Jump to content

ladeekatt

Members
  • Posts

    17
  • Joined

  • Last visited

Everything posted by ladeekatt

  1. Got home and tried to update and it tells me: "An error has occurred" MBAM_ERROR_UPDATING (0, 0, SHRegGetPath) How do we updated it if this is happening? Thanks
  2. Hello Manic, I am Ladeekatt's Fiance. She had surgery yesterday, we are not home at this time to work on this issue. Thank you VERY much for your help! We will be back to you as soon as possible. Thanks again and take care. Cale "skippy"
  3. "Some items could not be removed. Your computer needs to be restarted, click here to re-boot" Clicked yes System rebooted, here is the updated log file as requested. Malwarebytes' Anti-Malware 1.45 www.malwarebytes.org Database version: 3930 Windows 5.1.2600 Service Pack 3 Internet Explorer 7.0.5730.11 4/12/2010 7:17:20 PM mbam-log-2010-04-12 (19-17-20).txt Scan type: Quick scan Objects scanned: 111794 Time elapsed: 8 minute(s), 12 second(s) Memory Processes Infected: 0 Memory Modules Infected: 2 Registry Keys Infected: 7 Registry Values Infected: 2 Registry Data Items Infected: 9 Folders Infected: 2 Files Infected: 24 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: c:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo) -> Delete on reboot. Registry Keys Infected: HKEY_CLASSES_ROOT\CLSID\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Plus (Rogue.AntivirusPlus) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lafeposud (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gehuzunebu (Trojan.Vundo) -> Quarantined and deleted successfully. Registry Data Items Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\wesagibu.dll -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\wesagibu.dll -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe") Good: (firefox.exe) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{ae144c3e-9766-4aa3-afdb-1aeb1578bc2a}\NameServer (Trojan.DNSChanger) -> Data: 83.149.115.157,4.2.2.1,66.76.227.40 208.180.42.68 -> Quarantined and deleted successfully. Folders Infected: C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Application Data\AntiVirus Plus (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. Files Infected: C:\WINDOWS\system32\dagubawe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\homefebe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jahokono.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\mabohoje.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\riguhoyu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ruyalopa.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\zurapoju.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Application Data\AntiVirus Plus\AntiVirus Plus.55532.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\fabapufu.exe (Trojan.Dropper) -> Quarantined and deleted successfully. C:\WINDOWS\system32\hofogiyi.exe (Trojan.Dropper) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\55PNYUC4\avplus[1].dll (Rogue.AntivirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\R6E02A0K\avplus[1].dll (Rogue.AntivirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\EULA.url (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\Uninstall.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Application Data\avp.ico (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\WINDOWS\system32\config\systemprofile\Desktop\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\All Users\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully. C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> Quarantined and deleted successfully. I'm not touching ANYTHING until I hear back from you! (remember, I'm on my laptop/non-infected computer) Thank you, Borislav, for the time you've put in for me even just today!
  4. Okay, here is the log. Malwarebytes' Anti-Malware 1.45 www.malwarebytes.org Database version: 3930 Windows 5.1.2600 Service Pack 3 Internet Explorer 7.0.5730.11 4/12/2010 7:07:13 PM mbam-log-2010-04-12 (19-07-13).txt Scan type: Quick scan Objects scanned: 111794 Time elapsed: 8 minute(s), 12 second(s) Memory Processes Infected: 0 Memory Modules Infected: 2 Registry Keys Infected: 7 Registry Values Infected: 2 Registry Data Items Infected: 9 Folders Infected: 2 Files Infected: 24 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: c:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo) -> No action taken. Registry Keys Infected: HKEY_CLASSES_ROOT\CLSID\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe (Security.Hijack) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Plus (Rogue.AntivirusPlus) -> No action taken. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lafeposud (Trojan.Vundo.H) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gehuzunebu (Trojan.Vundo) -> No action taken. Registry Data Items Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\wesagibu.dll -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\wesagibu.dll -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe") Good: (firefox.exe) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{ae144c3e-9766-4aa3-afdb-1aeb1578bc2a}\NameServer (Trojan.DNSChanger) -> Data: 83.149.115.157,4.2.2.1,66.76.227.40 208.180.42.68 -> No action taken. Folders Infected: C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Application Data\AntiVirus Plus (Rogue.AntiVirusPlus) -> No action taken. Files Infected: C:\WINDOWS\system32\dagubawe.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\homefebe.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\jahokono.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\mabohoje.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\riguhoyu.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\ruyalopa.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> No action taken. C:\WINDOWS\system32\zurapoju.dll (Trojan.Vundo.H) -> No action taken. C:\Documents and Settings\Katt\Application Data\AntiVirus Plus\AntiVirus Plus.55532.dll (Trojan.FakeAlert) -> No action taken. C:\WINDOWS\system32\fabapufu.exe (Trojan.Dropper) -> No action taken. C:\WINDOWS\system32\hofogiyi.exe (Trojan.Dropper) -> No action taken. C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\55PNYUC4\avplus[1].dll (Rogue.AntivirusPlus) -> No action taken. C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\R6E02A0K\avplus[1].dll (Rogue.AntivirusPlus) -> No action taken. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\EULA.url (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\Uninstall.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> No action taken. C:\Documents and Settings\Katt\Application Data\avp.ico (Rogue.AntiVirusPlus) -> No action taken. C:\WINDOWS\system32\config\systemprofile\Desktop\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\All Users\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken. C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> No action taken. Since you are offline, I'm going to assume action should be taken, plus who knows how long I'll be allowed to keep this program running? I'll go ahead with Mbam's recommendations to remove the files, and post an updated log of the progress. Thanks.
  5. Holy poo, it's scanning! Quick scan. It's still scanning, but it's showing 20 items already. When it's done, I'll post the log to you, but in the mean time, should I allow Mbam to deal with the files as it sees fit, or leave it alone until you see it?
  6. I've run the fix-reg, and installed the mbam-rules, but now can't find the .exe file for mbam rules. *note - When installing the mbam-rules program, it gave me choice of language, the said malwarebyte's anti-malware is ready to install, without the option of where to install it, or anything else. When clicked OK to install, it says the program was installed successfully, but I can't find it anywhere. If I run the file "firefox.com" (that we changed from above) I get an error telling me that the current database is not supported by this version of malwarebyte's anti-malware, please download the latest version of the program.
  7. Well, I got Mbam to load, but when I clicked udate, I got an error "MBAM_ERROR_UPDATING (0, 0,SHRegGetPath)" Should I go ahead with a full scan any way?
  8. Hello, Borislav. Thank you for offering your help with this *grumble* problem. I followed the instructions that you provided, and while I was hopeful that we were getting past this malware with this trick, the same thing occured. I had to actually download the randomly named Mbam fille to a flash drive off the internet from my laptop, because I couldn't download it wih my desktop (infected computer). Aftr pasting the .exe file in the Malwarebyte's Anti-Malware folder, I double clicked the .exe file and nothing happened. I also tried to rename the file explorer.exe, but still nothing happened. Mbam just isn't allowed to run in any way shape or form.
  9. *UPDATE* After a whole lot more research, it appears we have been infected by AVE.exe FakeRean. I altered the registry with a file called trojan_fakerean_exe_fix.reg, and then was supposed to be able to execute the Mbam, however, while installing I got the error message,"unable to execute file C://programfiles/malewarebyte's anti-malware/mbam.exe create process failed code:2" Any ideas??
  10. *re-posted from general board* NOTE - I was directed to here (http://forums.malwarebytes.org/index.php?showtopic=9573) but since I can't even install Mbam, I'm stuck at the starting point. Can someone tell me where to go from here? Read below to see what I've done thus far. Thank you! *2nd time asking for help* My desktop is infected with that ridiculous fake XP SecurityCenter. It made my existing Mbam program stop working, so I tried to uninstall it and reinstall, but every time I try to run the mbam.exe, absolutely nothing happens. The exe file won't begin to run. I also tried changing the exe file name, to no avail. I have read all of the information on this page, http://forums.malwarebytes.org/index.php?showtopic=17607. My problem was obviously the 4th problem, and all of the symptoms listed matched perfectly. I downloaded the RootRepeal program, ran it, but found no .sys files to delete. I'll post the RootRepeal file below. I don't know where to turn next. wacko.gif Could someone please advise? Copied Log File Scan Start Time: 2010/04/03 18:37 Program Version: Version 1.3.5.0 Windows Version: Windows XP SP3 ================================================== Hidden/Locked Files ------------------- Path: C:\WINDOWS\system32\jofifeti.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\mabohoje.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\resoguli Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\ruyalopa.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\security\logs\convert.log Status: Visible to the Windows API, but not on disk. ==EOF==
  11. *2nd time asking for help* My desktop is infected with that ridiculous fake XP SecurityCenter. It made my existing Mbam program stop working, so I tried to uninstall it and reinstall, but every time I try to run the mbam.exe, absolutely nothing happens. The exe file won't begin to run. I also tried changing the exe file name, to no avail. I have read all of the information on this page, http://forums.malwarebytes.org/index.php?showtopic=17607. My problem was obviously the 4th problem, and all of the symptoms listed matched perfectly. I downloaded the RootRepeal program, ran it, but found no .sys files to delete. I'll post the RootRepeal file below. I don't know where to turn next. Could someone please advise? Copied Log File Scan Start Time: 2010/04/03 18:37 Program Version: Version 1.3.5.0 Windows Version: Windows XP SP3 ================================================== Hidden/Locked Files ------------------- Path: C:\WINDOWS\system32\jofifeti.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\mabohoje.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\resoguli Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\ruyalopa.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\security\logs\convert.log Status: Visible to the Windows API, but not on disk. ==EOF==
  12. Just to make sure I couldn't install MBAM, I tried the suggestion to change the .exe file's name to mbam-setup.com. Nothing happened. No program began installing. Please help!!!
  13. I originally posted because I have downloaded MBAM to remove an infection (XP SecurityCeneter, or XP SecurityTool, it uses both names) on my desktop (on my laptop now), and I was directed here: http://forums.malwarebytes.org/index.php?showtopic=12709 I used the RootRepeal, and when I checked the file for the .sys file, there wasn't one. I am poting a copy of the log below, maybe someone here can help me figure out the problem? Thanks in advance for any help you can provide! Copied Log File Scan Start Time: 2010/04/03 18:37 Program Version: Version 1.3.5.0 Windows Version: Windows XP SP3 ================================================== Hidden/Locked Files ------------------- Path: C:\WINDOWS\system32\jofifeti.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\mabohoje.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\resoguli Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\ruyalopa.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\security\logs\convert.log Status: Visible to the Windows API, but not on disk. ==EOF==
  14. Looks like I'll need help figuring which files to delete when I pull the log file from Root Repeal. I'll have to tackle it after work tonight. Thanks for the information. I'll be back later on tonight or tomorrow.
  15. I've downloaded the program Malwarebyte's Anti=Malware, and now when I click "run"...............(nothing happens)? I d/l'd the program due to the ridiculous "XP SecurityCenter" (thank you Firefox). I downloaded to Anti-Malware to my desktop, so I don't see why when I click to run it, I get nothing. Any suggestions?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.