Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus DOS/Rovnix


  • Please log in to reply
10 replies to this topic

#1 Benny T

Benny T

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 20 January 2014 - 10:23 PM

This computer has this virus on it. It is pretty well hidden and really doesn't interfere with anything, but I found that it does steals passwords. I would like to get it off this machine if possible. Malwarebytes and Microsoft Malicious software tool remover doesn't see it but when I run malwarebytes rootkit remover, it finds it in 7 infected files. When I run the cleanup and restart the computer, the 7 files are still infected so I know this malware is still on the machine. I need some help in removing it completely off this computer without reformatting the hard drive if possible.

Edit: Moved topic from Anti-Virus and Anti-Malware Software to the more appropriate forum.~ Animal

BC AdBot (Login to Remove)

 


#2 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:05:45 PM

Posted 21 January 2014 - 02:54 AM

Hello Benny -

 

First -

Download Security Check by Screen317 from HERE
* Save it to your Desktop.
* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.
Note: If any security program requests permission to access the Internet, allow it to do so.

 

 

Next -

Please download and run RKill by Grinler.

A black DOS box will briefly flash and then disappear.
This is normal and indicates the tool ran successfully.
If a log is produced, save it, or post it back here -

 

Important: Do not reboot your computer until you complete the next step.

 

Please download AdwCleaner by Xplode and save to your Desktop.
* Double-click on AdwCleaner.exe to run the tool.
* Vista/Windows 7/8 users right-click and select Run As Administrator.
* Click on the Scan button. (only once)
* AdwCleaner will begin...be patient as the scan may take some time to complete.
* After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
* NOW - Click on the Clean button. (only once)
* Press OK when asked to close all programs and follow the onscreen prompts.
+ Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
* After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
* Copy and paste the contents of that logfile in your next reply.
* A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.

 

Next -

Download TDSSKiller and save it to your desktop.

* Extract (unzip) its contents to your desktop.
* Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
* If an infected file is detected, the default action will be Cure, click on Continue.
* If a suspicious file is detected, the default action will be Skip, click on Continue.
* It may ask you to reboot the computer to complete the process. Click on Reboot Now.
* If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
* If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt.

Please copy and paste the contents of that file here.

 

Next -

Please scan your computer with ESET Online Scanner
Disable active Antivirus and Antimalware programs

How To Temporarily Disable Your Anti-virus
This scan is best performed with Internet Explorer, as it uses ActiveX
If you will not use Internet Explorer, then please read item 3 in this post
1 - Open Internet Explorer and hold down Control (Ctrl) key and click on This Link to open ESET OnlineScan in a new window.
2 - Click the ESET Online Scanner button.

3 - For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

a - Click on eset.exe to download the ESET Smart Installer. Save it to your desktop.
b - Double click on the  icon on your desktop.

4 - Check "YES, I accept the Terms of Use."
5 - Click the Start button.
6 - Accept any security warnings from your browser.
7 - Under scan settings, check "Scan Archives" and "Remove found threats"
8 - Click Advanced settings and select the following:
* Scan potentially unwanted applications
* Scan for potentially unsafe applications
* Enable Anti-Stealth technology

9 - ESET will then download updates for itself, install itself, and begin scanning your computer.
10 - Please be patient as this will take some time (first time scans are always longer).
11 - When the scan completes, click List Threats
12 - Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
13 - Click the Back button and then Click the Finish button.
NOTE:Sometimes if ESET finds no infections it will not create a log.
If you lose the log it can be found at C:\Program Files\ESET\EsetOnlineScanner\log.txt
If no infections are found then please tell me -
You can ignore any ESET detection of AdwCleaner...it is a Clean up detection.

 

 

Last -

Clear Cache / Temp Files

Please download Temp File Cleaner by Old Timer
Usage Instructions:

  • Download TFC from the download link above and save the file on your desktop.
  • Close ALL running applications as TFC will terminate them before attempting to clean up the temporary files.
  • Double-click on the TFC icon.
  • Vista / Windows 7/8 users Right click on the icon and select Run as administrator
  • When the program opens, click on the Start button.  TFC will terminate the Explorer process and all running applications and then begin the process of cleaning out all of your temp folders.
  • When done, press OK and reboot your computer and finish the cleanup.

 

 

Thank You -



#3 Benny T

Benny T
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 21 January 2014 - 02:37 PM

Ran Security Check and just said, "The system cannot find the file specified."

 

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 01/21/2014 11:21:12 AM in x86 mode.
Windows Version: Windows 7 Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * C:\Windows\system32\ANIWConnService.exe (PID: 1808) [WD-HEUR]

1 proccess terminated!

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 01/21/2014 11:22:29 AM
Execution time: 0 hours(s), 1 minute(s), and 17 seconds(s)

 

ADWCleaner Started software and gave me the message, "Pending. Please uncheck elements you don't want to remove."

