Jump to content

Mbam cannot install/Xp SecurityCenter infection


Recommended Posts

*re-posted from general board*

NOTE - I was directed to here (http://forums.malwarebytes.org/index.php?showtopic=9573) but since I can't even install Mbam, I'm stuck at the starting point. Can someone tell me where to go from here? Read below to see what I've done thus far. Thank you!

*2nd time asking for help*

My desktop is infected with that ridiculous fake XP SecurityCenter. It made my existing Mbam program stop working, so I tried to uninstall it and reinstall, but every time I try to run the mbam.exe, absolutely nothing happens. The exe file won't begin to run. I also tried changing the exe file name, to no avail. I have read all of the information on this page, http://forums.malwarebytes.org/index.php?showtopic=17607. My problem was obviously the 4th problem, and all of the symptoms listed matched perfectly. I downloaded the RootRepeal program, ran it, but found no .sys files to delete. I'll post the RootRepeal file below. I don't know where to turn next. wacko.gif Could someone please advise?

Copied Log File

Scan Start Time: 2010/04/03 18:37

Program Version: Version 1.3.5.0

Windows Version: Windows XP SP3

==================================================

Hidden/Locked Files

-------------------

Path: C:\WINDOWS\system32\jofifeti.dll

Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\mabohoje.dll

Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\resoguli

Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\ruyalopa.dll

Status: Invisible to the Windows API!

Path: C:\WINDOWS\security\logs\convert.log

Status: Visible to the Windows API, but not on disk.

==EOF==

Link to post
Share on other sites

*UPDATE* After a whole lot more research, it appears we have been infected by AVE.exe FakeRean. I altered the registry with a file called trojan_fakerean_exe_fix.reg, and then was supposed to be able to execute the Mbam, however, while installing I got the error message,"unable to execute file C://programfiles/malewarebyte's anti-malware/mbam.exe create process failed code:2" Any ideas??

Link to post
Share on other sites

Hello ladeekatt!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install any software or hardware, while work on.

Please follow these instructions:

http://forums.malwarebytes.org/index.php?showtopic=29028

Finally, please post a MalwareBytes' Anti-Malware log.

Link to post
Share on other sites

Hello, Borislav. Thank you for offering your help with this *grumble* problem.

I followed the instructions that you provided, and while I was hopeful that we were getting past this malware with this trick, the same thing occured. I had to actually download the randomly named Mbam fille to a flash drive off the internet from my laptop, because I couldn't download it wih my desktop (infected computer). Aftr pasting the .exe file in the Malwarebyte's Anti-Malware folder, I double clicked the .exe file and nothing happened. I also tried to rename the file explorer.exe, but still nothing happened. Mbam just isn't allowed to run in any way shape or form.

Link to post
Share on other sites

Let's try to rename it:

Go into C:\Program Files\Malwarebytes' Anti-Malware and you will see a file called mbam.exe Right click on it and drop down to Rename change the name to firefox.com From mbam.exe to firefox.com . Please, restart your computer.

Link to post
Share on other sites

Step 1:

1. Please download FixExe.reg and save it on your desktop.

2. Double-click on the FixExe.reg file.

3. When Windows prompts whether or not you want to allow the data to be added to your computer, click on the Yes button.

Step 2:

Download and install this one: mbam-rules.exe

Step 3:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Link to post
Share on other sites

I've run the fix-reg, and installed the mbam-rules, but now can't find the .exe file for mbam rules.

*note - When installing the mbam-rules program, it gave me choice of language, the said malwarebyte's anti-malware is ready to install, without the option of where to install it, or anything else. When clicked OK to install, it says the program was installed successfully, but I can't find it anywhere.

If I run the file "firefox.com" (that we changed from above) I get an error telling me that the current database is not supported by this version of malwarebyte's anti-malware, please download the latest version of the program.

Link to post
Share on other sites

Okay, here is the log.

Malwarebytes' Anti-Malware 1.45

www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 3

Internet Explorer 7.0.5730.11

4/12/2010 7:07:13 PM

mbam-log-2010-04-12 (19-07-13).txt

Scan type: Quick scan

Objects scanned: 111794

Time elapsed: 8 minute(s), 12 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 2

Registry Keys Infected: 7

Registry Values Infected: 2

Registry Data Items Infected: 9

Folders Infected: 2

Files Infected: 24

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

c:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo) -> No action taken.

Registry Keys Infected:

HKEY_CLASSES_ROOT\CLSID\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe (Security.Hijack) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Plus (Rogue.AntivirusPlus) -> No action taken.

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lafeposud (Trojan.Vundo.H) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gehuzunebu (Trojan.Vundo) -> No action taken.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\wesagibu.dll -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\wesagibu.dll -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe") Good: (firefox.exe) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{ae144c3e-9766-4aa3-afdb-1aeb1578bc2a}\NameServer (Trojan.DNSChanger) -> Data: 83.149.115.157,4.2.2.1,66.76.227.40 208.180.42.68 -> No action taken.

Folders Infected:

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Application Data\AntiVirus Plus (Rogue.AntiVirusPlus) -> No action taken.

Files Infected:

C:\WINDOWS\system32\dagubawe.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\homefebe.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\jahokono.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\mabohoje.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\riguhoyu.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\ruyalopa.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> No action taken.

C:\WINDOWS\system32\zurapoju.dll (Trojan.Vundo.H) -> No action taken.

C:\Documents and Settings\Katt\Application Data\AntiVirus Plus\AntiVirus Plus.55532.dll (Trojan.FakeAlert) -> No action taken.

C:\WINDOWS\system32\fabapufu.exe (Trojan.Dropper) -> No action taken.

C:\WINDOWS\system32\hofogiyi.exe (Trojan.Dropper) -> No action taken.

C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\55PNYUC4\avplus[1].dll (Rogue.AntivirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\R6E02A0K\avplus[1].dll (Rogue.AntivirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\EULA.url (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\Uninstall.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> No action taken.

C:\Documents and Settings\Katt\Application Data\avp.ico (Rogue.AntiVirusPlus) -> No action taken.

C:\WINDOWS\system32\config\systemprofile\Desktop\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> No action taken.

C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> No action taken.

Since you are offline, I'm going to assume action should be taken, plus who knows how long I'll be allowed to keep this program running?

I'll go ahead with Mbam's recommendations to remove the files, and post an updated log of the progress. Thanks.

Link to post
Share on other sites

"Some items could not be removed. Your computer needs to be restarted, click here to re-boot"

Clicked yes

System rebooted, here is the updated log file as requested.

Malwarebytes' Anti-Malware 1.45

www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 3

Internet Explorer 7.0.5730.11

4/12/2010 7:17:20 PM

mbam-log-2010-04-12 (19-17-20).txt

Scan type: Quick scan

Objects scanned: 111794

Time elapsed: 8 minute(s), 12 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 2

Registry Keys Infected: 7

Registry Values Infected: 2

Registry Data Items Infected: 9

Folders Infected: 2

Files Infected: 24

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

c:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:

HKEY_CLASSES_ROOT\CLSID\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2b5aab8-2183-4be7-81a6-f11493c45872} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe (Security.Hijack) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe (Security.Hijack) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe (Security.Hijack) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe (Security.Hijack) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Plus (Rogue.AntivirusPlus) -> Quarantined and deleted successfully.

Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lafeposud (Trojan.Vundo.H) -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gehuzunebu (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\wesagibu.dll -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\wesagibu.dll -> Delete on reboot.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe") Good: (firefox.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\FIREFOX.EXE\shell\safemode\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Mozilla Firefox\firefox.exe" -safe-mode) Good: (firefox.exe -safe-mode) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{ae144c3e-9766-4aa3-afdb-1aeb1578bc2a}\NameServer (Trojan.DNSChanger) -> Data: 83.149.115.157,4.2.2.1,66.76.227.40 208.180.42.68 -> Quarantined and deleted successfully.

Folders Infected:

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Application Data\AntiVirus Plus (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

Files Infected:

C:\WINDOWS\system32\dagubawe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\homefebe.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jahokono.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\jofifeti.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\mabohoje.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\riguhoyu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\ruyalopa.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\wesagibu.dll (Trojan.Vundo.H) -> Delete on reboot.

C:\WINDOWS\system32\zurapoju.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Application Data\AntiVirus Plus\AntiVirus Plus.55532.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\fabapufu.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\hofogiyi.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\55PNYUC4\avplus[1].dll (Rogue.AntivirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Local Settings\Temporary Internet Files\Content.IE5\R6E02A0K\avplus[1].dll (Rogue.AntivirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\EULA.url (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Start Menu\Programs\AntiVirus Plus\Uninstall.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Application Data\avp.ico (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\config\systemprofile\Desktop\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Start Menu\Programs\Startup\AntiVirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.

C:\Documents and Settings\Katt\Local Settings\Application Data\ave.exe (Rogue.MultipleAV) -> Quarantined and deleted successfully.

I'm not touching ANYTHING until I hear back from you! (remember, I'm on my laptop/non-infected computer)

Thank you, Borislav, for the time you've put in for me even just today! :)

Link to post
Share on other sites

Your database version is 3930 , but the current is 3983 , so:

  • Launch Malwarebytes' Anti-Malware
  • Go to "Update" tab and select "Check for Updates". If an update is found, it will download and install the latest version.
  • Go to "Scanner" tab and select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediatly.

Let me know how are things running now.

Link to post
Share on other sites

Step by step...

**Note: If you need more detailed information, please visit the web page of ComboFix in BleepingComputer. **

Please note that these fixes are not instantaneous. Most infections require more than one round to properly eradicate.

Stay with me until given the 'all clear' even if symptoms diminish. Lack of symptoms does not always mean the job is complete.

Kindly follow my instructions and please do no fixing on your own or running of scanners unless requested by me or another helper.

Please download ComboFix from

Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop**

  1. If you are using Firefox, make sure that your download settings are as follows:
    • Open Tools -> Options -> Main tab
    • Set to Always ask me where to Save the files.

[*]During the download, rename Combofix to Combo-Fix as follows:

CF_download_FF.gif

CF_download_rename.gif

[*]It is important you rename Combofix during the download, but not after.

[*]Please do not rename Combofix to other names, but only to the one indicated.

[*]Close any open browsers.

[*]Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

-----------------------------------------------------------

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause unpredictable results.
  • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.

    -----------------------------------------------------------


  • Close any open browsers.
  • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
  • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
  • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.

-----------------------------------------------------------

[*]Double click on combo-Fix.exe & follow the prompts.

[*]When finished, it will produce a report for you.

[*]Please post the C:\Combo-Fix.txt for further review.

**Note: Do not mouseclick combo-fix's window while it's running. That may cause it to stall**

Link to post
Share on other sites

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.