Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

RegSvcs.exe - Win32/Fynloski.AM Trojan horse


  • This topic is locked This topic is locked
12 replies to this topic

#1 Stark85

Stark85

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 13 July 2015 - 11:35 AM

Hello,

 

My OS:

Windows 7 Ultimate 64 bit

 

Today I got a virus on my computer from an iphone program that I downloaded. ESET detected this virus and removed it but when I reboot my PC it comes back, then ESET removes it again and it comes back again after a restart. It keeps doing this.

I also tried Hitman Pro and Malwarebytes to no avail.

The virus is inside the file RegSvcs.exe and it says that it''s Win32/Fynloski.AM Trojan horse virus.

 

I also made a FRST scan, see the logs I added.

 

Thank you.

Attached Files



BC AdBot (Login to Remove)

 


#2 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 14 July 2015 - 03:49 AM

Hi there,
my name is Marius and I will assist you with your malware related problems.

Before we move on, please read the following points carefully.

  • First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while following my instructions, Stop there and tell me the exact nature of your problem.
  • Do not run any other scans without instruction or add/remove software unless I tell you to do so. This would change the output of our tools and could be confusing for me.
  • Post all logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.
  • If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.
  • Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.
  • My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.

 

 

Please post the content of C:\combofix.txt...:rolleyes:


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#3 Stark85

Stark85
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 14 July 2015 - 09:41 AM

Hi Marius,

 

There is no combofix.txt I uninstalled it yesterday.


Edited by Stark85, 14 July 2015 - 02:11 PM.


#4 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 15 July 2015 - 05:48 AM

Fix with FRST (normal mode)

WARNING: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
 

  • Download the attached fixlist.txt and save it to the location where FRST is saved to.
  • Run FRST.exe (on 64bit, run FRST64.exe) and press the Fix button just once and wait.
  • The tool will make a log (Fixlog.txt) which you find where you saved FRST. Please post it to your reply.

Full System Scan with Malwarebytes Antimalware



  • If not existing, please download Malwarebytes Anti-Malware to your desktop.
  • Double-click the downloaded setup file and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.

If the program is already installed:

  • Run Malwarebytes Antimalware
  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.

  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

Scan with ESET Online Scan

Please go to here to run the online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings and ensure these options are ticked:
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click Scan
  • Wait for the scan to finish
  • If any threats were found, click the 'List of found threats' , then click Export to text file....
  • Save it to your desktop, then please copy and paste that log as a reply to this topic.

 

Attached Files


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#5 Stark85

Stark85
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 15 July 2015 - 12:41 PM

FRST Fixlog:

 

Fix result of Farbar Recovery Scan Tool (x64) Version:13-07-2015
Ran by RoB at 2015-07-15 19:07:19 Run:1
Running from C:\Users\RoB\Desktop
Loaded Profiles: RoB (Available Profiles: RoB)
Boot Mode: Normal
==============================================

fixlist content:
*****************
SearchScopes: HKU\S-1-5-21-932080124-3264678572-2123331715-1000 -> {6E25FC30-701A-418D-8FE4-20D488F38ADC} URL =
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-932080124-3264678572-2123331715-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKLM-x32\...\Run: [gysUpdate] => C:\Users\RoB\AppData\Roaming\uvwmf\mqnnd.rrt [1139190 2015-06-14] ()

2014-08-14 19:04 - 2014-08-14 19:04 - 0000057 _____ () C:\ProgramData\Ament.ini
2015-01-04 15:17 - 2015-01-04 15:17 - 0000024 ___SH () C:\Users\RoB\AppData\Roaming\System5908ConfigCollection.dat
2013-02-23 11:27 - 2013-02-23 11:27 - 0000022 ___SH () C:\Users\RoB\AppData\Roaming\Windows1569_SettingsRepository.bin
C:\Users\RoB\AppData\Roaming\uvwmf

CloseProcesses:
EmptyTemp:
Reboot:
*****************

"HKU\S-1-5-21-932080124-3264678572-2123331715-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6E25FC30-701A-418D-8FE4-20D488F38ADC}" => key removed successfully
HKCR\CLSID\{6E25FC30-701A-418D-8FE4-20D488F38ADC} => key not found.
"HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully
"HKU\S-1-5-21-932080124-3264678572-2123331715-1000\SOFTWARE\Policies\Microsoft\Internet Explorer" => key removed successfully
HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\gysUpdate => value removed successfully
C:\ProgramData\Ament.ini => moved successfully.
C:\Users\RoB\AppData\Roaming\System5908ConfigCollection.dat => moved successfully.
C:\Users\RoB\AppData\Roaming\Windows1569_SettingsRepository.bin => moved successfully.
C:\Users\RoB\AppData\Roaming\uvwmf => moved successfully.
Processes closed successfully.
EmptyTemp: => 292.1 MB temporary data Removed.

The system needed a reboot..

==== End of Fixlog 19:07:25 ====

 

Malwarebytes log:

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scandatum: 15-7-2015
Scantijd: 19:10:24
Logbestand:
Beheerder: Ja

Versie: 2.01.6.1022
Malware Gegevensbestand: v2015.07.15.05
Rootkit Gegevensbestand: v2015.07.15.01
Licentie: Premium
Malwarebescherming: Ingeschakeld
Kwaadaardige Website Bescherming: Ingeschakeld
Zelfbescherming: Uitgeschakeld

Besturingssysteem: Windows 7 Service Pack 1
Processor: x64
Bestandssysteem: NTFS
Gebruiker: RoB

Scantype: Bedreigingsscan
Resultaat: Voltooid
Objecten Gescand: 370307
Verstreken Tijd: 4 m, 16 s

Geheugen: Ingeschakeld
Opstarten: Ingeschakeld
Bestandssysteem: Ingeschakeld
Archieven: Ingeschakeld
Rootkits: Uitgeschakeld
Heuristiek: Ingeschakeld
POP: Waarschuwen
POA: Ingeschakeld

Processen: 0
(Geen kwaadaardige items gedetecteerd)

Modules: 0
(Geen kwaadaardige items gedetecteerd)

Registersleutels: 1
Malware.Trace, HKU\S-1-5-21-932080124-3264678572-2123331715-1000\SOFTWARE\DC3_FEXEC, In Quarantaine, [de33e8fa3555d264e221c825e81bd22e],

Registerwaardes: 0
(Geen kwaadaardige items gedetecteerd)

Registerdata: 1
PUM.Disabled.SecurityCenter, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER|UpdatesDisableNotify, 1, Goed: (0), Slecht: (1),Vervangen,[3ad73ba7b0dae5512672d55636cfc63a]

Mappen: 1
Stolen.Data, C:\Users\RoB\AppData\Roaming\dclogs, In Quarantaine, [3bd662805c2ea0964c1c7e9d55af6997],

Bestanden: 3
Stolen.Data, C:\Users\RoB\AppData\Roaming\dclogs\2015-07-13-2.dc, In Quarantaine, [3bd662805c2ea0964c1c7e9d55af6997],
Stolen.Data, C:\Users\RoB\AppData\Roaming\dclogs\2015-07-14-3.dc, In Quarantaine, [3bd662805c2ea0964c1c7e9d55af6997],
Stolen.Data, C:\Users\RoB\AppData\Roaming\dclogs\2015-07-15-4.dc, In Quarantaine, [3bd662805c2ea0964c1c7e9d55af6997],

Fysieke Sectoren: 0
(Geen kwaadaardige items gedetecteerd)

(end)

 

ESET Log:

 

E:\Downloads\Call of duty 4 [PC-DVD] [English]\crack\rzr-cod4.exe Win32/Keygen.DK potentially unsafe application
E:\Downloads\CCleaner Professional  Business  Technician 5015075 Nederlands\ccsetup501.exe Win32/Bundled.Toolbar.Google.D potentially unsafe application
E:\Downloads\CCleaner Professional  Business  Technician 5035128 Nederlands\ccsetup503.exe Win32/Bundled.Toolbar.Google.D potentially unsafe application
E:\Downloads\Dying Light [RePack]\Setup.exe Win32/Adware.Adverttraff.A application
E:\Downloads\FarCry4Updatev15-RELOADED\Crack\bin\steam_api.dll Win32/HackTool.Crack.CS potentially unsafe application
E:\Downloads\_UNPACK_Free YouTube Download\Free YouTube Download\FreeStudio.exe a variant of Win32/OpenCandy.C potentially unsafe application
E:\Downloads\_UNPACK_Free YouTube Download\Free YouTube Download\FreeYouTubeDownload.exe a variant of Win32/OpenCandy.C potentially unsafe application
E:\Downloads\_UNPACK_Free YouTube Download\Free YouTube Download\FreeYouTubeToMP3Converter.exe a variant of Win32/OpenCandy.C potentially unsafe application
 



#6 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 16 July 2015 - 01:53 AM

The files detected by ESET aren´t malware but contain security risks - I´d delete them immediately, your choice!

Stop using cracks!

 

 

Then we can do the cleanup - if you are facing any issues, report that immediately.

Delete junk with adwCleaner


Please download AdwCleaner to your desktop.


  • Run adwcleaner.exe
  • Hit Scan and wait for the scan to finish.
  • Confirm the message but don´t uncheck anything.
  • Hit Clean
  • When the run is finished, it will open up a text file
  • Please post its contents within your next reply
  • You´ll find the log file at C:\AdwCleaner[S1].txt also




Delete junk with JRT

thisisujrt.gif Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.




SecurityCheck

Reboot your system before starting!

Please download SecurityCheck: LINK1 LINK2

  • Save it to your desktop, start it and follow the instructions in the window.
  • After the scan finished the (checkup.txt) will open. Copy its content to your thread.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#7 Stark85

Stark85
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 16 July 2015 - 09:03 AM

Yeah my dad likes to play FPS games. I am just trying to remove this virus for him, it's his PC. I'll talk to him about the crack stuff.

 

# AdwCleaner v4.208 - Logbestand aangemaakt 16/07/2015 op 15:54:07
# Laatste update 09/07/2015 door Xplode
# Database : 2015-07-15.1 [Server]
# Besturingssysteem : Windows 7 Ultimate Service Pack 1 (x64)
# Gebruikersnaam : RoB - ROBPC
# Gestart vanuit : C:\Users\RoB\Desktop\adwcleaner_4.208.exe
# Optie : Verwijderen

***** [ Services ] *****

***** [ Bestanden / Mappen ] *****

Map Verwijderd : C:\ProgramData\ParetoLogic
Map Verwijderd : C:\Users\RoB\AppData\Roaming\DriverCure
Map Verwijderd : C:\Users\RoB\AppData\Roaming\dvdvideosoftiehelpers
Map Verwijderd : C:\Users\RoB\AppData\Roaming\ParetoLogic
Map Verwijderd : C:\Users\RoB\AppData\Roaming\RHEng

***** [ Geplande taken ] *****

***** [ Snelkoppelingen ] *****

***** [ Register ] *****

Sleutel Verwijderd : HKLM\SOFTWARE\Classes\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}
Sleutel Verwijderd : HKLM\SOFTWARE\Classes\CLSID\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
Sleutel Verwijderd : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
Sleutel Verwijderd : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
Sleutel Verwijderd : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
Sleutel Verwijderd : [x64] HKLM\SOFTWARE\Classes\CLSID\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}
Gegevens Verwijderd : HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings [ProxyOverride] - <-loopback>

***** [ Webbrowsers ] *****

-\\ Internet Explorer v11.0.9600.17909

-\\ Mozilla Firefox v

-\\ Google Chrome v

*************************

AdwCleaner[R0].txt - [1794 bytes] - [16/07/2015 15:52:38]
AdwCleaner[S0].txt - [1739 bytes] - [16/07/2015 15:54:07]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1798  bytes] ##########

 

 

JRT:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.5.0 (07.15.2015:1)
OS: Windows 7 Ultimate x64
Ran by RoB on do 16-07-2015 at 15:55:47,25
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Tasks

 

~~~ Registry Values

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

~~~ Chrome

[C:\Users\RoB\appdata\local\Google\Chrome\User Data\Default\Preferences] - default search provider reset

[C:\Users\RoB\appdata\local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:

[C:\Users\RoB\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset

[C:\Users\RoB\appdata\local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on do 16-07-2015 at 15:57:31,62
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 

Checkup:

 

 Results of screen317's Security Check version 1.005 
 Windows 7 Service Pack 1 x64 (UAC is disabled!) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Security Center service is not running! This report may not be accurate!
ESET Smart Security 6.0  
 Antivirus out of date! 
`````````Anti-malware/Other Utilities Check:`````````
 TuneUp Utilities Language Pack (en-US)
 Java 8 Update 45 
 Adobe Reader XI 
````````Process Check: objlist.exe by Laurent```````` 
 ESET NOD32 Antivirus egui.exe 
 ESET NOD32 Antivirus ekrn.exe 
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 38% Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````
 


Edited by Stark85, 16 July 2015 - 09:04 AM.


#8 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 16 July 2015 - 09:12 AM

Are any problems left or may I post the final reply?


Edited by TB-Psychotic, 16 July 2015 - 09:12 AM.

Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#9 Stark85

Stark85
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 16 July 2015 - 10:34 AM

No problems anymore, I think. Looks good.



#10 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 17 July 2015 - 04:05 AM

Your system is clean now! :)

 

Update your Antivirus!

 

Defrag your hard drive
 
Your hard drive is heavily fragmented. This may result in performance losses. If it is NOT an SSD drive, use a tool like Auslogic DiskDefrag to defrag the drive. Attention - uncheck any additional software the setup provides.

 

 

Uninstall our tools using delfix

Please follow these steps in order:

  • In the case we used Defogger to turn off your CD emulation software. You can start it again and use the Enable button.
  • In the case we used Combofix. Deactivate your antivirus software once more, then rename the combofix.exe to uninstall.exe and run it one last time. You shall be noted that Combofix has been removed.
  • In any case please download delfix to your desktop.
    • Close all other programms and start delfix.
    • Please check all the boxes and run the tool.
    • delfix will now delete all found traces of our removal process
  • If there is still something left please delete it manualy.




Delete System Restore Points

To ensure your System Restore Points are free of malware, we will delete all of them but the most recent or create a new one.

On Windows Vista: Please follow these instructions to delete all but the most common System Protection Restore Points.
On Windows 7/8: Please follow these instructions to delete all but the most common System Protection Restore Points.
On Windows XP: Please follow these instructions to delete all but the most common System Protection Restore Points.

 

 

 

Recommendations: How to protect yourself

  • System Updates
    Please ensure to have automatic updates activated in your control panel.
    For further information and a tutorial, see this Microsoft Support article.
  • Protection
    What you need is one (not more) virus scanner with background protection. Additionally I recommend a special malware scanner to run on demand weekly.
    Personally I am using avast! Antivirus Free Edition and Malwarebytes Anti-Malware. They offer good protection for free.
    • To keep your browser free of advertising, you may install the Adblock Plus browser extension.
      It will filter unwanted advertising out of the website´s content.
    • To protect yourself from accidentally visiting malicious web sites, install the Web of Trust (WOT) browser extension.
      It will display a green (safe), yellow (unknown) or red (potentially dangerous) icon for a visited website within your browser.
      In addition, before accessing a dangerous classified web site, a warning screen is displayed.

  • Up to date Software
    Keep your Windows and your third party software up to date. The easiest way to get infected is an outdated windows, followed by: browser(s) (including add-ons and plug-ins), Adobe Flash Player and Adobe Reader, Java Runtime Environment, your antivirus program and so on. These links may help you to check:

  • Backup
    Hardware issues, malware, fire, lightning strike: There is a long list of different ways to loose all your data. Back up your files regularly. Use the windows internal backup function or a third party tool and save your data onto an external hard drive, cloud storage, optical media like CDs or DVDs or (if available) a professional network backup system.
  • Behaviour
    The commonest error when using a computer is "error 80" - what means that the error is located about 80cm in front of the monitor. This is a common joke between IT support technicians but it shows that all the safety mechanisms won´t help if you aren´t careful enough.
    • While surfing the internet, don´t click on anything you don´t know. In the worst case, it infects your system with malware.
    • Watch your step in social networks! Many cyber criminals use them to spread malware, mine personal pata (to be sold to advertising companies, for example) or simply do damage to other users. Even if a received hyperlink within a message seems to be coming from one of your friends, have a closer look. In addition, don´t click everything.
    • When installing software, have a look to each of the setup windows and uncheck any additional toolbars or free programs that may be offered additionally. Most of today´s setup procedures contain potentially unwanted programs so keep them off your system.
    • Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.
      They are a security risk which can make your computer susceptible to a wide variety of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#11 Stark85

Stark85
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:10 PM

Posted 17 July 2015 - 09:39 AM

Alright, thanks a lot for the help.

On behalf of my dad he's happy his PC is virus free again! :)



#12 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 17 July 2015 - 09:41 AM

You´re welcome! :)


Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)

#13 TB-Psychotic

TB-Psychotic

  • Malware Response Team
  • 6,349 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:10 PM

Posted 17 July 2015 - 09:41 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
Proud Member of UNITE & TB
 
My help is free, however, if you want to support my fight against malware, click here --> btn_donate_SM.gif <--(no worries, every little bit helps)




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users