Lets see what we can find.
Please download MiniToolBox
, save it to your desktop and run it.
Checkmark the following checkboxes:
- Flush DNS
- Report IE Proxy Settings
- Reset IE Proxy Settings
- Report FF Proxy Settings
- Reset FF Proxy Settings
- List content of Hosts
- List IP configuration
- List Winsock Entries
- List last 10 Event Viewer log
- List Installed Programs
- List Users, Partitions and Memory size.
and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run. Note:
When using "Reset FF Proxy Settings" option Firefox should be closed.Run RKill....Download and Run RKill
Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.
- Please download RKill by Grinler from one of the 4 links below and save it to your desktop.
- Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
- Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
- A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
- If nothing happens or if the tool does not run, please let me know in your next reply
If you continue having problems running rkill.com, you can download iExplore.exe
which are renamed copies of rkill.com, and try them instead.
Please download TDSSKiller.zip
and and extract it.
- Run TDSSKiller.exe.
- Click on Change Parameters
- Put a check in the box of Detect TDLFS file system
- Click Start scan.
- When it is finished the utility outputs a list of detected objects with description.
The utility automatically selects an action (Cure or Delete) for malicious objects.
The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
- Let reboot if needed and tell me if the tool needed a reboot.
- Click on Report and post the contents of the text file that will open.
Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log has a name like: TDSSKiller.Version_Date_Time_log.txt.
>>>>I'd like us to scan your machine with ESET OnlineScan
NOTE: In some instances if no malware is found there will be no log produced.
- Hold down Control and click on the following link to open ESET OnlineScan in a new window.
- Click the button.
- For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
- Click on to download the ESET Smart Installer. Save it to your desktop.
- Double click on the icon on your desktop.
- Click the button.
- Accept any security warnings from your browser.
- Under scan settings, check and check Remove found threats
- Click Advanced settings and select the following:
- Scan potentially unwanted applications
- Scan for potentially unsafe applications
- Enable Anti-Stealth technology
- ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
- When the scan completes, push
- Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
- Push the button.