HijackThis logs are not permitted
in this forum. Further, HijackThis only scans certain areas of a computer's system/registry
to help diagnose the presence of undetected malware in known hiding places. Therefore, it is limited in its ability to detect infection and generate a report outside these known hiding places and its log may not always reveal all the malware on a computer. As such, HijackThis has been replaced by other preferred tools
that provide comprehensive logs with specific details about more areas of a computer's system, files, folders and registry keys which may have been modified by malware infection.
The Malware Response Team members are all volunteers who contribute to helping members as time permits but currently there is a backup and you may have to wait for assistance. Referrals are made to the Virus, Trojan, Spyware, and Malware Removal Logs forum
if we cannot assist you here and we need to use more powerful tools or you don't mind waiting.
Please post the results of your last MBAM scan for review (even if nothing was found).
To retrieve the Malwarebytes Anti-Malware scan log information, launch MBAM.
Logs are saved to the following locations:
- Click the Logs Tab at the top.
- The log will be named by the date of scan in the following format: mbam-log-date(time).txt
-- If you have previously used MBAM, there may be several logs showing in the list.
- Click on the log name to highlight it.
- Go to the bottom and click on Open.
- The log should automatically open in notepad as a text file.
- Go to Edit and choose Select all.
- Go back to Edit and choose Copy or right-click on the highlighted text and choose Copy from there.
- Come back to this thread, click Add Reply, then right-click and choose Paste.
- Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
-- XP: C:\Documents and Settings\<Username>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-yyyy-mm-dd
-- Vista, Windows 7, 2008: C:\ProgramData\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-yyyy-mm-dd
Did your anti-virus/anti-spyware scanner provide a specific file(s) name associated with the malware threat(s) detection and if so, where is it located (full file path) at on your system?
Please download Norman Malware Cleaner
and save to your desktop.alternate download linkIf you previously used Norman, delete that version and download it again as the tool is frequently updated!
-- Note: If you need to scan a usb flash drives or other removable drives not listed, use the Add button to browse to the drives location, click on the drive to highlight and choose Ok.
- Be sure to read all the information Norman provides on that same page.
- Double-click on Norman_Malware_Cleaner.exe to start. Vista/Windows 7 users right-click and select Run As Administrator.
The tool is very slow to load as it uses a special driver. This is normal so please be patient.
- Read the End User License Agreement and click the Accept button to open the scanning window.
- Click Start Scan to begin.
- In some cases Norman Malware Cleaner may require that you restart the computer to completely remove an infection. If prompted, reboot to ensure that all infections are removed.
- After the scan has finished, a log file a log file named NFix_date_time (i.e. NFix_2009-06-22_07-08-56.log) will be created on your desktop with the results.
- Copy and paste the contents of that file in your next reply.
many of the computers locations were not examined as they were password protected ?...soo i may be paranoid
Some files and services are locked by the operating system or running programs during use for protection, so scanners cannot access them. Other files, especially those used by security programs, may be encrypted or password protected so they do not allow access. When the scanner finds such an object, it makes a note and then just skips to the next one. That explains why it may show as "skipped"
or "Access Denied"
in certain anti-virus or anti-malware log scan reports. These types of notations are normal when using many security scanning programs so there is seldom a need for concern.