Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows Vista - recieving ''404 not found nginx'' error msg


  • Please log in to reply
18 replies to this topic

#1 kaldridge

kaldridge

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 16 August 2011 - 10:01 PM

Hi there.

FOr the past few days or so, whenever I try to open google.com.au or youtube, I get the error message '404 nginx'. Google Uk site and other web pages are opening fine. Do you think I have malware on my computer, and if so, how do I go about uninstalling it?

Thanks,
Kristy

Edited by boopme, 16 August 2011 - 10:03 PM.
Moved To Am I Infected from VISTA


BC AdBot (Login to Remove)

 


#2 TSalarek

TSalarek

  • Members
  • 135 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Kentucky and Florida, USA
  • Local time:01:00 PM

Posted 16 August 2011 - 10:30 PM

quick web search:

within the last month Mozilla Firefox users posted the following fixes:

updating/reinstalling Java
uninstalling PANDA (via add/remove)
uninstall "Anti Phishing Domain Advisor" (via add/remove)
uninstall ASK toolbar


judging from the Mozilla forums this sounds like it might be a hijacker. Definitely double check your defenses.

edit: I'll let someone else help you if it's more involved than this...wish I could, but I'm just too slammed ATM.

Edited by TSalarek, 16 August 2011 - 10:32 PM.


#3 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 17 August 2011 - 12:26 AM

Thanks TSalarek.

I couldn't find any of those programs to uninstall, except Java. Have uninstalled and reinstalled Java, but unfortunately the problem persists.

Thanks anyway for your suggestions.

#4 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 17 August 2011 - 05:12 AM

After viewing a similar topic by another member, I installed SUPERAntiSpyware and removed about 1500 threats. However, the problem persists. Anyone have any ideas?

#5 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 17 August 2011 - 05:55 AM

Oh, and something else that has been happening for quite a few weeks now - when I search in google, I am always redirected to an unrelated page on the first attempt. I have to go back and click the link in google a second time before I am directed to the correct page.

#6 JacobHall

JacobHall

  • Members
  • 300 posts
  • OFFLINE
  •  
  • Local time:05:00 PM

Posted 17 August 2011 - 06:13 AM

Your requests are most probably being put through a proxy, especially if your getting your links hijacked.

http://www.ehow.com/how_4923459_check-proxy-settings-mozilla-firefox.html

if there is a proxy there, remove it and see if it helps

#7 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 17 August 2011 - 06:27 AM

Thanks, but there was no proxy listed there.

#8 TSalarek

TSalarek

  • Members
  • 135 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Kentucky and Florida, USA
  • Local time:01:00 PM

Posted 17 August 2011 - 12:40 PM

Try the usual fixes: AVG Free, MBAM, Spybot S+D....I had some luck on my current cleanup project with ESET Online when the others started coming back clean. Note that HijackThis has it's own subforum, if you decide to go that route get someone over there to help with it.

#9 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 17 August 2011 - 08:05 PM

I've uninstalled trend (my usual protection package) and installed AVG free. It's coming up with erro msg ''This operation has been cancelled due to restrictions in effect on this computer. Please contact system administrator'' when I try to open it.

ESET also won't open when I try to download it.

What should I do now?

Thanks,

Kristy

#10 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 18 August 2011 - 06:44 AM

Hi there,

For the past few weeks my google searches have been redirected to another site. This site was blocked by my Trend security, and by clicking the link again I would get though on the second attempt. Now for the past few days google won't work for me at all - I get the error message '404 not found, nginx'. Some other major sites like You tube also give me this error message.

I've downloaded lots of Malware detection programs after reading through some of these forums. Superantispyware detected something like 1500 threats (log below), whereas ESET online scanner detected nothing and AVG detected only a few cookies. Spyware Doctor's free scan listed the following 'serious threats': spyware.possible_website_hikack, worm.mevon.A, and securityrisk.URLReddir!rem.

I've cleared every listed threat detected by these programs but my problems persist. I would really appreciate any help that you can offer.

Thank you,

Kristy

Superantispyware log:(Sorry if I haven't put this in the correct format - I'm a bit of a novice!)

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/17/2011 at 07:04 PM

Application Version : 5.0.1118

Core Rules Database Version : 7573
Trace Rules Database Version: 5385

Scan type : Complete Scan
Total Scan Time : 02:34:56

Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC Off - Administrator

Memory items scanned : 722
Memory threats detected : 0
Registry items scanned : 39389
Registry threats detected : 1541
File items scanned : 45527
File threats detected : 41

Browser Hijacker.Internet Explorer Settings Hijack
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=287&q={searchTerms} ]
HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=287&q={searchTerms} ]
HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=287&q={searchTerms} ]
HKU\S-1-5-21-1803495905-2447732065-1904723306-1000_Classes\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=287&q={searchTerms} ]
HKU\S-1-5-18\Software\Microsoft\Internet Explorer\SearchScopes#URL [ http://findgala.com/?&uid=287&q={searchTerms} ]

Security.HiJack[ImageFileExecutionOptions]
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\A.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAVGAPI.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAVGAPI.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTRAY.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTRAY.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ABOUT.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ABOUT.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ACKWIN32.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ACKWIN32.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AD-AWARE.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AD-AWARE.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADAWARE.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADAWARE.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADVXDWIN.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADVXDWIN.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADWAREPRJ.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ADWAREPRJ.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENT.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENT.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENTSVR.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENTSVR.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENTW.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AGENTW.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALERTSVC.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALERTSVC.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALEVIR.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALEVIR.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALOGSERV.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALOGSERV.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALPHAAV
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALPHAAV#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALPHAAV.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALPHAAV.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALUSCHEDULERSVC.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ALUSCHEDULERSVC.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AMON9X.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AMON9X.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTI-TROJAN.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTI-TROJAN.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTI-VIRUS PROFESSIONAL.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTI-VIRUS PROFESSIONAL.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTISPYWARXP2009.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTISPYWARXP2009.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUS.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUS.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPLUS
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPLUS#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPLUS.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPLUS.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPRO_2010.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSPRO_2010.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXP
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXP#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXP.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXP.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXPPRO2009.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUSXPPRO2009.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUS_PRO.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIVIRUS_PRO.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTS.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTS.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APIMONITOR.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APIMONITOR.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APLICA32.EXE
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APLICA32.EXE#Debugger
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APVXDWIN.EXE
... there was a lot more but it wouldn't fit here.

#11 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,854 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:00 PM

Posted 18 August 2011 - 01:14 PM

Hello,

I merged your new topic to your previously existing topic.

Please try this:

Please download Malwarebytes Anti-Malware and save it to your desktop.Download Link 1
Download Link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
Please post the MBAM log in your reply, or what happens if you are unable to produce it.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#12 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 18 August 2011 - 05:18 PM

Thanks Orange Blossom.

I completed the MBAM scan and fix as directed. The log is below.

Thanks,
Kristy

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7498

Windows 6.0.6002 Service Pack 2
Internet Explorer 9.0.8112.16421

18/08/2011 22:41:25
mbam-log-2011-08-18 (22-41-25).txt

Scan type: Quick scan
Objects scanned: 201630
Time elapsed: 28 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 16
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Smart Security (Rogue.SmartSecurity) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\0 (Security.Hijack) -> Value: 0 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 (Security.Hijack) -> Value: 1 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 (Security.Hijack) -> Value: 2 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 (Security.Hijack) -> Value: 3 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 (Security.Hijack) -> Value: 4 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 (Security.Hijack) -> Value: 5 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 (Security.Hijack) -> Value: 6 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 (Security.Hijack) -> Value: 7 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 (Security.Hijack) -> Value: 8 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 (Security.Hijack) -> Value: 9 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 (Security.Hijack) -> Value: 10 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 (Security.Hijack) -> Value: 11 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 (Security.Hijack) -> Value: 12 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 (Security.Hijack) -> Value: 13 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 (Security.Hijack) -> Value: 14 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 (Security.Hijack) -> Value: 15 -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
c:\Users\Greg\AppData\Roaming\smart security (Rogue.SmartSecurity) -> Quarantined and deleted successfully.

Files Infected:
c:\Users\Greg\AppData\Roaming\smart security\instructions.ini (Rogue.SmartSecurity) -> Quarantined and deleted successfully.

#13 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,854 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:00 PM

Posted 18 August 2011 - 10:18 PM

How is the computer running now?

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#14 kaldridge

kaldridge
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 18 August 2011 - 10:43 PM

Just the same unfortunately.

#15 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,854 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:00 PM

Posted 18 August 2011 - 11:24 PM

Hello,

I see that a lot of what MBAM removed belongs to a rogue called Smart Security. There is a removal guide for that infection here: http://www.bleepingcomputer.com/virus-removal/remove-smart-security

Please let me know if that resolves your issues.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users