Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Can't shake loose of Zoomify


  • This topic is locked This topic is locked
9 replies to this topic

#1 KeiranHalcyon

KeiranHalcyon

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:51 AM

Posted 03 February 2015 - 11:29 PM

Windows 7 Pro 64-bit

 

I noticed this afternoon that the Web was unusually full of ads - popups, videos playing in the margins of pages, etc. I ran MBAM and found instances of Zoomify, SearchProtect, and  WebSpeed. Multiple quarantines, reboots and re-runs of MBAM in normal and safe mode have had no effect. There's clearly a piece that's being missed, and I don't know enough about this beastie to know where to look. Even now Chrome is opening new tabs with practically every click and popover ads on every page.

 

TIA



BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,404 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:51 PM

Posted 03 February 2015 - 11:38 PM

Hello Keiran..

First look in Control Panel/uninstall and remove Zoomify if there.

Now look in your browsers add-ons/extentions for it ...and disable or remove any unwanted add-ons from your browser:There are also more suggestion in these articles:zcMPezJ.pngAdwCleaner
  • Please download AdwCleaner by Xplode and save to your Desktop.
  • Double click on AdwCleaner.exe to run the tool. Vista/Windows 7/8 users right-click and select Run As Administrator
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
lv0mVRW.pngJunkware Removal Tool
  • Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
cvMlKv6.pngESET Online Scanner
  • Hold down Control and click on this link to open ESET Online Scanner in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE: Sometimes if ESET finds no infections it will not create a log.
51a46ae42d560-malwarebytes_anti_malware.Malwarebytes Anti-Malware
  • Download MalwareBytes Anti-Malware to your desktop.
  • Double-click mbam-setup-2.0.exe to start the installation of Malwarebytes Anti-Malware.
  • Follow the instructions on your screen to complete the installation. You can find the complete installation procedure here.
  • Click the Scan Now button, a threat scan will start automatically.
  • MalwareBytes Anti-Malware will now check for the latest updates. Click Update Now if new updates are available.
  • Your computer is now being scanned, please do not use your computer during the scan.
    • If no threats were found, click View detailed log.
      • Click Export and save the log as a .txt file on your Desktop or another location.
    • If the scan detected any threats, click Apply Actions.
      • To complete any actions taken you will be prompted to restart your computer...click on Yes.
      • After reboot, start Malwarebytes Anti-Malware again and click the History Tab at the top and select Application Logs.
      • Check the box next to Scan Log. Choose the most current scan and click View.
      • Click Export and save the log as a .txt file on your Desktop or another location.
  • Providing the MalwareBytes' Anti-Malware log file
    • Attach the log file you just saved to your next reply for further review.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 KeiranHalcyon

KeiranHalcyon
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:51 AM

Posted 04 February 2015 - 07:58 AM

ADWCleaner log:
 

# AdwCleaner v4.109 - Report created 03/02/2015 at 22:51:05
# Updated 24/01/2015 by Xplode
# Database : 2015-02-03.1 [Live]
# Operating System : Windows 7 Professional Service Pack 1 (64 bits)
# Username : Sheldon - LIVINGROOM
# Running from : D:\Users\Family\Desktop\AdwCleaner.exe
# Option : Scan
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
 
***** [ Scheduled Tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17496
 
 
-\\ Mozilla Firefox v20.0 (en-US)
 
 
-\\ Google Chrome v40.0.2214.94
 
[C:\Users\Sheldon\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
[C:\Users\Sheldon\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://en.softonic.com/s/{searchTerms}
[C:\Users\Sheldon\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://search.aol.com/aol/search?q={searchTerms}
 
*************************
 
AdwCleaner[R0].txt - [5869 octets] - [03/02/2015 17:09:30]
AdwCleaner[R1].txt - [1005 octets] - [03/02/2015 17:21:17]
AdwCleaner[R2].txt - [1495 octets] - [03/02/2015 22:45:36]
AdwCleaner[R3].txt - [1266 octets] - [03/02/2015 22:51:05]
AdwCleaner[S0].txt - [5740 octets] - [03/02/2015 17:16:34]
 
