Jump to content

RWilkinsUSMC

Members
  • Posts

    6
  • Joined

  • Last visited

Everything posted by RWilkinsUSMC

  1. You don't know how much it means to me that you helped me fix my problem. I'm so grateful that you take the time to help people with your amazing talent. Thank you!

  2. Yes! You're the best! That did it. Thank you so so so much. Its such an awesome thing you guys do here on these boards. I never could have figured this out alone and I don't have anyone else who could help. Truly, thank you.
  3. Boom! You got it! I'm going to restart the machine to make sure. Standby.
  4. Ok I did it all. Still getting the two binkiland pages when I open chrome. Its so weird. I never even downloaded anything to this computer and I did even use a flashdrive or anything. It doesn't seem to do it in IE either. Anyway, the logs. Frst: Fixlog.txt ADW: AdwCleanerS0.txt JRT: JRT.txt MB: mblog.txt I appreciate this so much. I'm super confused as to where this thing is hiding.
  5. Thank you so much for your help and speedy reply MrCharlie. Malware bytes: mblog.txt Malwarebytes Anti-Malwarewww.malwarebytes.org Scan Date: 2/14/2015Scan Time: 12:15:39 PMLogfile: mblog.txtAdministrator: Yes Version: 2.00.4.1028Malware Database: v2015.02.14.04Rootkit Database: v2015.02.03.01License: PremiumMalware Protection: EnabledMalicious Website Protection: EnabledSelf-protection: Disabled OS: Windows 7 Service Pack 1CPU: x64File System: NTFSUser: User Scan Type: Threat ScanResult: CompletedObjects Scanned: 320593Time Elapsed: 3 min, 54 sec Memory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: Enabled Processes: 0(No malicious items detected) Modules: 0(No malicious items detected) Registry Keys: 0(No malicious items detected) Registry Values: 0(No malicious items detected) Registry Data: 0(No malicious items detected) Folders: 0(No malicious items detected) Files: 0(No malicious items detected) Physical Sectors: 0(No malicious items detected) (end) RogueKilller: RKreport_SCN_02142015_123620.log RogueKiller V10.2.0.0 (x64) [Jan 19 2015] by Adlice Softwaremail : http://www.adlice.com/contact/Feedback : http://forum.adlice.comWebsite : http://www.adlice.com/softwares/roguekiller/Blog : http://www.adlice.com Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits versionStarted in : Normal modeUser : User [Administrator]Mode : Scan -- Date : 02/14/2015 12:36:20 ¤¤¤ Processes : 0 ¤¤¤ ¤¤¤ Registry : 16 ¤¤¤[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{B6AF6BF4-3EC6-4AF2-BB91-CB9375D0F0FC} | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{B6AF6BF4-3EC6-4AF2-BB91-CB9375D0F0FC} | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{B6AF6BF4-3EC6-4AF2-BB91-CB9375D0F0FC} | DhcpNameServer : 97.64.183.164 97.64.209.37 192.168.1.1 [(Unknown Country?) (XX)][(Unknown Country?) (XX)] -> Found[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Found[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Found[PUM.DesktopIcons] (X64) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found[PUM.DesktopIcons] (X86) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found[PUM.DesktopIcons] (X64) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found[PUM.DesktopIcons] (X86) HKEY_USERS\S-1-5-21-3140610337-1843538036-7678860-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found ¤¤¤ Tasks : 0 ¤¤¤ ¤¤¤ Files : 0 ¤¤¤ ¤¤¤ Hosts File : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤ ¤¤¤ Web browsers : 0 ¤¤¤ ¤¤¤ MBR Check : ¤¤¤+++++ PhysicalDrive0: ST3500418AS +++++--- User ---[MBR] d575ac4837fc4a9a512d0988b3d52659[bSP] 92e7248ba7d42236b91b42a98ba9c691 : Windows Vista/7/8 MBR CodePartition table:0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 381452 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]User = LL1 ... OKUser = LL2 ... OK
  6. Hello, Yesterday morning I downloaded a video screen capture program from c-net on my laptop and immediately noticed there were some malware programs attached to it. I wasn't worried. I have malware bytes pro and figure it would take care of it. Plus I was careful to avoid installing anything but the program. Well, it didn't and soon I had a binkiland homepage and despite multiple attempts with multiple adware and malware removal software I could get it. I eventually wiped the hard-drive and started over. To my extreme dismay. When I came home I logged into my desktop and IT WAS ON MY DESKTOP TOO! How? Ughh, At any rate. I clearly need help with this. So please tell me what to do. FRST log: Ok, the website said my post is too long. I'll just attach them: FRST.txt Addition.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.