Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected


  • Please log in to reply
27 replies to this topic

#1 blackbeardkw

blackbeardkw

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 19 February 2012 - 04:16 PM

Hello, I'm sure my computer is infected, although I don't have many details, unfortunately. I am using MS XP, version 2002. I picked up a virus, and the computer started running slow, and getting "offers" to fix the problems. I downloaded a trial version of AVG, and I think it may have fixed some of the problems, but not all Anyway, that has expired. What do I do next to find out what the computer is infected with, and how to fix it?

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,917 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:16 AM

Posted 19 February 2012 - 04:32 PM

Hello and welcome. Lets looks at some logs and see what we get off.

Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.



Run RKill....


Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.



Next run Superantisypware (SAS):

Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.


Now reboot to Normal and run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 04:56 PM

boopme: Hello, and thanks for the response. I have followed your first step, dowloading and running the minitoolbox, and here are the results. I hope I'm doing this right. You'll have to be somewhat patient with me, as I'm not very computer literate.




MiniToolBox by Farbar Version: 18-01-2012
Ran by Wendi (administrator) on 22-02-2012 at 16:49:05
Microsoft Windows XP Home Edition Service Pack 3 (X86)
Boot Mode: Normal
***************************************************************************

========================= Flush DNS: ===================================


Windows IP Configuration



Successfully flushed the DNS Resolver Cache.


========================= IE Proxy Settings: ==============================

Proxy is enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.
========================= Hosts content: =================================


127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1001namen.com
127.0.0.1 1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com

There are 12881 more lines starting with "127.0.0.1"

========================= IP Configuration: ================================

VIA Rhine II Fast Ethernet Adapter = Local Area Connection (Connected)


# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration




Windows IP Configuration



Host Name . . . . . . . . . . . . : wendi-3de77f920

Primary Dns Suffix . . . . . . . :

Node Type . . . . . . . . . . . . : Unknown

IP Routing Enabled. . . . . . . . : No

WINS Proxy Enabled. . . . . . . . : No



Ethernet adapter Local Area Connection:



Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : VIA Rhine II Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-E0-4D-6A-3D-21

Dhcp Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

IP Address. . . . . . . . . . . . : 192.168.1.6

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

DHCP Server . . . . . . . . . . . : 192.168.1.1

DNS Servers . . . . . . . . . . . : 192.168.1.1

Lease Obtained. . . . . . . . . . : Wednesday, February 22, 2012 4:28:20 PM

Lease Expires . . . . . . . . . . : Thursday, February 23, 2012 4:28:20 PM

Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.47.139, 74.125.47.101, 74.125.47.113, 74.125.47.138
74.125.47.102, 74.125.47.100



Pinging google.com [74.125.65.113] with 32 bytes of data:



Reply from 74.125.65.113: bytes=32 time=45ms TTL=51

Reply from 74.125.65.113: bytes=32 time=41ms TTL=51



Ping statistics for 74.125.65.113:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 41ms, Maximum = 45ms, Average = 43ms

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 98.139.183.24, 209.191.122.70, 98.139.127.62



Pinging yahoo.com [98.139.127.62] with 32 bytes of data:



Reply from 98.139.127.62: bytes=32 time=143ms TTL=48

Reply from 98.139.127.62: bytes=32 time=144ms TTL=48



Ping statistics for 98.139.127.62:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 143ms, Maximum = 144ms, Average = 143ms

Server: UnKnown
Address: 192.168.1.1

Name: bleepingcomputer.com
Address: 208.43.87.2



Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:



Reply from 208.43.87.2: Destination host unreachable.

Reply from 208.43.87.2: Destination host unreachable.



Ping statistics for 208.43.87.2:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms



Pinging 127.0.0.1 with 32 bytes of data:



Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128



Ping statistics for 127.0.0.1:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 e0 4d 6a 3d 21 ...... VIA Compatable Fast Ethernet Adapter - Packet Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.6 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 192.168.1.6 192.168.1.6 20
192.168.1.0 255.255.255.0 192.168.1.6 192.168.1.6 20
192.168.1.6 255.255.255.255 127.0.0.1 127.0.0.1 20
192.168.1.255 255.255.255.255 192.168.1.6 192.168.1.6 20
224.0.0.0 240.0.0.0 192.168.1.6 192.168.1.6 20
255.255.255.255 255.255.255.255 192.168.1.6 192.168.1.6 1
Default Gateway: 192.168.1.1
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 02 C:\Windows\System32\winrnr.dll [16896] (Microsoft Corporation)
Catalog5 03 C:\Windows\System32\mswsock.dll [245248] (Microsoft Corporation)
Catalog5 04 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\rsvpsp.dll [92672] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [245248] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (02/18/2012 04:40:07 PM) (Source: Application Error) (User: )
Description: Faulting application svchost.exe, version 0.0.0.0, faulting module unknown, version 0.0.0.0, fault address 0x00000000.
Error in creating result PEAP-TLV in response to received PEAP-TLV (svchost.exe!ld!)

Error: (02/18/2012 04:27:27 PM) (Source: Application Error) (User: )
Description: Faulting application , version 0.0.0.0, faulting module unknown, version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [!ws!]

Error: (02/17/2012 07:56:47 PM) (Source: Application Hang) (User: )
Description: Fault bucket 1180947459.

Error: (02/17/2012 07:56:42 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (02/05/2012 09:11:21 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (02/05/2012 09:11:21 PM) (Source: Application Hang) (User: )
Description: Fault bucket 1180947459.

Error: (02/05/2012 09:11:05 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (02/05/2012 09:10:57 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (02/05/2012 09:10:31 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.

Error: (02/05/2012 09:10:28 PM) (Source: Application Hang) (User: )
Description: Hanging application iexplore.exe, version 8.0.6001.18702, hang module hungapp, version 0.0.0.0, hang address 0x00000000.


