Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

audio ads


  • This topic is locked This topic is locked
3 replies to this topic

#1 ela119

ela119

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:19 AM

Posted 19 July 2012 - 06:51 PM

I am running Windows XP and I'm getting audio ads and music that plays in the background even when my browsers are not running. I've run Malwarebytes, AntiSpyware, AdAware Antivirus and IObit Malware Fighter several times but the problem is still there. Unfortunately, I also ran Combofix before before I read the FAQ that warned against doing this.

I've posted the Malwarebytes log and the Combofix logs below. Thanks for any help you can provide.

Malwarebytes:
Malwarebytes Anti-Malware 1.62.0.1300
www.malwarebytes.org

Database version: v2012.07.18.01

Windows XP Service Pack 2 x86 NTFS
Internet Explorer 8.0.6001.18702
elarson :: ZOLLMANLT [administrator]

07/19/2012 5:50:57 PM
mbam-log-2012-07-19 (17-50-57).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 325763
Time elapsed: 9 minute(s), 50 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)


ComboFix 12-07-18.04 - elarson 07/19/2012 18:10:03.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.2047.1276 [GMT -5:00]
Running from: c:\documents and settings\fzollman.ZOLLMANLT\Desktop\ComboFix.exe
* Created a new restore point
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\elarson\prfF.tmp
c:\documents and settings\elarson\vlc-1.1.5-win32.exe
c:\documents and settings\fzollman.ZOLLMANLT\GoToAssistDownloadHelper.exe
c:\windows\system32\Cache
c:\windows\system32\Cache\272512937d9e61a4.fb
c:\windows\system32\Cache\287204568329e189.fb
c:\windows\system32\Cache\28bc8f716fd76a47.fb
c:\windows\system32\Cache\2c53092c95605355.fb
c:\windows\system32\Cache\31a0997e9a5b5eb3.fb
c:\windows\system32\Cache\32c84fe32bb74d60.fb
c:\windows\system32\Cache\3917078cb68ec657.fb
c:\windows\system32\Cache\590ba23ce359fd0c.fb
c:\windows\system32\Cache\610289e025a3ee9a.fb
c:\windows\system32\Cache\651c5d3cdbfb8bd1.fb
c:\windows\system32\Cache\6c59ac5e7e7a3ad0.fb
c:\windows\system32\Cache\6d03dad1035885d3.fb
c:\windows\system32\Cache\a8556537add6dfc5.fb
c:\windows\system32\Cache\ad10a52aff5e038d.fb
c:\windows\system32\Cache\b688d702139ab001.fb
c:\windows\system32\Cache\c1fa887b03019701.fb
c:\windows\system32\Cache\c4d28dca2e7648be.fb
c:\windows\system32\Cache\d201ef9910cd39de.fb
c:\windows\system32\Cache\d2e94710a5708128.fb
c:\windows\system32\Cache\d79b9dfe81484ec4.fb
c:\windows\system32\Cache\f998975c9cc711ee.fb
.
.
((((((((((((((((((((((((( Files Created from 2012-06-19 to 2012-07-19 )))))))))))))))))))))))))))))))
.
.
2012-07-17 11:48 . 2012-07-17 11:48 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Apple Computer
2012-07-17 00:07 . 2012-07-17 00:07 -------- d-----w- c:\documents and settings\LocalService\Application Data\Ad-Aware Antivirus
2012-07-16 23:37 . 2012-07-16 23:37 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Local Settings\Application Data\adaware
2012-07-16 23:36 . 2012-07-16 23:37 -------- d-----w- c:\documents and settings\All Users\Application Data\Ad-Aware Browsing Protection
2012-07-16 23:36 . 2011-12-19 17:44 93816 ----a-w- c:\windows\system32\drivers\sbhips.sys
2012-07-16 23:36 . 2011-11-29 11:59 77816 ----a-w- c:\windows\system32\drivers\sbapifs.sys
2012-07-16 23:36 . 2011-11-29 11:59 21240 ----a-w- c:\windows\system32\drivers\sbaphd.sys
2012-07-16 23:36 . 2011-12-19 17:44 217976 ----a-w- c:\windows\system32\drivers\sbtis.sys
2012-07-16 23:36 . 2011-09-29 17:16 94584 ----a-w- c:\windows\system32\drivers\SbFwIm.sys
2012-07-16 23:36 . 2011-12-19 17:44 335224 ----a-w- c:\windows\system32\drivers\SbFw.sys
2012-07-16 23:36 . 2012-07-16 23:36 -------- d-----w- c:\windows\system32\drivers\VDD
2012-07-16 23:36 . 2012-07-16 23:36 -------- d-----w- c:\documents and settings\All Users\Application Data\Lavasoft
2012-07-16 23:36 . 2012-07-17 00:07 -------- d-----w- c:\program files\Ad-Aware Antivirus
2012-07-16 11:17 . 2012-07-18 02:02 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Application Data\Ad-Aware Antivirus
2012-07-16 02:53 . 2012-07-16 02:53 -------- d-----w- c:\program files\CCleaner
2012-07-16 02:37 . 2012-07-16 02:37 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Application Data\IObit
2012-07-16 02:37 . 2012-07-16 02:37 -------- d-----w- c:\program files\IObit
2012-07-15 00:54 . 2012-07-15 00:54 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-07-14 23:04 . 2012-07-14 23:04 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Application Data\SUPERAntiSpyware.com
2012-07-14 23:04 . 2012-07-14 23:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2012-07-14 23:04 . 2012-07-14 23:04 -------- d-----w- c:\documents and settings\All Users\Application Data\SUPERAntiSpyware.com
2012-07-07 02:29 . 2012-07-07 02:29 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Application Data\Macrovision
2012-07-07 01:02 . 2012-07-07 01:02 -------- d--h--w- c:\documents and settings\All Users\Application Data\Common Files
2012-07-07 01:00 . 2012-07-16 11:29 -------- d-----w- c:\documents and settings\All Users\Application Data\AVG2012
2012-07-07 00:59 . 2012-07-07 00:59 -------- d-----w- c:\program files\AVG
2012-07-07 00:50 . 2012-07-16 23:29 -------- d-----w- c:\documents and settings\All Users\Application Data\MFAData
2012-07-06 11:10 . 2012-07-06 11:10 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Application Data\Malwarebytes
2012-07-06 11:10 . 2012-07-14 21:57 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2012-07-06 11:10 . 2012-07-14 18:31 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2012-07-06 11:10 . 2012-07-03 18:46 22344 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-07-05 13:21 . 2012-07-05 13:21 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Apple Computer
2012-07-05 13:19 . 2012-07-05 13:19 1409 ----a-w- c:\windows\QTFont.for
2012-07-05 13:14 . 2012-07-05 13:14 -------- d-sh--w- c:\documents and settings\LocalService\IETldCache
2012-07-01 15:32 . 2012-07-01 15:32 -------- d-----w- c:\documents and settings\fzollman.ZOLLMANLT\Local Settings\Application Data\Deployment
2012-07-01 00:09 . 2012-07-01 00:09 -------- d-sh--w- c:\documents and settings\NetworkService\IETldCache
2012-06-25 21:59 . 2012-06-25 21:59 -------- d-sh--w- c:\documents and settings\fzollman.ZOLLMANLT\IECompatCache
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-07-15 00:54 . 2012-01-26 13:50 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-06-04 22:35 . 2006-02-24 18:08 210968 ----a-w- c:\windows\system32\wuweb.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ISUSPM"="c:\documents and settings\All Users\Application Data\Macrovision\FLEXnet Connect\6\ISUSPM.exe" [2007-03-29 222128]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-07-09 4777856]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ad-Aware Antivirus"="c:\program files\Ad-Aware Antivirus\AdAwareLauncher --windows-run" [X]
"MSI_UDAgent"="c:\windows\system32\udagent.exe" [2002-01-22 28672]
"QuickTime Task"="c:\program files\QuickTime\qttask.exe" [2006-02-24 155648]
"SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2007-01-05 872448]
"atchk"="c:\program files\Intel\AMT\atchk.exe" [2007-05-01 404248]
"AccelerometerSysTrayApplet"="c:\windows\system32\AccelerometerSt.exe" [2006-01-17 53248]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-01-12 39792]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2011-01-10 136600]
"ConnectionCenter"="c:\program files\Citrix\ICA Client\concentr.exe" [2009-09-13 103768]
