1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Results for MFDnSC + new HJT log

Discussion in 'Virus & Other Malware Removal' started by ac4310, Feb 7, 2007.

Thread Status:
Not open for further replies.
  1. ac4310

    ac4310 Thread Starter

    Joined:
    Mar 4, 2005
    Messages:
    10
    Hey MFDnSC

    Thanks very much for your instructions, which I've followed. Here are the results ...

    SUPERAntiSpyware Scan Log
    Generated 02/07/2007 at 03:53 PM

    Application Version : 3.5.1016

    Core Rules Database Version : 3179
    Trace Rules Database Version: 1189

    Scan type : Complete Scan
    Total Scan Time : 03:27:24

    Memory items scanned : 381
    Memory threats detected : 1
    Registry items scanned : 3981
    Registry threats detected : 5
    File items scanned : 30214
    File threats detected : 91

    Trojan.Imiserv-A
    C:\WINDOWS\SYSTEM32\WINSERVER.EXE
    C:\WINDOWS\SYSTEM32\WINSERVER.EXE

    Bogus MS SVCHOST.EXE
    [Internet Explorer] SVCH0ST.EXE
    SVCH0ST.EXE

    Adware.Tracking Cookie
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][2].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][2].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected]aver[1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\PIC02\Cookies\[email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][2].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt
    C:\Documents and Settings\Ram Chander\Local Settings\Temp\Cookies\ram [email protected][1].txt

    Adware.180solutions/Search Assistant
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MediaGatewayX.dll
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MediaGatewayX.dll#.Owner
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MediaGatewayX.dll#{15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6}
    C:\WINDOWS\Downloaded Program Files\MediaGatewayX.dll
    HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs#C:\WINDOWS\Downloaded Program Files\MediaGatewayX.dll [  ]

    Adware.GloboLook
    C:\WINDOWS\system32\Air Tickets.ico
    C:\WINDOWS\system32\Big Tits.ico
    C:\WINDOWS\system32\BlackJack.ico
    C:\WINDOWS\system32\Britney Spears.ico
    C:\WINDOWS\system32\Car Insurance.ico
    C:\WINDOWS\system32\Credit Card.ico
    C:\WINDOWS\system32\Cruises.ico
    C:\WINDOWS\system32\Lesbian Sex.ico
    C:\WINDOWS\system32\MP3.ico
    C:\WINDOWS\system32\Online Betting.ico
    C:\WINDOWS\system32\Oral Sex.ico
    C:\WINDOWS\system32\Party Poker.ico
    C:\WINDOWS\system32\Pharmacy.ico
    C:\WINDOWS\system32\Phentermine.ico
    C:\WINDOWS\system32\Pornstars.ico
    C:\WINDOWS\system32\Remove Spyware.ico
    C:\WINDOWS\system32\Viagra.ico
    C:\WINDOWS\SYSTEM32\CIGARETTES.ICO
    C:\WINDOWS\SYSTEM32\FOREX TRADING.ICO
    C:\WINDOWS\SYSTEM32\ONLINE CASINO.ICO

    Browser Hijacker.Favorites
    C:\DOCUMENTS AND SETTINGS\PIC02\FAVORITES\SEARCH THE WEB.URL
    C:\DOCUMENTS AND SETTINGS\PIC02\FAVORITES\SEVEN DAYS OF FREE PORN.URL

    Trojan.Stoped-A Variant
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP60\A0017020.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP61\A0017056.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP62\A0017082.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP62\A0017088.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP62\A0018088.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP63\A0018102.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP64\A0019102.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP64\A0020102.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0020124.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0020297.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0020307.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0021307.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0022307.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP65\A0023307.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP66\A0023333.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP66\A0023339.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP66\A0025339.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP67\A0025363.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP67\A0026363.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP70\A0026466.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP70\A0026482.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP70\A0027482.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP71\A0027512.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP72\A0027547.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP72\A0027559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP72\A0028559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP72\A0029559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP73\A0030559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP73\A0031559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP74\A0032559.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP74\A0032572.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP75\A0033572.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP75\A0033590.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP75\A0035590.DLL
    C:\SYSTEM VOLUME INFORMATION\_RESTORE{169D192F-B706-46AC-915C-A365DCE5CFF6}\RP75\A0036590.DLL

    Unclassified.Unknown Origin/System
    C:\WINDOWS\SYSTEM32\8VLIA8G4.EXE


    Logfile of HijackThis v1.99.1
    Scan saved at 16:15:35, on 07/02/2007
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 (6.00.2600.0000)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
    C:\WINDOWS\System32\WINWORD.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    C:\Program Files\Boonty\BoontyBox\BoontyBox.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\System32\notepad.exe
    C:\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.yahoo.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://us.rd.yahoo.com/customize/ie/defaults/sb/msgr8/*http://www.yahoo.com/ext/search/search.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://us.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://www.yahoo.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = about:blank
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://us.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://www.yahoo.com
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - C:\Program Files\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
    O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\MSN Apps\MSN Toolbar\01.02.5000.1021\en-us\msntb.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
    O4 - HKLM\..\Run: [NeroCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_04\bin\jusched.exe
    O4 - HKLM\..\Run: [WINWORD.EXE] WINWORD.EXE
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
    O4 - Startup: BoontyBox 01net.lnk = C:\Program Files\Boonty\BoontyBox\BoontyBox.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar3.dll/cmsearch.html
    O8 - Extra context menu item: &Translate English Word - res://c:\program files\google\GoogleToolbar3.dll/cmwordtrans.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar3.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar3.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar3.dll/cmsimilar.html
    O8 - Extra context menu item: Translate Page into English - res://c:\program files\google\GoogleToolbar3.dll/cmtrans.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra button: Microsoft AntiSpyware helper - {93EFA6B5-7E6E-442B-85EA-9F40BA9E59E3} - (no file) (HKCU)
    O9 - Extra 'Tools' menuitem: Microsoft AntiSpyware helper - {93EFA6B5-7E6E-442B-85EA-9F40BA9E59E3} - (no file) (HKCU)
    O16 - DPF: {15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://static.windupdates.com/cab/MediaAccessVerisign/ie/bridge-c5.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
    O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/101ef60e7f20c376d806/netzip/RdxIE601.cab
    O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} (PopCapLoader Object) - http://download.games.yahoo.com/games/popcap/zuma/popcaploader_v6.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{8AB9DE87-D5EF-4BCD-BFF5-717CF0AAC267}: NameServer = 193.252.19.3,193.252.19.4
    O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - "C:\PROGRA~1\MSNMES~1\msgrapp.dll" (file missing)
    O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
     
  2. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Do not start new threads for replies – stay in this thread

    You may want to print this or save it to notepad as we will go to safe mode.

    Fix these with HiJackThis – mark them, close IE, click fix checked

    O4 - HKLM\..\Run: [WINWORD.EXE] WINWORD.EXE

    O4 - Startup: BoontyBox 01net.lnk = C:\Program Files\Boonty\BoontyBox\BoontyBox.exe

    O16 - DPF: {15AD6789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://static.windupdates.com/cab/Me.../bridge-c5.cab

    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/101ef60e...p/RdxIE601.cab

    O23 - Service: Boonty Games - BOONTY - C:\Program Files\Common Files\BOONTY Shared\Service\Boonty.exe
    ===================
    Click Start > Run > and type in:

    services.msc

    Click OK.

    In the services window find this exact name

    Boonty Games

    Rightclick and choose "Properties". Beside "Startup Type" in the dropdown menu select "Disabled". On the "General" tab under "Service Status" click the "Stop" button to stop the service. Click Apply then OK. File-Exit the Services utility.

    ===================
    DownLoad http://www.downloads.subratam.org/KillBox.zip or
    http://www.thespykiller.co.uk/files/killbox.exe

    Restart your computer into safe mode now. (Tapping F8 at the first black screen) Perform the following steps in safe mode:

    Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill. In the "Full Path of File to Delete" box, copy and paste each of the following lines one at a time then click on the button that has the red circle with the X in the middle after you enter each file. It will ask for confimation to delete the file. Click Yes. Continue with that same procedure until you have copied and pasted all of these in the "Paste Full Path of File to Delete" box.

    C:\WINDOWS\System32\WINWORD.EXE

    Note: It is possible that Killbox will tell you that one or more files do not exist. If that happens, just continue on with all the files. Be sure you don't miss any.

    START – RUN – type in %temp% - OK - Edit – Select all – File – Delete

    Delete everything in the C:\Windows\Temp folder or C:\WINNT\temp

    Not all temp files will delete and that is normal
    Empty the recycle bin
    Boot and post a new hijack log from normal NOT safe mode

    Please give feedback on what worked/didn’t work and the current status of your system
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/542013

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice