Internet Explorer not your default browser Popup

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by infected2k, Jun 26, 2012.

  1. infected2k

    infected2k Private E-2

    Hi
    have 2 problems:
    1) "Internet explorer is currently not your default browser,
    Would you like to make it not your default browser?" popup

    2) sound popup (music/advertising) for about 5-10 seconds, periodically

    Have followed the steps in Read & run me first and am attaching all logs.

    Your help is always appreciated...Thanks!

    p,s. running Windows XP sp3
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you do not use Windows Messenger Run this Disable/Remove Windows Messenger to remove Windows Messenger. Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.

    Code:
    :Files
    C:\Documents and Settings\DL\Application Data\Atzu
    C:\Documents and Settings\DL\Application Data\Detipe
    C:\Documents and Settings\DL\Application Data\Exyru
    C:\Documents and Settings\DL\Application Data\Giuh
    C:\Documents and Settings\DL\Application Data\Huypr
    C:\Documents and Settings\DL\Application Data\Igkasez
    C:\Documents and Settings\DL\Application Data\Laet
    C:\Documents and Settings\DL\Application Data\Luoql
    C:\Documents and Settings\DL\Application Data\Ms_dir_
    C:\Documents and Settings\DL\Application Data\Naviqoe
    C:\Documents and Settings\DL\Application Data\Orexis
    C:\Documents and Settings\DL\Application Data\Saedo
    C:\Documents and Settings\DL\Application Data\Saizno
    C:\Documents and Settings\DL\Application Data\Umoxyh
    C:\Documents and Settings\DL\Application Data\Uputot
    C:\Documents and Settings\DL\Application Data\Uscaut
    C:\Documents and Settings\DL\Application Data\ste
    C:\Documents and Settings\DL\Application Data\Xeqa
    C:\Documents and Settings\DL\Application Data\Xukuxu
    C:\Documents and Settings\DL\Application Data\Yna
    C:\Documents and Settings\DL\Application Data\Ypaho
    C:\Documents and Settings\DL\Application Data\Yqit
    C:\Documents and Settings\DL\Application Data\DC0560.dat
    C:\Documents and Settings\DL\Application Data\Orexis\awco.exe
    C:\Documents and Settings\DL\Application Data\DC0560.exe
    C:\Documents and Settings\DL\Local Settings\Temp\00041113.exe
    C:\DOCUME~1\DL\LOCALS~1\Temp\0003d0be.exe
    C:\Documents and Settings\DL\Application Data\Xukuxu\izyhy.exe
    C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe
    C:\WINDOWS\Tasks\At1.job
    C:\WINDOWS\Tasks\At10.job
    C:\WINDOWS\Tasks\At11.job
    C:\WINDOWS\Tasks\At12.job
    C:\WINDOWS\Tasks\At13.job
    C:\WINDOWS\Tasks\At14.job
    C:\WINDOWS\Tasks\At15.job
    C:\WINDOWS\Tasks\At16.job
    C:\WINDOWS\Tasks\At17.job
    C:\WINDOWS\Tasks\At18.job
    C:\WINDOWS\Tasks\At19.job
    C:\WINDOWS\Tasks\At2.job
    C:\WINDOWS\Tasks\At20.job
    C:\WINDOWS\Tasks\At21.job
    C:\WINDOWS\Tasks\At22.job
    C:\WINDOWS\Tasks\At23.job
    C:\WINDOWS\Tasks\At24.job
    C:\WINDOWS\Tasks\At25.job
    C:\WINDOWS\Tasks\At26.job
    C:\WINDOWS\Tasks\At27.job
    C:\WINDOWS\Tasks\At28.job
    C:\WINDOWS\Tasks\At29.job
    C:\WINDOWS\Tasks\At3.job
    C:\WINDOWS\Tasks\At30.job
    C:\WINDOWS\Tasks\At31.job
    C:\WINDOWS\Tasks\At32.job
    C:\WINDOWS\Tasks\At33.job
    C:\WINDOWS\Tasks\At34.job
    C:\WINDOWS\Tasks\At35.job
    C:\WINDOWS\Tasks\At36.job
    C:\WINDOWS\Tasks\At37.job
    C:\WINDOWS\Tasks\At38.job
    C:\WINDOWS\Tasks\At39.job
    C:\WINDOWS\Tasks\At4.job
    C:\WINDOWS\Tasks\At40.job
    C:\WINDOWS\Tasks\At41.job
    C:\WINDOWS\Tasks\At42.job
    C:\WINDOWS\Tasks\At43.job
    C:\WINDOWS\Tasks\At44.job
    C:\WINDOWS\Tasks\At45.job
    C:\WINDOWS\Tasks\At46.job
    C:\WINDOWS\Tasks\At47.job
    C:\WINDOWS\Tasks\At48.job
    C:\WINDOWS\Tasks\At5.job
    C:\WINDOWS\Tasks\At6.job
    C:\WINDOWS\Tasks\At7.job
    C:\WINDOWS\Tasks\At8.job
    C:\WINDOWS\Tasks\At9.job
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Vyadlyesy"=-
    [HKEY_USERS\S-1-5-21-4113887528-529173203-4290803090-1006\Software\Microsoft\Windows\CurrentVersion\run]
    "Vyadlyesy"=-
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Now run CCleaner (Not the registry scanner, just the cleaner itself)


