Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

FBI Moneypak


  • This topic is locked This topic is locked
12 replies to this topic

#1 Delta504

Delta504

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 29 January 2013 - 07:32 PM

Hi, I am a new member and this is my first post. I have been using bleepingcomputer.com for some time now, just never as a member.

I got the moneypak virus with the video/recording box yesterday when I booted up around lunch. I have already researched the method a user named bloopie has used with the frst64.exe file.(I believe that is correct) I am to the point of running the scans on startup repair. I just need to copy and paste the results for anyone willing to help. Also, I am not sure if I need to go back into notepad via command prompt to view the scan logs or ??

Thanks for any help :))

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 30 January 2013 - 03:23 AM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt
[*]In the command window type in notepad and press Enter.
[*]The notepad opens. Under File menu select Open.
[*]Select "Computer" and find your flash drive letter and close the notepad.
[*]In the command window type e:\frst64.exe and press Enter
Note: Replace letter e with the drive letter of your flash drive.
[*]The tool will start to run.
[*]When the tool opens click Yes to disclaimer.

[*]First Press the Scan button.
[*]It will make a log (FRST.txt)

[*]Second Type the following in the edit box after "Search:". services.exe
[*]Click the Search button
[*]It will make a log (Search.txt)
[/list]I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Delta504

Delta504
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 30 January 2013 - 07:29 PM

I am posting them both on the same reply. Thanks so much for your help!




Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 28-01-2013 02
Ran by SYSTEM at 30-01-2013 16:34:56
Running from H:\
Windows 7 Home Premium (X64) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [VizorHtmlDialog.exe] "C:\Program Files\Trend Micro\Titanium\UIFramework\VizorHtmlDialog.exe" "DEF" "EULA" "C:\Program Files\Trend Micro\Titanium\www\Installer.cmpt\resources\preinstall_01_welcome_trial.html" "DEF" "DEF" "DEF" [x]
HKLM\...\Run: [Trend Micro Client Framework] "C:\Program Files\Trend Micro\UniClient\UiFrmWrk\UIWatchDog.exe" [213824 2011-10-03] (Trend Micro Inc.)
HKLM\...\Run: [Trend Micro Titanium] "C:\Program Files\Trend Micro\Titanium\VizorShortCut.exe" -ReFlush "none" "none" [416992 2011-08-02] (Trend Micro Inc.)
HKLM\...\Run: [ETDCtrl] %ProgramFiles%\Elantech\ETDCtrl.exe [2661672 2012-02-19] (ELAN Microelectronics Corp.)
HKLM\...\Run: [M-Audio Taskbar Icon] C:\Windows\system32\M-AudioTaskBarIcon.exe [798216 2009-10-02] (Avid Technology, Inc.)
HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [ASUSPRP] "C:\Program Files (x86)\ASUS\APRP\APRP.EXE" [3331312 2012-03-06] (ASUSTek Computer Inc.)
HKLM-x32\...\Run: [ASUSWebStorage] C:\Program Files (x86)\ASUS\ASUS WebStorage\3.0.108.222\AsusWSPanel.exe /S [737104 2011-07-29] (ecareme)
HKLM-x32\...\Run: [USB3MON] "C:\Program Files (x86)\Intel\Intel® USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe" [291608 2012-02-06] (Intel Corporation)
HKLM-x32\...\Run: [ATKOSD2] C:\Program Files (x86)\ASUS\ATK Package\ATKOSD2\ATKOSD2.exe [318080 2011-12-22] (ASUSTek Computer Inc.)
HKLM-x32\...\Run: [ATKMEDIA] C:\Program Files (x86)\ASUS\ATK Package\ATK Media\DMedia.exe [174720 2011-10-24] (ASUS)
HKLM-x32\...\Run: [HControlUser] C:\Program Files (x86)\ASUS\ATK Package\ATK Hotkey\HControlUser.exe [105016 2009-06-19] (ASUS)
HKLM-x32\...\Run: [Wireless Console 3] C:\Program Files (x86)\ASUS\Wireless Console 3\wcourier.exe [2321072 2012-02-02] (ASUSTeK Computer Inc.)
HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59280 2012-08-27] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [421776 2012-09-09] (Apple Inc.)
HKLM-x32\...\Run: [DigidesignMMERefresh] C:\Program Files (x86)\Digidesign\Drivers\MMERefresh.exe [77824 2010-06-23] (Avid Technology, Inc..)
HKU\Dakota\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2012-09-01] (Google Inc.)
HKU\Dakota\...\Run: [Skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun [17418928 2012-07-13] (Skype Technologies S.A.)
HKLM\...\RunOnce: [*Restore] C:\Windows\system32\rstrui.exe /RUNONCE [296960 2010-11-20] (Microsoft Corporation)
HKLM\...\Winlogon: [Shell] C:\PROGRA~3\dsgsdgdsgdsgw.bat [x ] ()
Tcpip\Parameters: [DhcpNameServer] 192.168.42.1
Startup: C:\Users\All Users\Start Menu\Programs\Startup\AsusVibeLauncher.lnk
ShortcutTarget: AsusVibeLauncher.lnk -> C:\Program Files (x86)\ASUS\AsusVibe\AsusVibeLauncher.exe (ASUSTeK Computer Inc.)
Startup: C:\Users\Dakota\Start Menu\Programs\Startup\PdaNet Desktop.lnk
ShortcutTarget: PdaNet Desktop.lnk -> C:\Program Files (x86)\PdaNet for Android\PdaNetPC.exe ()
Startup: C:\Users\Dakota\Start Menu\Programs\Startup\runctf.lnk
ShortcutTarget: runctf.lnk -> C:\Windows\System32\rundll32.exe (Microsoft Corporation)

==================== Services (Whitelisted) ===================

2 ASUS InstantOn; C:\Program Files (x86)\ASUS\InstantOn for NB\InsOnSrv.exe [277120 2012-02-03] (ASUS)
2 ATKGFNEXSrv; C:\Program Files (x86)\ASUS\ATK Package\ATKGFNEX\GFNEXSrv.exe [96896 2011-11-21] (ASUS)
2 Intel® ME Service; C:\Program Files (x86)\Intel\Intel® Management Engine Components\FWService\IntelMeFWService.exe [128280 2011-12-16] ()
2 jhi_service; C:\Program Files (x86)\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [161560 2011-12-16] (Intel Corporation)
2 MobilePreIIAudioDevMon; "C:\Program Files (x86)\M-Audio\MobilePre\AudioDevMon.exe" [1923592 2010-06-21] (M-Audio)
3 TiMiniService; C:\Program Files\Trend Micro\Titanium\TiMiniService.exe [247072 2011-08-02] (Trend Micro Inc.)
3 Amsp; "C:\Program Files\Trend Micro\AMSP\coreServiceShell.exe" coreFrameworkHost.exe -m=rb -dt=60000 -ad [x]

==================== Drivers (Whitelisted) =====================

3 AiCharger; C:\Windows\System32\Drivers\AiCharger.sys [17152 2012-01-30] (ASUSTek Computer Inc.)
3 AiCharger; C:\Windows\SysWow64\Drivers\AiCharger.sys [17152 2012-01-30] (ASUSTek Computer Inc.)
3 AsusVBus; C:\Windows\System32\Drivers\AsusVBus.sys [35968 2011-12-21] (Windows ® Win 7 DDK provider)
3 AsusVTouch; C:\Windows\System32\Drivers\AsusVTouch.sys [16512 2011-11-07] (Windows ® Win 7 DDK provider)
1 ATKWMIACPIIO; \??\C:\Program Files (x86)\ASUS\ATK Package\ATK WMIACPI\atkwmiacpi64.sys [17536 2011-09-07] (ASUS)
3 kbfiltr; C:\Windows\System32\Drivers\kbfiltr.sys [15416 2009-07-20] ( )
3 MAUSBMOBILEPREII; C:\Windows\System32\DRIVERS\MAudioMobilePreII.sys [484360 2010-06-21] (M-Audio)
3 RSBASTOR; C:\Windows\System32\DRIVERS\RtsBaStor.sys [292968 2012-02-01] (Realtek Semiconductor Corp.)
1 tmactmon; C:\Windows\System32\Drivers\tmactmon.sys [91920 2011-08-10] (Trend Micro Inc.)
1 tmcomm; C:\Windows\System32\Drivers\tmcomm.sys [167696 2011-08-10] (Trend Micro Inc.)
1 tmevtmgr; C:\Windows\System32\Drivers\tmevtmgr.sys [70928 2011-08-10] (Trend Micro Inc.)
1 tmtdi; C:\Windows\System32\Drivers\tmtdi.sys [105744 2011-09-29] (Trend Micro Inc.)

==================== NetSvcs (Whitelisted) ====================


==================== One Month Created Files and Folders ========

2013-01-29 17:54 - 2013-01-29 17:54 - 00000000 ____D C:\FRST
2013-01-28 07:03 - 2013-01-28 17:20 - 00001233 ____A C:\Windows\setupact.log
2013-01-28 07:03 - 2013-01-28 07:03 - 00000000 ____A C:\Windows\setuperr.log
2013-01-28 06:32 - 2013-01-28 06:32 - 469897387 ____A C:\Windows\MEMORY.DMP
2013-01-28 06:32 - 2013-01-28 06:32 - 00279728 ____A C:\Windows\Minidump\012813-26941-01.dmp
2013-01-27 17:01 - 2013-01-27 18:58 - 00000000 ____D C:\Users\Dakota\Desktop\Songwriting
2013-01-27 17:00 - 2013-01-27 18:59 - 00000000 ____D C:\Users\Dakota\Desktop\Empty Session
2013-01-27 15:28 - 2013-01-27 15:28 - 00000000 ____D C:\Users\Dakota\Desktop\bleep bleep up
2013-01-27 14:41 - 2013-01-27 15:00 - 00000000 ____D C:\Users\Dakota\Desktop\Runnin' On My Own
2013-01-27 11:23 - 2013-01-29 15:39 - 95023320 ___AT C:\Users\All Users\dsgsdgdsgdsgw.pad
2013-01-27 11:23 - 2013-01-27 11:23 - 00186880 ____A (Microsoft Corporation) C:\Users\Dakota\wgsdgsdgdsgsd.exe
2013-01-27 11:23 - 2013-01-27 11:23 - 00002913 ____A C:\Users\All Users\dsgsdgdsgdsgw.js
2013-01-27 11:23 - 2013-01-27 11:23 - 00000159 ____A C:\Users\All Users\dsgsdgdsgdsgw.reg
2013-01-27 11:23 - 2013-01-27 11:23 - 00000067 ____A C:\Users\All Users\dsgsdgdsgdsgw.bat
2013-01-12 13:47 - 2013-01-12 13:57 - 00000000 ____D C:\Users\Dakota\Desktop\Yellow Submarine
2013-01-12 13:06 - 2013-01-12 13:09 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\mp3converter
2013-01-12 13:06 - 2013-01-12 13:06 - 00001083 ____A C:\Users\Public\Desktop\Mp3 Converter.lnk
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Users\All Users\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\mp3converter
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\Mozilla FireFox
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\InfoAtoms
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\GamesCenter
2013-01-12 13:00 - 2013-01-12 13:05 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\bytewdownload
2013-01-10 16:09 - 2013-01-27 12:21 - 00000000 ____D C:\Users\Dakota\Desktop\Bowl for Two
2013-01-05 18:20 - 2013-01-07 11:40 - 00000000 ____D C:\Users\Dakota\Desktop\How do you sleep
2012-12-31 15:48 - 2013-01-06 08:58 - 00000000 ____D C:\Users\Dakota\Desktop\Wonderful tonight

