Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Virus


  • Please log in to reply
4 replies to this topic

#1 sm33sm333

sm33sm333

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:51 AM

Posted 22 April 2008 - 04:33 PM

I have recently got a Malware Virus on my computer (Windows XP).
The first most ovious symptom is when I click on to the internet i get the following messge in a warning box with a big red cross headed System Error;
"SYSTEM ERROR
YOUR SYSTEM IS INFECTED WITH DANGEROUS VIRUS!
NOTE: STRONGLY RECOMMEND TO INSTALL ANTI SPYWARE PROGRAM TO CLEAN YOUR SYSTEM AND AVOID TOTAL CRASH OF YOUR COMPUTER!
CLICK OK TO TO DOWNLOAD THE ANTISPYWARE (RECOMMENDED)."
Then there are the OK and CANCEL boxes. I clicked the OK box once and it is trying to get me to download malwarebellagreement, which i wont do.

This warning comes up every single time I click on any link on the internet, very annoying.
The second symptom is whenever I type a search in Google, the second result is always a Porn result trying for you tube!!

I have tried a couple of programs to try and remove this, them being Hijack This & Malware Anti Malware (not sure of the proper name). When I tried the latter and done the fix checked thing, it came up with nothing to fix.

I hope someone can help.

Many thanks
SM33SM333

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,895 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:51 AM

Posted 23 April 2008 - 08:56 AM

Welcome to BC sm33sm333

Please print out and follow the instructions for using "Vundofix". -- If using Windows Vista be sure to Run As Administrator.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the 'Fix Vundo' button.
  • After running VundoFix, a text file named vundofix.txt will automatically be saved to the root of the system drive, usually at C:\vundofix.txt.
  • Please copy & paste the contents of that text file into your next reply.
-- If you receive this error: "Run-time error '339': Component 'comdlg32.ocx' or one its dependencies not correctly registered: a file is missing or invalid", a new copy and instructions on where to put it can be found here.

Please download ATF Cleaner by Atribune & save it to your desktop. DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 sm33sm333

sm33sm333
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:51 AM

Posted 24 April 2008 - 04:24 AM

PROBLEM SORTED!!

I had already had the Vundo Fix installed from a ptevious virus & after running that it came up with no errors on this occasion. After running the ATF Cleaner, & then the SuperAntiSpyware, my computer now seems to be fixed.
Thank You Very Much!

The log from the SuperAnti Spyware is below;

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/22/2008 at 11:02 PM

Application Version : 4.0.1154

Core Rules Database Version : 3444
Trace Rules Database Version: 1436

Scan type : Quick Scan
Total Scan Time : 00:12:25

Memory items scanned : 558
Memory threats detected : 0
Registry items scanned : 402
Registry threats detected : 19
File items scanned : 8352
File threats detected : 83

Adware.Tracking Cookie
C:\Documents and Settings\Admin\Cookies\admin@casalemedia[2].txt
C:\Documents and Settings\Admin\Cookies\admin@tacoda[2].txt
C:\Documents and Settings\Admin\Cookies\admin@paypal.112.2o7[1].txt
C:\Documents and Settings\Admin\Cookies\admin@videoegg.adbureau[2].txt
C:\Documents and Settings\Admin\Cookies\admin@www.sexvids[1].txt
C:\Documents and Settings\Admin\Cookies\admin@yadro[2].txt
C:\Documents and Settings\Admin\Cookies\admin@revsci[2].txt
C:\Documents and Settings\Admin\Cookies\admin@linksynergy[1].txt
C:\Documents and Settings\Admin\Cookies\admin@realhomesex[3].txt
C:\Documents and Settings\Admin\Cookies\admin@advertising[1].txt
C:\Documents and Settings\Admin\Cookies\admin@adviva[2].txt
C:\Documents and Settings\Admin\Cookies\admin@aoluk.122.2o7[1].txt
C:\Documents and Settings\Admin\Cookies\admin@image.masterstats[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ad2.clickhype[1].txt
C:\Documents and Settings\Admin\Cookies\admin@pornminded[1].txt
C:\Documents and Settings\Admin\Cookies\admin@atdmt[2].txt
C:\Documents and Settings\Admin\Cookies\admin@adultadworld[2].txt
C:\Documents and Settings\Admin\Cookies\admin@www.pornminded[2].txt
C:\Documents and Settings\Admin\Cookies\admin@adbrite[2].txt
C:\Documents and Settings\Admin\Cookies\admin@media.adrevolver[1].txt
C:\Documents and Settings\Admin\Cookies\admin@247realmedia[1].txt
C:\Documents and Settings\Admin\Cookies\admin@doubleclick[1].txt
C:\Documents and Settings\Admin\Cookies\admin@stat.dealtime[2].txt
C:\Documents and Settings\Admin\Cookies\admin@kontera[2].txt
C:\Documents and Settings\Admin\Cookies\admin@www.googleadservices[2].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.aol.co[1].txt
C:\Documents and Settings\Admin\Cookies\admin@realhomesex[2].txt
C:\Documents and Settings\Admin\Cookies\admin@stat.onestat[2].txt
C:\Documents and Settings\Admin\Cookies\admin@freeadultmedia[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ehg-bskyb.hitbox[2].txt
C:\Documents and Settings\Admin\Cookies\admin@questionmarket[1].txt
C:\Documents and Settings\Admin\Cookies\admin@adecn[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ehg-twi.hitbox[2].txt
C:\Documents and Settings\Admin\Cookies\admin@clicksor[2].txt
C:\Documents and Settings\Admin\Cookies\admin@ehg-bbcworldwide.hitbox[1].txt
C:\Documents and Settings\Admin\Cookies\admin@www.googleadservices[1].txt
C:\Documents and Settings\Admin\Cookies\admin@adultfriendfinder[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ad1.emediate[2].txt
C:\Documents and Settings\Admin\Cookies\admin@bp.specificclick[2].txt
C:\Documents and Settings\Admin\Cookies\admin@media.adrevolver[3].txt
C:\Documents and Settings\Admin\Cookies\admin@overture[1].txt
C:\Documents and Settings\Admin\Cookies\admin@imrworldwide[2].txt
C:\Documents and Settings\Admin\Cookies\admin@homemadebleepvideos[1].txt
C:\Documents and Settings\Admin\Cookies\admin@serving-sys[1].txt
C:\Documents and Settings\Admin\Cookies\admin@4.adbrite[1].txt
C:\Documents and Settings\Admin\Cookies\admin@112.2o7[2].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.crakmedia[2].txt
C:\Documents and Settings\Admin\Cookies\admin@bluestreak[2].txt
C:\Documents and Settings\Admin\Cookies\admin@fastclick[1].txt
C:\Documents and Settings\Admin\Cookies\admin@edge.ru4[2].txt
C:\Documents and Settings\Admin\Cookies\admin@adrevolver[2].txt
C:\Documents and Settings\Admin\Cookies\admin@malwarebell[1].txt
C:\Documents and Settings\Admin\Cookies\admin@specificclick[2].txt
C:\Documents and Settings\Admin\Cookies\admin@mediaplex[1].txt
C:\Documents and Settings\Admin\Cookies\admin@adopt.euroclick[1].txt
C:\Documents and Settings\Admin\Cookies\admin@tribalfusion[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.bleepingcomputer[2].txt
C:\Documents and Settings\Admin\Cookies\admin@atoc.112.2o7[1].txt
C:\Documents and Settings\Admin\Cookies\admin@premiumtv.122.2o7[1].txt
C:\Documents and Settings\Admin\Cookies\admin@www.homemadebleepvideos[1].txt
C:\Documents and Settings\Admin\Cookies\admin@msnportal.112.2o7[1].txt
C:\Documents and Settings\Admin\Cookies\admin@tradedoubler[2].txt
C:\Documents and Settings\Admin\Cookies\admin@amateur-sexygirls[1].txt
C:\Documents and Settings\Admin\Cookies\admin@zedo[1].txt
C:\Documents and Settings\Admin\Cookies\admin@bs.serving-sys[2].txt
C:\Documents and Settings\Admin\Cookies\admin@clickaider[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ad.yieldmanager[2].txt
C:\Documents and Settings\Admin\Cookies\admin@apmebf[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.revsci[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.adgoto[1].txt
C:\Documents and Settings\Admin\Cookies\admin@adtech[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ads.oddschecker[2].txt
C:\Documents and Settings\Admin\Cookies\admin@hitbox[1].txt
C:\Documents and Settings\Admin\Cookies\admin@ad2.doublepimp[1].txt
C:\Documents and Settings\LocalService\Cookies\system@sexual-health[1].txt
C:\Documents and Settings\LocalService\Cookies\system@insightexpressai[1].txt
C:\Documents and Settings\LocalService\Cookies\system@findwhat[1].txt

Trojan.NetMon/DNSChange
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000#DeviceDesc

Trojan.cmdService
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000#DeviceDesc

Trojan.Net-Winable
HKU\S-1-5-21-1928889426-239898049-3267260944-1006\Software\Microsoft\Windows\CurrentVersion\Run#WinAble [ C:\Program Files\WinAble\winable.exe ]

Adware.Vundo-Variant/Small-A
C:\WINDOWS\SYSTEM32\JIIUHXWO.DLL
C:\WINDOWS\SYSTEM32\NYBPPIMN.DLL
C:\WINDOWS\SYSTEM32\WUPSTOEN.DLL

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\KJJLM.INI
C:\WINDOWS\SYSTEM32\KJJLM.INI2

#4 sm33sm333

sm33sm333
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:51 AM

Posted 24 April 2008 - 04:27 AM

Sorry quietman,
The log that i posted was from a scan i done 24 hours earlier.The correct log is below.
Thanks.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/24/2008 at 00:06 AM

Application Version : 4.0.1154

Core Rules Database Version : 3445
Trace Rules Database Version: 1437

Scan type : Complete Scan
Total Scan Time : 02:02:48

Memory items scanned : 219
Memory threats detected : 0
Registry items scanned : 5847
Registry threats detected : 20
File items scanned : 78609
File threats detected : 42

Trojan.WinFixer
HKLM\Software\Classes\CLSID\{8FBE1801-5539-4C31-91B6-94A5C6D5CF3B}
HKCR\CLSID\{8FBE1801-5539-4C31-91B6-94A5C6D5CF3B}
HKCR\CLSID\{8FBE1801-5539-4C31-91B6-94A5C6D5CF3B}\InprocServer32
HKCR\CLSID\{8FBE1801-5539-4C31-91B6-94A5C6D5CF3B}\InprocServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\MLJJK.DLL

Trojan.FakeAlert-Pinch/A
HKLM\Software\Classes\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}#AppID
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}#LocalizedString
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Elevation
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Elevation#Enabled
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Implemented Categories
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\InprocServer32
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\InprocServer32#ThreadingModel
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\ProgID
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\TypeLib
HKCR\CLSID\{DA40137D-AE41-4148-BFEC-916B326D5BBD}\Version
C:\WINDOWS\TOKRU.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DA40137D-AE41-4148-BFEC-916B326D5BBD}

Adware.Vundo-Variant/Small-A
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP850\A0103609.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP850\A0103646.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP854\A0106825.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP857\A0113848.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP857\A0114848.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118105.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118107.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118108.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118109.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118115.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118117.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118118.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118124.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118126.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118127.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118129.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118137.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118138.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118139.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118142.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118143.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118145.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118147.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118149.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118150.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118154.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118160.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118161.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118163.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118165.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118168.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118170.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118171.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118172.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118173.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP945\A0126366.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP945\A0126367.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP945\A0126368.DLL

Adware.Vundo-Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{B37680B2-BA0A-4E5D-BF30-83E44C588624}\RP866\A0118141.DLL

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,895 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:51 AM

Posted 24 April 2008 - 07:43 AM

Glad to hear things are better now. However, due to what malware was found I would like for you to perform one more scan.

Please print out and follow the instructions for using Malwarebytes Anti-Malware (scroll down).
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users