Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Urgent & Business Critical - Server 2003 infected with undetectable botnet

  • This topic is locked This topic is locked
3 replies to this topic

#1 boojieben


  • Members
  • 2 posts
  • Local time:02:51 PM

Posted 28 July 2014 - 04:04 PM

Evening all,


I have a client that has somehow been infected with a botnet and it has completely blocked up their exchange (2003). It is currently sat with 10000 queues, they are now on pretty much every blacklist and we cannot get them removed until we fix this spam issue. The company only trades via email so it is very important I get this fixed ASAP but I'm at the end of my tether and need some assistance. Here's what I have done so far.

  • Scanned all client machines and shut them off to elimate any of them having the bot. Results were clear and the queue continues to grow while there are no machies turned on
  • Ran a scan using their antivirus (Vipre business) updated to latest version - no results found
  • Installed and scanned RUBotted - no results found
  • Installed and scanned using Spybot S&D - no results found
  • Installed and scanned using Microsoft Malicious Software Removal Tool - no results found
  • Installed and scanned using Malware Bytes - no results found
  • Ran DDS - Incompatible with Server 2003

Hijack This log:


Logfile of Trend Micro HijackThis v2.0.5
Scan saved at 21:40:20, on 28/07/2014
Platform: Windows 2003 SP2 (WinNT 5.02.3790)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal
Running processes:
C:\Program Files\Symantec\Backup Exec\beremote.exe
C:\Program Files\HP\Cissesrv\cissesrv.exe
C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
C:\Program Files\Microsoft SQL Server\MSSQL$SHAREPOINT\Binn\sqlservr.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SMSUtilityService.exe
C:\Program Files\GFI Software\GFIAgent\SBAMSvc.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESrv.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSECtrl.EXE
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSEUI.EXE
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESp.exe
C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSELog.EXE
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESJM.EXE
C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSETask.exe
C:\Program Files\VIPRE Business\EnterpriseService.exe
C:\Program Files\Dyn Updater\DynUpSvc.exe
C:\Program Files\Common Files\System\MSSearch\Bin\mssearch.exe
C:\Program Files\Symantec\SMSMSE\6.0\Server\ConsoleAppMgr.exe
C:\Program Files\Symantec\CMaF\2.0\bin\CmafReportSrv.exe
c:\program files\teamviewer\version6\TeamViewer.exe
C:\Program Files\GFI Software\GFIAgent\SBAMTray.exe
C:\Program Files\Dyn Updater\DynTray.exe
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe
C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe
C:\Program Files\Malwarebytes Anti-Malware\mbam.exe
C:\Program Files\GFI Software\GFIAgent\SBPIMSvc.exe
C:\Program Files\Java\jre7\bin\jqs.exe
c:\program files\teamviewer\version6\TeamViewer_Desktop.exe
C:\Program Files\TeamViewer\Version6\tv_w32.exe
D:\Program Files\Exchsrvr\bin\mad.exe
D:\Program Files\Exchsrvr\bin\store.exe
C:\Program Files\Microsoft Windows Small Business Server\Networking\POP3\imbservice.exe
D:\Program Files\Exchsrvr\bin\exmgmt.exe
D:\Program Files\Exchsrvr\bin\emsmta.exe
C:\Documents and Settings\Administrator\Desktop\HijackThis.exe
C:\Program Files\Microsoft Windows Small Business Server\Networking\POP3\imbdownl.exe
C:\Program Files\Microsoft Windows Small Business Server\Networking\POP3\imbdlvr.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://shdoclc.dll/softAdmin.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://companyweb/default.aspx
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll
O4 - HKLM\..\Run: [CPQTEAM] cpqteam.exe
O4 - HKLM\..\Run: [DWPersistentQueuedReporting] C:\PROGRA~1\COMMON~1\MICROS~1\DW\DWTRIG20.EXE -a
O4 - HKLM\..\Run: [SBAMTray] "C:\Program Files\GFI Software\GFIAgent\SBAMTray.exe"
O4 - HKLM\..\Run: [SDTray] "C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User '?')
O4 - HKUS\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User '?')
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User '?')
O4 - HKUS\S-1-5-19-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User '?')
O4 - HKUS\S-1-5-20\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User '?')
O4 - HKUS\S-1-5-20-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User '?')
O4 - HKUS\S-1-5-21-2101688399-1902022187-3495879880-1173-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (User '?')
O4 - HKUS\S-1-5-21-2101688399-1902022187-3495879880-500-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User '?')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [tscuninstall] %systemroot%\system32\tscupgrd.exe (User 'Default user')
O4 - S-1-5-21-2101688399-1902022187-3495879880-500-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0 Startup: Server Management.lnk = ? (User '?')
O4 - Startup: Server Management.lnk = ?
O4 - Global Startup: Dyn Updater Tray Icon.lnk = C:\Program Files\Dyn Updater\DynTray.exe
O4 - Global Startup: Service Manager.lnk = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O14 - IERESET.INF: START_PAGE_URL=http://companyweb
O15 - ESC Trusted Zone: http://m.uk.2mdn.net
O15 - ESC Trusted Zone: http://adserver.adtech.de
O15 - ESC Trusted Zone: http://classicasp.aspfaq.com
O15 - ESC Trusted Zone: http://www.chicagotech.net
O15 - ESC Trusted Zone: http://www.chilkatsoft.com
O15 - ESC Trusted Zone: http://mm.chitika.net
O15 - ESC Trusted Zone: http://scripts.chitika.net
O15 - ESC Trusted Zone: http://ads.clicksor.com
O15 - ESC Trusted Zone: http://cnettv.cnet.com
O15 - ESC Trusted Zone: http://www.cnet.com
O15 - ESC Trusted Zone: http://i.i.com.com
O15 - ESC Trusted Zone: http://www.computerperformance.co.uk
O15 - ESC Trusted Zone: http://*.computerperformance.co.uk
O15 - ESC Trusted Zone: http://ad.doubleclick.net
O15 - ESC Trusted Zone: http://ad.uk.doubleclick.net
O15 - ESC Trusted Zone: http://bwp.download.com
O15 - ESC Trusted Zone: http://www.download.com
O15 - ESC Trusted Zone: http://eas.apm.emediate.eu
O15 - ESC Trusted Zone: http://www.eventid.net
O15 - ESC Trusted Zone: http://tags.expo9.exponential.com
O15 - ESC Trusted Zone: http://media.fastclick.net
O15 - ESC Trusted Zone: http://www.google-analytics.com
O15 - ESC Trusted Zone: http://www.google.co.uk
O15 - ESC Trusted Zone: http://pagead2.googlesyndication.com
O15 - ESC Trusted Zone: http://examnotes.us.intellitxt.com
O15 - ESC Trusted Zone: http://www.isl-computers.co.uk
O15 - ESC Trusted Zone: http://www.isl-support.co.uk
O15 - ESC Trusted Zone: http://www.linuxquestions.org
O15 - ESC Trusted Zone: http://files6.majorgeeks.com
O15 - ESC Trusted Zone: http://www.majorgeeks.com
O15 - ESC Trusted Zone: http://www.malwarebytes.org
O15 - ESC Trusted Zone: http://img.mediaplex.com
O15 - ESC Trusted Zone: http://www.microworldyorkshire.co.uk
O15 - ESC Trusted Zone: http://runonce.msn.com
O15 - ESC Trusted Zone: http://www.oreillynet.com
O15 - ESC Trusted Zone: http://www.pcadvisor.co.uk
O15 - ESC Trusted Zone: http://www.pendragon-contracts.co.uk
O15 - ESC Trusted Zone: http://edge.quantserve.com
O15 - ESC Trusted Zone: http://fileconnectdl.symantec.com
O15 - ESC Trusted Zone: http://seer.entsupport.symantec.com
O15 - ESC Trusted Zone: http://www.symantec.com
O15 - ESC Trusted Zone: http://www.thinkbroadband.com
O15 - ESC Trusted Zone: http://ctxt.tribalfusion.com
O15 - ESC Trusted Zone: http://www.webservertalk.com
O15 - ESC Trusted Zone: http://m.webtrends.com
O15 - ESC Trusted Zone: http://www.wirelessroomservice.com
O15 - ESC Trusted IP range:
O15 - ESC Trusted IP range:
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1190834584140
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1302710663609
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/ractrl.cab?lmi=100
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = car-save.local
O17 - HKLM\Software\..\Telephony: DomainName = car-save.local
O17 - HKLM\System\CCS\Services\Tcpip\..\{96CFF2EE-C671-42A9-A880-D15E74A1AE17}: NameServer =
O17 - HKLM\System\CCS\Services\Tcpip\..\{B75A0D09-638D-481B-AE17-B076B26D73B8}: NameServer =
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = car-save.local
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = car-save.local
O18 - Protocol: hpapp - {24F45006-5BD9-41B7-9BD9-5F8921C8EBD1} - C:\Program Files\Compaq\Cpqacuxe\bin\hpapp.dll
O20 - Winlogon Notify: SDWinLogon - SDWinLogon.dll (file missing)
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: APC PBE Agent (APCPBEAgent) - APC - C:\PROGRA~1\APC\POWERC~1\agent\pbeagent.exe
O23 - Service: APC PBE Server (APCPBEServer) - APC - C:\PROGRA~1\APC\POWERC~1\server\PBESER~1.EXE
O23 - Service: Backup Exec Remote Agent for Windows Systems (BackupExecAgentAccelerator) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\beremote.exe
O23 - Service: Backup Exec Agent Browser (BackupExecAgentBrowser) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\benetns.exe
O23 - Service: Backup Exec Device & Media Service (BackupExecDeviceMediaService) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\pvlsvr.exe
O23 - Service: Backup Exec Job Engine (BackupExecJobEngine) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\bengine.exe
O23 - Service: Backup Exec Server (BackupExecRPCService) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\beserver.exe
O23 - Service: HP Smart Array SAS/SATA Event Notification Service (Cissesrv) - Hewlett-Packard Company - C:\Program Files\HP\Cissesrv\cissesrv.exe
O23 - Service: HP ProLiant Remote Monitor Service (CpqRcmc) - Hewlett-Packard Company - C:\WINDOWS\system32\cpqrcmc.exe
O23 - Service: HP Version Control Agent (cpqvcagent) - Hewlett-Packard Company - C:\hp\hpsmh\data\cgi-bin\vcagent\vcagent.exe
O23 - Service: Backup Exec DLO Administration Service (DLOAdminSvcu) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\DLO\DLOAdminSvcu.exe
O23 - Service: Backup Exec DLO Maintenance Service (DLOMaintenanceSvc) - Symantec Corporation - C:\Program Files\Symantec\Backup Exec\DLO\dlomaintsvcu.exe
O23 - Service: Dyn Updater - Dyn, Inc. - C:\Program Files\Dyn Updater\DynUpSvc.exe
O23 - Service: HP SI Service (HPSIService) - HP - C:\WINDOWS\system32\HPSIsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: Intel Alert Handler - LANDesk Software Ltd. - C:\WINDOWS\system32\ams_ii\hndlrsvc.exe
O23 - Service: Intel Alert Originator - LANDesk Software Ltd. - C:\WINDOWS\system32\ams_ii\iao.exe
O23 - Service: Intel File Transfer - LANDesk Software Ltd. - C:\WINDOWS\system32\cba\xfr.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Oracle Corporation - C:\Program Files\Java\jre7\bin\jqs.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: LMIGuardianSvc - LogMeIn, Inc. - C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe
O23 - Service: Network DDE Dynamic - Unknown owner - C:\WINDOWS\system32\ntdump.exe
O23 - Service: Symantec System Center Discovery Service (NSCTOP) - Symantec Corporation - C:\PROGRA~1\Symantec\SYMANT~1\NSCTOP.EXE
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Riverbed Technology, Inc. - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Symantec Mail Security Utility Service (SAVFMSESpamStatsManager) - Unknown owner - C:\Program Files\Symantec\SMSMSE\6.0\Server\SMSUtilityService.exe
O23 - Service: VIPRE Business (SBAMSvc) - ThreatTrack Security, Inc. - C:\Program Files\GFI Software\GFIAgent\SBAMSvc.exe
O23 - Service: SB Recovery Service (SBPIMSvc) - ThreatTrack Security, Inc. - C:\Program Files\GFI Software\GFIAgent\SBPIMSvc.exe
O23 - Service: Spybot-S&D 2 Scanner Service (SDScannerService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
O23 - Service: Spybot-S&D 2 Updating Service (SDUpdateService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
O23 - Service: Spybot-S&D 2 Security Center Service (SDWSCService) - Safer-Networking Ltd. - C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe
O23 - Service: Symantec Mail Security for Microsoft Exchange (SMSMSE) - Symantec Corporation - C:\Program Files\Symantec\SMSMSE\6.0\Server\SAVFMSESrv.exe
O23 - Service: HP ProLiant System Shutdown Service (sysdown) - Hewlett-Packard Company - C:\WINDOWS\system32\sysdown.exe
O23 - Service: HP System Management Homepage (SysMgmtHp) - Hewlett-Packard Company - C:\hp\hpsmh\bin\smhstart.exe
O23 - Service: TeamViewer 6 (TeamViewer6) - TeamViewer GmbH - C:\Program Files\TeamViewer\Version6\TeamViewer_Service.exe
O23 - Service: VIPRE Business Site Service (VIPRE Business Service) - ThreatTrack Security, Inc. - C:\Program Files\VIPRE Business\EnterpriseService.exe
End of file - 16915 bytes
After running TCPview for a few seconds my results look like this...
As I am writing this Malware Bytes keeps popping up with the following (different IP address every time)...
If anyone could give me any assistance I'd apprietiate it greatly.

BC AdBot (Login to Remove)


#2 boojieben

  • Topic Starter

  • Members
  • 2 posts
  • Local time:02:51 PM

Posted 29 July 2014 - 03:45 AM

Nevermind folks - it turned out to be from something spoofing a company address. Thousands of spam emails were sent out from a spoof address and they all bounced back to an address that didn't exist on our servers, our Exchange server then sent an NDR out again to those addresses and we were stuck in a loop. All sorted now though.

#3 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,733 posts
  • Gender:Male
  • Local time:09:51 AM

Posted 02 August 2014 - 04:05 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:


step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/542549 <<< CLICK THIS LINK

If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.


step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.


We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#4 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,733 posts
  • Gender:Male
  • Local time:09:51 AM

Posted 07 August 2014 - 04:10 PM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users