Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Bigfish Games


  • This topic is locked This topic is locked
17 replies to this topic

#1 shiloh1007

shiloh1007

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 05 November 2010 - 05:48 PM

I recently purchase a game off of bigfish and I can't get it to download. It will start
downloading (small file) and it will stop, I can stop it then restart it and it will finally download after doing this for about 1/2 hour then when it is time to save it won't save it. Comes up error. I have turned off firewall and also tried to download in safe mode and nothing works. I have contacted bigfish but they are out of ideas I guess because no response from them. Could someone take a look at my hijackthis.log and let me know if there is something there that shouldn't be. Any help would be appreciated.

Thanks
ShilohDawn
O4 - HKLM\..\Run: [SigmatelSysTrayApp] stsystra.exe
O4 - HKLM\..\Run: [CanonMyPrinter] C:\Program Files\Canon\MyPrinter\BJMyPrt.exe /logon
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [CanonSolutionMenu] C:\Program Files\Canon\SolutionMenu\CNSLMAIN.exe /logon
O4 - HKLM\..\Run: [DVDLauncher] "C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe"
O4 - HKLM\..\Run: [ISUSPM Startup] C:\PROGRA~1\COMMON~1\INSTAL~1\UPDATE~1\ISUSPM.exe -startup
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.0\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-21-1739186642-1785604508-1898997077-500\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe (User 'Administrator')
O4 - HKUS\S-1-5-18\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DWQueuedReporting] "C:\PROGRA~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" -t (User 'Default user')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyGaming\PartyPoker\RunApp.exe (file missing)
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\system32\Shdocvw.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {3107C2A8-9F0B-4404-A58B-21BD85268FBC} (PogoWebLauncher Control) - http://www.pogo.com/cdl/launcher/PogoWebLauncherInstaller.CAB
O20 - Winlogon Notify: nnnmmkj - nnnmmkj.dll (file missing)
O20 - Winlogon Notify: vtutq - C:\WINDOWS\system32\vtutq.dll (file missing)
O23 - Service: dlbu_device - Dell - C:\WINDOWS\system32\dlbucoms.exe
O23 - Service: iPodService - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\4.3.0.5\ccSvcHst.exe

--
End of file - 7221 bytes

Edited by hamluis, 05 November 2010 - 05:50 PM.
Moved from XP forum to Malware Removal Logs ~ Hamluis.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 13 November 2010 - 05:52 PM

Yes, well spotted. There are two trojan entries which need to be dealt with.

Please run Combofix

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#3 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 14 November 2010 - 12:41 PM

Attached is the information that you requested

Thanks
Shiloh

#4 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 14 November 2010 - 12:43 PM

Lets try this again

Thanks ShilohAttached File  ComboFix.txt   10.32KB   1 downloads

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 14 November 2010 - 05:06 PM

That was a good run.

Please run MBAM next up

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
    If MBAM won't update then download and update MBAM on a clean computer then save the rules.ref folder to a memory stick. This file is found here: 'C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware' then transfer it across to the infected computer.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Posted Image
m0le is a proud member of UNITE

#6 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 14 November 2010 - 08:22 PM

Here is my notepad

thanks
shiloh

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5117

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

11/14/2010 8:19:08 PM
mbam-log-2010-11-14 (20-19-08).txt

Scan type: Full scan (A:\|C:\|D:\|E:\|F:\|)
Objects scanned: 248565
Time elapsed: 1 hour(s), 27 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 4
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{cf54be1c-9359-4395-8533-1657cf209cfe} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{d518921a-4a03-425e-9873-b9a71756821e} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\AdwareAlert (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Quarantine (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Registry Backups (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\AdwareAlert\ErrorLog.txt (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\SpyLog.txt (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\CustomScan.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\IgnoreList.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\ScanInfo.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\SelectedFolders.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\Settings.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.
C:\Program Files\AdwareAlert\Settings\Spywares.stg (Rogue.AdwareAlert) -> Quarantined and deleted successfully.

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 14 November 2010 - 09:02 PM

There's certainly a lot of adware here. Please run SAS too

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.


Then please visit ESET to use their online scanner

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Leave the top box checked and then check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#8 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 16 November 2010 - 08:57 PM

Here is the first part that you wanted me to do. I will scan the other tonight and send tomorrow. It is in two
sections I started the scan and I had to stop scan and finish. I then restarted scan and it finished completly.

Thanks
Shiloh

SUPERAntiSpyware Scan Log
http://www.superantispyware.com
2nd scan

Generated 11/16/2010 at 02:30 PM

Application Version : 4.45.1000

Core Rules Database Version : 5867
Trace Rules Database Version: 3679

Scan type : Complete Scan
Total Scan Time : 01:40:04

Memory items scanned : 501
Memory threats detected : 0
Registry items scanned : 7325
Registry threats detected : 0
File items scanned : 108660
File threats detected : 1

Rogue.Agent/Gen-Nullo[DLL]
C:\WINDOWS\SYSTEM32\DFXYRRJH.DLL
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 11/16/2010 at 12:00 PM

Application Version : 4.45.1000

Core Rules Database Version : 5867
Trace Rules Database Version: 3679

Scan type : Complete Scan
Total Scan Time : 01:36:59

1st Scan
Memory items scanned : 528
Memory threats detected : 0
Registry items scanned : 7321
Registry threats detected : 86
File items scanned : 73785
File threats detected : 67

Adware.Tracking Cookie
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@hpi.rotator.hadj7.adjuggler[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@user.lucidmedia[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@collective-media[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@ads.undertone[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@imrworldwide[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@richmedia.yahoo[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@hpi.rotator.hadj7.adjuggler[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@interclick[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@www.mynortonaccount[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@ad.wsod[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@ads.neudesicmediagroup[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@invitemedia[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@media2.legacy[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@pointroll[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@stats.townnews[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@t.pointroll[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@bentoncountyenterprise[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@legolas-media[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@rotator.hadj7.adjuggler[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@specificmedia[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@mynortonaccount[2].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@www.bentoncountyenterprise[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@a1.interclick[1].txt
C:\Documents and Settings\Penny Wilcox\Cookies\penny_wilcox@media6degrees[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@statse.webtrendslive[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[1].txt
2mdn.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
a.ads2.msads.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
accountlink.pncbank.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
acvs.mediaonenetwork.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
ads1.msn.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
ads2.msads.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
b.ads2.msads.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
burstnet.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
cdn4.specificclick.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
content.oddcast.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
core.insightexpressai.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
ec.atdmt.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
googleads.g.doubleclick.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
hs.interpolls.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
ia.media-imdb.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
insight.randomhouse.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
interclick.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
m1.2mdn.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
macromedia.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.doctoroz.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.expedia.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.jambocast.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.resulthost.org [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.scanscout.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media.tattomedia.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media1.break.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
media1.clubpenguin.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
mediaonenetwork.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
mediastore.verizonwireless.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
msnbcmedia.msn.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
msntest.serving-sys.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
objects.tremormedia.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
oddcast.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
pointroll.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
s0.2mdn.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
secure-us.imrworldwide.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
spe.atdmt.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
speed.pointroll.com [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]
udn.specificclick.net [ C:\Documents and Settings\Penny Wilcox\Application Data\Macromedia\Flash Player\#SharedObjects\B9G29GFL ]

Malware.VirusProtectPro
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}\1.0
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}\1.0\0
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}\1.0\0\win32
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}\1.0\FLAGS
HKCR\TypeLib\{CD3A8ECE-6016-469E-9964-C479F9157BCC}\1.0\HELPDIR
HKCR\Interface\{00628C22-6886-439B-AA2E-3639367F02A0}
HKCR\Interface\{00628C22-6886-439B-AA2E-3639367F02A0}\ProxyStubClsid
HKCR\Interface\{00628C22-6886-439B-AA2E-3639367F02A0}\ProxyStubClsid32
HKCR\Interface\{00628C22-6886-439B-AA2E-3639367F02A0}\TypeLib
HKCR\Interface\{00628C22-6886-439B-AA2E-3639367F02A0}\TypeLib#Version
HKCR\Interface\{14B512A9-25CF-4C90-AE5F-418689DF0A8D}
HKCR\Interface\{14B512A9-25CF-4C90-AE5F-418689DF0A8D}\ProxyStubClsid
HKCR\Interface\{14B512A9-25CF-4C90-AE5F-418689DF0A8D}\ProxyStubClsid32
HKCR\Interface\{14B512A9-25CF-4C90-AE5F-418689DF0A8D}\TypeLib
HKCR\Interface\{14B512A9-25CF-4C90-AE5F-418689DF0A8D}\TypeLib#Version
HKCR\Interface\{39D23F6A-E2DE-4F5D-9118-ECDFAAE47E9C}
HKCR\Interface\{39D23F6A-E2DE-4F5D-9118-ECDFAAE47E9C}\ProxyStubClsid
HKCR\Interface\{39D23F6A-E2DE-4F5D-9118-ECDFAAE47E9C}\ProxyStubClsid32
HKCR\Interface\{39D23F6A-E2DE-4F5D-9118-ECDFAAE47E9C}\TypeLib
HKCR\Interface\{39D23F6A-E2DE-4F5D-9118-ECDFAAE47E9C}\TypeLib#Version
HKCR\Interface\{3B334543-06C2-4B5F-B7CB-8028A4570B39}
HKCR\Interface\{3B334543-06C2-4B5F-B7CB-8028A4570B39}\ProxyStubClsid
HKCR\Interface\{3B334543-06C2-4B5F-B7CB-8028A4570B39}\ProxyStubClsid32
HKCR\Interface\{3B334543-06C2-4B5F-B7CB-8028A4570B39}\TypeLib
HKCR\Interface\{3B334543-06C2-4B5F-B7CB-8028A4570B39}\TypeLib#Version
HKCR\Interface\{3E79A538-7998-4BB7-B8A7-0E12243D7A99}
HKCR\Interface\{3E79A538-7998-4BB7-B8A7-0E12243D7A99}\ProxyStubClsid
HKCR\Interface\{3E79A538-7998-4BB7-B8A7-0E12243D7A99}\ProxyStubClsid32
HKCR\Interface\{3E79A538-7998-4BB7-B8A7-0E12243D7A99}\TypeLib
HKCR\Interface\{3E79A538-7998-4BB7-B8A7-0E12243D7A99}\TypeLib#Version
HKCR\Interface\{42348314-FC64-4B2E-B314-3F872C321B87}
HKCR\Interface\{42348314-FC64-4B2E-B314-3F872C321B87}\ProxyStubClsid
HKCR\Interface\{42348314-FC64-4B2E-B314-3F872C321B87}\ProxyStubClsid32
HKCR\Interface\{42348314-FC64-4B2E-B314-3F872C321B87}\TypeLib
HKCR\Interface\{42348314-FC64-4B2E-B314-3F872C321B87}\TypeLib#Version
HKCR\Interface\{58BD1E88-EFEE-404E-BE17-DF639B57CB56}
HKCR\Interface\{58BD1E88-EFEE-404E-BE17-DF639B57CB56}\ProxyStubClsid
HKCR\Interface\{58BD1E88-EFEE-404E-BE17-DF639B57CB56}\ProxyStubClsid32
HKCR\Interface\{58BD1E88-EFEE-404E-BE17-DF639B57CB56}\TypeLib
HKCR\Interface\{58BD1E88-EFEE-404E-BE17-DF639B57CB56}\TypeLib#Version
HKCR\Interface\{64D947B2-5505-4347-80A5-E28EEBE38F2A}
HKCR\Interface\{64D947B2-5505-4347-80A5-E28EEBE38F2A}\ProxyStubClsid
HKCR\Interface\{64D947B2-5505-4347-80A5-E28EEBE38F2A}\ProxyStubClsid32
HKCR\Interface\{64D947B2-5505-4347-80A5-E28EEBE38F2A}\TypeLib
HKCR\Interface\{64D947B2-5505-4347-80A5-E28EEBE38F2A}\TypeLib#Version
HKCR\Interface\{8D3C0252-8850-440E-A386-4A0159C8A4DD}
HKCR\Interface\{8D3C0252-8850-440E-A386-4A0159C8A4DD}\ProxyStubClsid
HKCR\Interface\{8D3C0252-8850-440E-A386-4A0159C8A4DD}\ProxyStubClsid32
HKCR\Interface\{8D3C0252-8850-440E-A386-4A0159C8A4DD}\TypeLib
HKCR\Interface\{8D3C0252-8850-440E-A386-4A0159C8A4DD}\TypeLib#Version
HKCR\Interface\{9B8BE22F-B2BB-472B-8959-C0828C0ADDC7}
HKCR\Interface\{9B8BE22F-B2BB-472B-8959-C0828C0ADDC7}\ProxyStubClsid
HKCR\Interface\{9B8BE22F-B2BB-472B-8959-C0828C0ADDC7}\ProxyStubClsid32
HKCR\Interface\{9B8BE22F-B2BB-472B-8959-C0828C0ADDC7}\TypeLib
HKCR\Interface\{9B8BE22F-B2BB-472B-8959-C0828C0ADDC7}\TypeLib#Version
HKCR\Interface\{9CD68722-9A43-42E4-BD01-2DE85D9CB565}
HKCR\Interface\{9CD68722-9A43-42E4-BD01-2DE85D9CB565}\ProxyStubClsid
HKCR\Interface\{9CD68722-9A43-42E4-BD01-2DE85D9CB565}\ProxyStubClsid32
HKCR\Interface\{9CD68722-9A43-42E4-BD01-2DE85D9CB565}\TypeLib
HKCR\Interface\{9CD68722-9A43-42E4-BD01-2DE85D9CB565}\TypeLib#Version
HKCR\Interface\{A8502478-83BC-48DB-9937-6EEB77CED41E}
HKCR\Interface\{A8502478-83BC-48DB-9937-6EEB77CED41E}\ProxyStubClsid
HKCR\Interface\{A8502478-83BC-48DB-9937-6EEB77CED41E}\ProxyStubClsid32
HKCR\Interface\{A8502478-83BC-48DB-9937-6EEB77CED41E}\TypeLib
HKCR\Interface\{A8502478-83BC-48DB-9937-6EEB77CED41E}\TypeLib#Version
HKCR\Interface\{AF1B7AB6-9715-472D-B469-74DE8D030EB6}
HKCR\Interface\{AF1B7AB6-9715-472D-B469-74DE8D030EB6}\ProxyStubClsid
HKCR\Interface\{AF1B7AB6-9715-472D-B469-74DE8D030EB6}\ProxyStubClsid32
HKCR\Interface\{AF1B7AB6-9715-472D-B469-74DE8D030EB6}\TypeLib
HKCR\Interface\{AF1B7AB6-9715-472D-B469-74DE8D030EB6}\TypeLib#Version
HKCR\Interface\{BEB46F7E-CF37-4E8F-BA48-D96F1A434224}
HKCR\Interface\{BEB46F7E-CF37-4E8F-BA48-D96F1A434224}\ProxyStubClsid
HKCR\Interface\{BEB46F7E-CF37-4E8F-BA48-D96F1A434224}\ProxyStubClsid32
HKCR\Interface\{BEB46F7E-CF37-4E8F-BA48-D96F1A434224}\TypeLib
HKCR\Interface\{BEB46F7E-CF37-4E8F-BA48-D96F1A434224}\TypeLib#Version
HKCR\Interface\{D2315CDD-4F9A-4DDA-8671-252465FF0B5D}
HKCR\Interface\{D2315CDD-4F9A-4DDA-8671-252465FF0B5D}\ProxyStubClsid
HKCR\Interface\{D2315CDD-4F9A-4DDA-8671-252465FF0B5D}\ProxyStubClsid32
HKCR\Interface\{D2315CDD-4F9A-4DDA-8671-252465FF0B5D}\TypeLib
HKCR\Interface\{D2315CDD-4F9A-4DDA-8671-252465FF0B5D}\TypeLib#Version
HKCR\Interface\{FF442B5E-B5C0-4469-85C8-4B0B2A579EE9}
HKCR\Interface\{FF442B5E-B5C0-4469-85C8-4B0B2A579EE9}\ProxyStubClsid
HKCR\Interface\{FF442B5E-B5C0-4469-85C8-4B0B2A579EE9}\ProxyStubClsid32
HKCR\Interface\{FF442B5E-B5C0-4469-85C8-4B0B2A579EE9}\TypeLib
HKCR\Interface\{FF442B5E-B5C0-4469-85C8-4B0B2A579EE9}\TypeLib#Version

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 21 November 2010 - 11:46 AM

Hi,

I have not had a reply from you for 4 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#10 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 21 November 2010 - 12:55 PM

I'm sorry, I did reply with my notepad that you requested SUPERAntiSpyware Scan Log. The ESET to use their online scanner would not work, it would not download and I am setup as the administrator.

Thanks
Shiloh

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 21 November 2010 - 12:59 PM

Please run Superantispyware a second time, I want to check if anything's stuck around before we go ahead with the next step.
Posted Image
m0le is a proud member of UNITE

#12 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 21 November 2010 - 01:04 PM

I did and it was in my reply. I marked them first scan and second scan

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 21 November 2010 - 04:30 PM

Not sure why ESET isn't playing ball.

How is the PC now?
Posted Image
m0le is a proud member of UNITE

#14 shiloh1007

shiloh1007
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:01:21 PM

Posted 21 November 2010 - 05:12 PM

The same, it actually is getting slower as we speak. We I look to see what is running behind the scene, there is always about 20 things going and I don't have a clue what most of them are. Thanks for the help, I think
this one is a lost cause.
Shiloh

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:06:21 PM

Posted 21 November 2010 - 05:55 PM

No way is this a lost cause. Let's make sure that it isn't malware and then you can post in the operating system forums for some more help.

Please rerun Combofix, accept any updates it requests.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users