Google redirect hijack

Compaq / Presario sr1650 nx
June 4, 2009 at 23:37:36
Specs: Windows XP Media Center Edition 2005 SP3, AMD Athlon 64 3500+/1.0GB memory (448 MB RAM)
For the past almost a week, when I've tried searching in Google and/or Yahoo, the links lead to some nonsense/gibberish site. Just now, I can't even get Google to load (page not found) and many of the links I've tried to click say google-redirect.com or something like that at the start of the URLs.

I turned off System Restore and did the Malwarebytes Anti-Malware and nothing was found. Also did the disk cleanup too.

I was told to try deleting Google items in the registry (which I don't know if I did it right or not) as well as try this

http://www.spyware-techie.com/troja...

which also did not help.

To make matters worse, I have NO previous system restore points (as I turned it off to do the MBAM) and can't create any new ones. Tells me to restart the computer & try again.

I can't update the MBAM I have either. Tried to earlier this week and it wouldn't update. Installer problem? Maybe I need to get rid of the older version and its installer THEN get the new one?

My clock is now in "military time" or 24 hour time and doesn't show A.M./P.M.

Please help me out. I'm not that technical and would need it explained simply. I've tried reading some of the other posts and it looks like it's going to take downloading/installing/uninstalling 4 or 5 programs to clean this up?

Thanks in advance.


See More: Google redirect hijack

Report •


#1
June 5, 2009 at 05:00:27
Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:
# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Attach Scan log/Summary to your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

-------------------------------------------------


Report •

#2
June 5, 2009 at 21:24:26
Trying to download it now, but the server already reset on me TWICE so I have to start over. I'm on dial-up so the estimated time is around 11 to 12 HOURS to get the Kaspersky AVP tool. So if you don't hear back from me right away, you'll know why.

Report •

#3
June 5, 2009 at 21:31:05
You can use downloader so that u can resume. Or use eset/bitdefender online scanners.

-------------------------------------------------


Report •

Related Solutions

#4
June 5, 2009 at 21:48:14
I ran the ESET Online Scanner.
It found 3 threats. This SmitFraudFix was what someone told me was supposed to FIX the problem.
I deleted the quarantined files.
Going to try the BitDefender next.


C:\Documents and Settings\Administrator\Desktop\SmitfraudFix.exe multiple threats deleted - quarantined
C:\Documents and Settings\Administrator\Desktop\SmitfraudFix\Process.exe Win32/PrcView application cleaned by deleting - quarantined
C:\Documents and Settings\Administrator\Desktop\SmitfraudFix\restart.exe Win32/Shutdown.NAA application cleaned by deleting - quarantined


Report •

#5
June 8, 2009 at 03:29:14
I tried unsuccessfully to scan with the BitDefender online scanner. After installing/updating it yesterday, it kept freezing up after trying to update the virus signatures (at 100%). Now when it actually started scanning, it found & deleted a trojan in about 10 minutes, but my computer completely froze up and I had to "force" it off and then on again by pushing the power button. This happened TWICE.

What's the next suggestion?
MBAM or HijackThis?

Thanks.


Report •

#6
June 8, 2009 at 05:46:27
Post these two logs:
1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the logfile, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Can you also make a new HijackThis log and upload it to rapidshare.com. HijackThis: Here

-------------------------------------------------


Report •

#7
June 9, 2009 at 01:35:57
hope I'm doing this right-never used rapidshare before

AVZ log

http://rapidshare.com/files/2425239...

HiJackThis log

http://rapidshare.com/files/2425251...



Report •

#8
June 9, 2009 at 05:52:18
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('C:\WINDOWS\system32\config\SYSTEM~1\protect.dll','');
 QuarantineFile('C:\WINDOWS\system32\autochk.dll','');
 QuarantineFile('C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\ChkDisk.dll','');
 QuarantineFile('C:\WINDOWS\system32\CSHelper.exe','');
 QuarantineFile('C:\WINDOWS\system32\imod9.dll','');
 QuarantineFile('C:\DOCUME~1\ADMINI~1\protect.dll','');
 QuarantineFile('\\?\globalroot\systemroot\system32\kungsfmsrsnoxv.dll','');
 DeleteFile('\\?\globalroot\systemroot\system32\kungsfmsrsnoxv.dll');
 DeleteFile('C:\DOCUME~1\ADMINI~1\protect.dll');
 DeleteFile('C:\WINDOWS\system32\imod9.dll');
 DeleteFile('C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\ChkDisk.dll');
 DeleteFile('C:\WINDOWS\system32\autochk.dll');
 DeleteFile('C:\WINDOWS\system32\config\SYSTEM~1\protect.dll');
BC_ImportAll;
ExecuteSysClean;
 ExecuteRepair(13);
 ExecuteRepair(14);
 ExecuteRepair(15);
BC_Activate;
RebootWindows(true);
end.

