Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan.gen resurgence?


  • This topic is locked This topic is locked
8 replies to this topic

#1 605Fab

605Fab

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:14 AM

Posted 11 July 2012 - 09:44 AM

I had a computer that was infected a few weeks ago with a TDSS/Trojan.Gen infection. I thought I had it cleaned up, but yesterday it is showing some files infected with the trojan.gen and gen2 viruses. Symantec virus scan picked them up and did quarantine them. Malawarebytes scan is clean.

I am not seeing any system issues -- except the results of the virus scan.

While I'd like to be optimistic and think that the virus scan is just doing it's job, it has the feeling that I still have some cleanup to do. Can you help get system cleaned up once and for all?! Thanks.

all righty then...here's the logs...

.
DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.5.0_12
Run by Trumpf at 10:57:06 on 2012-07-10
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1006.399 [GMT -5:00]
.
AV: Symantec Endpoint Protection *Disabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
FW: Symantec Endpoint Protection *Disabled*
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Symantec\Symantec Endpoint Protection\Smc.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Intel\AMT\atchksrv.exe
C:\Program Files\Diskeeper Corporation\Diskeeper\DkService.exe
C:\Program Files\Intel\AMT\LMS.exe
C:\PROGRA~1\MICROS~4\MSSQL$~1\binn\sqlservr.exe
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec\Symantec Endpoint Protection\Rtvscan.exe
C:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
C:\Program Files\Lenovo\Rescue and Recovery\rrservice.exe
C:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe
C:\Program Files\Lenovo\Rescue and Recovery\ADM\IUService.exe
C:\Program Files\Common Files\Lenovo\Logger\logmon.exe
C:\Program Files\TightVNC\WinVNC.exe
C:\Program Files\Common Files\System\MSSearch\Bin\mssearch.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Symantec\Symantec Endpoint Protection\SmcGui.exe
C:\WINDOWS\system32\ICO.EXE
C:\Program Files\Diskeeper Corporation\Diskeeper\DkIcon.exe
C:\WINDOWS\system32\FSRremoS.EXE
C:\WINDOWS\system32\Pelmiced.exe
C:\WINDOWS\system32\hkcmd.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
C:\Program Files\Lenovo\SafeGuard PrivateDisk\pdservice.exe
C:\Program Files\Lenovo\Client Security Solution\cssauth.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\NOTEPAD.EXE
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Internet Explorer\iexplore.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.keloland.com/
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
BHO: CPwmIEBrowserHelper Object: {f040e541-a427-4cf7-85d8-75e3e0f476c5} - c:\program files\lenovo\client security solution\tvtpwm_ie_com.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [High Definition Audio Property Page Shortcut] HDAShCut.exe
mRun: [Mouse Suite 98 Daemon] ICO.EXE
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\ISUSPM.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [TVT Scheduler Proxy] c:\program files\common files\lenovo\scheduler\scheduler_proxy.exe
mRun: [DiskeeperSystray] "c:\program files\diskeeper corporation\diskeeper\DkIcon.exe"
mRun: [PDService.exe] "c:\program files\lenovo\safeguard privatedisk\pdservice.exe"
mRun: [cssauth] "c:\program files\lenovo\client security solution\cssauth.exe" silent
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [WinVNC] "c:\program files\tightvnc\WinVNC.exe" -servicehelper
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\dienst~1.lnk - c:\program files\microsoft sql server\80\tools\binn\sqlmangr.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
mPolicies-explorer: NoStrCmpLogical = 1 (0x1)
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {0045D4BC-5189-4b67-969C-83BB1906C421} - {0FE81B52-73FA-425F-8F06-3F32451AC73F} - c:\program files\lenovo\client security solution\tvtpwm_ie_com.dll
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0004-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_04\bin\ssv.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1287083247935
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1287083243696
TCP: Interfaces\{9DADB4E1-4027-4C43-B3A5-D22F49CE92C2} : NameServer = 10.10.1.2
Notify: igfxcui - igfxdev.dll
.
============= SERVICES / DRIVERS ===============
.
R0 SMR250;Symantec SMR Utility Service 2.5.0;c:\windows\system32\drivers\SMR250.SYS [2012-7-10 83064]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2011-11-29 108456]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSvcHst.exe [2011-11-29 108456]
R2 MSSEARCH;Microsoft Search;c:\program files\common files\system\mssearch\bin\mssearch.exe [2011-11-15 69632]
R2 MSSQL$TRUMPF;MSSQL$TRUMPF;c:\progra~1\micros~4\mssql$~1\binn\sqlservr.exe -strumpf --> c:\progra~1\micros~4\mssql$~1\binn\sqlservr.exe -sTRUMPF [?]
R2 PrivateDisk;PrivateDisk;c:\program files\lenovo\safeguard privatedisk\privatediskm.sys [2006-3-13 58368]
R2 smi2;smi2;c:\program files\smi2\smi2.sys [2006-7-14 3968]
R2 Symantec AntiVirus;Symantec Endpoint Protection;c:\program files\symantec\symantec endpoint protection\Rtvscan.exe [2011-11-29 1846592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2012-5-31 106656]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20120709.038\NAVENG.SYS [2012-7-10 87928]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20120709.038\NAVEX15.SYS [2012-7-10 1589752]
S3 COH_Mon;COH_Mon;c:\windows\system32\drivers\COH_Mon.sys [2011-11-29 23888]
S3 SQLAgent$TRUMPF;SQLAgent$TRUMPF;c:\progra~1\micros~4\mssql$~1\binn\sqlagent.exe -i trumpf --> c:\progra~1\micros~4\mssql$~1\binn\sqlagent.exe -i TRUMPF [?]
.
=============== File Associations ===============
.
.scr=DWGTrueViewScriptFile
.
=============== Created Last 30 ================
.
2012-07-10 15:17:13 -------- d-----w- c:\windows\SchCache
2012-07-10 14:43:53 83064 ----a-w- c:\windows\system32\drivers\SMR250.SYS
2012-06-25 19:28:06 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-06-25 19:28:06 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-06-25 19:10:07 -------- d-----w- C:\TDSSKiller_Quarantine
2012-06-22 20:01:11 -------- d-----w- c:\documents and settings\all users\application data\HitmanPro
2012-06-20 18:36:11 167936 ----a-w- c:\windows\system32\drivers\wpshelper.sys
2012-06-20 18:34:25 99744 ----a-w- c:\windows\system32\drivers\SysPlant.sys
2012-06-20 18:34:25 357792 ----a-w- c:\windows\system32\Sysfer.dll
2012-06-18 19:25:56 -------- d-----w- c:\documents and settings\trumpf.customfab\application data\SPE
2012-06-18 15:26:05 -------- d-----w- c:\documents and settings\trumpf.customfab\application data\Malwarebytes
2012-06-18 15:25:56 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2012-06-13 11:10:41 521728 ------w- c:\windows\system32\dllcache\jsdbgui.dll
.
==================== Find3M ====================
.
2012-07-10 12:18:38 0 ----a-w- C:\ml_log.tmp
2012-07-08 05:00:07 5427 ----a-w- c:\windows\system32\EGATHDRV.SYS
2012-06-20 18:34:12 60872 ----a-w- c:\windows\system32\S32EVNT1.DLL
2012-06-20 18:34:12 126584 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2012-06-02 20:19:44 22040 ----a-w- c:\windows\system32\wucltui.dll.mui
2012-06-02 20:19:38 219160 ----a-w- c:\windows\system32\wuaucpl.cpl
2012-06-02 20:19:38 15384 ----a-w- c:\windows\system32\wuaucpl.cpl.mui
2012-06-02 20:19:34 15384 ----a-w- c:\windows\system32\wuapi.dll.mui
2012-06-02 20:19:30 17944 ----a-w- c:\windows\system32\wuaueng.dll.mui
2012-06-02 20:18:58 275696 ----a-w- c:\windows\system32\mucltui.dll
2012-06-02 20:18:58 214256 ----a-w- c:\windows\system32\muweb.dll
2012-06-02 20:18:58 17136 ----a-w- c:\windows\system32\mucltui.dll.mui
2012-05-31 13:22:09 599040 ----a-w- c:\windows\system32\crypt32.dll
2012-05-16 15:08:26 916992 ----a-w- c:\windows\system32\wininet.dll
2012-05-15 13:20:33 1863168 ------w- c:\windows\system32\win32k.sys
2012-05-11 14:42:33 43520 ------w- c:\windows\system32\licmgr10.dll
2012-05-11 14:42:33 1469440 ------w- c:\windows\system32\inetcpl.cpl
2012-05-11 11:38:02 385024 ----a-w- c:\windows\system32\html.iec
2012-05-04 13:16:13 2148352 ------w- c:\windows\system32\ntoskrnl.exe
2012-05-04 12:32:19 2026496 ------w- c:\windows\system32\ntkrnlpa.exe
2012-05-02 13:46:36 139656 ------w- c:\windows\system32\drivers\rdpwd.sys
.
============= FINISH: 11:03:00.43 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:04:14 PM

Posted 11 July 2012 - 02:39 PM

Good evening. :)

Can you list the detections that Symantec picked up? Also, did you disable your anti-virus and firewall prior to running DDS as it shows them to be so?

So long, and thanks for all the fish.

 

 


#3 605Fab

605Fab
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:14 AM

Posted 11 July 2012 - 03:13 PM

yes i did shut off AV before running some of the programs. it is normally ALWAYS running! with quick scans daily and full scans 1x week. ;)

Symantec picked--up up in June:
trojan.adh, trojan.gen2 and backdoor trojan


this week was Trojan.gen and trojan.gen2

Symantec did not pick up the first infections -- which was the TDSS and possibly one other but my memory is starting to fail there.

#4 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:04:14 PM

Posted 11 July 2012 - 04:49 PM

Can you tell me the file names and paths as they should be more informative.

So long, and thanks for all the fish.

 

 


#5 605Fab

605Fab
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:14 AM

Posted 12 July 2012 - 07:21 AM

Sorry, I was trying to quickly respond while walking out the door. That never works!

Here are the viruses found in the recent full scan:

Risk Filename Original Location Status Date
Trojan.Gen.2 APQ2E2.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen APQ2E3.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E4.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E5.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E6.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E7.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E8.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E9.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2EA.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 DWH31A.tmp c:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Infected 7/10/2012 8:25
Trojan.Gen.2 DWH31B.tmp c:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Infected 7/10/2012 8:25
Trojan.Gen tsk0005.dta c:\TDSSKiller_Quarantine\25.06.2012_14.09.36\mbr0000\tdlfs0000\ Infected 7/10/2012 8:51
Trojan.Gen tsk0007.dta c:\TDSSKiller_Quarantine\25.06.2012_14.09.36\mbr0000\tdlfs0000\ Infected 7/10/2012 8:51

#6 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:04:14 PM

Posted 12 July 2012 - 02:45 PM

Good evening. :)

Trojan.Gen.2 APQ2E2.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen APQ2E3.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E4.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E5.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E6.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E7.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E8.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2E9.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22
Trojan.Gen.2 APQ2EA.tmp c:\Documents and Settings\All Users\Application Data\Symantec\SRTSP\Quarantine\ Infected 7/10/2012 8:22

These are files held within Symantec's Quarantine folder and are no threat.

Trojan.Gen tsk0005.dta c:\TDSSKiller_Quarantine\25.06.2012_14.09.36\mbr0000\tdlfs0000\ Infected 7/10/2012 8:51
Trojan.Gen tsk0007.dta c:\TDSSKiller_Quarantine\25.06.2012_14.09.36\mbr0000\tdlfs0000\ Infected 7/10/2012 8:51

These are files found in TDSSKiller's Quarantine folder an again pose no threat.

Trojan.Gen.2 DWH31A.tmp c:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Infected 7/10/2012 8:25
Trojan.Gen.2 DWH31B.tmp c:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Infected 7/10/2012 8:25

These could be leftovers or they could be active files, so we'll delete them and you can monitor your scanner for any detections in the same folder.

Download TFC (Temporary File Cleaner) by OldTimer from here and save it to your Desktop.

  • You will need to close all open programs and save any work as TFC will require a reboot.
  • Double-click TFC.exe to run it. (Note: If you are using Vista, right-click the file and select Run As Administrator from the menu that appears).
  • Click the Start button to begin. Depending on how often you clean temp files, execution time could be anywhere from a few seconds to a minute or two - just sit back and enjoy the view.
  • Once it has finished it should reboot your PC all by itself. If it does not, please manually reboot.
  • Once rebooted your PC will run like a Cray supercomputer, or at least have less junk on the hard drive - OT's not a miracle worker you know!
  • Please note that this tool will empty the Recycle Bin as part of it's actions. If you have anything in there that you haven't finished with, move it first.

Run the PC for a day or two and then let me know how you are getting on.

Edited by Noviciate, 12 July 2012 - 02:45 PM.
Speeling error. :)

So long, and thanks for all the fish.

 

 


#7 605Fab

605Fab
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:14 AM

Posted 12 July 2012 - 03:02 PM

I will run it in a moment, but... I did find a few more viruses that Symantec did not do anything with...they seem to be 'hung' at pending analysis and were not deleted or quarantined.

Filename Risk Action Original Location User Status

DWH5.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ SYSTEM Infected
DWH14E6.tmp Trojan.Gen Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH14E7.tmp Trojan.Gen.2 Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH2D9.tmp Trojan.Gen.2 Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH2E.tmp Trojan.Gen Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH2F.tmp Trojan.Gen.2 Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH36.tmp Trojan.Gen.2 Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH37.tmp Trojan.Gen.2 Pending Analysis C:\Documents and Settings\Trumpf.CUSTOMFAB\Local Settings\Temp\ Trumpf Infected
DWH1A.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ Trumpf Infected
DWH1B.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ Trumpf Infected
DWH5.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ Trumpf Infected
DWH6.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ Trumpf Infected
DWH16.tmp Trojan.Gen.2 Pending Analysis C:\WINDOWS\Temp\ SYSTEM Infected

#8 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:04:14 PM

Posted 12 July 2012 - 05:16 PM

The tool should remove all temp files from your system, so they won't be an issue - unless the infection is active and then you'll see some more appear.

So long, and thanks for all the fish.

 

 


#9 Noviciate

Noviciate

  • Malware Response Team
  • 5,277 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Numpty HQ
  • Local time:04:14 PM

Posted 18 July 2012 - 03:35 PM

As this issue appears to have been resolved, this thread is now closed.

So long, and thanks for all the fish.

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users