Infected with Trojen.Agent/Gen-Nullo[Short] and adwaremywebsearch

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by telomere, Sep 7, 2011.

  1. telomere

    telomere Private E-2

    Hi,
    Hi,
    Yesterday I went to a chat room that I visit frequently. I was blocked and got a message saying my computer is acting as an open proxy. Wanted to make sure my system wasn’t infected so I ran Avira a few hours ago which found some warnings..So ran malware bytes anti malware and super anti spyware. MBAM Found ad shopping something. SAS found adware tracking cookie 247 realmedia,adbrite,adyeldmanager,2o7 .net, adform, adinterax, adpointroll,ads1.tyroo.com,adtech.de,advertsing.com,atawola.com and many others and Trojan. Agent/Gen-Nullo[Short]. I quarantined and removed these through MBAM and SAS. I read the read me and run me first. I updated java. It said I have the latest version. Removed a few programmes from add/remove, cleared the java temp file cache n system temp files. Removed quarantined items in MBAM and SAS. My start up is in normal mode. Ran defogger. Made sure hidden files are seen. Disabled allantispyware, antivirus programmes. Ran combofix, rootrepeal and mgtools. Root repeal and Mgtools where showing errors. Root repeal was showing 0x00 errors when clicked on it. Mg tools was showing unrecognized command error for.bat files. It did not create Mgtools.zip file but had 3 text log files on MGTools folder. Attaching all logs here. Kindly look into it.. I am using windows 7 home basic
    Regards, Telo
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    • cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    • nwktst<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
    • analyse <-- this attempts to run HijackThis. Be sure to click the Accept button twice in the license agreement popup or it will just sit there and wait.
    Now look for the C:\MGlogs.zip file and attach it no matter what happened while doing the above.
     
  3. telomere

    telomere Private E-2

    Attaching Mgtools logs and root repeal logs continuation..

    OS: Windows 7 home basic Service Pack 1
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    See my post number two as I have a suggestion to try and get MGTools to run for you. :)
     
  5. telomere

    telomere Private E-2

    Hi ,
    Thank You for your reply, I ran all these commands from command prompt, and the errors I got are as follows

    "nwktst is not recognized as an internal or external command,operable programme or batch file
    GetRunKey is not recognized as an internal or external command,operable programme or batch file
    ShowNew is not recognized as an internal or external command,operable programme or batch file
    analyse is not recognized as an internal or external command,operable programme or batch file "


    I looked in C drive, no Mg Tools.zip there :(
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  7. telomere

    telomere Private E-2

    Hi Kestrel13!
    Thanks a lot for your advices.. I ran OTL as an administrator, Attaching OTL.TXT and Extras.txt here
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Important Notice: A new version of SUPERAntiSpyware is available.
    • Please uninstall your current version (this is necessary).
    • Then download this SUPERAntiSpyware
    • Install this new version. It may tell you that you need to reboot to complete the installation. You must reboot at this time.
    • After the reboot, run SUPERAntiSpyware and immediately click the Check for Updates button to get more updates for the database.
    • Now run a new full scan of your system. And attach this log later.


    Can you attach the Malware Bytes log in a text file not as a word doc please? Thanks.



    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    C:\Users\admin\AppData\Local\{E642CFE7-0BB2-4F5A-B36E-A53C7CF79CE0}
    C:\Users\admin\AppData\Local\{D60BFA1C-7278-401E-94FF-A9D8633814DE}
    C:\Users\admin\AppData\Local\{3C4FED79-1F79-446A-B652-930295C5C266}
    C:\Users\admin\AppData\Local\{F68DBD6F-DECD-498E-8DBC-5E2288566AD1}
    C:\Users\admin\AppData\Local\{28E19F62-E29E-492B-B5FA-3FE5B714E10B}
    C:\Users\admin\AppData\Local\{7B82317F-C65B-4926-809B-741912DBEE3A}
    C:\Users\admin\AppData\Local\{6FE8643A-A72C-4ABD-B879-17E71294FAD9}
    C:\Users\admin\AppData\Local\{8F46AC9B-FDAB-44A8-9A0B-BFB8CA0A58CF}
    C:\Users\admin\AppData\Local\{5CF07B3B-6E94-452F-8C14-49E753BBEAEA}
    C:\Users\admin\AppData\Local\{DE51C306-3666-4F82-B58C-F0733574D212}
    C:\Users\admin\AppData\Local\{5694707B-4256-4F2E-BCD4-C8363452277D}
    C:\Users\admin\AppData\Local\{A4A83C90-E8C9-44F1-8120-6B22E02C2498}
    C:\Users\admin\AppData\Local\{A022C0CE-B1DD-4931-9F33-B971E448C943}
    C:\Users\admin\AppData\Local\{B40807A2-B323-4837-A527-881C2774E998}
    C:\Users\admin\AppData\Local\{7E9608D0-B73C-4CC8-9296-6FA62C77C859}
    C:\Users\admin\AppData\Local\{6E501F13-08AD-45E4-98B0-9E1CF318A707}
    C:\Users\admin\AppData\Local\{67A901E7-3732-4DE5-BB83-0E24C508FF67}
    C:\Users\admin\AppData\Local\{6D6422EE-1184-43A9-BB03-7DD5BD491B9E}
    C:\Users\admin\AppData\Local\{E2D3D7B0-EE5C-47E3-B9DC-5D64BBA86597}
    C:\Users\admin\AppData\Local\{5016FA6B-E0E1-4D67-BBA6-C0C94A3B085E}
    C:\Users\admin\AppData\Local\{173A9616-A727-428A-9662-490A4714CEB9}
    C:\Users\admin\AppData\Local\{935E2EBE-5484-4D1C-9778-312DD742984D}
    C:\Users\admin\AppData\Local\{768FDFEC-DB5D-4381-A156-BCF22DFC8C14}
    C:\Users\admin\AppData\Local\{6560C8A0-9F70-41BD-9010-6D8C356A466D}
    C:\Users\admin\AppData\Local\{ED895FC9-E9C9-45F0-8674-6F9119CD3E85}
    C:\Users\admin\AppData\Local\{00F7A412-DBE4-4DDB-B2FB-7A6732F92A2C}
    C:\Users\admin\AppData\Local\{4164C851-67DF-4DD2-B408-BC546E9EEC3B}
    C:\Users\admin\AppData\Local\{BF6AC338-9E67-48F6-8A27-1651CC45991B}
    C:\Users\admin\AppData\Local\{404A16E5-6DF4-4662-96C3-17B02B086585}
    C:\Users\admin\AppData\Local\{3AE86938-351A-4759-98EC-BA0671D5E5E1}
    C:\Users\admin\AppData\Local\{6AD2734A-FB7E-4A3E-89A1-F51C5175472E}
    C:\Users\admin\AppData\Local\{F699B441-56D0-4C66-9E61-D535108BDCDB}
    C:\Users\admin\AppData\Local\{E0F1B71E-9916-4527-86C2-AB9356D12F41}
    C:\Users\admin\AppData\Local\{437D359C-341E-4EA3-B1F7-1012225F22C5}
    C:\Users\admin\AppData\Local\{F7B024C8-D498-47F9-8410-B28699E80689}
    C:\Users\admin\AppData\Local\{D3B5ACF3-01B6-42AC-9D13-9133B21C8B26}
    C:\Users\admin\AppData\Local\{D87CEA92-8465-436C-9404-8232DCE74B06}
    C:\Users\admin\AppData\Local\{F6BF0F63-C483-46B1-A209-BF647B695E8B}
    C:\Users\admin\AppData\Local\{5EAC46DF-2AEE-4FF7-9874-9C854D9B2DD2}
    C:\Users\admin\AppData\Local\{757AFDCA-D2AA-48F5-AFBE-D195A74A4D42}
    C:\Users\admin\AppData\Local\{44781867-1593-4217-A01D-67465CA3903A}
    C:\Users\admin\AppData\Local\{22E32E48-6818-4059-8425-B85851AAEA2C}
    C:\Users\admin\AppData\Local\{0FB50915-8E70-4E79-9B39-ACC8E569D818}
    C:\Users\admin\AppData\Local\{FA0332EB-D9C8-42D0-B156-E16C90D1D2A1}
    C:\Users\admin\AppData\Local\{5B8527F5-C670-48CE-840C-2017018DE35F}
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.



    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run



    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )


    Now run OTL again:

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open a notepad window. OTL.Txt. This is saved in the same location as OTL.

    Attach that log please as well as the other logs that I requested.
     
  9. telomere

    telomere Private E-2

    Hi,
    I installed SAS from the location you provided. Ran both SAS and MBAM Scans and attaching the logs here. I ran combofix, it told me it wants to update , so i let it do it and it rebooted my machine. After that I did drag the Cf Script with the commands that you gave and combofix did its job. Ran TDS Killer, it did not find any infection. Ran MBR check, it did find unrecognizable infected MBR, it may be because, I have Ubuntu on one of my disk partitions and I use Ubuntu's Grub Manager to boot into both Windows n Ubuntu. Last but not the least, I ran OTL.. Attaching all logs in two posts..This post has the following.. logs
    1. SAS
    2. MBAM
    3. Combofix
    4. TDSKiller
     

    Attached Files:

  10. telomere

    telomere Private E-2

    Logs from previous post...
    1. MBR Check
    2. OTL Log
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now we need to use ComboFix sUBs

    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Folder::
    C:\Users\admin\AppData\Local\{E642CFE7-0BB2-4F5A-B36E-A53C7CF79CE0}
    C:\Users\admin\AppData\Local\{D60BFA1C-7278-401E-94FF-A9D8633814DE}
    C:\Users\admin\AppData\Local\{3C4FED79-1F79-446A-B652-930295C5C266}
    C:\Users\admin\AppData\Local\{F68DBD6F-DECD-498E-8DBC-5E2288566AD1}
    C:\Users\admin\AppData\Local\{28E19F62-E29E-492B-B5FA-3FE5B714E10B}
    C:\Users\admin\AppData\Local\{7B82317F-C65B-4926-809B-741912DBEE3A}
    C:\Users\admin\AppData\Local\{6FE8643A-A72C-4ABD-B879-17E71294FAD9}
    C:\Users\admin\AppData\Local\{8F46AC9B-FDAB-44A8-9A0B-BFB8CA0A58CF}
    C:\Users\admin\AppData\Local\{5CF07B3B-6E94-452F-8C14-49E753BBEAEA}
    C:\Users\admin\AppData\Local\{DE51C306-3666-4F82-B58C-F0733574D212}
    C:\Users\admin\AppData\Local\{5694707B-4256-4F2E-BCD4-C8363452277D}
    C:\Users\admin\AppData\Local\{A4A83C90-E8C9-44F1-8120-6B22E02C2498}
    C:\Users\admin\AppData\Local\{A022C0CE-B1DD-4931-9F33-B971E448C943}
    C:\Users\admin\AppData\Local\{B40807A2-B323-4837-A527-881C2774E998}
    C:\Users\admin\AppData\Local\{7E9608D0-B73C-4CC8-9296-6FA62C77C859}
    C:\Users\admin\AppData\Local\{6E501F13-08AD-45E4-98B0-9E1CF318A707}
    C:\Users\admin\AppData\Local\{67A901E7-3732-4DE5-BB83-0E24C508FF67}
    C:\Users\admin\AppData\Local\{6D6422EE-1184-43A9-BB03-7DD5BD491B9E}
    C:\Users\admin\AppData\Local\{E2D3D7B0-EE5C-47E3-B9DC-5D64BBA86597}
    C:\Users\admin\AppData\Local\{5016FA6B-E0E1-4D67-BBA6-C0C94A3B085E}
    C:\Users\admin\AppData\Local\{173A9616-A727-428A-9662-490A4714CEB9}
    C:\Users\admin\AppData\Local\{935E2EBE-5484-4D1C-9778-312DD742984D}
    C:\Users\admin\AppData\Local\{768FDFEC-DB5D-4381-A156-BCF22DFC8C14}
    C:\Users\admin\AppData\Local\{6560C8A0-9F70-41BD-9010-6D8C356A466D}
    C:\Users\admin\AppData\Local\{ED895FC9-E9C9-45F0-8674-6F9119CD3E85}
    C:\Users\admin\AppData\Local\{00F7A412-DBE4-4DDB-B2FB-7A6732F92A2C}
    C:\Users\admin\AppData\Local\{4164C851-67DF-4DD2-B408-BC546E9EEC3B}
    C:\Users\admin\AppData\Local\{BF6AC338-9E67-48F6-8A27-1651CC45991B}
    C:\Users\admin\AppData\Local\{404A16E5-6DF4-4662-96C3-17B02B086585}
    C:\Users\admin\AppData\Local\{3AE86938-351A-4759-98EC-BA0671D5E5E1}
    C:\Users\admin\AppData\Local\{6AD2734A-FB7E-4A3E-89A1-F51C5175472E}
    C:\Users\admin\AppData\Local\{F699B441-56D0-4C66-9E61-D535108BDCDB}
    C:\Users\admin\AppData\Local\{E0F1B71E-9916-4527-86C2-AB9356D12F41}
    C:\Users\admin\AppData\Local\{437D359C-341E-4EA3-B1F7-1012225F22C5}
    C:\Users\admin\AppData\Local\{F7B024C8-D498-47F9-8410-B28699E80689}
    C:\Users\admin\AppData\Local\{D3B5ACF3-01B6-42AC-9D13-9133B21C8B26}
    C:\Users\admin\AppData\Local\{D87CEA92-8465-436C-9404-8232DCE74B06}
    C:\Users\admin\AppData\Local\{F6BF0F63-C483-46B1-A209-BF647B695E8B}
    C:\Users\admin\AppData\Local\{5EAC46DF-2AEE-4FF7-9874-9C854D9B2DD2}
    C:\Users\admin\AppData\Local\{757AFDCA-D2AA-48F5-AFBE-D195A74A4D42}
    C:\Users\admin\AppData\Local\{44781867-1593-4217-A01D-67465CA3903A}
    C:\Users\admin\AppData\Local\{22E32E48-6818-4059-8425-B85851AAEA2C}
    C:\Users\admin\AppData\Local\{0FB50915-8E70-4E79-9B39-ACC8E569D818}
    C:\Users\admin\AppData\Local\{FA0332EB-D9C8-42D0-B156-E16C90D1D2A1}
    C:\Users\admin\AppData\Local\{5B8527F5-C670-48CE-840C-2017018DE35F}
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Now Run OTL again, same way as last time and attach the log from that as well as the log from Combofix.

    You must then let me know how things are running for you at this point.
     
  12. telomere

    telomere Private E-2

    Hi,
    I ran combofix and OTL, attaching the logs here.. combofix always deletes googletalk auto start but it still manage to show up in the start up whenever system is rebooted..I ran SAS to see if all infections are gone, SAS did find 24 adware tracking cookies and it deleted those..attaching SAS too...
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You keep forgetting to leave a description of how things are running.

    Still a few empty folders to be rid of.

    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the Image textbox. Do not include the word Code
    Code:
    Code:
    :files
    C:\Users\admin\AppData\Local\{CF8C5036-FB37-447E-9D5A-2699AEC425C8}
    C:\Users\admin\AppData\Local\{DE79B82C-4426-47DF-9061-CBA551905439}
    C:\Users\admin\AppData\Local\{0B720236-FD3B-4C1F-9210-4CA69715BC37}
    C:\Users\admin\AppData\Local\{8EE2CFFD-3518-4FE8-A0E4-560D4B179F43}
    C:\Users\admin\AppData\Local\{048F14D8-016B-4C0E-A42D-B21FCB78FC7F}
    C:\Users\admin\AppData\Local\{1560E619-1860-4FE2-80A4-777968FC142D}
    C:\Users\admin\AppData\Local\{73856A28-E97E-46E4-91AB-10A46444E191}
    C:\Users\admin\AppData\Local\{CB82212B-7A23-4F4C-9987-A3C075A2E2F3}
    C:\Users\admin\AppData\Local\{526E8630-0420-4048-B41D-2C0D4694B00D}
    C:\Users\admin\AppData\Local\{31AAA525-82F6-4B2C-A846-ADB317CE0446}
    C:\Users\admin\AppData\Local\{BBD96A54-072B-4241-A827-BDD62A30AA7F}
    C:\Users\admin\AppData\Local\{8EEAD256-82F8-431E-A38B-C90390998926}
    C:\Users\admin\AppData\Local\{1C3E49D7-D296-4CAF-B359-0528D45CEC38}
    C:\Users\admin\AppData\Local\{F4C483D3-DF3C-4D01-8497-C921B92E7E45}
    C:\Users\admin\AppData\Local\{3D690078-CBE9-484F-85E4-A70D7E8DAC40}
    C:\Users\admin\AppData\Local\{8ACD9A56-8D2C-413B-AD2C-4F3591E977D5}
    C:\Users\admin\AppData\Local\{5DDDBF2A-A2BD-4B9B-82FF-EF965D16A0B6}
    C:\Users\admin\AppData\Local\{BC693B84-5511-48AD-84B6-E324EC884218}
    C:\Users\admin\AppData\Local\{971E6819-CBCA-4E50-9A86-3B576116B789}
    C:\Users\admin\AppData\Local\{E9391388-39BF-495F-A14A-280A3A4CE626}
      
    :commands
    [EMPTYTEMP]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.

    Now just run OTL again like you did in post 11. Attach the requested logs. Tell me how things are running, please. :)
     
  14. telomere

    telomere Private E-2

    Hi,
    I ran OTL like u said , attaching the logs here..
    Things look ok wid my pc,I can go to that site again, am not blocked anymore and I dont get the message saying my pc acts as open proxy..
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Delete these folders using windows explorer. :)

    C:\Users\admin\AppData\Local\{4E1E8214-67F0-4518-8CB8-2834BD1A0755}
    C:\Users\admin\AppData\Local\{A2D64C51-E73D-4DD3-BB09-DFC6CE8EF881}
    C:\Users\admin\AppData\Local\{907694F8-F351-4444-8A75-FBBC8CB718C3}
    C:\Users\admin\AppData\Local\{27382342-80EF-4BCB-813E-831F6AFD18A7}

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required (If we renamed it please rename it back to Combofix.exe.
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  16. telomere

    telomere Private E-2

    I did delete that.. and just to make sure everything is OK, I did run a SAS scan, it found 80 threats, I removed it and deleted the quarantines from SAS, is my system still infected or is it OK? After this I did MBAM scan but MB did not find anything. Yesterday I did browse internet without my firewall on, is it cause of that all these threats came? May be i should browse internet from my Linux, till my windows adware thing is completely gone and all my protection is up ..
    Attaching the logs from SAS and MBAM..
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Cookies are nothing to worry about. ;)
     
  18. telomere

    telomere Private E-2

    Ohh Ok.. I was really worried :p Thanks a lot Kestral! Thanks a lot for all the help.. I really appreciate it.. Hope You are enjoying ur weekend :)
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thankyou. You too.

    You're welcome! :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds