Jump to content

Recommended Posts

Malwarebytes Anti-Malware 1.65.0.1400

www.malwarebytes.org

Database version: v2012.09.10.07

Windows 7 Service Pack 1 x86 NTFS

Internet Explorer 9.0.8112.16421

Pcs for People :: GETYOUROWN [administrator]

9/13/2012 10:30:57 AM

mbam-log-2012-09-13 (12-03-34).txt

Scan type: Full scan (C:\|D:\|E:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 65709

Time elapsed: 20 minute(s), 2 second(s) [aborted]

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 1

C:\Users\Pcs for People\AppData\Local\Temp\0.5864667122263354 (Trojan.BHO) -> No action taken.

...............................................

RogueKiller V8.0.3 [09/13/2012] by Tigzy

mail: tigzyRKgmailcom

Feedback: http://www.geekstogo...13-roguekiller/

Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7601 Service Pack 1) 32 bits version

Started in : Normal mode

User : Pcs for People [Admin rights]

Mode : Scan -- Date : 09/14/2012 14:09:58

¤¤¤ Bad processes : 2 ¤¤¤

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

¤¤¤ Registry Entries : 12 ¤¤¤

[RUN][bLACKLIST DLL] HKCU\[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKCU\[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[TASK][RESIDU] ProgramDataUpdater : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] Proxy : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] SR : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict1 : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict2 : C:\Windows\System32\rundll32.exe -> FOUND

[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FOLDER] U : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\U --> FOUND

[ZeroAccess][FOLDER] L : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\L --> FOUND

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: Hitachi HTS543280L9A300 ATA Device +++++

--- User ---

[MBR] a2b3cfb79e17a4171b8434b68a9c9443

[bSP] 405f3afe55143d22a478e1054c18be47 : Windows 7 MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 76217 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : >

RKreport[1].txt ; RKreport[2].txt

Link to post
Share on other sites

Your computer is infected with a nasty rootkit. Please read the following information first.

You're infected with Rootkit.ZeroAccess, a BackDoor Trojan.

BACKDOOR WARNING

------------------------------

One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

http://www.dslreports.com/faq/10451

When Should I Format, How Should I Reinstall

http://www.dslreports.com/faq/10063

I will try my best to clean this machine but I can't guarantee that it will be 100% secure afterwards.

Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.

Please read the directions carefully so you don't end up deleting something that is good!!

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
    image000q.png
  • Put a checkmark beside loaded modules.
    2012081514h0118.png
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
    2012081517h0349.png
  • Click the Start Scan button.
    19695967.jpg
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    67776163.jpg
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    62117367.jpg
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here. There may be 3 logs > so post or attach all of them.
  • Sometimes these logs can be very large, in that case please attach it or zip it up and attach it.

Here's a summary of what to do if you would like to print it out:

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

MrC

Link to post
Share on other sites

Heres my lastest scans. The TDSSKiller wont allow me to copy and paste log.

Malwarebytes Anti-Malware 1.65.0.1400

www.malwarebytes.org

Database version: v2012.09.14.05

Windows 7 Service Pack 1 x86 NTFS

Internet Explorer 9.0.8112.16421

Pcs for People :: GETYOUROWN [administrator]

9/20/2012 9:19:52 AM

mbam-log-2012-09-20 (10-02-53).txt

Scan type: Full scan (C:\|D:\|E:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 265571

Time elapsed: 40 minute(s), 53 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 1

C:\Users\Pcs for People\AppData\Local\Temp\0.18643606851961014 (Trojan.Happili) -> No action taken.

(end)

RogueKiller V8.0.3 [09/13/2012] by Tigzy

mail: tigzyRK<at>gmail<dot>com

Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/

Blog: http://tigzyrk.blogspot.com

Operating System: Windows 7 (6.1.7601 Service Pack 1) 32 bits version

Started in : Normal mode

User : Pcs for People [Admin rights]

Mode : Scan -- Date : 09/20/2012 10:07:47

¤¤¤ Bad processes : 3 ¤¤¤

[sUSP PATH] B61EACE1-1B74-488F-AE1C-6DF91DA5B648.exe -- C:\Users\Pcs for People\AppData\Local\Temp\B61EACE1-1B74-488F-AE1C-6DF91DA5B648.exe -> KILLED [TermProc]

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

¤¤¤ Registry Entries : 12 ¤¤¤

[RUN][bLACKLIST DLL] HKCU\[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKCU\[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[TASK][RESIDU] ProgramDataUpdater : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] Proxy : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] SR : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict1 : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict2 : C:\Windows\System32\rundll32.exe -> FOUND

[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FOLDER] U : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\U --> FOUND

[ZeroAccess][FOLDER] L : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\L --> FOUND

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: Hitachi HTS543280L9A300 ATA Device +++++

--- User ---

[MBR] a2b3cfb79e17a4171b8434b68a9c9443

[bSP] 405f3afe55143d22a478e1054c18be47 : Windows 7 MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 76217 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[4].txt >>

RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt

Link to post
Share on other sites

Run RogueKiller again and click Scan

When the scan completes > click on the Registry tab

Put a check next to all of these and uncheck the rest: (if found)

[RUN][bLACKLIST DLL] HKCU\[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKCU\[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : Microsoft Games (rundll32.exe "C:\Users\Pcs for People\AppData\Local\Mozilla\Microsoft Games\hsgmqfu.dll",DllRegisterServerW) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-1361688680-3843160641-2932467328-1000[...]\Run : weanc ("C:\Windows\System32\rundll32.exe" "C:\Users\Pcs for People\AppData\Roaming\weanc.dll",set_sBIT) -> FOUND

[TASK][RESIDU] ProgramDataUpdater : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] Proxy : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] SR : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict1 : C:\Windows\System32\rundll32.exe -> FOUND

[TASK][RESIDU] IpAddressConflict2 : C:\Windows\System32\rundll32.exe -> FOUND

Now click Delete on the right hand column under Options

~~~~~~~~~~~~~~~~~~

Next click on the Files tab and put a check next to these and uncheck the rest. (if found)

[ZeroAccess][FOLDER] U : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\U --> FOUND

[ZeroAccess][FOLDER] L : C:\$recycle.bin\S-1-5-21-1361688680-3843160641-2932467328-1000\$2c52a5afc93c0835fb00c2d072914b0e\L --> FOUND

~~~~~~~~~~~~~~~~~~

Next click on the Processes tab and put a check next to these and uncheck the rest. (if found)

[sUSP PATH] B61EACE1-1B74-488F-AE1C-6DF91DA5B648.exe -- C:\Users\Pcs for People\AppData\Local\Temp\B61EACE1-1B74-488F-AE1C-6DF91DA5B648.exe -> KILLED [TermProc]

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

[sUSP PATH][DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : -> KILLED [TermProc]

Now click Delete on the right hand column under Options

~~~~~~~~~~~~~~~~~~~

Reboot and .......

Please Update and run a Quick Scan with MBAM, post the report.

Make sure that everything is checked, and click Remove Selected.

~~~~~~~~~~~~~~~~~~

Reboot and scan the system again with RogueKiller and post the new log, MrC

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

My internet is still redirecting.

Here is the scan you requested.

Operating System: Windows 7 (6.1.7601 Service Pack 1) 32 bits version

Started in : Normal mode

User : Pcs for People [Admin rights]

Mode : Scan -- Date : 09/27/2012 08:47:08

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 3 ¤¤¤

[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: Hitachi HTS543280L9A300 ATA Device +++++

--- User ---

[MBR] a2b3cfb79e17a4171b8434b68a9c9443

[bSP] 405f3afe55143d22a478e1054c18be47 : Windows 7 MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 76217 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[10].txt >>

RKreport[10].txt ; RKreport[1].txt ; RKreport[2].txt ; RKreport[3].txt ; RKreport[4].txt ;

RKreport[5].txt ; RKreport[6].txt ; RKreport[7].txt ; RKreport[8].txt ; RKreport[9].txt

Link to post
Share on other sites

What bowsers are affected?

Please download AdwCleaner from here and save it on your Desktop.

  1. Right-click on adwcleaner.exe and select Run As Administrator to launch the application.
  2. Now click on the Search tab.
  3. Please post the contents of the log-file created in your next post.

Note: The log can also be located at C:\ >> AdwCleaner[XX].txt >> XX <-- Denotes the number of times the application has been ran, so in this should be something like R1.

MrC

Link to post
Share on other sites

# AdwCleaner v2.003 - Logfile created 09/27/2012 at 09:27:08

# Updated 23/09/2012 by Xplode

# Operating system : Windows 7 Professional Service Pack 1 (32 bits)

# User : Pcs for People - GETYOUROWN

# Boot Mode : Normal

# Running from : C:\Users\Pcs for People\Desktop\adwcleaner.exe

# Option [search]

***** [services] *****

***** [Files / Folders] *****

File Found : C:\Program Files\Mozilla Firefox\searchplugins\babylon.xml

File Found : C:\user.js

Folder Found : C:\ProgramData\Babylon

Folder Found : C:\Users\Pcs for People\AppData\Local\Babylon

Folder Found : C:\Users\Pcs for People\AppData\Roaming\Babylon

***** [Registry] *****

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B}

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E}

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B}

Key Found : HKLM\Software\Babylon

Key Found : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}

Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}

Key Found : HKLM\SOFTWARE\Classes\AppID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}

Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v15.0 (en-US)

Profile name : default

File : C:\Users\Pcs for People\AppData\Roaming\Mozilla\Firefox\Profiles\293nps44.default\prefs.js

Found : user_pref("extensions.BabylonToolbar.admin", false);

Found : user_pref("extensions.BabylonToolbar.aflt", "babsst");

Found : user_pref("extensions.BabylonToolbar.babExt", "");

Found : user_pref("extensions.BabylonToolbar.babTrack", "affID=108720");

Found : user_pref("extensions.BabylonToolbar.bbDpng", 11);

Found : user_pref("extensions.BabylonToolbar.dfltSrch", false);

Found : user_pref("extensions.BabylonToolbar.hmpg", false);

Found : user_pref("extensions.BabylonToolbar.id", "a0ca7010000000000000002163d63197");

Found : user_pref("extensions.BabylonToolbar.instlDay", "15405");

Found : user_pref("extensions.BabylonToolbar.instlRef", "sst");

Found : user_pref("extensions.BabylonToolbar.lastDP", 11);

Found : user_pref("extensions.BabylonToolbar.lastVrsnTs", "1.5.3.171:44:04");

Found : user_pref("extensions.BabylonToolbar.mntrFFxVrsn", "10.0");

Found : user_pref("extensions.BabylonToolbar.newTab", true);

Found : user_pref("extensions.BabylonToolbar.newTabUrl", "hxxp://search.babylon.com/?babsrc=NT_bb");

Found : user_pref("extensions.BabylonToolbar.noFFXTlbr", false);

Found : user_pref("extensions.BabylonToolbar.prdct", "BabylonToolbar");

Found : user_pref("extensions.BabylonToolbar.propectorlck", 70039935);

Found : user_pref("extensions.BabylonToolbar.prtnrId", "babylon");

Found : user_pref("extensions.BabylonToolbar.ptch_0717", true);

Found : user_pref("extensions.BabylonToolbar.smplGrp", "none");

Found : user_pref("extensions.BabylonToolbar.srcExt", "ss");

Found : user_pref("extensions.BabylonToolbar.tlbrId", "base");

Found : user_pref("extensions.BabylonToolbar.vrsn", "1.5.3.17");

Found : user_pref("extensions.BabylonToolbar.vrsnTs", "1.5.3.171:44:04");

Found : user_pref("extensions.BabylonToolbar.vrsni", "1.5.3.17");

Found : user_pref("extensions.BabylonToolbar_i.aflt", "babsst");

Found : user_pref("extensions.BabylonToolbar_i.babExt", "");

Found : user_pref("extensions.BabylonToolbar_i.babTrack", "affID=108720");

Found : user_pref("extensions.BabylonToolbar_i.hardId", "a0ca7010000000000000002163d63197");

Found : user_pref("extensions.BabylonToolbar_i.id", "a0ca7010000000000000002163d63197");

Found : user_pref("extensions.BabylonToolbar_i.instlDay", "15405");

Found : user_pref("extensions.BabylonToolbar_i.instlRef", "sst");

Found : user_pref("extensions.BabylonToolbar_i.prdct", "BabylonToolbar");

Found : user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon");

Found : user_pref("extensions.BabylonToolbar_i.smplGrp", "none");

Found : user_pref("extensions.BabylonToolbar_i.srcExt", "ss");

Found : user_pref("extensions.BabylonToolbar_i.tlbrId", "base");

Found : user_pref("extensions.BabylonToolbar_i.vrsn", "1.5.3.17");

Found : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.5.3.171:44:04");

Found : user_pref("extensions.BabylonToolbar_i.vrsni", "1.5.3.17");

*************************

AdwCleaner[R1].txt - [4484 octets] - [27/09/2012 09:27:08]

########## EOF - C:\AdwCleaner[R1].txt - [4544 octets] ##########

Link to post
Share on other sites

  1. Please re-run AdwCleaner
  2. Click on Delete button.
  3. Confirm each time with OK.
  4. Your computer will be rebooted automatically. A text file will open after the restart. Please post the content of that logfile in your reply.

Note: You can find the logfile at C:\AdwCleaner[sn].txt as well - n is the order number.

Let me know if there's any difference.

MrC

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.