Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

ERROR LOADING NFR.DLL


  • Please log in to reply
13 replies to this topic

#1 nicksharma

nicksharma

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 24 February 2009 - 12:22 PM

Hi All,

This is my first post to bleepingcomputer, hope i am posting in right place. I am using MICROSOFT XP SERVICE PACK 2, From past many days i wasn't able to browse any site neither using IE7 nor using mozila, so i just scaned my pc using BITDEFENDER ANTIVIRUS 2009, some infections were found and problem got solved. But now whenever i start my computer message is appearing 'error loading nfr.dll, module could not be found', and pc is kind of slow too, M I STILL INFECTED?? Let me know if you want more details, thanx in advance.

BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 24 February 2009 - 02:26 PM

Hi,

Nfr.dll is malicious, so yes, I think there is something left.
Do this:

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

#3 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  

Posted 25 February 2009 - 08:20 AM

Thanx a lot Superbird for replying, just scanned my pc using malwarebytes and it seems problem got solved aprrox, :thumbsup: there were around 41 infections were found, and when restarted my pc after scaning that message 'error loading nfr.dll', is not appearing anymore, now webpages r loading faster than before. But still am not able to surf net using MOZILA message 'proxy server refused connection', i can surf the web using IE though. Again thanx to you, and ya u asked for log report, here it is:



Malwarebytes' Anti-Malware 1.34
Database version: 1801
Windows 5.1.2600 Service Pack 2

2/26/2009 5:12:49 AM
mbam-log-2009-02-26 (05-12-44).txt

Scan type: Quick Scan
Objects scanned: 65414
Time elapsed: 6 minute(s), 33 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 32
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\WINDOWS\system32\drivers\nfr.dll (Trojan.Agent) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{174e317c-24c7-3151-8d35-459d26a257b1} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{174e317c-24c7-3151-8d35-459d26a257b1} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\{5222008a-dd62-49c7-a735-7bd18ecc7350} (Rogue.VirusRemover) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{142e431d-5f20-3b73-b5cf-bf7c67798865} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{7a278e87-bbb9-3dae-bb88-63a379cae5f7} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{db080439-4f0f-38d9-99fc-5df63aa1c468} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{db080439-4f0f-38d9-99fc-5df63aa1c468} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{35558a48-f0d5-3878-8a62-a54a7590b861} (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{e0ba5065-e550-3baf-8f9b-68953d5a6076} (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{174e317c-24c7-3151-8d35-459d26a257b1} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\nfr.sys (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\nfr.sys (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nfr.sys (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Secure Solutions (Rogue.Multiple) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\nfr (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\nfr (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nfr (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\nfragent (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\nfragent (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nfragent (Trojan.Agent) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{5883a17d-ce67-4135-859b-fe7f2a171a79} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{0793b1e9-ce57-452e-a422-bac750f9def4} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{b5586215-80f8-4636-b276-e4ff6dff345b} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{b2b173fd-d835-45d4-b722-4650e7e92ccc} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b2b173fd-d835-45d4-b722-4650e7e92ccc} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b2b173fd-d835-45d4-b722-4650e7e92ccc} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NFR (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NFR.SYS (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NFR (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NFR.SYS (Trojan.Agent) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nfr (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\nfr (Trojan.Agent) -> No action taken.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Microsoft Common (Trojan.Agent) -> No action taken.

Files Infected:
C:\WINDOWS\system32\mmx48999.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\mx80234.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\mmx80234.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\mx48999.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\drivers\nfr.sys (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Nick\Local Settings\Temporary Internet Files\Content.IE5\5YE3E0FL\crack_37001[1].exe (Trojan.DNSChanger) -> No action taken.
C:\Program Files\Microsoft Common\svchost.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\nfr.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\rodqgpvldok.dll (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Nick\Local Settings\Temp\bootmatrix.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\drivers\nfr.dll.assembly (Trojan.Agent) -> No action taken.


WITH REGARDS
NICK


#4 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 25 February 2009 - 11:11 AM

Hi,

Please do a new full scan with MBAM, and post that logfile in your next reply. :thumbsup:

#5 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 27 February 2009 - 11:35 AM

Helllo Again,

As directed by you i did full scan using Mbam, nd found 7 infections again :thumbsup:, here is the log:


Malwarebytes' Anti-Malware 1.34
Database version: 1801
Windows 5.1.2600 Service Pack 2

2/28/2009 7:39:54 AM
mbam-log-2009-02-28 (07-39-52).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|)
Objects scanned: 135418
Time elapsed: 32 minute(s), 1 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 7

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{945DE1D5-F689-49B6-859E-B09B90AC86D3}\RP220\A0298070.dll (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{945DE1D5-F689-49B6-859E-B09B90AC86D3}\RP220\A0298071.dll (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{945DE1D5-F689-49B6-859E-B09B90AC86D3}\RP220\A0298072.dll (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{945DE1D5-F689-49B6-859E-B09B90AC86D3}\RP220\A0298073.dll (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{945DE1D5-F689-49B6-859E-B09B90AC86D3}\RP220\A0298074.sys (Trojan.Agent) -> No action taken.
E:\Dump\Sony Sound Forge 8.0\CRACK\KEYGEN.EXE (Trojan.Downloader) -> No action taken.
E:\Dump\Sound Forge 7.0\keygen.exe (Trojan.Downloader) -> No action taken.


Am i done now, if not then what should be my next step? Now my and net is working fine, Thanks to you again, Superbird.


#6 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 27 February 2009 - 12:11 PM

Hi,

Seems better. Do this so we can be sure about a clean computer:

Please use the Internet Explorer browser (or FireFox with IETab), and do an online scan with Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

Click Yes, when prompted to install its ActiveX component.
(Note.. for Internet Explorer 7 users: If at any time you have trouble with the "Accept" button of the license, click on the "Zoom" tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.)
The program launches and downloads the latest definition files.
  • Once the files are downloaded click on Next
  • Click on Scan Settings and configure as follows:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK and, under select a target to scan, select My Computer
When the scan is done, in the Scan is completed window (below), any infection is displayed.
There is no option to clean/disinfect, however, we need to analyze the information on the report.
Posted Image
Posted Image
To obtain the report:
Click on: Save Report As (above - red blinking arrow)
Next, in the Save as prompt, Save in area, select: Desktop
In the File name area, use KScan, or something similar
In Save as type, click the drop arrow and select: Text file [*.txt]
Then, click: Save
Please post the Kaspersky Online Scanner Report in your reply.

#7 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  

Posted 28 February 2009 - 02:53 PM

My pc is still infected :thumbsup: , here is the KASPERSKY ONLINE SCANNER REPORT:



--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Sunday, March 1, 2009
Operating System: Microsoft Windows XP Professional Service Pack 2 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Saturday, February 28, 2009 17:45:39
Records in database: 1856215
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\
G:\

Scan statistics:
Files scanned: 73681
Threat name: 5
Infected objects: 26
Suspicious objects: 0
Duration of the scan: 01:32:40


File name / Threat name / Threats count
C:\WINDOWS\system32\mscon.exe/C:\WINDOWS\system32\mscon.exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[1].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[2].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[3].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[4].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\Setup[1].exe Infected: Trojan-Downloader.Win32.Agent.bhyd 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[5].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[6].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\www[7].exe Infected: Trojan-PSW.Win32.LdPinch.gra 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[1].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[2].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[3].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[4].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[5].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[6].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[7].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[8].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[9].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\sulex[10].exe Infected: Trojan-Spy.Win32.Agent.abls 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NPTIG8PY\Setup[2].exe Infected: Trojan-Proxy.Win32.Small.zi 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\CFZUKTXV\Setup[4].exe Infected: Trojan-Proxy.Win32.Small.zi 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\CFZUKTXV\Setup[5].exe Infected: Trojan-Proxy.Win32.Small.zi 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\CFZUKTXV\Setup[1].exe Infected: Trojan-Proxy.Win32.Small.zi 1
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\CFZUKTXV\Setup[2].exe Infected: Trojan-Proxy.Win32.Small.zi 1
C:\WINDOWS\system32\mscon.exe Infected: Trojan-Spy.Win32.Agent.abls 1
F:\WALLPAPER\muscle man\10%20copia.jpg Infected: Trojan-Clicker.HTML.IFrame.rp 1

The selected area was scanned.

#8 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 01 March 2009 - 01:21 PM

Hi,

1. Download ATF Cleaner
  • Double-click ATF-Cleaner.exe to run the program.
  • Click Select All found at the bottom of the list.
  • Click the Empty Selected button.
If you use Firefox browser, do this also:
  • Click Firefox at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser, do this also:
  • Click Opera at the top and choose Select All from the list.
  • Click the Empty Selected button.
  • NOTE : If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

2. Open Notepad.
Copy this in the Notepad-file:

@ECHO OFF
IF EXIST log.txt DEL log.txt
ECHO Deleting files>>log.txt
FOR %%g in (
C:\WINDOWS\system32\mscon.exe
"F:\WALLPAPER\muscle man\10%20copia.jpg") DO (
IF EXIST %%g (
ATTRIB -r -s -h %%g
DEL %%g
IF EXIST %%g (
ECHO %%g not deleted>>log.txt
) ELSE (
ECHO %%g deleted>>log.txt)
) ELSE (
ECHO %%g not found>>log.txt))
START NOTEPAD.EXE log.txt

Go to File - Save as...
Fill in the next values:
Location: Desktop
File name: del.bat
File type: All files (*.*).
Now, click Save.
Doubleclick del.bat.
Post the contents of the logfile that opens in your next reply.

#9 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 02 March 2009 - 10:50 AM

Hello Superbird,

In meanwhile downloaded KASPERSKY ANTIVIRUS2009 and did full scan some infections were found and disinfected as well couldnt save that REPORT, here is the log file of ATF CLEANER:



Deleting files
C:\WINDOWS\system32\mscon.exe not found
"F:\WALLPAPER\muscle man\100copia.jpg" not found

#10 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 02 March 2009 - 12:40 PM

Hi,

Do you still have problems? :thumbsup:

#11 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  

Posted 03 March 2009 - 02:02 AM

No problems, things r fine now. :thumbsup: So, am i done?

#12 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 03 March 2009 - 09:48 AM

Hi,

Everything looks clean again. :thumbsup:
Do this:

1. Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs from changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected)1. Turn off System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
2. Restart your computer.

3. Turn ON System Restore.On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
UN-Check Turn off System Restore.
Click Apply, and then click OK.
[/list]System Restore will now be active again.

2. Go to the Windows update site and download and install all available updates, so your computer is prtected against malware.

3. Read this page To prevent yourself against re-infection.

4. You can delete all used tools and programs.

#13 nicksharma

nicksharma
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 03 March 2009 - 01:18 PM

Yeah even i am feeling the same that my PC is clean now, thanx SUPERBIRD for all your help, you are juts superb, take care.... :thumbsup:

#14 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 03 March 2009 - 01:26 PM

You are most welcome :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users