Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't get rid of Adware.BHO.NGN application


  • This topic is locked This topic is locked
4 replies to this topic

#1 klo14

klo14

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:22 PM

Posted 01 July 2009 - 01:01 PM

Hi, this is my first time posting to your site, so bear with me.
I have a user who was infected with the System Security 4.51 malware. I used Malwarebytes to clean and subsequently scanned with Spybot SD and our current virus protection ESET Nod32. The PC is a Dell, running Windows XP Pro.

Although the SpybotSD and Malwarebytes logs show all clear, ESET continues to bark at me when I restart the computer. It says it found and quarantined the Adware.BHO.NGN application. It then gives me a new window explaining that ESET found files that could not be deleted, but would be upon restart. Then it gives me the restart options. Each time I've restarted, the messages begin again. Malwarebytes and SpybotSD do not detect this file.

At this point I'm not sure if ESET has this under control by Quarantine, or it is controlling ESET....below are the ESET logs, and the Hijack This log.

HIJACK THIS
___________________________

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 10:15:09 AM, on 7/1/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16850)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Intel\ASF Agent\ASFAgent.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
C:\Program Files\Dell\OpenManage\Client\Iap.exe
C:\Program Files\Kaseya\Agent\AgentMon.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\hkcmd.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
C:\Program Files\Kaseya\Agent\KaUsrTsk.exe
C:\Program Files\iWare\iWare Mouse\3.0\lwbwheel.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://smbusiness.dellnet.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://smbusiness.dellnet.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://smbusiness.dellnet.com/
O2 - BHO: (no name) - {14D0691C-705C-4290-BC48-B362F7D2807a} - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: (no name) - {452F9BD7-C780-42FF-B294-65C4D4BC30AB} - c:\windows\system32\meddles.dll
O3 - Toolbar: Time Matters - {00F17ECE-12DA-46A0-B541-BDE4EB7DF027} - C:\tmw7\tmietb.dll
O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [AdaptecDirectCD] C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Kaseya Agent Service Helper] "C:\Program Files\Kaseya\Agent\KaUsrTsk.exe"
O4 - HKLM\..\Run: [LWBMOUSE] C:\Program Files\iWare\iWare Mouse\3.0\lwbwheel.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O4 - Global Startup: QuickBooks Update Agent.lnk = C:\Program Files\Common Files\Intuit\QuickBooks\QBUpdate\qbupdate.exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {05CA9FB0-3E3E-4B36-BF41-0E3A5CAA8CD8} (Office Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=58813
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = cmmcpas.local
O17 - HKLM\Software\..\Telephony: DomainName = cmmcpas.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = cmmcpas.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = cmmcpas.local
O17 - HKLM\System\CS3\Services\Tcpip\Parameters: Domain = cmmcpas.local
O20 - Winlogon Notify: lbtbowmc - C:\WINDOWS\SYSTEM32\meddles.dll
O23 - Service: ASF Agent (ASFAgent) - Intel Corporation - C:\Program Files\Intel\ASF Agent\ASFAgent.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
O23 - Service: Iap - Dell Computer Corporation - C:\Program Files\Dell\OpenManage\Client\Iap.exe
O23 - Service: Kaseya Agent (KaseyaAgent) - Kaseya - C:\Program Files\Kaseya\Agent\AgentMon.exe
O23 - Service: Intel® NMS (NMSSvc) - Intel Corporation - C:\WINDOWS\System32\NMSSvc.exe
O23 - Service: Intuit QuickBooks FCS (QBFCService) - Intuit Inc. - C:\Program Files\Common Files\Intuit\QuickBooks\FCS\Intuit.QuickBooks.FCS.exe

--
End of file - 5581 bytes


ESET QUARANTINE LOG - Just for 3 days
________________________________________
7/1/2009 8:36:12 AM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: \??\C:\WINDOWS\system32\winlogon.exe.
6/30/2009 5:30:17 PM Real-time file system protection file C:\WINDOWS\SYSTEM32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe.
***This continues throughout the day yesterday*****


6/30/2009 2:56:53 PM Real-time file system protection file C:\System Volume Information\_restore{E87A81FB-FDCF-4B92-A20C-951710F82D7C}\RP2\A0000002.dll Win32/Adware.BHO.NGN application cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: \??\C:\WINDOWS\system32\winlogon.exe.
6/30/2009 1:05:42 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to run the file by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 1:05:16 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 1:05:14 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred on a file modified by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 1:05:14 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting (after the next restart) - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 12:48:27 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a file modified by the application: C:\WINDOWS\system32\svchost.exe.
6/30/2009 12:48:12 PM Real-time file system protection file C:\DOCUME~1\ADMKAR~1\LOCALS~1\Temp\rdl1.tmp Win32/AutoRun.FakeAlert.M worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\Program Files\Microsoft Common\svchost.exe.
6/30/2009 12:31:29 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a file modified by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 12:31:29 PM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred during an attempt to access the file by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 11:56:25 AM Real-time file system protection file C:\DOCUME~1\ADMKAR~1\LOCALS~1\Temp\rdl1.tmp Win32/AutoRun.FakeAlert.M worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\Program Files\Microsoft Common\svchost.exe.
6/30/2009 8:21:14 AM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/30/2009 8:20:59 AM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/30/2009 8:20:45 AM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: \??\C:\WINDOWS\system32\winlogon.exe.
6/30/2009 8:20:45 AM Real-time file system protection file C:\WINDOWS\system32\ujgaudfg.dll Win32/Adware.BHO.NGN application cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a file modified by the application: C:\WINDOWS\System32\svchost.exe.
6/30/2009 8:20:45 AM Real-time file system protection file C:\DOCUME~1\ALEXAN~1\LOCALS~1\Temp\rdl4.tmp Win32/AutoRun.FakeAlert.M worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\Program Files\Microsoft Common\svchost.exe.
6/29/2009 3:49:27 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:49:05 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:48:43 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:48:22 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:47:59 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:47:37 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:47:15 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:46:53 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:46:31 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:46:09 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:45:47 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:45:24 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:45:02 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:44:40 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:44:17 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:43:55 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:43:33 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:43:12 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:42:49 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:42:27 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:42:05 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
6/29/2009 3:41:43 PM Real-time file system protection file E:\autorun.inf Win32/AutoRun.Agent.FC worm cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\svchost.exe.
******THis Autorun Agent FC worm was going on Since June 4 apparently....I guess Mbam fixed it.******

Any help would be appreciated

BC AdBot (Login to Remove)

 


m

#2 klo14

klo14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:22 PM

Posted 02 July 2009 - 11:07 AM

Anyone? I see people looking but there seem to be no takers. All I really want to know is if Eset has the problem covered in Quarantine, or if I still need to do more work to get rid of this?

Hello klo14,

While we understand your frustration at having to wait, please note that Bleeping Computer deals with several hundred requests for assistance such as yours on a daily basis. As a result, our backlog is quite large, as are other comparable sites that help others with malware issues. Athough our HJT Team members work on hundreds of requests each day, they are all volunteers who work logs when they can and are able to do so. No one is paid by Bleeping Computer for their assistance to our members.

Further, our malware removal staff is comprised of team members with various levels of skill and expertise to deal with thousands of malware variants, some more complex than others. Although we try to take DDS/HJT logs in order (starting with the oldest), it is often the skill level of the particular helper and sometimes the operating system that dictates which logs get selected first. Some infections are more complicated than others and require a higher skill level to remove. Without that skill level attempted removal could result in disastrous results. In other instances, the helper may not be familiar with the operating system that you are using, since they use another. In either case, you wouldn't want someone to assist you who is not familiar with your issue and attempt to fix it, would you?

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible.

Thank you for understanding.

Regards,

The weatherman
(Moderator)

Edited by The weatherman, 02 July 2009 - 05:52 PM.


#3 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:11:22 PM

Posted 05 July 2009 - 08:06 PM

Hello and welcome to Bleeping Computer.

My name is Syler, I will be helping you to solve your Malware issues. Whilst I am helping you, I would
be grateful if you would note the following:
  • Please do not run other tools or scans unless I ask you to and follow all the steps I give you, in order.
  • Copy and paste all logs requested in you reply, Do not attach them unless asked too.
  • If you don't know or understand something, please don't hesitate to say or ask before you proceed with my instructions.
  • Please continue to work with me, until I tell you your machine appears to be clean. Absence of symptoms does not mean that everything is clear.
  • If I do not hear back from you within 5 days of my last post, then this topic will be closed.

Please download Malwarebytes' Anti-Malware from Here

Note: If you already have Malwarebytes' Anti-Malware, just update then run it.
  • Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan (the scan may take some time to finish, so please be patient).
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy and Paste the entire report in your next reply .
Note: If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Next
  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)
Then please post back here with the following:
  • MBAM log
  • log.txt
  • info.txt
Thanks

unite.jpg


#4 klo14

klo14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:22 PM

Posted 06 July 2009 - 10:55 AM

Syler:
Just before I left work on Friday I ran another scan with a different spyware program SuperAntiSpyware. Apparently between ESETNod32, Malwarebytes, Spybot SD & SuperAnti Spyware, it appears the problem has been resolved. I wish I could post the actual process, but it seems ESET is no longer giving me the message about the spyware being in Quarantine.

Thanks so much for your response. It's a shame we have to use so many methods for cleaning computers, and/or keeping them clean. I am having a hard time explaining this issue to my bosses who wonder why our Anti-virus is not handling the problems.....but it seems none of them are perfect.

Thank you.

#5 syler

syler

  • Malware Response Team
  • 8,150 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Warrington, UK
  • Local time:11:22 PM

Posted 06 July 2009 - 05:20 PM

Since this issue appears resolved ... this Topic is closed. Glad we could help.

If you need this topic reopened, please request this by sending me a PM
with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.

unite.jpg





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users