Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus/adware on work PC that MalWareBytes and eTrust aren't fixing


  • Please log in to reply
8 replies to this topic

#1 DocAlan02

DocAlan02

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 26 May 2011 - 01:54 PM

Last week, we found a virus on some of our servers. There were files, including one called MyPorno.avi, sitting on the servers. The virus appeared to be dropping files into any shared folders. Since then, I have been having problems on my PC. Things are slow, I have trouble hitting some servers and SQL servers at times, and my browser (I use Firefox) is crazy slow. I can see at the bottom that no matter what site I am going to, it seems to be hitting sites like pubmatic.com and other ad-sounding things. Just now, for the first time, I found myself being redirected to a site for some kind of registry cleaner thing. I have run scans with eTrust and with MalwareBytes, and also Spybot S&D. No luck.

Any assistance would be appreciated!

BC AdBot (Login to Remove)

 


#2 Iron Hide

Iron Hide

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 26 May 2011 - 01:59 PM

try clearing all cookies and history from firefox and run some decent anti-virus program. Do you have any anti-virus program with real-time scanning installed when it occurred. unless you bought the pro version, the free version of malwareBytes doesn't provide real-time scanning.

Edited by hamluis, 27 May 2011 - 08:47 AM.
Sent PM re signature.

Marvelous Forums
Discussion related to Computers, Technology, IT Certification, Social Lounge, Humor and Much More at Marvelous Forums.
Posted Image


#3 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:05:34 AM

Posted 26 May 2011 - 02:03 PM

Here is the stance from BC regarding registry cleaners:

Bleeping Computer DOES NOT recommend the use of registry cleaners/optimizers for several reasons:

• Registry cleaners are extremely powerful applications that can damage the registry by using aggressive cleaning routines and cause your computer to become unbootable.

The Windows registry is a central repository (database) for storing configuration data, user settings and machine-dependent settings, and options for the operating system. It contains information and settings for all hardware, software, users, and preferences. Whenever a user makes changes to settings, file associations, system policies, or installed software, the changes are reflected and stored in this repository. The registry is a crucial component because it is where Windows "remembers" all this information, how it works together, how Windows boots the system and what files it uses when it does. The registry is also a vulnerable subsystem, in that relatively small changes done incorrectly can render the system inoperable. For a more detailed explanation, read Understanding The Registry.

• Not all registry cleaners are created equal. There are a number of them available but they do not all work entirely the same way. Each vendor uses different criteria as to what constitutes a "bad entry". One cleaner may find entries on your system that will not cause problems when removed, another may not find the same entries, and still another may want to remove entries required for a program to work.

• Not all registry cleaners create a backup of the registry before making changes. If the changes prevent the system from booting up, then there is no backup available to restore it in order to regain functionality. A backup of the registry is essential BEFORE making any changes to the registry.

• Improperly removing registry entries can hamper malware disinfection and make the removal process more difficult if your computer becomes infected. For example, removing malware related registry entries before the infection is properly identified can contribute to system instability and even make the malware undetectable to removal tools.

• The usefulness of cleaning the registry is highly overrated and can be dangerous. In most cases, using a cleaner to remove obsolete, invalid, and erroneous entries does not affect system performance but it can result in "unpredictable results".

Unless you have a particular problem that requires a registry edit to correct it, I would suggest you leave the registry alone. Using registry cleaning tools unnecessarily or incorrectly could lead to disastrous effects on your operating system such as preventing it from ever starting again. For routine use, the benefits to your computer are negligible while the potential risks are great.


With that said

Post the logs from Malwarebytes.

SUPERAntiSpyware:

Please download and scan with SUPERAntiSpyware Free

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

Instructions:

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now GMER

GMER does not work in 64bit Mode!!!!!!

Please download GMER from one of the following locations and save it to your desktop:

  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic Full Scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.



#4 DocAlan02

DocAlan02
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 26 May 2011 - 03:07 PM

Thanks. For the record, I was not touching that reg cleaner. It was clearly malware of some kind. Just telling you that I was redirected to their site. Here is the MWB log. Downloading the other stuff now.


Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6603

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

5/19/2011 12:36:10 AM
mbam-log-2011-05-19 (00-36-10).txt

Scan type: Full scan (C:\|)
Objects scanned: 615958
Time elapsed: 7 hour(s), 20 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#5 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:05:34 AM

Posted 26 May 2011 - 03:15 PM

Run the other scans.

#6 DocAlan02

DocAlan02
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 27 May 2011 - 08:27 AM

Stupid question: reading above, it seems to indicate I should run both SUPERAntiSpyWare Free AND SUPERAntiSpyWare Free for Home Users. I assume that is not the case? And you only need to do Safe Mode with the first one?

#7 DocAlan02

DocAlan02
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 27 May 2011 - 03:55 PM

OK, I ran SAS. Log results are below. I also ran GMER but that's where things got weird. It ran for a pretty long time, found a bunch if stuff including something that it highlighted about rootkit activity. At one point, I got a message that SvcHost had crashed. I walked away as I was working on another PC. When I came back, my PC had rebooted and was sitting at the prompt for "Start Windows Normally?" or something like that. I said yes and it went to the Windows XP splash screen and then back to the same question about starting windows. Did this twice. Eventually chose "Last Known Good Configuration" and here we are.


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/27/2011 at 03:33 PM

Application Version : 4.53.1000

Core Rules Database Version : 7149
Trace Rules Database Version: 4961

Scan type : Complete Scan
Total Scan Time : 04:41:30

Memory items scanned : 741
Memory threats detected : 0
Registry items scanned : 10246
Registry threats detected : 4
File items scanned : 345377
File threats detected : 214

Adware.Tracking Cookie
C:\DOCUME~1\ALAN~1.SPO\LOCALS~1\Temp\Cookies\alan.spoll@doubleclick[1].txt
2mdn.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
adsatt.espn.go.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
bannerfarm.ace.advertising.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
broadcast.piximedia.fr [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
cache.specificmedia.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
cdn.eyewonder.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
cdn4.specificclick.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
cloudfront.mediamatters.org [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
content.oddcast.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
core.insightexpressai.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
ds.serving-sys.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
ec.atdmt.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
espn360.channelfinder.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
googleads.g.doubleclick.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
ia.media-imdb.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
indieclick.3janecdn.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
interclick.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
jdvhotels1-px.trvlclick.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
m1.2mdn.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
m3.2mdn.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media-macys1.pictela.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.hamptonroads.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.jambocast.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.kyte.tv [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.lintvnews.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.mtvnservices.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.nbcnewyork.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.resulthost.org [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.scanscout.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.socialvibe.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.tattomedia.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media.theonion.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
media01.kyte.tv [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
msnbcmedia.msn.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
objects.tremormedia.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
piximedia.fr [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
s0.2mdn.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
secure-us.imrworldwide.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
serving-sys.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
spe.atdmt.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
speed.pointroll.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
static.2mdn.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
static.socialmedia.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
stats.kitiyo.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
track.webgains.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
udn.specificclick.net [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
wdw2.wdpromedia.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
widgets.cracked.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
www.homefinder.com [ C:\Documents and Settings\alan.spoll\Application Data\Macromedia\Flash Player\#SharedObjects\2T7MSRUK ]
C:\Documents and Settings\alan.spoll\Local Settings\Temp\Cookies\alan.spoll@doubleclick[1].txt
objects.tremormedia.com [ C:\Documents and Settings\LocalService\Application Data\Macromedia\Flash Player\#SharedObjects\HXMBPE84 ]
C:\Documents and Settings\LocalService\Cookies\system@advertise[1].txt
C:\Documents and Settings\LocalService\Cookies\system@burstbeacon[1].txt
C:\Documents and Settings\LocalService\Cookies\system@cdn.jemamedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@findology[2].txt
C:\Documents and Settings\LocalService\Cookies\system@imrworldwide[2].txt
C:\Documents and Settings\LocalService\Cookies\system@invitemedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@lucidmedia[1].txt
C:\Documents and Settings\LocalService\Cookies\system@media6degrees[2].txt
cdn.eyewonder.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
convoad.technoratimedia.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
crackle.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
spe.atdmt.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\8CRT65YY ]
C:\Documents and Settings\NetworkService\Cookies\system@247realmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@a1.interclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adbrite[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adform[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adlegend[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@admarketplace[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.addynamix[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.advance[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bighealthtree[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.blogtalkradio[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.bridgetrack[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.lycos[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.nj[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pointroll[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.pubmatic[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.undertone[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adserver.adtechus[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adultfriendfinder[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertising[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@adx.bidsystem[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@adxpose[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@andomedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ar.atwola[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@at.atwola[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@atdmt[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@beacon.dmsinsights[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@bizrate[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@bizzclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@bridge1.admarketplace[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@burstbeacon[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@c.gigcount[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@casalemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn.jemamedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cdn1.trafficmp[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@cisco.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@citi.bridgetrack[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@click.blue-square-media[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@click.efacts[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@click.fastpartner[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@collective-media[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@crackle[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@d.mediadakine[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@dc.tremormedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@dealtime[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@discountbodyparts[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ehg-players.hitbox[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@enhance[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@eyewonder[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@fastclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@findology[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@friendfinder[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@germanfriendfinder[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@gotacha.rotator.hadj7.adjuggler[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@hitbox[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@homestore.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@imrworldwide[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@indianfriendfinder[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@insightexpressai[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@jcwhitney.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@kontera[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@legolas-media[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@linksynergy[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@liveperson[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@lucidmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@marriottinternational.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@media.adfrontiers[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@media6degrees[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediabrandsww[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaplex[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@milesmedia.122.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@milesmediagroup.tt.omtrdc[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@mm.chitika[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@mtvn.112.2o7[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@newbrunswickfinds[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@overture[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@p419t1s4631512.kronos.bravenetmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@pro-market[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@questionmarket[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@r1-ads.ace.advertising[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@realmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@roiservice[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ru4[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@sales.liveperson[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.boltfind[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickbowl[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickcheer[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksare[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksthe[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clicksthis[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.clickwhale[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.findsmy[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.findxml[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.orfind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.seekfinds[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@search.toseeking[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@server.cpmstar[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@serving-sys[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@specificclick[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@specificmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@stat.dealtime[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@statcounter[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@stats.justhost[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@stats.supergreenhosting[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@statse.webtrendslive[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@t.pointroll[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tacoda.at.atwola[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@top5countdown.mevio[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@track.adform[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@track.clickpayz[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tracking.hostgator[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tradedoubler[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficengine[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@trafficmp[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@tribalfusion[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@uiadserver[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@user.lucidmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@viacom.adbureau[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@vyvanseteens[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@w3track[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.burstnet[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.clickmanage[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.find-quick-results[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.findeven[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.finditch[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.findstuff[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.googleadservices[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.googleadservices[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.serafind[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@www.tomtracker[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@xml.trafficengine[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@zedo[2].txt

PUP.Whitesmoke
HKLM\SOFTWARE\whitesmoketoolbar
HKLM\SOFTWARE\whitesmoketoolbar#Installer Language
HKU\.DEFAULT\Software\WhiteSmokeTranslator
HKU\S-1-5-18\Software\WhiteSmokeTranslator

Trojan.Agent/Gen-Cryptor[Egun]
C:\OLD REMOVABLE\DEFECTS.EXE
C:\SHARED\DEFECTS.EXE

Trojan.Agent/Gen-Frauder
C:\WINDOWS\INSTALLER\MSI334.TMP

#8 DocAlan02

DocAlan02
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:12:34 AM

Posted 27 May 2011 - 04:41 PM

One more piece of info. Since last night, I having a problem where one of the svchost instances keeps growing and growin until it crashes. It even happens after a full reboot.

#9 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:05:34 AM

Posted 27 May 2011 - 11:53 PM

Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include the link to this topic in your new topic and a description of your computer issues and what you have done to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Once you have created the new topic, please reply back here with a link to the new topic.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users