Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Invected with Clicksor virus

  • This topic is locked This topic is locked
2 replies to this topic

#1 cd4337


  • Members
  • 1 posts
  • Local time:03:27 AM

Posted 26 November 2010 - 03:55 PM

I cant find the issue. Have reformatted my HD 2 times and re-installed OS 3 times. Every ad that Google serves seems to be hijacked by another ad with "Clicksor" in the bottom right of the ad. Accompanying this behavior is a very slow loading time and then a redirect to another less than reputable advertisment. I do get 125x125 pop ups in the bottom right of my screen every now and then with the same "Clicksor" in the ad.

Here are the logs that may help you

DDS (Ver_10-11-26.01) - NTFSx86
Run by Chris at 13:23:43.57 on Fri 11/26/2010
Internet Explorer: 8.0.7600.16385
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.3062.2170 [GMT -7:00]

============== Running Processes ===============

C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Windows\System32\svchost.exe -k secsvcs
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\Windows\System32\svchost.exe -k swprv

============== Pseudo HJT Report ===============

TB: {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - No File
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRunOnce: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silent
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Notify: igfxcui - igfxdev.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\chris\appdata\roaming\mozilla\firefox\profiles\kl1c3brt.default\
FF - prefs.js: browser.startup.homepage - hxxp://us.mc593.mail.yahoo.com/mc/welcome?.gx=1&.tm=1290792179&.rand=bk6tomvo96vj8
FF - prefs.js: network.proxy.type - 0

============= SERVICES / DRIVERS ===============

R1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\drivers\vwififlt.sys [2009-7-13 48128]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\drivers\VSTAZL3.SYS [2009-7-13 207360]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\drivers\VSTDPV3.SYS [2009-7-13 980992]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\drivers\VSTCNXT3.SYS [2009-7-13 661504]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]

=============== Created Last 30 ================

2010-11-26 20:16:32 -------- d-----w- c:\users\chris\appdata\roaming\Malwarebytes
2010-11-26 20:16:25 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-11-26 20:16:24 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-11-26 20:16:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-11-26 20:16:24 -------- d-----w- c:\progra~2\Malwarebytes
2010-11-26 19:48:28 -------- d-sh--w- C:\$RECYCLE.BIN
2010-11-26 19:41:15 -------- d-----w- C:\ComboFix
2010-11-26 19:32:09 6273872 ----a-w- c:\progra~2\microsoft\windows defender\definition updates\{a678f024-50d3-48ec-8ac5-1ef666ef7e59}\mpengine.dll
2010-11-26 19:32:08 222080 ------w- c:\windows\system32\MpSigStub.exe
2010-11-26 19:16:23 98816 ----a-w- c:\windows\sed.exe
2010-11-26 19:16:23 89088 ----a-w- c:\windows\MBR.exe
2010-11-26 19:16:23 256512 ----a-w- c:\windows\PEV.exe
2010-11-26 19:16:23 161792 ----a-w- c:\windows\SWREG.exe
2010-11-26 17:46:53 -------- d-----w- c:\windows\Internet Logs
2010-11-26 17:38:02 -------- d-----w- c:\windows\Panther
2010-11-26 17:35:24 -------- d-----w- c:\users\chris\appdata\roaming\CheckPoint
2010-11-26 17:35:06 -------- d-----w- c:\program files\Conduit
2010-11-26 17:34:48 -------- d-----w- c:\program files\CheckPoint
2010-11-26 17:34:30 240008 ----a-w- c:\windows\system32\drivers\netio.sys
2010-11-26 17:34:30 1285000 ----a-w- c:\windows\system32\drivers\tcpip.sys
2010-11-26 17:33:56 -------- d-----w- c:\program files\Zone Labs
2010-11-26 17:33:28 -------- d-----w- c:\progra~2\CheckPoint
2010-11-26 17:19:23 398336 ----a-w- c:\windows\system32\TVWizudlg.exe
2010-11-26 17:19:23 140288 ----a-w- c:\windows\system32\igfxtvcx.dll
2010-11-26 17:19:23 -------- d-----w- c:\windows\system32\Lang
2010-11-26 17:05:02 -------- d-----w- c:\users\chris\appdata\roaming\AVG10
2010-11-26 17:03:21 -------- d--h--w- c:\progra~2\Common Files
2010-11-26 17:02:07 -------- d-----w- c:\progra~2\AVG10
2010-11-26 17:01:06 -------- d-----w- c:\program files\AVG
2010-11-26 16:56:07 1002008 ----a-w- c:\windows\system32\igxpun.exe
2010-11-26 16:56:07 -------- d-----w- c:\windows\system32\x64
2010-11-26 16:55:32 -------- d-sh--w- c:\windows\Installer
2010-11-26 16:55:17 -------- d-----w- c:\progra~2\MFAData
2010-11-26 16:55:04 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-11-26 16:54:56 132608 ----a-w- c:\windows\system32\cabview.dll
2010-11-26 16:54:29 -------- d-----w- c:\windows\system32\wbem\Performance
2010-11-26 16:47:26 -------- d-----w- C:\Recovery

==================== Find3M ====================

============= FINISH: 13:24:09.47 ===============

Any help that you binary wizards may provide would be most helpful.

Attached Files

BC AdBot (Login to Remove)


#2 B-boy/StyLe/


    Bleepin' Freestyler

  • Malware Response Team
  • 8,307 posts
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:27 AM

Posted 04 December 2010 - 05:07 AM

Hello and welcome to Bleeping Computer :welcome:

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review your topic an do their best to resolve your issues.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit scanner. Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log

Georgi :hello:


#3 thcbytes


  • Malware Response Team
  • 14,790 posts
  • Gender:Male
  • Local time:03:27 AM

Posted 15 December 2010 - 02:14 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users