Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirector possibly removed


  • Please log in to reply
7 replies to this topic

#1 dewisant

dewisant

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 18 November 2009 - 08:07 AM

Hi Guys,
I have a PC here that was re-directing google search engine results when using either IE or Firefox.
Before I found this wonderful site I had attempted and maybe succeded in removing it. Now that I have been reading here i think it would be prudent to have an expert look over for me.
It is a friends pc with XP home and was originally protected by Norton Internet Security and once infected added Stopzilla. He then gave it to me.
I have used a combination of Malwarebytes followed by removing Hard disk and scanning in a PC with CA Antivirus then Avast Home then put the HD back into the PC then installed Hijackthis then as hijackthis advised for one process it could not remove Spybod S&D followed by Combofix. At this point the redirects stopped. I then removed Norton and Spybot S&D and have installed Avast home.
Hijackthis reports 4 010 entries as nasty and advised Spybot S&D but I think this is part of Stopzilla (I am writing this from memory).
I have scanned a couple of times with Malwarebytes and Avast and so far so good.
Should I still post a log here for advise?

Regards
dewi

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,399 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:18 AM

Posted 18 November 2009 - 11:42 AM

Please note the message text in blue at the top of this forum.

You should not be using Combofix unless instructed to do so by a Malware Removal Expert who can interpret the logs. It is a powerful tool intended by its creator to be "used under the guidance and supervision of an expert", NOT for general public or personal use. Combofix was never meant to be used as a general purpose malware scanner like SuperAntispyware or Malwarebytes' Anti-Malware. Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again. Please read Combofix's Disclaimer.

You were fortunate in this instance that no unforeseen consequences occurred.

Please post the results of your MBAM scan for review.

To retrieve the Malwarebytes Anti-Malware scan log information, launch MBAM.
  • Click the Logs Tab at the top.
    • The log will be named by the date of scan in the following format: mbam-log-date(time).txt
      -- If you have previously used MBAM, there may be several logs showing in the list.
  • Click on the log name to highlight it.
  • Go to the bottom and click on Open.
  • The log should automatically open in notepad as a text file.
  • Go to Edit and choose Select all.
  • Go back to Edit and choose Copy or right-click on the highlighted text and choose Copy from there.
  • Come back to this thread, click Add Reply, then right-click and choose Paste.
  • Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Logs are saved to the following locations:
-- In XP: C:\Documents and Settings\<Username>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs
-- In Vista: C:\Documents and Settings\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs


Hijackthis reports 4 010 entries as nasty

What is the name of the file listed there?

I have used a combination of Malwarebytes followed by...scanning in a PC with CA Antivirus then Avast Home

Using more than one anti-virus program is not advisable. The primary concern with doing so is due to conflicts that can arise when they are running in real-time mode simultaneously and issues with Windows resource management. Even when one of them is disabled for use as a stand-alone scanner, it can affect the other. Anti-virus software components insert themselves into the operating systems core and using more than one can cause instability, crash your computer, slow performance and waste system resources. When actively running in the background while connected to the Internet, they both may try to update their definition databases at the same time. As the programs compete for resources required to download the necessary files this often can result in sluggish system performance or unresponsive behavior.

Each anti-virus may interpret the activity of the other as malicious behavior and there is a greater chance of them alerting you to a "False Positive". If one finds a virus or a suspicious file and then the other also finds the same, both programs will be competing over exclusive rights on dealing with that virus or suspicious file. Each anti-virus may attempt to remove the offending file and quarantine it at the same time resulting in a resource management issue as to which program gets permission to act first. If one anit-virus finds and quarantines the file before the other one does, then you encounter the problem of both wanting to scan each other's zipped or archived files and each reporting the other's quarantined contents. This can lead to a repetitive cycle of endless alerts that continually warn you that a virus has been found when that is not the case.

Anti-virus scanners use virus definitions to check for malware and these can include a fragment of the virus code which may be recognized by other anti-virus programs as the virus itself. Because of this, most anti-virus programs encrypt their definitions so that they do not trigger a false alarm when scanned by other security programs. Other vendors do not encrypt their definitions and they can trigger false alarms when detected by the resident anti-virus.

Further, dual installation is not always possible because most of the newer anti-virus programs will detect the presence of others and may insist they be removed prior to download and installation of another. Nonetheless, to avoid these problems, use only one anti-virus solution. Deciding which one to remove is your choice. Be aware that you may lose your subscription to that anti-virus program's virus definitions once you uninstall that software.

Anti-virus vendors recommend that you install and run only one anti-virus program at a time
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 dewisant

dewisant
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 18 November 2009 - 04:09 PM

Hi Thanks for getting back to me :thumbsup:
Yes I only found this forum after using combofix and will take the advice from now on.
Also maybe I did not explain my self clearly. When I said I scanned using two CA and Avast it was on the two different PC's . Actually same pc but to different boot disks. I have a spare pc for this type of work.

HJ line which I think belongs to Stopzilla as all the other Stopzilla files are in that folder and take similar names.

O10 - Unknown file in Winsock LSP: c:\program files\common files\is3\anti-spyware\is3lsp.dll

First Malbytes log before the clean:

Malwarebytes' Anti-Malware 1.41
Database version: 2775
Windows 5.1.2600 Service Pack 3

17/11/2009 9:37:46 AM
mbam-log-2009-11-17 (09-37-46).txt

Scan type: Quick Scan
Objects scanned: 107021
Time elapsed: 9 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 11
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 3
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\retro64_loader.r64loader (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\retro64_loader.r64loader.1 (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{450b9e4d-4014-4de3-b34e-014a81468293} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{c7f00a9a-f1bc-436e-82c7-e8cae6fd67f7} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7149e79c-dc19-4c5e-a53c-a54ddf75eee9} (Adware.MediaMotor) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{09f1adac-76d8-4d0f-99a5-5c907dadb988} (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{db893839-10f0-4af9-92fa-b23528f530af} (Trojan.Dialer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{288c5f13-7e52-4ada-a32e-f5bf9d125f99} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{288c5f13-7e52-4ada-a32e-f5bf9d125f99} (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.EXE (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Eeshellx.ShellExt (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Evidence Eliminator (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\Program Files\Evidence Eliminator\Data (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Start Menu\Programs\Evidence Eliminator (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\default\Start Menu\Programs\Evidence Eliminator\OneNote Table Of Contents.onetoc2 (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\Program Files\SETUP.EXE (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\liboggvorbis-0.3.1.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Favorites\mp3 downloads 1balakanooz amymai.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\hosts (Trojan.Agent) -> Quarantined and deleted successfully.
----------------------------------------------------------------------------------------------------------
Last Malwarebytes scan
Malwarebytes' Anti-Malware 1.41
Database version: 3193
Windows 5.1.2600 Service Pack 3

18/11/2009 8:26:35 PM
mbam-log-2009-11-18 (20-26-35).txt

Scan type: Full Scan (C:\|)
Objects scanned: 238800
Time elapsed: 1 hour(s), 0 minute(s), 26 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,399 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:18 AM

Posted 18 November 2009 - 05:05 PM

Yes, is3lsp.dll is part of Stopzilla anti-spyware
http://www.systemlookup.com/lists.php?list...3lsp.dll&s=

Lets do another anti-malware scan to see if we find anything else that MBAM may have missed.

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you cannot boot into safe mode, then perform your scans in normal mode.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 dewisant

dewisant
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 18 November 2009 - 09:48 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/19/2009 at 01:21 AM

Application Version : 4.30.1004

Core Rules Database Version : 4289
Trace Rules Database Version: 2162

Scan type : Complete Scan
Total Scan Time : 01:53:15

Memory items scanned : 500
Memory threats detected : 0
Registry items scanned : 8794
Registry threats detected : 16
File items scanned : 117009
File threats detected : 214

Adware.Tracking Cookie
C:\Documents and Settings\default\Cookies\default@skyscanner[3].txt
C:\Documents and Settings\default\Cookies\default@statse.webtrendslive[6].txt
C:\Documents and Settings\default\Cookies\default@statcounter[2].txt
C:\Documents and Settings\default\Cookies\default@www.skyscanner[2].txt
C:\Documents and Settings\default\Cookies\default@doubleclick[2].txt
C:\Documents and Settings\default\Cookies\default@ads.freefoto[2].txt
C:\Documents and Settings\default\Cookies\default@mini.skyscanner[2].txt
C:\Documents and Settings\default\Cookies\default@as1.falkag[1].txt
C:\Documents and Settings\default\Cookies\default@clean8teen[1].txt
C:\Documents and Settings\default\Cookies\default@stat.dealtime[2].txt
C:\Documents and Settings\default\Cookies\default@www.virginbleeped[2].txt
C:\Documents and Settings\default\Cookies\default@youraccount[1].txt
C:\Documents and Settings\default\Cookies\default@webstats4u[2].txt
C:\Documents and Settings\default\Cookies\default@indexstats[2].txt
C:\Documents and Settings\default\Cookies\default@jefflarson57.freestats[1].txt
C:\Documents and Settings\default\Cookies\default@www.bleeplesbo[1].txt
C:\Documents and Settings\default\Cookies\default@cs.sexcounter[2].txt
C:\Documents and Settings\default\Cookies\default@emediate[1].txt
C:\Documents and Settings\default\Cookies\default@mikespornsitereviews[1].txt
C:\Documents and Settings\default\Cookies\default@weborama[1].txt
C:\Documents and Settings\default\Cookies\default@qksrv[2].txt
C:\Documents and Settings\default\Cookies\default@tripod[1].txt
C:\Documents and Settings\default\Cookies\default@qksrv[1].txt
C:\Documents and Settings\default\Cookies\default@tdstats[2].txt
C:\Documents and Settings\default\Cookies\default@clickshift[3].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[4].txt
C:\Documents and Settings\default\Cookies\default@indextools[4].txt
C:\Documents and Settings\default\Cookies\default@tracking.dc-storm[1].txt
C:\Documents and Settings\default\Cookies\default@justteensite[2].txt
C:\Documents and Settings\default\Cookies\default@stat.dealtime[1].txt
C:\Documents and Settings\default\Cookies\default@weborama[2].txt
C:\Documents and Settings\default\Cookies\default@server.iad.liveperson[2].txt
C:\Documents and Settings\default\Cookies\default@virginmedia[2].txt
C:\Documents and Settings\default\Cookies\default@www.freeporndumpster[1].txt
C:\Documents and Settings\default\Cookies\default@nakedbabes[2].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[2].txt
C:\Documents and Settings\default\Cookies\default@try.starware[1].txt
C:\Documents and Settings\default\Cookies\default@adviva[2].txt
C:\Documents and Settings\default\Cookies\default@ad.axill[1].txt
C:\Documents and Settings\default\Cookies\default@www.ez-tracks[1].txt
C:\Documents and Settings\default\Cookies\default@superstats[1].txt
C:\Documents and Settings\default\Cookies\default@admin.teenrevenue[1].txt
C:\Documents and Settings\default\Cookies\default@ads.planetactive[1].txt
C:\Documents and Settings\default\Cookies\default@indextools[1].txt
C:\Documents and Settings\default\Cookies\default@counter.auctionworks[1].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[2].txt
C:\Documents and Settings\default\Cookies\default@try.starware[2].txt
C:\Documents and Settings\default\Cookies\default@h.starware[2].txt
C:\Documents and Settings\default\Cookies\default@bleeplesbo[1].txt
C:\Documents and Settings\default\Cookies\default@targetnet[2].txt
C:\Documents and Settings\default\Cookies\default@indexstats[1].txt
C:\Documents and Settings\default\Cookies\default@kontera[2].txt
C:\Documents and Settings\default\Cookies\default@stats1.reliablestats[1].txt
C:\Documents and Settings\default\Cookies\default@jamster.co[1].txt
C:\Documents and Settings\default\Cookies\default@ad1.emediate[1].txt
C:\Documents and Settings\default\Cookies\default@realmedia[1].txt
C:\Documents and Settings\default\Cookies\default@clickshift[1].txt
C:\Documents and Settings\default\Cookies\default@ez-tracks[2].txt
C:\Documents and Settings\default\Cookies\default@teenblog[1].txt
C:\Documents and Settings\default\Cookies\default@jefflarson57.freestats[2].txt
C:\Documents and Settings\default\Cookies\default@www.bleeplesbo[3].txt
C:\Documents and Settings\default\Cookies\default@mikespornsitereviews[2].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[1].txt
C:\Documents and Settings\default\Cookies\default@nextag[2].txt
C:\Documents and Settings\default\Cookies\default@www.young-naked-girls[2].txt
C:\Documents and Settings\default\Cookies\default@ads.guardian.co[1].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[8].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[1].txt
C:\Documents and Settings\default\Cookies\default@saletrack.co[1].txt
C:\Documents and Settings\default\Cookies\default@mediafire[1].txt
C:\Documents and Settings\default\Cookies\default@tracker.netklix[2].txt
C:\Documents and Settings\default\Cookies\default@adcycle.footymad[2].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[9].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[3].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[11].txt
C:\Documents and Settings\default\Cookies\default@eroticlick[1].txt
C:\Documents and Settings\default\Cookies\default@adserver.adreactor[1].txt
C:\Documents and Settings\default\Cookies\default@jdc3.clicktracks[1].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[10].txt
C:\Documents and Settings\default\Cookies\default@adserv.crossrhythms.co[2].txt
C:\Documents and Settings\default\Cookies\default@www.eroticlick[1].txt
C:\Documents and Settings\default\Cookies\default@optimost[3].txt
C:\Documents and Settings\default\Cookies\default@payasyouclick[2].txt
C:\Documents and Settings\default\Cookies\default@weborama[4].txt
C:\Documents and Settings\default\Cookies\default@tracking.battleon[1].txt
C:\Documents and Settings\default\Cookies\default@ads.adgoto[1].txt
C:\Documents and Settings\default\Cookies\default@www.mosteroticteenies[1].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[6].txt
C:\Documents and Settings\default\Cookies\default@ads.gamesbannernet[2].txt
C:\Documents and Settings\default\Cookies\default@tracker.pegsanalytics[2].txt
C:\Documents and Settings\default\Cookies\default@virginmedia[3].txt
C:\Documents and Settings\default\Cookies\default@ads.anm.co[1].txt
C:\Documents and Settings\default\Cookies\default@stat.dealtime[3].txt
C:\Documents and Settings\default\Cookies\default@optimost[1].txt
C:\Documents and Settings\default\Cookies\default@whatpornsite[2].txt
C:\Documents and Settings\default\Cookies\default@stats.renault.co[2].txt
C:\Documents and Settings\default\Cookies\default@smileycentral[1].txt
C:\Documents and Settings\default\Cookies\default@server.iad.liveperson[5].txt
C:\Documents and Settings\default\Cookies\default@stat.dealtime[5].txt
C:\Documents and Settings\default\Cookies\default@partypoker[1].txt
C:\Documents and Settings\default\Cookies\default@track.omguk[1].txt
C:\Documents and Settings\default\Cookies\default@adcycle.footymad[3].txt
C:\Documents and Settings\default\Cookies\default@ads.guardian.co[2].txt
C:\Documents and Settings\default\Cookies\default@tripod[2].txt
C:\Documents and Settings\default\Cookies\default@www.wetteenthumbs[2].txt
C:\Documents and Settings\default\Cookies\default@as1.falkag[2].txt
C:\Documents and Settings\default\Cookies\default@www.pornspinner[1].txt
C:\Documents and Settings\default\Cookies\default@bizrate[1].txt
C:\Documents and Settings\default\Cookies\default@saletrack.co[3].txt
C:\Documents and Settings\default\Cookies\default@kontera[3].txt
C:\Documents and Settings\default\Cookies\default@ad.iconadserver[2].txt
C:\Documents and Settings\default\Cookies\default@nextag.co[1].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[7].txt
C:\Documents and Settings\default\Cookies\default@adbrite[3].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[6].txt
C:\Documents and Settings\default\Cookies\default@indextools[3].txt
C:\Documents and Settings\default\Cookies\default@realmedia[3].txt
C:\Documents and Settings\default\Cookies\default@bizrate.co[1].txt
C:\Documents and Settings\default\Cookies\default@ufindus[2].txt
C:\Documents and Settings\default\Cookies\default@adserving.cpxinteractive[2].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[7].txt
C:\Documents and Settings\default\Cookies\default@adviva[1].txt
C:\Documents and Settings\default\Cookies\default@www.clickmanage[2].txt
C:\Documents and Settings\default\Cookies\default@stats.net-finity[1].txt
C:\Documents and Settings\default\Cookies\default@realmedia[5].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[4].txt
C:\Documents and Settings\default\Cookies\default@www.googleadservices[5].txt
C:\Documents and Settings\default\Cookies\default@www.herfirstlesbiansex[1].txt
C:\Documents and Settings\default\Cookies\default@indexstats[3].txt
C:\Documents and Settings\default\Cookies\default@mediametrics.mpsa[2].txt
C:\Documents and Settings\default\Cookies\default@ad1.emediate[3].txt
C:\Documents and Settings\default\Cookies\default@m1.webstats.motigo[1].txt
C:\Documents and Settings\default\Cookies\default@4.adbrite[3].txt
C:\Documents and Settings\default\Cookies\default@sexyschoolgirl[2].txt
C:\Documents and Settings\default\Cookies\default@image.masterstats[1].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[5].txt
C:\Documents and Settings\default\Cookies\default@whatpornsite[1].txt
C:\Documents and Settings\default\Cookies\default@bizrate[2].txt
C:\Documents and Settings\default\Cookies\default@clickshift[4].txt
C:\Documents and Settings\default\Cookies\default@realmedia[2].txt
C:\Documents and Settings\default\Cookies\default@porn.iwantanewgirlfriend[1].txt
C:\Documents and Settings\default\Cookies\default@free.teen-teacher[2].txt
C:\Documents and Settings\default\Cookies\default@adcycle.footymad[1].txt
C:\Documents and Settings\default\Cookies\default@indexstats[4].txt
C:\Documents and Settings\default\Cookies\default@www.virginmedia[2].txt
C:\Documents and Settings\default\Cookies\default@secretsexguide[2].txt
C:\Documents and Settings\default\Cookies\default@www.teenboobs[1].txt
C:\Documents and Settings\default\Cookies\default@server.iad.liveperson[8].txt
C:\Documents and Settings\default\Cookies\default@www.football.virginmedia[1].txt
C:\Documents and Settings\default\Cookies\default@as1.falkag[4].txt
C:\Documents and Settings\default\Cookies\default@2.marketbanker[1].txt
C:\Documents and Settings\default\Cookies\default@sexyschoolgirl[1].txt
C:\Documents and Settings\default\Cookies\default@tracker.pegsanalytics[1].txt
C:\Documents and Settings\default\Cookies\default@dealtime[1].txt
C:\Documents and Settings\default\Cookies\default@track.adform[1].txt
C:\Documents and Settings\default\Cookies\default@partypoker[2].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[3].txt
C:\Documents and Settings\default\Cookies\default@m1.webstats.motigo[3].txt
C:\Documents and Settings\default\Cookies\default@e-2dj6wjliqpdzkco.stats.esomniture[2].txt
C:\Documents and Settings\default\Cookies\default@server.iad.liveperson[4].txt
C:\Documents and Settings\default\Cookies\default@www.churchmedia[2].txt
C:\Documents and Settings\default\Cookies\default@yourpornpal[1].txt
C:\Documents and Settings\default\Cookies\default@server.iad.liveperson[7].txt
C:\Documents and Settings\default\Cookies\default@www.xxxtubemovies[2].txt
C:\Documents and Settings\default\Cookies\default@stat.dealtime[4].txt
C:\Documents and Settings\default\Cookies\default@wildpornreview[2].txt
C:\Documents and Settings\default\Cookies\default@imagecrack[1].txt
C:\Documents and Settings\default\Cookies\default@ad1.emediate[4].txt
C:\Documents and Settings\default\Cookies\default@adserver.matchcraft[1].txt
C:\Documents and Settings\default\Cookies\default@neocounter.neoworx-blog-tools[1].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[8].txt
C:\Documents and Settings\default\Cookies\default@adviva[4].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[10].txt
C:\Documents and Settings\default\Cookies\default@partypoker[3].txt
C:\Documents and Settings\default\Cookies\default@www.mosteroticteenies[3].txt
C:\Documents and Settings\default\Cookies\default@teenist[2].txt
C:\Documents and Settings\default\Cookies\default@www.mosteroticteenies[2].txt
C:\Documents and Settings\default\Cookies\default@dealtime[2].txt
C:\Documents and Settings\default\Cookies\default@ad.proxad[1].txt
C:\Documents and Settings\default\Cookies\default@hosted.justteensite[1].txt
C:\Documents and Settings\default\Cookies\default@clickshift[5].txt
C:\Documents and Settings\default\Cookies\default@m1.webstats.motigo[4].txt
C:\Documents and Settings\default\Cookies\default@web4.realtracker[1].txt
C:\Documents and Settings\default\Cookies\default@indextools[2].txt
C:\Documents and Settings\default\Cookies\default@ez-tracks[1].txt
C:\Documents and Settings\default\Cookies\default@nextag[1].txt
C:\Documents and Settings\default\Cookies\default@indexstats[6].txt
C:\Documents and Settings\default\Cookies\default@stats.paypal[2].txt
C:\Documents and Settings\default\Cookies\default@mediaservices.myspace[2].txt
C:\Documents and Settings\default\Cookies\default@bizrate[4].txt
C:\Documents and Settings\default\Cookies\default@server.lon.liveperson[11].txt
C:\Documents and Settings\default\Cookies\default@www.clickgamer[1].txt
C:\Documents and Settings\default\Cookies\default@server.cpmstar[1].txt
C:\Documents and Settings\default\Cookies\default@tracker.pegsanalytics[3].txt
C:\Documents and Settings\default\Cookies\default@free.wegcash[2].txt
C:\Documents and Settings\default\Cookies\default@www.ez-tracks[3].txt
C:\Documents and Settings\default\Cookies\default@www.teentube4free[2].txt
C:\Documents and Settings\default\Cookies\default@media.mtvnservices[1].txt
C:\Documents and Settings\default\Cookies\default@optimost[2].txt
C:\Documents and Settings\default\Cookies\default@smileycentral[2].txt
C:\Documents and Settings\default\Cookies\default@track.adform[2].txt
C:\Documents and Settings\default\Cookies\default@ads.madisonavenue[1].txt
C:\Documents and Settings\default\Cookies\default@adviva[3].txt
C:\Documents and Settings\default\Cookies\default@adcycle.footymad[4].txt
C:\Documents and Settings\default\Cookies\default@adv.xboard[2].txt
C:\Documents and Settings\default\Cookies\default@stats.paypal[3].txt
C:\Documents and Settings\default\Cookies\default@indexstats[7].txt
C:\Documents and Settings\default\Cookies\default@kontera[1].txt
C:\Documents and Settings\default\Cookies\default@promos.naked[1].txt
C:\Documents and Settings\default\Cookies\default@clickshift[6].txt
C:\Documents and Settings\default\Cookies\default@realmedia[4].txt
C:\Documents and Settings\default\Cookies\default@1.sharkadnetwork[2].txt
C:\Documents and Settings\default\Cookies\default@adviva[5].txt
C:\Documents and Settings\default\Cookies\default@media.photobucket[1].txt

Registry Cleaner Trial
HKCR\.03
HKCR\03_auto_file
HKCR\03_auto_file\shell
HKCR\03_auto_file\shell\edit
HKCR\03_auto_file\shell\edit\command
HKCR\03_auto_file\shell\edit\command#command
HKCR\03_auto_file\shell\edit\ddeexec
HKCR\03_auto_file\shell\edit\ddeexec\Application
HKCR\03_auto_file\shell\edit\ddeexec\Topic
HKCR\03_auto_file\shell\open
HKCR\03_auto_file\shell\open\command
HKCR\03_auto_file\shell\open\command#command
HKCR\03_auto_file\shell\open\ddeexec
HKCR\03_auto_file\shell\open\ddeexec\Application
HKCR\03_auto_file\shell\open\ddeexec\Topic

Trojan.Agent/Gen
HKU\S-1-5-21-507921405-1343024091-839522115-1004\Software\MailBlocker

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,399 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:18 AM

Posted 19 November 2009 - 08:00 AM

How is your computer running now? Are there any more reports/alerts, signs of infection or issues with your browser?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 dewisant

dewisant
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:18 AM

Posted 19 November 2009 - 08:52 AM

Everything seems Ok.
I haven't had time to really road test it as I came to work after the last scan.
Thanks for your help with this.

dewi

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,399 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:18 AM

Posted 19 November 2009 - 08:59 AM

You're welcome.

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Posted Image > Run... and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links: Create a New Restore Point in Vista or Windows 7 and Disk Cleanup in Vista.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users