System errors:
=============
Error: (02/22/2012 04:28:32 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/20/2012 04:33:03 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/19/2012 03:45:51 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/19/2012 06:44:41 AM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 07:05:13 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 04:53:08 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 04:40:00 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 04:27:11 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 04:21:55 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2

Error: (02/18/2012 04:09:19 PM) (Source: Service Control Manager) (User: )
Description: The Nero BackItUp Scheduler 4.0 service failed to start due to the following error:
%%2


Microsoft Office Sessions:
=========================
Error: (02/18/2012 04:40:07 PM) (Source: Application Error)(User: )
Description: svchost.exe0.0.0.0unknown0.0.0.000000000

Error: (02/18/2012 04:27:27 PM) (Source: Application Error)(User: )
Description: 0.0.0.0unknown0.0.0.000000000

Error: (02/17/2012 07:56:47 PM) (Source: Application Hang)(User: )
Description: 1180947459

Error: (02/17/2012 07:56:42 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (02/05/2012 09:11:21 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (02/05/2012 09:11:21 PM) (Source: Application Hang)(User: )
Description: 1180947459

Error: (02/05/2012 09:11:05 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (02/05/2012 09:10:57 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (02/05/2012 09:10:31 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000

Error: (02/05/2012 09:10:28 PM) (Source: Application Hang)(User: )
Description: iexplore.exe8.0.6001.18702hungapp0.0.0.000000000


=========================== Installed Programs ============================

32 Bit HP CIO Components Installer (Version: 7.1.8)
Acrobat.com (Version: 0.0.0)
Acrobat.com (Version: 1.1.377)
ActiveX Download Control Trial Version
Adobe AIR (Version: 1.5.3.9130)
Adobe Flash Player 11 ActiveX (Version: 11.1.102.55)
Adobe Reader X (10.1.2) (Version: 10.1.2)
Apple Application Support (Version: 2.1.5)
Apple Mobile Device Support (Version: 4.0.0.97)
Apple Software Update (Version: 2.1.3.127)
ArcSoft PhotoImpression 6
AXIS Camera Control 2.40
AXIS Media Control Embedded
Bonjour (Version: 3.0.0.10)
BufferChm (Version: 140.0.212.000)
CCleaner (Version: 2.27)
Choice Guard (Version: 1.2.87.0)
Compatibility Pack for the 2007 Office system (Version: 12.0.6514.5001)
Copy (Version: 140.0.212.000)
Coupon Alert
Coupon Printer for Windows (Version: 5.0.0.0)
Defraggler
Destinations (Version: 140.0.77.000)
DeviceDiscovery (Version: 140.0.212.000)
DJ_AIO_05_F4400_Software_Min (Version: 140.0.690.000)
F4400 (Version: 140.0.696.000)
Google Chrome (Version: 17.0.963.56)
Google Earth (Version: 6.1.0.5001)
Google Toolbar for Internet Explorer (Version: 1.0.0)
Google Toolbar for Internet Explorer (Version: 7.2.2427.2330)
Google Update Helper (Version: 1.3.21.99)
GPBaseService2 (Version: 140.0.211.000)
HP Customer Participation Program 14.0 (Version: 14.0)
HP Deskjet F4400 Printer Driver Software 14.0 Rel. 5 (Version: 14.0)
HP Imaging Device Functions 14.0 (Version: 14.0)
HP Photo Creations (Version: 1.0.0.2024)
HP Smart Web Printing 4.60 (Version: 4.60)
HP Solution Center 14.0 (Version: 14.0)
HP Update (Version: 5.002.002.002)
HPProductAssistant (Version: 140.0.212.000)
HPSSupply (Version: 140.0.211.000)
ImagXpress (Version: 7.0.74.0)
iPhone Configuration Utility (Version: 2.1.0.163)
iTunes (Version: 10.5.1.42)
Java Auto Updater (Version: 2.0.5.1)
Java™ 6 Update 26 (Version: 6.0.260)
K-Lite Codec Pack 4.5.3 (Full) (Version: 4.5.3)
Malwarebytes' Anti-Malware
MarketResearch (Version: 140.0.212.000)
Memeo AutoBackup (Version: 2.50.2985)
Memeo AutoSync (Version: 2.50.2922)
Microsoft .NET Framework 1.1 (Version: 1.1.4322)
Microsoft .NET Framework 1.1 Security Update (KB2572067)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 2.0 Service Pack 2 (Version: 2.2.30729)
Microsoft .NET Framework 3.0 Service Pack 2 (Version: 3.2.30729)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Base Smart Card Cryptographic Service Provider Package
Microsoft Compression Client Pack 1.0 for Windows XP (Version: 1)
Microsoft Corporation (Version: 9.0.0.0)
Microsoft LifeCam (Version: 2.4.544.0)
Microsoft Office File Validation Add-In (Version: 14.0.5130.5003)
Microsoft Office Standard Edition 2003 (Version: 11.0.8173.0)
Microsoft User-Mode Driver Framework Feature Pack 1.0
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570 (Version: 9.0.30729.5570)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Works 6-9 Converter (Version: 9.7.0621)
MobileMe Control Panel (Version: 3.1.6.0)
MSVCRT (Version: 14.0.1468.721)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
Nero 9 Essentials
neroxml (Version: 1.0.0)
OpenOffice.org 3.2 (Version: 3.2.9479)
OVT Scanner X86 (Version: 1.00.0000)
Platform (Version: 1.24)
QuickTime (Version: 7.69.80.9)
Realtek High Definition Audio Driver (Version: 5.10.0.5497)
Rosetta Stone Ltd Services (Version: 3.2.13)
Rosetta Stone TOTALe (Version: 4.0.12)
Rosetta Stone TOTALe (Version: 4.0.17.0)
Safari (Version: 5.33.18.5)
SanctionedMedia
Scan (Version: 140.0.80.000)
Segoe UI (Version: 14.0.4327.805)
Shop for HP Supplies (Version: 14.0)
SmartWebPrinting (Version: 140.0.186.000)
SolutionCenter (Version: 140.0.213.000)
Status (Version: 140.0.212.000)
Toolbox (Version: 140.0.428.000)
TrayApp (Version: 140.0.212.000)
Uninstall OVT Scanner
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
Update for Windows Internet Explorer 8 (KB971180) (Version: 1)
Update for Windows Internet Explorer 8 (KB973874) (Version: 1)
Update for Windows Internet Explorer 8 (KB976662) (Version: 1)
Update for Windows Internet Explorer 8 (KB976749) (Version: 1)
Update for Windows Internet Explorer 8 (KB978506) (Version: 1)
Update for Windows Internet Explorer 8 (KB980182) (Version: 1)
Update for Windows XP (KB2141007) (Version: 1)
Update for Windows XP (KB2345886) (Version: 1)
Update for Windows XP (KB2467659) (Version: 1)
Update for Windows XP (KB2541763) (Version: 1)
Update for Windows XP (KB2607712) (Version: 1)
Update for Windows XP (KB2616676) (Version: 1)
Update for Windows XP (KB2641690) (Version: 1)
Update for Windows XP (KB971029) (Version: 1)
VIA Platform Device Manager (Version: 1.24)
VIA Rhine-Family Fast-Ethernet Adapter
VIA/S3G Display Driver 6.14.10.0359
WD Diagnostics (Version: 1.09.0002)
WebFldrs XP (Version: 9.50.7523)
WebReg (Version: 140.0.212.017)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Genuine Advantage Validation Tool (KB892130) (Version: 1.7.0069.2)
Windows Internet Explorer 8 (Version: 20090308.140743)
Windows Live Call (Version: 14.0.8064.0206)
Windows Live Communications Platform (Version: 14.0.8064.206)
Windows Live Essentials (Version: 14.0.8064.0206)
Windows Live Essentials (Version: 14.0.8064.206)
Windows Live Messenger (Version: 14.0.8064.0206)
Windows Live Sign-in Assistant (Version: 5.000.818.5)
Windows Live Upload Tool (Version: 14.0.8014.1029)
Windows Media Format 11 runtime
Windows Media Player 11
Yahoo! Install Manager
Yahoo! Search Protection
Yahoo! Software Update
Yahoo! Toolbar

========================= Memory info: ===================================

Percentage of memory in use: 54%
Total physical RAM: 958.42 MB
Available physical RAM: 431.81 MB
Total Pagefile: 2313.67 MB
Available Pagefile: 1844.73 MB
Total Virtual: 2047.88 MB
Available Virtual: 1970.48 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:298.08 GB) (Free:251.02 GB) NTFS

========================= Users: ========================================

User accounts for \\WENDI-3DE77F920

Administrator ASPNET Guest
HelpAssistant Larry SUPPORT_388945a0
Wendi


**** End of log ****

#4 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 05:03 PM

Step 2: Rkill

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 02/22/2012 at 17:01:29.
Operating System: Microsoft Windows XP


Processes terminated by Rkill or while it was running:

C:\WINDOWS\system32\notepad.exe


--- ATTENTION ---

Windows was configured to use a proxy! Proxy settings have been removed.

The Proxy Server that was configured is:

If this was a valid setting, please double-click on the rk-proxy.reg file on your desktop and allow the data to be merged to restore your proxy settings.


Rkill completed on 02/22/2012 at 17:01:32.

#5 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 05:24 PM

scanned computer, using SAS, but just to let you know, I did not see these options:

•Back on the main screen, under "Scan for Harmful Software" click Scan your computer.

•On the left, make sure you check C:\Fixed Drive.

•On the right, under "Complete Scan", choose Perform Complete Scan.

I only saw the "scan your computer button", so I did that. Here are the results:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/22/2012 at 05:20 PM

Application Version : 5.0.1144

Core Rules Database Version : 8266
Trace Rules Database Version: 6078

Scan type : Quick Scan
Total Scan Time : 00:06:01

Operating System Information
Windows XP Home Edition 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned : 623
Memory threats detected : 0
Registry items scanned : 28623
Registry threats detected : 5
File items scanned : 7985
File threats detected : 194

Browser Hijacker.Deskbar
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib#Version

Adware.SelectRebates
C:\Program Files\SELECTREBATES\SelectRebatesDownload.exe
C:\Program Files\SELECTREBATES

Adware.Tracking Cookie
C:\Documents and Settings\Wendi\Cookies\wendi@abbys-sexual-health[1].txt [ /abbys-sexual-health ]
C:\Documents and Settings\Wendi\Cookies\wendi@accountonline[1].txt [ /accountonline ]
C:\Documents and Settings\Wendi\Cookies\wendi@ad.360yield[1].txt [ /ad.360yield ]
C:\Documents and Settings\Wendi\Cookies\wendi@ads.adultadvertising[2].txt [ /ads.adultadvertising ]
C:\Documents and Settings\Wendi\Cookies\wendi@ads.associatedcontent[2].txt [ /ads.associatedcontent ]
C:\Documents and Settings\Wendi\Cookies\wendi@ads.cnn[1].txt [ /ads.cnn ]
C:\Documents and Settings\Wendi\Cookies\wendi@ads.livenation[2].txt [ /ads.livenation ]
C:\Documents and Settings\Wendi\Cookies\wendi@adxpose[1].txt [ /adxpose ]
C:\Documents and Settings\Wendi\Cookies\wendi@am.sexinfo101[1].txt [ /am.sexinfo101 ]
C:\Documents and Settings\Wendi\Cookies\wendi@amex-insights[2].txt [ /amex-insights ]
C:\Documents and Settings\Wendi\Cookies\wendi@banner.adchemy[1].txt [ /banner.adchemy ]
C:\Documents and Settings\Wendi\Cookies\wendi@banners.facebookofsex[2].txt [ /banners.facebookofsex ]
C:\Documents and Settings\Wendi\Cookies\wendi@beacon.dmsinsights[2].txt [ /beacon.dmsinsights ]
C:\Documents and Settings\Wendi\Cookies\wendi@clicksensor[1].txt [ /clicksensor ]
C:\Documents and Settings\Wendi\Cookies\wendi@discountonsony[1].txt [ /discountonsony ]
C:\Documents and Settings\Wendi\Cookies\wendi@e-2dj6wjkosidpaaq.stats.esomniture[1].txt [ /e-2dj6wjkosidpaaq.stats.esomniture ]
C:\Documents and Settings\Wendi\Cookies\wendi@e-2dj6wjnyogd5kgo.stats.esomniture[2].txt [ /e-2dj6wjnyogd5kgo.stats.esomniture ]
C:\Documents and Settings\Wendi\Cookies\wendi@eas.apm.emediate[2].txt [ /eas.apm.emediate ]
C:\Documents and Settings\Wendi\Cookies\wendi@edgeadx[1].txt [ /edgeadx ]
C:\Documents and Settings\Wendi\Cookies\wendi@famepornstars[1].txt [ /famepornstars ]
C:\Documents and Settings\Wendi\Cookies\wendi@findingtheg-spot[1].txt [ /findingtheg-spot ]
C:\Documents and Settings\Wendi\Cookies\wendi@gracevid.bannerview[2].txt [ /gracevid.bannerview ]
C:\Documents and Settings\Wendi\Cookies\wendi@ian.smileymedia[2].txt [ /ian.smileymedia ]
C:\Documents and Settings\Wendi\Cookies\wendi@infosex[2].txt [ /infosex ]
C:\Documents and Settings\Wendi\Cookies\wendi@live.realtimewebstats[1].txt [ /live.realtimewebstats ]
C:\Documents and Settings\Wendi\Cookies\wendi@media.adfrontiers[2].txt [ /media.adfrontiers ]
C:\Documents and Settings\Wendi\Cookies\wendi@media.mtvnservices[1].txt [ /media.mtvnservices ]
C:\Documents and Settings\Wendi\Cookies\wendi@mediabrandsww[1].txt [ /mediabrandsww ]
C:\Documents and Settings\Wendi\Cookies\wendi@monroecounty-fl[1].txt [ /monroecounty-fl ]
C:\Documents and Settings\Wendi\Cookies\wendi@monroecounty[2].txt [ /monroecounty ]
C:\Documents and Settings\Wendi\Cookies\wendi@myaccount.allstate[1].txt [ /myaccount.allstate ]
C:\Documents and Settings\Wendi\Cookies\wendi@peoplefinders[2].txt [ /peoplefinders ]
C:\Documents and Settings\Wendi\Cookies\wendi@petflow.advertserve[1].txt [ /petflow.advertserve ]
C:\Documents and Settings\Wendi\Cookies\wendi@podtrac.advertserve[1].txt [ /podtrac.advertserve ]
C:\Documents and Settings\Wendi\Cookies\wendi@pornconductor[1].txt [ /pornconductor ]
C:\Documents and Settings\Wendi\Cookies\wendi@qnsr[1].txt [ /qnsr ]
C:\Documents and Settings\Wendi\Cookies\wendi@scarleteen[1].txt [ /scarleteen ]
C:\Documents and Settings\Wendi\Cookies\wendi@server.cpmstar[1].txt [ /server.cpmstar ]
C:\Documents and Settings\Wendi\Cookies\wendi@server2.bkvtrack[2].txt [ /server2.bkvtrack ]
C:\Documents and Settings\Wendi\Cookies\wendi@sexinfo101[1].txt [ /sexinfo101 ]
C:\Documents and Settings\Wendi\Cookies\wendi@sexuality.about[2].txt [ /sexuality.about ]
C:\Documents and Settings\Wendi\Cookies\wendi@socialmedia[2].txt [ /socialmedia ]
C:\Documents and Settings\Wendi\Cookies\wendi@specificmedia[1].txt [ /specificmedia ]
C:\Documents and Settings\Wendi\Cookies\wendi@static.freewebs.getclicky[1].txt [ /static.freewebs.getclicky ]
C:\Documents and Settings\Wendi\Cookies\wendi@stats.paypal[1].txt [ /stats.paypal ]
C:\Documents and Settings\Wendi\Cookies\wendi@teens4oceans.wikispaces[1].txt [ /teens4oceans.wikispaces ]
C:\Documents and Settings\Wendi\Cookies\wendi@track.rewards-confirmation[1].txt [ /track.rewards-confirmation ]
C:\Documents and Settings\Wendi\Cookies\wendi@tracking.admarketplace[1].txt [ /tracking.admarketplace ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.accountonline[1].txt [ /www.accountonline ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.monroecounty[1].txt [ /www.monroecounty ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.peoplefinders[1].txt [ /www.peoplefinders ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.salesgravyadservice[2].txt [ /www.salesgravyadservice ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.sexinfo101[2].txt [ /www.sexinfo101 ]
C:\Documents and Settings\Wendi\Cookies\wendi@www.statsflash[1].txt [ /www.statsflash ]
C:\Documents and Settings\Wendi\Cookies\FU10JYVP.txt [ /lfstmedia.com ]
C:\Documents and Settings\Wendi\Cookies\YEGK4CHX.txt [ /trafficmp.com ]
C:\Documents and Settings\Wendi\Cookies\GKGOM6A1.txt [ /www.discountstarwarscostumes.com ]
C:\Documents and Settings\Wendi\Cookies\I196M6OO.txt [ /eyewonder.com ]
C:\Documents and Settings\Wendi\Cookies\54H859YF.txt [ /costumediscounters.com ]
C:\Documents and Settings\Wendi\Cookies\ODJLSJMZ.txt [ /intermundomedia.com ]
C:\Documents and Settings\Wendi\Cookies\BARF7J1D.txt [ /legolas-media.com ]
C:\Documents and Settings\Wendi\Cookies\32286OHB.txt [ /ad.yieldmanager.com ]
C:\Documents and Settings\Wendi\Cookies\HF1C60IK.txt [ /ad.wsod.com ]
C:\Documents and Settings\Wendi\Cookies\SINCFAPY.txt [ /www.costumediscounters.com ]
C:\Documents and Settings\Wendi\Cookies\JMXKCU02.txt [ /alphaporno.com ]
C:\Documents and Settings\Wendi\Cookies\1LF0RXGO.txt [ /richmedia.yahoo.com ]
C:\Documents and Settings\Wendi\Cookies\01KIKC25.txt [ /a1.interclick.com ]
C:\Documents and Settings\Wendi\Cookies\9X2AQ9NK.txt [ /collective-media.net ]
C:\Documents and Settings\Wendi\Cookies\PX926N4T.txt [ /ads.undertone.com ]
C:\Documents and Settings\Wendi\Cookies\PNWFYWEY.txt [ /media6degrees.com ]
C:\Documents and Settings\Wendi\Cookies\VSJ36OIF.txt [ /ads.bridgetrack.com ]
C:\Documents and Settings\Wendi\Cookies\JL56PI80.txt [ /lucidmedia.com ]
C:\Documents and Settings\Wendi\Cookies\YGRP5I10.txt [ /thefind.com ]
C:\Documents and Settings\Wendi\Cookies\6PQROQSI.txt [ /pointroll.com ]
C:\Documents and Settings\Wendi\Cookies\MFY6RWLT.txt [ /invitemedia.com ]
C:\Documents and Settings\Wendi\Cookies\L7ECAF2G.txt [ /insightexpressai.com ]
C:\Documents and Settings\Wendi\Cookies\YD6EVBGP.txt [ /contactlensesexpress.co.uk ]
C:\Documents and Settings\Wendi\Cookies\R4YEB0QN.txt [ /citi.bridgetrack.com ]
C:\Documents and Settings\Wendi\Cookies\AIBA7VJE.txt [ /interclick.com ]
C:\Documents and Settings\Wendi\Cookies\ZIPF2XK0.txt [ /adinterax.com ]
C:\Documents and Settings\Wendi\Cookies\ELHJEU7T.txt [ /specificclick.net ]
C:\Documents and Settings\Wendi\Cookies\Z9I777FK.txt [ /ads.pointroll.com ]
C:\Documents and Settings\Wendi\Cookies\OZ0JLYRQ.txt [ /www.freecamsexposed.com ]
C:\Documents and Settings\Wendi\Cookies\JHO82POS.txt [ /ad.wsod.com ]
C:\Documents and Settings\Wendi\Cookies\WEMB2CX1.txt [ /adv.drtuber.com ]
C:\Documents and Settings\Wendi\Cookies\IMUPTO63.txt [ /e-2dj6aelowidzsgo.stats.esomniture.com ]
C:\Documents and Settings\Wendi\Cookies\RTCZRBXV.txt [ /accounts.google.com ]
C:\Documents and Settings\Wendi\Cookies\QI7F56HE.txt [ /bizrate.com ]
C:\Documents and Settings\Wendi\Cookies\53GU7RUX.txt [ /a-serv2.conlanmediagroup.com ]
C:\Documents and Settings\Wendi\Cookies\HYGHGP47.txt [ /exoclick.com ]
C:\Documents and Settings\Wendi\Cookies\CEWFISZ4.txt [ /dev.hardsextube.com ]
C:\Documents and Settings\Wendi\Cookies\09SNOE8P.txt [ /pornhub.com ]
C:\Documents and Settings\Wendi\Cookies\UR9AU8ZU.txt [ /hearstmagazines.112.2o7.net ]
C:\Documents and Settings\Wendi\Cookies\3RZQE8N9.txt [ /ru4.com ]
C:\Documents and Settings\Wendi\Cookies\F72B2Y1M.txt [ /ero-advertising.com ]
C:\Documents and Settings\Wendi\Cookies\TXNDAI1L.txt [ /serving-sys.com ]
C:\Documents and Settings\Wendi\Cookies\SFLIID5W.txt [ /amazon-adsystem.com ]
C:\Documents and Settings\Wendi\Cookies\NL9IFHZT.txt [ /socialmediaexaminer.com ]
C:\Documents and Settings\Wendi\Cookies\MJ83WM41.txt [ /www.googleadservices.com ]
C:\Documents and Settings\Wendi\Cookies\KV3ULGRF.txt [ /teenormous.com ]
C:\Documents and Settings\Wendi\Cookies\HQZYKHV1.txt [ /mm.chitika.net ]
C:\Documents and Settings\Wendi\Cookies\VCG69TXL.txt [ /www.healthinsurancefinders.com ]
C:\Documents and Settings\Wendi\Cookies\YYGJF90N.txt [ /pro-market.net ]
C:\Documents and Settings\Wendi\Cookies\EUTFXSOD.txt [ /ads.bleepingcomputer.com ]
C:\Documents and Settings\Wendi\Cookies\79Y708N7.txt [ /cn.clickable.net ]
C:\Documents and Settings\Wendi\Cookies\FQET14SH.txt [ /yieldmanager.net ]
C:\Documents and Settings\Wendi\Cookies\SES0Y0MP.txt [ /dc.tremormedia.com ]
C:\Documents and Settings\Wendi\Cookies\KQN0P7ZX.txt [ /trafficholder.com ]
C:\Documents and Settings\Wendi\Cookies\FZYWVCNS.txt [ /tribalfusion.com ]
C:\Documents and Settings\Wendi\Cookies\UI50KSN8.txt [ /ads.crakmedia.com ]
C:\Documents and Settings\Wendi\Cookies\Z7H69FC1.txt [ /discountstarwarscostumes.com ]
C:\Documents and Settings\Wendi\Cookies\EAQCEMU8.txt [ /www.googleadservices.com ]
C:\Documents and Settings\Wendi\Cookies\U4205G5B.txt [ /kontera.com ]
C:\Documents and Settings\Wendi\Cookies\7133VNY0.txt [ /akamai.interclickproxy.com ]
C:\Documents and Settings\Wendi\Cookies\SF1OLIBW.txt [ /z.blogads.com ]
C:\Documents and Settings\Wendi\Cookies\LQN90K6Z.txt [ /www.hardsextube.com ]
C:\Documents and Settings\Wendi\Cookies\U9MPF5C7.txt [ /hardsextube.com ]
C:\Documents and Settings\Wendi\Cookies\KZ9XS8D1.txt [ /questionmarket.com ]
C:\Documents and Settings\Wendi\Cookies\421A5WYJ.txt [ /adxpansion.com ]
C:\Documents and Settings\Wendi\Cookies\VNF1QAGN.txt [ /adultfriendfinder.com ]
C:\Documents and Settings\Wendi\Cookies\KHT7Q77C.txt [ /ads.pubmatic.com ]
C:\Documents and Settings\Wendi\Cookies\3OH822VY.txt [ /adserver.hardsextube.com ]
C:\Documents and Settings\Wendi\Cookies\7TR5XGW3.txt [ /teeniemovies.com ]
C:\Documents and Settings\Wendi\Cookies\I16PYTRL.txt [ /steelhousemedia.com ]
C:\Documents and Settings\Wendi\Cookies\UCZD6J97.txt [ /www.pornorama.com ]
C:\Documents and Settings\Wendi\Cookies\ALMVX4CZ.txt [ /www.bizrate.com ]
C:\Documents and Settings\Wendi\Cookies\0Q1BBV89.txt [ /accounts.youtube.com ]
C:\Documents and Settings\Wendi\Cookies\AC3DYO2A.txt [ /www.pornhub.com ]
C:\Documents and Settings\Wendi\Cookies\SA4C5WQL.txt [ /in.getclicky.com ]
C:\Documents and Settings\Wendi\Cookies\RB6A48J6.txt [ /pornstarmethods.com ]
C:\Documents and Settings\Wendi\Cookies\93MIRNGF.txt [ /viewablemedia.net ]
C:\Documents and Settings\Wendi\Cookies\TW2GKQC2.txt [ /hardsextube.com ]
C:\Documents and Settings\Wendi\Cookies\N2XIWDDL.txt [ /mediaforge.com ]
C:\Documents and Settings\Wendi\Cookies\JXKAC6R2.txt [ /www.socialmediaexaminer.com ]
C:\Documents and Settings\Wendi\Cookies\QBQYQN78.txt [ /moviepilot.com ]
C:\Documents and Settings\Wendi\Cookies\XZXEQYLF.txt [ /andomedia.com ]
C:\Documents and Settings\Wendi\Cookies\KBLY369Q.txt [ /h2porn.com ]
C:\Documents and Settings\Wendi\Cookies\0GSRS81R.txt [ /mywebsearch.com ]
C:\Documents and Settings\Wendi\Cookies\XDF978ES.txt [ /geconsumerfinance.112.2o7.net ]
C:\Documents and Settings\Wendi\Cookies\FRD2CM5L.txt [ /www.googleadservices.com ]
C:\Documents and Settings\Wendi\Cookies\L1OG479C.txt [ /superstats.com ]
C:\Documents and Settings\Wendi\Cookies\3LCRMDML.txt [ /revsci.net ]
C:\Documents and Settings\Wendi\Cookies\GECUQP6G.txt [ /ads2.zeusclicks.com ]
C:\Documents and Settings\Wendi\Cookies\AOAL34JR.txt [ /pu.trafficshop.com ]
C:\Documents and Settings\Wendi\Cookies\1VUG24XU.txt [ /search.costumediscounters.com ]
C:\Documents and Settings\Wendi\Cookies\O0VJD5JS.txt [ /girlsteachsex.com ]
C:\Documents and Settings\Wendi\Cookies\EXLBVW6Q.txt [ /www.adserver.bz ]
C:\Documents and Settings\Wendi\Cookies\W6IK81V3.txt [ /ads.fling.com ]
C:\Documents and Settings\Wendi\Cookies\YKWL1EXO.txt [ /solvemedia.com ]
C:\Documents and Settings\Wendi\Cookies\A0NXJH85.txt [ /pornorama.com ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@atdmt[1].txt [ Cookie:administrator@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@apmebf[2].txt [ Cookie:administrator@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@media6degrees[1].txt [ Cookie:administrator@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@adserver.adtechus[1].txt [ Cookie:administrator@adserver.adtechus.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@adbrite[2].txt [ Cookie:administrator@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@specificclick[2].txt [ Cookie:administrator@specificclick.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@revsci[2].txt [ Cookie:administrator@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@www.911adnetwork[2].txt [ Cookie:administrator@www.911adnetwork.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@tribalfusion[2].txt [ Cookie:administrator@tribalfusion.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@tacoda.at.atwola[1].txt [ Cookie:administrator@tacoda.at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@microsoftwindows.112.2o7[2].txt [ Cookie:administrator@microsoftwindows.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@at.atwola[1].txt [ Cookie:administrator@at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@citi.bridgetrack[2].txt [ Cookie:administrator@citi.bridgetrack.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@dc.tremormedia[1].txt [ Cookie:administrator@dc.tremormedia.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@content.yieldmanager[1].txt [ Cookie:administrator@content.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@interclick[1].txt [ Cookie:administrator@interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@doubleclick[1].txt [ Cookie:administrator@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@pointroll[2].txt [ Cookie:administrator@pointroll.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@questionmarket[2].txt [ Cookie:administrator@questionmarket.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@serving-sys[1].txt [ Cookie:administrator@serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@microsoftsto.112.2o7[1].txt [ Cookie:administrator@microsoftsto.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@fastclick[1].txt [ Cookie:administrator@fastclick.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@a1.interclick[2].txt [ Cookie:administrator@a1.interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@advertising[1].txt [ Cookie:administrator@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@ford.112.2o7[1].txt [ Cookie:administrator@ford.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@mediaplex[2].txt [ Cookie:administrator@mediaplex.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@collective-media[2].txt [ Cookie:administrator@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@content.yieldmanager[3].txt [ Cookie:administrator@content.yieldmanager.com/ak/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@ad.yieldmanager[2].txt [ Cookie:administrator@ad.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@yieldmanager[1].txt [ Cookie:administrator@yieldmanager.net/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@insightexpressai[2].txt [ Cookie:administrator@insightexpressai.com/ ]
C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\Cookies\administrator@delivery.trafficjunky[1].txt [ Cookie:administrator@delivery.trafficjunky.net/ ]
C:\DOCUMENTS AND SETTINGS\LARRY\Cookies\DW6SK1AO.txt [ Cookie:larry@interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\LARRY\Cookies\7ABC6WJ4.txt [ Cookie:larry@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\LARRY\Cookies\ZKNC1DKP.txt [ Cookie:larry@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\LARRY\Cookies\WVZY2HRK.txt [ Cookie:larry@ad.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\JLZEHE1J.txt [ Cookie:wendi@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\FC0V7YYB.txt [ Cookie:wendi@google.com/accounts/ ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\C0VIT20L.txt [ Cookie:wendi@www.google.com/accounts ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\OLCLKNJY.txt [ Cookie:wendi@google.com/accounts/recovery/ ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\wendi@thebreastcancersite[3].txt [ Cookie:wendi@thebreastcancersite.com/clickToGive/ ]
C:\DOCUMENTS AND SETTINGS\WENDI\Cookies\V33MOWY2.txt [ Cookie:wendi@images.revtrax.com/RevTrax/tracking/ ]

#6 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 05:31 PM

Ok, I just clicked "fix problems", then rebooted the computer. Moving to next step.

#7 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 05:46 PM

MBAM complete. Results: Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.22.05

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Wendi :: WENDI-3DE77F920 [administrator]

2/22/2012 5:38:08 PM
mbam-log-2012-02-22 (17-38-08).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 215977
Time elapsed: 4 minute(s), 36 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 8
C:\Program Files\CouponAlert_2p\bar\1.bin\2pSrcAs.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pbar.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pmlbtn.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2puabtn.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phtmlmu.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pscript.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pradio.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pfeedmg.dll (Adware.MyWebSearch) -> Delete on reboot.

Registry Keys Detected: 98
HKCR\CLSID\{60e91567-ef8a-4520-bce2-83aba5256799} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{60E91567-EF8A-4520-BCE2-83ABA5256799} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{60E91567-EF8A-4520-BCE2-83ABA5256799} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{60E91567-EF8A-4520-BCE2-83ABA5256799} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{84576f6e-0660-4b4f-8918-bc6c975044d4} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{60fc9013-4a5a-4306-9695-fce0a6617f22} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{D244EAC5-A0F5-4859-A1F8-18ABC0AC3A00} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{1948934a-1c68-4b2b-9a1f-d12e2a062a1a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{d7ce22af-ccb3-423f-84d5-4d77152181f3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{004EB151-885B-4A9E-A22D-CA98DD998D75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ToolbarPlugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ToolbarPlugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\CouponAlert_2pbar Uninstall (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{3a421c8f-e238-4aeb-8874-b8b5f2cc4772} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3A421C8F-E238-4AEB-8874-B8B5F2CC4772} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{3A421C8F-E238-4AEB-8874-B8B5F2CC4772} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3A421C8F-E238-4AEB-8874-B8B5F2CC4772} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{def07acd-bcea-4269-933a-4087d20842bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.MultipleButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.MultipleButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{23b0ae65-17d2-4491-98e5-b1aa6228dda2} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.UrlAlertButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.UrlAlertButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{95B3F577-D54A-4831-B2B4-8AACEEDA85CF} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.HTMLMenu.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.HTMLMenu (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{95B3F577-D54A-4831-B2B4-8AACEEDA85CF} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{ebbc4e43-292a-40df-88e3-3262b7521460} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ScriptButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ScriptButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{4d8eacbc-e293-4462-b91e-42ea5b54b743} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.Radio.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.Radio (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{2d205adf-c992-4eda-99c3-096e13f38ab4} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{20bcce5a-c687-46ff-8dd2-ad8235f5f2b4} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{041278C7-DF92-486D-AE85-921BDFC75A43} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.FeedManager.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.FeedManager (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SYSTEM\CurrentControlSet\Services\CouponAlert_2pService (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{1f0a2185-da7e-4614-91c0-dd5f4a76cb1b} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{16fe2505-f2a0-4782-b035-af0e5188c02c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{79583de9-d0c2-44ef-ae0d-cbfa16c2a785} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{1116A14B-F6A3-4FD9-A00E-FF8CF270EE48} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{16FE2505-F2A0-4782-B035-AF0E5188C02C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{23b38049-323f-443d-9732-f454e5b15b72} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.SettingsPlugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.SettingsPlugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{23B38049-323F-443D-9732-F454E5B15B72} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{23B38049-323F-443D-9732-F454E5B15B72} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{3462c343-be19-4143-af70-cefb56f46fc6} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{3462C343-BE19-4143-AF70-CEFB56F46FC6} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{3462C343-BE19-4143-AF70-CEFB56F46FC6} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{7717f4b3-397f-4ce5-9192-6effde3ac999} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{3276e8a8-a233-449b-a7eb-fcee21246018} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{A0636D37-97D0-4DC4-95A6-93AABA07437F} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.RadioSettings.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.RadioSettings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{7b9f8c21-46ec-4c0b-8683-e755ef84577a} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7B9F8C21-46EC-4C0B-8683-E755EF84577A} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{cf9d6d4e-5496-438e-ba24-5a580a59f5a3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.PseudoTransparentPlugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.PseudoTransparentPlugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{CF9D6D4E-5496-438E-BA24-5A580A59F5A3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{09971cee-01b8-42bc-9d91-456b1faad6be} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{09971cee-01b8-42bc-9d91-456b1faad6be} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{8270927A-FB8B-4647-8E21-C9459BB2610D} (Adware.QWO) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.DynamicBarButton (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.DynamicBarButton.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.HTMLPanel (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.HTMLPanel.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ThirdPartyInstaller (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.ThirdPartyInstaller.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.XMLSessionPlugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CouponAlert_2p.XMLSessionPlugin.1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\Software\CouponAlert_2p (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MENUEXT\&SEARCH (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\qword.com (Adware.QWO) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\CouponAlert_2p (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\MozillaPlugins\@CouponAlert_2p.com/Plugin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{411b1946-3277-4a7f-9f60-745266360613} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{ebaf2b4f-510a-47c7-86ba-e7d94d1162f6} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{860AF5D1-0735-409D-8E5F-E3E99356D7E9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{86d02bcf-0e0e-444f-8a8d-2d5c4a9e6578} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{0bdf6c42-132c-45f5-92de-dc13f40c6dab} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{a4116f8c-a634-4536-b9ef-6b9ebcc5bae1} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{65D8E17B-312E-4E12-913B-A841A8631143} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{0BDF6C42-132C-45F5-92DE-DC13F40C6DAB} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{457a4cb8-0391-409d-98b4-c4ccb2849670} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{7924fd2b-877c-4395-a063-a88ab887ea6d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{36A7148B-639E-423C-90BB-30B6E1A40BD7} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{c2df3856-676c-41dc-a73b-facbdf8e81e9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{8542e415-0e53-4261-8be4-0d1598229d90} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{56965DCF-718F-4148-BECF-5A2B466F4556} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C2DF3856-676C-41DC-A73B-FACBDF8E81E9} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\CLSID\{8867ac9b-4426-44a2-a693-c95850d3405c} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\TypeLib\{53ca18e7-5223-4358-9fd9-97c62c66c5bd} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKCR\Interface\{61DAB0AD-AD23-4E40-84AC-7C6CE64D4EB3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{8867AC9B-4426-44A2-A693-C95850D3405C} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Detected: 12
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|CouponAlert_2p Browser Plugin Loader (Adware.MyWebSearch) -> Data: C:\PROGRA~1\COUPON~2\bar\1.bin\2pbrmon.exe -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Coupon Alert Search Scope Monitor (Adware.MyWebSearch) -> Data: "C:\PROGRA~1\COUPON~2\bar\1.bin\2psrchmn.exe" /m=2 /w /h -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser|{3462C343-BE19-4143-AF70-CEFB56F46FC6} (Adware.MyWebSearch) -> Data: CÃb4¾CA¯pÎûVôoÆ -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar|{3462C343-BE19-4143-AF70-CEFB56F46FC6} (Adware.MyWebSearch) -> Data: -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks|{7B9F8C21-46EC-4C0B-8683-E755EF84577A} (Adware.MyWebSearch) -> Data: -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{3462C343-BE19-4143-AF70-CEFB56F46FC6} (Adware.MyWebSearch) -> Data: -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{7b9f8c21-46ec-4c0b-8683-e755ef84577a} (Adware.MyWebSearch) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{3462c343-be19-4143-af70-cefb56f46fc6} (Adware.MyWebSearch) -> Data: -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Internet Explorer\MenuExt\&Search| (Adware.MyWebSearch) -> Data: http://tbedits.couponalert.com/one-toolbaredits/menusearch.jhtml?s=100000487&p=CDxdm0039Eus&si=CPGX5Zak4awCFY2b7QodvHMGmw&a=87AC4549-3DFF-4597-99E5-AFC6FD756AFE&n=2011121205 -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow|www.qword.com (Adware.QWO) -> Data: -> Quarantined and deleted successfully.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Smad (Trojan.Agent) -> Data: "C:\Documents and Settings\Wendi\Local Settings\Application Data\SanctionedMedia\Smad\Smad.exe" -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Mozilla\Firefox\Extensions|2pffxtbr@CouponAlert_2p.com (Adware.MyWebSearch) -> Data: C:\Program Files\CouponAlert_2p\bar\1.bin -> Quarantined and deleted successfully.

Registry Data Items Detected: 1
HKCU\SOFTWARE\Microsoft\Internet Explorer\Main|Search Page (Hijack.Homepage) -> Bad: (http://www.qword.com/?s=1) Good: (http://www.Google.com/) -> Quarantined and repaired successfully.

Folders Detected: 12
C:\Program Files\CouponAlert_2p (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\chrome (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\IE9Mesg (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Files Detected: 100
C:\Program Files\CouponAlert_2p\bar\1.bin\2pbrstub.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pbrmon.exe (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pauxstb.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pSrcAs.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pdlghk.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pieovr.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pbar.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pmlbtn.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2puabtn.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phtmlmu.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pscript.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pradio.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pmedint.exe (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pfeedmg.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pSrchMn.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pbarsvc.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pskin.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\hyl.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\ajh.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\bgn.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\ebr.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\epb.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\haa.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\jml.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\nhp.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\nlq.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\srk.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\tvu.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\vso.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\wfi.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Local Settings\Application Data\ylw.exe (Trojan.ExeShell.Gen) -> Quarantined and deleted successfully.
C:\Documents and Settings\Wendi\Favorites\Qword Search Engine.url (Adware.QWO) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pdatact.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pdyn.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phighin.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phkstub.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phtml.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2phttpct.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pidle.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pimpipe.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pmsg.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pPlugin.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pregfft.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2preghk.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pregiet.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2pskplay.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\2ptpinst.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\CHROME.MANIFEST (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\INSTALL.RDF (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\LOGO.BMP (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\NP2pStub.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\1.bin\T8RES.DLL (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\CouponAlert_2p\bar\1.bin\chrome\2pffxtbr.jar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E9B4.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0001D5D9.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\000663EC.jhtml (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0006F31D (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0006F918 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016B3C4 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016BC30 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016C3A3.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016D8F0.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016D92E.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016DA67.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0016DB32.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E4C2.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E5BC.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E697.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E714.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E7FE.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\0017E8D9.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001804FC (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001818F2.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001D6331.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001D638F.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001D63AE.bmp (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\001DE15A (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\00397BF1 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Cache\files.ini (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\History\search3 (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\IE9Mesg\COMMON.T8S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON.T8S (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON\8_step1.gif (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON\index.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON\rebut4b.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Message\COMMON\shield.png (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\prevcfg2.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\setting3.htm (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\setting3.htm.bak (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\s_w1.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\s_w1.dat.bak (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\s_w2.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\bar\Settings\s_w2.dat.bak (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\CouponAlertBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\CouponAlertNewDealsBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\GrouponBtn.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\PopupProperties204800163.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\PopupProperties204800168.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\CouponAlert_2p\CouponAlert_2p\Cache\Radio.html (Adware.MyWebSearch) -> Quarantined and deleted successfully.

(end)

#8 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 05:51 PM

Ok, I was asked to reboot computer after MBAM was finished scanning. I have done that. What should I do next?

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,917 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:16 AM

Posted 22 February 2012 - 08:52 PM

Ok, I see they updated SAS and I need to rewrite my canned for that,but you did the right thing.
Let me know how it is after all this.
Do you use a specific HOSTS file program?
Was the Coupon Alert app important to you?

Now 2 last scans....
I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.



Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.



>>>>>>
You need to remove this thru the Control Panel. Java™ 6 Update 26 (Version: 6.0.260) and reboot,then isnstall Java 7 ,this one off the download page. Full instructions below.

Windows x86 Offline 19.38 MB jre-7u3-windows-i586.exe


Important Note: Your version of Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system.Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 7 and save it to your desktop.
  • Look for "Java Platform, Standard Edition".
  • Click the "Download JRE" button to the right.
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • From the list, select your OS and Platform (32-bit or 64-bit).
  • If a download for an Offline Installation is available, it is recommended to choose that and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Posted Image > Control Panel, double-click on Add/Remove Programs or Programs and Features in Vista/Windows 7 and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-7u3-windows-i586.exe (or jre-7u3-windows-x64.exe for 64-bit) to install the newest version.
  • If using Windows 7 or Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
  • When the Java Setup - Welcome window opens, click the Install > button.
  • If offered to install a Toolbar, just uncheck the box before continuing unless you want it.
  • The McAfee Security Scan Plus tool is installed by default unless you uncheck the McAfee installation box when updating Java.
Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 22 February 2012 - 09:08 PM

As for your first two questions: Again, sorry, but I'm not that computer literate, so I don't know about the HOSTS file program question, and second, no, coupon alert app is not important. Proceeding with next step.

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,917 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:16 AM

Posted 23 February 2012 - 03:41 PM

Ok, that OK,that means you did not change ir something else did.

Your HOSTS file may be infected.
Reset the HOSTS file
As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system.
Some types of malware will alter the HOSTS file as part of its infection. Please follow the instructions provided in How do I reset the hosts file back to the default?

To reset the hosts file automatically,go HERE click the Posted Image button. Then just follow the prompts in the Fix it wizard.


OR
Click Run in the File Download dialog box or save MicrosoftFixit50267.msi to your Desktop and double-click on it to run. Then just follow the promots in the Fix it wizard.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 23 February 2012 - 03:55 PM

okay, just did next step, ESET online scan - it said no threats found. Moving to next one.

#13 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 23 February 2012 - 04:02 PM

I saw your last post after I sent my previous one. Okay, I did the Microsoft Fixit, and it said to reboot, which I did. Moving to next step, rerun MBAM.

#14 blackbeardkw

blackbeardkw
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:16 AM

Posted 23 February 2012 - 07:30 PM

Results of MBAM re-scan:

Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.23.03

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Wendi :: WENDI-3DE77F920 [administrator]

2/23/2012 4:04:54 PM
mbam-log-2012-02-23 (16-04-54).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 318877
Time elapsed: 49 minute(s), 47 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 2
C:\System Volume Information\_restore{EDC4ACE6-7E1D-43A6-A59C-5085BAFD9E41}\RP383\A0071966.exe (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{EDC4ACE6-7E1D-43A6-A59C-5085BAFD9E41}\RP383\A0071969.dll (PUP.FunWebProducts) -> Quarantined and deleted successfully.

(end)

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,917 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:11:16 AM

Posted 23 February 2012 - 09:36 PM

OK, this looks really good. One more to see if we missed anything.

How is it running now?


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users