Tasks : 0 ¤¤¤ ¤¤¤ Files : 1 ¤¤¤ [suspicious.Path?Suspicious.Startup][File] Amber.exe -- C:\Users\Amber\AppData\Roaming\Microsoft\Windows\Star
  2. SHA256: 80736950e34ed8995a740456a6c50c95b90eda929550a60686f94db8ba961195 File name: video.exe Detection ratio: 38 / 56 Analysis date: 2014-12-10 20:54:54 UTC ( 0 minutes ago ) Developer metadataProduct softwareInternal name softwareFile version 0.0.0.9 PE header basic informationTarget machine Intel 386 or later processors and compatible processorsCompilation timestamp 2013-11-03 04:13:27Entry Point 0x00050501Number of sections 5 PE sectionsName Virtual address Virtual size Raw size Entropy MD5.text 4096 377396 377856 6.57 f6d6ec6c743e
  3. I'm not sure what a proxy server is, or what that one posted above is. ALYac Gen:Variant.Kazy.367496 20141210 AVG Generic34.BSHV 20141210 AVware Trojan.Win32.Generic!BT 20141209 Ad-Aware Gen:Variant.Kazy.367496 20141210 Agnitum TrojanSpy.Carberp!C4teSSSAs8o 20141210 AhnLab-V3 Spyware/Win32.Carberp 20141210 Antiy-AVL Trojan[PSWTool:not-a-virus]/Win32.FirePass 20141210 Avast Win32:PasswordDump-A [Tool] 20141210 Avira TR/Symmi.18328.26 20141210
  4. Just to keep you up to date on the progress, after all of those scans Startsear.info is still setting itself to my home page.
  5. Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-12-2014 01 Ran by Amber (administrator) on AMBER-PC on 10-12-2014 06:58:14 Running from C:\Users\Amber\Desktop Loaded Profile: Amber (Available profiles: Amber) Platform: Microsoft Windows 7 Home Premium Service Pack 1 (X86) OS Language: English (United States) Internet Explorer Version 11 Boot Mode: Normal Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Processes (Whitelisted) ================= (If an entry is include
  6. --------------------------------------------------------------------------------------- Microsoft Windows Malicious Software Removal Tool v3.2, December 2009 Started On Wed Dec 16 19:29:08 2009 WARNING: Security policy doesn't allow for all actions MSRT may require.->Scan ERROR: resource process://pid:1048 (code 0x00000005 (5)) Results Summary: ---------------- No infection found. Microsoft Windows Malicious Software Removal Tool Finished On Wed Dec 16 19:30:23 2009 Return code: 0 (0x0) --------------------------------------------------------------------------------------- Microsoft W
  7. Junkware Removal Tool (JRT) by Thisisu Version: 6.4.0 (11.29.2014:1) OS: Windows 7 Home Premium x86 Ran by Amber on Wed 12/10/2014 at 6:42:11.63 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services Successfully stopped: [service] antispywareservice Successfully deleted: [service] antispywareservice ~~~ Registry Values Successfully deleted: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{652853ad-5592-4231-88c6-706613a52e61} Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\\Star
  8. This is the AdwCleaner results (the browser hijacker is still in effect at this point btw). # AdwCleaner v4.105 - Report created 10/12/2014 at 06:37:47 # Updated 08/12/2014 by Xplode # Database : 2014-12-08.2 [Live] # Operating System : Windows 7 Home Premium Service Pack 1 (32 bits) # Username : Amber - AMBER-PC # Running from : C:\Users\Amber\Desktop\adwcleaner_4.105.exe # Option : Clean ***** [ Services ] ***** ***** [ Files / Folders ] ***** ***** [ Scheduled Tasks ] ***** ***** [ Shortcuts ] ***** ***** [ Registry ] ***** Key Deleted : HKCU\Software\Microsoft\Internet Explorer
  9. It let me export it to text. This is what the results said for the Malewarebytes scan (It found and deleted 4 items). Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 12/10/2014 Scan Time: 6:16:55 AM Logfile: Upload this.txt Administrator: Yes Version: 0.00.0.0000 Malware Database: v2014.12.10.06 Rootkit Database: v2014.12.08.03 License: Premium Malware Protection: Enabled Malicious Website Protection: Enabled Self-protection: Disabled OS: Windows 7 Service Pack 1 CPU: x86 File System: NTFS User: Amber Scan Type: Custom Scan Result: Completed Objects Scanned: 522626 Time Elapsed
  10. I have run the Malewarebytes scan with rootkit enabled and I see the scan log but it does not give me the option to copy to clip board. Also, if I open it the text on the log will not allow me to highlight it. Should I do a screen shot or something?
  11. Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 12/8/2014 Scan Time: 6:14:26 PM Logfile: This one.txt Administrator: Yes Version: 2.00.4.1028 Malware Database: v2014.12.07.10 Rootkit Database: v2014.12.03.01 License: Premium Malware Protection: Enabled Malicious Website Protection: Enabled Self-protection: Disabled OS: Windows 7 Service Pack 1 CPU: x86 File System: NTFS User: Amber Scan Type: Threat Scan Result: Completed Objects Scanned: 310817 Time Elapsed: 15 hr, 24 min, 32 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristic
  12. Hello, for the last few months I have been having trouble with http://startsear.info/jacking my browser. I reset my home page and have tried resetting the firefox settings but when my computer restarts is is back. I have run Malewarebytes many times, it seems to find the item but after selecting quarentine and restarting it is still there! I am not sure what to do or how to get this off of my computer. Please help!
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.