Jump to content

Recommended Posts

Got a new SSD hard drive and while I was trying to update my Flash plugins for Mozilla Firefox, I selected a website at the top of my Google search that turned out to install Vosteran on my pc. I interrupted the install and manually deleted the Vosteran software using Windows Uninstall feature from the Control Panel, but whenever I run my MalwareBytes Premium, it finds about 18 examples of "C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js".

 

I would very much like this to go away. Is there anything more that can be done?

Link to post
Share on other sites

I guess I should include my log. Sorry about that.

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 12/28/2014
Scan Time: 11:33:52 AM
Logfile: MWB02.txt
Administrator: Yes

Version: 2.00.4.1028
Malware Database: v2014.12.28.07
Rootkit Database: v2014.12.23.02
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Darin

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 320431
Time Elapsed: 4 min, 53 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 18
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (user_pref("extensions.srchvstrn.tlbrSrchUrl", "http://Vosteran.com/?f=3F0AtBtABzzt&ir=&q=");),,[2222056195e712245fe502b4af56e11f]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: ("extensions.srchvstrn.tlbrSrchUrl", "http://Vosteran.com/),,[9fa540264c30a195c3816b4bfe076e92]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (697567&ir=");





user_pref("extensions.srchv), ,[ec581b4b0f6d013561e31a9ccf3640c0]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (1Qzu2697567&ir=");





user_pref("ex), ,[5de70e58a4d8f442172deaccff067f81]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (m/?fN2Y1L1Qzu2697567&ir=");





user_), ,[162ec0a657250531ea5a40769a6b7f81]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (/?fN2Y1L1Qzu2697567&ir=");





user_pref("exte), ,[72d2570f512bd264321260560df8629e]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (Qzu2697567&ir=");





user_pref("extensions.srchvst), ,[7aca5d09c4b846f02222962045c0de22]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (97567&ir=");





user_pref("extensions.srchvst), ,[e064ea7c4f2d78be2e16615564a1758b]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (Qzu2697567&ir=");





user_pref("extensions.srchvstrn.tl), ,[261eed79f983d4622b19d9dd0bfa09f7]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (&ir=");





user_pref("extensions.srchvstrn.t), ,[9aaa04628eeefb3bdb694c6aa36221df]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (1Qzu2697567&ir=");





user_pref("exte), ,[4df76ff73943b28466de1b9b31d48f71]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (?fN2Y1L1Qzu2697567&ir=");





user_pref("extensi), ,[59eb02642d4f96a00e366a4ca75e36ca]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (u2697567&ir=");





user_pref("extensio), ,[053f9cca225aea4ccb79fabc7392e11f]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (fN2Y1L1Qzu2697567&ir=");





user_pref("extensions.srchvstrn.tlbrSrchUrl", ), ,[f84ce97d1b61c76f390b6a4c34d1c937]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (user_pref("extensions.srchvstrn.tlbrSrchUrl", "ht), ,[192b333354285dd992b2bff79b6aef11]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (Y1L1Qzu2697567&ir=");





user_pref("extensi), ,[ed5770f6b1cb60d601432e88fe07ff01]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (L1Qzu2697567&ir=");





user_pref("extensions.srchvstrn.tlbrSrchUrl", "http://Vosteran.com/?f=3F0AtBtABzzt&ir=),,[0143f47281fb092ddf6512a4f5109070]
PUP.Optional.Vosteran, C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js, Good: (), Bad: (rSrchUrl", "http://Vosteran.com/?f=3F0At),,[d76d97cf4735c86e2d17cde9b64f26da]

Physical Sectors: 0
(No malicious items detected)


(end)

Link to post
Share on other sites

Hello and welome,

 

P2P/Piracy Warning:

 

If you're using Peer 2 Peer software such as uTorrent, BitTorrent or similar you must either fully uninstall them or completely disable them from running while being assisted here.Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.If you have illegal/cracked software, cracks, keygens etc. on the system, please remove or uninstall them now and read the policy on Piracy.

 

Next,

 

Download AdwCleaner by Xplode onto your Desktop.


Double click on Adwcleaner.exe to run the tool.
Click on Scan
Once the scan is done, click on the Clean button.
You will get a prompt asking to close all programs. Click OK.
Click OK again to reboot your computer.
A text file will open after the restart. Please post the content of that logfile in your reply.
You can also find the logfile at C:\AdwCleaner[sn].txt. Where n in the scan reference number

 

Next,

 

thisisujrt.gif Please download Junkware Removal Tool to your desktop.


Shut down your protection software now to avoid potential conflicts. (re-enable when done)
Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
The tool will open and start scanning your system.
Please be patient as this can take a while to complete depending on your system's specifications.
On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
Post the contents of JRT.txt into your next message.

 

Next,

 

Open Malwarebytes Anti-Malware, from the Dashboard please Check for Updates by clicking the Update Now... link

When the update completes select > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.

 

 

Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.

 

When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

 

 

In most cases, a restart will be required.

 

 

Wait for the prompt to restart the computer to appear, then click on Yes.

 

 

When the scan is completed from the main GUI click on History > Application Logs. Find your scan log, the date when run will identify it. Checkmark "select" box > then hit the "view" button. The history log window will open. At the bottom of that window are two options, "Copy to clipboard" and "Export"

Select > "Copy to clipboard" that copies the full log to the windows clipboard, so at your reply you right click into the text field and select "Paste" the log is pasted (copied) to  your reply.

 

Or select "Export" you are given the option to export as a Text file (*.txt) or XML file (*.xml) Choose text file, save the exported file to a place of your choice. That file can be attached to your reply...

 

Next,

 

Download Farbar Recovery Scan Tool and save it to your desktop.

 

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.


Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

Let me see those logs in your next reply, also give an update on any remaining issues or concerns...

 

Thank you,

 

Kevin...

Link to post
Share on other sites

From Adwcleaner:

 

# AdwCleaner v4.106 - Report created 28/12/2014 at 14:24:45
# Updated 21/12/2014 by Xplode
# Database : 2014-12-28.1 [Live]
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Darin - DARIN-PC
# Running from : C:\Users\Darin\Desktop\Downloads\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\Users\Darin\AppData\Local\Temp\AppEnable
Folder Deleted : C:\Users\Darin\Documents\Optimizer Pro
File Deleted : C:\Users\Darin\AppData\Roaming\Mozilla\Firefox\Profiles\8v0u1qzo.default\user.js

***** [ Scheduled Tasks ] *****

Task Deleted : UpdaterEX

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\PCProxy.DataContainer
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9DC8FA51-B596-4F77-802C-5B295919C205}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{22511E2E-7970-414E-BC7C-28D16C4AF54D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{23C5311E-016D-4999-BCB1-499898429D6C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2C4B6DB8-6413-403B-A038-16A352CFE8B9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{46803190-228D-470E-90FE-F5E0CEA9C4F2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5180FE16-2E09-497B-9C8B-5A6F029ECECB}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A4F6E1B3-469E-46EF-A936-FBA9D5EFD2B9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C97AF157-6A27-4F57-9D47-E2D3E4761B77}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{ED0D2C81-7DB5-4599-B7C0-1033418B5672}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{ED721A76-8160-4DA0-A18E-7FD7C4574774}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{3E28F712-0D6C-4EE3-AC8C-8F060F5D7C33}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{6CE321DA-DC11-45C6-A0FC-4E8A7D978ABC}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{6EEBC7FF-67DA-4B90-9251-C2C5696E4B48}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{74137531-80F7-406F-9543-7D11385FA8C8}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{832599B2-55BF-4437-8F3E-030CF5AEB262}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{9B7B034B-944A-4261-B487-862F642F7615}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{AE91F9CE-0900-4E2A-B673-F3F6E4FC54D9}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{B1A429DB-FB06-4645-B7C0-0CC405EAD3CD}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{DD67706E-819E-4EBD-BF8D-6D6147CC7A49}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{F62A4AF9-58B4-4FEC-89CC-D717A547D8E8}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{22511E2E-7970-414E-BC7C-28D16C4AF54D}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{23C5311E-016D-4999-BCB1-499898429D6C}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{2C4B6DB8-6413-403B-A038-16A352CFE8B9}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{46803190-228D-470E-90FE-F5E0CEA9C4F2}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{5180FE16-2E09-497B-9C8B-5A6F029ECECB}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{A4F6E1B3-469E-46EF-A936-FBA9D5EFD2B9}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{C97AF157-6A27-4F57-9D47-E2D3E4761B77}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{ED0D2C81-7DB5-4599-B7C0-1033418B5672}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
Key Deleted : HKCU\Software\Optimizer Pro
Key Deleted : HKCU\Software\UpdaterEX
Key Deleted : HKCU\Software\Vosteran
Key Deleted : HKCU\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\SOFTWARE\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\SOFTWARE\{6791A2F3-FC80-475C-A002-C014AF797E9C}

