Jump to content

Clever virus won't let Malwarebytes or Hijack this Run


jmfarr

Recommended Posts

I have a version of Vista Antivirus 2012 that won't let Malwarebytes run (error message is: "Windows cannot access..." etc.), or Hijack this. I ran Combo Fix and here was the log. Someone please help me out here!

ComboFix 11-09-01.03 - Jaimito 01/09/2011 13:52:14.1.2 - x86

Microsoft® Windows Vista™ Home Basic 6.0.6000.0.1252.2.1033.18.2557.1622 [GMT -4:00]

Running from: c:\users\Jaimito\Desktop\Combo-Fix.exe

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\programdata\Adobe\sp.DLL

c:\programdata\cply.exe

c:\programdata\qpkh.exe

c:\programdata\qyte.exe

c:\programdata\utmq.exe

c:\users\Jaimito\AppData\Local\dbea.exe

c:\users\Jaimito\AppData\Local\ddop.exe

c:\users\Jaimito\AppData\Local\jsp.exe

c:\users\Jaimito\AppData\Local\nato.exe

c:\users\Jaimito\AppData\Local\tvpx.exe

c:\users\Jaimito\AppData\Roaming\Microsoft\Windows\Templates\cbfj.exe

c:\users\Jaimito\AppData\Roaming\Microsoft\Windows\Templates\gmll.exe

c:\users\Jaimito\AppData\Roaming\Microsoft\Windows\Templates\rnib.exe

c:\users\Jaimito\AppData\Roaming\Microsoft\Windows\Templates\ttrs.exe

c:\users\Jaimito\Documents\~WRD0047.tmp

c:\users\Jaimito\Documents\~WRL0026.tmp

c:\users\Jaimito\Documents\~WRL0034.tmp

c:\users\Jaimito\Documents\~WRL0043.tmp

c:\users\Jaimito\Documents\~WRL0089.tmp

c:\users\Jaimito\Documents\~WRL0124.tmp

c:\users\Jaimito\Documents\~WRL0169.tmp

c:\users\Jaimito\Documents\~WRL0177.tmp

c:\users\Jaimito\Documents\~WRL0261.tmp

c:\users\Jaimito\Documents\~WRL0354.tmp

c:\users\Jaimito\Documents\~WRL0400.tmp

c:\users\Jaimito\Documents\~WRL0403.tmp

c:\users\Jaimito\Documents\~WRL0453.tmp

c:\users\Jaimito\Documents\~WRL0497.tmp

c:\users\Jaimito\Documents\~WRL0599.tmp

c:\users\Jaimito\Documents\~WRL0637.tmp

c:\users\Jaimito\Documents\~WRL0680.tmp

c:\users\Jaimito\Documents\~WRL0681.tmp

c:\users\Jaimito\Documents\~WRL0708.tmp

c:\users\Jaimito\Documents\~WRL0709.tmp

c:\users\Jaimito\Documents\~WRL0764.tmp

c:\users\Jaimito\Documents\~WRL0871.tmp

c:\users\Jaimito\Documents\~WRL0955.tmp

c:\users\Jaimito\Documents\~WRL1026.tmp

c:\users\Jaimito\Documents\~WRL1086.tmp

c:\users\Jaimito\Documents\~WRL1135.tmp

c:\users\Jaimito\Documents\~WRL1179.tmp

c:\users\Jaimito\Documents\~WRL1257.tmp

c:\users\Jaimito\Documents\~WRL1258.tmp

c:\users\Jaimito\Documents\~WRL1271.tmp

c:\users\Jaimito\Documents\~WRL1305.tmp

c:\users\Jaimito\Documents\~WRL1435.tmp

c:\users\Jaimito\Documents\~WRL1470.tmp

c:\users\Jaimito\Documents\~WRL1579.tmp

c:\users\Jaimito\Documents\~WRL1584.tmp

c:\users\Jaimito\Documents\~WRL1631.tmp

c:\users\Jaimito\Documents\~WRL1679.tmp

c:\users\Jaimito\Documents\~WRL1691.tmp

