Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Infection that causes my internet to run very slow

  • This topic is locked This topic is locked
9 replies to this topic

#1 Computer Rock

Computer Rock

  • Members
  • 49 posts
  • Local time:08:21 AM

Posted 07 March 2012 - 06:03 PM

Hi there

I am having a problem with my internet as it runs very very slow. As soon as I open internet explorer the speed drops down to about 18mbps then to 11 and not long after it will fall to 2 then 1. It has started happening a lot and after seeing another computer that is also connected to the same network run normally I have come to conclusion that I am infected. And then I saw these two popups which confirmed it. Posted Image
Posted Image

Im not sure how I got this virus as I just cleaned my website 1 month ago (with the help of this site) and I have not gone into anything I would consider dangerous. Any and all help would be greatly appreciated.

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,047 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:21 PM

Posted 07 March 2012 - 06:31 PM

Please download Malwarebytes Anti-Malware Posted Image and save it to your desktop.
  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.
  • Double-click on the renamed file to install, then follow these instructions for doing a Quick Scan in normal mode.
  • Don't forget to check for database definition updates through the program's interface (preferable method) before scanning.
  • If you cannot update Malwarebytes or use the Internet to download any files to the infected computer, manually update the database by following the instructions in FAQ Section A: 4. Issues.
Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • After completing the scan, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab .
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.
If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.

Note: A 14-day trial of Malwarebytes Anti-Malware PRO is available as an option when first installing the free version so all users can test the real-time protection component for a period of two weeks. When the limited time period expires those features will be deactivated and locked. Enabling the Protection Module feature again requires registration and purchase of a license key that includes free lifetime upgrades and support. If you continue to use the free version, there is no requirement to buy a license...you can just use it as a stand-alone scanner.

-- Some types of malware will target Malwarebytes and other security tools to keep them from running properly. If that's the case, go to Start > All Programs > Malwarebytes Anti-Malware folder > Tools > click on Malwarebytes Chameleon and follow the onscreen instructions. The Chameleon folder can be accessed by opening the program folder for Malwarebytes Anti-Malware (normally C:\Program Files\Malwarebytes' Anti-Malware or C:\Program Files (x86)\Malwarebytes' Anti-Malware).

Please download SUPERAntiSpyware Free and follow these instructions for performing a scan.

  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • Be sure to update the definitions before scanning by selecting "Check for Updates".
    If you encounter any problems while downloading the updates, manually download them from here.
  • If your computer is badly infected, be sure to check the box next to Enable Rescue Scan (Highly Infected Systems ONLY) under Select Scan Type.
To retrieve the scan log after reboot, launch SUPERAntiSpyware again.
  • Click the View Scan Logs button at the bottom.
  • This will open the Scanner Logs Window.
  • Click on the log to highlight it and then click on View Selected Log to open it.
  • Copy and paste the scan log results in your next reply.
-- Some types of malware will disable security tools. If SUPERAntiSpyware will not install, please refer to these instructions for using the SUPERAntiSpyware Installer. If SUPERAntiSpyware is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Computer Rock

Computer Rock
  • Topic Starter

  • Members
  • 49 posts
  • Local time:08:21 AM

Posted 07 March 2012 - 10:11 PM

Thank you so much for your help.


Malwarebytes Anti-Malware

Database version: v2012.03.07.07

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Alex P :: MARVEL [administrator]

8/03/2012 12:09:58 PM
mbam-log-2012-03-08 (12-09-58).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 269547
Time elapsed: 10 minute(s), 51 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|dplaysvr (Trojan.QHost.BG) -> Data: C:\Documents and Settings\Alex P\Application Data\dplaysvr.exe -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)



SUPERAntiSpyware Scan Log

Generated 03/08/2012 at 02:01 PM

Application Version : 5.0.1146

Core Rules Database Version : 8315
Trace Rules Database Version: 6127

Scan type : Quick Scan
Total Scan Time : 00:06:16

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)

Memory items scanned : 477
Memory threats detected : 0
Registry items scanned : 29080
Registry threats detected : 0
File items scanned : 9504
File threats detected : 207

