Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

windows\system32\gxvxccounter trojan.dnschanger


  • Please log in to reply
9 replies to this topic

#1 xxwidowmaker

xxwidowmaker

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 30 June 2009 - 01:55 PM

Hey all, I have just registered here to find a solution to this problem. I have ran Malwarebytes Antimalware multiple times and the only infection I ever have is a Trojan.DNSchanger found in the C:\Windows\System32\gxvxccounter. I have looked up a bit about this and it seems that this is the reason than when I click on a link in google, I get redirected to a different page than the one intended. I can get past this by refreshing google page then clicking on link again, however this is very annoying.

But back to the topic, everytime I run malwarebytes it picks up the file, when I remove it, it says it has been removed and requires a restart. So I restart the computer, run it again, and it is still there. So any help in removing this would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:56 PM

Posted 30 June 2009 - 02:25 PM

This is a very nasty infection

http://rootrepeal.googlepages.com/

http://rootrepeal.googlepages.com/RootRepeal.zip

Just use the file tab at the bottom, scan and paste the report into a reply here please
Chewy

No. Try not. Do... or do not. There is no try.

#3 xxwidowmaker

xxwidowmaker
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 30 June 2009 - 11:00 PM

Is this what your looking for?


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Time: 2009/07/01 00:06
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP3
==================================================

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\gxvxcaowqlxxrouyewlodhckjauvpwnrxyqaw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxcdslacfbtewinvvrikvebtrmbldqspjao.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxctrvpkjacxqephtdysfimupekiewwlsns.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxctxvitqwijbppkcgaltlvmpuxfqpgjyiu.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxcvyqjnscpyquplvrjntjlbqwgkvdluuhv.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxcykxeypxnhyejmoovitpgubfyedrxuuat.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temp\BACKUP3.41201
Status: Locked to the Windows API!

Path: c:\documents and settings\colortyme\local settings\temp\etilqs_opejokxpdcqsbi8dcqy0
Status: Allocation size mismatch (API: 32768, Raw: 0)

Path: \\?\C:\Documents and Settings\Colortyme\Local Settings\Temp\plugtmp-5\*
Status: Could not enumerate files with the Windows API (0x00000570)!


Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\AU3MNAHQ\tagen fun.JPG
Status: Locked to the Windows API!

Path: \\?\C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\*
Status: Could not enumerate files with the Windows API (0x00000570)!


Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\xwars[1].css
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\YellowFan[1].swf
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\zbar[1].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\zeit[1].swf
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\ztrack_iframe[2].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\ZY.App.js[1].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\ZY.App.js[2].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\zyngaScript[1].js
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Temporary Internet Files\Content.IE5\X5CXLD6P\zynga_main_bg[1].png
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Adaptoid_v1_0.dll
Status: Locked to the Windows API!

Path: c:\documents and settings\colortyme\application data\teleca\telecalib\logging\application logs\specificusb_log.txt
Status: Size mismatch (API: 103046, Raw: 86559)

Path: c:\documents and settings\colortyme\local settings\application data\mozilla\firefox\profiles\gihpkxhv.default\cache\cf797bc8d01
Status: Size mismatch (API: 4997120, Raw: 3883008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\05AA9F37d01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\ABA90907d01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\B62351CEd01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\83FD9EBDd01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\E9FE787Bd01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\EF69A941d01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\C6384202d01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\CB9F3BDDd01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash\Cache\E7E812D0d01
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\C2C6E58Cd01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\E975112Ed01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\E9751E81d01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\EB5BFDA0d01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\CF100FF7d01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\CF13E9F7d01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\D14B6D24d01
Status: Could not get file information (Error 0xc0000008)

Path: C:\Documents and Settings\Colortyme\Local Settings\Application Data\Mozilla\Firefox\Profiles\gihpkxhv.default\Cache.Trash\Trash-1\Cache\DB70D659d01
Status: Could not get file information (Error 0xc0000008)




A little after this point an error popped up. - FindNextFile error 1392 (0x570)!

#4 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:56 PM

Posted 01 July 2009 - 04:24 AM

Path: C:\WINDOWS\system32\drivers\gxvxcdslacfbtewinvvrikvebtrmbldqspjao.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxctrvpkjacxqephtdysfimupekiewwlsns.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxctxvitqwijbppkcgaltlvmpuxfqpgjyiu.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxcvyqjnscpyquplvrjntjlbqwgkvdluuhv.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\gxvxcykxeypxnhyejmoovitpgubfyedrxuuat.sys
Status: Invisible to the Windows API!


