1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Older PC with Spyware, Malware and possible Trojans

Discussion in 'Virus & Other Malware Removal' started by magnum35, Sep 30, 2008.

Thread Status:
Not open for further replies.
Advertisement
  1. magnum35

    magnum35 Thread Starter

    Joined:
    Sep 30, 2008
    Messages:
    1
    I just ran Eusing registry cleaner as it seems to do the best I have found thus far. Below is my hijackthis log.
    Please help out thanks
    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 9:51:46 AM, on 9/30/2008
    Platform: Windows 2000 SP4 (WinNT 5.00.2195)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
    Boot mode: Normal

    Running processes:
    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\System32\svchost.exe
    C:\WINNT\system32\spoolsv.exe
    C:\WINNT\System32\msdtc.exe
    C:\WINNT\system32\ntvk32.exe
    C:\WINNT\System32\llssrv.exe
    C:\WINNT\System32\tcpsvcs.exe
    C:\WINNT\system32\MSTask.exe
    C:\WINNT\System32\snmp.exe
    C:\WINNT\System32\WBEM\WinMgmt.exe
    C:\WINNT\system32\svchost.exe
    C:\WINNT\system32\Dfssvc.exe
    C:\WINNT\System32\dns.exe
    C:\WINNT\system32\mqsvc.exe
    C:\WINNT\Explorer.EXE
    C:\WINNT\msvj32.exe
    C:\WINNT\System32\svchost.exe
    C:\Program Files\iTunes\iTunes.exe
    C:\Program Files\iPod\bin\iPodService.exe
    C:\WINNT\system32\wuauclt.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\WINNT\system32\taskmgr.exe
    C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
    R3 - Default URLSearchHook is missing
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Class - {079FB08C-366B-FDEB-3E89-978A67746224} - (no file)
    O2 - BHO: Class - {30B36CC6-8E7C-0A94-5B94-E15C49EE738E} - (no file)
    O2 - BHO: Class - {34575C2A-5B57-EBAD-7D49-F18EE966FA39} - C:\WINNT\winig.dll
    O2 - BHO: Class - {7679089D-A1D1-C4EB-172C-010E8E0B8980} - C:\WINNT\system32\appvx.dll
    O2 - BHO: Class - {869AC35F-5F1A-ABC7-04D4-AA0D80E2EF03} - C:\WINNT\system32\javakt.dll
    O2 - BHO: Class - {8F301203-B818-4B05-7652-223F1BE22BEC} - C:\WINNT\system32\d3of32.dll
    O2 - BHO: Class - {9B55D29F-0137-085F-0C25-C369179408EE} - (no file)
    O2 - BHO: Class - {A02EE2AB-468C-2B54-8C41-14A6846BFF9B} - C:\WINNT\ipnp.dll
    O2 - BHO: Class - {D78BEB28-D826-058E-BDBF-3E7CDDE87971} - C:\WINNT\ieqt32.dll
    O2 - BHO: Class - {D81BDAA1-D347-C3BB-C8BF-0B48177F18A1} - C:\WINNT\ipki.dll
    O2 - BHO: Class - {DEFC7FFB-2275-95B8-5F00-2B0707AC3773} - C:\WINNT\sysqe.dll
    O2 - BHO: Class - {E2A44EF0-FD55-E652-D543-A3B9FF538C37} - C:\WINNT\system32\appwd.dll
    O2 - BHO: Class - {F6CBE672-2D4A-4D8F-BFA0-EE3A0AA5E340} - C:\WINNT\system32\mfcdi32.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
    O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O4 - HKLM\..\Run: [HPLJ Config] C:\Program Files\Hewlett-Packard\hp LaserJet 1150_1300\SetConfig.exe -c Direct -p LPT1: -pn "hp LaserJet 1300 PCL 6" -n 0 -l 1033 -sl 120000
    O4 - HKLM\..\Run: [wintv32.exe] C:\WINNT\system32\wintv32.exe
    O4 - HKLM\..\Run: [msvj32.exe] C:\WINNT\msvj32.exe
    O4 - HKUS\S-1-5-21-1229272821-1454471165-725345543-1001\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'NetShowServices')
    O4 - HKUS\.DEFAULT\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'Default user')
    O4 - Global Startup: Cisco Systems VPN Client.lnk.disabled
    O4 - Global Startup: WinZip Quick Pick.lnk.disabled
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O16 - DPF: DigiChat Applet - http://host7.digichat.com/DigiChat/DigiClasses/Client_IE.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=36467&clcid=0x409
    O16 - DPF: {22A88341-AFCB-45F0-A856-C2BAE74F878E} (InstallX Class) - http://www.75tz.com/codac/inst2_ax.cab
    O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52...pple.com/bonnie/us/win/QuickTimeInstaller.exe
    O16 - DPF: {9B03C5F1-F5AB-47EE-937D-A8EDA626F876} (Anonymizer Anti-Spyware Scanner) - http://download.zonelabs.com/bin/promotions/spywaredetector/WebAAS.cab
    O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/comcast/TrueInstallComcast.exe
    O23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINNT\system32\ntvk32.exe
    O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
    O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
    O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe

    --
    End of file - 6562 bytes
     
  2. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    hi there, you have an old hijacker!


    You don't appear to ahve either a firewall or an anti virus, download these and instlal them, once instlaled update anti vir!


    Comodo firewall. Sign up it's free!

    http://www.personalfirewall.trustix.com/


    Threads on comodo!

    http://www.wilderssecurity.com/forumdisplay.php?f=31




    Anti-vir

    http://www.free-av.com/


    You will need to download the following tools and have them ready to run.
    Do not run any of them until instructed to do so:

    Click: http://castlecops.com/zx/flrman1/cwsserviceremove.zip to download
    cwsserviceremove.zip and unzip it to your desktop.


    Download Killbox here: http://www.thespykiller.co.uk/files/killbox.exe and
    save it to your desktop.


    Click here: http://cwshredder.net/bin/CWSInstall.exe to download
    CWSinstall.exe to the desktop.


    Click: http://www.downloads.subratam.org/AboutBuster.zip to download
    AboutBuster created by Rubber Ducky.


    Unzip AboutBuster to the Desktop then click the "Update Button" then click
    "Check for Update" and download the updates and then click "Exit" because I
    don't want you to run it yet. Just get the updates so it is ready to run
    later in safe mode.


    Now go ahead and set your computer to show hidden files like so:


    Because XP will not always show you hidden files and folders by default,
    Go to Start > Search and under "More advanced search options".
    Make sure there is a check by "Search System Folders" and "Search hidden
    files and folders" and "Search system subfolders"

    Next click on My Computer. Go to Tools > Folder Options. Click on the View
    tab and make sure that "Show hidden files and folders" is checked. Also
    uncheck "Hide protected operating system files" and "Hide extensions for
    known file types" . Now click "Apply to all folders"
    Click "Apply" then "OK"


    ______________________________________________________________________

    Sign off the Internet and remain offline until this procedure is complete.
    Unplug your modem or disconnect the cable or phone line. Copy these
    instructions to notepad and save them on your desktop for easy access. You
    must follow these directions exactly and you cannot skip any part of it.
    ______________________________________________________________________


    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I)
    Right click and choose "Properties". On the "General" tab under "Service
    Status" click the "Stop" button to stop the service. Beside "Startup Type"
    in the dropdown menu select "Disabled". Click Apply then OK. Exit the
    Services utility.


    CAUTION: There is also a service named Remote Procedure Call (RPC) Locator
    and one called Remote Procedure Call (RPC) . These
    are the legitimate services. Do not stop those two.


    Note: You may get an error here when trying to access the properties of the
    service. If you do get an error, just select the service and look there in
    the top left of the main service window and click "Stop" to stop the
    service. If that gives an error or it is already stopped, just skip this
    step and proceed with the rest.


    Remote Procedure Call (RPC) Helper
    Network Security Service
    Workstation Netlogon Service
    Network Security Service (NSS)



    ______________________________________________________________________
    In Hijack This, click on the "Open Misc Tools section" button. Next click
    the
    "Delete an NT service" button. Copy and paste the following in that box:

    11Fßä#·ºÄÖ`I


    Click OK.


    Restart to safe mode.

    http://service1.symantec.com/SUPPOR...001052409420406

    Perform the following steps in safe mode:
    ____________________________________________________________________

    Double click on the cwsserviceemove.reg file you downloaded at the beginning
    to enter into the registry. Answer yes when asked to have its contents added
    to the registry.
    ____________________________________________________________________

    Go to Start > Run and type Hijackthis. Press enter to start HijackThis.
    DO NOT OPEN ANYTHING ELSE!



    Put a check by these entries in Hijack This and click the "Fix Checked"
    button:


    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R3 - Default URLSearchHook is missing
    O2 - BHO: Class - {079FB08C-366B-FDEB-3E89-978A67746224} - (no file)
    O2 - BHO: Class - {30B36CC6-8E7C-0A94-5B94-E15C49EE738E} - (no file)
    O2 - BHO: Class - {34575C2A-5B57-EBAD-7D49-F18EE966FA39} - C:\WINNT\winig.dll
    O2 - BHO: Class - {7679089D-A1D1-C4EB-172C-010E8E0B8980} - C:\WINNT\system32\appvx.dll
    O2 - BHO: Class - {869AC35F-5F1A-ABC7-04D4-AA0D80E2EF03} - C:\WINNT\system32\javakt.dll
    O2 - BHO: Class - {8F301203-B818-4B05-7652-223F1BE22BEC} - C:\WINNT\system32\d3of32.dll
    O2 - BHO: Class - {9B55D29F-0137-085F-0C25-C369179408EE} - (no file)
    O2 - BHO: Class - {A02EE2AB-468C-2B54-8C41-14A6846BFF9B} - C:\WINNT\ipnp.dll
    O2 - BHO: Class - {D78BEB28-D826-058E-BDBF-3E7CDDE87971} - C:\WINNT\ieqt32.dll
    O2 - BHO: Class - {D81BDAA1-D347-C3BB-C8BF-0B48177F18A1} - C:\WINNT\ipki.dll
    O2 - BHO: Class - {DEFC7FFB-2275-95B8-5F00-2B0707AC3773} - C:\WINNT\sysqe.dll
    O2 - BHO: Class - {E2A44EF0-FD55-E652-D543-A3B9FF538C37} - C:\WINNT\system32\appwd.dll
    O2 - BHO: Class - {F6CBE672-2D4A-4D8F-BFA0-EE3A0AA5E340} - C:\WINNT\system32\mfcdi32.dll
    O4 - HKLM\..\Run: [wintv32.exe] C:\WINNT\system32\wintv32.exe
    O4 - HKLM\..\Run: [msvj32.exe] C:\WINNT\msvj32.exe
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
    O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINNT\system32\ntvk32.exe

    ___________________________________________________________________


    Next run aboutbuster. Double click aboutbuster.exe, click OK, click Start,
    then click OK. This will scan your computer for the bad files and delete
    them.
    _______________________________________________________________________

    Finally, run CWShredder. Just click on the cwshredder.exe then click "Fix"
    (Not "Scan only") and let it do its thing.

    _______________________________________________________________________


    Now run cleanup




    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill.
    In the Full Path of File to Delete box, copy and paste each of the following
    lines one at a time then click on the button that has the red circle with
    the
    X in the middle after you enter each file. It will ask for confirmation to
    delete the file. Click Yes. Continue with that same procedure until you have
    copied and pasted all of these in the Paste Full Path of File to Delete box.



    Note: It is possible that Killbox will tell you that one or more files do
    not
    exist. If that happens, just continue on with all the files. Be sure you
    don't miss any.


    C:\WINNT\system32\wintv32.exe
    C:\WINNT\msvj32.exe
    C:\Program Files\Ebates_MoeMoneyMaker
    C:\WINNT\system32\ntvk32.exe


    __________________________________________________________

    In safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder
    and
    go to Edit > Select All then Edit > Delete to delete the entire contents of
    the Temp folder.

    Go to Start > Run and type %temp% in the Run box. The Temp folder will open.
    Click Edit > Select All then Edit > Delete to delete the entire contents of
    the Temp folder.

    Finally go to Control Panel > Internet Options. On the General tab under
    "Temporary Internet Files" Click "Delete Files". Put a check by "Delete
    Offline Content" and click OK. Click on the Programs tab then click the
    "Reset Web Settings" button. Click Apply then OK.
    _______________________________________________________________________



    Boot back into Windows now.




    This hijacker is known to alter or delete certain files so check this out
    please:


    Download the Hoster from:
    http://www.funkytoad.com/download/hoster.zip UnZip
    the file and press "Restore Original Hosts" and press "OK". Exit Program.


    If you have Spybot S&D installed you will also need to replace one file. Go
    to: http://www.spywareinfo.com/~merijn/winfiles.html and download
    SDHelper.dll. Copy the file to the folder containing your Spybot S&D program
    (normally C:\Program Files\Spybot - Search & Destroy)


    Check in the C:\Windows\system32 folder to be sure you have a file named
    Shell.dll. If you do not have one, go to the C:\Windows\system32\dllcache
    folder.


    Find shell.dll and right click on it. Choose Copy from the menu.
    Open the System32 folder and right click on an empty space in the window.
    Choose Paste from the menu. Otherwise, you can download following the
    instructions here: http://www.bleepingcomputer.com/files/shellxp.php


    control.exe may have been deleted.
    See if control.exe is present in C:\windows\system32


    If control.exe isn't there, go to:
    http://www.richardthelionhearted.co...es.html#control, and download
    control.exe per the instructions at the site.


    IMPORTANT!: Please check your ActiveX security settings. They may have been
    changed by this CWS variant to allow ALL ActiveX!! Reset your ActiveX
    security settings like so... Go to Internet Options > Security > Internet,
    press 'default level', then OK.
    Now press "Custom Level."
    In the ActiveX section, set the first two options (Download signed and
    unsigned ActiveX
    controls) to 'prompt', and 'Initialize and Script ActiveX controls not
    marked as safe" to 'disable'.




    Please download Malwarebytes Anti-Malware and save it to your desktop. alternate download link 1 alternate download link 2

    http://malwarebytes.gt500.org/mbam-setup.exe

    http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html

    * Make sure you are connected to the Internet.
    * Double-click on Download_mbam-setup.exe to install the application.
    * When the installation begins, follow the prompts and do not make any changes to default settings.
    * When installation has finished, make sure you leave both of these checked:
    o Update Malwarebytes' Anti-Malware
    o Launch Malwarebytes' Anti-Malware
    * Then click Finish.
    * MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
    * On the Scanner tab:
    o Make sure the "Perform Quick Scan" option is selected.
    o Then click on the Scan button.
    * If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
    * The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
    * When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
    * Click OK to close the message box and continue with the removal process.
    * Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
    * Make sure that everything is checked, and click Remove Selected.
    * When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
    * The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
    * Copy and paste the contents of that report in your next reply with a new hijackthis log.

    Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




    * Download Dr.Web CureIt to the desktop:
    ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

    * Doubleclick the drweb-cureit.exe file and Allow to run the express scan
    * This will scan the files currently running in memory and when something is
    found,
    click the yes button when it asks you if you want to cure it. This is only a
    short scan.
    * Once the short scan has finished, Click Options > Change settings
    * Choose the "Scan"-tab, remove the mark at "Heuristic analysis".
    * Back at the main window, mark the drives that you want to scan.
    * Select all drives. A red dot shows which drives have been chosen.
    * Click the green arrow at the right, and the scan will start.
    * Click 'Yes to all' if it asks if you want to cure/move the file.
    * When the scan has finished, look if you can click next icon next to the
    files found: IPB Image
    * If so, click it and then click the next icon right below and select Move
    incurable as you'll see in next image:
    IPB Image
    This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it
    can't be cured. (this in case if we need samples)
    * After selecting, in the Dr.Web CureIt menu on top, click file and choose
    save report list
    * Save the report to your desktop. The report will be called DrWeb.csv
    * Close Dr.Web Cureit.
    * Reboot your computer!! Because it could be possible that files in use will
    be moved/deleted during reboot.





    post another hijack this log, the malwarebytes and dr web log
     
  3. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
  4. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    Also put this one through the killbox!


    C:\WINNT\zflfg.dll
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/754800

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice