Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

With Win64/Patched.A


  • This topic is locked This topic is locked
14 replies to this topic

#1 jandal25

jandal25

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 13 November 2012 - 08:00 PM

I am trying to help a friend clean his PC and I downloaded AVG2013 which is telling me that it is infected with Win64/Patched.A and the object name is c:\Windows\System32\services.exe. I also downloaded and ran Malwarebytes and Hijackthis but it appears I cannot get rid of this virus.

GMER states it hasnt found any modifications.

Any help would be appreciated.

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 13 November 2012 - 08:20 PM

Please do the following:

Download the appropriate version for your system of the Farbar Recovery Scan Tool and save it to a flash drive. (Choose the correct version depending on which architecture operating system you are using, 32bit (x86) or 64 (x64) bit)

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt
[*]In the command window type in notepad and press Enter.
[*]The notepad opens. Under File menu select Open.
[*]Select "Computer" and find your flash drive letter and close the notepad.
[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
Note: Replace letter e with the drive letter of your flash drive.
[*]The tool will start to run.
[*]When the tool opens click Yes to the disclaimer.
[*]Place a check next to List Drivers MD5 as well as the default check marks that are already there
[*]Press Scan button.
[*]FRST will let you know when the scan is complete and has written the FRST.txt to file, close out this message, then type the following into the search box:
services.exe
[*]now press the search button
[*]when the search is complete, search.txt will also be written to your USB
[*]type exit and reboot the computer normally
[*]please copy and paste both logs in your reply.(FRST.txt and Search.txt)[/list]

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 13 November 2012 - 08:52 PM

Per your request.

Attached Files



#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 13 November 2012 - 08:58 PM

Please do the following:


Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

start
C:\Windows\assembly\GAC_32\Desktop.ini
C:\Windows\assembly\GAC_64\Desktop.ini
replace: C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6002.18005_none_2d69d4f782c83d8c\services.exe C:\Windows\System32\services.exe
end

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options then select Command Prompt

Run FRST (or FRST64 if you have the 64bit version) and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

Reboot Normally.


NEXT


Refer to the ComboFix User's Guide

  • Download ComboFix from the following location:

    Link

    * IMPORTANT !!! Place ComboFix.exe on your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with ComboFix.
    You can get help on disabling your protection programs here
  • Double click on ComboFix.exe & follow the prompts.
  • Your desktop may go blank. This is normal. It will return when ComboFix is done. ComboFix may reboot your machine. This is normal.
  • When finished, it shall produce a log for you. Post that log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


    ---------------------------------------------------------------------------------------------
  • Ensure your AntiVirus and AntiSpyware applications are re-enabled.

    ---------------------------------------------------------------------------------------------

NOTE: If you encounter a message "illegal operation attempted on registry key that has been marked for deletion" and no programs will run - please just reboot and that will resolve that error.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 13 November 2012 - 09:40 PM

Here is the report after combofix ran but I dont see much in the report. Is this expected?

Also, it was located in C:\ComboFix not in the root of C:.

Attached Files



#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 14 November 2012 - 06:32 PM

ComboFix does not appear to have ran properly, the log should be a lot longer than that, please try running it again, make certain your security programs are disabled and give it plenty of time to complete

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 14 November 2012 - 08:42 PM

Here is the updated log file. I had to uninstall AVG (after fixing the installer service as it was removed from the PC) as ComboFix would always pick it up as running even though it was disabled. ComboFix would not start the log write process after the PC was rebooted.

I will reinstall AVG once complete.

Attached Files



#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 14 November 2012 - 09:27 PM

Please run the following:

Download AdwCleaner from here and save it to your desktop.
  • Run AdwCleaner and select Delete
  • Once done it will ask to reboot, allow the reboot
  • On reboot a log will be produced, please attach the content of the log to your next reply


NEXT


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 15 November 2012 - 08:11 AM

Here are the reports.