 

I stopped here because it doesn't seem to be working as you describe in your reply.



#4 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:05:45 PM

Posted 21 January 2014 - 03:23 PM


ADWCleaner Started software and gave me the message, "Pending. Please uncheck elements you don't want to remove."

After Stage 1 (Scan) you are given the option to "uncheck" any items that you do not want to remove.

I assume this is where the notice popped up.

If you see a special program or tool bar that you want to keep, you can uncheck it, or just post the Scan log first -

 

I must find a way to include that in my description of the program.

Also Xplode (developer) has made a few minor changes as the program gets more popular -

 

EDIT - I do actually include this line that tells you a log of AdwCleaner[R0].txt is first produced for review.

I just do not fully explain the purpose of the R0 log (which I will do now)

* After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
 


Ran Security Check and just said, "The system cannot find the file specified."

Usually because of the bottom line that I add to the program.

Try How To Temporarily Disable Your Anti-virus and run the scan while Off line.

 

Thank You -


Edited by noknojon, 21 January 2014 - 03:41 PM.


#5 Benny T

Benny T
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 21 January 2014 - 09:52 PM

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 01/21/2014 11:21:12 AM in x86 mode.
Windows Version: Windows 7 Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * C:\Windows\system32\ANIWConnService.exe (PID: 1808) [WD-HEUR]

1 proccess terminated!

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 01/21/2014 11:22:29 AM
Execution time: 0 hours(s), 1 minute(s), and 17 seconds(s)

 

C:\AdwCleaner\Quarantine\C\Program Files\Web Assistant\Extension32.dll.vir a variant of Win32/Toolbar.Perion.A application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\Web Assistant\ExtensionUpdaterService.exe.vir a variant of Win32/Toolbar.BitCocktail.B application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\Web Assistant\InstallerHelper.dll.vir a variant of Win32/Toolbar.BitCocktail.A application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\Tarma Installer\{DE3B7BF9-0770-4104-BC0B-B1CCCCE2F053}\_Setupx.dll.vir a variant of Win32/Adware.Yontoo.B application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Carlitos\AppData\Local\Babylon\Setup\BExternal.dll.vir a variant of Win32/Toolbar.Babylon.F application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Carlitos\AppData\Local\Babylon\Setup\IECookieLow.dll.vir a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Users\Carlitos\AppData\Local\Babylon\Setup\Setup.exe.vir a variant of Win32/Toolbar.Babylon.H application cleaned by deleting - quarantined
C:\Users\Carlitos\Downloads\ccsetup401.exe Win32/Bundled.Toolbar.Google.D application cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCA0S40B4 multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCA976M84 multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCAEANUVX multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCAMZLB6E multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCAS1IXU6 multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCAU5QD46 multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\updateCAWJ6ZLM multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[10] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[11] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[1] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[2] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[3] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[4] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[5] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[6] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[7] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[8] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\update[9] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6PC6VAJE\update[1] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6PC6VAJE\update[2] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6PC6VAJE\update[3] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6PC6VAJE\update[4] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6PC6VAJE\update[5] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A4NCTBC8\update[1] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A4NCTBC8\update[2] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A4NCTBC8\update[3] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EQS3IR7R\update[1] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EQS3IR7R\update[2] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EQS3IR7R\update[3] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VLM1Q7QC\update[1] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VLM1Q7QC\update[2] multiple threats cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VLM1Q7QC\update[3] multiple threats cleaned by deleting - quarantined

 

# AdwCleaner v3.017 - Report created 21/01/2014 at 12:30:09
# Updated 12/01/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (32 bits)
# Username : Administrator - CARLITOS-PC
# Running from : C:\Users\Administrator\Desktop\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****

***** [ Files / Folders ] *****

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.16428

*************************

AdwCleaner[R0].txt - [16707 octets] - [07/01/2014 00:31:47]
AdwCleaner[R1].txt - [1006 octets] - [08/01/2014 00:42:22]
AdwCleaner[R2].txt - [1127 octets] - [08/01/2014 02:02:00]
AdwCleaner[R3].txt - [1150 octets] - [21/01/2014 11:26:28]
AdwCleaner[R4].txt - [890 octets] - [21/01/2014 12:30:09]
AdwCleaner[S0].txt - [17255 octets] - [07/01/2014 00:34:37]
AdwCleaner[S1].txt - [1069 octets] - [08/01/2014 00:49:45]
AdwCleaner[S2].txt - [1191 octets] - [08/01/2014 02:09:21]

########## EOF - C:\AdwCleaner\AdwCleaner[R4].txt - [1130 octets] ##########

 

# AdwCleaner v3.017 - Report created 21/01/2014 at 12:41:16
# Updated 12/01/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (32 bits)
# Username : Administrator - CARLITOS-PC
# Running from : C:\Users\Administrator\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.16428

*************************

AdwCleaner[R0].txt - [16707 octets] - [07/01/2014 00:31:47]
AdwCleaner[R1].txt - [1006 octets] - [08/01/2014 00:42:22]
AdwCleaner[R2].txt - [1127 octets] - [08/01/2014 02:02:00]
AdwCleaner[R3].txt - [1150 octets] - [21/01/2014 11:26:28]
AdwCleaner[R4].txt - [1210 octets] - [21/01/2014 12:30:09]
AdwCleaner[S0].txt - [17255 octets] - [07/01/2014 00:34:37]
AdwCleaner[S1].txt - [1069 octets] - [08/01/2014 00:49:45]
AdwCleaner[S2].txt - [1191 octets] - [08/01/2014 02:09:21]
AdwCleaner[S3].txt - [1134 octets] - [21/01/2014 12:41:16]

########## EOF - C:\AdwCleaner\AdwCleaner[S3].txt - [1194 octets] ##########

 

12:52:36.0344 0x0c40  TDSS rootkit removing tool 3.0.0.19 Nov 18 2013 09:27:50
12:52:36.0859 0x0c40  ============================================================
12:52:36.0859 0x0c40  Current date / time: 2014/01/21 12:52:36.0859
12:52:36.0859 0x0c40  SystemInfo:
12:52:36.0859 0x0c40 
12:52:36.0859 0x0c40  OS Version: 6.1.7601 ServicePack: 1.0
12:52:36.0859 0x0c40  Product type: Workstation
12:52:36.0859 0x0c40  ComputerName: CARLITOS-PC
12:52:36.0859 0x0c40  UserName: Administrator
12:52:36.0859 0x0c40  Windows directory: C:\Windows
12:52:36.0859 0x0c40  System windows directory: C:\Windows
12:52:36.0859 0x0c40  Processor architecture: Intel x86
12:52:36.0859 0x0c40  Number of processors: 2
12:52:36.0859 0x0c40  Page size: 0x1000
12:52:36.0859 0x0c40  Boot type: Normal boot
12:52:36.0859 0x0c40  ============================================================
12:52:36.0859 0x0c40  BG loaded
12:52:37.0748 0x0c40  System UUID: {CDD22EE9-6D69-310C-1336-331748A2F7B4}
12:52:40.0197 0x0c40  Drive \Device\Harddisk0\DR0 - Size: 0x4A85D56000 (298.09 Gb), SectorSize: 0x200, Cylinders: 0x9801, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000050
12:52:40.0260 0x0c40  ============================================================
12:52:40.0260 0x0c40  \Device\Harddisk0\DR0:
12:52:40.0275 0x0c40  MBR partitions:
12:52:40.0275 0x0c40  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x32000
12:52:40.0275 0x0c40  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x32800, BlocksNum 0x253FB800
12:52:40.0275 0x0c40  ============================================================
12:52:40.0385 0x0c40  C: <-> \Device\Harddisk0\DR0\Partition2
12:52:40.0385 0x0c40  ============================================================
12:52:40.0385 0x0c40  Initialize success
12:52:40.0385 0x0c40  ============================================================
12:52:45.0767 0x0c30  Deinitialize success

 



#6 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:05:45 PM

Posted 21 January 2014 - 10:40 PM

Looks a lot better.

How is the computer and the problems now ?

 

Thanks -



#7 Benny T

Benny T
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 21 January 2014 - 10:51 PM

It seems to be running a little more efficient and quicker although it wasn't that bad before. Ran Malwarebytes scan and didn't find anything. Looks good so far.



#8 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:05:45 PM

Posted 21 January 2014 - 10:55 PM

Please re run Security check if you can .

Try How To Temporarily Disable Your Anti-virus and run the scan while Off line.

 

Thanks -



#9 Benny T

Benny T
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 21 January 2014 - 11:52 PM

 Results of screen317's Security Check version 0.99.79 
 Windows 7 Service Pack 1 x86 (UAC is disabled!) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
Microsoft Security Essentials  
  (On Access scanning disabled!)
 Error obtaining update status for antivirus! 
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.75.0.1300 
 CCleaner    
 JavaFX 2.1.1   
 Java 7 Update 51 
 Adobe Reader XI 
````````Process Check: objlist.exe by Laurent```````` 
 Microsoft Security Essentials MSMpEng.exe
 Microsoft Security Essentials msseces.exe
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 2%
````````````````````End of Log``````````````````````
 



#10 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:05:45 PM

Posted 22 January 2014 - 04:20 AM

No real problems -

 

Watch things for a day or so, and post back if you have problems.

 

Thank You



#11 Benny T

Benny T
  • Topic Starter

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 23 January 2014 - 04:54 PM

Computer seems to be working normally. Thank you very much for your help and guidance. I really appreciate it!






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users