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17496


-\\ Mozilla Firefox v34.0.5 (x86 en-US)

[8v0u1qzo.default\prefs.js] - Line Deleted : user_pref("extensions.srchvstrn.hmpgUrl", "hxxp://Vosteran.com/?f=1&a=vst_dnldstr_14_47_ff&cd=2XzuyEtN2Y1L1Qzu0AyE0B0A0D0B0F0AtBtA0DtB0C0AyEtBtN0D0Tzu0StCtDyDtBtN1L2XzutAtFyCtFtBtFtDtN1L1CzutCyEtBzytD[...]
[8v0u1qzo.default\prefs.js] - Line Deleted : user_pref("extensions.srchvstrn.newTabUrl", "hxxp://Vosteran.com/?f=2&a=vst_dnldstr_14_47_ff&cd=2XzuyEtN2Y1L1Qzu0AyE0B0A0D0B0F0AtBtA0DtB0C0AyEtBtN0D0Tzu0StCtDyDtBtN1L2XzutAtFyCtFtBtFtDtN1L1CzutCyEtBzy[...]
[8v0u1qzo.default\prefs.js] - Line Deleted : user_pref("extensions.srchvstrn.prtnrId", "WSE_Vosteran");
[8v0u1qzo.default\prefs.js] - Line Deleted : user_pref("extensions.srchvstrn.srchPrvdr", "Vosteran");
[8v0u1qzo.default\prefs.js] - Line Deleted : user_pref("extensions.srchvstrn.tlbrSrchUrl", "hxxp://Vosteran.com/?f=3&a=vst_dnldstr_14_47_ff&cd=2XzuyEtN2Y1L1Qzu0AyE0B0A0D0B0F0AtBtA0DtB0C0AyEtBtN0D0Tzu0StCtDyDtBtN1L2XzutAtFyCtFtBtFtDtN1L1CzutCyEtB[...]

*************************

AdwCleaner[R0].txt - [6908 octets] - [28/12/2014 14:18:56]
AdwCleaner[s0].txt - [6621 octets] - [28/12/2014 14:24:45]

########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [6681 octets] ##########
 

 

From Junkware Removal Tool:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.1 (12.28.2014:1)
OS: Windows 7 Home Premium x64
Ran by Darin on Sun 12/28/2014 at 14:29:41.61
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 12/28/2014 at 14:34:28.51
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Continuing this process... be back in a few...

Link to post
Share on other sites

I didn't use FRST. The Malwarebytes scan didn't detect the PuPs... here are the logs from that scan...

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 12/28/2014
Scan Time: 2:40:03 PM
Logfile: MB02.txt
Administrator: Yes

Version: 2.00.4.1028
Malware Database: v2014.12.28.08
Rootkit Database: v2014.12.23.02
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Darin

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 320705
Time Elapsed: 4 min, 32 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

Link to post
Share on other sites

  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.