• Welcome to Tux Reports: Where Penguins Fly. We hope you find the topics varied, interesting, and worthy of your time. Please become a member and join in the discussions.

Fraud.Windows.ProtectionSuite

D

Dennis

Flightless Bird
Well, I guess everyone will have it if it can't be detected and cleaned...

PA Bear [MS MVP] wrote:
> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015
> <QP>
> Backdoor.Tidserv does a very good job in that sense, especially with the
> latest version (TDL3), which uses an advanced rootkit technology to hide
> its
> presence on a system by infecting one of the low-level kernel drivers
> and then
> covering its tracks. *While the rootkit is active there is no easy way to
> detect the infection*, [emphasis mine] and because it goes so deep into
> the kernel, most
> users cannot see anything wrong in the system...Even worse, because the
> infected
> driver is critical for system boot-up, Windows will not boot in Safe Mode
> either [after having installed MS10-015 on an infected machine].
> </QP>
> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015
>
> Tdss rootkit silently owns the net
> <QP>
> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that is
> quickly spreading around the world. While a number of rootkits are just
> developed as a proof of concept, this is not the case. Tdss rootkit is well
> known to antivirus companies because of its goal to get total control of
> the
> infected PCs and using them as zombies for its botnet.
>
> During these years it has always shown a team of skilled people behind
> it, who
> always applied advanced techniques often able to bypass antirootkit
> softwares.
> Actually, this last variant could be easily named as the stealthiest
> rootkit
> in the wild.
>
> This infection is bringing all together the best of MBR rootkit, the
> best of
> Rustock.C and the experience of old Tdss variants. *Result is an
> infection that
> is quickly spreading on the net and it is undetected by almost every
> security
> software and 3rd party anti rootkit software*. [emphasis mine]
>
> ...currently no antirootkit is able to bypass disk filtering
> technique used by Tdss rootkit but, even if it was possible, this rootkit
> could not be detected by file size cross check because file size of the
> original and infected files are exactly the same.
> </QP>
> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html
>
>
> Dennis wrote:
>> EVERY anti-malware and anti-virus program says the computer is
>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an
>> on line scan says it is clean. If they can't find it then every
>> computer will be infected eventually because it isn't detectable
>> by current means available. So at that point your info is no safer
>> than hers on that computer.
>>
>>
>> PA Bear [MS MVP] wrote:
>>> Meanwhile, your data (e.g., online banking usernames and passwords) may
>>> have been compromised and your computer may still be functioning as a
>>> malware-bot for the Bad Guys. Guess time will tell about all that, too,
>>> eh?
>>>
>>> Dennis wrote:
>>>> I guess time will tell.
>>>>
>>>> PA Bear [MS MVP] wrote:
>>>>> If you needed that fix, I wonder what else might still be wrong?...
>>>>>
>>>>> Dennis wrote:
>>>>>> The EXE File Association Fix from this site fixed the problem
>>>>>> of the icons not working. Everything is functioning now and
>>>>>> no viruses detected.
>>>>>>
>>>>>> http://www.dougknox.com/xp/file_assoc.htm
>>>>>>
>>>>>> PA Bear [MS MVP] wrote:
>>>>>>> Repost:
>>>>>>>
>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**
>>>>>>>
>>>>>>>
>>>>>>> Dennis wrote:
>>>>>>>> Yes.
>>>>>>>>
>>>>>>>> I ran MSRT and it found nothing.
>>>>>>>>
>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode
>>>>>>>> clicking the icon pops up the "Which program do you want to
>>>>>>>> use to open this" window. So I can't install it either way.
>>>>>>>> So, I finally tried Windows Update icon and it connected to
>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection
>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in
>>>>>>>> normal mode and still no icons open programs.
>>>>>>>>
>>>>>>>> I ran HiJack This and it found some entries in
>>>>>>>> C:/Windows\system32\drivers\etc\ that were removed. After
>>>>>>>> that Spybot did not find anything. Spybot no longer says there
>>>>>>>> were things it could not fix because it could not write to
>>>>>>>> C:/Windows\system32\drivers\etc
>>>>>>>>
>>>>>>>> So, right now in normal mode, no icons open programs. In Safe
>>>>>>>> Mode with Networking, signed in as a normal user no icons work.
>>>>>>>> But in Safe Mode with Networking signed in as Administrator,
>>>>>>>> all the icons open the programs as they should except IE and OE.
>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run
>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>
>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]
>>>>>>>>>
>>>>>>>>> Dennis wrote:
>>>>>>>>>> This is the current situation. No programs find any viruses now.
>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but
>>>>>>>>>> won't run if you click the icon. It pops a window asking what
>>>>>>>>>> program you want to use to run it as does everything else.
>>>>>>>>>> The start menu works but if you click any programs they do not
>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use
>>>>>>>>>> the "Administrator" user but not if I use the regular user name
>>>>>>>>>> to log in. Using her normal user name to log in, the desk top
>>>>>>>>>> icons don't work in regular mode or safe mode.
>>>>>>>>>>
>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>> [TYPO CORRECTED]
>>>>>>>>>>>
>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>> ...I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick.
>>>>>>>>>>>>
>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected
>>>>>>>>>>>> machine.
>>>>>>>>>>>>
>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it
>>>>>>>>>>>> [COULD] be
>>>>>>>>>>>> infected and/or the source of your infection!
>>>>>>>>>>>>
>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may
>>>>>>>>>>>> end up
>>>>>>>>>>>> infecting
>>>>>>>>>>>> the flash drive (which could then transfer the infection to
>>>>>>>>>>>> another
>>>>>>>>>>>> computer).
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Dennis wrote:
>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and
>>>>>>>>>>>>> ran
>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic updates.
>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.
>>>>>>>>>>>>> I'll
>>>>>>>>>>>>> try downloading these two programs and installing them via the
>>>>>>>>>>>>> USB memory stick. So far that works yet.
>>>>>>>>>>>>>
>>>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the
>>>>>>>>>>>>>> subscription
>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or your
>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been
>>>>>>>>>>>>>> kept
>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with
>>>>>>>>>>>>>> any of
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will NOT
>>>>>>>>>>>>>> help!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge
>>>>>>>>>>>>>> support
>>>>>>>>>>>>>> in
>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware
>>>>>>>>>>>>>> (including
>>>>>>>>>>>>>> unwanted software), and adware.
>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:
>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Otherwise...
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:
>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to
>>>>>>>>>>>>>> download
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the
>>>>>>>>>>>>>> infected
>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's
>>>>>>>>>>>>>> 'Protection'
>>>>>>>>>>>>>> scan
>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:
>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including posting
>>>>>>>>>>>>>> requested
>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS
>>>>>>>>>>>>>> STEP!!
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Checking for/Help with Hijackware:
>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm
>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html
>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm
>>>>>>>>>>>>>> .
>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate
>>>>>>>>>>>>>> forums.**
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> If these procedures look too complex - and there is no
>>>>>>>>>>>>>> shame in
>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a
>>>>>>>>>>>>>> local,
>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek
>>>>>>>>>>>>>> Squad)
>>>>>>>>>>>>>> computer repair shop.

>
 
P

PA Bear [MS MVP]

Flightless Bird
Nope, just those running lousy AV & AS apps (e.g., AVG; McAfee; Norton;
STUPIDAntiSpyware) and/or those participating in P2P File Sharing and/or
those who just can't resist clicking on "See the nekkid lady!" links.

Dennis wrote:
> Well, I guess everyone will have it if it can't be detected and cleaned...
>
> PA Bear [MS MVP] wrote:
>> Backdoor.Tidserv [AKA Win32/Alureon] and MS10-015
>> <QP>
>> Backdoor.Tidserv does a very good job in that sense, especially with the
>> latest version (TDL3), which uses an advanced rootkit technology to hide
>> its
>> presence on a system by infecting one of the low-level kernel drivers
>> and then
>> covering its tracks. *While the rootkit is active there is no easy way to
>> detect the infection*, [emphasis mine] and because it goes so deep into
>> the kernel, most
>> users cannot see anything wrong in the system...Even worse, because the
>> infected
>> driver is critical for system boot-up, Windows will not boot in Safe Mode
>> either [after having installed MS10-015 on an infected machine].
>> </QP>
>> http://www.symantec.com/connect/blogs/tidserv-and-ms10-015
>>
>> Tdss rootkit silently owns the net
>> <QP>
>> Tdss rootkit 3rd variant is the last member of Tdss rootkit family that
>> is
>> quickly spreading around the world. While a number of rootkits are just
>> developed as a proof of concept, this is not the case. Tdss rootkit is
>> well
>> known to antivirus companies because of its goal to get total control of
>> the
>> infected PCs and using them as zombies for its botnet.
>>
>> During these years it has always shown a team of skilled people behind
>> it, who
>> always applied advanced techniques often able to bypass antirootkit
>> softwares.
>> Actually, this last variant could be easily named as the stealthiest
>> rootkit
>> in the wild.
>>
>> This infection is bringing all together the best of MBR rootkit, the
>> best of
>> Rustock.C and the experience of old Tdss variants. *Result is an
>> infection that
>> is quickly spreading on the net and it is undetected by almost every
>> security
>> software and 3rd party anti rootkit software*. [emphasis mine]
>>
>> ...currently no antirootkit is able to bypass disk filtering
>> technique used by Tdss rootkit but, even if it was possible, this rootkit
>> could not be detected by file size cross check because file size of the
>> original and infected files are exactly the same.
>> </QP>
>> http://www.prevx.com/blog/139/Tdss-rootkit-silently-owns-the-net.html
>>
>>
>> Dennis wrote:
>>> EVERY anti-malware and anti-virus program says the computer is
>>> clean. Stinger, McAfee, Malwarebytes, SuperAntiSpyware, and an
>>> on line scan says it is clean. If they can't find it then every
>>> computer will be infected eventually because it isn't detectable
>>> by current means available. So at that point your info is no safer
>>> than hers on that computer.
>>>
>>>
>>> PA Bear [MS MVP] wrote:
>>>> Meanwhile, your data (e.g., online banking usernames and passwords) may
>>>> have been compromised and your computer may still be functioning as a
>>>> malware-bot for the Bad Guys. Guess time will tell about all that,
>>>> too,
>>>> eh?
>>>>
>>>> Dennis wrote:
>>>>> I guess time will tell.
>>>>>
>>>>> PA Bear [MS MVP] wrote:
>>>>>> If you needed that fix, I wonder what else might still be wrong?...
>>>>>>
>>>>>> Dennis wrote:
>>>>>>> The EXE File Association Fix from this site fixed the problem
>>>>>>> of the icons not working. Everything is functioning now and
>>>>>>> no viruses detected.
>>>>>>>
>>>>>>> http://www.dougknox.com/xp/file_assoc.htm
>>>>>>>
>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>> Repost:
>>>>>>>>
>>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate forums.**
>>>>>>>>
>>>>>>>>
>>>>>>>> Dennis wrote:
>>>>>>>>> Yes.
>>>>>>>>>
>>>>>>>>> I ran MSRT and it found nothing.
>>>>>>>>>
>>>>>>>>> I can't install Widows Live in Safe Mode and in regular mode
>>>>>>>>> clicking the icon pops up the "Which program do you want to
>>>>>>>>> use to open this" window. So I can't install it either way.
>>>>>>>>> So, I finally tried Windows Update icon and it connected to
>>>>>>>>> Microsoft. I put in the Url you listed and got to the Protection
>>>>>>>>> Scan. It found nothing but was run in Safe Mode. I rebooted in
>>>>>>>>> normal mode and still no icons open programs.
>>>>>>>>>
>>>>>>>>> I ran HiJack This and it found some entries in
>>>>>>>>> C:/Windows\system32\drivers\etc\ that were removed. After
>>>>>>>>> that Spybot did not find anything. Spybot no longer says there
>>>>>>>>> were things it could not fix because it could not write to
>>>>>>>>> C:/Windows\system32\drivers\etc
>>>>>>>>>
>>>>>>>>> So, right now in normal mode, no icons open programs. In Safe
>>>>>>>>> Mode with Networking, signed in as a normal user no icons work.
>>>>>>>>> But in Safe Mode with Networking signed in as Administrator,
>>>>>>>>> all the icons open the programs as they should except IE and OE.
>>>>>>>>> MalwareBytes, SuperAntiSpyware, and Spybot all update and run
>>>>>>>>> but find nothing IF ran in Safe Mode as Administrator..
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>
>>>>>>>>>> Have you completed Steps #1, #2, and #3? [yes/no]
>>>>>>>>>>
>>>>>>>>>> Dennis wrote:
>>>>>>>>>>> This is the current situation. No programs find any viruses now.
>>>>>>>>>>> But in regular mode no desk top icons work. McAfee updated but
>>>>>>>>>>> won't run if you click the icon. It pops a window asking what
>>>>>>>>>>> program you want to use to run it as does everything else.
>>>>>>>>>>> The start menu works but if you click any programs they do not
>>>>>>>>>>> run. But in safe mode, all the desk top icons work if I use
>>>>>>>>>>> the "Administrator" user but not if I use the regular user name
>>>>>>>>>>> to log in. Using her normal user name to log in, the desk top
>>>>>>>>>>> icons don't work in regular mode or safe mode.
>>>>>>>>>>>
>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>> [TYPO CORRECTED]
>>>>>>>>>>>>
>>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>>> ...I'll
>>>>>>>>>>>>>> try downloading these two programs and installing them via
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> USB memory stick.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Don't! Use a CD or DVD to transfer the files to the infected
>>>>>>>>>>>>> machine.
>>>>>>>>>>>>>
>>>>>>>>>>>>> 1. Unless it's a brand-new, never-been-used flash drive, it
>>>>>>>>>>>>> [COULD] be
>>>>>>>>>>>>> infected and/or the source of your infection!
>>>>>>>>>>>>>
>>>>>>>>>>>>> 2. Inserting the flash drive into the infected computer may
>>>>>>>>>>>>> end up
>>>>>>>>>>>>> infecting
>>>>>>>>>>>>> the flash drive (which could then transfer the infection to
>>>>>>>>>>>>> another
>>>>>>>>>>>>> computer).
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> Dennis wrote:
>>>>>>>>>>>>>> Malwarebytes, SuperAntiSpyware, and Spybot were updated and
>>>>>>>>>>>>>> ran
>>>>>>>>>>>>>> regularly. McAffee is installed and set for automatic
>>>>>>>>>>>>>> updates.
>>>>>>>>>>>>>> Windows is set for automatic updates and SP3 is installed.
>>>>>>>>>>>>>> I'll
>>>>>>>>>>>>>> try downloading these two programs and installing them via
>>>>>>>>>>>>>> the
>>>>>>>>>>>>>> USB memory stick. So far that works yet.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> PA Bear [MS MVP] wrote:
>>>>>>>>>>>>>>> NB: If you had no anti-virus application installed or the
>>>>>>>>>>>>>>> subscription
>>>>>>>>>>>>>>> had expired *when the machine first got infected* and/or
>>>>>>>>>>>>>>> your
>>>>>>>>>>>>>>> subscription has since expired and/or the machine's not been
>>>>>>>>>>>>>>> kept
>>>>>>>>>>>>>>> fully-patched at Windows Update, don't waste your time with
>>>>>>>>>>>>>>> any of
>>>>>>>>>>>>>>> the
>>>>>>>>>>>>>>> below: Format & reinstall Windows. A Repair Install will
>>>>>>>>>>>>>>> NOT
>>>>>>>>>>>>>>> help!
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Microsoft PCSafety provides home users (only) with no-charge
>>>>>>>>>>>>>>> support
>>>>>>>>>>>>>>> in
>>>>>>>>>>>>>>> dealing with malware infections such as viruses, spyware
>>>>>>>>>>>>>>> (including
>>>>>>>>>>>>>>> unwanted software), and adware.
>>>>>>>>>>>>>>> https://support.microsoft.com/oas/default.aspx?&prid=7552&st=1
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Also available via the Consumer Security Support home page:
>>>>>>>>>>>>>>> https://consumersecuritysupport.microsoft.com/
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Otherwise...
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> 1. See if you can download/run the MSRT manually:
>>>>>>>>>>>>>>> http://www.microsoft.com/security/malwareremove/default.mspx
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> NB: Run the FULL scan, not the QUICK scan! You may need to
>>>>>>>>>>>>>>> download
>>>>>>>>>>>>>>> the
>>>>>>>>>>>>>>> MSRT on a non-infected machine, then transfer MRT.EXE to the
>>>>>>>>>>>>>>> infected
>>>>>>>>>>>>>>> machine and rename it to SCAN.EXE before running it.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> 2a. WinXP => Run the Windows Live Safety Center's
>>>>>>>>>>>>>>> 'Protection'
>>>>>>>>>>>>>>> scan
>>>>>>>>>>>>>>> (only!) in Safe Mode with Networking, if need be:
>>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/howsafe.htm
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> 2b. Vista or Win7=> Run this scan instead:
>>>>>>>>>>>>>>> http://onecare.live.com/site/en-us/center/whatsnew.htm
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> 3. Now run a thorough check for hijackware, including
>>>>>>>>>>>>>>> posting
>>>>>>>>>>>>>>> requested
>>>>>>>>>>>>>>> logs in an appropriate forum, not here. DO NOT SKIP THIS
>>>>>>>>>>>>>>> STEP!!
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Checking for/Help with Hijackware:
>>>>>>>>>>>>>>> . http://mvps.org/winhelp2002/unwanted.htm
>>>>>>>>>>>>>>> . http://inetexplorer.mvps.org/tshoot.html
>>>>>>>>>>>>>>> . http://www.mvps.org/sramesh2k/Malware_Defence.htm
>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>> http://www.elephantboycomputers.com/page2.html#Removing_Malware
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> **Chances are you will need to seek expert assistance in
>>>>>>>>>>>>>>> http://spywarehammer.com/simplemachinesforum/index.php?board=10.0,
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> http://www.spywarewarrior.com/viewforum.php?f=5,
>>>>>>>>>>>>>>> http://www.dslreports.com/forum/cleanup,
>>>>>>>>>>>>>>> http://www.bluetack.co.uk/forums/index.php,
>>>>>>>>>>>>>>> http://aumha.net/viewforum.php?f=30 or other appropriate
>>>>>>>>>>>>>>> forums.**
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> If these procedures look too complex - and there is no
>>>>>>>>>>>>>>> shame in
>>>>>>>>>>>>>>> admitting this isn't your cup of tea - take the machine to a
>>>>>>>>>>>>>>> local,
>>>>>>>>>>>>>>> reputable and independent (i.e., not BigBoxStoreUSA or Geek
>>>>>>>>>>>>>>> Squad)
>>>>>>>>>>>>>>> computer repair shop.
 
Top