c:\users\Jaimito\Documents\~WRL1695.tmp

c:\users\Jaimito\Documents\~WRL1703.tmp

c:\users\Jaimito\Documents\~WRL1759.tmp

c:\users\Jaimito\Documents\~WRL1843.tmp

c:\users\Jaimito\Documents\~WRL1906.tmp

c:\users\Jaimito\Documents\~WRL1940.tmp

c:\users\Jaimito\Documents\~WRL2053.tmp

c:\users\Jaimito\Documents\~WRL2205.tmp

c:\users\Jaimito\Documents\~WRL2464.tmp

c:\users\Jaimito\Documents\~WRL2495.tmp

c:\users\Jaimito\Documents\~WRL2498.tmp

c:\users\Jaimito\Documents\~WRL2517.tmp

c:\users\Jaimito\Documents\~WRL2523.tmp

c:\users\Jaimito\Documents\~WRL2543.tmp

c:\users\Jaimito\Documents\~WRL2632.tmp

c:\users\Jaimito\Documents\~WRL2637.tmp

c:\users\Jaimito\Documents\~WRL2668.tmp

c:\users\Jaimito\Documents\~WRL2705.tmp

c:\users\Jaimito\Documents\~WRL2787.tmp

c:\users\Jaimito\Documents\~WRL2839.tmp

c:\users\Jaimito\Documents\~WRL2870.tmp

c:\users\Jaimito\Documents\~WRL2917.tmp

c:\users\Jaimito\Documents\~WRL2962.tmp

c:\users\Jaimito\Documents\~WRL3002.tmp

c:\users\Jaimito\Documents\~WRL3121.tmp

c:\users\Jaimito\Documents\~WRL3208.tmp

c:\users\Jaimito\Documents\~WRL3223.tmp

c:\users\Jaimito\Documents\~WRL3224.tmp

c:\users\Jaimito\Documents\~WRL3285.tmp

c:\users\Jaimito\Documents\~WRL3339.tmp

c:\users\Jaimito\Documents\~WRL3398.tmp

c:\users\Jaimito\Documents\~WRL3417.tmp

c:\users\Jaimito\Documents\~WRL3458.tmp

c:\users\Jaimito\Documents\~WRL3507.tmp

c:\users\Jaimito\Documents\~WRL3548.tmp

c:\users\Jaimito\Documents\~WRL3603.tmp

c:\users\Jaimito\Documents\~WRL3608.tmp

c:\users\Jaimito\Documents\~WRL3632.tmp

c:\users\Jaimito\Documents\~WRL3712.tmp

c:\users\Jaimito\Documents\~WRL3738.tmp

c:\users\Jaimito\Documents\~WRL3777.tmp

c:\users\Jaimito\Documents\~WRL3798.tmp

c:\users\Jaimito\Documents\~WRL3799.tmp

c:\users\Jaimito\Documents\~WRL3813.tmp

c:\users\Jaimito\Documents\~WRL3888.tmp

c:\users\Jaimito\Documents\~WRL3929.tmp

c:\windows\$NtUninstallKB21686$

c:\windows\$NtUninstallKB21686$\3789004803

c:\windows\$NtUninstallKB21686$\418689981\{1B372133-BFFA-4dba-9CCF-5474BED6A9F6}

c:\windows\$NtUninstallKB21686$\418689981\click.tlb

c:\windows\$NtUninstallKB21686$\418689981\L\ogejidap

c:\windows\$NtUninstallKB21686$\418689981\loader.tlb

c:\windows\$NtUninstallKB21686$\418689981\U\@00000001

c:\windows\$NtUninstallKB21686$\418689981\U\@000000c0

c:\windows\$NtUninstallKB21686$\418689981\U\@000000cb

c:\windows\$NtUninstallKB21686$\418689981\U\@000000cf

c:\windows\$NtUninstallKB21686$\418689981\U\@80000000

c:\windows\$NtUninstallKB21686$\418689981\U\@800000c0

c:\windows\$NtUninstallKB21686$\418689981\U\@800000cb

c:\windows\$NtUninstallKB21686$\418689981\U\@800000cf

c:\windows\system32\c_13434.nls

c:\windows\system32\comct332.ocx

F:\Autorun.inf

F:\install.exe

.

