Ad-a-w-a-r-e/vx2 problem here as well

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by BFLeigh, Dec 23, 2004.

  1. BFLeigh

    BFLeigh Corporal

    Same problem for me, just got it yesterday. I too have spent copious amounts of time reading your site's fine tutorials and guides as well as the other threads on here about the vx2 thing, I will attach a HJT log at the bottom. Any other logs you need? Ad-aware's for example?

    Thanks in advance. I realise a few forums like this will be repeating solutions to this for a while, when will Spybot/Ad-aware/etc update with definitions to combat this would you say?

    Thanks in advance. I'll edit this post with certain details once I post the thread.

    EDIT: This was done in normal mode, not safe mode. System Restore's off, I've downloaded the diagnostics offered except for hsremove; when I run ad-aware it can't scrub the vx files, and then weirdly My Documents opens up in Search Mode. I'll stop now unless this information is relevant and you want to hear more. I'll register here and ask these chaps - http://forums.techguy.org/showthread.php?t=310641&page=2&pp=15 - if this really is a cure for it.
     

    Attached Files:

  2. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    First, please follow ALL the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal

    If you already have any of the programs linked in the tutorial please double check your version to make sure you have the latest one and that you have any/all updates for the programs.


    NOTE: In order to resolve the issues you are having it is very important that you at least try to perform all the steps as outlined. If you have any difficulty please post back letting us know what steps you have completed, what you found while doing the scans if anything and details about any problems you have encountered in completing the steps. The more details you can provide the better.
     
  3. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Also be sure your using Ad-Aware SE 1.05

    Ad-Aware SE referencefile SE1R23 16.12.2004

    Ad-Aware VX2 Cleaner 1.03

    To use the VX2 Cleaner simply follow these instructions:

    1)Install the VX2 Cleaner

    2)Start Ad-Aware

    3)Go to “Add-ons”

    4)Select the VX2 Cleaner add-on and click “Run Tool”

    5)If your computer isn’t infected, click “Close”..

    If your computer is infected

    6)Select “Clean System”

    7)Reboot your computer

    8)Scan your computer with Ad-Aware

    9)Remove any VX2 objects detected

    10)Reboot your computer again

    11)Run a second scan to make sure the files have been removed from your computer


    After you complete the steps in the sticky thread and try this please attach a fresh Hijack this log. Thanks!
     
  4. BFLeigh

    BFLeigh Corporal

    Yes, throughout the day I have followed the sticky thread. From what I can remember of today, here's how I fared:

    Ad-Aware: Check, updated and ran - it finds the vx files, but it can't delete them. Like I said everything but XP shuts down when A-A tells me it can't delete sgthgsgibberish.dll or whatever it's called this time, so it remains. Also, My Documents open for no reason and the Search Tool is opened in its window.

    VX Plug-in: Worthless. Says my system is clean but it isn't. In the Add-ons section of A-A this has a cross on it, maybe the plug-in itself is corrupted on the site(s) it is downloadable from.

    CCleaner: Apart from removing 139mb of the c word, this didn't seem to do much.

    Spybot: Picked up IGetNet and a 'common hijacker', plus several wwwcoolsearch annoyances, after trying out all the diagnostics you guys listed, one of them seemed to do the trick. But, and this I can't stress enough, once I re-connect to the web all the hard work is undone as the spyware re-downloads itself. I'll reiterate this many times. Now the stuff Spybot found and fixed is back and again giving Spybot a hard task to delete.

    Stinger: Finds nothing.

    CWShredder: Did work at first, now it breaks down when it scans. I've read somewhere today this is due to the vx spyware? Wow. v2.12 I got.

    Kill2Me: Does what A-A does when it fails to remove vx - My Documents/Search Tool is opened.

    AboutBuster: Tells me I'm clean.

    HSRemove: Do I need to use this? Major Attitude's tutorial says I shouldn't use it for something like this.

    ----

    Trend Micro Scan: This has been a good one to me in the past, I used it soon after I discovered this stuff yesterday. It found nothing.

    Symantec: Clean!

    Here's where it gets hard. I cannot connect to the web in "safe mode with networking" maybe I am doing something wrong.

    Now, the alternative online scans...I've had the most trouble with these. Tell me - can this spyware detect you're trying to use these scans and then try and serve up a spyware-infected "Do You Wish To Download and Install Trend Micro/Bitdefender/etc" dialog box? Because I went through the Bitdefender and Ravantivirus scans and now Ad-Aware tells me there's a vx infected ocx file related to Bitdefender in my Downloaded Program Files folder. How on Earth am I supposed to seriously do all these online scans with my dial-up connection (which of course need to update before they start) before the spyware re-boots my PC again/closes down internet explorer?
     
