Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Windows 7 reverting to old format while freezing, opens ads in IE, Eset finding nothing


  • This topic is locked This topic is locked
6 replies to this topic

#1 andmilne

andmilne

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 01 October 2010 - 07:16 PM

I have been having issues with ESET (update username and password regularly but had a 1 week period where it was inactive, I reactivated it and it found and deleted 4 trojans from torrent files but keeps notifying me of a Trojan it says it quarantined. I canít find the name of it now in the files, but lately my computer has been slow and also freezing, it will freeze for 15 to 40 seconds and during this time frame my Windows 7 format returns to the old, gray box style format of Windows 97 or earlier. Like the very square edges, gray taskbar with black font type style. It also will open ads in Internet explorer in this old format of windows, things like working from home and consumer reports online.org site. It know it probably came from a torrent but eset isn't finding anything anymore.

Any ideas/suggestions? Idk what antivirus to get to try and find this thing.

Edited by andmilne, 02 October 2010 - 01:02 AM.


BC AdBot (Login to Remove)

 


#2 delbrugge

delbrugge

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 01 October 2010 - 07:46 PM

I would run malwarebytes and superantispyware. If that don't work try some online antivirus scanners. Also check your startup items in msconfig to see if anything suspicious is running in the background

Edited by delbrugge, 01 October 2010 - 07:46 PM.


#3 andmilne

andmilne
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 01 October 2010 - 08:31 PM

I would run malwarebytes and superantispyware. If that don't work try some online antivirus scanners. Also check your startup items in msconfig to see if anything suspicious is running in the background



The last ad that came up was for a "CPA security check" I tried searching this on google but only could find another complaint with no answer on what to do.

ADAWARE is blocking SOME of the internet pop ups and saying it's from SVCHOST.EXE. Malware caught 2 infected files but the pop ups are still occuring. Someone please help

Edited by andmilne, 02 October 2010 - 12:13 AM.


#4 andmilne

andmilne
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 02 October 2010 - 06:45 AM

update: spysweeper says it is blocking myroitracking dot com. but the ads are still popping up. someone please help.

#5 delbrugge

delbrugge

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 02 October 2010 - 11:47 AM

Click the Start button, then type msconfig in the search bar and press enter. Click the Startup tab and take a picture and post it here if you know how.

If not, maximize msconfig when the startup tab is open. Then press Print Screen button on your keyboard usually in the top right. Go to start>all programs > accessories> open paint. Press Ctrl+V to paste the picture you took. Click the purple floppy drive icon in the top left of Paint and save it somewhere you will remember such as your desktop.

Go to imageshack.us, browse the folder where your picture is and upload it. Then post the link here

#6 andmilne

andmilne
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:25 PM

Posted 02 October 2010 - 05:48 PM

Click the Start button, then type msconfig in the search bar and press enter. Click the Startup tab and take a picture and post it here if you know how.

If not, maximize msconfig when the startup tab is open. Then press Print Screen button on your keyboard usually in the top right. Go to start>all programs > accessories> open paint. Press Ctrl+V to paste the picture you took. Click the purple floppy drive icon in the top left of Paint and save it somewhere you will remember such as your desktop.

Go to imageshack.us, browse the folder where your picture is and upload it. Then post the link here




Here is the screenshot http://yfrog.com/2tscreensscj
I've ran and cleaned with malaware, and eset. Superantispyware found a few things the others didn't but the popups are still occuring.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/02/2010 at 10:05 AM

Application Version : 4.44.1000

Core Rules Database Version : 5620
Trace Rules Database Version: 3432

Scan type : Quick Scan
Total Scan Time : 01:53:39

Memory items scanned : 817
Memory threats detected : 0
Registry items scanned : 2631
Registry threats detected : 0
File items scanned : 24228
File threats detected : 60

Adware.Tracking Cookie
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@a1.interclick[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@media6degrees[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@bridge2.admarketplace[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@ads.bleepingcomputer[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@smartadserver[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@invitemedia[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@theclickcheck[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@microsoftsto.112.2o7[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@ads.pof[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@kontera[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@interclick[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@admarketplace[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@adbrite[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@ext-us.bestofmedia[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@revsci[2].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@collective-media[3].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@dmtracker[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@advertise[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@insightexpressai[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@chitika[1].txt
C:\Users\andmilne\AppData\Roaming\Microsoft\Windows\Cookies\andmilne@findmyhood[1].txt
core.insightexpressai.com [ C:\Users\andmilne\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\PVK92C7H ]
core.insightexpressai.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
media.mtvnservices.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
media.scanscout.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
media1.break.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
objects.tremormedia.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
s0.2mdn.net [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
secure-us.imrworldwide.com [ C:\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\9WY3F2ZS ]
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@invitemedia[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@advertise[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@lucidmedia[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@advertise[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@media6degrees[3].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@media6degrees[4].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@eas.apm.emediate[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@www.businessfind[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@bizzclick[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@legolas-media[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@fastclick[3].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@invitemedia[4].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@media6degrees[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@ads.undertone[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@bizzclick[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@cdn.jemamedia[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@invitemedia[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@dc.tremormedia[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@businessfind[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@fastclick[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@eas.apm.emediate[3].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@adserver.adtechus[1].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@adbrite[2].txt
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\system@technoratimedia[1].txt
cdn4.specificclick.net [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]
media.mtvnservices.com [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]
media.scanscout.com [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]
media1.break.com [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]
objects.tremormedia.com [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]
secure-us.imrworldwide.com [ C:\Windows.old.000\Windows\System32\config\systemprofile\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\AZLUTQ4M ]

Trojan.Agent/Gen-SVC[Fake]
D:\ESET\NODENABLER V3.4.1\OLD NE UNINSTALLER X86.EXE

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,231 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:25 PM

Posted 03 October 2010 - 02:39 PM

I have split your HJT log to a new topic where HJT logs belong.
http://www.bleepingcomputer.com/forums/ind...p;#entry1958548

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users