These are the core rootkit drivers, rerun rootrepeal, highlight each line, rightclick and use the wipe file option, immediately reboot

Run a new updated quick scan with MBAM and post that log
Chewy

No. Try not. Do... or do not. There is no try.

#5 xxwidowmaker

xxwidowmaker
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 01 July 2009 - 09:39 AM

Malwarebytes' Anti-Malware 1.37
Database version: 2182
Windows 5.1.2600 Service Pack 3

7/1/2009 10:44:44 AM
mbam-log-2009-07-01 (10-44-37).txt

Scan type: Quick Scan
Objects scanned: 85872
Time elapsed: 5 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\gxvxcaowqlxxrouyewlodhckjauvpwnrxyqaw.dll (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\drivers\gxvxcdslacfbtewinvvrikvebtrmbldqspjao.sys (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\drivers\gxvxctrvpkjacxqephtdysfimupekiewwlsns.sys (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\drivers\gxvxctxvitqwijbppkcgaltlvmpuxfqpgjyiu.sys (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\drivers\gxvxcvyqjnscpyquplvrjntjlbqwgkvdluuhv.sys (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\drivers\gxvxcykxeypxnhyejmoovitpgubfyedrxuuat.sys (Trojan.Agent) -> No action taken.


-------------------------------------------------------------------------------------------------------------------------------------------------------------


Malwarebytes' Anti-Malware 1.37
Database version: 2182
Windows 5.1.2600 Service Pack 3

7/1/2009 10:46:06 AM
mbam-log-2009-07-01 (10-46-06).txt

Scan type: Quick Scan
Objects scanned: 85872
Time elapsed: 5 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\gxvxcaowqlxxrouyewlodhckjauvpwnrxyqaw.dll (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\drivers\gxvxcdslacfbtewinvvrikvebtrmbldqspjao.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\drivers\gxvxctrvpkjacxqephtdysfimupekiewwlsns.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\drivers\gxvxctxvitqwijbppkcgaltlvmpuxfqpgjyiu.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\drivers\gxvxcvyqjnscpyquplvrjntjlbqwgkvdluuhv.sys (Trojan.Agent) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\drivers\gxvxcykxeypxnhyejmoovitpgubfyedrxuuat.sys (Trojan.Agent) -> Quarantined and deleted successfully.

#6 xxwidowmaker

xxwidowmaker
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 01 July 2009 - 09:49 AM

Also, after both restarts, upon starting up this came up before windows opened.

Checking file system on C:
The type of file system is NTFS
The volume is dirty

CHKDSK is verifying files.

CHKDSK is verifying indexes.

CHKDSK is verifying security descriptors.



After this was done it restarted the computer and loaded normally.

#7 xxwidowmaker

xxwidowmaker
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 01 July 2009 - 09:55 AM

Ran MBAM again and no infections were found. I can also now browse google pages without being redirected. Thank you very much!!! If there is anything else I need to do please let me know and thank you again!


Malwarebytes' Anti-Malware 1.37
Database version: 2182
Windows 5.1.2600 Service Pack 3

7/1/2009 10:59:50 AM
mbam-log-2009-07-01 (10-59-50).txt

Scan type: Quick Scan
Objects scanned: 86121
Time elapsed: 6 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#8 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:56 PM

Posted 01 July 2009 - 10:09 AM

OK let's uninstall MBAM then run this clean tool

http://www.malwarebytes.org/mbam-clean.exe

After rebooting download the new version of MBAM, update it and run a full scan

but first

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download Malwarebytes Anti-Malware (v1.38) and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

http://www.bleepingcomputer.com/forums/t/114351/how-to-temporarily-disable-your-anti-virus-firewall-and-anti-malware-programs/
Chewy

No. Try not. Do... or do not. There is no try.

#9 xxwidowmaker

xxwidowmaker
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:56 PM

Posted 01 July 2009 - 10:57 AM

Hmm...

Malwarebytes' Anti-Malware 1.38
Database version: 2358
Windows 5.1.2600 Service Pack 3

7/1/2009 12:04:27 PM
mbam-log-2009-07-01 (12-04-27).txt

Scan type: Quick Scan
Objects scanned: 92501
Time elapsed: 6 minute(s), 57 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\gxvxc (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\rn.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\wbem\proquota.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\colortyme\local settings\Temp\~TM31.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\colortyme\local settings\Temp\~TMB2.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

#10 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:02:56 PM

Posted 01 July 2009 - 11:06 AM

Review the directions for the ATFCleaner and make sure you followed them exactly

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users