Infected copy of c:\windows\system32\drivers\smb.sys was found and disinfected

Restored copy from - The cat found it :)

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

-------\Service_18f4b3bd

-------\Service_SPService

.

.

((((((((((((((((((((((((( Files Created from 2011-08-01 to 2011-09-01 )))))))))))))))))))))))))))))))

.

.

2011-09-01 18:05 . 2011-09-01 18:11 -------- d-----w- c:\users\Jaimito\AppData\Local\temp

2011-09-01 17:40 . 2011-09-01 17:40 -------- d-----w- c:\program files\Trend Micro

2011-08-31 20:15 . 2011-07-06 23:52 41272 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys

2011-08-31 20:15 . 2011-07-06 23:52 22712 ----a-w- c:\windows\system32\drivers\mbam.sys

2011-08-31 19:56 . 2011-08-31 20:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2011-08-15 01:23 . 2011-08-15 01:23 -------- d-----w- c:\users\Jaimito\AppData\Local\Research In Motion

2011-08-15 01:23 . 2011-08-15 01:24 -------- d-----w- c:\users\Jaimito\AppData\Roaming\Research In Motion

2011-08-15 01:20 . 2009-07-14 01:19 38480 ----a-w- c:\windows\system32\drivers\WdfLdr.sys

2011-08-15 01:20 . 2009-07-14 01:19 445008 ----a-w- c:\windows\system32\drivers\Wdf01000.sys

2011-08-15 01:18 . 2009-01-09 20:18 27136 ----a-w- c:\windows\system32\drivers\RimSerial.sys

2011-08-15 01:17 . 2011-08-15 01:17 -------- d-----w- c:\programdata\Research In Motion

2011-08-15 01:17 . 2011-08-15 01:17 -------- d-----w- c:\program files\Common Files\Research In Motion

2011-08-15 01:17 . 2011-08-15 01:17 -------- d-----w- c:\program files\Research In Motion

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"DellSupport"="c:\program files\DellSupport\DSAgnt.exe" [2006-11-12 446976]

"DellTransferAgent"="c:\programdata\Dell\TransferAgent\TransferAgent.exe" [2007-11-13 135168]

"LaCie Desktop Manager Startup"="c:\program files\LaCie\Desktop Manager\LaCieDesktopManagerStatusItem.exe" [2009-12-02 2318336]

"AdobeUpdater"="c:\program files\Common Files\Adobe\Updater5\AdobeUpdater.exe" [2008-09-26 2356088]

"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-06-13 39408]

"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2006-11-02 201728]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SunJavaUpdateSched"="c:\program files\Java\jre1.6.0\bin\jusched.exe" [2007-02-28 77824]

"SigmatelSysTrayApp"="sttray.exe" [2006-11-22 303104]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" [2006-09-29 151552]

"ISUSScheduler"="c:\program files\Common Files\InstallShield\UpdateService\issch.exe" [2006-10-03 81920]

"RoxWatchTray"="c:\program files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatchTray9.exe" [2006-11-05 221184]

"RoxioDragToDisc"="c:\program files\Roxio\Drag-to-Disc\DrgToDsc.exe" [2006-08-17 1116920]

"PDVDDXSrv"="c:\program files\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2006-10-20 118784]

"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2006-12-03 107112]

"osCheck"="c:\program files\Norton Internet Security\osCheck.exe" [2006-12-03 22696]

"ECenter"="c:\dell\E-Center\EULALauncher.exe" [2006-11-17 17920]

"ISUSPM Startup"="c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe" [2006-10-03 221184]

"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]

"Symantec PIF AlertEng"="c:\program files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" [2007-11-29 583048]

"ContentTransferWMDetector.exe"="c:\program files\Sony\Content Transfer\ContentTransferWMDetector.exe" [2008-07-11 423200]

"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2008-10-15 39792]

"UsbBoost"="c:\program files\UsbBoost\TurboHddUsb.exe" [2010-09-15 3788800]

"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-04-14 13687328]

"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2009-04-14 92704]

"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2006-12-11 49152]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2010-11-29 421888]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-04-14 421160]

"RIMBBLaunchAgent.exe"="c:\program files\Common Files\Research In Motion\USB Drivers\RIMBBLaunchAgent.exe" [2011-02-18 79192]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2007-1-2 210520]

McAfee Security Scan Plus.lnk - c:\program files\McAfee Security Scan\2.0.181\SSScheduler.exe [2010-1-15 255536]

Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"EnableLUA"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\tumioro]

2011-08-25 20:04 11264 ----a-w- c:\windows\System32\config\systemprofile\AppData\Local\tumioro.dll

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]

"wave1"=Digi32.dll

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

.

