Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Super Anti-Spyware found virus in registry (Adware.Zango/ShoppingReports)


  • Please log in to reply
7 replies to this topic

#1 sidd0123

sidd0123

  • Banned
  • 81 posts
  • OFFLINE
  •  
  • Local time:07:54 AM

Posted 07 April 2010 - 03:24 PM

I just ran a full scan and found out that Super AntiSpyware found something in my registry. It says Adware.Zango/ShoppingReports. Part of it says HKCR\Interface and then a bunch of different stuff. Can someone please advise. I have not clicked Next yet to proceed with the quarantine and deletion process yet.

BC AdBot (Login to Remove)

 


#2 techextreme

techextreme

    Bleepin Tech


  • BC Advisor
  • 2,125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pittsburgh, PA
  • Local time:07:54 AM

Posted 09 April 2010 - 09:56 AM

If you have not already clicked "Next", please do and post the log from SuperAntiSpyware.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Techextreme

"Admire those who attempt great things, even though they fail."

-- Seneca

 


#3 sidd0123

sidd0123
  • Topic Starter

  • Banned
  • 81 posts
  • OFFLINE
  •  
  • Local time:07:54 AM

Posted 12 April 2010 - 02:33 AM

I had to run Super twice so I have two logs. Sorry if that brings any inconvience!


This is the first log

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/11/2010 at 09:45 PM

Application Version : 4.35.1002

Core Rules Database Version : 4778
Trace Rules Database Version: 2590

Scan type : Complete Scan
Total Scan Time : 00:05:28

Memory items scanned : 762
Memory threats detected : 0
Registry items scanned : 7017
Registry threats detected : 157
File items scanned : 1417
File threats detected : 0

Adware.Zango/ShoppingReport
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}\1.0
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}\1.0\0
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}\1.0\0\win32
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}\1.0\FLAGS
HKCR\TypeLib\{03D7FF6E-9781-40B5-BB7F-94291A361604}\1.0\HELPDIR
HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}
HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\ProxyStubClsid
HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\ProxyStubClsid32
HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\TypeLib
HKCR\Interface\{15FD8424-D12A-4C51-8C6C-D5D57B80F781}\TypeLib#Version
HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}
HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\ProxyStubClsid
HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\ProxyStubClsid32
HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\TypeLib
HKCR\Interface\{2447E305-5E90-42A8-BD1E-0BC333B807E1}\TypeLib#Version
HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}
HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\ProxyStubClsid
HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\ProxyStubClsid32
HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\TypeLib
HKCR\Interface\{2557DD3F-23A0-477C-BCD8-90FD0AECC4B8}\TypeLib#Version
HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}
HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\ProxyStubClsid
HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\ProxyStubClsid32
HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\TypeLib
HKCR\Interface\{2893116C-A176-42B1-8794-DA8C9FC45564}\TypeLib#Version
HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}
HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\ProxyStubClsid
HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\ProxyStubClsid32
HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\TypeLib
HKCR\Interface\{30B15818-E110-4527-9C05-46ACE5A3460D}\TypeLib#Version
HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}
HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\ProxyStubClsid
HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\ProxyStubClsid32
HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\TypeLib
HKCR\Interface\{3CEB04AB-08AF-45F4-81B4-70D13C1F7B85}\TypeLib#Version
HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}
HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\ProxyStubClsid
HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\ProxyStubClsid32
HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\TypeLib
HKCR\Interface\{40CA90F3-4098-4877-AE87-23EB612B18C7}\TypeLib#Version
HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}
HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\ProxyStubClsid
HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\ProxyStubClsid32
HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\TypeLib
HKCR\Interface\{4C3B62AF-CA25-4FBA-8405-32E44F83BB6F}\TypeLib#Version
HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}
HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\ProxyStubClsid
HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\ProxyStubClsid32
HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\TypeLib
HKCR\Interface\{50D2FDCC-2707-49CB-8223-7FE0424909AA}\TypeLib#Version
HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}
HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\ProxyStubClsid
HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\ProxyStubClsid32
HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\TypeLib
HKCR\Interface\{5A635A91-C303-45C9-8DB9-F759D98A3B9D}\TypeLib#Version
HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}
HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\ProxyStubClsid
HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\ProxyStubClsid32
HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\TypeLib
HKCR\Interface\{618AAD04-921F-44C2-BE38-C0818AF69861}\TypeLib#Version
HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}
HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\ProxyStubClsid
HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\ProxyStubClsid32
HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\TypeLib
HKCR\Interface\{67B3BECF-7B6F-42B2-99F0-F7656F89CFFA}\TypeLib#Version
HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}
HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\ProxyStubClsid
HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\ProxyStubClsid32
HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\TypeLib
HKCR\Interface\{715FFD42-4E05-4EAB-9513-C8DAA5395AE2}\TypeLib#Version
HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}
HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\ProxyStubClsid
HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\ProxyStubClsid32
HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\TypeLib
HKCR\Interface\{759D6F7C-8D30-45B6-ABEA-FA51C190EED5}\TypeLib#Version
HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}
HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\ProxyStubClsid
HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\ProxyStubClsid32
HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\TypeLib
HKCR\Interface\{7E335D04-2E6E-4D0E-A921-C3D9192E7121}\TypeLib#Version
HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}
HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\ProxyStubClsid
HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\ProxyStubClsid32
HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\TypeLib
HKCR\Interface\{878CE013-7BA9-4650-A78C-B2234C0C1648}\TypeLib#Version
HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}
HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\ProxyStubClsid
HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\ProxyStubClsid32
HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\TypeLib
HKCR\Interface\{8EE46F55-1CE1-4DB9-811A-68938EC7F3DD}\TypeLib#Version
HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}
HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\ProxyStubClsid
HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\ProxyStubClsid32
HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\TypeLib
HKCR\Interface\{99CCFB8C-6380-4A14-8FDD-EF3E7E95335D}\TypeLib#Version
HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}
HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\ProxyStubClsid
HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\ProxyStubClsid32
HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\TypeLib
HKCR\Interface\{99FDCA0C-7380-4E9C-8D99-5DC4750334EF}\TypeLib#Version
HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}
HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\ProxyStubClsid
HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\ProxyStubClsid32
HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\TypeLib
HKCR\Interface\{9A4A64A4-A2FB-48FA-9BBA-1AC50267695D}\TypeLib#Version
HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}
HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\ProxyStubClsid
HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\ProxyStubClsid32
HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\TypeLib
HKCR\Interface\{A7213D71-47E1-4832-92D7-D61DFE9F231F}\TypeLib#Version
HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}
HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\ProxyStubClsid
HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\ProxyStubClsid32
HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\TypeLib
HKCR\Interface\{A87DFD99-CF81-4241-85CE-881E0026B686}\TypeLib#Version
HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}
HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\ProxyStubClsid
HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\ProxyStubClsid32
HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\TypeLib
HKCR\Interface\{B1D9F4B1-B9FF-463F-BF15-AB9CB26160F7}\TypeLib#Version
HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}
HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\ProxyStubClsid
HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\ProxyStubClsid32
HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\TypeLib
HKCR\Interface\{B20D7ADD-989C-4BC0-A797-F6FE7998EFD7}\TypeLib#Version
HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}
HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\ProxyStubClsid
HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\ProxyStubClsid32
HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\TypeLib
HKCR\Interface\{B5D2ED96-62F9-4C2C-956D-E425B1F67337}\TypeLib#Version
HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}
HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\ProxyStubClsid
HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\ProxyStubClsid32
HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\TypeLib
HKCR\Interface\{BFC20A15-B0AC-44CC-A25A-A7039014BA9F}\TypeLib#Version
HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}
HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\ProxyStubClsid
HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\ProxyStubClsid32
HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\TypeLib
HKCR\Interface\{C96B9FAE-A032-4100-BB47-32EF05E28BE4}\TypeLib#Version
HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}
HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\ProxyStubClsid
HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\ProxyStubClsid32
HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\TypeLib
HKCR\Interface\{CF82F350-E1C4-4916-AC12-BA73DB60AFB7}\TypeLib#Version
HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}
HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\ProxyStubClsid
HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\ProxyStubClsid32
HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\TypeLib
HKCR\Interface\{D3A412E8-1E4B-47D2-9B12-F88291F5AFBB}\TypeLib#Version
HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}
HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\ProxyStubClsid
HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\ProxyStubClsid32
HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\TypeLib
HKCR\Interface\{F019AEC4-4C95-46DE-A107-E302473E3B9A}\TypeLib#Version
HKU\S-1-5-21-723420034-3566345728-702575366-1001\Software\Microsoft\Windows\CurrentVersion\Run#WeatherDPA [ "C:\Program Files\Hotbar\bin\11.0.78.0\Weather.exe" -auto ]




This is the second log


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/11/2010 at 10:31 PM

Application Version : 4.35.1002

Core Rules Database Version : 4778
Trace Rules Database Version: 2590

Scan type : Complete Scan
Total Scan Time : 00:43:07

Memory items scanned : 723
Memory threats detected : 0
Registry items scanned : 7021
Registry threats detected : 0
File items scanned : 30127
File threats detected : 84

Adware.Tracking Cookie
C:\Users\paresh\AppData\Local\Temp\Low\Cookies\paresh@media6degrees[1].txt
C:\Users\paresh\AppData\Local\Temp\Low\Cookies\paresh@ad.wsod[2].txt
C:\Users\paresh\AppData\Local\Temp\Low\Cookies\paresh@atdmt[1].txt
C:\Users\paresh\AppData\Local\Temp\Low\Cookies\paresh@msnportal.112.2o7[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@fastclick[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@insightexpressai[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@realmedia[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@burstnet[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@statse.webtrendslive[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@msnbc.112.2o7[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.bridgetrack[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@network.realmedia[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ad.yieldmanager[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@at.atwola[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.pointroll[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@kanoodle[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@lfstmedia[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@advertising[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@interpolls[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@trafficmp[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@adbrite[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@imrworldwide[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.gmodules[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@smartadserver[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.burstbeacon[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@doubleclick[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@yieldmanager[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@usnews.122.2o7[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@s.clickability[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@2o7[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@lockedonmedia[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@pointroll[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@tacoda[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@revsci[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@statcounter[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@specificmedia[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@hitbox[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ad.doubleclick[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@media6degrees[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@cdn4.specificclick[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@collective-media[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@paypal.112.2o7[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@invitemedia[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@adinterax[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@interclick[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@videoegg.adbureau[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@biskeducation.112.2o7[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@richmedia.yahoo[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ad.wsod[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ad.wsod[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@server.iad.liveperson[3].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@server.iad.liveperson[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@atdmt[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@bs.serving-sys[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.collegeconfidential[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.undertone[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@casalemedia[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@roiservice[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@content.yieldmanager[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ads.ourstage[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@content.yieldmanager[3].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.googleadservices[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.googleadservices[5].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@sales.liveperson[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@bluestreak[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.googleadservices[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@a1.interclick[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@sales.liveperson[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@mediaplex[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.googleadservices[3].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@zedo[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@apmebf[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@intermundomedia[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@ehg-ampubunivsys.hitbox[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@specificclick[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@serving-sys[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@tribalfusion[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@questionmarket[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.burstnet[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@overture[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@www.zxtrack[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@rotator.adjuggler[1].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@adecn[2].txt
C:\Users\paresh\AppData\Roaming\Microsoft\Windows\Cookies\Low\paresh@msnportal.112.2o7[1].txt


Also, my computer randomly crashed(blue screen) and did a memory dump while I was ejecting a thumb drive through my computer. I am running Malwarebytes and Super again just in case and will get back with those reports. And while I am typing this, the computer is showing the letters at a delay. It seems to have trouble relaying what I am typing fast enough. Like the processor is stalling and slowing down a lot. As soon as i type it, it takes a while for the computer to react . I don't know if that has anything to do with whats happening to my computer.

#4 techextreme

techextreme

    Bleepin Tech


  • BC Advisor
  • 2,125 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pittsburgh, PA
  • Local time:07:54 AM

Posted 12 April 2010 - 07:10 AM

It looks like SAS has removed most if not all of Zango from your computer.

Please run MBAM and post the log when it is complete.

Techextreme

"Admire those who attempt great things, even though they fail."

-- Seneca

 


#5 sidd0123

sidd0123
  • Topic Starter

  • Banned
  • 81 posts
  • OFFLINE
  •  
  • Local time:07:54 AM

Posted 15 April 2010 - 08:11 PM

Sorry for the late reply!

Here is the MBAM Log:

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18904

4/15/2010 9:10:43 PM
mbam-log-2010-04-15 (21-10-43).txt

Scan type: Full scan (C:\|D:\|E:\|)
Objects scanned: 261586
Time elapsed: 1 hour(s), 27 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar (Adware.Hotbar) -> Quarantined and deleted successfully.

Files Infected:
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\About Hotbar.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\Hotbar Customer Support Center.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\Hotbar Games!.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\Hotbar Uninstall Instructions.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\Reset Cursor.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Hotbar\Weather.lnk (Adware.Hotbar) -> Quarantined and deleted successfully.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 15 April 2010 - 10:45 PM

If I may step in a moment.. Your MBAM needs to update...
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 sidd0123

sidd0123
  • Topic Starter

  • Banned
  • 81 posts
  • OFFLINE
  •  
  • Local time:07:54 AM

Posted 17 April 2010 - 04:16 PM

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4002

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18904

4/17/2010 5:16:10 PM
mbam-log-2010-04-17 (17-16-10).txt

Scan type: Quick scan
Objects scanned: 109249
Time elapsed: 5 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,760 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:54 AM

Posted 17 April 2010 - 04:56 PM

Hello,looks good any other issues? Please run an online scan with ESET. Let us know if all's good after.

Please perform a scan with Eset Online Antiivirus Scanner.
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista users need to run Internet Explorer as Administrator. Right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.
  • Click the green ESET Online Scanner button.
  • Read the End User License Agreement and check the box: YES, I accept the Terms of Use.
  • Click on the Start button next to it.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.
  • A new window will appear asking "Do you want to install this software?"".
  • Answer Yes to download and install the ActiveX controls that allows the scan to run.
  • Click Start.
  • Check Remove found threats and Scan potentially unwanted applications.
  • Click Scan to start. (please be patient as the scan could take some time to complete)
  • If offered the option to get information or buy software. Just close the window.
  • When the scan has finished, a log.txt file will be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
  • Click Posted Image > Run..., then copy and paste this command into the open box: C:\Program Files\EsetOnlineScanner\log.txt
  • The scan results will open in Notepad. Copy and paste the contents of log.txt in your next reply.
Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users