Attached Files



#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 15 November 2012 - 05:46 PM

Please do the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Press the WinKey + R to open a run box, type Notepad > click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

File::
C:\Users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\background.html	
C:\Users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\ContentScript.js	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\3c9b9f40-2f7f8c31	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\6a1e270d-7db290de	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\5132e0ce-55d80d07	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17\66049fd1-7165cbbb	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\2d5dd994-6dbd254f	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\774c3196-712d0a2b	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\fe88857-3fedcf55	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\aa21c59-60756053	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\3f3e15de-18b909aa	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\66e5f9a1-74b3a303	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\20cdf6a3-2bffcca3	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\10405966-6fb7bf86	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\47736b26-1ce68ad5	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\62d7cca7-478d53c9	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\209129-49906270	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\5b6fddac-4e21e150	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\307113ae-6cc80257	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6626fc70-3e001fcf	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\516b4733-2de80904	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\266ac7f4-7b9a1132	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\424d6b36-57f584fb	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\557a5cb6-4c3fa331	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6\16bb8c6-3437c9ee	
C:\Users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\55d09f87-3343b7fb	
C:\Users\Adoni\Documents\Downloads\iLividSetupV1 (1).exe	
C:\Users\Adoni\Documents\Downloads\iLividSetupV1.exe	
C:\Users\Adoni\Documents\Escalofrios\iLividSetupV1.exe	
C:\Users\Adoni\Documents\Escalofrios\playpickle-setup.exe	
C:\Users\Adoni\Pictures\2011-10-09 Our trip to Oregon 2011\iLividSetup.exe	
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TA2DTTL7\submit-a-video[1].htm	
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TA2DTTL7\submit-a-video[1].htm	

ClearJavaCache::

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.


NEXT


Visit ADOBE and download the latest version of Acrobat Reader (version XI)
Having the latest updates ensures there are no security vulnerabilities in your system.


NEXT


Posted Image
Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.
Please follow these steps to remove older version of Java components and upgrade the application.

Upgrading Java:
  • Go to this site and click on "Do I have Java"
  • It will check your current version and then offer to update to the latest version
  • Watch for and make sure you untick the box next to whatever free program they prompt you to install during the installation, unless you want it.

Note: Check in Programs and Features (or Add/Remove Programs if you are an XP user) to make certain there are no old versions of Java still installed, if there are - remove them.


NEXT


Please advise how the computer is running now and if there are any outstanding issues

Edited by CatByte, 15 November 2012 - 05:46 PM.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 15 November 2012 - 07:56 PM

Here is the log. Everything appears to be running as expected. Thanks for all of the help.

ComboFix 12-11-15.01 - Adoni 11/15/2012  19:33:47.5.4 - x64
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.4060.2330 [GMT -5:00]
Running from: c:\users\Adoni\Desktop\ComboFix.exe
Command switches used :: c:\users\Adoni\Desktop\CFScript.txt
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\background.html"
"c:\users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\ContentScript.js"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\3c9b9f40-2f7f8c31"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\6a1e270d-7db290de"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\5132e0ce-55d80d07"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17\66049fd1-7165cbbb"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\2d5dd994-6dbd254f"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\774c3196-712d0a2b"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\fe88857-3fedcf55"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\aa21c59-60756053"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\3f3e15de-18b909aa"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\66e5f9a1-74b3a303"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\20cdf6a3-2bffcca3"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\10405966-6fb7bf86"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\47736b26-1ce68ad5"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\62d7cca7-478d53c9"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\209129-49906270"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\5b6fddac-4e21e150"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\307113ae-6cc80257"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\6626fc70-3e001fcf"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\516b4733-2de80904"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\266ac7f4-7b9a1132"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\424d6b36-57f584fb"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\557a5cb6-4c3fa331"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6\16bb8c6-3437c9ee"
"c:\users\Adoni\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\55d09f87-3343b7fb"
"c:\users\Adoni\Documents\Downloads\iLividSetupV1 (1).exe"
"c:\users\Adoni\Documents\Downloads\iLividSetupV1.exe"
"c:\users\Adoni\Documents\Escalofrios\iLividSetupV1.exe"
"c:\users\Adoni\Documents\Escalofrios\playpickle-setup.exe"
"c:\users\Adoni\Pictures\2011-10-09 Our trip to Oregon 2011\iLividSetup.exe"
"c:\windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TA2DTTL7\submit-a-video[1].htm"
"c:\windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TA2DTTL7\submit-a-video[1].htm"
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\background.html
c:\users\Adoni\AppData\Local\Google\Chrome\User Data\Default\Default\aagfgfdidcdfdigddgdjgfdfdedegddh\ContentScript.js
c:\users\Adoni\Documents\Downloads\iLividSetupV1 (1).exe
c:\users\Adoni\Documents\Downloads\iLividSetupV1.exe
c:\users\Adoni\Documents\Escalofrios\iLividSetupV1.exe
c:\users\Adoni\Documents\Escalofrios\playpickle-setup.exe
c:\users\Adoni\Pictures\2011-10-09 Our trip to Oregon 2011\iLividSetup.exe
c:\windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TA2DTTL7\submit-a-video[1].htm
.
.
(((((((((((((((((((((((((   Files Created from 2012-10-16 to 2012-11-16  )))))))))))))))))))))))))))))))
.
.
2012-11-16 00:43 . 2012-11-16 00:43	--------	d-----w-	c:\windows\system32\config\systemprofile\AppData\Local\temp
2012-11-16 00:43 . 2012-11-16 00:43	--------	d-----w-	c:\users\Default\AppData\Local\temp
2012-11-16 00:43 . 2012-11-16 00:43	--------	d-----w-	c:\users\Adoni\AppData\Local\temp
2012-11-15 02:41 . 2012-11-15 02:41	--------	d-----w-	c:\program files (x86)\ESET
2012-11-13 01:55 . 2012-11-13 01:55	--------	d-----w-	C:\FRST
2012-11-12 23:46 . 2012-11-12 23:46	388096	----a-r-	c:\users\Adoni\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2012-11-12 23:46 . 2012-11-12 23:46	--------	d-----w-	c:\program files (x86)\Trend Micro
2012-11-12 22:46 . 2012-10-12 07:19	9291768	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{3111BBF0-BF38-432E-984D-2D03D71C695D}\mpengine.dll
