Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help Need: Mount point destination : \Device\__max++>\^


  • This topic is locked This topic is locked
50 replies to this topic

#1 mooraj

mooraj

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 02 November 2009 - 04:15 PM

Hi,

I was told by one of your admins to transfer my post here.
http://www.bleepingcomputer.com/forums/t/267581/help-needed-rookit-infection/

I would be very grateful if someone can help me out. Thanks in advance.
Abbas

Pasting in logs from other topic. ~ OB

Win32Diag.exe - I had to kill the process as it got stuck. Here is the log. THANKS !
Running from: C:Documents and Settingsam300DesktopWin32kDiag.exe

Log file at : C:Documents and Settingsam300DesktopWin32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:WINDOWS'...



Found mount point : C:WINDOWS$hf_mig$KB943460KB943460

Mount point destination : Device__max++>^

Found mount point : C:WINDOWS$hf_mig$KB973874-IE8KB973874-IE8

Mount point destination : Device__max++>^

Found mount point : C:WINDOWS$hf_mig$KB974455-IE8KB974455-IE8

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSaddinsaddins

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSassemblyNativeImages_v2.0.50727_32TempZAP287.tmpZAP287.tmp

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSassemblyNativeImages_v2.0.50727_32TempZAP2C1.tmpZAP2C1.tmp

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSassemblytmptmp

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSConfigConfig

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSConnection WizardConnection Wizard

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd1d1

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd2d2

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd3d3

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd4d4

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd5d5

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd6d6

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd7d7

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSCSCd8d8

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimechsimeappletsapplets

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeCHTIMEAppletsApplets

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeimejpappletsapplets

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeimejp98imejp98

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeimjp8_1appletsapplets

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeimkr6_1appletsapplets

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimeimkr6_1dictsdicts

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSimesharedresres

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSInstaller$PatchCache$Managed1F3B805BA42A0C233B0158879691FE822.1.210222.1.21022

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSInstaller$PatchCache$ManagedD7314F9862C648A4DB8BE2A5B47BE1001.0.01.0.0

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSjavaclassesclasses

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSjavatrustlibtrustlib

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSMicrosoft.NETFrameworkv1.0.3705Temporary ASP.NET FilesBind LogsBind Logs

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSMicrosoft.NETFrameworkv1.1.4322Temporary ASP.NET FilesBind LogsBind Logs

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSMicrosoft.NETFrameworkv2.0.50727Temporary ASP.NET FilesTemporary ASP.NET Files

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSmsappsmsinfomsinfo

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSmsdownld.tmpmsdownld.tmp

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSpchealthERRORREPQHEADLESQHEADLES

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSpchealthERRORREPQSIGNOFFQSIGNOFF

Mount point destination : Device__max++>^

Found mount point : C:WINDOWSpchealthhelpctrBATCHBATCH

Mount point destination : Device__max++>^

Cannot access: C:WINDOWSpchealthhelpctrbinariesHelpSvc.exe

peek.bat log.

This is in response to #2 (Above) - Log.txt
Volume in drive C has no label.
Volume Serial Number is 1832-41BE

Directory of C:WINDOWS$hf_mig$KB975467SP2QFE

02/06/2009 02:46 PM 408,064 netlogon.dll
1 File(s) 408,064 bytes

Directory of C:WINDOWSsystem32

08/04/2004 08:00 AM 180,224 scecli.dll

Directory of C:WINDOWSsystem32

08/04/2004 08:00 AM 407,040 netlogon.dll

Directory of C:WINDOWSsystem32

08/04/2004 08:00 AM 61,952 eventlog.dll
3 File(s) 649,216 bytes

Directory of C:WINDOWSsystem32dllcache

08/04/2004 08:00 AM 180,224 scecli.dll

Directory of C:WINDOWSsystem32dllcache

08/04/2004 08:00 AM 407,040 netlogon.dll

Directory of C:WINDOWSsystem32dllcache

08/04/2004 08:00 AM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Total Files Listed:
7 File(s) 1,700,352 bytes
0 Dir(s) 80,493,424,640 bytes free
------------

Hi- Just as a follow up. I ran dds.scr and a DOS prompt opened and closed instantly. Also, as per my link that I posted. Root Repeal failed.

Please advise.

Many Thanks !

Merged posts. ~ OB
Abbas

Edited by Orange Blossom, 02 November 2009 - 10:43 PM.


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:02:19 PM

Posted 08 November 2009 - 10:25 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 08 November 2009 - 11:34 AM

Hi - Thanks again for the post. I appreciate it.

As requested, I ran the script and a DOS window opened and closed in a second. I was not connected to the internet. It seems the max++ is killing it.

Please advise.
Thanks
Abbas

#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 08 November 2009 - 12:52 PM

Hello mooraj,

And :( to the Bleeping Computer Malware Removal Forum[/b], My name is Elise. I'll be glad to help you with your computer problems.[/color]

I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.

You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------
Please be patient and I'd be grateful if you would note the following:
  • The cleaning process is not instant. DDS logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem.


COMBOFIX
---------------
Please download ComboFix from one of these locations:Bleepingcomputer
ForoSpyware
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.


Please save this file to your desktop. Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.
"%userprofile%\desktop\win32kdiag.exe" -f -r


Restart your computer


We need to scan the system with this special tool:

* Please download and save:

Junction.zip

* Unzip it and place Junction.exe in the Windows directory (C:\Windows).
* Go to Start => Run... => Copy and paste the following command in the Run box and click OK:

cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

A command window opens starting to scan the system. Wait until a log file opens. Copy and paste the log in your next reply.


In your next reply, please include the following:
  • Combofix.txt
  • Win32kDiag.txt
  • Junction log

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 09 November 2009 - 03:13 PM

HI - Thank you so much for all your help. I ran Combofix and it looks like it did work but it did not create a logfile. It created a folder under C:\ but no logfile.

Here are the results from Win32kDiag.txt
Running from: C:\Documents and Settings\am300\desktop\win32kdiag.exe

Log file at : C:\Documents and Settings\am300\Desktop\Win32kDiag.txt

Removing all found mount points.

Attempting to reset file permissions.

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Cannot access: C:\WINDOWS\pchealth\helpctr\binaries\HelpSvc.exe

Attempting to restore permissions of : C:\WINDOWS\pchealth\helpctr\binaries\HelpSvc.exe

Cannot access: C:\WINDOWS\SoftwareDistribution\Download\12e31c1143e5f70785d44c867e7b3e13\update\update.exe

Attempting to restore permissions of : C:\WINDOWS\SoftwareDistribution\Download\12e31c1143e5f70785d44c867e7b3e13\update\update.exe

Cannot access: C:\WINDOWS\SoftwareDistribution\Download\f5ce3558cdad2d0de1884dee71734a4a\update\update.exe

Attempting to restore permissions of : C:\WINDOWS\SoftwareDistribution\Download\f5ce3558cdad2d0de1884dee71734a4a\update\update.exe

Cannot access: C:\WINDOWS\system32\MRT.exe

Attempting to restore permissions of : C:\WINDOWS\system32\MRT.exe



Finished!
***This logfile is different from the first time I ran Win32kDiag***
---------------------------------------------------------------------
Here is the JUNCTION log.

Junction v1.05 - Windows junction creator and reparse point viewer
Copyright © 2000-2007 Mark Russinovich
Systems Internals - http://www.sysinternals.com


Failed to open \\?\c:\\hiberfil.sys: The process cannot access the file because it is being used by another process.



Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.



Failed to open \\?\c:\\System Volume Information: Access is denied.


...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...
Failed to open \\?\c:\\Documents and Settings\am300\Desktop\RootRepeal.exe: Access is denied.




...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...


Failed to open \\?\c:\\Program Files\Malwarebytes' Anti-Malware\mbam.exe: Access is denied.



Failed to open \\?\c:\\Program Files\McAfee\VirusScan Enterprise\scan32.exe: Access is denied.


...

...

...

...

...

...

..
Failed to open \\?\c:\\Program Files\Spybot - Search & Destroy\SpybotSD.exe: Access is denied.



Failed to open \\?\c:\\Program Files\Trend Micro\HijackThis\HijackThis.exe: Access is denied.


.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

No reparse points found.

Edited by mooraj, 09 November 2009 - 04:00 PM.


#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 09 November 2009 - 03:44 PM

Can you please look in c:\qoobox if it contains any log files? If not, what does it contain?

:( This log of Win32kDiag is indeed different, because we used different switches.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#7 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 09 November 2009 - 04:04 PM

In that folder, there was a log file - LogA - Here are the contents. There were also 5 folders.
BackEnv - LastRun - Quarantine - Test - TestC

------------------------------------------------------------------------------
\Registry\Machine\System\CurrentControlSet\Services\vkquwexg

*******************

Script file located at: \??\C:\ComboFix\ComboDel.txt
Script file opened successfully.

Script file read successfully

Backups directory opened successfully at C:\QooBox
*******************

Beginning to process script file:


Completed script processing.

*******************

Finished! Terminate.//////////////////////////////////////////


\Registry\Machine\System\CurrentControlSet\Services\vkquwexg

*******************


Fatal error: integrity of Services key failed verification check! Security may be fatally compromised. Exiting immediately.

Could not open script file! Status: 0xc0000034 Abort!

#8 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 09 November 2009 - 04:31 PM

Thats not looking good... Lets see if we can find out more about this.

Can you please tell me what is listed in the Quarentine folder?

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#9 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 09 November 2009 - 04:39 PM

There are 2 folders and a log file catchme.log
Here are the contents to the Log file.

-------- 2009-11-09 - 12:30:29 -------------

file copied: C:\WINDOWS\system32\eventlog.dll -> C:\Qoobox\Quarantine\C\WINDOWS\system32\eventlog.dll.vir ( 61952 bytes )
delete file error: C:\WINDOWS\system32\eventlog.dll, The process cannot access the file because it is being used by another process.

-------- 2009-11-09 - 14:48:27 -------------

The 2 folders are C and Registry_backups

Under C - There is Program Files and Windows. The filename is lib.sig.vir and eventlog.dll.vir (System32) and LVPrcInj01.dll.vir (Temp)

Under Registry_backups there is Legacy_{79007602-0CDB-4405-9DBF-1257BB3226ED}.reg.dat and tcpip.reg

#10 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 09 November 2009 - 04:42 PM

I am able to use IE 7.0 and Firefox again. I was not able to run them before. I also downloaded Malwarebytes' Anti-Malware 1.41 and ran a scan (Was not able to do that before either). I got the following log.
---------------------------------------
Malwarebytes' Anti-Malware 1.41
Database version: 3136
Windows 5.1.2600 Service Pack 2

11/9/2009 4:33:53 PM
mbam-log-2009-11-09 (16-33-48).txt

Scan type: Quick Scan
Objects scanned: 155529
Time elapsed: 9 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowCpl\1 (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\win32k.sys (Trojan.Dropper) -> No action taken.
-------------------------------------------------

#11 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 09 November 2009 - 04:47 PM

I am trying to get a bit more information about the Combofix problem. I will post back tomorrow to you.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#12 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 09 November 2009 - 04:50 PM

Thanks. Should I delete the files listed in Malwarebytes' Anti-Malware report? I havent done that as yet. Waiting on you. Thanks !

#13 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 10 November 2009 - 02:49 AM

Yes, you can delete the files detected by MBAM.

I am currently waiting for a reply from the Combofix developpers about the problems you encountered during the run. I will keep you posted.

Edited by elise025, 10 November 2009 - 02:50 AM.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#14 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,112 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:10:19 PM

Posted 10 November 2009 - 07:08 AM

Hello mooraj,

We need to reset the permissions altered by the malware on a few files.
  • Download this tool and save it to the desktop: http://download.bleepingcomputer.com/sUBs/...xes/Inherit.exe
  • Go to Start => Run => Copy and paste the first line of the following lines in the run box and click OK (repeat the process for each line):

    "%userprofile%\desktop\inherit" "c:\Documents and Settings\am300\Desktop\RootRepeal.exe"
    "%userprofile%\desktop\inherit" "c:\Program Files\Malwarebytes' Anti-Malware\mbam.exe"
    "%userprofile%\desktop\inherit" "c:\Program Files\McAfee\VirusScan Enterprise\scan32.exe"
    "%userprofile%\desktop\inherit" "c:\Program Files\Spybot - Search & Destroy\SpybotSD.exe"
    "%userprofile%\desktop\inherit" "c:\Program Files\Trend Micro\HijackThis\HijackThis.exe"

  • If you get a security warning select Run.
  • You will get a "Finish" popup. Click OK.
After you do this, please try to re-run Combofix.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#15 mooraj

mooraj
  • Topic Starter

  • Members
  • 43 posts
  • OFFLINE
  •  
  • Local time:02:19 PM

Posted 10 November 2009 - 10:26 AM

Hi,

I cant thank you enough for all your help.. you have saved me weeks of work. My IT dept told them that they would have to re image my PC.

I ran Inherit and got 5 OK messages.

Do I have to re run ComboFix as everything seems to be working fine. I ran Antimalware and SpyBot and got rid of everything it suggested. Should I get Hijackthis? What does it do?

Thanks
Abbas




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users