  5. BFLeigh

    BFLeigh Corporal

    Okay, not confident but I will post the log once I have finished the second Trend Micro scan.
     
  6. BFLeigh

    BFLeigh Corporal

    Trend Micro scan has finished and has actually found an infection:

    TROJ AGENT BT - it says it is non cleanable, the infected file is akrules.dll in my windows/system32 folder. I am going to delete it.

    Where to from here?
     
  7. BFLeigh

    BFLeigh Corporal

    SED, I need to know how to get rid of that - it's made itself a start-up program, if msconfig is anything to go by. I think it what is making ad-w-a-r-e want to connect to the web, and when I do connect, it proceeds to download all the spyware stuff I have or haven't scrubbed yet.

    Because the 5 minute edit limit expired while I was trying to attach my fresh log, and it failed, I can't attach anything else because it's still waiting for the uneditable post to finish uploading its attachment. I'm going to re-boot and try to upload again.
     
  8. BFLeigh

    BFLeigh Corporal

    Fresh Log
     

    Attached Files:

  9. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    If your running Windows XP make sure you have "System Restore" disable.

    Run HiJack this again from its current location in C:\Program Files\HijackThis\HijackThis.exe and have it fix these entries, BEFORE fixing anything with Hijack This make sure you exit all windows including the one your reading from here.


    R3 - Default URLSearchHook is missing
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 auto.search.msn.com


    Is this part of your ISP? DO NOT FIX THIS YET!
    O17 - HKLM\System\CCS\Services\Tcpip\..\{9054BA66-392A-4618-95E3-C331E308A156}: NameServer = 203.49.70.92 139.134.2.190



    Ok now for the entries below you will need LSP-Fix.
    When you run this tool it may already be selected all
    you need to do is click finish, if not select this file
    and click"i know what im doing" and move it to the right
    side and click finish. DO NOT delete anything else
    but this file,
    If you do it could cause your internet
    access to be broken.

    O10 - Unknown file in Winsock LSP: c:\windows\system32\aklsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\aklsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\aklsp.dll
    O10 - Unknown file in Winsock LSP: c:\windows\system32\aklsp.dll


    Other than these entries your log looks ok. Remove these entries, reboot and post new log. Thanks!
     
  10. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    For the eZula removal which is the SED.exe in your startup. After you have completed the steps from the Hijack This post we can move on to this removal. Simply boot into "Safe Mode". First try the uninstall of this spyware.

    1)Start --> Settings --> Control Panel

    2)Add/Remove Programs

    3)Find "Ezula" --> Click REMOVE

    4)Reboot!

    5)Boot into "Safe Mode" Open Explorer and browse to your Program Files directory and remove folders with the names (if they exist)
    Program Files\web offer\
    Program Files\weboff~1\
    Program Files\third close jugs\
    Program Files\sed\
    Program Files\my daily horoscope\

    6)Reboot

    7)Boot in normal mode, Before making changes in the registry perform a backup always. Make sure the startup entries have been removed via the uninstall. If not navigate to the following keys and remove them.

    HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run\ezwo
    HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\sesync


    You may also want to install, update and run SpySweeper. Its a 30 day trial but its very good in removing these type spywares. Go here and download SpySweeper
     
  11. BFLeigh

    BFLeigh Corporal

    First of all, thankyou for your help.

    Before I start any of these procedures though I need to know some things.

    I've been to Google and looked up this problem, gone to several sites both like this (messageboards) and otherwise and followed guides that haven't worked (the ad-aware add-on for example) or that weren't specifically for me therefore not helpful (the practice of posting HJT logs - I've just learned that this is the done thing).

    I've downloaded a few diagnostic tools and programs and due to the sheer number of them I've lost track of what I need and don't need; and what info from all of them I need to share with people like yourself.

    Can you please PM me if you can't tell me about it here, information on what has actually got on to my computer. In say a week or a month will this be easily curable as one of the new definitions in an Adware/spybot update, or is this thing so nasty that everybody who gets it has to go through the laborious processes such as this?

    Please understand I'm not mocking what you and others on countless tech support sites/forums are doing, I'm just exasperated as you can probably imagine - is this thing whatever it is, whatever kind of 'ware infection you call it, is it that much of a hard nut to crack that all the programs and on-line scans one is told to do to combat it going to do anything about it?

    Everytime you re-connect to the web to post a log, the 1% of it that might still remain begins to start the whole process all over again it seems (I have been able to remove pieces of it with spybot/ad-aware but they simply re-install themselves when I connect to check if those programs have updated definitions to take care of vx2coolwwwsearch completely). Since the problem was first reported (late November I think?), how far have the Symantecs etc on the web gotten in making sure this thing is curable? Forgetting them, have any boards like this managed to successfully destroy it 100%?

    I suppose the reason I'm saying all this is that it's going to be tricky for me to synchronise with you in regards to on-line times - I'm not in America so I don't know the general time you'd be on the forums to help me and I'm unable to leave this computer on and unattended waiting for downloads/etc anyway.

    Do you have MSN Messenger so I can use to talk to you in real-time? Due to my location my connection is dial-up and it is not a quick modem by any means, I'd be more comfortable if I was able to have you "holding my hand" through the steps I'm confused about :)

    I know this post is very long but it is not a rant by any means, I know I will able to scrub this thing off my PC completely I just want to know some things about it and the general procedures first.
     
  12. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Each piece of SpyWare has different removal instructions. Anti SpyWare vendors release updates every now and then for new variants of spyware. We tell users who post what tools they need to remove there specific spyware infection(s).

    The programs we tell you to use will remove the infection you have. We do not tell users who post to use useless tools. If we tell you to use a certain tool then most likely its needed for diagnosis or removal.

    Each Anti SpyWare program detects and removes different things. Not one anti spyware tool will catch everything on a infected system. Thats why we ask you to post such logs and hijack this and run misc. tools to remove as much as possible to get your system clean. Every piece of spyware is curable thru certain steps we can provide.

    If you have any further questions please let me know, Thanks!
     
  13. BFLeigh

    BFLeigh Corporal

    So I assume going out and buying the newest anti-virus program and then downloading updates for it will not be a good alternative.

    I am sure they are quite important but like I said it's a bit daunting with the number of them, when I should use them, whether or not they should be on the desktop, what logs I need to keep, etc etc. I do not know which one, but one of them I can't find the logs too. It doesn't let me choose where to save them.

    That's good news, they can be cured. When did this problem (vx2) start? How long ago? Are there any re-infections?
     
  14. PhilliePhan

    PhilliePhan Guest

    Hi BFLeigh,

    You have one of the new variants of VX2. A removal process has finally been determined for this baddie, though the major anti-spyware companies haven't caught up yet. Here are two threads where you can see the removal process in action:

    Big problems with CoolWWWsearch

    Help with Spyware Pop-ups PLEAZE

    Also, you are far behind on your Windows Updates! You should at least have service pack 1a. You can then upgrade to SP2 AFTER your machine is clean. You do not want to add SP2 with malware on your machine. You need to do this to address some of the security holes in IE.

    If you want to pursue the removal of your VX2 variant, please let one of us know!

    PP :)
     
  15. BFLeigh

    BFLeigh Corporal



    Thankyou, PP. I'll read those threads a bit later, I do want to pursue its removal however this is one of the times I am talking about - I am unable to stay on this machine for the required time it will take to eradicate it. My problem is twofold, managing to make sure one of you fine chaps are on-line and making sure I can be on for as long as it will take.

    I'll also need help repairing what this thing has done to my recycle bin.
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! Download these tools!

    Generic Detection Tool
    http://www.downloads.subratam.org/DllCompare.exe
    http://www.downloads.subratam.org/VX2Finder.exe
    http://www.downloads.subratam.org/KillBox.zip



    Then, unzip the Generic Detection Tool to a safe folder of your choice and run "findit.bat" - Allow it as much time as it needs to run. You may get an error message of "File Not Found," but just let it go.

    The tool should generate a long text file. Please attach that to your next post.
    Do not reboot after that because that can cause the files to mutate.
     
  17. BFLeigh

    BFLeigh Corporal

    Okay. I am ready now.

    Chaslang - do I start with your instructions? Or bjgarrick's?

    Are you able to stay on to help me through this?

    I will in my next post attach the log for the GDT.
     
  18. BFLeigh

    BFLeigh Corporal

    Attached findit.bat log:
     

    Attached Files:

  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well since it is already 2:15 am, I cannot stay on that long but let's try to make a dent in this.

    Run PocketKillbox that I had you download.

    Run Killbox again.
    1) Click "Replace on Reboot" and check the "Use Dummy" box.
    Paste the below file into the top "Full Path of File to Delete" box.

    C:\WINDOWS\SYSTEM32\i6nm0g51e6.dll

    (Make sure you cut & paste in the filenames. If you try typing, you will get an error on the c: )

    2) Click the "Delete File" button which looks like a stop sign.
    3) Click "Yes" at the Replace on Reboot prompt.
    4) Click "No" at the Pending Operations prompt.
    5) Repeat steps 1-4 above for these files:

    C:\WINDOWS\SYSTEM32\g2jo0c13ef.dll
    C:\WINDOWS\SYSTEM32\k0lqla351d.dll
    C:\WINDOWS\SYSTEM32\oxbcjt32.dll
    C:\WINDOWS\SYSTEM32\wnsdmod.dll
    C:\WINDOWS\SYSTEM32\dusetup.dll
    C:\WINDOWS\SYSTEM32\swi.dll
    C:\WINDOWS\SYSTEM32\lvn8095ue.dll
    C:\WINDOWS\SYSTEM32\empsrv.dll
    C:\WINDOWS\SYSTEM32\sirio800.dll
    C:\WINDOWS\SYSTEM32\utrdpa.dll
    C:\WINDOWS\SYSTEM32\iDssvcs.dll

    Still in Killbox
    Using Standard File Kill" Paste the below file into the top "Full Path of File to Delete" box. C:\WINDOWS\System32\Guard.tmp

    Click the "Delete File" button which looks like a stop sign.
    Click "Yes" at the Pending Operations prompt to restart your computer.

    After your PC reboots run find.bat again and post the new output.txt (you will have to rename it to output2.txt to upload it).

    Also post me a current HJT log attachment.
     
    Last edited: Dec 27, 2004
  20. BFLeigh

    BFLeigh Corporal

    Can't delete guard.tmp

    EDIT: Steps 4-8 I interpreted as steps 1-5.
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you using PocketKillbox to delete it?
    Did the others all delete?

    Post the new find.bat output and a new HJT log either way!

    Yes! I messed up the step numbers! (I fixed it so noone else gets confused.)
     
  22. BFLeigh

    BFLeigh Corporal

    Did you read my edit of that post? I presume the others did get deleted, I repeated steps 1 - 4 with all the dll files you specified. I will search for them. I will also attach the logs in my next post.
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! I read it.

    But were you using PocketKillbox to delete the guard.tmp file. Don't forget these will not delete until reboot.
     
  24. BFLeigh

    BFLeigh Corporal

    New logs!
     

    Attached Files:

  25. BFLeigh

    BFLeigh Corporal

    Aye.
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have some more files to delete. But do the below while I workup a procedure.

    If you had not downloaded LSP-fix as BJ requested, download LSP-Fix from here: http://www.majorgeeks.com/download4180.html
    Unzip it and run it. Check the Box labeled "I know what I'm doing" and then click on the aklsp.dll file (in the “Keep” section) to select it.
    Then, Select the >> button to move aklsp.dll into the Remove section.
    Now, click the Finish Button. When the Repair Summary box appears, click OK.

    Post a new HJT log.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run Killbox again.
    1) Click "Replace on Reboot" and check the "Use Dummy" box.
    Paste the below file into the top "Full Path of File to Delete" box.

    C:\WINDOWS\SYSTEM32\empsrv.dll

    (Make sure you cut & paste in the filenames. If you try typing, you will get an error on the c:)

    2) Click the "Delete File" button which looks like a stop sign.
    3) Click "Yes" at the Replace on Reboot prompt.
    4) Click "No" at the Pending Operations prompt.
    5) Repeat steps 1-4 above for these files:

    C:\WINDOWS\SYSTEM32\sirio800.dll
    C:\WINDOWS\SYSTEM32\utrdpa.dll

    Again try to delete guard.tmp using Killbox

    Using Standard File Kill" Paste the below file into the top "Full Path of File to Delete" box. C:\WINDOWS\System32\Guard.tmp

    Click the "Delete File" button which looks like a stop sign.
    Click "Yes" at the Pending Operations prompt to restart your computer.

    After your PC reboots run find.bat again and post the new output.txt (you will have to rename it to output3.txt to upload it).

    Also after your machine reboots, run DLL Compare – Click Run Locate.com then click the Compare button. Follow the prompts and allow time for it to complete and make a log. Please attach that Log.
     
  28. BFLeigh

    BFLeigh Corporal

    Ok. I will then follow your next post's instructions.
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I beat ya! See below!

    You should not have MS Word running during this. I see the below in your log.
    C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
     
  30. BFLeigh

    BFLeigh Corporal

    Still can't delete it.
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you getting an error message using Pocket KillBox? Or are you just looking for the file after reboot and it is still there?
     
  32. BFLeigh

    BFLeigh Corporal

    LOL at all this leapfrogging we are doing to each other.

    But seriously - I don't have MS Word open!

    EDIT: Yes Killbox is the one telling me that it cannot delete the file.

    WINWORD.exe is indeed showing up in the Processes tab in Task Manager. What the hell?
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What does Killbox say and when does it say it?

    Kill that Winword process using TaskManager. See if it stay killed.
     
  34. BFLeigh

    BFLeigh Corporal

    I paste the guard.tmp's location/name into Killbox, leave it on Standard, I then click the Delete File button. A box comes up titled Confirm Delete - it says 'Backup & Delete C:\Windows\System32\Guard.tmp - I then click yes. Two seconds later, a box called File Access comes up saying The File could not be Deleted.
     
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you goto C:\Windows\System32 is the Guard.tmp file actually there?
     
  36. BFLeigh

    BFLeigh Corporal

  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay do it this way:

    Copy and Paste C:\WINDOWS\SYSTEM32\guard.tmp into the box – If it exists, it will show up in Blue underneath the filename box. Check the option to Use Dummy and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click YES and allow your machine to reboot Normally.

    After reboot tell me if it is still there!
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also after your PC reboots run find.bat again and post the new output.txt (you will have to rename it to output3.txt to upload it).

    Also after your machine reboots, run DLL Compare – Click Run Locate.com then click the Compare button. Follow the prompts and allow time for it to complete and make a log. Please attach that Log.
     
  39. BFLeigh

    BFLeigh Corporal

    Re-booting now.
     
  40. BFLeigh

    BFLeigh Corporal

    Guard.tmp is gone from system32 folder, it seems.

    Here are the two logs:
     

    Attached Files:

  41. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    An so are the bad ass files!

    Run Pocket KillBox and Copy and Paste the Following into the box: C:\RECYCLER\Desktop.ini - Click Red X to delete it using Standard File Kill.

    NOW:
    Open VX2Finder and use the UserAgent$ Button to remove the UserAgent from the registry.

    Then, Click the Restore Policy Button. Your machine should want to reboot – Let it do so.

    NEXT:
    Using START > RUN > regedit, please open the registry editor and navigate to the following:

    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\RunOnceEx]

    Backup this key by clicking File, Export and then enter a File name and save it somewhere you can find it (if needed). Do the Export before doing the following:
    RightClick on the above registry key (the RunOnceEx one - make sure the bottom of the regedit window shows the full reg key as shown above in bold) and select DELETE.

    Now, attach a fresh Findit.bat Log and a fresh HijackThis Log and we'll clean up the remnants!
     
  42. BFLeigh

    BFLeigh Corporal

    Desktop.ini is deleted.

    Rebooting now.
     
  43. BFLeigh

    BFLeigh Corporal

    That RunOnceEx folder doesn't exist in the Notify folder. I will in my next post attach the two logs you asked for.
     
  44. BFLeigh

    BFLeigh Corporal

    Findit and HJT logs:
     

    Attached Files:

  45. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It mutated!


    Using START > RUN > regedit, please open the registry editor and navigate to the following:


    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\policies]

    Backup this key by clicking File, Export and then enter a File name and save it somewhere you can find it (if needed). Do the Export before doing the following:
    RightClick on the above registry key (the policies one - make sure the bottom of the regedit window shows the full reg key as shown above in bold) and select DELETE.

    One more time give me a findit.bat log.
     
  46. BFLeigh

    BFLeigh Corporal

    Here you are.

    When we are done can you please tell me any and all things I can do to check if the stuff is gone - I will run some programs but which should I do first off?
     

    Attached Files:

  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 auto.search.msn.com
    O1 - Hosts: 69.20.16.183 ieautosearch

    After clicking FIX, run a new scan with HJT and just double check that those O1 items are still gone. Just tell me whether they are or not. I don't need a new log unless they are still there.

    Then, as an added precaution, Go to Start > Run and type: cleanmgr and then click OK (it may take a few minutes for cleanmgr to do some calculations). Make sure the boxes for these are checked:
    Temporary Files
    Temporary Internet Files
    Recycle Bin
    And Click OK.

    Reset Web Settings
    Right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
     
  48. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The stuff we are doing is the only way to check for this particular form of VX2 right now, and it is the only way to fix it too.


    What you should do is look at my recommendations HERE: How to protect yourself from malware!
     
  49. BFLeigh

    BFLeigh Corporal

    I will close down IE and run HJT. Back soon.
     
  50. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hurry! NEEEEED SLEEEEEP! ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds