Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trovi Search hijacked by browser


  • Please log in to reply
10 replies to this topic

#1 WILD RACING

WILD RACING

  • Members
  • 237 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 PM

Posted 16 May 2014 - 04:47 PM

And it seems to be trying to keep me from getting rid of it.

 

I've tried running a scan as well as going through the Add?Remove programs and both times my computer has slowed to the point where it does nothing (for hours) untill I end the task.

 

The laptop is a Compaq Presario R3000 Running Win XP SP 3.  Browser Is IE.

 

Everything else seems to be normal but slow save for my homepage which was google has been hijacked.

 



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 16 May 2014 - 07:09 PM

In many cases these issues are the result of unwanted toolbars, add-ons/plug-ins, and browser extensions which come bundled with other free software (often without the knowledge or consent of the user). They can often be the source of various issues and problems to include Adware, pop-up ads browser hijacking which may change your home page and search engine, and user profile corruption. As such many of them are classified as Potentially Unwanted Programs (PUPs).

Some toolbars and Add-ons can be removed from within its program group Uninstall shortcut in Start Menu > All Programs or by using Add/Remove Programs or Programs and Features in Control Panel.

If nothing is listed there...the next place to check is your browser extensions and add-ons/plug-ins.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 16 May 2014 - 07:10 PM

After doing the above...continue as follows:

Please download and use the following tools (in the order listed) which will search for and remove many potentially unwanted programs (PUPs), adware, toolbars, browser hijackers, extensions, add-ons and other junkware as well as related registry entries (values, keys) and remnants.

RKill created by Grinler (aka Lawrence Abrams), the site owner of BleepingComputer.
AdwCleaner created by Xplode.
Junkware Removal Tool created by thisisu.

1. Double-click on RKill to launch the tool. A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully. A log file will be created and saved to the root directory, C:\RKill.log. Copy and paste the contents of RKill.log in your next reply.

Important: Do not reboot your computer until you complete the next step.

2. Double-click on AdwCleaner.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • After reviewing the log, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
-- Note: The contents of the AdwCleaner log file may be confusing. Unless you see a program name that you recognize and know should not be removed, don't worry about it. If you see an entry you want to keep, return to AdwCleaner before cleaning...all detected items will be listed (and checked) in each tab. Click on and uncheck any items you want to keep (except you cannot uncheck Chrome and Firefox preferences lines).


Close all open programs and shut down any protection/security software to avoid potential conflicts.

3. Double-click on JRT.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log file named JRT.txt will automatically open and be saved to your Desktop.
  • Copy and paste the contents of JRT.txt in your next reply.
.
4. As a final step, download, install and perform a THREAT SCAN with Malwarebytes Anti-Malware 2.0. Be sure to print out and follow these instructions.

When done, please post the complete results of your Malwarebytes scan for review.

To retrieve the Malwarebytes Anti-Malware 2.0 scan log information (Method 1)
  • Open Malwarebytes Anti-Malware.
  • Click the History Tab at the top and select Application Logs.
  • Select (check) the box next to Scan Log. Choose the most current scan.
  • Click the View button.
  • Click Copy to Clipboard at the bottom...come back to this thread, click Add Reply, then right-click and choose Paste.
  • Alternatively, you can click Export and save the log as a .txt file on your Desktop or another location.
To retrieve the Malwarebytes Anti-Malware 2.0 scan log information (Method 2)
  • Open Malwarebytes Anti-Malware.
  • Click the Scan Tab at the top.
  • Click the View detailed log link on the right.
  • Click Copy to Clipboard at the bottom...come back to this thread, click Add Reply, then right-click and choose Paste.
  • Alternatively, you can click Export and save the log as a .txt file on your Desktop or another location.
-- Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 WILD RACING

WILD RACING
  • Topic Starter

  • Members
  • 237 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 PM

Posted 16 May 2014 - 11:24 PM

It seems my home page and defualt search engin were restored after the Rkill and AdwCleaner were run.

 

Here's all the logs......

 

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 05/16/2014 08:40:36 PM in x86 mode.
Windows Version: Microsoft Windows XP Service Pack 3

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * ALERT: ZEROACCESS rootkit symptoms found!

     * C:\RECYCLER\S-1-5-21-484763869-573735546-839522115-1004\$4ebd8f19c76099aa14966607bdce20fc\ [ZA Dir]
     * C:\RECYCLER\S-1-5-21-484763869-573735546-839522115-1004\$4ebd8f19c76099aa14966607bdce20fc\@ [ZA File]
     * C:\RECYCLER\S-1-5-21-484763869-573735546-839522115-1004\$4ebd8f19c76099aa14966607bdce20fc\L\ [ZA Dir]
     * C:\RECYCLER\S-1-5-21-484763869-573735546-839522115-1004\$4ebd8f19c76099aa14966607bdce20fc\U\ [ZA Dir]

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * C:\WINDOWS\System32\comres.dll : 792,064 : 04/14/2008 05:41 AM : 519b2537f4896cf25a9691bb649d0b50 [NoSig]
 +-> C:\WINDOWS\$NtServicePackUninstall$\comres.dll : 792,064 : 03/31/2003 03:00 PM : 1f51839eccf908fd86558198909262e4 [Pos Repl]
 +-> C:\WINDOWS\ERDNT\cache\comres.dll : 792,064 : 04/14/2008 05:41 AM : 1280a158c722fa95a80fb7aebe78fa7d [Pos Repl]
 +-> C:\WINDOWS\ServicePackFiles\i386\comres.dll : 792,064 : 04/14/2008 05:41 AM : 1280a158c722fa95a80fb7aebe78fa7d [Pos Repl]

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 05/16/2014 08:43:29 PM
Execution time: 0 hours(s), 2 minute(s), and 53 seconds(s)

 

# AdwCleaner v3.208 - Report created 16/05/2014 at 21:15:27
# Updated 11/05/2014 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : User - USER-DRXYHZGBOO
# Running from : C:\Documents and Settings\User\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

[#] Service Deleted : CltMngSvc

***** [ Files / Folders ] *****

Folder Deleted : C:\Documents and Settings\All Users\Application Data\Viewpoint
Folder Deleted : C:\Program Files\Mysearchdial
Folder Deleted : C:\Program Files\SearchProtect
Folder Deleted : C:\Program Files\Viewpoint
Folder Deleted : C:\Documents and Settings\User\Local Settings\Application Data\SearchProtect
Folder Deleted : C:\Documents and Settings\User\Application Data\Mysearchdial
Folder Deleted : C:\Documents and Settings\User\Application Data\OpenCandy
File Deleted : C:\END

***** [ Shortcuts ] *****

***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{CA5CAA63-B27C-4963-9BEC-CB16A36D56F8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{219046AE-358F-4CF1-B1FD-2B4DE83642A8}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\mysearchdial
Key Deleted : HKLM\Software\InstallCore
Key Deleted : HKLM\Software\MetaStream
Key Deleted : HKLM\Software\SearchProtect
Key Deleted : HKLM\Software\Viewpoint
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mysearchdial
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SearchProtect
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\mysearchdial
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\SearchProtect
Data Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows [AppInit_DLLs] - C:\PROGRA~1\SearchProtect\SearchProtect\bin\SPVC32Loader.dll

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.6001.18702

-\\ Mozilla Firefox v

[ File : C:\Documents and Settings\User\Application Data\Mozilla\Firefox\Profiles\54a7vk3y.default\prefs.js ]

-\\ Google Chrome v

[ File : C:\Documents and Settings\User\Local Settings\Application Data\Google\Chrome\User Data\Default\preferences ]

*************************

AdwCleaner[R0].txt - [3815 octets] - [22/12/2013 17:09:06]
AdwCleaner[R1].txt - [3172 octets] - [16/05/2014 20:44:12]
AdwCleaner[S0].txt - [3954 octets] - [22/12/2013 17:11:12]
AdwCleaner[S1].txt - [3155 octets] - [16/05/2014 21:15:27]

########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [3215 octets] ##########

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Microsoft Windows XP x86
Ran by User on Fri 05/16/2014 at 21:24:53.96
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\axmetastream.metastreamctl
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\axmetastream.metastreamctl.1
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\axmetastream.metastreamctlsecondary
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\axmetastream.metastreamctlsecondary.1
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\viewpointmediaplayer

 

~~~ Files

 

~~~ Folders

Successfully deleted: [Folder] "C:\Documents and Settings\All Users\application data\viewpoint"
Successfully deleted: [Folder] "C:\Program Files\viewpoint"

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 05/16/2014 at 21:34:02.43
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 5/17/2014
Scan Time: 12:04:41 AM
Logfile: mwlog.txt
Administrator: Yes

Version: 2.00.1.1004
Malware Database: v2014.05.17.02
Rootkit Database: v2014.03.27.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Disabled

OS: Windows XP Service Pack 3
CPU: x86
File System: NTFS
User: User

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 261287
Time Elapsed: 2 hr, 16 min, 52 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Warn
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 2
PUP.Optional.WeCare.A, HKU\S-1-5-21-484763869-573735546-839522115-500-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{D824F0DE-3D60-4F57-9EB1-66033ECD8ABB}, Quarantined, [3640153d087383b3ff5db7a6669c0000],
PUP.Optional.MySearchDial.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MySearchDial, Quarantined, [047286cc017a88ae544d892a28dbf010],

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 2
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],

Files: 15
PUP.Optional.Somoto, C:\Documents and Settings\User\Local Settings\temp\bitool.dll, Quarantined, [c2b4c0921d5e40f6c3051deeaa5818e8],
PUP.Optional.Somoto, C:\Documents and Settings\User\Local Settings\temp\nsl813.tmp, Quarantined, [adc9c09243384cea0bbc19c30300cb35],
PUP.Optional.Conduit.A, C:\Documents and Settings\User\Local Settings\temp\nss82E\SpSetup.exe, Quarantined, [a8cef55dfb80162000d1bd60719044bc],
PUP.Optional.Conduit.A, C:\Documents and Settings\User\Local Settings\temp\nst8E0.tmp\3\SPIdentifier.exe, Quarantined, [b8be7cd6e4972610a43d15f61be68c74],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nsc7CF.exe, Quarantined, [2452ba98accf65d1d010f0389968d030],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nsf7C2.exe, Quarantined, [77ff173b6714a98db52b46e2ee1333cd],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nsmF.exe, Quarantined, [f6803a1881facf67cd136ebab150669a],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nsn7C5.exe, Quarantined, [4333dd751a617eb8558bce5af809ac54],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nsq7CB.exe, Quarantined, [3343b69ca4d744f2b42c5fc9bd449769],
PUP.Optional.SearchProtect.A, C:\WINDOWS\Temp\nstC.exe, Quarantined, [5521282ab8c369cd0fd1d652c8397c84],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc\config.dat, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc\info.dat, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc\STTL.DAT, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc\TTL.DAT, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],
PUP.Optional.MySearchDial.A, C:\Documents and Settings\NetworkService\Application Data\MySearchDial\UpdateProc\UpdateTask.exe, Quarantined, [9fd7c78b4932dd597a8027496c9646ba],

Physical Sectors: 0
(No malicious items detected)

(end)



#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 17 May 2014 - 06:26 AM

Now try doing an online scan to see if it finds anything else that the other scans may have missed.

Please perform a scan with Eset Online Anti-virus Scanner.
If using Mozilla Firefox, you will be prompted to download and use the ESET Smart Installer. Just double-click on esetsmartinstaller_enu.exe to install.
Vista/Windows 7/8 users need to run Internet Explorer/Firefox as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.
 

  • Click the green esetOnline.png button.
  • Read the End User License Agreement and check the box:
  • Check esetAcceptTerms.png.
  • Click the esetStart.png button.
  • Accept any security warnings from your browser and allow the download/installation of any require files.
  • Under scan settings, check esetScanArchives.png and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click the Start button.
  • ESET will install itself, download virus signature database updates, and begin scanning your computer.
  • The scan can take some time to complete...close all programs and do NOT use the computer while the scan is running.
    If given the option (when threats are found), choose "Quarantine" instead of delete.
  • When the scan completes, push esetListThreats.png
  • Push esetExport.png, and save the file to your desktop as ESETScan.txt.
  • Push the esetBack.png button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply. If no threats are found, there is no option to create a log.

-- Note: If you recognize any of the detections as legitimate programs, it's possible they are "false positives" and you can ignore them or get a second opinion if you're not sure. Eset's detection rate is high and can include legitimate files which it considers suspicious, a Risk Tool, Hacking Tool, Potentially Unwanted Program, a possible threat or even Malware (virus/trojan) when that is not always the case. Be careful what you choose to remove. If in doubt, ask before taking action.

 

 


.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 WILD RACING

WILD RACING
  • Topic Starter

  • Members
  • 237 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 PM

Posted 17 May 2014 - 08:25 PM

ESET scan log.........

 

C:\AdwCleaner\Quarantine\C\Documents and Settings\User\Application Data\Mysearchdial\UpdateProc\UpdateTask.exe.vir a variant of Win32/DealPly.O potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Documents and Settings\User\Application Data\OpenCandy\79F2037D412A44629550B2E69242CD77\sp-downloader.exe.vir Win32/Toolbar.Conduit.R potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\Main\bin\CltMngSvc.exe.vir a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\Main\bin\SPTool.dll.vir a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\Main\bin\uninstall.exe.vir a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\SearchProtect\bin\cltmng.exe.vir a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\SearchProtect\bin\SPVC32.dll.vir a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\SearchProtect\bin\SPVC64Loader.dll.vir a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files\SearchProtect\UI\bin\cltmngui.exe.vir a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\Documents and Settings\User\Application Data\0S1F1O2Z0S2Y1H1T\ImgBurn Packages\uninstaller.exe Win32/InstallCore.AZ potentially unwanted application deleted - quarantined
C:\Documents and Settings\User\Local Settings\temp\SPSetup.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP457\A0211713.exe Win32/Toolbar.Conduit.R potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP457\A0211714.exe a variant of Win32/OpenCandy.A potentially unsafe application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP457\A0211715.exe a variant of Win32/OpenCandy.A potentially unsafe application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215209.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215210.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215211.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215212.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215213.dll a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215215.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215216.exe a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215217.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP470\A0215218.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215432.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215433.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215434.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215435.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215436.dll a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215438.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215440.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP474\A0215441.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216109.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216110.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216111.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216112.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216113.dll a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216115.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216117.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP488\A0216118.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222450.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222451.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222452.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222453.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222454.dll a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222456.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222458.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP516\A0222459.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223745.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223746.exe a variant of Win32/Conduit.SearchProtect.I potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223748.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223751.dll a variant of Win64/Conduit.SearchProtect.A potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223752.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223753.dll a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223754.exe a variant of Win32/Conduit.SearchProtect.H potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223761.exe a variant of Win32/DealPly.O potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223762.exe Win32/Toolbar.Conduit.R potentially unwanted application deleted - quarantined
C:\System Volume Information\_restore{D1DFAC13-F9D2-4ED7-B8F2-6EDD419E62D9}\RP522\A0223814.exe a variant of Win32/DealPly.O potentially unwanted application deleted - quarantined
 



#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 17 May 2014 - 09:35 PM

Is everything back to normal?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 WILD RACING

WILD RACING
  • Topic Starter

  • Members
  • 237 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 PM

Posted 17 May 2014 - 10:20 PM

Sure seems to be



#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 18 May 2014 - 05:47 AM

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state. Then use Disk Cleanup or Disk Cleanup with Sagesets to remove all but the most recently created Restore Point.

Vista and Windows 7/8 users can refer to these links:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 WILD RACING

WILD RACING
  • Topic Starter

  • Members
  • 237 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:33 PM

Posted 18 May 2014 - 08:28 AM

Will do thanks.



#11 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,108 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:33 PM

Posted 18 May 2014 - 08:31 AM


You're welcome.

:thumbup2: Best Practices for Safe Computing - Tips to protect yourself against malware infection
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users