    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. infected2k

    infected2k Private E-2

    Thanks for the quick response!
    I will follow your instructions tonight when I get home and will keep you posted of the results.
     
  4. infected2k

    infected2k Private E-2

    Thanks again Kestrel13, your instructions were easy to follow.
    Haven't noticed any popups while running these scans.

    Am attaching otm log and mgtools zip files.

    Thanks again, this site is a lifesaver.
     

    Attached Files:

  5. infected2k

    infected2k Private E-2

    Don't think all is fixed. Not getting IE popup but just got a sound burst interruption like an advertisment. Sound ad doesn't last more than 5 seconds and it happens about every 15 mins.
     
  6. infected2k

    infected2k Private E-2

    Now getting non-stop infomercial for muscle supplements went on for about 5 mins.
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run



    Now download The Avenger by Swandog469, and save it to your Desktop.

    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
    Last edited: Jun 27, 2012
  8. infected2k

    infected2k Private E-2

    Hi Kestrel13

    I can't get kapersky to run.
    I double click and run and nothing happens.
    I even renamed the extension .com and still
    Nothing. Also, tried to run in safe mode.
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Continue on then with the avenger instructions.
     
  10. infected2k

    infected2k Private E-2

    ok, here's my logs from Avenger an Mgtools.

    Thanks!
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    C:\Documents and Settings\DL\Application Data\Laet <--- Delete this folder.

    Will TDSSKiller run now?
     
  12. infected2k

    infected2k Private E-2

    Thanks again, Kestrel13!
    I deleted the folder:
    C:\Documents and Settings\DL\Application Data\Laet

    but am still not able to run Tdsskiller, even tried doenloading again

    Haven't noticed any popups or sound ads.
    Keeping my fingers crossed.
    Are there more scans required?

    Thanks again!
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi infected. Can you just give RogueKiller one more run and attach its log please?
     
  14. infected2k

    infected2k Private E-2

    Hi K13,

    have attached log from RogueKiller.

    Thanks for your dedicated help.

    I2k
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 3 detections:
    • [SUSP PATH] HKCU\[...]\Run : Vyadlyesy ("C:\Documents and Settings\DL\Application Data\Orexis\awco.exe") -> FOUND
    • [SUSP PATH] HKUS\S-1-5-21-4113887528-529173203-4290803090-1006[...]\Run : Vyadlyesy ("C:\Documents and Settings\DL\Application Data\Orexis\awco.exe") -> FOUND
    • [SUSP PATH] At17.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At16.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At15.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At14.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At13.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At12.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At11.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At10.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At1.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At26.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At25.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At24.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At23.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At22.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At21.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At20.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At2.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At19.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At18.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At35.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At34.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At33.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At32.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At31.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At30.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At3.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At29.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At28.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At27.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At44.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At43.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At42.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At41.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At40.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At4.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At39.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At38.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At37.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At36.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At9.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At8.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At7.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At6.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At5.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe -> FOUND
    • [SUSP PATH] At48.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At47.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At46.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    • [SUSP PATH] At45.job @ : C:\Documents and Settings\All Users\Application Data\7Y722Pl1.exe_ -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.




    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.



