Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DLL issue


  • Please log in to reply
15 replies to this topic

#1 qataxman

qataxman

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 13 February 2010 - 10:14 PM

I have been getting several messages that ultimately say that something is wrong in the system32\0034.dll. I have done a spybot S&D scan, and a adaware scan, and a norton scan.

"The appliction or DLL C:\WINDOWS\system32\0034.DLL is not a valid Windows image. Please check this against your installation diskette."

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:05 PM

Posted 13 February 2010 - 10:29 PM

It's a trojan.

Download Malwarebytes' Anti-Malware (http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html) to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:05 PM

Posted 13 February 2010 - 10:40 PM

Hello Iam moving this to the Am I Infected forum from XP as you are..please post the MBAM log when done.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 qataxman

qataxman
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 14 February 2010 - 12:01 AM

Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/13/2010 11:54:29 PM
mbam-log-2010-02-13 (23-54-29).txt

Scan type: Quick Scan
Objects scanned: 124604
Time elapsed: 24 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 17
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 12
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{e0ec6fba-f009-3535-95d6-b6390db27da1} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f62f5c42-b484-429c-8400-e85af9754f23} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f62f5c42-b484-429c-8400-e85af9754f23} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{f62f5c42-b484-429c-8400-e85af9754f23} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f62f5c42-b484-429c-8400-e85af9754f23} (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\cscrptxt.cscrptxt.1.0 (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{41c29b07-6f91-4966-91be-2e2841643c83} (Adware.Adssite) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{9c8a568e-4201-478a-8536-526cf371d2e2} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{931c624a-1932-49f4-b1e4-b7ab60881f75} (Adware.EzLife) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{025b1d48-fda2-439b-a74d-ceca8b704028} (Adware.EzLife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ezLife (Adware.EZlife) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Smart-Ads-Solutions (Adware.SmartAds) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Smart-Ads-Solutions (Adware.SmartAds) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Smart-Ads-Solutions (Adware.SmartAds) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ezlife (Adware.EZlife) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Smart-Ads-Solutions (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.2.0 (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.6.0 (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Documents and Settings\RONALD WOLFE\Application Data\Smart-Ads-Solutions (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Documents and Settings\RONALD WOLFE\Application Data\Smart-Ads-Solutions\SmartAds (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Documents and Settings\RONALD WOLFE\Application Data\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Documents and Settings\RONALD WOLFE\Application Data\ezLife\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife\1.3.2.0 (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife\1.3.6.0 (Adware.EzLife) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\zprbycpo.dll (Adware.EZlife) -> Quarantined and deleted successfully.
C:\Documents and Settings\RONALD WOLFE\Desktop\MediaPlayerUpgrade.exe (Adware.Mirar) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.2.0\SmartAdsxtra.dll (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.2.0\uninstall.exe (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.6.0\SmartAdsxtra.dll (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\Smart-Ads-Solutions\SmartAds\1.3.6.0\uninstall.exe (Adware.SmartAds) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife\1.3.2.0\uninstall.exe (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife\1.3.6.0\ezLifextra.dll (Adware.EzLife) -> Quarantined and deleted successfully.
C:\Program Files\ezLife\ezLife\1.3.6.0\uninstall.exe (Adware.EzLife) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\00004f90.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\spool\prtprocs\w32x86\00007d0f.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.

#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:05 PM

Posted 14 February 2010 - 12:09 AM

I don't see it being removed.....

Download SUPERAntiSpyware Free for Home Users:
http://www.superantispyware.com/

* Double-click SUPERAntiSpyware.exe and use the default settings for installation.
* An icon will be created on your desktop. Double-click that icon to launch the program.
* If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here: http://www.superantispyware.com/definitions.html.)
* Close SUPERAntiSpyware.

PHYSICALLY DISCONNECT FROM THE INTERNET

Restart computer in Safe Mode.
To enter Safe Mode, restart computer, and keep tapping F8 key, until menu appears; select Safe Mode; you'll see "Safe Mode" in all four corners of your screen

* Open SUPERAntiSpyware.
* Click Scan your Computer... button.
* Click Scanning Preferences/Control Center... button.
* Under General and Startup tab, make sure, Start SUPERAntiSpyware when Windows starts option is UN-checked.
* Click the Scanning Control tab.
* Under Scanner Options make sure the following are checked (leave all others unchecked):
- Close browsers before scanning.
- Terminate memory threats before quarantining.

* Click the Close button to leave the control center screen.
* On the left, make sure you check C:\Fixed Drive.
* On the right, choose Perform Complete Scan.
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click OK.
* Make sure everything has a checkmark next to it and click Next.
* A notification will appear that Quarantine and Removal is Complete. Click OK and then click the Finish button to return to the main menu.
* If asked if you want to reboot, click Yes.
* To retrieve the removal information after reboot, launch SUPERAntispyware again.
- Click Preferences, then click the Statistics/Logs tab.
- Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
- If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
- Please copy and paste the Scan Log results in your next reply.

* Click Close to exit the program.

RECONNECT TO THE INTERNET

RESTART COMPUTER!

Post SUPERAntiSpyware log.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#6 qataxman

qataxman
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 14 February 2010 - 08:50 AM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/14/2010 at 07:55 AM

Application Version : 4.33.1000

Core Rules Database Version : 4584
Trace Rules Database Version: 2396

Scan type : Complete Scan
Total Scan Time : 06:37:03

Memory items scanned : 243
Memory threats detected : 0
Registry items scanned : 8112
Registry threats detected : 45
File items scanned : 100133
File threats detected : 16

Adware.Vundo/Variant-AdShot
HKLM\Software\Classes\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}#AppID
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\InprocServer32
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\InprocServer32#ThreadingModel
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\ProgID
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\Programmable
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\TypeLib
HKCR\CLSID\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}\VersionIndependentProgID
HKCR\adShotHlpr.adShotHlpr.1.0
HKCR\adShotHlpr.adShotHlpr.1.0\CLSID
HKCR\adShotHlpr.adShotHlpr
HKCR\adShotHlpr.adShotHlpr\CLSID
HKCR\adShotHlpr.adShotHlpr\CurVer
HKCR\TypeLib\{38061EDC-40BB-4618-A8DA-E56353347E6D}
C:\WINDOWS\SYSTEM32\NZQJYLWI.DLL
HKU\S-1-5-21-2482528504-2755548064-1217186955-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B7F9A26E-1047-40BA-A5AD-2A5BA818A514}

Adware.ContextHelper
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0D39A900-0F3A-4C29-A254-3E65244FDC34}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0D39A900-0F3A-4C29-A254-3E65244FDC34}

Adware.Agent/Gen-AdPro[CTX]
HKU\S-1-5-21-2482528504-2755548064-1217186955-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C66DF242-A276-4859-AEBF-CD705CEC8019}
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}#AppID
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\InprocServer32
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\InprocServer32#ThreadingModel
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\ProgID
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\Programmable
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\TypeLib
HKCR\CLSID\{C66DF242-A276-4859-AEBF-CD705CEC8019}\VersionIndependentProgID
HKCR\adHlpr.adHlpr.1.0
HKCR\adHlpr.adHlpr.1.0\CLSID
HKCR\adHlpr.adHlpr
HKCR\adHlpr.adHlpr\CLSID
HKCR\adHlpr.adHlpr\CurVer
HKCR\TypeLib\{A9722A0D-365F-47D2-B70B-37D046316D99}
C:\WINDOWS\SYSTEM32\PCAZBNWK.DLL
C:\WINDOWS\SYSTEM32\RHGVUAOR.DLL

AdwareFilter Toolbar
HKU\S-1-5-21-2482528504-2755548064-1217186955-1006\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{1028F737-81E7-452B-A860-E50CAD90A08C}

Adware.MyWebSearch/FunWebProducts
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MYWEBSEARCHSERVICE\0000#DeviceDesc

Adware.Mirar/NetNucleus
C:\DOCUMENTS AND SETTINGS\RONALD WOLFE\MY DOCUMENTS\MY DOWNLOADS\ADOBE ACROBAT\CRACK\CRACK.EXE
C:\DOCUMENTS AND SETTINGS\RONALD WOLFE\MY DOCUMENTS\MY DOWNLOADS\ADOBE ACROBAT\SETUP.EXE

Trojan.Agent/Gen-BigTtt
C:\WINDOWS\AXJTH0258.EXE
C:\WINDOWS\SFQM6026.EXE
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\1A.TMP
C:\WINDOWS\SYSTEM32\SPOOL\PRTPROCS\W32X86\1A24.TMP
C:\WINDOWS\Prefetch\SFQM6026.EXE-2F90230D.pf

Trojan.Agent/Gen-FakeAlert[WEXE]
C:\WINDOWS\PAWJT3245.EXE
C:\WINDOWS\SYSTEM32\WEXE.EXE
C:\WINDOWS\TQAXJ23355.EXE
C:\WINDOWS\Prefetch\PAWJT3245.EXE-006D3E96.pf
C:\WINDOWS\Prefetch\WEXE.EXE-16941E3E.pf

Trojan.Agent/Gen-Fakey
C:\WINDOWS\SYSTEM32\0033.DLL

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:05 PM

Posted 14 February 2010 - 11:53 AM

Are you still getting any errors?

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#8 qataxman

qataxman
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 14 February 2010 - 02:23 PM

After the restart, on the last scan, I got those messages. I went into the System32 folder found the 0034.dll file and deleted it. I haven't restarted yet, but also have not received anymore error messages. What started this whole thing, I have the Acrobat 9 Pro program, but no Serial Numbers to open it with. Downloaded a key gen from Limewire, my 1st mistake. Now I am still trying to find a legitimate key gen file to help me out.

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:05 PM

Posted 14 February 2010 - 02:30 PM

Please run a free online scan with the ESET Online Scanner
  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • When asked, allow the ActiveX control to install
  • Click Start
  • Make sure that the options Remove found threats and the option Scan unwanted applications is checked
  • Click Scan (This scan can take several hours, so please be patient)
  • Once the scan is completed, you may close the window
  • Use Notepad to open the logfile located at C:\Program Files\EsetOnlineScanner\log.txt
  • Copy and paste that log as a reply to this topic

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#10 Animal

Animal

    Bleepin' Animinion


  • Members
  • 35,905 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Where You Least Expect Me To Be
  • Local time:06:05 PM

Posted 14 February 2010 - 09:59 PM

What started this whole thing, I have the Acrobat 9 Pro program, but no Serial Numbers to open it with. Downloaded a key gen from Limewire, my 1st mistake. Now I am still trying to find a legitimate key gen file to help me out.

We will help you finish removing the malware from your computer. However we will not continue any discussion regarding any key gens. The only legitimate file is one you pay for. To clarify our position I quote the following rule.

No subject matter will be allowed whose purpose is to defeat existing copyright or security measures. If a user persists and/or the activity is obviously illegal the staff reserves the right to remove such content and/or ban the user. This would also mean encouraging the use or continued use of pirated software is not permitted, and subject to the same consequences.

Bold is my addition for clarity.

The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)


A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)


"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955)


Follow BleepingComputer on: Facebook | Twitter | Google+


#11 qataxman

qataxman
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 15 February 2010 - 10:17 PM

Thank you animal for that reminder of my stupidity. I also did not realize that using a key gen program was a no-no. First time I have ever attempted such, and trust me, the last. Thank you again. Now help me get of the crap it has infected me with.

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:05 PM

Posted 16 February 2010 - 12:05 PM

Please run and post the ESET log.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 qataxman

qataxman
  • Topic Starter

  • Members
  • 32 posts
  • OFFLINE
  •  
  • Local time:10:05 PM

Posted 20 February 2010 - 05:01 PM

I have tried to get into the ESET.com website, and cannot.

#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:05 PM

Posted 20 February 2010 - 05:03 PM

Go to Kaspersky website and perform an online antivirus scan.

1. Disable your active antivirus program.
2. Read through the requirements and privacy statement and click on Accept button.
3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
4. When the downloads have finished, click on Settings.
5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

  • Spyware, Adware, Dialers, and other potentially dangerous programs
  • Archives
  • Mail databases
6. Click on My Computer under Scan.
7. Once the scan is complete, it will display the results. Click on View Scan Report.
8. You will see a list of infected items there. Click on Save Report As....
9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.

Post fresh HijackThis log as well.

Edited by Broni, 20 February 2010 - 05:03 PM.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:05 PM

Posted 20 February 2010 - 07:48 PM

Hello, You will need to use Internet Explorer for thr ESET scan.

If you choose to post the HijackThis/DDS log,you will need to do this as HJT/DDS logs are not permitted in this forum.


You will need to Download and Run DDS which will create a Pseudo HJT Report as part of its log..
If for some reason you cannot perform a step, move on to the next.
Please follow this guide. go and do steps 6 thru 8 ,, Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help . Then go here Virus, Trojan, Spyware, and Malware Removal Logs ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK.

Edited by boopme, 20 February 2010 - 07:50 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users