Adware.Tracking Cookie
C:\Documents and Settings\Alex P\Cookies\alex_p@2o7[1].txt [ /2o7 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@accounts.google[2].txt [ /accounts.google ]
C:\Documents and Settings\Alex P\Cookies\alex_p@accounts.youtube[1].txt [ /accounts.youtube ]
C:\Documents and Settings\Alex P\Cookies\alex_p@accounts.youtube[2].txt [ /accounts.youtube ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ad.yieldmanager[1].txt [ /ad.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ad.yieldmanager[3].txt [ /ad.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ad.yieldmanager[4].txt [ /ad.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ad.yieldmanager[5].txt [ /ad.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adbrite[2].txt [ /adbrite ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adbrite[3].txt [ /adbrite ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adbrite[4].txt [ /adbrite ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ads.gamesbannernet[1].txt [ /ads.gamesbannernet ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ads.planet49[2].txt [ /ads.planet49 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ads.traffikings[1].txt [ /ads.traffikings ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adserver.adtechus[1].txt [ /adserver.adtechus ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adserver.adtechus[2].txt [ /adserver.adtechus ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[10].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[1].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[2].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[3].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[4].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[5].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[6].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[7].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[8].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adultfriendfinder[9].txt [ /adultfriendfinder ]
C:\Documents and Settings\Alex P\Cookies\alex_p@advertising[2].txt [ /advertising ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[1].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[2].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[3].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[4].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[5].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[6].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpansion[8].txt [ /adxpansion ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpose[1].txt [ /adxpose ]
C:\Documents and Settings\Alex P\Cookies\alex_p@adxpose[2].txt [ /adxpose ]
C:\Documents and Settings\Alex P\Cookies\alex_p@apmebf[1].txt [ /apmebf ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ar.atwola[1].txt [ /ar.atwola ]
C:\Documents and Settings\Alex P\Cookies\alex_p@at.atwola[2].txt [ /at.atwola ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt.combing[2].txt [ /atdmt.combing ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt.combing[3].txt [ /atdmt.combing ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt.combing[4].txt [ /atdmt.combing ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt.combing[5].txt [ /atdmt.combing ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[1].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[2].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[3].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[4].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[6].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@atdmt[7].txt [ /atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@bs.serving-sys[1].txt [ /bs.serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@bs.serving-sys[2].txt [ /bs.serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@bs.serving-sys[3].txt [ /bs.serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@bs.serving-sys[5].txt [ /bs.serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@burstnet[2].txt [ /burstnet ]
C:\Documents and Settings\Alex P\Cookies\alex_p@c.gigcount[1].txt [ /c.gigcount ]
C:\Documents and Settings\Alex P\Cookies\alex_p@casalemedia[2].txt [ /casalemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@chitika[1].txt [ /chitika ]
C:\Documents and Settings\Alex P\Cookies\alex_p@collective-media[2].txt [ /collective-media ]
C:\Documents and Settings\Alex P\Cookies\alex_p@content.yieldmanager[1].txt [ /content.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@content.yieldmanager[2].txt [ /content.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@content.yieldmanager[3].txt [ /content.yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@doubleclick[1].txt [ /doubleclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@doubleclick[2].txt [ /doubleclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@doubleclick[3].txt [ /doubleclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@doubleclick[4].txt [ /doubleclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@fastclick[1].txt [ /fastclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@fastclick[2].txt [ /fastclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@h.atdmt[2].txt [ /h.atdmt ]
C:\Documents and Settings\Alex P\Cookies\alex_p@hearstugo.112.2o7[1].txt [ /hearstugo.112.2o7 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@imrworldwide[2].txt [ /imrworldwide ]
C:\Documents and Settings\Alex P\Cookies\alex_p@imrworldwide[3].txt [ /imrworldwide ]
C:\Documents and Settings\Alex P\Cookies\alex_p@interclick[2].txt [ /interclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@invitemedia[1].txt [ /invitemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@invitemedia[2].txt [ /invitemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@invitemedia[3].txt [ /invitemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@invitemedia[4].txt [ /invitemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@invitemedia[5].txt [ /invitemedia ]
C:\Documents and Settings\Alex P\Cookies\alex_p@media6degrees[1].txt [ /media6degrees ]
C:\Documents and Settings\Alex P\Cookies\alex_p@media6degrees[2].txt [ /media6degrees ]
C:\Documents and Settings\Alex P\Cookies\alex_p@media6degrees[3].txt [ /media6degrees ]
C:\Documents and Settings\Alex P\Cookies\alex_p@mediabrandsww[2].txt [ /mediabrandsww ]
C:\Documents and Settings\Alex P\Cookies\alex_p@mediaplex[1].txt [ /mediaplex ]
C:\Documents and Settings\Alex P\Cookies\alex_p@mediaplex[2].txt [ /mediaplex ]
C:\Documents and Settings\Alex P\Cookies\alex_p@mm.chitika[1].txt [ /mm.chitika ]
C:\Documents and Settings\Alex P\Cookies\alex_p@msnportal.112.2o7[1].txt [ /msnportal.112.2o7 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@namco.122.2o7[1].txt [ /namco.122.2o7 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@network.alluremedia.com[2].txt [ /network.alluremedia.com ]
C:\Documents and Settings\Alex P\Cookies\alex_p@overture[2].txt [ /overture ]
C:\Documents and Settings\Alex P\Cookies\alex_p@questionmarket[1].txt [ /questionmarket ]
C:\Documents and Settings\Alex P\Cookies\alex_p@revsci[1].txt [ /revsci ]
C:\Documents and Settings\Alex P\Cookies\alex_p@revsci[2].txt [ /revsci ]
C:\Documents and Settings\Alex P\Cookies\alex_p@revsci[3].txt [ /revsci ]
C:\Documents and Settings\Alex P\Cookies\alex_p@revsci[4].txt [ /revsci ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ru4[1].txt [ /ru4 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@ru4[3].txt [ /ru4 ]
C:\Documents and Settings\Alex P\Cookies\alex_p@serving-sys[1].txt [ /serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@serving-sys[3].txt [ /serving-sys ]
C:\Documents and Settings\Alex P\Cookies\alex_p@specificclick[1].txt [ /specificclick ]
C:\Documents and Settings\Alex P\Cookies\alex_p@statse.webtrendslive[1].txt [ /statse.webtrendslive ]
C:\Documents and Settings\Alex P\Cookies\alex_p@statse.webtrendslive[3].txt [ /statse.webtrendslive ]
C:\Documents and Settings\Alex P\Cookies\alex_p@tacoda.at.atwola[2].txt [ /tacoda.at.atwola ]
C:\Documents and Settings\Alex P\Cookies\alex_p@toplist[2].txt [ /toplist ]
C:\Documents and Settings\Alex P\Cookies\alex_p@trafficking.nabbr[1].txt [ /trafficking.nabbr ]
C:\Documents and Settings\Alex P\Cookies\alex_p@viacom.adbureau[1].txt [ /viacom.adbureau ]
C:\Documents and Settings\Alex P\Cookies\alex_p@www.burstnet[2].txt [ /www.burstnet ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[10].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[11].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[1].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[2].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[3].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[4].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[5].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[6].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[7].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[8].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yadro[9].txt [ /yadro ]
C:\Documents and Settings\Alex P\Cookies\alex_p@yieldmanager[1].txt [ /yieldmanager ]
C:\Documents and Settings\Alex P\Cookies\alex_p@zedo[2].txt [ /zedo ]
C:\Documents and Settings\Alex P\Cookies\JX9GOU5K.txt [ /revsci.net ]
C:\Documents and Settings\Alex P\Cookies\ZUE3U2RE.txt [ /media6degrees.com ]
C:\Documents and Settings\Alex P\Cookies\J0L01WFC.txt [ /kontera.com ]
C:\Documents and Settings\Alex P\Cookies\I0RKL0HJ.txt [ /statcounter.com ]
C:\Documents and Settings\Alex P\Cookies\XZZZMPB6.txt [ /invitemedia.com ]
C:\Documents and Settings\Alex P\Cookies\42BVVVM8.txt [ /ads.pubmatic.com ]
C:\Documents and Settings\Alex P\Cookies\A5GCE6LY.txt [ /collective-media.net ]
C:\Documents and Settings\Alex P\Cookies\220NCZMU.txt [ /ads.intergi.com ]
C:\Documents and Settings\Alex P\Cookies\1MNW734U.txt [ /ads.bleepingcomputer.com ]
C:\DOCUMENTS AND SETTINGS\ALEX P_BAD1\Cookies\alex_p@doubleclick[1].txt [ Cookie:alex p@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@advertising[2].txt [ Cookie:joe@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@microsoftsto.112.2o7[1].txt [ Cookie:joe@microsoftsto.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@apmebf[1].txt [ Cookie:joe@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@imrworldwide[2].txt [ Cookie:joe@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@pro-market[1].txt [ Cookie:joe@pro-market.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@overture[2].txt [ Cookie:joe@overture.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@doubleclick[2].txt [ Cookie:joe@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@media6degrees[1].txt [ Cookie:joe@media6degrees.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@adbrite[1].txt [ Cookie:joe@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@revsci[2].txt [ Cookie:joe@revsci.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@atdmt[2].txt [ Cookie:joe@atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@tribalfusion[1].txt [ Cookie:joe@tribalfusion.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@ru4[1].txt [ Cookie:joe@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@fastclick[1].txt [ Cookie:joe@fastclick.net/ ]
C:\DOCUMENTS AND SETTINGS\JOE\Cookies\joe@msnportal.112.2o7[1].txt [ Cookie:joe@msnportal.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@statse.webtrendslive[2].txt [ Cookie:rose@statse.webtrendslive.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@www.burstnet[1].txt [ Cookie:rose@www.burstnet.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@invitemedia[2].txt [ Cookie:rose@invitemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@theweek[1].txt [ Cookie:rose@theweek.com/webstats/piwik/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@adbrite[2].txt [ Cookie:rose@adbrite.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@msnportal.112.2o7[1].txt [ Cookie:rose@msnportal.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@edge.ru4[1].txt [ Cookie:rose@edge.ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@liveperson[4].txt [ Cookie:rose@liveperson.net/hc/19357552 ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@rts.pgmediaserve[1].txt [ Cookie:rose@rts.pgmediaserve.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@partypoker[1].txt [ Cookie:rose@partypoker.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@liveperson[1].txt [ Cookie:rose@liveperson.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@shop.countryroad.com[1].txt [ Cookie:rose@shop.countryroad.com.au/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@at.atwola[2].txt [ Cookie:rose@at.atwola.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@episodic[3].txt [ Cookie:rose@episodic.com/track/qt5iawh5xsld/clip/etzafgcx7r418/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@advertise[1].txt [ Cookie:rose@advertise.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@adsonar[2].txt [ Cookie:rose@adsonar.com/adserving ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@doubleclick[2].txt [ Cookie:rose@doubleclick.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@adservx.omg.com[2].txt [ Cookie:rose@adservx.omg.com.au/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@ru4[1].txt [ Cookie:rose@ru4.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@tacoda[1].txt [ Cookie:rose@tacoda.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@pro-market[1].txt [ Cookie:rose@pro-market.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@adxpose[1].txt [ Cookie:rose@adxpose.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@ad.yieldmanager[1].txt [ Cookie:rose@ad.yieldmanager.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@test.coremetrics[1].txt [ Cookie:rose@test.coremetrics.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@media.adfrontiers[2].txt [ Cookie:rose@media.adfrontiers.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@bs.serving-sys[2].txt [ Cookie:rose@bs.serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@zedo[1].txt [ Cookie:rose@zedo.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@www.titomedia[1].txt [ Cookie:rose@www.titomedia.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@apmebf[2].txt [ Cookie:rose@apmebf.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@mediaplex[1].txt [ Cookie:rose@mediaplex.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@episodic[1].txt [ Cookie:rose@episodic.com/track/qt5iawh5xsld/etzafgcx7r418/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@optus.112.2o7[1].txt [ Cookie:rose@optus.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@specificclick[2].txt [ Cookie:rose@specificclick.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@media.sensis.com[1].txt [ Cookie:rose@media.sensis.com.au/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@interclick[1].txt [ Cookie:rose@interclick.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@witchery.122.2o7[1].txt [ Cookie:rose@witchery.122.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@questionmarket[1].txt [ Cookie:rose@questionmarket.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@statcounter[1].txt [ Cookie:rose@statcounter.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@imrworldwide[1].txt [ Cookie:rose@imrworldwide.com/cgi-bin ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@advertising[1].txt [ Cookie:rose@advertising.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@serving-sys[1].txt [ Cookie:rose@serving-sys.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@trafficmp[2].txt [ Cookie:rose@trafficmp.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@adviva[1].txt [ Cookie:rose@adviva.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@collective-media[2].txt [ Cookie:rose@collective-media.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@episodic[2].txt [ Cookie:rose@episodic.com/track/qt5iawh5xsld/sqthblsf39ywx/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@c.atdmt[1].txt [ Cookie:rose@c.atdmt.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@eyewonder[1].txt [ Cookie:rose@eyewonder.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@casalemedia[2].txt [ Cookie:rose@casalemedia.com/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@hyatt.112.2o7[1].txt [ Cookie:rose@hyatt.112.2o7.net/ ]
C:\DOCUMENTS AND SETTINGS\ROSE\Cookies\rose@2o7[1].txt [ Cookie:rose@2o7.net/ ]



Edited by Computer Rock, 07 March 2012 - 10:59 PM.

#4 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,047 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:21 PM

Posted 08 March 2012 - 09:34 AM

Try doing an online scan to see if it finds anything else that the other scans may have missed.

Please perform a scan with Eset Online Anti-virus Scanner.
  • If using Mozilla Firefox, you will be prompted to download and use the ESET Smart Installer. Just double-click on esetsmartinstaller_enu.exe to install.
  • Vista/Windows 7 users need to run Internet Explorer/Firefox as Administrator.
    To do this, right-click on the browser icon in the Start Menu or Quick Launch Bar and select Run As Administrator from the context menu.
  • Click the green Posted Image button.
  • Read the End User License Agreement and check the box:
  • Check Posted Image.
  • Click the Posted Image button.
  • Accept any security warnings from your browser and allow the download/installation of any require files.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click the Start button.
  • ESET will install itself, download virus signature database updates, and begin scanning your computer.
  • The scan can take some time to complete...close all programs and do NOT use the computer while the scan is running.
    If given the option (when threats are found), choose "Quarantine" instead of delete.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop as ESETScan.txt.
  • Push the Posted Image button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply. If no threats are found, there is no option to create a log.

Note: If you recognize any of the detections as legitimate programs, it's possible they are "false positives" and you can ignore them or get a second opinion if you're not sure.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 Computer Rock

Computer Rock
  • Topic Starter

  • Members
  • 49 posts
  • Local time:08:21 AM

Posted 08 March 2012 - 01:41 PM

C:\Documents and Settings\Alex P\Local Settings\temp\39.tmp a variant of Win32/Kryptik.ABYG trojan cleaned by deleting - quarantined

#6 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,047 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:21 PM

Posted 08 March 2012 - 02:09 PM

Now try clearing your web browser cache. As you browse web pages, the browser stores a copy of the pages you view on your local hard drive; this is called caching. Clearing the cache forces the browser to load the latest versions of Web pages and programs you visit.

Alternatively you can download TFC (Temp File Cleaner) by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • TFC will clear out all temp folders (temp, IE temp, Java, FF, Opera, Chrome, Safari) for all user accounts, including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
-- Note: It is normal for the computer to be slow to boot after running TFC cleaner the first time.

Another reason for browser slowness is too many add-ons. I recommend removing all toolbars which you do not use. Too many toolbars, BHOs and add-ons attached your browser can cause slowness and other issues. You could try improving performance by disabling or removing those which are unnecessary. Sometimes Add-ons cause Internet Explorer to quit unexpectedly or not perform properly especially if it was poorly designed or was created for an earlier version of Internet Explorer. Incompatible browser extensions and add-ons can also impact system performance and cause compatibility issues such as application hangs (freezing).
When done, let me know how your computer is running.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 Computer Rock

Computer Rock
  • Topic Starter

  • Members
  • 49 posts
  • Local time:08:21 AM

Posted 10 March 2012 - 04:37 AM

Just to let you know I am already aware of most of the processes you told me. I regularly clear my cache. I use TFC once per month and I have no toolbars. However I did clear my cache and use TFC now just as you asked. Unofrtuantely my computer is still running very slow.

#8 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,047 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:21 PM

Posted 10 March 2012 - 07:15 AM

I can only go by what the scan logs show (what was detected/removed) and your description of whatever signs or symptoms of infection you are experiencing. If you want a more detailed look at your system, then more advanced tools are needed to investigate. Before that can be done you will need to follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.
  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 7 there are instructions for downloading and running DDS which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team Experts.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 Computer Rock

Computer Rock
  • Topic Starter

  • Members
  • 49 posts
  • Local time:08:21 AM

Posted 10 March 2012 - 08:04 AM

I have done as you asked and just wanted to say thank you very much for your help.

#10 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,047 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:21 PM

Posted 10 March 2012 - 08:18 AM

You're welcome.

Now that your log is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Response Team member...nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log(s) you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process or make things worst which would extend the time it takes to clean your computer.

From this point on the Malware Response Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take several days to get a response because the Malware Response Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have posted your log and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Response Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Response Team member is already assisting you and not open the thread to respond.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.

To avoid confusion, I am closing this topic until you are cleared by the Malware Response Team. If you still need assistance after your log has been reviewed and you have been cleared, please PM me or another moderator and we will re-open this topic.

Good luck with your log.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users