Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Internet Explorer opening on startup and redirects


  • Please log in to reply
21 replies to this topic

#1 outshimed

outshimed

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 12 August 2009 - 02:54 PM

Hi, I'm positive I have a virus of some sort, but I have no idea where to start to get rid of it or even what it is. My symptoms: on startup, internet explorer is launched, and I can hear the "click" of a new page loading about every 30 seconds, but I can't see it. I can end the process, but it starts up again within a few minutes. I only know it's there because of the clicking and when I look at my processes tab in the task manager iexplore.exe is there. The second: when I try to click google links I get redirected to advertising sites. Any help is appreciated.

Edited by outshimed, 12 August 2009 - 02:58 PM.


BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 12 August 2009 - 05:04 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



Lets take a look with Malwarebytes

Please download Malwarebytes' Anti-Malware from here:
Malwarebytes
Please rename the file BEFORE downloading to zztoy.exe instead of mbam-setup.exe

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

Double Click zztoy.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


If Malwarebytes won't install or run

Some types of malware will disable MBAM and other security tools. If MBAM will not install, try renaming it. Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run.
Computer Pro

#3 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 12 August 2009 - 08:09 PM

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 5.1.2600 Service Pack 2

8/12/2009 8:07:50 PM
mbam-log-2009-08-12 (20-07-50).txt

Scan type: Full Scan (C:\|)
Objects scanned: 176860
Time elapsed: 1 hour(s), 3 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 11
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
\\?\globalroot\systemroot\system32\UAClprywevuxw.dll (Trojan.TDSS) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{e24211b3-a78a-c6a9-d317-70979ace5058} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpreapp (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Monopod (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\NordBull (Malware.Trace) -> Quarantined and deleted successfully.


-----------------------------


One thing I did notice, however, is that some of the bogus programs it installed (a fake Windows Messenger, for example) are still installed. Do I just manually delete them or what?

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 12 August 2009 - 08:35 PM

There is a fake Windows Messenger? How can you tell that it is fake, as it may be the real one. And you have a rootkit, so lets remove it. Also, under your log, you cut out the files that got deleted, make sure that you post the whole log in your next post.

Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the FILES tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".

Edited by Computer Pro, 12 August 2009 - 08:36 PM.

Computer Pro

#5 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 12 August 2009 - 09:23 PM

Page view limit reached. :[

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 12 August 2009 - 09:37 PM

Please try here

http://ad13.geekstogo.com/RootRepeal.zip
Computer Pro

#7 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 12 August 2009 - 11:04 PM

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\SKYNETbopavhkd.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETilvdsbob.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETpaxmnyrj.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETvmehxhub.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACdmtyswqqvt.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACdqrpxrflmu.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACisiogiajro.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACkdpunfqopp.dll
Status: Invisible to the Windows API!



----------------------



While iexplore.exe isn't running on startup anymore, I'm still being redirected from google links.

Edited by outshimed, 13 August 2009 - 02:49 AM.


#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 13 August 2009 - 10:06 AM

Please make sure to post the rest of the Malwarebytes log and also make sure to post the full RootRepeal log also which shows the version, date, etc. After that, lets run Sophos, as I am seeing the rootkit but not the file to remove it:

Please download Sophos Anti-rootkit& save it to your desktop.
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Credits to DaChew
Be sure to print out and read the User Manualand Release Notes
Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
Make sure the following are checked:
o Running processes
o Windows Registry
o Local Hard Drives

Click Start scan.
Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
o Files tagged as Removable: No are not marked for removal and cannot be removed.
o Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
o Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
After reboot, a dialog box displays the files you selected for removal and the action taken.
Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
Disconnect from the Internet or physically unplug you Internet cable connection.
Clean out your temporary files.
Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
Temporarily disable your anti-virus and real-time anti-spyware protection.
After starting the scan, do not use the computer until the scan has completed.
When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
Computer Pro

#9 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 13 August 2009 - 02:40 PM

Full RootRepeal:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/13 00:04
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP2
==================================================

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\SKYNETbopavhkd.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETilvdsbob.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETpaxmnyrj.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETvmehxhub.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACdmtyswqqvt.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACdqrpxrflmu.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACisiogiajro.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACkdpunfqopp.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UAClprywevuxw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACyqomuixxwb.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UAC2e3f.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETwbigilal.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\UACuaeiqapjxl.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Danny\Local Settings\Temp\UAC39b7.tmp
Status: Invisible to the Windows API!

Path: C:\Program Files\Alcohol Soft\Alcohol 120\Plugins\Helper\UACHlper.exe
Status: Invisible to the Windows API!

--------------------------------------------------------------

Sohpos:

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/13/2009 at 12:26:47 PM
User "Danny" on computer "CONTECTA"
Windows version 5.1 SP 2.0 Service Pack 2 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_LOCAL_MACHINE\SOFTWARE\UAC
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SKYNETofjxturr
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\UACd.sys
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\SKYNETofjxturr
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\UACd.sys
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Program Files\Alcohol Soft\Alcohol 120\Plugins\Helper\UACHlper.exe
Hidden: file C:\WINDOWS\system32\SKYNETilvdsbob.dll
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temp\UAC39b7.tmp
Hidden: file C:\WINDOWS\system32\drivers\UACuaeiqapjxl.sys
Hidden: file C:\WINDOWS\system32\UACkdpunfqopp.dll
Hidden: file C:\WINDOWS\system32\drivers\sptd.sys
Hidden: file C:\WINDOWS\system32\uacinit.dll
Hidden: file C:\WINDOWS\system32\UAClprywevuxw.dll
Hidden: file C:\WINDOWS\system32\SKYNETvmehxhub.dat
Hidden: file C:\WINDOWS\system32\UACdqrpxrflmu.dat
Hidden: file C:\WINDOWS\system32\drivers\SKYNETwbigilal.sys
Hidden: file C:\WINDOWS\system32\SKYNETbopavhkd.dll
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temporary Internet Files\Content.IE5\W92B012Z\news;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=10;sz=468x62,300x251;dclu5=f00e8cc94301c9e;source=site;t=1;tile=2;ord=1573970866161136.[2].7
Hidden: file C:\WINDOWS\system32\SKYNETpaxmnyrj.dat
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temporary Internet Files\Content.IE5\KTUR4LU7\news;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=10;sz=468x62,300x251;dclu5=f00e8cc94301c9e;source=site;t=1;tile=2;ord=3042691511024193.[2].5
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temporary Internet Files\Content.IE5\W92B012Z\click2,wNtKAHasBwCw1CkAAAAAAM8QDAAAAAAAAgAAAAYAAAAAAP8AAAAEEAH1CwAAAAAAf5gHAAAAAACyHhEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA[2].com%2F,;ord=1250103674
Hidden: file C:\RECYCLER\S-1-5-21-789336058-1229272821-725345543-1004\Dc763
Hidden: file C:\Documents and Settings\Danny\Application Data\Macromedia\Flash Player\#SharedObjects\XDUQ8T6S\www.nicovideo.jp\swf\new\nicoplayer_view_controller.swf\jp.nicovideo.nicoplayer.tpls.NicoplayerTemplateChildren.WindowChildren.CommentTabContent._ColumnConfig.sol
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temporary Internet Files\Content.IE5\KTUR4LU7\v=5;m=3;l=6577;c=28765;b=151587;ts=20090812153225;p=ui%3DlPTKQ89FeF6noC%3Btr%3Dzi484EQwEJB%3Btm%3D0-0;cxt=811200901_1374924-99001782_1374057-99001782_1374034[1].htm
Hidden: file C:\WINDOWS\system32\UACyqomuixxwb.db
Hidden: file C:\WINDOWS\system32\UACdmtyswqqvt.dll
Hidden: file C:\WINDOWS\Temp\UACc3de.tmp
Hidden: file C:\WINDOWS\system32\UACisiogiajro.dll
Hidden: file C:\Documents and Settings\Danny\Application Data\Macromedia\Flash Player\#SharedObjects\XDUQ8T6S\www.nicovideo.jp\swf\new\nicoplayer_view_controller.swf\jp.nicovideo.nicoplayer.tpls.NicoplayerTemplateChildren.WindowChildren.NGTabContent.DataGridSetting.sol
Hidden: file C:\Documents and Settings\Danny\Local Settings\Temp\4a19e3d3-4790-4576-9639-f9b3c53b849c.tmp
Stopped logging on 8/13/2009 at 12:59:04 PM

It didn't recommend removing any of them.

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 13 August 2009 - 03:02 PM

Path: C:\WINDOWS\system32\drivers\SKYNETwbigilal.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\UACuaeiqapjxl.sys
Status: Invisible to the Windows API!


In RootRepeal, please right click on both of these files and select Wipe File. Then reboot, and run a Quick Scan with malwarebytes and post back the log.
Computer Pro

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,040 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:05:24 PM

Posted 13 August 2009 - 03:18 PM

Please update first.
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 13 August 2009 - 03:52 PM

One said to wipe all the files then post the log and one said to just post the log, which should I do? @.@

#13 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 13 August 2009 - 03:54 PM

Malwarebytes' Anti-Malware 1.40
Database version: 2616
Windows 5.1.2600 Service Pack 2

8/13/2009 4:51:31 PM
mbam-log-2009-08-13 (16-51-25).txt

Scan type: Quick Scan
Objects scanned: 92137
Time elapsed: 9 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 18

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\RECYCLER\S-1-5-21-789336058-1229272821-725345543-1004\Dc552.exe (Trojan.Downloader) -> No action taken.
C:\RECYCLER\S-1-5-21-789336058-1229272821-725345543-1004\Dc719.exe (Trojan.Downloader) -> No action taken.
C:\RECYCLER\S-1-5-21-789336058-1229272821-725345543-1004\Dc942.exe (Trojan.Downloader) -> No action taken.
C:\RECYCLER\S-1-5-21-789336058-1229272821-725345543-1004\Dc944.exe (Trojan.Downloader) -> No action taken.
C:\WINDOWS\system32\UACisiogiajro.dll (Rogue.Agent) -> No action taken.
C:\WINDOWS\system32\UAClprywevuxw.dll (Trojan.TDSS) -> No action taken.
C:\Documents and Settings\Danny\Local Settings\Temp\5A.tmp (Trojan.Downloader) -> No action taken.
C:\Documents and Settings\Danny\Local Settings\Temp\5B.tmp (Trojan.Downloader) -> No action taken.
C:\WINDOWS\system32\SKYNETpaxmnyrj.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETvmehxhub.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETbopavhkd.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETilvdsbob.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACdmtyswqqvt.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACdqrpxrflmu.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACkdpunfqopp.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\SKYNETwbigilal.sys (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\UACuaeiqapjxl.sys (Trojan.Agent) -> No action taken.

Here's the log regardless, I still have the MBAM window open and am able to wipe the files at any time.

#14 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:24 PM

Posted 13 August 2009 - 03:57 PM

Please make sure that you wipe the files using RootRepeal first, then reboot, and then run a Quick Scan with malwarebytes and post the log.
Computer Pro

#15 outshimed

outshimed
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:05:24 PM

Posted 13 August 2009 - 04:01 PM

That's what I just did.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users