Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HELP T.T I'm infected with 27218346293184.exe virus or whatever it is


  • This topic is locked This topic is locked
4 replies to this topic

#1 laise91

laise91

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:07:11 AM

Posted 27 April 2015 - 11:05 AM

Hi, Like four days ago I was trying to install de Adobe Illustrator program from a torrent...then it failed and then for some reason it started to pop up a screen (every time I start the computer) with a program that wants to start but windows warns me that is and .exe program called the 'insert here' number above the topic title.

 

Also the trojan or whatever it is, create another user besides administrator. So xD...HELP

Im running on Windows 7 w32, I don't have any antivirus program because the malware prevents me from installing something (for example, the eset nod32 virus trial program WTF O.O)

 



BC AdBot (Login to Remove)

 


#2 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:01:11 PM

Posted 27 April 2015 - 11:39 AM

Hello, and :welcome: to BC.

Please follow the instructions below. If you do not understand anything, feel free to stop and ask.

Rkill

Please download Rkill by Grinler and save it to your desktop.
  • Link 1
  • Link 2
    • Double-click on the Rkill desktop icon to run the tool.
    • If using Vista, right-click on it and Run As Administrator.
    • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
    • If not, delete the file, then download and use the one provided in Link 2.
    • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
    • If the tool does not run from any of the links provided, please let me know.
  • Do not reboot the computer, you will need to run the application again.
===

Emsisoft Emergency Kit

Please download Emsisoft Emergency Kit and save it to your desktop. Double click on the EmsisoftEmergencyKit file you downloaded to extract its contents and create a shortcut on the desktop. Leave all settings as they are and click the Extract button at the bottom. A folder named EEK will be created in the root of the drive (usually c:\).
  • After extraction please double-click on the new Start Emsisoft Emergency Kit icon on your desktop.
  • The first time you launch it, Emsisoft Emergency Kit will recommend that you allow it to download updates. Please click Yes so that it downloads the latest database updates.
  • When the update process is complete, a new button will appear in the lower-left corner that says Back. Click on this button to return to the Overview screen.
  • Click on Scan to be taken to the scan options. If you are asked if you want the scanner to scan for Potentially Unwanted Programs, then click Yes.
  • Click on the Full Scan button to start the scan.
  • When the scan is completed click the Quarantine selected objects button. Note, this option is only available if malicious objects were detected during the scan.
  • When the threats have been quarantined, click the View report button in the lower-right corner, and the scan log will be opened in Notepad.
  • Please save the log in Notepad on your desktop, and attach it to your next reply.
  • When you close Emsisoft Emergency Kit, it will give you an option to sign up for a newsletter. This is optional, and is not necessary for the malware removal process.
===

Malwarebytes Anti-Malware

Download Malwarebytes Anti-Malware from here.

Double click on the file mbam-setup-2.x.x.xxxx.exe to install the application. (x.x.xxxx is the version)
  • Follow the prompt. At the end place a checkmark in Launch Malwarebytes Anti-Malware, then choose Finish.
  • When MBAM opens it will says Your database is out of date. Choose Fix Now.
  • Click on the Scan tab at the top of the window, choose Threat Scan, then Scan Now.
  • If you receive a message that updates are available, choose Update Now button (the scan will start after updates are completed).
  • Please be patient as the scan will take some time.
  • If MBAM detected threats, choose Quarantine for all items, then click Apply Actions.
  • While still on the Scan tab, choose View detailed log. In the window that opens, click the Export button, choose Text file (*.txt) and save the log to your Desktop.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Please report the status of your machine after completing the steps.

Regards,
Alex

#3 laise91

laise91
  • Topic Starter

  • Members
  • 37 posts
  • OFFLINE
  •  
  • Local time:07:11 AM

Posted 27 April 2015 - 02:44 PM

Rkill 2.7.0 by Lawrence Abrams (Grinler)
Copyright 2008-2015 BleepingComputer.com
More Information about Rkill can be found at this link:
 
Program started at: 04/27/2015 11:53:32 AM in x86 mode.
Windows Version: Windows 7 Ultimate Service Pack 1
 
Checking for Windows services to stop:
 
 * No malware services found to stop.
 
Checking for processes to terminate:
 
 * C:\{$1284-9213-2940-1289$}\svchost.exe (PID: 2832) [SFI]
 * C:\Users\Quadcore\AppData\Roaming\Macromedia\AMD External Events Client.exe (PID: 4544) [UP-HEUR]
 
2 proccesses terminated!
 
Checking Registry for malware related settings:
 
 * No issues found in the Registry.
 
Backup Registry file created at:
 C:\Users\Quadcore\Desktop\rkill\rkill-04-27-2015-11-53-41.reg
 
Resetting .EXE, .COM, & .BAT associations in the Windows Registry.
 
Performing miscellaneous checks:
 
 * System Restore Disabled
 
   [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
   "DisableSR" = dword:00000001
 
Checking Windows Service Integrity: 
 
 * WSearch [Missing Service]
 
Searching for Missing Digital Signatures: 
 
 * No issues found.
 
Checking HOSTS File: 
 
 * No issues found.
 
Program finished at: 04/27/2015 11:54:14 AM
Execution time: 0 hours(s), 0 minute(s), and 41 seconds(s)
 
It is in spanish...I will translate what I think is important.
 
Emsisoft Emergency Kit - Versión 9.0
Last updated: 04/27/2015 12:09:26 pm
User account : Quadcore -PC \ Quadcore

Configurations of analysis :

Analysis type : Full
Objects : Rootkits , Memory, Traces , C : \

Detect PUPs : Enabled
File Analysis : Enabled
On: ADS Analysis
Filter file extensions : Off
Advanced cache : Enabled
Direct access to the disk : Off
 
Beginning of the analysis: 27/04/2015 12:14:15 p.m.
 
 
C:\Users\Administrador\AppData\Roaming\Macromedia\AMD External Events Client.exe detectado: Gen:Variant.Kazy.271075 (B)
C:\Users\Administrador\AppData\Roaming\Macromedia\MsMpCom.exe detectado: Gen:Variant.Zusy.79803 (B)
C:\Users\Quadcore\AppData\Roaming\EZDownloader\ detectado: Application.Bundle (A)
Key: HKEY_USERS\.DEFAULT\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} detectado: Application.Bundle (A)
Key: HKEY_USERS\S-1-5-21-2172032273-4216305309-2282011400-1000\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} detectado: Application.Bundle (A)
Key: HKEY_USERS\S-1-5-18\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} detectado: Application.Bundle (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{12A61307-94CD-4F8E-94BC-918E511FAA81} detectado: Application.Bundle (A)
C:\ProgramData\apn detectado: Application.AppInstall (A)
C:\Users\Quadcore\AppData\Roaming\msconfig.ini detectado: Trojan-Ransom.Urausy (A)
C:\Users\Administrador\AppData\Roaming\msconfig.ini detectado: Trojan-Ransom.Urausy (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVP.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BDAGENT.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\COMBOFIX.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EGUI.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIJACKTHIS.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KEYSCRAMBLER.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAM.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MPCMDRUN.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSMPENG.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSSECES.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SPYBOTSD.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\ZLCLIENT.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MPCMDRUN.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSMPENG.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSSECES.EXE -> DEBUGGER detectado: SecHijack (A)
Value: HKEY_USERS\S-1-5-21-2172032273-4216305309-2282011400-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE -> WINDOWS BASE BRANDING detectado: Backdoor.Win32.DarkKomet (A)
Value: HKEY_USERS\S-1-5-21-2172032273-4216305309-2282011400-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE -> WINDOWS BASE BRANDING detectado: Backdoor.Win32.DarkKomet (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0} detectado: Application.AdGenie (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{4820778D-AB0D-6D18-C316-52A6A0E1D507} detectado: Application.AdGenie (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} detectado: Application.AdFix (A)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$R0AGFM5.exe detectado: Adware.Generic.1227613 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$R7EVBVJ.exe detectado: Gen:Variant.Kazy.597393 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$RC04V61.exe detectado: Gen:Variant.Adware.Mplug.36 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$RONTL6V.exe detectado: Gen:Variant.Kazy.597380 (B)
C:\ProgramData\27218346293184.exe detectado: Gen:Variant.Zusy.79803 (B)
C:\ProgramData\{055f4833-d10f-6d47-055f-f4833d1020cf}\Adobe illustrator cs6 Serial number Crack Rar Download.exe detectado: Gen:Variant.Adware.Mplug.36 (B)
C:\Users\Administrador\AppData\Roaming\Macromedia\AMD External Events Client.exe detectado: Gen:Variant.Kazy.271075 (B)
C:\Users\Administrador\AppData\Roaming\Macromedia\MsMpCom.exe detectado: Gen:Variant.Zusy.79803 (B)
C:\Users\Quadcore\AppData\Local\Google\Chrome\User Data\Backup Default\Extensions\pgmnfpmhdanicbahccgohnanecaphfmb\117\content.js detectado: Adware.MPlug.EK (B)
C:\Users\Quadcore\AppData\Local\Google\Chrome\User Data\Backup Default\Extensions\pgmnfpmhdanicbahccgohnanecaphfmb\117\lsdb.js detectado: Adware.MPlug.EK (B)
C:\Users\Quadcore\AppData\Local\Temp\Adobe illustrator cs6 crack dll files 32bit 64bit__10924_i1501199454_il2048659.exe detectado: Gen:Variant.Adware.Strictor.83379 (B)
C:\Users\Quadcore\AppData\Local\Temp\ebjcabfbdfcce.exe detectado: Gen:Variant.Adware.Mikey.11942 (B)
C:\Users\Quadcore\AppData\Local\Temp\setup.exe detectado: Dropped:Adware.Generic.1228641 (B)
C:\Users\Quadcore\AppData\Roaming\Macromedia\AMD External Events Client.exe detectado: Gen:Variant.Kazy.271075 (B)
C:\Users\Quadcore\AppData\Roaming\Macromedia\MsMpCom.exe detectado: Gen:Variant.Zusy.79803 (B)
C:\Users\Quadcore\Downloads\Final Fantasy X-2 OST - Besaid.exe detectado: Adware.MultiPlug.JC (B)
C:\Users\Quadcore\Downloads\Herramienta_de_reparación_de_Error_500 java.lang.nullpointerexception__WinThruster.exe detectado: Application.Win32.AdTweak (A)
C:\Users\Quadcore\LUIS ADOLFO\Five Nights at Freddys, juguetes cobran vida[Mega] (1).exe detectado: Gen:Variant.Adware.Mplug.21 (B)
C:\Users\Quadcore\LUIS ADOLFO\Five Nights at Freddys, juguetes cobran vida[Mega].exe detectado: Gen:Variant.Adware.Mplug.21 (B)
C:\Windows\AutoKMS\AutoKMS.exe detectado: Trojan.Win32.Agent (A)
C:\Windows\Setup\Scripts\win7T.exe detectado: Riskware.Win32.HackTool (A)
C:\{$1284-9213-2940-1289$}\svchost.exe detectado: Gen:Variant.Zusy.79803 (B)
 
Analyzed 189605
Found  52
 
End of the Analysis: 27/04/2015 01:05:08 p.m.
Duration: 0:50:53
 
C:\{$1284-9213-2940-1289$}\svchost.exe En cuarentena Gen:Variant.Zusy.79803 (B)
C:\Windows\Setup\Scripts\win7T.exe En cuarentena Riskware.Win32.HackTool (A)
C:\Windows\AutoKMS\AutoKMS.exe En cuarentena Trojan.Win32.Agent (A)
C:\Users\Quadcore\LUIS ADOLFO\Five Nights at Freddys, juguetes cobran vida[Mega].exe En cuarentena Gen:Variant.Adware.Mplug.21 (B)
C:\Users\Quadcore\LUIS ADOLFO\Five Nights at Freddys, juguetes cobran vida[Mega] (1).exe En cuarentena Gen:Variant.Adware.Mplug.21 (B)
C:\Users\Quadcore\Downloads\Herramienta_de_reparación_de_Error_500 java.lang.nullpointerexception__WinThruster.exe En cuarentena Application.Win32.AdTweak (A)
C:\Users\Quadcore\Downloads\Final Fantasy X-2 OST - Besaid.exe En cuarentena Adware.MultiPlug.JC (B)
C:\Users\Quadcore\AppData\Roaming\Macromedia\MsMpCom.exe En cuarentena Gen:Variant.Zusy.79803 (B)
C:\Users\Quadcore\AppData\Roaming\Macromedia\AMD External Events Client.exe En cuarentena Gen:Variant.Kazy.271075 (B)
C:\Users\Quadcore\AppData\Local\Temp\setup.exe En cuarentena Dropped:Adware.Generic.1228641 (B)
C:\Users\Quadcore\AppData\Local\Temp\ebjcabfbdfcce.exe En cuarentena Gen:Variant.Adware.Mikey.11942 (B)
C:\Users\Quadcore\AppData\Local\Temp\Adobe illustrator cs6 crack dll files 32bit 64bit__10924_i1501199454_il2048659.exe En cuarentena Gen:Variant.Adware.Strictor.83379 (B)
C:\Users\Quadcore\AppData\Local\Google\Chrome\User Data\Backup Default\Extensions\pgmnfpmhdanicbahccgohnanecaphfmb\117\lsdb.js En cuarentena Adware.MPlug.EK (B)
C:\Users\Quadcore\AppData\Local\Google\Chrome\User Data\Backup Default\Extensions\pgmnfpmhdanicbahccgohnanecaphfmb\117\content.js En cuarentena Adware.MPlug.EK (B)
C:\ProgramData\{055f4833-d10f-6d47-055f-f4833d1020cf}\Adobe illustrator cs6 Serial number Crack Rar Download.exe En cuarentena Gen:Variant.Adware.Mplug.36 (B)
C:\ProgramData\27218346293184.exe En cuarentena Gen:Variant.Zusy.79803 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$RONTL6V.exe En cuarentena Gen:Variant.Kazy.597380 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$RC04V61.exe En cuarentena Gen:Variant.Adware.Mplug.36 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$R7EVBVJ.exe En cuarentena Gen:Variant.Kazy.597393 (B)
C:\$Recycle.Bin\S-1-5-21-2172032273-4216305309-2282011400-1000\$R0AGFM5.exe En cuarentena Adware.Generic.1227613 (B)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} En cuarentena Application.AdFix (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{4820778D-AB0D-6D18-C316-52A6A0E1D507} En cuarentena Application.AdGenie (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0} En cuarentena Application.AdGenie (A)
C:\Users\Administrador\AppData\Roaming\msconfig.ini En cuarentena Trojan-Ransom.Urausy (A)
C:\Users\Quadcore\AppData\Roaming\msconfig.ini En cuarentena Trojan-Ransom.Urausy (A)
C:\ProgramData\apn En cuarentena Application.AppInstall (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\{12A61307-94CD-4F8E-94BC-918E511FAA81} En cuarentena Application.Bundle (A)
Key: HKEY_USERS\S-1-5-18\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} En cuarentena Application.Bundle (A)
Key: HKEY_USERS\S-1-5-21-2172032273-4216305309-2282011400-1000\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} En cuarentena Application.Bundle (A)
C:\Users\Quadcore\AppData\Roaming\EZDownloader\ En cuarentena Application.Bundle (A)
 
Quarantine 30
 
 
I Couldnt install the malwarebytes...It throws me a runtime error beginning in "ED..." blabla whatever.
Thank you in advance for all the help T.T. Love you in secret (L) haha xD
 

 



#4 Sintharius

Sintharius

    Bleepin' Sniper


  • Members
  • 5,639 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:01:11 PM

Posted 27 April 2015 - 02:59 PM

Your situation will need a deeper look by a Malware Response Team member.

Please follow the instructions in ==>This Guide<== starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

Once you have posted your log, please reply here with a link to the topic so this can be closed.

Thank you.

Regards,
Alex

#5 Queen-Evie

Queen-Evie

    Official Bleepin' G.R.I.T.S. (and proud of it)


  • Members
  • 16,485 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:My own little corner of the universe (somewhere in Alabama). It's OK, they know me here
  • Local time:07:11 AM

Posted 27 April 2015 - 04:10 PM

FRST log posted in Malware Removal Logs here http://www.bleepingcomputer.com/forums/t/574570/im-infected-with-this-virus-name-27218346293184/

 

Now that you have posted that log

 

Please refrain from asking for further help from other members or staff until the Malware Removal Team has checked your posted log. The Malware Removal Team work very hard to investigate a unique solution to your problem and you will receive individual expert assistance. This takes time and effort so we ask you to please be patient while waiting for assistance and NOT to make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member. Any modifications you make on your own can result in system changes which may not show it the log you already posted. Further, following advice outside of that post may cause confusion for the team member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.


 

The Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean. If you followed any other advice already, please ensure you inform the Malware Removal Team Team Helper when they respond to assist you with your log. This will help them know what has been done and they probably will ask for an updated log.

 

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Removal Team member is already assisting you and not open the thread to respond.


 

If HelpBot replies to your topic, please follow Step One so it will report your topic to the team members.

 

This topic is closed.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users