########## EOF - \AdwCleaner\AdwCleaner[R3].txt - [1386 octets] ##########
 
 
 
 
 
 
JRT Log:
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.2 (02.02.2015:1)
OS: Windows 7 Professional x64
Ran by Sheldon on Tue 02/03/2015 at 22:54:13.31
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
Successfully deleted: [File] "C:\Windows\couponprinter.ocx"
 
 
 
~~~ Folders
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Tue 02/03/2015 at 22:58:01.06
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

 

 

 

 

ESET log:

 

C:\Users\Family\AppData\Local\Temp\nsg4B6B.tmp\Helper.dll a variant of Win32/Toolbar.SearchSuite.W potentially unwanted application deleted - quarantined
C:\Users\Family\AppData\Local\Temp\nsm9A91.tmp\Helper.dll a variant of Win32/Toolbar.SearchSuite.W potentially unwanted application deleted - quarantined
C:\Users\Family\AppData\Local\Temp\nsnDBC7.tmp\Helper.dll a variant of Win32/Toolbar.SearchSuite.C potentially unwanted application deleted - quarantined
C:\Users\Sheldon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXOUZRW3\SearchProtect_1611[1].exe Win32/Conduit.SearchProtect.N potentially unwanted application deleted - quarantined
C:\Users\Sheldon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F5HY96A4\Stub[1].exe a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
C:\Users\Sheldon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FE12ZHO4\VOPackage_1712[1].exe Win32/VOPackage.AZ potentially unwanted application deleted - quarantined
C:\Users\Sheldon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H64V14KS\Setup[1].exe a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\Main\bin\CltMngSvc.exe.vir a variant of Win32/Conduit.SearchProtect.Y potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\Main\bin\SPtool.dll.vir a variant of Win32/Conduit.SearchProtect.Y potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\Main\bin\uninstall.exe.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\cltmng.exe.vir a variant of Win32/Conduit.SearchProtect.Y potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\RN32.dll.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\SPtool64.exe.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\VC32.dll.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\VC32Loader.dll.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\VC64.dll.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\SearchProtect\bin\VC64Loader.dll.vir a variant of Win32/ClientConnect.A potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Program Files (x86)\SearchProtect\UI\bin\cltmngui.exe.vir a variant of Win32/Conduit.SearchProtect.Y potentially unwanted application deleted - quarantined
D:\AdwCleaner\Quarantine\C\Users\Sheldon\AppData\Local\Browser Extensions\Client.exe.vir a variant of MSIL/Adware.iBryte.S application cleaned by deleting - quarantined
D:\AdwCleaner\Quarantine\C\Users\Sheldon\AppData\Roaming\VOPackage\VOPackage.exe.vir Win32/VOPackage.AZ potentially unwanted application deleted - quarantined
D:\Program Files (x86)\Maxis\SimCity 4 Deluxe\Apps\SimCity 4.exe a variant of Generik.FQMNCYT trojan cleaned by deleting - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF10.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF11.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF12.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF13.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF14.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF15.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF16.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF17.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF18.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF19.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF20.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF4.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF5.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF6.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF7.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF8.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Desktop\Old Firefox Data\extensions\{C4A4F5A0-4B89-4392-AFAC-D58010E349AF}\components\DatamngrHlpFF9.dll a variant of Win32/Toolbar.SearchSuite.D potentially unwanted application deleted - quarantined
D:\Users\Family\Documents\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653 (1).exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined
D:\Users\Family\Documents\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653.exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined
D:\Users\Family\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653 (1).exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined
D:\Users\Family\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653.exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined
D:\Users\Family\Downloads\pea-sici4del\SimCity 4.exe a variant of Generik.FQMNCYT trojan cleaned by deleting - quarantined
E:\Documents and Settings\Family\My Documents\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653 (1).exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined
E:\Documents and Settings\Family\My Documents\Downloads\cbsidlm-tr1_6-Jedi_Knight_II_Jedi_Outcast_104_patch-10236653.exe Win32/DownloadAdmin.G potentially unwanted application deleted - quarantined

 

 

 

 

 

 

 

 

MBAM log:

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 2/4/2015
Scan Time: 6:39:59 AM
Logfile: MBAMLog.txt
Administrator: No
 
