Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

safe mode


  • This topic is locked This topic is locked
51 replies to this topic

#1 car 54

car 54

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 11 September 2011 - 07:37 PM

hello, i have a HP pavilion 05 5.1- 2600 build with windows xp professional service pack 3. system type x86
yesterday i restored it back to a july 17th restore point because it was getting slow and didn`t want to respond and was freezeing up, it seemed to work a lot better after the restore,then all at once i couldn`t get enternet explorer,then i tried the media player.i can`t get any program to load,now security anti-virus is gone.i tried to reformat but when i put the disk in it won`t load either,says there`s nothing on the disk.

the strangest part about this is this computer system has c&d partitions on it, all this happened on d partition and i`am typing this and sending it on c partition.can any one help me get the d partition back ? BTW i tried OS disk in the c drive and it wouldn`t load there either.thanks for any help and advice.

now the d partition is stuck in safe mode and i cannot do anything.i have tried to change the bios but it doesn`t help matters

i was supposed to post a link to drivers missing (i think) .in the am i infected forum but i don`t know how.

Edited by Orange Blossom, 11 September 2011 - 09:58 PM.


BC AdBot (Login to Remove)

 


#2 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 11 September 2011 - 07:44 PM

you for replying
i have m bamb installed already, i have been stumbling around in the dark tryiny to get this computer to take the setup disk in c or d but it won`t load in either one.now d is hung in safe mode and i can`t do anything. it`s saying i can`t start the programs in safe mode.can you help please?

Link to previous topic: http://www.bleepingcomputer.com/forums/topic417983.html

in computer management it says internet explorer cannot down load. internet explorer was not able to open this internet site. the requested site is either unavailable or cannot be found please try again later.
in services and aplications,performance logs and alerts it says this service cannot be started in safe mode.
thank you for helping me, and please bear with me.i don`t know anything about computers and i have to type with one fingure after i figure out what to say.thanks again.

Pasting in additional information from another post. ~ OB

i`am sorry i didn`t follow the guide. i don`t know how
i `am sorry i can`t begin at step #6 and download anything,and i can`t make any logs or do any scans because this computer is hung in safe mode and some of the services are disabled and i can`t start them in safe mode ,even if i knew how

Edited by Orange Blossom, 12 September 2011 - 04:42 AM.


#3 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 16 September 2011 - 06:07 PM

i have gotten it out of safe mode but i still can`t do anything with it,my internet options is missing in control panel and a lot of things are disabled and stopped and i can`t get them to restart. can anyone help me ?

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 18 September 2011 - 07:02 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#5 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 18 September 2011 - 11:01 PM

hello
i`am ready and waiting

#6 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 19 September 2011 - 04:33 AM

hello again
i thought you might like to know what i have done before i saw your responce to my cry for help
in system configuration when i click on internet option it says the system cannot find the file specified
in services,when i click start for browser it says could not start the computer browser service on local computer. error 1068. the dependency service or group failed to start.
BTW i started everything one at a time,they wouldn`t start automaticaly and on some of them i got error 1053,error2250,error31,error2.and some where on here i got code39
i ran a check disk but it didn`t correct anything
i ran a m bam scan on c and it said one file was infected and said it was a trojan, ran one on d and it said 2 files were infected but it wouldn`t down load what they were
please bare in mind that i am communicating with you on the c part of the infected computer, d is the infected part.
i have another computer if you need it
there is nothing on this computer that i need to save.
if you tell me exactly what you want and exactly how to get it i will do it to the best of my ability
i would like to thank you for helping me.



#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 19 September 2011 - 04:45 PM

I think we'll start with the MBAM logs. Can you find the MBAM log(s) which shows the infections that it found and paste them in the next reply?
Posted Image
m0le is a proud member of UNITE

#8 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 19 September 2011 - 09:21 PM

alwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7674

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702

9/9/2011 5:35:43 PM
mbam-log-2011-09-09 (17-35-43).txt

Scan type: Quick scan
Objects scanned: 53056
Time elapsed: 2 hour(s), 7 minute(s), 59 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
d:\documents and settings\paul\my documents\22.exe (Adware.FunWeb) -> Quarantined and deleted successfully.
d:\documents and settings\paul\my documents\8955557m3[o[oopiu-yot06ytooolp[[i6p[ilgoholn.exe (Adware.FunWeb) -> Quarantined and deleted successfully.

i tried to copy and paste the d MBAM, but when i came back to c to post it i lost it. and i can`t open them in either c or d .



#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 20 September 2011 - 05:27 PM

Please run SAS now

Download Superantispyware
  • Load Superantispyware and click the check for updates button.
  • Once the update is finished click the scan your computer button.
  • Check Perform Complete Scan and then next.
  • Superantispyware will now scan your computer and when its finished it will list all the infections it has found.
  • Make sure that they all have a check next to them and press next.
  • Click finish and you will be taken back to the main interface.
  • Click Preferences and then click the statistics/logs tab. Click the dated log and press view log and a text file will appear.
  • Copy and paste the log onto the forum.

Posted Image
m0le is a proud member of UNITE

#10 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 20 September 2011 - 08:11 PM

can i go ahead and remove those trojans?

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/20/2011 at 07:47 PM

Application Version : 5.0.1118

Core Rules Database Version : 7714
Trace Rules Database Version: 5526

Scan type : Complete Scan
Total Scan Time : 01:31:36

Operating System Information
Windows XP Professional 32-bit, Service Pack 2 (Build 5.01.2600)
Administrator

Memory items scanned : 488
Memory threats detected : 0
Registry items scanned : 33817
Registry threats detected : 0
File items scanned : 44441
File threats detected : 199

Adware.Tracking Cookie
ad.insightexpressai.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\JU36D5JF ]
C:\Documents and Settings\Administrator\Cookies\administrator@a1.interclick[2].txt
ds.serving-sys.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\JU36D5JF ]
C:\Documents and Settings\Administrator\Cookies\administrator@accounts.google[2].txt
objects.tremormedia.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\JU36D5JF ]
C:\Documents and Settings\Administrator\Cookies\administrator@ad.wsod[2].txt
secure-us.imrworldwide.com [ C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\JU36D5JF ]
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adinterax[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.bridgetrack[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.pointroll[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.pubmatic[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.undertone[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.adtechus[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.leanmarket[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adtech[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adxpose[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@anrtx.tacoda[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ar.atwola[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@at.atwola[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@charter.122.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@chitika[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@coedmediagroup[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@collective-media[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@content.yieldmanager[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@content.yieldmanager[3].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dc.tremormedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dmtracker[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@electronicarts.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@gr.burstnet[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@gsimedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@imrworldwide[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@insightexpressai[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@interclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@intermundomedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@invitemedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@kontera[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@legolas-media[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@lucidmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@media6degrees[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@media6degrees[3].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mediabrandsww[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@microsoftsto.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@microsoftwlcashback.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mm.chitika[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnbc.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@nextag[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ox-d.coedmediagroup[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@parade.122.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@paypal.112.2o7[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@pointroll[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@pro-market[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@r1-ads.ace.advertising[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ru4[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@sftrack.searchforce[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@sportingnews.122.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@stats.paypal[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@statse.webtrendslive[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda.at.atwola[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@toplist[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tracking.speedmaxpc[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstnet[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.clickmanage[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[3].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[4].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[5].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[6].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[7].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[8].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.windowsmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@yadro[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@yieldmanager[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt
.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\WC6LC80X.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\WC6LC80X.DEFAULT\COOKIES.SQLITE ]
ads2.msads.net [ D:\DOCUMENTS AND SETTINGS\HAVYN\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\Y4UYLU2C ]
media.mtvnservices.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2W3MF5AY ]
secure-us.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\2W3MF5AY ]
media.bimvid.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
media.mtvnservices.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
msnbcmedia.msn.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
secure-us.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
speed.pointroll.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
static.discoverymedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\EE4EH55A ]
.247realmedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.247realmedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.adserver.adtechus.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.adtech.de [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.sheknows.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.advertising.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.adxpose.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.ar.atwola.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.atwola.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.atwola.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.basco.122.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.bs.serving-sys.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.c.gigcount.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.www.googleadservices.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.citi.bridgetrack.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.clickbooth.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.counter.hitslink.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.counters.gigya.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.dmtracker.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wfl4gkc5wgp.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjk4wkd5ogo.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjkoagajihq.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjliqmazsgo.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjlosndjgbo.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjlywpc5gaq.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wjmionajwao.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.e-2dj6wmlikkcpmgo.stats.esomniture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.ehg-mh.hitbox.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.electronicarts.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.enhance.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.eyewonder.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.farecastcom.122.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.fim.122.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.imrworldwide.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.in.getclicky.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.invitemedia.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.kitaramedia.122.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.linksynergy.walmart.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.linksynergy.walmart.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.linksynergy.walmart.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.msnbc.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.msnportal.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.mtvn.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.overture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.overture.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.paypal.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.s.clickability.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.s.clickability.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.server.cpmstar.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.servicemagic.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.specificclick.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.sportingnews.122.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.valspar.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.viacom.adbureau.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.viacom.adbureau.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.viacom.adbureau.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.walmart.112.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.www.burstnet.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.www.googleadservices.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.liveperson.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
sales.liveperson.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
ad.yieldmanager.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.atdmt.com [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
.2o7.net [ D:\DOCUMENTS AND SETTINGS\PAUL\APPLICATION DATA\MOZILLA\FIREFOX\PROFILES\A5F5ICJK.DEFAULT\COOKIES.SQLITE ]
D:\DOCUMENTS AND SETTINGS\PAUL\COOKIES\PAUL@ADVERTISING[2].TXT
D:\DOCUMENTS AND SETTINGS\PAUL\COOKIES\PAUL@ATWOLA[2].TXT
D:\DOCUMENTS AND SETTINGS\PAUL\COOKIES\PAUL@INVITEMEDIA[2].TXT
D:\DOCUMENTS AND SETTINGS\PAUL\COOKIES\PAUL@LIVEPERSON[2].TXT
D:\DOCUMENTS AND SETTINGS\PAUL\COOKIES\PAUL@SALES.LIVEPERSON[2].TXT

Trojan.Agent/Gen-Nullo[Short]
D:\SYSTEM VOLUME INFORMATION\_RESTORE{E56102B3-2EEA-445A-B500-F90035E9D18C}\RP48\A0002813.EXE
D:\SYSTEM VOLUME INFORMATION\_RESTORE{E56102B3-2EEA-445A-B500-F90035E9D18C}\RP48\A0002814.EXE




#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 21 September 2011 - 05:39 PM

Yes, remove them.

Now scan with ESET

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Copy and paste the resulting log in your next reply
If no log is generated that means nothing was found. Please let me know if this happens.
Posted Image
m0le is a proud member of UNITE

#12 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 21 September 2011 - 08:32 PM

no files infected

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 22 September 2011 - 05:12 PM

:thumbup2: How is the machine running?
Posted Image
m0le is a proud member of UNITE

#14 car 54

car 54
  • Topic Starter

  • Members
  • 335 posts
  • OFFLINE
  •  
  • Local time:06:06 PM

Posted 22 September 2011 - 06:24 PM

D PART IS THE SAME, CAN`T DO ANYTHING, CAN`T OPEN ANYTHING.

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:10:06 PM

Posted 22 September 2011 - 07:06 PM

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users