==================== One Month Modified Files and Folders =======

2013-01-29 18:49 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\SMI
2013-01-29 18:48 - 2012-12-30 15:06 - 00000000 ____D C:\Windows\Minidump
2013-01-29 18:48 - 2012-10-08 18:20 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\Digidesign
2013-01-29 18:48 - 2012-09-02 00:33 - 00000000 ____D C:\users\Dakota
2013-01-29 18:48 - 2012-05-25 05:42 - 00000000 ____D C:\Users\All Users\P4G
2013-01-29 18:48 - 2009-07-13 23:45 - 00000000 ____D C:\Program Files\Windows Journal
2013-01-29 18:48 - 2009-07-13 21:32 - 00000000 ____D C:\Program Files\Windows Sidebar
2013-01-29 18:48 - 2009-07-13 21:32 - 00000000 ____D C:\Program Files\Windows Defender
2013-01-29 18:48 - 2009-07-13 21:32 - 00000000 ____D C:\Program Files\DVD Maker
2013-01-29 18:48 - 2009-07-13 21:32 - 00000000 ____D C:\Program Files (x86)\Windows Sidebar
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 __RSD C:\Windows\Media
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\zh-HK
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\uk-UA
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\tr-TR
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\th-TH
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\sr-Latn-CS
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\sppui
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\sl-SI
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\sk-SK
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\Setup
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\ro-RO
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\ras
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\migwiz
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\lv-LV
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\lt-LT
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\hr-HR
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\he-IL
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\et-EE
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\bg-BG
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\ar-SA
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\zh-HK
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\uk-UA
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\tr-TR
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\th-TH
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sr-Latn-CS
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sppui
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sl-SI
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sk-SK
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\Setup
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\ro-RO
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\ras
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\oobe
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\migwiz
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\lv-LV
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\lt-LT
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\ias
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\hr-HR
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\he-IL
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\et-EE
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\Dism
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\bg-BG
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\ar-SA
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\AdvancedInstallers
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\schemas
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\L2Schemas
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\AppCompat
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Program Files\Common Files\System
2013-01-29 18:48 - 2009-07-13 19:20 - 00000000 ____D C:\Program Files\Common Files\Services
