Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Fake Police Notice

  • This topic is locked This topic is locked
11 replies to this topic

#1 wizardofaus


  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 03 March 2012 - 05:14 AM

Yesterday evening I was infected with the French version of the fake police notice (as shown here)

After restarting in safe mode I ran SUPERantiSpyware, which showed 1 infected file which it claimed to have fixed. Restarting in normal mode the problem returned immediately.

I then followed the instructions as shown on the page linked to above. This caused exactly the same result.

I have since run malawarebytes and AVG with similar results.

I have managed (at last) to run dds. This was difficult because the malware hides stuff. I am still trying to get a GMER report that I can access - I have to be creative about where I save it as many files are not accessible, and even those that are seem to become inaccessible after being accessed a couple of times.

I hope someone can help - this is doing my head in!

I have run GMER but I don't have the option to save the scan

Here is my DDS.txt results

DDS (Ver_2011-08-26.01) - NTFSx86 NETWORK
Internet Explorer: 7.0.5730.13
Run by Administrator at 8:23:28 on 2012-03-03
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1022.617 [GMT 1:00]
AV: AVG Anti-Virus Free Edition 2012 *Enabled/Updated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
FW: ZoneAlarm Firewall *Enabled*
============== Running Processes ===============
C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
============== Pseudo HJT Report ===============
uWindow Title = Microsoft Internet Explorer
mWindow Title = Microsoft Internet Explorer
uInternet Connection Wizard,ShellNext = hxxp://www.nordnet.fr/
mWinlogon: SHELL=iexplore.exe
BHO: Expat Shield Class: {3706ee7c-3cad-445d-8a43-03ebc3b75908} - c:\program files\expat shield\hssie\ExpatIE.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg2012\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Easy-WebPrint: {327c2873-e90d-4c37-aa9d-10ac9baba46c} - c:\program files\canon\easy-webprint\Toolband.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [BCWipeTM Startup] "c:\program files\jetico\bcwipe\BCWipeTM.exe" startup
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [LVCOMS] c:\program files\common files\logitech\qcdriver2\LVCOMS.EXE
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [LanguageShortcut] "c:\program files\cyberlink\powerdvd\language\Language.exe"
mRun: [NeroFilterCheck] c:\program files\common files\ahead\lib\NeroCheck.exe
mRun: [SecurDisc] c:\program files\nero\nero 7\incd\NBHGui.exe
mRun: [InCD] c:\program files\nero\nero 7\incd\InCD.exe
mRun: [REGSHAVE] c:\program files\regshave\REGSHAVE.EXE /AUTORUN
mRun: [AVG_TRAY] "c:\program files\avg\avg2012\avgtray.exe"
mRun: [Malwarebytes' Anti-Malware] "c:\program files\malwarebytes' anti-malware\mbamgui.exe" /starttray
mRun: [EEventManager] c:\program files\epson\creativity suite\event manager\EEventManager.exe
mRunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=NFVZOVgtTlNWVkwtTzRCWlEtUUlNQ0wtUVREQ0gtNElKTUg"&"inst=NzctNzAyNDM3MDM0LUJBKzEtS1YzKzctWEwrMS1UNC1GTDEwKzEtRk9JKzExLUREVCs0MzU2OC1ERDEwRisxLVNUMTBGQVBQKzE"&"prod=90"&"ver=10.0.1392
mRunOnce: [Malwarebytes Anti-Malware (cleanup)] rundll32.exe "c:\documents and settings\all users\application data\malwarebytes\malwarebytes' anti-malware\cleanup.dll",ProcessCleanupScript
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
IE: Easy-WebPrint Add To Print List - c:\program files\canon\easy-webprint\Resource.dll/RC_AddToList.html
IE: Easy-WebPrint High Speed Print - c:\program files\canon\easy-webprint\Resource.dll/RC_HSPrint.html
IE: Easy-WebPrint Preview - c:\program files\canon\easy-webprint\Resource.dll/RC_Preview.html
IE: Easy-WebPrint Print - c:\program files\canon\easy-webprint\Resource.dll/RC_Print.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
DPF: {31435657-9980-0010-8000-00AA00389B71} - hxxp://download.microsoft.com/download/e/2/f/e2fcec4b-6c8b-48b7-adab-ab9c403a978f/wvc1dmo.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1271223834062
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1271223824500
TCP: DhcpNameServer =
TCP: Interfaces\{EF85A27F-660C-4156-9121-6C9A569C0208} : NameServer =
TCP: Interfaces\{F6DE9864-B6C8-46E2-A856-F108F0D6F2BD} : DhcpNameServer =
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg2012\avgpp.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
Notify: TPSvc - TPSvc.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"
================= FIREFOX ===================
FF - ProfilePath - c:\documents and settings\administrator\application data\mozilla\firefox\profiles\bidctrbt.default\
FF - prefs.js: browser.search.selectedEngine - DuckDuckGo
FF - prefs.js: browser.startup.homepage - hxxp://www.google.co.uk/firefox/webhp?complete=0&ion=0&hl=en
FF - prefs.js: keyword.enabled - false
FF - plugin: c:\documents and settings\administrator\application data\facebook\npfbplugin_1_0_1.dll
FF - plugin: c:\program files\google\update\\npGoogleOneClick8.dll
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - plugin: c:\program files\microsoft silverlight\4.0.60310.0\npctrlui.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npdeployJava1.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npFoxitReaderPlugin.dll
============= SERVICES / DRIVERS ===============
R0 AVGIDSEH;AVGIDSEH;c:\windows\system32\drivers\AVGIDSEH.sys [2011-7-11 23120]
R0 Avgrkx86;AVG Anti-Rootkit Driver;c:\windows\system32\drivers\avgrkx86.sys [2011-9-13 32592]
R1 Avgtdix;AVG TDI Driver;c:\windows\system32\drivers\avgtdix.sys [2011-7-11 295248]
R1 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2009-5-14 532224]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCore.exe [2011-8-12 116608]
R2 vsmon;TrueVector Internet Monitor;c:\windows\system32\zonelabs\vsmon.exe -service --> c:\windows\system32\zonelabs\vsmon.exe -service [?]
R3 fhlppppoe;PPPOE/ADSL miniport;c:\windows\system32\drivers\fhlpppoe.sys [2009-5-14 49200]
S0 is3srv;is3srv;c:\windows\system32\drivers\is3srv.sys --> c:\windows\system32\drivers\is3srv.sys [?]
S0 oexwoif;oexwoif;c:\windows\system32\drivers\rlfatlue.sys --> c:\windows\system32\drivers\rlfatlue.sys [?]
S0 szkg5;szkg5;c:\windows\system32\drivers\szkg.sys --> c:\windows\system32\drivers\szkg.sys [?]
S0 szkgfs;szkgfs;c:\windows\system32\drivers\szkgfs.sys --> c:\windows\system32\drivers\szkgfs.sys [?]
S1 Avgldx86;AVG AVI Loader Driver;c:\windows\system32\drivers\avgldx86.sys [2011-7-11 230608]
S1 Avgmfx86;AVG Mini-Filter Resident Anti-Virus Shield;c:\windows\system32\drivers\avgmfx86.sys [2011-8-8 40016]
S1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2011-7-22 12880]
S1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2011-7-12 67664]
S2 AVGIDSAgent;AVGIDSAgent;c:\program files\avg\avg2012\AVGIDSAgent.exe [2011-10-12 4433248]
S2 avgwd;AVG WatchDog;c:\program files\avg\avg2012\avgwdsvc.exe [2011-8-2 192776]
S2 ExpatShieldService;Expat Shield Service;c:\program files\expat shield\bin\openvpnas.exe [2011-12-29 331608]
S2 ExpatSrv;Expat Shield Routing Service;c:\program files\expat shield\hsswpr\hsssrv.exe [2011-12-29 363336]
S2 ExpatWd;Expat Shield Monitoring Service;c:\program files\expat shield\bin\hsswd.exe -product expat --> c:\program files\expat shield\bin\hsswd.exe -product Expat [?]
S2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-2-16 652360]
S3 AVGIDSDriver;AVGIDSDriver;c:\windows\system32\drivers\AVGIDSDriver.sys [2011-7-11 134608]
S3 AVGIDSFilter;AVGIDSFilter;c:\windows\system32\drivers\AVGIDSFilter.sys [2011-7-11 24272]
S3 AVGIDSShim;AVGIDSShim;c:\windows\system32\drivers\AVGIDSShim.sys [2011-7-11 16720]
S3 ExpatTrayService;Expat Shield Tray Service;c:\program files\expat shield\bin\EXPATTrayService.exe [2011-12-29 77520]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-2-16 20464]
S3 PID_0920;Logitech QuickCam Express(PID_0920);c:\windows\system32\drivers\LV532AV.SYS [2009-5-16 152576]
S3 tap0801;TAP-Win32 Adapter V8;c:\windows\system32\drivers\tap0801.sys [2006-10-1 26624]
S4 BCSWAP;BCSWAP;c:\windows\system32\drivers\BCSwap.sys [2002-8-16 88080]
S4 gupdate1c9dfb165639400;Google Update Service (gupdate1c9dfb165639400);"c:\program files\google\update\googleupdate.exe" /svc --> c:\program files\google\update\GoogleUpdate.exe [?]
=============== Created Last 30 ================
2012-02-26 13:29:43 282624 ----a-w- c:\program files\common files\installshield\updateservice\agent.exe
2012-02-26 13:26:00 49152 ----a-w- c:\windows\StiRegstEng.dll
2012-02-26 13:26:00 129536 ----a-w- c:\windows\_isres.dll
2012-02-16 02:26:47 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-16 02:26:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-02-16 02:15:11 141120 ----a-w- c:\documents and settings\administrator\unhider.exe
==================== Find3M ====================
2011-12-28 23:57:28 37376 ----a-w- c:\windows\system32\drivers\HssDrv.sys
2011-12-28 23:57:26 32768 ----a-w- c:\windows\system32\drivers\taphss.sys
2010-06-17 10:36:53 400840 ----a-w- c:\program files\atomic.exe
============= FINISH: 8:24:25.17 ===============

Attached Files

Edited by wizardofaus, 03 March 2012 - 07:13 AM.

BC AdBot (Login to Remove)


#2 nasdaq


  • Malware Response Team
  • 40,524 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:29 AM

Posted 06 March 2012 - 11:21 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.

Please Download

>>> Double-click on TDSSKiller.exe to run the application.
  • Click on the Start Scan button and wait for the scan and disinfection process to be over.
  • If an infected file is detected, the default action will be Cure, click on Continue
    Posted Image
  • If a suspicious file is detected, the default action will be Skip, click on Continue
    Posted Image
  • If you are asked to reboot the computer to complete the process, click on the Reboot Now button. A report will be automatically saved at the root of the System drive ((usually C:\) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt" (for example, C:\TDSSKiller.2.2.0_20.12.2009_15.31.43_log.txt). Please copy and paste the contents of that file here.
  • If no reboot is required, click on Report. A log file will appear. Please copy and paste the contents of that file in your next reply.

Download http://public.avast.com/~gmerek/aswMBR.exe (aswMBR.exe) to your desktop. Double click the aswMBR.exe to run it

  • Click the "Scan" button to start scan.
  • Upon completion of the scan, click Save log, and save it to your desktop. (Note - do not select any Fix at this time) <- IMPORTANT
  • Please post the contents of that log in your next reply.
There shall also be a file on your desktop named MBR.dat. Right click that file and select Send To>Compressed (zipped) folder. Please attach that zipped file in your next reply.


Please post the logs for my review.

#3 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 06 March 2012 - 01:30 PM

Super. It's evening here, but I will start work on it tomorrow morning (Western European Time)


#4 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 07 March 2012 - 05:21 AM

Logs are attached. I was unable to download the TDSS killer from the link provided: or more accurately I was unable to open the zipped file - I got the police notice back. I was, however, on reboot, able to download and run the .exe file from Softpedia. ( http://www.softpedia.com/progDownload/TDSSKiller-Download-165428.html )

Running TDSSkiller in default mode showed nothing wrong - I re-ran with both additional options checked.

MBR also ran OK

Logs attached

Attached Files

#5 nasdaq


  • Malware Response Team
  • 40,524 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:29 AM

Posted 07 March 2012 - 11:00 AM

You can now run these tools.

Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop

  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
  • Close any open browsers, and all other programs working. Make sure you save your file if working on a document.
  • Do not install any other programs until this if fixed.[/b]
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Third party programs if not up to date can be the cause of infiltration an infection.

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.

Please post the logs and let me know if the problem persists.

#6 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 07 March 2012 - 11:45 AM

This is tricky..... I dont have a system tray, thats one of the problems I am having. Combofix reports that AVG is running, but task manager doesn't show that to be the case.

I assume I should be doing this in safe mode, because in normal mode all I have is the notice

Any ideas how I can close AVG with no systray, and no AVG processes obvious in task manager? Typing systray in the task manager doesnt work, and browsing task manager Windows folder appears empty

Edit 2: Have found a way of getting into the windows folder, but selecting systray and running from task manager does nothing

Edited by wizardofaus, 07 March 2012 - 02:23 PM.

#7 nasdaq


  • Malware Response Team
  • 40,524 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:29 AM

Posted 08 March 2012 - 10:01 AM

You will need to remove AVG completely.

Install this Microsoft Security-Essentials virus protection.


remove AVG
Please download the AVG Remover and Save it to your Desktop.
  • Close all programs and double-click avgremover.exe then click Run
  • In Vista/Win7, right-click and choose 'Run as administrator'.
  • Follow the on-screen instructions.
  • Restart your computer if asked.
  • Then delete avgremover.exe from your desktop.

You will be able to re install AVG when your computer as been cleaned.
Both AVG and Security Essential work well together.

Run ComboFix and post the log.

#8 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 09 March 2012 - 03:33 AM

processes I had to do:
I had to modify HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell to iexplore1. Changing the value of this entry is the only way I can start in normal mode without bringing up the police notice. I still have to run everything from the task manager, but at least for a while that isn't disabled.

This I had to do because you can only install Microsoft Security-Essentials in normal mode and AVG remover wouldn't run properly in safe mode either. It ran, restarted, but then nothing. At that stage I tried to run cmobofix, but it said AVG was still running.

I then restarted in normal mode and installed Microsoft Security-Essentials, and ran AVG remover. The control panel disappeared after a couple of seconds and I was left with the flashing hourglass for 5 minutes No restart was advised. I then ran AVG Remover again for the same result.

I tried uninstalling using CCleaner with no luck, and in the end tried deleting with BCWipe. This meant turning off system restore. I then ran AVG remover again. Again I got no request to restart, just a completely blank desktop.

However, after doing this I was able to stop all the AVG processes in task manager and run Combofix. I was unable to install Recovery Console, but continued running Combofix anyway. (posted fom netbook- I will add combofix log when it finishes running)

Once combofix rinished running I had my destop and taskmanager back, and the "mycomputer" icon was visible. I will now turn this machine off and await further instructions. I hope my convoluted way of removing AVG hasn't caused problems.

When I restart this machine it will be in SAFE MODE. Experience with this virus has taught me that restarting in normal mode without changing the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell entry causes the problem to return

Attached Files

Edited by wizardofaus, 09 March 2012 - 03:49 AM.

#9 nasdaq


  • Malware Response Team
  • 40,524 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:29 AM

Posted 09 March 2012 - 09:19 AM

This will have to run in regular mode. I hope you can execute the searches.
Keep me posted.

Looks like your registry key is damaged and the a bad file was installed.
Let find out what we have.

I had to modify HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell to iexplore1. Changing the value of this entry is the only way I can start in normal mode without bringing up the police notice.

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

If your operating system is 64 bit download this tool:
  • Double-click SystemLook.exe to run it.
  • Copy and paste the content of the following bold text into the main textfield:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell

  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Repeat the search for


Please post the results for my review.

#10 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 10 March 2012 - 04:17 AM


That worked then. Lots of processor action - never much less that 90%. Apart from that it did start in normal mode - a relief

Only potential fly in ointment is that on shutdown the machine automatically started installing updates. I got the blue windows screen with
"updates are being installed (xx of 43)"
"Do not turn off or unplug your computer;
it will turn off automatically"

What the updates are I am not sure, but I will restart in safe mode to find out. I guess that the processor action is explained, anyway...


It looks like they were all windows updates: interesting, as I am usually pretty good at doing updates, although I do cherry pick the ones I install (not using office, I cant see the point in installing MS Office security updates, for instance)

Attached Files

Edited by wizardofaus, 10 March 2012 - 04:58 AM.

#11 nasdaq


  • Malware Response Team
  • 40,524 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:29 AM

Posted 11 March 2012 - 10:17 AM

Sorry for this long delay. I lost my internet all day yesterday and just got it back.

The explorer.exe and iexplore.exe are good.

What are the remaining issues.

#12 wizardofaus

  • Topic Starter

  • Members
  • 73 posts
  • Local time:08:29 AM

Posted 11 March 2012 - 11:04 AM

No problems - I am grateful for the fact that someone could help, no matter how long it takes!!

Maybe nothing is wrong with the computer now. I haven't been using the PC with the problem - I have a couple more networked, which allows me to leave it offline.

Is there any check I can do to make sure it's all totally gone? Neither AVG or Superantispyware or malwarebytes picked this one up when I had the problem.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users