Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

btcar.com virus?


  • Please log in to reply
11 replies to this topic

#1 mgo124

mgo124

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 07 August 2009 - 06:51 PM

I desperately need help! For a while my computer was in an endless reboot cycle. Somehow I stopped that. My computer is very slow now and when I try going to search results in Google or Yahoo, it either goes to some random page or btcar.com.

I've been looking around for answers but nothing has worked. The problem is that whenever I start a scan with any of the programs I have downloaded, after less than a minute the program closes on its own and won't let me re-open it.

I figured I would create an account here and run HijackThis, but that too closed automatically. So I'm not quite sure what sort of information I can offer now.

Please help with any suggestions!

Thanks,

Matt

BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:04 AM

Posted 07 August 2009 - 07:02 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



Lets take a look with Malwarebytes

Please download Malwarebytes' Anti-Malware from here:
Malwarebytes
Please rename the file BEFORE downloading to zztoy.exe instead of mbam-setup.exe

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

Double Click zztoy.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


If Malwarebytes won't install or run

Some types of malware will disable MBAM and other security tools. If MBAM will not install, try renaming it. Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run.


If Malwarebytes closes like all of the other programs that you have tried then

let's try Fatdcuk's fix.

Please navigate to the MBAM folder located in the Program Files directory.

Locate MBAM.exe and rename it to winlogon.exe

Once renamed double click on the file to open MBAM and select Quick Scan

At the end of the scan click Remove Selected and then reboot.


Post the scan log. The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
Computer Pro

#3 mgo124

mgo124
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 07 August 2009 - 07:31 PM

I appreciate your help, but so far, no luck...

When I try to open "winlogon.exe" I get the message "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:04 AM

Posted 07 August 2009 - 07:38 PM

Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the FILES tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
Computer Pro

#5 mgo124

mgo124
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 08 August 2009 - 12:35 AM

I tried RootRepeal but it quit shortly after the scan started. I tried it again in safe mode, but the same problem occurred.

However, I did get some screenshots that gave a very small amount of information:

C:\hiberfil.sys
c:\windows\schedlgu.txt

Safe mode gave:

c:\windows\ntbtlog.txt

This is driving me crazy! I'm sorry I haven't been too helpful with my lack of logs...

Thanks for you continued help,

Matt

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:04 AM

Posted 08 August 2009 - 11:00 AM

Ok, let's try Dr. Web.

Please download Dr. Web the free version & save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr. Web Cureit as follows:
Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
The Express scan will automatically begin.
(This is a short scan of files currently running in memory, boot sectors, and targeted folders).
If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
When complete, click Select All, then choose Cure > Move incurable.
(This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
Now put a check next to Complete scan to scan all local disks and removable media.
In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
In the top menu, click file and choose save report list.
Save the DrWeb.csv report to your desktop.
Exit Dr.Web Cureit when done.
Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
Computer Pro

#7 mgo124

mgo124
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 08 August 2009 - 01:24 PM

Dr. Web made it through the Express Scan and found no viruses. It quit near the beginning of the Complete Scan while the status at the bottom of the screen said:

Preparing for scanning - C:\WINDOWS\$hf_mig$\KB954459...

I have seen another scanning program suddenly quit when reaching this folder, but I can't remember what program it was.

#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:04 AM

Posted 08 August 2009 - 02:24 PM

Let's try Sophos.

Please download Sophos Anti-rootkit& save it to your desktop.
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Credits to DaChew
Be sure to print out and read the User Manualand Release Notes
Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
Make sure the following are checked:
o Running processes
o Windows Registry
o Local Hard Drives

Click Start scan.
Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
o Files tagged as Removable: No are not marked for removal and cannot be removed.
o Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
o Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
After reboot, a dialog box displays the files you selected for removal and the action taken.
Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\<username>\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
Disconnect from the Internet or physically unplug you Internet cable connection.
Clean out your temporary files.
Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
Temporarily disable your anti-virus and real-time anti-spyware protection.
After starting the scan, do not use the computer until the scan has completed.
When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
Computer Pro

#9 mgo124

mgo124
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 08 August 2009 - 03:29 PM

So it finished once, but none of the files found were recommended for removal. They are all removable "but clean up not recommended for this file".

I wasn't sure if I should check them for removal, so I just did the log now and am keeping Sophos open until I hear from you.

-------------------------------------

Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/8/2009 at 14:37:09 PM
User "Owner" on computer "MGO"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x300 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Documents and Settings\Owner\Desktop\RootRepeal.exe
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PDVM082M\siness;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=12;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=1199497514674672[1].7
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\pos=0;page=category;playlisteverythree=false;playtimes=0;pid=10;kw=blinkx;fc_utarget_ok=true;t=1;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=2;~cs=t[1].gif
Hidden: file C:\WINDOWS\system32\scecli.dll
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\=false;playtimes=4;preroll_adid=216404925;pid=;kw=blinkx;fc_utarget_ok=true;t=;dc_seed=216404925;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=3;~cs=f[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PDVM082M\=false;playtimes=3;preroll_adid=216404925;pid=;kw=blinkx;fc_utarget_ok=true;t=;dc_seed=216404925;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=3;~cs=f[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VNDD2YBV\=false;playtimes=5;preroll_adid=216404925;pid=;kw=blinkx;fc_utarget_ok=true;t=;dc_seed=216404925;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=3;~cs=f[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\=false;playtimes=7;preroll_adid=216404925;pid=;kw=blinkx;fc_utarget_ok=true;t=;dc_seed=216404925;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=3;~cs=f[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\iness;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=12;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=1199497514674672[1].7
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\news;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=10;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=1789143344582968[1].5
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\food;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=2;tile=1;ord=3135491168840801[2]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\ood;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=2;tile=2;ord=3135491168840801[1]
Hidden: file C:\Program Files\Network Associates\VirusScan\mcconsol.exe
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=7102253918209738[1]
Hidden: file C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PDVM082M\news;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=5405046060272067[2]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PDVM082M\ews;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=5405046060272067[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\news;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=2;tile=1;ord=433548610513889[1].7
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\ews;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=2;tile=2;ord=433548610513889[1].7
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=494004493250841[1].4
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\orts;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=2;tile=1;ord=3879046256178802[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\OIXIB5WH\rts;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=2;tile=2;ord=3879046256178802[2]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=7102253918209738[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=494004493250841[1].4
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=494004493250841[1].4
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=2319027875965804[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=2319027875965804[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=2319027875965804[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=2473563240549131[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\6547001;id=bettertv;gender=0;age=0000;income=00;genderage=0_0000;ageincome=0000_00;genderincome=0_00;user=0_0000_00;dcopt=ist;tile=9;sz=231x41;ord=1249739763296[1]
Hidden: file C:\WINDOWS\SoftwareDistribution\Download\6b4e49f1a78b9558feeb103a07b06a32\update\update.exe
Hidden: file C:\Program Files\Malwarebytes' Anti-Malware\winlogon.exe
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\PDVM082M\fashion;adlocation=site_above_results;campaign=;page=searchresults;kw=blinkx;pid=;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=2;tile=3;ord=3018913098150209[1].5
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VNDD2YBV\news;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=10;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=2453735584721680[1].5
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\edy;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=2;tile=2;ord=4546811170201060[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VNDD2YBV\ion;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=2;tile=1;ord=3018913098150209[1].5
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\VNDD2YBV\on;adlocation=site_below_player;campaign=;page=searchresults;kw=blinkx;pid=;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=2;tile=2;ord=3018913098150209[1].5
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\S1P2FTJO\medy;adlocation=site_below_header;campaign=;page=searchresults;kw=blinkx;pid=;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=2;tile=1;ord=4546811170201060[2]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\33XI3B49\joUjh6568Q[1].jpg
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\33XI3B49\eNxmI7FrUl[1].jpg
Hidden: file C:\Documents and Settings\Owner\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\file\Bruce400.jpg-3608dfda-5bea2226.idx
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\update_SP2QFE.inf
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\update_SP3GDR.inf
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\update_SP3QFE.inf
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\spuninst.exe
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\spcustom.dll
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\KB952954.CAT
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\update.exe
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\updspapi.dll
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\update.ver
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\updatebr.inf
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\eula.txt
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\update\branches.inf
Hidden: file C:\WINDOWS\$hf_mig$\KB952954\SP2QFE\mscms.dll
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\33XI3B49\ral;genre=martialarts;genre=adventure;genre=action;genre=actioncomedy;;tempPass=false;entry=yes;refer=www.searchtigo[1].com;tile=1;sz=728x90;ord=8619464126401005220
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\33XI3B49\al;genre=martialarts;genre=adventure;genre=action;genre=actioncomedy;;tempPass=false;entry=yes;refer=www.searchtigo[1].com;tile=2;sz=300x250;ord=8619464126401005220
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\V6LW2U2Y\natural;genre=martialarts;genre=adventure;genre=action;genre=actioncomedy;;tempPass=false;entry=no;refer=www.fancast[1].com;tile=1;sz=728x90;ord=2515482207685827625
Hidden: file C:\Documents and Settings\Owner\Cookies\owner@rewardtv[2].txt
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\V6LW2U2Y\p;vpec=sp;atf=u;dt=s;!c=hagl;!c=hagn;pt=0;cpall=all;cp2=fin;cp2=cmt;cp2=fbv;;tt=i;u=b0221xbggsn0u3o35uq,f0fu2sa,g100020;sz=300x250;tile=1;ord=2613865542065940[1].5;
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1RZG37AT\sp;vpec=sp;atf=u;dt=s;!c=hagl;!c=hagn;pt=0;cpall=all;cp2=fin;cp2=cmt;cp2=fbv;;tt=i;u=b0221ggo7140u3npcl4,f0fu2sa,g100020;sz=300x250;tile=1;ord=4949821239136154;[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\EYZbratzQ20dressQ20upQ20gameQQOVKWIDZ375998579511QQOVMTCZadvancedQQOVRAWZbratzQQcrlpZ58895819011Q5f413731QQkeywordZdressQ20upQ20bratzQ20gameQQrawqueryZbratz[1].htm
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=5516133339463007[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=5516133339463007[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\t1036;gender=0;age=0000;income=00;genderage=0_0000;ageincome=0000_00;genderincome=0_00;user=0_0000_00;type=category;dcopt=ist;tile=1;sz=728x90;ord=1249750895653[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\rt1036;gender=0;age=0000;income=00;genderage=0_0000;ageincome=0000_00;genderincome=0_00;user=0_0000_00;type=category;tile=2;sz=160x600,300x250;ord=1249750895653[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=5516133339463007[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=2109048568003870[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=2109048568003870[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=2109048568003870[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=2473563240549131[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=2473563240549131[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\pos=0;page=category;playlisteverythree=false;playtimes=0;pid=11;kw=blinkx;fc_utarget_ok=true;t=1;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=1;~cs=c[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\pos=0;page=category;playlisteverythree=false;playtimes=0;pid=11;kw=blinkx;fc_utarget_ok=true;t=1;sz=125x30,234x60,300x250,980x610,468x60,728x90;tile=2;~cs=c[1].gif
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=7102253918209738[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\DIR5QW5O\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=5769767316599189[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=5769767316599189[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=5769767316599189[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=8901327901756240[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\ZG9KNLP1\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=8901327901756240[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=8901327901756240[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\ainment;adlocation=site_below_header;campaign=;page=category;kw=blinkx;pid=11;sz=728x90,728x91;dclu5=8ca695e961f8b89;source=site;t=1;tile=1;ord=4945012959086504[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\inment;adlocation=site_below_player;campaign=;page=category;kw=blinkx;pid=11;sz=468x62,300x251;dclu5=8ca695e961f8b89;source=site;t=1;tile=2;ord=4945012959086504[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\ntertainment;adlocation=site_above_results;campaign=;page=category;kw=blinkx;pid=11;sz=300x250;dclu5=8ca695e961f8b89;source=site;t=1;tile=3;ord=4945012959086504[1]
Hidden: file C:\Program Files\Trend Micro\HijackThis0\HijackThis.exe
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\FVQQY7C4\=PUSHDOWN&PAGEPOS=1&CATEGORY=VIDEOS&SITE=F2&TILE=60866084839998&ORD=9757337281&TOPIC=THE_AMATEUR_GOURMET&PAGETYPE=VIDEOS&UNIQUEID=F2_VIDEOS_42_1&SECTION_ID=9998[1]
Hidden: file C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\1NE9Z015\PE=BIGBOX&PAGEPOS=5&CATEGORY=VIDEOS&SITE=F2&TILE=60866084839998&ORD=9757337281&TOPIC=THE_AMATEUR_GOURMET&PAGETYPE=VIDEOS&UNIQUEID=F2_VIDEOS_42_1&SECTION_ID=9998[1]
Info: Starting disk scan of D: (FAT).
Stopped logging on 8/8/2009 at 15:21:06 PM

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:04 AM

Posted 08 August 2009 - 04:12 PM

It's hiding and I'm not seeing it. Before things get worse, lets get you into the HJT forum.

It looks like we are going to have to use more powerful tools than what we are allowed to use in the Am I Infected forum. I am going to need for you to post a DDS/HijackThis Log in the HijackThis Log section of the forum.

Please refer to this for your preparation reasons before posting:
http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/

You can find the forum here:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/

Once you have created a new topic in the HijackThis section, please post a link to it in this topic.
Please allow time for your topic to be replied to in the HijackThis section as the HJT Team is EXTREMELY busy posting logs before yours.

Good Luck!
Computer Pro

#11 mgo124

mgo124
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:06:04 AM

Posted 09 August 2009 - 10:54 AM

Somethings seem to be working better. I can go to search results and not be redirected. I was also able to run HijackThis successfully. Here is the log, can you let me know if it looks okay?

Log removed. ~ OB

Edited by Orange Blossom, 09 August 2009 - 01:03 PM.


#12 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,911 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:07:04 AM

Posted 09 August 2009 - 01:06 PM

Hello mgo124,

I removed your HiJack This log as we don't analyze them in this forum.

To state what Computer Pro said in a different way: You need to follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== and post back here with the link to your topic.

If you cannot produce the DDS logs, then post back here and we will provide you with further instructions.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users