"IObit Malware Fighter"="c:\program files\IObit\IObit Malware Fighter\IMF.exe" [2012-07-02 4473728]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2008-11-04 435096]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
prjCopyEXE.exe [2003-1-17 20480]
VPN Client.lnk - c:\windows\Installer\{00CD55D6-EE5A-4570-9875-8A306628C032}\Icon3E5562ED7.ico [2008-9-22 6144]
WinZip Quick Pick.lnk - c:\program files\Winzip\WZQKPICK.EXE [2006-2-24 106560]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoSimpleStartMenu"= 1 (0x1)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"NoSimpleStartMenu"= 1 (0x1)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2011-05-04 17:54 551296 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Ad-Aware Service]
@="Ad-Aware Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\IMFservice]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\SBAMSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
"DisableUnicastResponsesToMulticastBroadcast"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Juniper Networks\\Secure Application Manager\\dsSamProxy.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3389:TCP"= 3389:TCP:@xpsp2res.dll,-22009
.
R1 ctxusbm;Citrix USB Monitor Driver;c:\windows\system32\drivers\ctxusbm.sys [09/08/2009 6:13 PM 65584]
R1 NEOFLTR_600_12359;Juniper Networks TDI Filter Driver (NEOFLTR_600_12359);c:\windows\system32\drivers\NEOFLTR_600_12359.sys [11/27/2007 5:08 AM 64160]
R1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\sasdifsv.sys [07/22/2011 11:27 AM 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [07/12/2011 4:55 PM 67664]
R1 sbaphd;sbaphd;c:\windows\system32\drivers\sbaphd.sys [07/16/2012 6:36 PM 21240]
R1 SbFw;SbFw;c:\windows\system32\drivers\SbFw.sys [07/16/2012 6:36 PM 335224]
R1 SBRE;SBRE;c:\windows\system32\drivers\SBREDrv.sys [10/26/2011 2:23 PM 101112]
R1 sbtis;sbtis;c:\windows\system32\drivers\sbtis.sys [07/16/2012 6:36 PM 217976]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCore.exe [08/11/2011 6:38 PM 116608]
R2 ActiGraph HID;ActiGraph HID;c:\program files\ActiGraph\ActiLife5\DetectActiGraphHID.exe [10/25/2010 3:38 PM 9728]
R2 Ad-Aware Service;Ad-Aware Service;c:\program files\Ad-Aware Antivirus\AdAwareService.exe [05/03/2012 6:37 PM 1226096]
R2 IMFservice;IMF Service;c:\program files\IObit\IObit Malware Fighter\IMFsrv.exe [07/15/2012 9:37 PM 821592]
R2 SBAMSvc;Ad-Aware;c:\program files\Ad-Aware Antivirus\SBAMSvc.exe [12/19/2011 1:20 PM 3289032]
R2 sbapifs;sbapifs;c:\windows\system32\drivers\sbapifs.sys [07/16/2012 6:36 PM 77816]
R2 UNS;Intel® Active Management Technology User Notification Service;c:\program files\Intel\AMT\UNS.exe [09/22/2008 10:25 PM 1489688]
R3 FileMonitor;FileMonitor;c:\program files\IObit\IObit Malware Fighter\Drivers\wxp_x86\FileMonitor.sys [07/15/2012 9:37 PM 246816]
R3 IFXTPM;IFXTPM;c:\windows\system32\drivers\ifxtpm.sys [09/22/2008 11:04 PM 41216]
R3 RegFilter;RegFilter;c:\program files\IObit\IObit Malware Fighter\Drivers\wxp_x86\RegFilter.sys [07/15/2012 9:37 PM 30408]
R3 rismc32;RICOH Smart Card Reader;c:\windows\system32\drivers\rismc32.sys [09/22/2008 10:25 PM 47616]
R3 SBFWIMCLMP;GFI Software Firewall NDIS IM Filter Miniport;c:\windows\system32\drivers\SbFwIm.sys [07/16/2012 6:36 PM 94584]
R3 UrlFilter;UrlFilter;c:\program files\IObit\IObit Malware Fighter\Drivers\wxp_x86\UrlFilter.sys [07/15/2012 9:37 PM 16248]
S3 SBFWIMCL;GFI Software Firewall NDIS IM Filter Service;c:\windows\system32\drivers\SbFwIm.sys [07/16/2012 6:36 PM 94584]
S3 sbhips;sbhips;c:\windows\system32\drivers\sbhips.sys [07/16/2012 6:36 PM 93816]
S3 SIUSBXP;SIUSBXP;c:\windows\system32\drivers\SiUSBXp.sys [04/27/2011 9:12 AM 14592]
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12
.
Contents of the 'Scheduled Tasks' folder
.
2012-07-17 c:\windows\Tasks\Ad-Aware Antivirus Scheduled Scan.job
- c:\progra~1\AD-AWA~1\AdAwareLauncher.exe [2012-05-03 23:37]
.
2012-07-18 c:\windows\Tasks\bedtime.job
- c:\documents and settings\fzollman.ZOLLMANLT\Desktop\bedtime.bat [2012-07-18 02:55]
.
2012-07-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2863183032-316065928-3175035413-1006Core.job
- c:\documents and settings\fzollman.ZOLLMANLT\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2012-07-01 15:32]
.
2012-07-19 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2863183032-316065928-3175035413-1006UA.job
- c:\documents and settings\fzollman.ZOLLMANLT\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2012-07-01 15:32]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
TCP: DhcpNameServer = 192.168.1.254
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
DPF: Webridge.ClusterUpload5 - hxxps://www.eirb.northwestern.edu/Common/_eIRB/Mainspan/ClusterUpload/ClusterUpload.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
WebBrowser-{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39} - (no file)
HKLM-Run-PostGUI - (no file)
Notify-NavLogon - (no file)
AddRemove-ACTIGRAPHDRIVERS&167F&5055 - c:\windows\system32\Silabs\DriverUninstaller.exe USBXpress\ACTIGRAPHDRIVERS&167F&5055
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-07-19 18:22
Windows 5.1.2600 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: TOSHIBA_MK1652GSX rev.LV011C -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3
.
device: opened successfully
user: MBR read successfully
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x8A4912E2
user & kernel MBR OK
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\DeterministicNetworks\DNE\Parameters]
"SymbolicLinkValue"=hex(6):5c,00,52,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,79,00,73,00,\
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(1940)
c:\program files\SUPERAntiSpyware\SASWINLO.DLL
c:\windows\system32\Ati2evxx.dll
.
Completion time: 2012-07-19 18:27:08
ComboFix-quarantined-files.txt 2012-07-19 23:26
.
Pre-Run: 115,203,739,648 bytes free
Post-Run: 115,742,588,928 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect
.
- - End Of File - - D4EFC3944C49A8651BAC861A05ED5EAC

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:19 AM

Posted 23 July 2012 - 12:11 AM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


DeFogger:

  • Please download DeFogger to your desktop.

    Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger may ask you to reboot the machine, if it does - click OK
Do not re-enable these drivers until otherwise instructed.


Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


Download DDS:

  • Please download DDS by sUBs from one of the links below and save it to your desktop:

    Posted Image
    Download DDS and save it to your desktop

    Link1
    Link2
    Link3

    Please disable any anti-malware program that will block scripts from running before running DDS.

    • Double-Click on dds.scr and a command window will appear. This is normal.
    • Shortly after two logs will appear:
    • DDS.txt
    • Attach.txt
  • A window will open instructing you save & post the logs
  • Save the logs to a convenient place such as your desktop
  • Copy the contents of both logs & post in your next reply

information and logs:

  • In your next post I need the following

  • .logs from DDS
  • let me know of any problems you may have had

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:19 AM

Posted 26 July 2012 - 12:08 AM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:07:19 AM

Posted 29 July 2012 - 01:32 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users