    Run RogueKiller again like you did in post #14 and attach the log.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  16. infected2k

    infected2k Private E-2

    Hi K13,

    not sure I understand when you say locate "These 3 detections"
    There are 54 of them I don't see the 3 specific ones you want deleted.
    I see 5 with "Keys"
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi infected, just skip that step and move on then.
     
  18. infected2k

    infected2k Private E-2

    Thanks K13

    am attaching the logs
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good afternoon infected. This *should* take just one more fix!


    Download Combofix to your desktop. Do NOT run it by double clicking it. Disable your antivirus before doing the below!


    Now we need to use ComboFix by sUBs

    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Registry::
    [HKEY_USERS\S-1-5-21-4113887528-529173203-4290803090-1006\Software\Microsoft\Windows\CurrentVersion\run]
    "Vyadlyesy"=-
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Vyadlyesy"=-
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.


    Now run RogueKiller again and attach the log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  20. infected2k

    infected2k Private E-2

    This appears to be a tough one, appreciate the help K13.

    I have included the logs from combfix, Roguekiller and Mgtools.

    ...I2k
     

    Attached Files:

  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
     
  22. infected2k

    infected2k Private E-2

    Hi K13, still unable to run TDSSKiller.exe (see previous posts).
    I ran MBRCheck.exe and have included the log.

    Thanks again...I2k
     

    Attached Files:

  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Damn, infected, you have an MBR infection. I suspected this, and MBRCheck has confirmed it. You got your XP boot CD?
     
  24. infected2k

    infected2k Private E-2

    Looks like I'm screwed...
    No it's an Asus 10" netbook, no recovery disk with it.
    No CD/DVD reader.
    I was just on the line with Asus support, and they tried to walk me thru
    to restore Xp, but only got thru to first step to disable "Boot Booster"
    was not able to get next step, hit F9 repeatedly when starting up, but it just booted up.
    I'll take it to my local repair store to get it re-stored.

    Thanks for all your help, Kestrel13!

    ...Infected2K
     
  25. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let's just have a stab at trying it without the CD, which I do not expect to work, but if you are willing to have a bash, let's go.

    Earlier on ComboFix installed the Recovery Console. We're going to use that now.

    Reboot your machine and when the Boot Menu flashes up - select "Microsoft Windows Recovery Console"
    (you need to be very fast with the arrow key as you only have a couple of seconds before it defaults to the windows XP bootup)

    [​IMG]


    [​IMG]

    When you get to the above screen, take note of the number that references your operating system.

    If it's '1' like the picture above, type 1 and press Enter

    [​IMG]

    Next type FIXMBR

    If it ask if you're sure you want to write a new MBR, answer 'Y'

    Then type EXIT to reboot the machine.


    Now run MBRCheck afresh and attach the new log.
     
  26. infected2k

    infected2k Private E-2

    Hi K13,

    Sorry, I may have screwed something up.
    I was trying and managed to get TDSSKILLER to run:
    - I ran it in Safe Mode with Networking option and it ran.
    - I realized I missed the additional options and tried to restart the scan
    and I'm not sure what happened but long story short when I rebooted
    Symantic Ghost 32 11.0 kicked in and re-installed Xp.
    - I have now re-installed Mbrcheck and TDSKiller (which I can run without Safe mode) and re-run them and am attaching the logs.
    It looks like mbrcheck log say that there is still a problem.

    ...Infected2k
     

    Attached Files:

  27. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hey infected. :)

    The MBRCheck logs shows no problems where as the last log DEFINATELY showed a prob. This is great news, but I'm still wanting to check again. Let's get a second opinion.

    Run RogueKiller again and attach the log.
     
  28. infected2k

    infected2k Private E-2

    Hi K13,

    here's the RK report.

    Thanks!
     

    Attached Files:

  29. infected2k

    infected2k Private E-2

    Hi K13,

    my brother-in-law (who's a bit of a minor geek) was over and he replaced the mbr for me.
    I've run the mbrcheck and here's the latest log.

    Thanks! I2k
     

    Attached Files:

  30. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi infected. :)

    Well good on your bro in law, but we already did it between us earlier. I would say now at this point, all looks great, and if you are ready to follow final steps below, go ahead. ;)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  31. infected2k

    infected2k Private E-2

    Well thanks very much for all your help Kestrel13...

    Will follow the clean up instructions and will try to stay out of trouble.

    ...I2k
     
  32. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome infected. Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds