Jump to content
Posted 28 October 2008 - 03:35 AM
Posted 28 October 2008 - 07:18 AM
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
- Make sure you are connected to the Internet.
- Double-click on Download_mbam-setup.exe to install the application.
- When the installation begins, follow the prompts and do not make any changes to default settings.
- When installation has finished, make sure you leave both of these checked:
- Update Malwarebytes' Anti-Malware
- Launch Malwarebytes' Anti-Malware
- Then click Finish.
- MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
- On the Scanner tab:
- Make sure the "Perform Quick Scan" option is selected.
- Then click on the Scan button.
- If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
- The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
- When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
- Click OK to close the message box and continue with the removal process.
- Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
- Make sure that everything is checked, and click Remove Selected.
- When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
- The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
- Copy and paste the contents of that report in your next reply and exit MBAM.
Download ESET SysInspector
- Start program through the SysInspector.exe
The program will collect information about the situation on your machine.
- When "inspector" is ready and log file - generated, select File> Save Log
- Confirm their wish
Choose to save the file somewhere and then upload on http://4storing.com/ (when you open the page, click on the Great Britain flag to open the page in English), then give me the link.
Posted 28 October 2008 - 12:41 PM
Edited by rigel, 28 October 2008 - 01:12 PM.
Posted 28 October 2008 - 01:15 PM
Posted 28 October 2008 - 01:43 PM
Posted 28 October 2008 - 01:45 PM
Posted 28 October 2008 - 01:57 PM
Posted 28 October 2008 - 02:07 PM
Download The Avenger
1. Unrar The Avenger in its own folder
2. Download the script here:
3. Start exe file of The Avenger
4. Select "Load script" and pointed the way to script.txt
5. Select "Execute". This will trigger The Avenger.
Confirm restart the computer when asked about it. After the restart, dangerous files should be eliminated. After the restart, The Avenger will jump to a text file. Please copy all the contents in response to this post. So I can track what the program was over.
Posted 28 October 2008 - 02:17 PM
Edited by djfunny, 29 October 2008 - 03:21 AM.
Posted 29 October 2008 - 07:42 AM
Posted 01 November 2008 - 02:34 AM
Edited by djfunny, 01 November 2008 - 02:36 AM.
Posted 01 November 2008 - 07:10 AM
Your scan log results indicate you are using keygens.
E:\softwares\D 1\Nero v126.96.36.199 [CiM & EMBRACE Keygen][h33t][matt14]\keygen.exe
Cracking applications are used for illegally breaking (cracking) various copy-protection and registration techniques used in commercial software. These programs may be distributed via Web sites, Usenet, and P2P networks.
University of Washington spyware study
...the University of Washington study on spyware...warez/piracy sites ranked the highest in downloading spyware...just opening the web page usually sets off an exploit, never mind actually downloading anything. And by the time the malware is finished downloading, often the machine is trashed and rendered useless.
Edited by quietman7, 01 November 2008 - 07:12 AM.
Posted 01 November 2008 - 11:51 AM
Edited by djfunny, 01 November 2008 - 11:54 AM.
Posted 01 November 2008 - 06:57 PM
Posted 04 November 2008 - 02:48 PM
0 members, 0 guests, 0 anonymous users