2012-11-12 22:39 . 2012-09-13 13:45	2048	----a-w-	c:\windows\system32\tzres.dll
2012-11-12 22:39 . 2012-09-13 13:28	2048	----a-w-	c:\windows\SysWow64\tzres.dll
2012-11-12 22:39 . 2012-08-24 16:07	218624	----a-w-	c:\windows\system32\wintrust.dll
2012-11-12 22:39 . 2012-08-24 15:53	172544	----a-w-	c:\windows\SysWow64\wintrust.dll
2012-11-12 22:39 . 2012-06-02 00:20	1268736	----a-w-	c:\windows\system32\crypt32.dll
2012-11-12 22:39 . 2012-06-02 00:02	985088	----a-w-	c:\windows\SysWow64\crypt32.dll
2012-11-12 22:39 . 2012-06-02 00:20	174592	----a-w-	c:\windows\system32\cryptsvc.dll
2012-11-12 22:39 . 2012-06-02 00:20	132096	----a-w-	c:\windows\system32\cryptnet.dll
2012-11-12 22:39 . 2012-06-02 00:02	98304	----a-w-	c:\windows\SysWow64\cryptnet.dll
2012-11-12 22:39 . 2012-06-02 00:02	133120	----a-w-	c:\windows\SysWow64\cryptsvc.dll
2012-11-12 22:39 . 2012-08-29 11:40	4699520	----a-w-	c:\windows\system32\ntoskrnl.exe
2012-11-12 19:33 . 2012-11-12 19:33	--------	d-----w-	c:\users\Adoni\AppData\Roaming\AVG2013
2012-11-12 19:33 . 2012-11-12 19:33	--------	d-----w-	c:\users\Adoni\AppData\Roaming\TuneUp Software
2012-11-12 19:31 . 2012-11-15 00:59	--------	d-----w-	c:\programdata\AVG2013
2012-11-12 19:28 . 2012-11-12 19:38	--------	d-----w-	c:\windows\system32\config\systemprofile\AppData\Local\Avg2013
2012-11-12 19:26 . 2012-11-12 19:26	--------	d--h--w-	c:\programdata\Common Files
2012-11-12 19:26 . 2012-11-12 20:04	--------	d-----w-	c:\users\Adoni\AppData\Local\Avg2013
2012-11-12 19:26 . 2012-11-12 19:26	--------	d-----w-	c:\users\Adoni\AppData\Local\MFAData
2012-11-12 19:24 . 2012-11-12 19:24	--------	d-----w-	c:\users\Adoni\AppData\Roaming\Malwarebytes
2012-11-12 19:24 . 2012-11-12 19:24	--------	d-----w-	c:\programdata\Malwarebytes
2012-11-12 19:24 . 2012-11-12 19:24	--------	d-----w-	c:\program files (x86)\Malwarebytes' Anti-Malware
2012-11-12 19:24 . 2012-09-30 00:54	25928	----a-w-	c:\windows\system32\drivers\mbam.sys
2012-11-06 00:21 . 2012-11-12 19:18	--------	d-----w-	c:\programdata\9A902756A000004200009A8F8CCC0534
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-11-14 02:28 . 2008-01-21 02:49	22368	----a-w-	c:\windows\system32\drivers\WS2IFSL.SYS
2012-11-13 08:02 . 2006-11-02 12:35	65309168	----a-w-	c:\windows\system32\mrt.exe
2012-11-12 21:46 . 2012-04-25 21:56	697272	----a-w-	c:\windows\SysWow64\FlashPlayerApp.exe
2012-11-12 21:46 . 2011-06-20 18:28	73656	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-09-25 20:13 . 2009-08-18 17:49	564632	----a-w-	c:\programdata\Microsoft\IdentityCRL\production\wlidui.dll
2012-09-25 20:13 . 2009-08-18 16:24	19720	----a-w-	c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
2012-08-24 11:15 . 2012-09-23 11:15	17810944	----a-w-	c:\windows\system32\mshtml.dll
2012-08-24 10:39 . 2012-09-23 11:15	10925568	----a-w-	c:\windows\system32\ieframe.dll
2012-08-24 10:31 . 2012-09-23 11:15	2312704	----a-w-	c:\windows\system32\jscript9.dll
2012-08-24 10:22 . 2012-09-23 11:15	1346048	----a-w-	c:\windows\system32\urlmon.dll
2012-08-24 10:21 . 2012-09-23 11:15	1392128	----a-w-	c:\windows\system32\wininet.dll
2012-08-24 10:20 . 2012-09-23 11:15	1494528	----a-w-	c:\windows\system32\inetcpl.cpl
2012-08-24 10:18 . 2012-09-23 11:15	237056	----a-w-	c:\windows\system32\url.dll
2012-08-24 10:17 . 2012-09-23 11:15	85504	----a-w-	c:\windows\system32\jsproxy.dll
2012-08-24 10:14 . 2012-09-23 11:15	173056	----a-w-	c:\windows\system32\ieUnatt.exe
2012-08-24 10:14 . 2012-09-23 11:15	816640	----a-w-	c:\windows\system32\jscript.dll
2012-08-24 10:13 . 2012-09-23 11:15	599040	----a-w-	c:\windows\system32\vbscript.dll
2012-08-24 10:12 . 2012-09-23 11:15	2144768	----a-w-	c:\windows\system32\iertutil.dll
2012-08-24 10:11 . 2012-09-23 11:15	729088	----a-w-	c:\windows\system32\msfeeds.dll
2012-08-24 10:10 . 2012-09-23 11:15	96768	----a-w-	c:\windows\system32\mshtmled.dll
2012-08-24 10:09 . 2012-09-23 11:15	2382848	----a-w-	c:\windows\system32\mshtml.tlb
2012-08-24 10:04 . 2012-09-23 11:15	248320	----a-w-	c:\windows\system32\ieui.dll
2012-08-24 06:59 . 2012-09-23 11:15	1800704	----a-w-	c:\windows\SysWow64\jscript9.dll
2012-08-24 06:51 . 2012-09-23 11:15	1129472	----a-w-	c:\windows\SysWow64\wininet.dll
2012-08-24 06:51 . 2012-09-23 11:15	1427968	----a-w-	c:\windows\SysWow64\inetcpl.cpl
2012-08-24 06:47 . 2012-09-23 11:15	142848	----a-w-	c:\windows\SysWow64\ieUnatt.exe
2012-08-24 06:47 . 2012-09-23 11:15	420864	----a-w-	c:\windows\SysWow64\vbscript.dll
2012-08-24 06:43 . 2012-09-23 11:15	2382848	----a-w-	c:\windows\SysWow64\mshtml.tlb
2012-08-21 17:01 . 2012-09-14 22:02	33240	----a-w-	c:\windows\system32\drivers\GEARAspiWDM.sys
2012-08-21 17:01 . 2010-12-24 00:20	125872	----a-w-	c:\windows\system32\GEARAspi64.dll
2012-08-21 17:01 . 2010-12-24 00:20	106928	----a-w-	c:\windows\SysWow64\GEARAspi.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{81017EA9-9AA8-4A6A-9734-7AF40E7D593F}"= "c:\program files (x86)\Yahoo!\Companion\Installs\cpn4\yt.dll" [2012-06-11 1524056]
.
[HKEY_CLASSES_ROOT\clsid\{81017ea9-9aa8-4a6a-9734-7af40e7d593f}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin.1]
[HKEY_CLASSES_ROOT\TypeLib\{003028C2-EA1C-4676-A316-B5CB50917002}]
[HKEY_CLASSES_ROOT\yt.YTNavAssistPlugin]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-08-28 59280]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-09-10 421776]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost  - NetSvcs
Themes
.
Contents of the 'Scheduled Tasks' folder
.
2012-11-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-25 21:46]
.
2012-11-15 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-2891293808-2267581651-3289679063-1000Core.job
- c:\users\Adoni\AppData\Local\Facebook\Update\FacebookUpdate.exe [2012-07-01 00:58]
.
2012-11-16 c:\windows\Tasks\FacebookUpdateTaskUserS-1-5-21-2891293808-2267581651-3289679063-1000UA.job
- c:\users\Adoni\AppData\Local\Facebook\Update\FacebookUpdate.exe [2012-07-01 00:58]
.
2012-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-04 22:18]
.
2012-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-04 22:18]
.
2012-11-16 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2891293808-2267581651-3289679063-1000Core.job
- c:\users\Adoni\AppData\Local\Google\Update\GoogleUpdate.exe [2011-11-19 01:52]
.
2012-11-16 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2891293808-2267581651-3289679063-1000UA.job
- c:\users\Adoni\AppData\Local\Google\Update\GoogleUpdate.exe [2011-11-19 01:52]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-08-26 161304]
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/?ilc=1
uLocal Page = c:\windows\system32\blank.htm
mStart Page = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&s=1&o=vp64&d=1006&m=sx2800
mDefault_Page_URL = hxxp://homepage.gateway.com/rdr.aspx?b=ACGW&l=0409&s=1&o=vp64&d=1006&m=sx2800
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
mLocal Page = c:\windows\SysWOW64\blank.htm
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~1\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1 71.243.0.12
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-Adobe Shockwave Player - c:\windows\system32\Adobe\Shockwave 11\uninstaller.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_110_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_110_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_110_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_110.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_110.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_110.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_110.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}]
@Denied: (A 2) (Everyone)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
@="Shockwave Flash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
@Denied: (A 2) (Everyone)
@=""
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
@="FlashBroker"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes]
"SymbolicLinkValue"=hex(6):5c,00,52,00,45,00,47,00,49,00,53,00,54,00,52,00,59,
   00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2012-11-15  19:45:33
ComboFix-quarantined-files.txt  2012-11-16 00:45
.
Pre-Run: 482,339,491,840 bytes free
Post-Run: 482,334,359,552 bytes free
.
- - End Of File - - BBF206E9DF0BFF910F4FDCDD034AC8AC


#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 15 November 2012 - 08:19 PM

We just have some housekeeping to do now,

Please do the following:


You can delete the DDS and Farbar logs and programs from your desktop.


NEXT


Follow these steps to uninstall Combofix

  • Make sure your security programs are totally disabled.
  • Press the WinKey +R to open a run box
  • Now copy/paste Combofix /uninstall into the runbox and click OK. Note the space between the ..X and the /U, it needs to be there.

Posted Image


NEXT

  • Double click on adwcleaner.exe to run the tool.
  • Click on Uninstall.
  • Confirm with yes.


If there are any logs/tools remaining on your desktop > right click and delete them.


NEXT


Below I have included a number of recommendations for how to protect your computer against malware infections.

  • It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
    Strong passwords: How to create and use them
    Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

  • Keep Windows updated by regularly checking their website at :
    http://windowsupdate.microsoft.com/
    This will ensure your computer has always the latest security updates available installed on your computer.

  • Make Internet Explorer more secure
    • Click Start > Run
    • Type Inetcpl.cpl & click OK
    • Click on the Security tab
    • Click Reset all zones to default level
    • Make sure the Internet Zone is selected & Click Custom level
    • In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
    • Next Click OK, then Apply button and then OK to exit the Internet Properties page.

  • Download TFC to your desktop
    • Close any open windows.
    • Double click the TFC icon to run the program
    • TFC will close all open programs itself in order to run,
    • Click the Start button to begin the process.
    • Allow TFC to run uninterrupted.
    • The program should not take long to finish it's job
    • Once its finished it should automatically reboot your machine,
    • if it doesn't, manually reboot to ensure a complete clean
    It's normal after running TFC cleaner that the PC will be slower to boot the first time.

  • WOT, Web of Trust, warns you about risky websites that try to scam visitors, deliver malware or send spam. Protect your computer against online threats by using WOT as your front-line layer of protection when browsing or searching in unfamiliar territory. WOT's color-coded icons show you ratings for 21 million websites, helping you avoid the dangerous sites:
    • Green to go
    • Yellow for caution
    • Red to stop
    WOT has an addon available for both Firefox and IE

  • Keep a backup of your important files - Now, more than ever, it's especially important to protect your digital files and memories. This article is full of good information on alternatives for home backup solutions.

  • ERUNT (Emergency Recovery Utility NT) allows you to keep a complete backup of your registry and restore it when needed. The standard registry backup options that come with Windows back up most of the registry but not all of it. ERUNT however creates a complete backup set, including the Security hive and user related sections. ERUNT is easy to use and since it creates a full backup, there are no options or choices other than to select the location of the backup files. The backup set includes a small executable that will launch the registry restore if needed.

  • In light of your recent issue, I'm sure you'd like to avoid any future infections. Please take a look at these well written articles:
    PC Safety and Security--What Do I Need?.
  • Simple and easy ways to keep your computer safe and secure on the Internet

Thank you for your patience, and performing all of the procedures requested.

Please respond one last time so we can consider the thread resolved and close it, thank-you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 jandal25

jandal25
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:12:59 AM

Posted 15 November 2012 - 08:55 PM

I am all set, thanks again.

#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 15 November 2012 - 09:04 PM

you are welcome

stay safe :hello:

~CB

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:01:59 AM

Posted 15 November 2012 - 09:04 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users