2013-01-29 17:54 - 2013-01-29 17:54 - 00000000 ____D C:\FRST
2013-01-29 15:39 - 2013-01-27 11:23 - 95023320 ___AT C:\Users\All Users\dsgsdgdsgdsgw.pad
2013-01-29 15:11 - 2012-09-02 00:34 - 00000380 ____A C:\Users\Dakota\AppData\Roaming\sp_data.sys
2013-01-29 15:11 - 2012-03-06 02:49 - 00000912 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-01-29 15:10 - 2012-05-25 05:37 - 00000830 ____A C:\Windows\Tasks\ISM-UpdateService-4e00205a-2ab1-4423-8f77-cc25b82cde1d.job
2013-01-29 05:42 - 2012-03-06 02:49 - 00000908 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-01-28 17:30 - 2012-05-25 05:37 - 00000828 ____A C:\Windows\Tasks\ISM-UpdateService-4e00205a-2ab1-4423-8f77-cc25b82cde1d-Logon.job
2013-01-28 17:28 - 2009-07-13 20:45 - 00009920 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-01-28 17:28 - 2009-07-13 20:45 - 00009920 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-01-28 17:25 - 2009-07-13 21:13 - 00795134 ____A C:\Windows\System32\PerfStringBackup.INI
2013-01-28 17:21 - 2012-03-06 02:59 - 00000258 _RASH C:\Users\All Users\ntuser.pol
2013-01-28 17:20 - 2013-01-28 07:03 - 00001233 ____A C:\Windows\setupact.log
2013-01-28 17:20 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-01-28 17:18 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-01-28 17:04 - 2012-05-25 05:30 - 01895777 ____A C:\Windows\WindowsUpdate.log
2013-01-28 16:35 - 2012-09-02 15:30 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\Skype
2013-01-28 11:36 - 2012-09-02 11:03 - 00002021 ____A C:\Users\Public\Desktop\Adobe Reader X.lnk
2013-01-28 07:03 - 2013-01-28 07:03 - 00000000 ____A C:\Windows\setuperr.log
2013-01-28 06:32 - 2013-01-28 06:32 - 469897387 ____A C:\Windows\MEMORY.DMP
2013-01-28 06:32 - 2013-01-28 06:32 - 00279728 ____A C:\Windows\Minidump\012813-26941-01.dmp
2013-01-27 18:59 - 2013-01-27 17:00 - 00000000 ____D C:\Users\Dakota\Desktop\Empty Session
2013-01-27 18:58 - 2013-01-27 17:01 - 00000000 ____D C:\Users\Dakota\Desktop\Songwriting
2013-01-27 15:28 - 2013-01-27 15:28 - 00000000 ____D C:\Users\Dakota\Desktop\bleep bleep up
2013-01-27 15:09 - 2011-05-05 04:27 - 00000000 __AHD C:\Users\Dakota\AppData\Local\qvqbus2C
2013-01-27 15:00 - 2013-01-27 14:41 - 00000000 ____D C:\Users\Dakota\Desktop\Runnin' On My Own
2013-01-27 12:21 - 2013-01-10 16:09 - 00000000 ____D C:\Users\Dakota\Desktop\Bowl for Two
2013-01-27 11:23 - 2013-01-27 11:23 - 00186880 ____A (Microsoft Corporation) C:\Users\Dakota\wgsdgsdgdsgsd.exe
2013-01-27 11:23 - 2013-01-27 11:23 - 00002913 ____A C:\Users\All Users\dsgsdgdsgdsgw.js
2013-01-27 11:23 - 2013-01-27 11:23 - 00000159 ____A C:\Users\All Users\dsgsdgdsgdsgw.reg
2013-01-27 11:23 - 2013-01-27 11:23 - 00000067 ____A C:\Users\All Users\dsgsdgdsgdsgw.bat
2013-01-12 13:57 - 2013-01-12 13:47 - 00000000 ____D C:\Users\Dakota\Desktop\Yellow Submarine
2013-01-12 13:09 - 2013-01-12 13:06 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\mp3converter
2013-01-12 13:06 - 2013-01-12 13:06 - 00001083 ____A C:\Users\Public\Desktop\Mp3 Converter.lnk
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Users\All Users\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\SimilarSites
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\mp3converter
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\Mozilla FireFox
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\InfoAtoms
2013-01-12 13:06 - 2013-01-12 13:06 - 00000000 ____D C:\Program Files (x86)\GamesCenter
2013-01-12 13:05 - 2013-01-12 13:00 - 00000000 ____D C:\Users\Dakota\AppData\Roaming\bytewdownload
2013-01-10 16:08 - 2012-12-27 17:29 - 00000000 ____D C:\Users\Dakota\Desktop\Acoustic Instrument
2013-01-07 14:43 - 2009-07-13 21:08 - 00032644 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-01-07 11:40 - 2013-01-05 18:20 - 00000000 ____D C:\Users\Dakota\Desktop\How do you sleep
2013-01-06 08:58 - 2012-12-31 15:48 - 00000000 ____D C:\Users\Dakota\Desktop\Wonderful tonight

ZeroAccess:
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\L
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\L\00000004.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\L\201d3dde
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\L\4cce1f70
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\L\76603ac3
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\00000004.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\00000008.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\000000cb.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\80000000.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\80000032.@
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}\U\80000064.@

ZeroAccess:
C:\Windows\assembly\GAC_32\Desktop.ini

ZeroAccess:
C:\Windows\assembly\GAC_64\Desktop.ini

==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe 50BEA589F7D7958BDD2528A8F69D05CC ZeroAccess <==== ATTENTION!.
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2013-01-05 22:00:18
Restore point made on: 2013-01-13 07:59:31
Restore point made on: 2013-01-27 12:50:30

==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 3981.91 MB
Available physical RAM: 3413.38 MB
Total Pagefile: 3980.06 MB
Available Pagefile: 3402.05 MB
Total Virtual: 8192 MB
Available Virtual: 8191.91 MB

==================== Partitions =============================

1 Drive c: (OS) (Fixed) (Total:161.57 GB) (Free:98.59 GB) NTFS ==>[System with boot components (obtained from reading drive)]
2 Drive d: (DATA) (Fixed) (Total:279.46 GB) (Free:279.36 GB) NTFS
6 Drive h: () (Removable) (Total:3.72 GB) (Free:0.1 GB) FAT32
7 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 465 GB 0 B *
Disk 1 No Media 0 B 0 B
Disk 2 Online 3820 MB 0 B

Partitions of Disk 0:
===============

Disk ID: {91B5A850-8718-4D8C-AA48-4DA569E5BEAE}

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 System (partition with boot components) 200 MB 1024 KB
Partition 2 Reserved 128 MB 201 MB
Partition 3 Primary 161 GB 329 MB
Partition 4 Primary 279 GB 161 GB
Partition 5 Recovery 24 GB 441 GB

==================================================================================

Disk: 0
Partition 1
Type : c12a7328-f81f-11d2-ba4b-00a0c93ec93b
Hidden : Yes
Required: No
Attrib : 0X8000000000000000

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 SYSTEM FAT32 Partition 200 MB Healthy Hidden

=========================================================

Disk: 0
Partition 2
Type : e3c9e316-0b5c-4db8-817d-f92df00215ae
Hidden : Yes
Required: No
Attrib : 0X8000000000000000

There is no volume associated with this partition.

=========================================================

Disk: 0
Partition 3
Type : ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
Hidden : No
Required: No
Attrib : 0000000000000000

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C OS NTFS Partition 161 GB Healthy

=========================================================

Disk: 0
Partition 4
Type : ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
Hidden : No
Required: No
Attrib : 0000000000000000

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 D DATA NTFS Partition 279 GB Healthy

=========================================================

Disk: 0
Partition 5
Type : de94bba4-06d1-4d40-a16a-bfd50179d6ac
Hidden : Yes
Required: Yes
Attrib : 0X8000000000000001

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 5 Recovery NTFS Partition 24 GB Healthy Hidden

=========================================================

Partitions of Disk 2:
===============

Disk ID: 00000001

Partition ### Type Size Offset
------------- ---------------- ------- -------
* Partition 1 Primary 3820 MB 0 B

==================================================================================

Disk: 2
There is no partition selected.

There is no partition selected.
Please select a partition and try again.

=========================================================

Last Boot: 2013-01-28 12:22

==================== End Of Log =============================









Farbar Recovery Scan Tool (x64) Version: 28-01-2013 02
Ran by SYSTEM at 2013-01-30 16:39:14
Running from H:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0328704 ____A (Microsoft Corporation) 24ACB7E5BE595468E3B9AA488B9B4FCB

C:\Windows\System32\services.exe
[2009-07-13 15:19] - [2009-07-13 17:39] - 0329216 ____A (Microsoft Corporation) 50BEA589F7D7958BDD2528A8F69D05CC

====== End Of Search ======

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 30 January 2013 - 09:24 PM

Hello

Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

Startup: C:\Users\Dakota\Start Menu\Programs\Startup\runctf.lnk
ShortcutTarget: runctf.lnk -> C:\Windows\System32\rundll32.exe (Microsoft Corporation)
HKLM\...\Winlogon: [Shell] C:\PROGRA~3\dsgsdgdsgdsgw.bat [x ] ()
2013-01-27 11:23 - 2013-01-29 15:39 - 95023320 ___AT C:\Users\All Users\dsgsdgdsgdsgw.pad
2013-01-27 11:23 - 2013-01-27 11:23 - 00186880 ____A (Microsoft Corporation) C:\Users\Dakota\wgsdgsdgdsgsd.exe
2013-01-27 11:23 - 2013-01-27 11:23 - 00002913 ____A C:\Users\All Users\dsgsdgdsgdsgw.js
2013-01-27 11:23 - 2013-01-27 11:23 - 00000159 ____A C:\Users\All Users\dsgsdgdsgdsgw.reg
2013-01-27 11:23 - 2013-01-27 11:23 - 00000067 ____A C:\Users\All Users\dsgsdgdsgdsgw.bat
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603}
Replace: C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe C:\Windows\System32\services.exe
C:\WINDOWS\assembly\GAC\Desktop.ini
C:\Windows\assembly\GAC_32\Desktop.ini
C:\Windows\assembly\GAC_64\Desktop.ini


NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Delta504

Delta504
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 31 January 2013 - 05:57 PM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 28-01-2013 02
Ran by SYSTEM at 2013-01-31 16:50:42 Run:1
Running from H:\

==============================================

C:\Users\Dakota\Start Menu\Programs\Startup\runctf.lnk moved successfully.
C:\Windows\System32\rundll32.exe moved successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value was restored successfully .
C:\Users\All Users\dsgsdgdsgdsgw.pad moved successfully.
C:\Users\Dakota\wgsdgsdgdsgsd.exe moved successfully.
C:\Users\All Users\dsgsdgdsgdsgw.js moved successfully.
C:\Users\All Users\dsgsdgdsgdsgw.reg moved successfully.
C:\Users\All Users\dsgsdgdsgdsgw.bat moved successfully.
C:\Windows\Installer\{333035e7-990a-59a2-529b-9350684cf603} moved successfully.
C:\Windows\System32\services.exe moved successfully.
C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe copied successfully to C:\Windows\System32\services.exe
C:\WINDOWS\assembly\GAC\Desktop.ini not found.
C:\Windows\assembly\GAC_32\Desktop.ini moved successfully.
C:\Windows\assembly\GAC_64\Desktop.ini moved successfully.

==== End of Fixlog ====






Everything appears to be working normally. Before the virus took over I lost the ability to use most search engines and that is working again. What would be the next few steps to make sure everything is gone for good? I really appreciate the help, by the way. It is truly awesome to have people willing to help out a stranger.

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 31 January 2013 - 06:49 PM

SystemLook:

Please download SystemLook from one of the links below and save it to your Desktop.

Link 1
Link 2


  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
:filefind
rundll32.exe
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Delta504

Delta504
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 01 February 2013 - 05:19 PM

SystemLook 30.07.11 by jpshortstuff
Log created at 16:15 on 01/02/2013 by Dakota
Administrator - Elevation successful

========== filefind ==========

Searching for "rundll32.exe"
C:\FRST\Quarantine\rundll32.exe --a---- 45568 bytes [23:57 13/07/2009] [01:39 14/07/2009] DD81D91FF3B0763C392422865C9AC12E
C:\Windows\SysWOW64\rundll32.exe --a---- 44544 bytes [23:41 13/07/2009] [01:14 14/07/2009] 51138BEEA3E2C21EC44D0932C71762A8
C:\Windows\winsxs\amd64_microsoft-windows-rundll32_31bf3856ad364e35_6.1.7600.16385_none_33fa4336c49b998b\rundll32.exe --a---- 45568 bytes [23:57 13/07/2009] [01:39 14/07/2009] DD81D91FF3B0763C392422865C9AC12E
C:\Windows\winsxs\x86_microsoft-windows-rundll32_31bf3856ad364e35_6.1.7600.16385_none_d7dba7b30c3e2855\rundll32.exe --a---- 44544 bytes [23:41 13/07/2009] [01:14 14/07/2009] 51138BEEA3E2C21EC44D0932C71762A8

-= EOF =-

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 01 February 2013 - 08:43 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache:: 

FCopy::
C:\FRST\Quarantine\rundll32.exe | C:\Windows\System32\rundll32.exe

Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Delta504

Delta504
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:38 PM

Posted 03 February 2013 - 03:40 PM

I apologize, but I am confused as to where I am to find the combofix.exe

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 03 February 2013 - 04:07 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 06 February 2013 - 02:04 AM

Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 09 February 2013 - 07:59 PM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

  • Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:38 PM

Posted 12 February 2013 - 01:12 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users