On second thought, there were 806 infected items (I think) and the log was 53 pages long in Word. If you really want to see it all I will post it, but otherwise I’m not sure it’s worth the time and effort.
Thanks!
I see you had MBAM delete everything. Okay. Save the log to disk in case essex wants it to take a look.
Did you run MBAM in Safe Mode or in Normal Mode?
If you can run it in Normal Mode, please run it again - and again post the log, please. Should be somewhat shorter now.
I restarted the computer normally and ran the program again. It didn’t find anything. Here’s the log:
Malwarebytes’ Anti-Malware 1.50.1.1100 www.malwarebytes.org
Database version: 6367
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
Check FF settings, make sure they look like the screenshot.
However, even if we manage to get you online again: still follow essexboy’s instructions and come back here! I’m no expert on malware, and it is vital to close this thread with essexboy! (Many users just vanish too early and we’ll see them back here in a week or two and start all over…)
Operating System: Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User: Judith&Yuda [Admin rights]
Mode: Scan – Date : 04/15/2011 22:21:09
Bad processes: 0
Registry Entries: 3
[PROXY IE] HKCU[…]\Internet Settings : ProxyEnable (1) → FOUND
[PROXY IE] HKCU[…]\Internet Settings : ProxyServer (http=127.0.0.1:25384) → FOUND
[HJPOL] HKCU[…]\Explorer : DisallowRun (1) → FOUND
Well, Judith and Yuda,
once we’re through with this, I strongly recommend that you setup a second restricted user account for everyday work & fun.
Also pay a little more attention to where you surf and what you click on.
Don’t follow any links that were sent to you by email by clicking on them, even if you know the person the mail is coming from. Be careful when you are sent any attachements via email (especially .pdf and of course .exe and .com and .bat), if you are not 100% sure about the origin of the attachement.
This is Susan. Someone who once worked on our computer set up the Judith & Yuda user names…
Steven, please be more specific about setting up a second, restricted user account. How do I do this? Should we ever access the Judith & Yuda account? When? Should we delete it?
Also, why are .pdf files so dangerous?