R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [2011-06-13 135664]

R2 LaCieDesktopManagerService;LaCieDesktopManagerService;c:\program files\LaCie\Desktop Manager\lacie_dm_service.exe [2009-12-02 618496]

R3 A5AGU;D-Link Wireless LAN 802.11 USB device driver;c:\windows\system32\DRIVERS\AGUx86.sys [2008-08-06 905728]

R3 gupdatem;Google Update Service (gupdatem);c:\program files\Google\Update\GoogleUpdate.exe [2011-06-13 135664]

R3 MBX2DFU;MBX2DFU;c:\windows\system32\DRIVERS\MBX2DFU.sys [x]

R3 MBX2MIDK;Digidesign Mbox 2 Midi Driver;c:\windows\system32\drivers\mbx2midk.sys [x]

R3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\2.0.181\McCHSvc.exe [2010-01-15 227232]

R3 oflpydin;oflpydin;c:\users\Jaimito\AppData\Local\Temp\oflpydin.sys [x]

R3 OXSDIDRV_x32;Oxford Semi eSATA Filter (x32);c:\windows\system32\DRIVERS\OXSDIDRV_x32.sys [2009-09-28 52656]

S1 FNETURPX;FNETURPX;c:\windows\system32\drivers\FNETURPX.SYS [2010-09-15 7936]

S1 IDSvix86;Symantec Intrusion Prevention Driver;c:\progra~2\Symantec\DEFINI~1\SymcData\idsdefs\20070405.003\IDSvix86.sys [2007-02-14 212280]

S2 Akamai;Akamai NetSession Interface;c:\windows\System32\svchost.exe [2006-11-02 22016]

S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2007-04-04 106808]

S3 FNETTBOH;FNETTBOH;c:\windows\system32\drivers\FNETTBOH.SYS [2010-09-15 23680]

S3 SYMNDISV;SYMNDISV;c:\windows\System32\Drivers\SYMNDISV.SYS [2006-12-03 37008]

.

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - COMHOST

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

Akamai REG_MULTI_SZ Akamai

.

Contents of the 'Scheduled Tasks' folder

.

2011-09-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2011-06-13 03:45]

.

2011-09-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2011-06-13 03:45]

.

2011-08-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3221725982-3085119075-4062732510-1002Core.job

- c:\users\Jaimito\AppData\Local\Google\Update\GoogleUpdate.exe [2011-01-25 22:40]

.

2011-09-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3221725982-3085119075-4062732510-1002UA.job

- c:\users\Jaimito\AppData\Local\Google\Update\GoogleUpdate.exe [2011-01-25 22:40]

.

2011-08-20 c:\windows\Tasks\Norton Internet Security - Run Full System Scan - Jaimito.job

- c:\progra~1\NORTON~1\NORTON~1\Navw32.exe [2006-12-03 23:23]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.ca/ig/dell?hl=en&client=dell-row&channel=ca&ibd=4070228

IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_6CE5017F567343CA.dll/cmsidewiki.html

TCP: DhcpNameServer = 192.168.2.1

FF - ProfilePath - c:\users\Jaimito\AppData\Roaming\Mozilla\Firefox\Profiles\33wd9zk4.default\

FF - prefs.js: browser.startup.homepage - hxxp://www.google.ca

FF - prefs.js: network.proxy.http - 127.0.0.1

FF - prefs.js: network.proxy.http_port - 55879

FF - prefs.js: network.proxy.type - 4

.

- - - - ORPHANS REMOVED - - - -

.

ShellIconOverlayIdentifiers-{96AFBE69-C3B0-4b00-8578-D933D2896EE2} - (no file)

HKCU-Run-MsgCenterExe - c:\program files\Common Files\Real\Update_OB\RealOneMessageCenter.exe

HKCU-Run-BitTorrent - c:\program files\BitTorrent\bittorrent.exe

HKLM-Run-LaCie Desktop Manager Launcher - c:\program files\LaCie\Desktop Manager\lacie_launcherd.exe

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2011-09-01 14:09

Windows 6.0.6000 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

.

c:\users\Jaimito\AppData\Roaming\Apple Computer\Logs\asl.214123_14Aug11.log

.

scan completed successfully

hidden files: 1

.

**************************************************************************

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

--------------------- DLLs Loaded Under Running Processes ---------------------

.

- - - - - - - > 'Explorer.exe'(5536)

c:\program files\Roxio\Drag-to-Disc\Shellex.dll

c:\windows\system32\DLAAPI_W.DLL

c:\windows\system32\CDRTC.DLL

c:\program files\Roxio\Drag-to-Disc\ShellRes.dll

.

------------------------ Other Running Processes ------------------------

.

c:\windows\system32\nvvsvc.exe

c:\windows\system32\rundll32.exe

c:\program files\Common Files\Symantec Shared\ccSvcHst.exe

c:\program files\Common Files\Symantec Shared\AppCore\AppSvc32.exe

c:\windows\sttray.exe

c:\windows\System32\rundll32.exe

c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

c:\program files\Symantec\LiveUpdate\ALUSchedulerSvc.exe

c:\program files\Bonjour\mDNSResponder.exe

c:\program files\Intel\Intel Matrix Storage Manager\Iaantmon.exe

c:\program files\SigmaTel\C-Major Audio\WDM\STacSV.exe

c:\windows\system32\WUDFHost.exe

c:\program files\Windows Media Player\wmpnetwk.exe

c:\program files\iPod\bin\iPodService.exe

c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe

c:\windows\system32\wbem\unsecapp.exe

c:\windows\servicing\TrustedInstaller.exe

.

**************************************************************************

.

Completion time: 2011-09-01 14:24:37 - machine was rebooted

ComboFix-quarantined-files.txt 2011-09-01 18:24

.

Pre-Run: 77,416,751,104 bytes free

Post-Run: 83,540,996,096 bytes free

.

- - End Of File - - 97507F7202FCA6207A3383D5CCCC89A7

Hope somebody can help!

by the way, in order to run combofix, i had to save it to the desktop as "combo-fix" with the hyphen added.

ComboFix.txt

Link to post
Share on other sites

post-32477-1261866970.gif

Logs will be closed if you haven't replied within 3 days

Please do not attach the scan results from Combofx. Use copy/paste.

DO NOT use any TOOLS such as Combofix, or HijackThis fixes without supervision.

Doing so could make your pc inoperatible and could require a full reinstall of your OS, losing all your programs and data.

Be sure to update Combofix before running.

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Note: If you are having difficulty properly disabling your protective programs, or are unsure as to what programs need to be disabled, please refer to the information available through this link : Protective Programs
  • Double click on ComboFix.exe & follow the prompts.
    Notes: Combofix will run without the Recovery Console installed. Skip the Recovery Console part if you're running Vista or Windows 7.
    Note: If you have XP SP3, use the XP SP2 package.
    If Vista or Windows 7, skip the Recovery Console part
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

RC1.png

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC2-1.png

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt using Copy / Paste in your next reply.

Notes:

1.Do not mouse-click Combofix's window while it is running. That may cause it to stall.

2. ComboFix may reset a number of Internet Explorer's settings, including making I-E the default browser.

3. Combofix prevents autorun of ALL CD, floppy and USB devices to assist with malware removal & increase security. If this is an issue or makes it difficult for you -- please tell your helper.

4. CF disconnects your machine from the internet. The connection is automatically restored before CF completes its run. If CF runs into difficulty and terminates prematurely, the connection can be manually restored by restarting your machine.

Give it atleast 20-30 minutes to finish if needed.

Please do not attach the scan results from Combofx. Use copy/paste.

Also please describe how your computer behaves at the moment.

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.