Welcome to MalwareRemoval.com,
What if we told you that you could get malware removal help from experts, and that it was 100% free? MalwareRemoval.com provides free support for people with infected computers. Our help, and the tools we use are always 100% free. No hidden catch. We simply enjoy helping others. You enjoy a clean, safe computer.

Malware Removal Instructions

Help me please... I am going totally crazy !!!

MalwareRemoval.com provides free support for people with infected computers. Using plain language that anyone can understand, our community of volunteer experts will walk you through each step.

Unread postby bamajim » December 13th, 2006, 9:20 pm

lymphocyte

1. Rerun Killbox as in the previous instructions

Your file to copy and paste is
    C:\WINDOWS\system32\gebbcaa.dll
2. Go HERE and download RegCleaner
    Save it to your Desktop
    Double Click the RegCleaner Icon on your dekstop->>Then Run
    The next window that opens, in the "Unzip to folder window"
    Type in C:\Documents and Settings\All users\Desktop then press the Unzip Button
    The folder should now appear on your Desktop
    Double click that folder then the succeeding folders until you see Regclean.exe (red and green box)
    Double Click to run the program
    Once the program finishes running Select the "Fix Errors" button
    and close the program
3. *NOTE* CCleaner deletes EVERYTHING out of temp/temporary folders. If you have anything in a temp folder, back it up or move it to a permanent folder prior to running CCleaner!

Download CCleaner from here to clean temp files from your computer.

  • Double click on the file to start the installation of the program.
  • Select your language and click OK, then next.
  • Read the license agreement and click I Agree.
  • Click next to use the default install location. Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the "Windows" tab, under "Internet Explorer," uncheck "Cookies" if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for "Cookies" is on the Applications tab, under Firefox/Mozilla.
  • Click on the "Options" icon at the left side of the window, then click on "Advanced."
    deselect "Only delete files in Windows Temp folders older than 48 hours."
  • Click on the "Cleaner" icon on the left side of the window, then click Run Cleaner to run the program.
  • Caution: It is not recommended that you use the "Issues" feature unless you are very familiar with the registry as it has been known to find legitimate items.
  • After CCleaner has completed its process, click Exit.

Reboot your PC->> Then see if you still get the warnings

thanks bamajim
User avatar
bamajim
Visiting Staff
 
Posts: 1138
Joined: February 3rd, 2006, 11:09 am
Advertisement
Register to Remove

Unread postby lymphocyte » December 14th, 2006, 8:33 pm

Hi again...

After doing everything... I launched a SpyBot scan... and the same 12 problems are still there... and when I try to delete them, the software tells me that files cannot be deleted because they are still in use (in memory).

Here is the log of Spybot, followed by a new log of HiJackThis

Sorry again... I know I use a lot of your time :cry: If you are desperate and tired of helping me because nothing is working... dont hesitate to tell me. I'm pretty sure that my computer is running much better know.

Thanks again

AdSponsor: Settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\AdSponsor

AdSponsor: Settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\AdSponsor

CMFibula: Settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\CMIntex

CMFibula: Settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\CMIntex

CMFibula: User settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\CMFibula

CMFibula: User settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\CMFibula

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\PSDream

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\PSDream

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\PSCloner

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\PSCloner

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\S-1-5-18\Software\PSCastor

PSCastor: User settings (Registry key, nothing done)
HKEY_USERS\.DEFAULT\Software\PSCastor


--- Spybot - Search && Destroy version: 1.3 ---
2006-12-08 Includes\Cookies.sbi
2006-12-08 Includes\Dialer.sbi
2006-12-08 Includes\DialerC.sbi
2006-11-24 Includes\Hijackers.sbi
2006-12-08 Includes\HijackersC.sbi
2006-10-27 Includes\Keyloggers.sbi
2006-12-08 Includes\KeyloggersC.sbi
2004-05-11 Includes\LSP.sbi
2006-12-08 Includes\Malware.sbi
2006-12-08 Includes\MalwareC.sbi
2006-10-20 Includes\PUPS.sbi
2006-12-08 Includes\PUPSC.sbi
2006-12-08 Includes\Revision.sbi
2006-12-08 Includes\Security.sbi
2006-12-08 Includes\SecurityC.sbi
2006-10-13 Includes\Spybots.sbi
2006-12-08 Includes\SpybotsC.sbi
2005-02-17 Includes\Tracks.uti
2006-12-08 Includes\Trojans.sbi
2006-12-08 Includes\TrojansC.sbi
-----------------------------------------------------------------

Logfile of HijackThis v1.99.1
Scan saved at 19:34:00, on 2006-12-14
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Fichiers communs\Symantec Shared\ccSetMgr.exe
C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
E:\AVG Anti-Spyware 7.5\guard.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
E:\MacDisk\lsdiorw\lsdiorw.exe
C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\System32\nvsvc32.exe
e:\Spyware Doctor\sdhelp.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\System32\wdfmgr.exe
C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
C:\Program Files\Fichiers communs\Logitech\QCDriver\LVCOMS.EXE
E:\iTunes\iTunesHelper.exe
E:\Acrobat 7.0\Distillr\Acrotray.exe
E:\Gadwin Systems\PrintScreen\PrintScreen.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
C:\Documents and Settings\Patrick\Bureau\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://rds.ca/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/def ... earch.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://proxy.umontreal.ca:8080
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - E:\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - E:\Spyware Doctor\tools\iesdsg.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - E:\Spyware Doctor\tools\iesdpb.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [Zone Labs Client] "E:\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [NvCplDaemon] "RUNDLL32.EXE" C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [LVCOMS] "C:\Program Files\Fichiers communs\Logitech\QCDriver\LVCOMS.EXE"
O4 - HKLM\..\Run: [iTunesHelper] "E:\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Acrobat Assistant 7.0] "E:\Acrobat 7.0\Distillr\Acrotray.exe"
O4 - HKCU\..\Run: [Gadwin PrintScreen 3.1] E:\Gadwin Systems\PrintScreen\PrintScreen.exe /nosplash
O4 - Global Startup: Adobe Acrobat Speed Launcher.lnk = ?
O8 - Extra context menu item: Convert link target to Adobe PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert link target to existing PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert selected links to Adobe PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
O8 - Extra context menu item: Convert selected links to existing PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
O8 - Extra context menu item: Convert selection to Adobe PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert selection to existing PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: Convert to Adobe PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
O8 - Extra context menu item: Convert to existing PDF - res://E:\Acrobat 7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://E:\Microsoft Office\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Console Java (Sun) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - E:\Spyware Doctor\tools\iesdpb.dll
O9 - Extra button: Recherche - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - E:\Microsoft Office\OFFICE11\REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - e:\PartyPoker\PartyPoker\RunApp.exe
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - e:\PartyPoker\PartyPoker\RunApp.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSN Messenger\msgrapp.dll" (file missing)
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)
O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Fichiers communs\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - Service: AVG Anti-Spyware Guard - Anti-Malware Development a.s. - E:\AVG Anti-Spyware 7.5\guard.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Fichiers communs\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Lsdiorw - Logiciels & Services Duhem, Paris, France - E:\MacDisk\lsdiorw\lsdiorw.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: PC Tools Spyware Doctor (SDhelper) - PC Tools Research Pty Ltd - e:\Spyware Doctor\sdhelp.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Fichiers communs\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
lymphocyte
Active Member
 
Posts: 13
Joined: November 25th, 2006, 5:44 pm

Unread postby bamajim » December 14th, 2006, 9:28 pm

lymphocyte

I'm not tired of helping, just stay with me until we get this fixed :)

I was hoping to do this without doing a manual fix, I still think they are orphaned entries, but lets see

Run Spybot S&D
    At the Menu Bar Select Mode->>Advanced
    In the Left Pane Select Tools->>View Reports
    In the Right Pane Check the following Boxes
      Include ActiveX list in report
      Include startup list in report
      Include system information in report
      Include process list in report

    Then Select View report
    When Finished Select Export
    And Save it to your Desktop
    Close SpyBot S&D

Open the Report you saved to your Desktop, copy and paste the results of the Spybot SD.Report text as a reply to this thread

thanks
User avatar
bamajim
Visiting Staff
 
Posts: 1138
Joined: February 3rd, 2006, 11:09 am

My report

Unread postby lymphocyte » December 15th, 2006, 4:55 pm

Hi... here is the report...

Thanks again

--- Search result list ---

--- Spybot - Search && Destroy version: 1.3 ---
2006-12-08 Includes\Cookies.sbi
2006-12-08 Includes\Dialer.sbi
2006-12-08 Includes\DialerC.sbi
2006-11-24 Includes\Hijackers.sbi
2006-12-08 Includes\HijackersC.sbi
2006-10-27 Includes\Keyloggers.sbi
2006-12-08 Includes\KeyloggersC.sbi
2004-05-11 Includes\LSP.sbi
2006-12-08 Includes\Malware.sbi
2006-12-08 Includes\MalwareC.sbi
2006-10-20 Includes\PUPS.sbi
2006-12-08 Includes\PUPSC.sbi
2006-12-08 Includes\Revision.sbi
2006-12-08 Includes\Security.sbi
2006-12-08 Includes\SecurityC.sbi
2006-10-13 Includes\Spybots.sbi
2006-12-08 Includes\SpybotsC.sbi
2005-02-17 Includes\Tracks.uti
2006-12-08 Includes\Trojans.sbi
2006-12-08 Includes\TrojansC.sbi


--- System information ---
Windows XP (Build: 2600) Service Pack 1
/ Windows Media Player: Correctif pour le Lecteur Windows Media [Voir Q828026 pour plus d'informations]
/ Windows Media Player / SP0: Correctif pour le Lecteur Windows Media [Voir Q828026 pour plus d'informations]
/ Windows XP / SP2: Correctif Windows XP - KB822603
/ Windows XP / SP2: Correctif Windows XP - KB823182
/ Windows XP / SP2: Correctif Windows XP - KB824105
/ Windows XP / SP2: Correctif Windows XP - KB824141
/ Windows XP / SP2: Correctif Windows XP - KB825119
/ Windows XP / SP2: Correctif Windows XP - KB826939
/ Windows XP / SP2: Correctif Windows XP - KB828035
/ Windows XP / SP2: Correctif Windows XP - KB828741
/ Windows XP / SP2: Correctif Windows XP - KB835732
/ Windows XP / SP2: Correctif Windows XP - KB837001
/ Windows XP / SP2: Correctif Windows XP - KB840374
/ Windows XP / SP2: Correctif Windows XP (SP2) Q327979
/ Windows XP / SP2: Windows XP Hotfix Package [See Q328145 for more information]
/ Windows XP / SP2: Package du correctif Windows XP [voir Q329692 pour plus de détails]
/ Windows XP / SP2: Package du correctif Windows XP [voir Q331958 pour plus de détails]
/ Windows XP / SP2: Correctif Windows XP (SP2) Q810400
/ Windows XP / SP2: Correctif Windows XP (SP2) Q811114
/ Windows XP / SP2: Correctif Windows XP (SP2) q812415


--- Startup entries list ---
Located: HK_LM:Run, Acrobat Assistant 7.0
command: "E:\Acrobat 7.0\Distillr\Acrotray.exe"
file: E:\Acrobat 7.0\Distillr\Acrotray.exe
size: 483328
MD5: bd99953b6f8b36862b5b86c2fe39a8a3

Located: HK_LM:Run, iTunesHelper
command: "E:\iTunes\iTunesHelper.exe"
file: E:\iTunes\iTunesHelper.exe
size: 229952
MD5: ceccc68b54e8e27c93dbede85f160c96

Located: HK_LM:Run, LVCOMS
command: "C:\Program Files\Fichiers communs\Logitech\QCDriver\LVCOMS.EXE"
file: C:\Program Files\Fichiers communs\Logitech\QCDriver\LVCOMS.EXE
size: 98304
MD5: 2d969f669ffdf2d01e07b2ada484186a

Located: HK_LM:Run, NvCplDaemon
command: "RUNDLL32.EXE" C:\WINDOWS\System32\NvCpl.dll,NvStartup
file: C:\WINDOWS\system32\RUNDLL32.EXE
size: 32256
MD5: ac0f912ea7571e9c1ad7b64c83f72bd9

Located: HK_LM:Run, QuickTime Task
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: d2c900031fd445b5464abb5629388be3

Located: HK_LM:Run, SunJavaUpdateSched
command: "C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe"
file: C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
size: 36975
MD5: 61a3a9d5d98bf0331df5b716144a8100

Located: HK_LM:Run, Zone Labs Client
command: "E:\Zone Labs\ZoneAlarm\zlclient.exe"
file: E:\Zone Labs\ZoneAlarm\zlclient.exe
size: 968696
MD5: 71514e2c74d554f5902dc184046eca3b

Located: HK_LM:Run, Acrobat Assistant 7.0 (DISABLED)
command: "E:\Acrobat 7.0\Distillr\Acrotray.exe"
file: E:\Acrobat 7.0\Distillr\Acrotray.exe
size: 483328
MD5: bd99953b6f8b36862b5b86c2fe39a8a3

Located: HK_LM:Run, ccApp (DISABLED)
command: "C:\Program Files\Fichiers communs\Symantec Shared\ccApp.exe"
file: C:\Program Files\Fichiers communs\Symantec Shared\ccApp.exe
size: 48752
MD5: 920928fd0b4a1989466912fd138dc708

Located: HK_LM:Run, iTunesHelper (DISABLED)
command: "E:\iTunes\iTunesHelper.exe"
file: E:\iTunes\iTunesHelper.exe
size: 229952
MD5: ceccc68b54e8e27c93dbede85f160c96

Located: HK_LM:Run, NeroFilterCheck (DISABLED)
command: C:\WINDOWS\System32\NeroCheck.exe
file: C:\WINDOWS\System32\NeroCheck.exe
size: 155648
MD5: 3e4c03cefad8de135263236b61a49c90

Located: HK_LM:Run, NvCplDaemon (DISABLED)
command: RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
file: C:\WINDOWS\system32\RUNDLL32.EXE
size: 32256
MD5: ac0f912ea7571e9c1ad7b64c83f72bd9

Located: HK_LM:Run, NvMediaCenter (DISABLED)
command: RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
file: C:\WINDOWS\system32\RUNDLL32.EXE
size: 32256
MD5: ac0f912ea7571e9c1ad7b64c83f72bd9

Located: HK_LM:Run, nwiz (DISABLED)
command: nwiz.exe /install
file: C:\WINDOWS\system32\nwiz.exe
size: 1519616
MD5: 0033ce6494554e47514d3487c9a8f93d

Located: HK_LM:Run, QuickTime Task (DISABLED)
command: "C:\Program Files\QuickTime\qttask.exe" -atboottime
file: C:\Program Files\QuickTime\qttask.exe
size: 282624
MD5: d2c900031fd445b5464abb5629388be3

Located: HK_LM:Run, SunJavaUpdateSched (DISABLED)
command: C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
file: C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
size: 32881
MD5: d7b9be63c406103ee1405fe473ac0697

Located: HK_LM:Run, type32 (DISABLED)
command: "C:\Program Files\Microsoft IntelliType Pro\type32.exe"
file: C:\Program Files\Microsoft IntelliType Pro\type32.exe
size: 172032
MD5: 05e10c2c3736e52fe33d16d2f9c73c04

Located: HK_LM:Run, vptray (DISABLED)
command: C:\PROGRA~1\Symantec AntiVirus\VPTray.exe
file: C:\PROGRA~1\Symantec AntiVirus\VPTray.exe
size: 85696
MD5: 78e501d932b2721f0e074886a31af0ba

Located: HK_CU:Run, Gadwin PrintScreen 3.1
command: E:\Gadwin Systems\PrintScreen\PrintScreen.exe /nosplash

Located: HK_CU:Run, Gadwin PrintScreen 3.1 (DISABLED)
command: E:\Gadwin Systems\PrintScreen\PrintScreen.exe /nosplash

Located: Startup (common), Adobe Acrobat Speed Launcher.lnk
command: C:\WINDOWS\Installer\{AC76BA86-1033-0000-7760-000000000002}\SC_Acrobat.exe
file: C:\WINDOWS\Installer\{AC76BA86-1033-0000-7760-000000000002}\SC_Acrobat.exe
size: 25214
MD5: d6294d59171ac375cd142003566aa89e



--- Browser helper object list ---
{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (AcroIEHlprObj Class)
BHO name:
CLSID name: AcroIEHlprObj Class
description: Adobe Acrobat reader
classification: Legitimate
known filename: ACROIEHELPER.OCX
info link: http://www.adobe.com/products/acrobat/readstep2.html
info source: TonyKlein
Path: E:\Acrobat 7.0\ActiveX\
Long name: AcroIEHelper.dll
Short name:
Date (created): 2005-09-24 00:12:08
Date (last access): 2006-03-16 23:00:10
Date (last write): 2005-09-24 00:12:08
Filesize: 63136
Attributes: archive
MD5: B61D5D651ECC6055C29BF826CA7B1141
CRC32: FEF15799
Version: 0.7.0.0

{53707962-6F74-2D53-2644-206D7942484F} ()
BHO name:
CLSID name:
description: Spybot-S&D IE Browser plugin
classification: Legitimate
known filename: SDHelper.dll
info link: http://spybot.eon.net.au/
info source: Patrick M. Kolla
Path: C:\PROGRA~1\SPYBOT~1\
Long name: SDHelper.dll
Short name:
Date (created): 2004-05-11 19:03:00
Date (last access): 2006-01-22 07:04:18
Date (last write): 2004-05-11 19:03:00
Filesize: 744960
Attributes: archive
MD5: ABF5BA518C6A5ED104496FF42D19AD88
CRC32: 5587736E
Version: 0.1.0.3

{5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} (PCTools Site Guard)
BHO name:
CLSID name: PCTools Site Guard
Path: E:\Spyware Doctor\tools\
Long name: iesdsg.dll
Short name:
Date (created): 2006-11-23 19:36:26
Date (last access): 2006-11-23 19:36:26
Date (last write): 2006-05-05 13:55:04
Filesize: 803048
Attributes: archive
MD5: 783E7419950215EA9CA00C1C0C15B386
CRC32: 2EF67EF5
Version: 0.3.0.6

{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (SSVHelper Class)
BHO name:
CLSID name: SSVHelper Class
Path: C:\Program Files\Java\jre1.5.0_06\bin\
Long name: ssv.dll
Short name:
Date (created): 2005-11-10 13:03:56
Date (last access): 2005-11-10 13:03:56
Date (last write): 2005-11-10 13:22:10
Filesize: 184423
Attributes: archive
MD5: F01726F7CA8538FDD4663C9DB8FEAEDC
CRC32: 0111B892
Version: 0.5.0.0

{AA58ED58-01DD-4d91-8333-CF10577473F7} (Google Toolbar Helper)
BHO name:
CLSID name: Google Toolbar Helper
description: Google toolbar
classification: Open for discussion
known filename: Googletoolbar.dll
info link: http://toolbar.google.com/
info source: TonyKlein
Path: c:\program files\google\
Long name: GoogleToolbar3.dll
Short name:
Date (created): 2006-10-30 17:44:32
Date (last access): 2006-10-30 17:44:32
Date (last write): 2006-10-17 15:04:36
Filesize: 2153536
Attributes: readonly archive
MD5: D7C951510ABB954204A798A21A510D98
CRC32: 5D8D9479
Version: 0.4.0.0

{B56A7D7D-6927-48C8-A975-17DF180C71AC} (PCTools Browser Monitor)
BHO name:
CLSID name: PCTools Browser Monitor
Path: E:\Spyware Doctor\tools\
Long name: iesdpb.dll
Short name:
Date (created): 2006-11-23 19:36:26
Date (last access): 2006-11-23 19:38:20
Date (last write): 2006-11-23 19:38:20
Filesize: 850104
Attributes: archive
MD5: 788BD4FBDC3D24B3D18B582D32EF00EA
CRC32: DD714CB5
Version: 0.3.0.6



--- ActiveX list ---
{00000161-9980-0010-8000-00AA00389B71} ()
DPF name:
CLSID name:

{3334504D-9980-0010-8000-00AA00389B71} ()
DPF name:
CLSID name:

{33564D57-9980-0010-8000-00AA00389B71} ()
DPF name:
CLSID name:
description: Microsoft WMV Video Codec
classification: Legitimate
known filename: WMV9DMO.CAB
info link:
info source: Patrick M. Kolla

{D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)
DPF name:
CLSID name: Shockwave Flash Object
description: Macromedia Shockwave Flash Player
classification: Legitimate
known filename:
info link:
info source: Patrick M. Kolla
Path: C:\WINDOWS\System32\Macromed\Flash\
Long name: Flash9b.ocx
Short name:
Date (created): 2006-11-09 14:46:28
Date (last access): 2006-11-09 14:46:28
Date (last write): 2006-11-09 14:46:28
Filesize: 2262648
Attributes: readonly archive
MD5: F3B3EE66CA76C94510555ABE9D00A353
CRC32: A51F3CB4
Version: 0.9.0.0



--- Process list ---
Spybot - Search && Destroy process list report, 2006-12-15 15:54:12

PID: 0 ( 0) [System]
PID: 4 ( 0) System
PID: 356 ( 296) C:\WINDOWS\Explorer.EXE
PID: 480 ( 704) C:\WINDOWS\System32\svchost.exe
PID: 568 ( 4) \SystemRoot\System32\smss.exe
PID: 628 ( 568) \??\C:\WINDOWS\system32\csrss.exe
PID: 656 ( 568) \??\C:\WINDOWS\system32\winlogon.exe
PID: 704 ( 656) C:\WINDOWS\system32\services.exe
PID: 720 ( 656) C:\WINDOWS\system32\lsass.exe
PID: 764 ( 704) C:\Program Files\iPod\bin\iPodService.exe
PID: 876 ( 704) C:\WINDOWS\system32\svchost.exe
PID: 928 ( 704) C:\WINDOWS\System32\svchost.exe
PID: 992 ( 704) C:\WINDOWS\System32\svchost.exe
PID: 1032 ( 704) C:\Program Files\Fichiers communs\Symantec Shared\ccSetMgr.exe
PID: 1096 ( 704) C:\Program Files\Fichiers communs\Symantec Shared\ccEvtMgr.exe
PID: 1212 ( 704) C:\WINDOWS\system32\spoolsv.exe
PID: 1252 ( 356) E:\Zone Labs\ZoneAlarm\zlclient.exe
PID: 1272 ( 356) C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
PID: 1320 ( 356) C:\Program Files\Fichiers communs\Logitech\QCDriver\LVCOMS.EXE
PID: 1340 ( 356) E:\iTunes\iTunesHelper.exe
PID: 1368 ( 356) E:\Acrobat 7.0\Distillr\Acrotray.exe
PID: 1408 ( 356) E:\Gadwin Systems\PrintScreen\PrintScreen.exe
PID: 1536 ( 704) E:\AVG Anti-Spyware 7.5\guard.exe
PID: 1552 ( 704) C:\Program Files\Symantec AntiVirus\DefWatch.exe
PID: 1616 ( 704) E:\MacDisk\lsdiorw\lsdiorw.exe
PID: 1708 ( 704) C:\Program Files\Fichiers communs\Microsoft Shared\VS7DEBUG\MDM.EXE
PID: 1724 ( 704) C:\WINDOWS\System32\nvsvc32.exe
PID: 1784 ( 704) e:\Spyware Doctor\sdhelp.exe
PID: 1812 ( 704) C:\WINDOWS\System32\svchost.exe
PID: 1836 ( 704) C:\Program Files\Symantec AntiVirus\Rtvscan.exe
PID: 1872 ( 704) C:\WINDOWS\System32\wdfmgr.exe
PID: 1904 ( 704) C:\WINDOWS\system32\ZoneLabs\vsmon.exe
PID: 2732 ( 356) C:\Program Files\Internet Explorer\IEXPLORE.EXE
PID: 2780 ( 876) C:\Program Files\Google\GoogleToolbarNotifier\1.2.908.5008\GoogleToolbarNotifier.exe
PID: 3840 ( 356) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe


--- Browser start & search pages list ---
Spybot - Search && Destroy browser pages report, 2006-12-15 15:54:12

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
http://www.google.com
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
http://rds.ca/
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://www.google.com/ie
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\@
http://www.google.com/search?q=%s
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
%SystemRoot%\system32\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Bar
http://us.rd.yahoo.com/customize/ie/def ... earch.html
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
http://www.yahoo.com/
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
http://www.microsoft.com/isapi/redir.dl ... ar=msnhome
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
http://www.google.com/ie
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
http://www.google.com/ie
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\CustomizeSearch
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm


--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]

Protocol 1: MSAFD Tcpip [UDP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]

Protocol 2: MSAFD Tcpip [RAW/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]

Protocol 3: RSVP UDP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\rsvpsp.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Protocol 4: RSVP TCP Service Provider
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\rsvpsp.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider

Protocol 5: MSAFD NetBIOS [\Device\NetBT_Tcpip_{24DFA115-9579-41A9-AEE6-1FCF95FC7BF3}] SEQPACKET 4
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 6: MSAFD NetBIOS [\Device\NetBT_Tcpip_{24DFA115-9579-41A9-AEE6-1FCF95FC7BF3}] DATAGRAM 4
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 7: MSAFD NetBIOS [\Device\NetBT_Tcpip_{F2EC727E-405F-4930-BD50-1CAD5EB0C877}] SEQPACKET 0
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 8: MSAFD NetBIOS [\Device\NetBT_Tcpip_{F2EC727E-405F-4930-BD50-1CAD5EB0C877}] DATAGRAM 0
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 9: MSAFD NetBIOS [\Device\NetBT_Tcpip_{35BBE09B-61F7-4809-AE9A-4885C14CACD2}] SEQPACKET 1
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 10: MSAFD NetBIOS [\Device\NetBT_Tcpip_{35BBE09B-61F7-4809-AE9A-4885C14CACD2}] DATAGRAM 1
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 11: MSAFD NetBIOS [\Device\NetBT_Tcpip_{F97CE151-D010-4F58-96A7-7E15EE2AD870}] SEQPACKET 2
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 12: MSAFD NetBIOS [\Device\NetBT_Tcpip_{F97CE151-D010-4F58-96A7-7E15EE2AD870}] DATAGRAM 2
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 13: MSAFD NetBIOS [\Device\NetBT_Tcpip_{49E737BC-141E-4943-830E-CD95DBDC2836}] SEQPACKET 3
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Protocol 14: MSAFD NetBIOS [\Device\NetBT_Tcpip_{49E737BC-141E-4943-830E-CD95DBDC2836}] DATAGRAM 3
GUID: {8D5F1830-C273-11CF-95C8-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP NetBios protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD NetBIOS *

Namespace Provider 0: TCP/IP
GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: TCP/IP

Namespace Provider 1: NTDS
GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
Filename: %SystemRoot%\System32\winrnr.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\winrnr.dll
DB protocol: NTDS

Namespace Provider 2: Espace de noms NLA (Network Location Awareness)
GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
Filename: %SystemRoot%\System32\mswsock.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: NLA-Namespace
lymphocyte
Active Member
 
Posts: 13
Joined: November 25th, 2006, 5:44 pm

Unread postby bamajim » December 16th, 2006, 10:07 pm

lymphocyte

Sorry for the delay

1. Open Notepad (Not Wordpad) Copy and paste the following into Notepad
    RegDeleteKey HKUS\S-1-5-18\Software\AdSponsor
    RegDeleteKey HKUS\.DEFAULT\Software\AdSponsor
    RegDeleteKey HKUS\S-1-5-18\Software\CMIntex
    RegDeleteKey HKUS\.DEFAULT\Software\CMIntex
    RegDeleteKey HKUS\S-1-5-18\Software\CMFibula
    RegDeleteKey HKUS\.DEFAULT\Software\CMFibula
    RegDeleteKey HKUS\S-1-5-18\Software\PSDream
    RegDeleteKey HKUS\.DEFAULT\Software\PSDream
    RegDeleteKey HKUS\S-1-5-18\Software\PSCloner
    RegDeleteKey HKUS\.DEFAULT\Software\PSCloner
    RegDeleteKey HKUS\S-1-5-18\Software\PSCastor
    RegDeleteKey HKUS\.DEFAULT\Software\PSCastor
Click File->>Save->> type in NEW.bfu ->>And Save It to the C:\BFU folder you created Eariler

Under Save as Type->>Select ALL FILES or it will not work->>Close Notepad

2. Then, please go to Start > My Computer and navigate to the C:\BFU folder.

  • Start the Brute Force Uninstaller by doubleclicking BFU.exe
  • Behind the scriptline to execute field click the folder icon Image and select NEW.bfu
  • Press Execute and let the program do it’s job. (You ought to see a progress bar if you did this correctly.)
  • Wait for the complete script execution box to pop up and press OK.
  • Press exit to terminate the BFU program.

Reboot into normal windows and see if that solves the problem

thanks bamajim
User avatar
bamajim
Visiting Staff
 
Posts: 1138
Joined: February 3rd, 2006, 11:09 am

Problem solve !

Unread postby lymphocyte » December 17th, 2006, 1:47 pm

Wow :idea: ! You guys are just great !

Everything seems to be ok now... Thank you so much you can't beleive how much I appreciate it !!! :lol:

Just a quick last question... what software combination should I have on my computer to have the maximum range of protection from any kind of malwares... Right now, i'm permenently running Zone Alarm and I do scans using SpyBot, Ad-Aware, and AVG (although AVG license will expire in a few days)?

ThANKS again !!!

Lymphocyte
lymphocyte
Active Member
 
Posts: 13
Joined: November 25th, 2006, 5:44 pm

Unread postby bamajim » December 17th, 2006, 2:13 pm

lymphocyte

Glad we could help, and a thanks to Metallica, the developer of the Alcan fix who helped here to fix this the "safe way"

1. The most important thing for you to do now is to Go HERE and download and install SP2 (service pack 2). You are currently running SP1 which has some security flaws. It's a rather large download, about 2 hrs. but it is a must have. I think it best to follow the proceedure in my final notes and create a clean system restore point before you install SP2

Your Log is Clean from malware
I appreciate your patience in working through this.

You may now remove/delete/uninstall the tools we used to clean your PC

Be sure to go back and hide "Hidden files and folders" reversing the proceedure we used earlier

Now that your log is clean

There are some final notes:
Disable and Enable System Restore
    Lets create a clean System Restore point
    the instructions are here

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system.
Please follow these steps to remove older version Java components and update.

Updating Java:
    Download the latest version of
    Java Runtime Environment (JRE) 6.0.
    Scroll down to where it says "The J2SE Runtime Environment (JRE) allows end-users to run Java applications".
    Click the "Download" button to the right.
    Check the box that says: "Accept License Agreement".
    The page will refresh.
    Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
    Close any programs you may have running - especially your web browser.
    Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
    Check any item with Java Runtime Environment (JRE or J2SE) in the name.
    Click the Remove or Change/Remove button.
    Repeat as many times as necessary to remove each Java versions.
    Reboot your computer once all Java components are removed.
    Then from your desktop double-click on jre-6-windowsi586-p.exe to install the newest version.

Make your Internet Explorer more secure
This can be done by following these simple instructions:
    Open Internet Explorer click Tools->> Options.
    Click Security tab
    Click once on the Internet icon so it becomes highlighted.
    Click Custom Level.
    Change the Download signed ActiveX controls to Prompt
    Change the Download unsigned ActiveX controls to Disable
    Change the Initialise and script ActiveX controls not marked as safe to Disable
    Change the Installation of desktop items to Prompt
    Change the Launching programs and files in an IFRAME to Prompt
    Change the Navigate sub-frames across different domains to Prompt
    When all these settings have been made, click OK.
    If it prompts you to save the settings, press Yes.
    Next press Apply and then OK to exit the Internet Properties page
Update your Anti Virus Software

Use and maintain a Firewall

Install IE SPYAD for protection against innocent looking websites that are not innocent

Visit Microsoft's Windows UpdateSite Frequently for critical updates

Backup your Important Documents and Files on a regular basis
    To a disc or a USB key, not your Hardrive

You may want to read this article"So how did I get infected in the first place" by Tony Klein

surf safe

Thanks bamajim
User avatar
bamajim
Visiting Staff
 
Posts: 1138
Joined: February 3rd, 2006, 11:09 am

Unread postby lymphocyte » December 17th, 2006, 3:17 pm

I did everything !

Continu your great work !

Thanks again !
lymphocyte
Active Member
 
Posts: 13
Joined: November 25th, 2006, 5:44 pm

Unread postby Nellie2 » January 2nd, 2007, 8:01 pm

Glad we could be of assistance.

This topic is now closed. If you wish it reopened, please send us an email to 'admin at malwareremoval.com' with a link to your thread.

The help you receive here is free but you can help support this site from this link if you wish:
Donations For Malware Removal

Do not bother contacting us if you are not the topic starter. A valid, working link to the closed topic is required along with the user name used.
If the user name does not match the one in the thread linked, the email will be deleted
User avatar
Nellie2
Administrator Emeritus
 
Posts: 8737
Joined: December 16th, 2004, 5:01 pm
Location: UK
Advertisement
Register to Remove

Previous

  • Similar Topics
    Replies
    Views
    Last post

Return to Infected? Virus, malware, adware, ransomware, oh my!



Who is online

Users browsing this forum: No registered users and 42 guests

Contact us:

Advertisements do not imply our endorsement of that product or service. Register to remove all ads. The forum is run by volunteers who donate their time and expertise. We make every attempt to ensure that the help and advice posted is accurate and will not cause harm to your computer. However, we do not guarantee that they are accurate and they are to be used at your own risk. All trademarks are the property of their respective owners.

Member site: UNITE Against Malware