Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ie Keep Redirected To Spyware Sheriff And Miaminews365.net


  • This topic is locked This topic is locked
8 replies to this topic

#1 Steven White

Steven White

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 02 September 2007 - 12:00 PM

I have tried using all the steps I can find to remove the virus that is redirecting me constantly to Spyware Sheriff and Miaminews365, have run everything in Safe Mode etc as recommended in other threads on her but still am getting redirected! Can anyone help?

HiJackThis Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:58:32, on 02/09/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Kontiki\KService.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\AdvTools\NPROTECT.EXE
C:\WINDOWS\system32\HPZipm12.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe
C:\Program Files\Kontiki\KHost.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\Hp\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Teleca Shared\CapabilityManager.exe
C:\Program Files\HP\Digital Imaging\bin\hpqimzone.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Outlook Express\msimn.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&a...n&pf=laptop
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
O2 - BHO: ChangerBHO Class - {0edc6c20-a31c-11db-8ab9-0800200c9a66} - C:\WINDOWS\system32\catsrvuts.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.0.301.7164\swg.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_06\bin\jusched.exe
O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\hpq\HP Wireless Assistant\HP Wireless Assistant.exe
O4 - HKLM\..\Run: [High Definition Audio Property Page Shortcut] CHDAudPropShortcut.exe
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [QPService] "C:\Program Files\HP\QuickPlay\QPService.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
O4 - HKLM\..\Run: [Cpqset] C:\Program Files\HPQ\Default Settings\cpqset.exe
O4 - HKLM\..\Run: [RecGuard] C:\Windows\SMINST\RecGuard.exe
O4 - HKLM\..\Run: [Reminder] C:\Windows\CREATOR\Remind_XP.exe
O4 - HKLM\..\Run: [4oD] "C:\Program Files\Kontiki\KHost.exe" -all
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [ccApp] C:\Program Files\Common Files\Symantec Shared\ccApp.exe
O4 - HKLM\..\Run: [ccRegVfy] C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe
O4 - HKLM\..\Run: [Advanced Tools Check] C:\PROGRA~1\NORTON~1\AdvTools\ADVCHK.EXE
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [SpyHunter] C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [kdx] C:\Program Files\Kontiki\KHost.exe -all
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\Hp\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: HP Photosmart Premier Fast Start.lnk = C:\Program Files\Hp\Digital Imaging\bin\hpqthb08.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_GB&c=Q306&bd=pavilion&pf=laptop
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {406B5949-7190-4245-91A9-30A17DE16AD0} (Snapfish Activia) - http://www1.snapfish.co.uk/SnapfishUKActivia.cab
O16 - DPF: {67A5F8DC-1A4B-4D66-9F24-A704AD929EEE} (System Requirements Lab) - http://www.systemrequirementslab.com/sysreqlab2.cab
O16 - DPF: {6B75345B-AA36-438A-BBE6-4078B4C6984D} (HpProductDetection Class) - http://h20270.www2.hp.com/ediags/gmn2/inst...ctDetection.cab
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation Service (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - c:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: KService - Kontiki Inc. - C:\Program Files\Kontiki\KService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: Norton AntiVirus Auto Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton Unerase Protection (NProtectService) - Symantec Corporation - C:\Program Files\Norton AntiVirus\AdvTools\NPROTECT.EXE
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe

--
End of file - 9006 bytes

SmitFraudFix Rapport.txt Log:

SmitFraudFix v2.219

Scan done at 17:45:10.87, 02/09/2007
Run from C:\Documents and Settings\Administrator\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

Killing process


hosts


127.0.0.1 localhost

Generic Renos Fix

GenericRenosFix by S!Ri


Deleting infected files

C:\WINDOWS\Tasks\At?.job Deleted
C:\WINDOWS\Tasks\At??.job Deleted
C:\Program Files\TrustIn Contextual\ Deleted

DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{94167D3B-CDA9-4BCE-8F0B-6632139C6AF2}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS1\Services\Tcpip\..\{94167D3B-CDA9-4BCE-8F0B-6632139C6AF2}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS3\Services\Tcpip\..\{94167D3B-CDA9-4BCE-8F0B-6632139C6AF2}: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


End


Please help if you can, i need to desparelty get this PC clean!!! Thanks very much!!!

BC AdBot (Login to Remove)

 


m

#2 Steven White

Steven White
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 02 September 2007 - 12:08 PM

No Worries, I have now fixed the problem myself, there were just a few parts of the registry that needed editing.

Great resource to have this website though, will definitly be saving it to my favourites!! :thumbsup:

Edit: It has now started doing it again :S Can anyone help? Sorry to make 2 posts, I thought it was fixed!

It fixes everytime I run fix.reg, which I made in Notepad using the following code:

REGEDIT4

[-HKEY_CURRENT_USER\Software\TrustIn]

[-HKEY_USERS\S-1-5-21-2025429265-329068152-682003330-1003\Software\TrustIn]

Yet, whenever I restart IE and don't run this file, it stops working and goes back to the redirect! It seems everytime I open IE, it adds a folder 'Trust In' to the registry, containing a subfolder called 'URL changer' is there anyway I can get rid of this folder permanently?

Edited by Steven White, 02 September 2007 - 12:17 PM.


#3 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:02:10 PM

Posted 02 September 2007 - 12:27 PM

Hello Steven White,

Welcome to Bleeping Computer :thumbsup:

Please run HijackThis! and click "Scan." Place checks next to the following entries, if present:

O2 - BHO: ChangerBHO Class - {0edc6c20-a31c-11db-8ab9-0800200c9a66} - C:\WINDOWS\system32\catsrvuts.dll

Close all browsers and other windows except for HijackThis!, and click "Fix checked".

Navigate to and delete this file, if still present:

C:\WINDOWS\system32\catsrvuts.dll

Reboot your computer. Let me know how that goes and if that took care of the redirects. :flowers:

Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#4 Steven White

Steven White
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 02 September 2007 - 12:39 PM

Awesome!! Everything is working now!!!

That was a damn nasty piece of Adware to remove!!

Thanks very much, this site rocks!!!

#5 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:02:10 PM

Posted 02 September 2007 - 12:45 PM

You're welcome. :thumbsup:

You seem pretty adept with your computer, so please let me know that it's gone in the places you said it kept reappearing. In fact, how about a scan? This one is good about picking things up that might be in the registry.

Download the trial version of Spy Sweeper from
Here


Install it using the Standard Install option. (You will be asked for your e-mail address, it is safe to give it. If you receive alerts from your firewall, allow all activities for Spy Sweeper)

You will be prompted to check for updated definitions, please do so.
(This may take several minutes)

Click on Options > Sweep Options and check Sweep all Folders on Selected drives. Check Local Disc C. Under What to Sweep, check every box.

Click on Sweep and allow it to fully scan your system.

When the sweep has finished, click Remove. Click Select All and then Next

From 'Results', select the Session Log tab. Click Save to File and save the log somewhere convenient.

Exit Spy Sweeper.

Restart your computer, and then please copy and paste the SpySweeper log into this thread.

Thanks,
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#6 Steven White

Steven White
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 02 September 2007 - 01:11 PM

OK, I will do a scan now and report back!!!

Thanks very much!! :thumbsup:

#7 Steven White

Steven White
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 02 September 2007 - 01:35 PM

19:33: Removal process completed. Elapsed time 00:00:06
19:33: Quarantining All Traces: zedo cookie
19:33: Quarantining All Traces: adbureau cookie
19:33: Quarantining All Traces: tribalfusion cookie
19:33: Quarantining All Traces: spylog cookie
19:33: Quarantining All Traces: mediaplex cookie
19:33: Quarantining All Traces: casalemedia cookie
19:33: Quarantining All Traces: a cookie
19:33: Quarantining All Traces: atlas dmt cookie
19:33: Quarantining All Traces: advertising cookie
19:33: Quarantining All Traces: trojan-downloader.gen
19:33: Quarantining All Traces: trustin contextual ads
19:33: Quarantining All Traces: trustin bar
19:33: Quarantining All Traces: trustin url changer
19:33: Removal process initiated
19:32: Traces Found: 21
19:32: Full Sweep has completed. Elapsed time 00:27:33
19:32: File Sweep Complete, Elapsed Time: 00:23:54
19:23: Warning: SweepDirectories: Cannot find directory "e:". This directory was not added to the list of paths to be scanned.
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms174d1e71-6b8e-415a-b998-a3bf3ef41706.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmsfbcf108f-8173-4180-a270-1ffee40dd489.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmsdb5d23a6-9860-461e-b8cb-3b0d5fe41564.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms60384de6-698a-4857-a623-af6886df9109.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms49bf67c9-876f-4c16-8103-5760724eaa95.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms1c94f0c9-12cc-4cb6-800a-76d6fcbe424f.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmsf297611c-c587-4c3f-91b0-06d2b541c26a.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms55cd6f46-b522-4d6b-a3c4-b7f486b1b6cf.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssmseb9ea73d-4dd5-4b12-841f-5ab51e9cea51.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\localservice\application data\webroot\spy sweeper\temp\ssms73c778e6-a350-4896-bf71-d88d981aaabc.tmp". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\newuser\temporary internet files\content.ie5\c7cd4lnj\ca4pyz49.htm". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\newuser\temporary internet files\content.ie5\v7pr7l4w\index[1].gif". The operation completed successfully
19:22: Warning: Failed to open file "c:\recycler\nprotect\00031645.con". The operation completed successfully
19:22: Warning: Failed to open file "c:\documents and settings\newuser\cookies\newuser@imdb[1].txt". The operation completed successfully
19:22: Warning: Failed to open file "c:\recycler\nprotect\00031643.sta". The operation completed successfully
19:22: Warning: Failed to open file "c:\recycler\nprotect\00031638.con". The operation completed successfully
19:22: Warning: Failed to open file "c:\recycler\nprotect\00031636.sta". The operation completed successfully
19:13: C:\RECYCLER\NPROTECT\00032335.exe (ID = 809423)
19:13: C:\RECYCLER\NPROTECT\00032331.exe (ID = 809441)
19:09: C:\RECYCLER\NPROTECT\00034874.DLL (ID = 808777)
19:08: C:\Program Files\Trend Micro\HijackThis\backups\backup-20070902-183349-778.dll (ID = 808777)
19:08: C:\Program Files\Trend Micro\HijackThis\backups\backup-20070902-170438-461.dll (ID = 808968)
19:08: Found Adware: trojan-downloader.gen
19:08: Starting File Sweep
19:08: Cookie Sweep Complete, Elapsed Time: 00:00:00
19:08: c:\documents and settings\newuser\cookies\newuser@zedo[1].txt (ID = 3762)
19:08: Found Spy Cookie: zedo cookie
19:08: c:\documents and settings\newuser\cookies\newuser@videoegg.adbureau[2].txt (ID = 2060)
19:08: Found Spy Cookie: adbureau cookie
19:08: c:\documents and settings\newuser\cookies\newuser@tribalfusion[1].txt (ID = 3589)
19:08: Found Spy Cookie: tribalfusion cookie
19:08: c:\documents and settings\newuser\cookies\newuser@spylog[1].txt (ID = 3415)
19:08: Found Spy Cookie: spylog cookie
19:08: c:\documents and settings\newuser\cookies\newuser@mediaplex[1].txt (ID = 6442)
19:08: Found Spy Cookie: mediaplex cookie
19:08: c:\documents and settings\newuser\cookies\newuser@casalemedia[1].txt (ID = 2354)
19:08: Found Spy Cookie: casalemedia cookie
19:08: c:\documents and settings\newuser\cookies\newuser@a[1].txt (ID = 2027)
19:08: Found Spy Cookie: a cookie
19:08: c:\documents and settings\newuser\cookies\newuser@atdmt[2].txt (ID = 2253)
19:08: Found Spy Cookie: atlas dmt cookie
19:08: c:\documents and settings\newuser\cookies\newuser@advertising[1].txt (ID = 2175)
19:08: Found Spy Cookie: advertising cookie
19:08: Starting Cookie Sweep
19:08: Registry Sweep Complete, Elapsed Time:00:00:18
19:08: HKLM\software\classes\trustincontext.contextualads\ (ID = 1551625)
19:08: HKLM\software\classes\inetloader.weeklyexecuter.1\ (ID = 1551611)
19:08: HKLM\software\classes\inetloader.weeklyexecuter\ (ID = 1551605)
19:08: HKLM\software\classes\changerbho.changerbho\ (ID = 1551547)
19:08: HKCR\trustincontext.contextualads\ (ID = 1544632)
19:08: Found Adware: trustin contextual ads
19:08: HKCR\inetloader.weeklyexecuter\ (ID = 1544612)
19:08: Found Adware: trustin bar
19:08: HKCR\changerbho.changerbho\ (ID = 1544554)
19:08: Found Adware: trustin url changer
19:07: Starting Registry Sweep
19:07: Memory Sweep Complete, Elapsed Time: 00:03:15
19:04: Starting Memory Sweep
19:04: Start Full Sweep
19:04: Sweep initiated using definitions version 981
Keylogger: Off
19:04: Informational: ShieldEmail: Start monitoring port 25 for mail activities
E-mail Attachment: On
19:04: Informational: ShieldEmail: Start monitoring port 110 for mail activities
BHO Shield: On
IE Security Shield: On
Alternate Data Stream (ADS) Execution Shield: On
Startup Shield: On
Common Ad Sites: Off
Hosts File Shield: On
Internet Communication Shield: On
ActiveX Shield: On
Windows Messenger Service Shield: On
IE Favorites Shield: On
File System Shield: On
Execution Shield: On
System Services Shield: On
IE Hijack Shield: On
IE Tracking Cookies Shield: Off
19:04: Shield States
19:04: License Check Status (0): Success
19:04: Spyware Definitions: 981
19:04: Spy Sweeper 5.5.7.48 started
19:04: Spy Sweeper 5.5.7.48 started
19:04: | Start of Session, 02 September 2007 |
***************

#8 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:02:10 PM

Posted 02 September 2007 - 02:10 PM

Hello,

It was there all right, so thanks for running that. :thumbsup: You can either keep the trial of SpySweeper until it runs out, or remove it now. Your choice.

Your Java is way out of date, which leaves your computer vulnerable.

Updating Java
  • Download the latest version of Java Runtime Environment (JRE) 6u2.
  • Scroll down to where it says "The J2SE Runtime Environment (JRE) allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Check the box that says: "Accept License Agreement".
  • The page will refresh.
  • Click on the link to download Windows Offline Installation with or without Multi-language and save to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel double-click on Add/Remove programs and remove all older versions of Java.
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6-windows-i586.exe to install the newest version.
If there are no further problems :

Below I have included a number of recommendations on how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously! These few simple steps can stave off the vast majority of spyware problems.

Regularly go to http://windowsupdate.microsoft.com and download all the "critical updates" for Windows, including the latest version of Internet Explorer. This can patch many of the security holes through which attackers can gain access to your computer. You should also turn on the Windows automatic update feature.

You should definitely maintain a firewall. Some good free firewalls are Kerio, or Outpost
A tutorial on understanding and using firewalls may be found here.

In order to protect yourself against spyware, you should consider installing and running the following free programs:

SpywareBlaster
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found here.

SpywareGuard
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found here.

Spybot-Search & Destroy
A tutorial on using Spybot to remove spyware from your computer may be found here. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

IE/Spyad:
It places over 5000 malicious websites and domains in your IE's restricted zone.
IE/Spyad

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

* Avoid illegal sites, because that's where most malware is present.
* Don't click on links inside popups.
* Don't click on links in spam messages claiming to offer anti-spyware software; because most of these so called removers ARE spyware.
* Download free software only from sites you know and trust. A lot of free software can bundle other software, including spyware.

Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
http://www.mozilla.org/products/firefox/

Please make sure to run your antivirus software regularly, and to keep it up-to-date.

Take care!
tea
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#9 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:02:10 PM

Posted 05 September 2007 - 10:34 PM

Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users