Version: 2.00.4.1028
Malware Database: v2015.02.04.05
Rootkit Database: v2015.02.03.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Family
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 296137
Time Elapsed: 7 min, 23 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled
 
Processes: 3
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\coz32host.exe, 7368, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b]
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\coz64host.exe, 5356, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b]
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\cozahost.exe, 3124, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b]
 
Modules: 12
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomutil32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
 
Registry Keys: 2
PUP.Optional.Zoomify.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\cozaghost, Delete-on-Reboot, [d99ce03af496cb6bbec4cfb807fc05fb], 
PUP.Optional.Zoomify.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\cozwdhost, Delete-on-Reboot, [423345d598f254e2ee9590f7709354ac], 
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 3
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
 
Files: 17
PUP.Optional.Zoomify.A, C:\ProgramData\makulitsidwe\1.1.0.29\cozaghost.exe, Delete-on-Reboot, [d99ce03af496cb6bbec4cfb807fc05fb], 
PUP.Optional.Zoomify.A, C:\ProgramData\makulitsidwe\1.1.0.29\cozwdhost.exe, Delete-on-Reboot, [423345d598f254e2ee9590f7709354ac], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\coz32host.exe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\coz64host.exe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\cozahost.exe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\logo.ico, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\Uninstaller.exe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\utils.exe, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoom.xpi, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomL64.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\webzoomutil32.dll, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content\dgapi.js, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content\dgmain.js, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content\dgmain_app_bg.js, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content\dgmain_app_cs.js, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
PUP.Optional.WebSpeed.A, C:\ProgramData\makulitsidwe\1.1.0.29\content\jquery4toolbar.js, Delete-on-Reboot, [99dcfd1d4545c76f7317007ff50ec53b], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,404 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:51 PM

Posted 04 February 2015 - 09:29 AM

Reboot the machine and see how it is now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 KeiranHalcyon

KeiranHalcyon
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:51 AM

Posted 04 February 2015 - 06:21 PM

Not in the clear yet - still loading advertisement media frames and unwanted sites.



#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,404 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:51 PM

Posted 04 February 2015 - 08:49 PM

Let's do 2 more...
  • Download TDSSKiller and save it to your desktop.
  • Extract (unzip) its contents to your desktop.
  • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is required, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
And

Download 51a5f31352b88-icon_MBAR.pngMalwarebytes Anti-Rootkit to your desktop.
  • Double click on downloaded file. OK self extracting prompt.
  • Warning! Malwarebytes Anti-Rootkit needs to be run from an account with administrator rights.
  • MBAR will start. Click in the introduction screen "next" to continue.
  • Click in the following screen "Update" to obtain the latest malware definitions.
  • Once the update is complete select "Next" and click "Scan".
  • When the scan is finished and no malware has been found select "Exit".
  • If malware was detected, make sure to check all the items and click "Cleanup". Reboot your computer.
  • Open the MBAR folder and paste the content of the following files in your next reply:
    • "mbar-log-{date} (xx-xx-xx).txt"
    • "system-log.txt"

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 KeiranHalcyon

KeiranHalcyon
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:51 AM

Posted 04 February 2015 - 09:10 PM

Both tools ran; neither found anything.



#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,404 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:51 PM

Posted 04 February 2015 - 09:30 PM

Rats! We need a deeper look to find it's hooks.

Please follow this Preparation Guide and post in a new topic.
Let me know if all went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 KeiranHalcyon

KeiranHalcyon
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:51 AM

Posted 04 February 2015 - 10:11 PM

Topic posted in the removal logs forum. Thanks for your help.



#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,404 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:51 PM

Posted 05 February 2015 - 12:02 PM

Thank you, we will find it there.

 

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.
Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.
The current wait time is 1 - 3 days and ALL logs are answered.
If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.
To avoid confusion, I am closing this topic.


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users