Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Complicated Open Cloud Infection


  • This topic is locked This topic is locked
4 replies to this topic

#1 SpacePlanner

SpacePlanner

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:04:19 PM

Posted 30 September 2011 - 11:38 PM

Hi .. I'm Jennie and I'm trying to remove a virus from my BF's computer for him. I've been trying everything available on the internet for 2 days, to no avail. This virus is combating me like a prized boxer in the ring. It's been on his computer since Monday afternoon (that we know of, that's the first time the "pop ups" started).

I have downloaded malwarebytes, spyware doctor, rkill, eXplorer, Mini Toolbox, RegCure, CC Cleaner, Paretologic, Trojan Hunter, and various other virus/antispyware/trojan/etc programs trying to remove this POS infection .. and as soon as the application is installed and begins to run .. Open Cloud kills it after a few moments and then renders it inoperable until I uninstall it and re-install it again .. only to kill it again after only a few seconds of scanning(Spyware Doctor did make it to 66% once, and Trojan Hunter made it all the way through once but thats it).

Google is also hijacked as well, when you open the home page it goes directly to google but if you issue a search and click a link it immediantly jumps to www.nobelsearch.com and then it flips over to hxxp://63.209.69.107/search/web/Open%20Cloud%20Security/a11/itcg-20446_3637/v5 .

I've researched and executed every tutorial I can find, and nothing has worked. So here I am begging for your help. :)

My BF is studying for his OT exam, and cannot use his computer (it won't let him run the application he was given to help him practice the certification exam he is scheduled to take next week). We aren't exactly sure who downloaded the virus (him playing online gambing games or his roommate by clicking links on Facebook .. regardless it's on here and really needs to be gone (I really need my laptop and right now he's had to borrow it for the time being, which means my graphic design work is on permanent hold for the time being). I'm sure it goes without saying that your help is greatly appreciated (and most importantly .. eagerly anticipated).

I hope I have followed the directions I read properly (I'm running safe mode and everything is huge (and only on a 17" monitor) and hard to read (scrolling back and forth really sucks). The only log I don't have is from GMER. The program ran for about 1 minute and was promptly killed, and now will not open. Double clicking does nothing, and neither does right.click>open.

DDS.txt LOG

.
DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 8.0.6001.18702
Run by Owner at 23:11:45 on 2011-09-30
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1014.730 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Outdated* {EDB4FA23-53B8-4AFA-8C5D-99752CCA7095}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
C:\WINDOWS\1043810424:2276968641.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\internet explorer\iexplore.exe
C:\Program Files\internet explorer\iexplore.exe
C:\WINDOWS\system32\ctfmon.exe
.
============== Pseudo HJT Report ===============
.
uSearch Bar = hxxp://www.google.com/ie
uStart Page = hxxp://www.google.com/
uSearchMigratedDefaultUrl = hxxp://www.mywebsearch.com/jsp/cfg_redir2.jsp?id=ZJxdm027YYUS&fl=0&ptb=ZooB9JJNkIoa3VuUXnuPxQ&url=http://www.ask.com/web&q={searchTerms}&l=zj&o=sb
uURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
uURLSearchHooks: H - No File
mURLSearchHooks: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
TB: {4982D40A-C53B-4615-B15B-B5B5E98D167C} - No File
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Spyware Doctor] c:\documents and settings\owner\desktop\sdsetup_revwire207[2].exe -min
mRun: [ehTray] c:\windows\ehome\ehtray.exe
mRun: [SunKistEM] c:\program files\digital media reader\shwiconem.exe
mRun: [<NO NAME>]
mRun: [CHotkey] zHotkey.exe
mRun: [IntelAudioStudio] "c:\program files\intel audio studio\IntelAudioStudio.exe" BOOT
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [THGuard] "c:\program files\trojanhunter 5.3\THGuard.exe"
mRun: [dJJ66dWK88234A] c:\windows\system32\NH66sWWK7fE.exe
mRun: [jccSS2ibF38234A] c:\windows\system32\qIIBBrzPN.exe
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office10\OSA.EXE
IE: &AIM Search - c:\program files\aim toolbar\AIMBar.dll/aimsearch.htm
IE: &Search
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {F47C1DB5-ED21-4dc1-853E-D1495792D4C5} - c:\program files\bodog poker\BPGame.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0002-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_02\bin\npjpi150_02.dll
IE: {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - {552781AF-37E4-4FEE-920A-CED9E648EADD} - c:\program files\common files\microsoft shared\encarta search bar\ENCSBAR.DLL
LSP: mswsock.dll
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab
DPF: {26FCCDF9-A7E1-452A-A73D-7BF7B4D0BA6C} - hxxp://o.aolcdn.com/pictures/ap/Resources/2.0.0.47.2/cab/aolpPlugins.10.2.0.0.cab
DPF: {6BAB93B7-1917-4214-A7D2-874FA6DB4740} - hxxp://pictures.aolcdn.com/ap/Resources/1.1.0.31/cab/aolpPlugins.10.1.0.0.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1300164926125
TCP: DhcpNameServer = 192.168.0.1
TCP: Interfaces\{0B59EA1C-9C14-4416-8E1F-423E051A2DF5} : DhcpNameServer = 192.168.0.1
Notify: igfxcui - igfxdev.dll
Hosts: 95.64.61.143 www.google.com
Hosts: 95.64.61.144 www.bing.com
.
============= SERVICES / DRIVERS ===============
.
R3 RTL8187B;NETGEAR WG111v3 Wireless-G USB Adapter Vista Driver;c:\windows\system32\drivers\wg111v3.sys [2009-7-31 341504]
S1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2011-4-18 165648]
S1 MpKslb5ed797a;MpKslb5ed797a;\??\c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{2674acfd-c1fe-443b-8a74-8cc88b3d25fd}\mpkslb5ed797a.sys --> c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{2674acfd-c1fe-443b-8a74-8cc88b3d25fd}\MpKslb5ed797a.sys [?]
S2 EAPPkt;Realtek EAPPkt Protocol;c:\windows\system32\drivers\EAPPkt.sys [2007-10-9 38144]
S2 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
.
=============== Created Last 30 ================
.
2011-10-01 03:44:48 -------- d-----w- c:\documents and settings\owner\application data\QfEL9gTXqYeINx
2011-10-01 03:44:48 -------- d-----w- c:\documents and settings\owner\application data\Q7fEL9gTXjeINx
2011-10-01 03:44:48 -------- d-----w- c:\documents and settings\owner\application data\A4pG5sdE8RqYwUr
2011-10-01 03:34:54 -------- d-----w- c:\documents and settings\owner\application data\DriverCure
2011-10-01 03:34:53 -------- d-----w- c:\documents and settings\owner\application data\ParetoLogic
2011-10-01 03:34:47 -------- d-----w- c:\program files\common files\ParetoLogic
2011-10-01 03:34:46 -------- d-----w- c:\program files\ParetoLogic
2011-10-01 03:34:46 -------- d-----w- c:\documents and settings\all users\application data\ParetoLogic
2011-10-01 03:16:50 -------- d-----w- c:\documents and settings\owner\application data\iTXXwwjUVe
2011-10-01 03:16:11 -------- d-----w- c:\documents and settings\owner\application data\KzPyy11D2nF4mHs
2011-10-01 03:16:10 -------- d-----w- c:\documents and settings\owner\application data\qccSS1ivDonGmHs
2011-10-01 03:16:10 -------- d-----w- c:\documents and settings\owner\application data\gjjYCekkBrzNx1v
2011-10-01 02:47:08 -------- d-----w- c:\documents and settings\owner\application data\knF44mmH5sJ7ELT
2011-10-01 02:47:07 -------- d-----w- c:\documents and settings\owner\application data\lsQQJ7dEL8gZhCk
2011-10-01 02:47:07 -------- d-----w- c:\documents and settings\owner\application data\KPNNxA1uvD2oFpm
2011-10-01 02:17:13 -------- d-----w- c:\documents and settings\owner\application data\Y888gRRZ9hYwk
2011-10-01 02:14:19 -------- d-----w- c:\documents and settings\owner\application data\PQQH66WK7fRLgXj
2011-10-01 02:14:19 -------- d-----w- c:\documents and settings\owner\application data\h666WK7fR
2011-10-01 02:14:18 -------- d-----w- c:\documents and settings\owner\application data\pOOBtx0cS1iD
2011-09-29 06:39:28 -------- d-----w- c:\windows\system32\OLL99hTXqjUClIr
2011-09-29 06:39:28 -------- d-----w- C:\t3ppnGG4aQHdW
2011-09-29 06:38:58 2408448 ----a-w- c:\windows\system32\qIIBBrzPN.exe
2011-09-29 06:38:58 -------- d-----w- C:\cK77fRRL9hTqjCe
2011-09-29 06:17:28 -------- d-----w- c:\documents and settings\owner\application data\oiibbF3pnG5aJ6W
2011-09-29 06:17:28 -------- d-----w- c:\documents and settings\owner\application data\F888fRZZ9hXw
2011-09-29 06:14:06 -------- d-----w- c:\windows\system32\YwwjjUVelO
2011-09-29 06:14:05 -------- d-----w- C:\qaaQJJ6dEK8fZ9Y
2011-09-29 06:12:57 2408448 ----a-w- c:\windows\system32\NH66sWWK7fE.exe
2011-09-29 06:12:57 -------- d-----w- C:\tPPP0yycS1iD3nG
2011-09-29 05:58:14 -------- d-----w- c:\documents and settings\owner\application data\TrojanHunter
2011-09-29 05:55:16 -------- d-----w- c:\documents and settings\all users\application data\RegCure
2011-09-29 05:50:24 -------- d-----w- c:\program files\TrojanHunter 5.3
2011-09-29 05:46:17 -------- d-----w- c:\program files\PC Tools Security
2011-09-29 05:46:17 -------- d-----w- c:\documents and settings\owner\application data\PC Tools
2011-09-29 05:45:01 -------- d-----w- c:\documents and settings\all users\application data\PC Tools
2011-09-29 05:08:04 -------- d-----w- C:\9dba98edaceb14be3bf14df7c720
2011-09-29 05:07:51 -------- d--h--r- C:\AHCache
2011-09-29 05:07:46 -------- d--h--w- c:\windows\system32\GroupPolicy
2011-09-29 04:50:17 7152464 ----a-w- c:\documents and settings\all users\application data\microsoft\microsoft antimalware\definition updates\{f786e765-d7b8-4f8d-ad42-7613c74e5be3}\mpengine.dll
2011-09-29 04:49:06 -------- d-----w- c:\windows\system32\wbem\repository\FS
2011-09-29 04:49:06 -------- d-----w- c:\windows\system32\wbem\Repository
2011-09-29 03:31:57 -------- d-----w- c:\program files\Spyware Doctor
2011-09-29 03:31:57 -------- d-----w- c:\program files\common files\PC Tools
2011-09-29 03:28:32 -------- d-----w- c:\documents and settings\owner\application data\GetRightToGo
2011-09-29 03:02:09 -------- d-----w- c:\documents and settings\owner\application data\AVG Secure Search
2011-09-29 03:01:31 -------- d-----w- c:\program files\common files\AVG Secure Search
2011-09-29 03:01:26 -------- d-----w- c:\program files\AVG Secure Search
2011-09-29 02:59:54 -------- d-----w- c:\windows\system32\drivers\AVG
2011-09-29 02:59:54 -------- d-----w- c:\documents and settings\all users\application data\AVG2012
2011-09-29 02:58:28 -------- d-----w- c:\program files\AVG
2011-09-29 02:48:06 -------- d-----w- c:\documents and settings\all users\application data\Common Files
2011-09-29 02:46:31 -------- d-----w- c:\documents and settings\all users\application data\MFAData
2011-09-27 14:33:33 0 ---ha-w- c:\documents and settings\owner\ddylfnsllv.tmp
2011-09-27 12:16:58 -------- d-----w- c:\documents and settings\owner\application data\2FEC02C09CDEAA672404E9E33632C46E
.
==================== Find3M ====================
.
2011-07-20 20:52:05 6144 ----a-w- c:\windows\~DF179E.tmp
2011-07-20 20:48:46 6144 ----a-w- c:\windows\~DF45D4.tmp
2011-07-12 01:18:48 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
.
=================== ROOTKIT ====================
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: WDC_WD2500JD-00HBC0 rev.08.02D08 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-17
.
device: opened successfully
user: MBR read successfully
.
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys >>UNKNOWN [0x86C02CA0]<<
_asm { MOV EAX, [ESP+0x4]; MOV ECX, [EAX+0x28]; PUSH EBP; MOV EBP, [ECX+0x4]; PUSH ESI; MOV ESI, [ESP+0x10]; PUSH EDI; MOV EDI, [ESI+0x60]; MOV AL, [EDI]; CMP AL, 0x16; JNZ 0x36; PUSH ESI; }
1 nt!IofCallDriver[0x804E13B9] -> \Device\Harddisk0\DR0[0x86F651E0]
3 CLASSPNP[0xF777DFD7] -> nt!IofCallDriver[0x804E13B9] -> [0x86BED690]
\Driver\00000310[0x86BED7B8] -> IRP_MJ_CREATE -> 0x86C02CA0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR DI, DI; MOV SI, 0x200; MOV SS, DI; MOV SP, 0x7a00; MOV BX, 0x7a0; MOV CX, SI; MOV DS, BX; MOV ES, BX; REP MOVSB ; JMP FAR 0x7a0:0x5f; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x86F0351B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
.
============= FINISH: 23:13:18.12 ===============

Best Regards & Thanks in Advance for any Help,
J

Attached Files


Edited by Orange Blossom, 01 October 2011 - 01:02 AM.
Deactivated link. ~ OB


BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:19 PM

Posted 05 October 2011 - 11:40 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/421349 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:19 PM

Posted 06 October 2011 - 05:38 PM

Hello SpacePlanner,
  • Welcome to Bleeping Computer.
  • My name is fireman4it and I will be helping you with your Malware problem.

    Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean".
  • In the upper right hand corner of the topic you will see a button called Watch Topic.I suggest you click it and select Immediate E-Mail notification and click on Proceed. This way you will be advised when we respond to your topic and facilitate the cleaning of your machine.

  • Finally, please reply using the ADD REPLY button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply, unless they do not fit into the post.

1.
Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!
  • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • If TDSSKiller does not run, try renaming it.
  • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
  • Click the Start Scan button.
  • Do not use the computer during the scan
  • If the scan completes with nothing found, click Close to exit.
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not an option, Skip instead, do not choose Delete unless instructed.
  • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_09.o7.26_log.txt) will be created and saved to the root directory (usually Local Disk C:).
  • Copy and paste the contents of that file in your next reply.



2.
Install Recovery Console and Run ComboFix

This tool is not a toy. If used the wrong way you could trash your computer. Please use only under direction of a Helper. If you decide to do so anyway, please do not blame me or ComboFix.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.


Things to include in your next reply::
TDSSKIller log
Combofix.txt
How is your machine running now?

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#4 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:19 PM

Posted 08 October 2011 - 09:05 PM

Hello.

Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 3-5 days the topic will need to be closed.

Thanks for understanding :)

With Regards,
fireman4it

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#5 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,512 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:05:19 PM

Posted 11 October 2011 - 04:54 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users