2) After reboot execute following script in AVZ:

begin
CreateQurantineArchive('C:\quarantine1.zip');    
end.

3) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

-------------------------------------------------


Report •

#9
June 10, 2009 at 00:15:54
ComboFix log

http://rapidshare.com/files/2428855...


Report •

#10
June 10, 2009 at 06:52:03
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
QuarantineFile('c:\windows\system32\[u]0[/u]0setup.exe','');
QuarantineFile('c:\windows\system32\zekizuma.exe','');
DeleteFile('c:\windows\system32\zekizuma.exe');
QuarantineFile('c:\documents and settings\Administrator\Application Data\wklnhst.dat','');
DeleteFile('c:\documents and settings\Administrator\Application Data\wklnhst.dat');
BC_ImportDeletedList;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

2) Run this script in AVZ:

begin
CreateQurantineArchive('c:\quarantine.zip');
end.

3) A file called quarantine.zip should be created in C:\. Then please zip up C:\qoobox\quarantine and upload it, C:\quarantine.zip and C:\quarantine1.zip to a filehost such as http://rapidshare.com/ Then, Private Message me the Download link to the uploaded file.


4) Lastly, uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok. Or Start > run > type 123 /u > ok.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#11
June 13, 2009 at 04:56:26
Thanks for the files. Please follow these steps in order numbered and post summary log after each step.

1) If you use Windows System restore, turn it off > reboot. How to turn it off/on: http://support.kaspersky.com/faq/?q... Run a full scan with:

Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:

# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Attach Scan log/Summary to your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

2) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

3) House cleaning. Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#12
June 14, 2009 at 03:20:41
Once again, I wasn't able to download the AVP tool. Crashed / "reset" on me 5 or 6 times. How / where do I use the "resume downloading" thing? I can't remember.

Or should I try the ESET or BitDefender online scanner again? BD froze up on me when I tried that before & I had to force my computer off/on.

Thanks.


Report •

#13
June 14, 2009 at 06:27:56
Run "Check disk" on your hardrive and follow these two:

1) http://onecare.live.com/site/en-Us/...
2) http://onecare.live.com/site/en-Us/...

After that try to follow: Response Number 11 step 1 in safe mode.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#14
June 16, 2009 at 22:56:43
I did the OneCare cleanup & tuneup.

I still can't download the AVP Tool no matter what. The server still crashes/resets on me every time and I've been trying repeatedly for the past 2 nights.

Should I move on to the next step?


Report •

#15
June 24, 2009 at 23:09:17
Malwarebytes' Anti-Malware 1.38
Database version: 2297
Windows 5.1.2600 Service Pack 3

6/25/2009 1:58:06 AM
mbam-log-2009-06-25 (01-58-06).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 189587
Time elapsed: 2 hour(s), 2 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\documents and settings\administrator\Desktop\avz4\avz4\quarantine\2009-06-10\avz00001.dta (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\administrator\Desktop\avz4\avz4\quarantine\2009-06-10\avz00002.dta (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\administrator\Desktop\avz4\avz4\quarantine\2009-06-10\avz00003.dta (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\administrator\Desktop\avz4\avz4\quarantine\2009-06-10\avz00006.dta (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\administrator\Desktop\avz4\avz4\quarantine\2009-06-10\avz00007.dta (Trojan.TDSS) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\config\systemprofile\start menu\Programs\Startup\ChkDisk.dll (Trojan.Downloader) -> Quarantined and deleted successfully.


Report •

#16
June 29, 2009 at 23:17:50
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/30/2009 at 01:46 AM

Application Version : 4.26.1006

Core Rules Database Version : 3962
Trace Rules Database Version: 1903

Scan type : Complete Scan
Total Scan Time : 01:01:52

Memory items scanned : 488
Memory threats detected : 0
Registry items scanned : 5750
Registry threats detected : 1
File items scanned : 27117
File threats detected : 175

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@euroclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@media6degrees[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@banner_js[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bluestreak[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@socialmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.adtechus[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@xiti[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@b5media[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@s.clickability[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adbrite[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adlytics[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cbs.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnportal.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advertising.sheknows[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@walmartcom.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@burstbeacon[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.bauerpublishing[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@2o7[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@at.atwola[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@kaspersky.122.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@chitika[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstbeacon[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adrevolver[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@overture[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@invitemedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adjuggler[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cgi-bin[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@qnsr[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@oasn04.247realmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@banner_js[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@content.yieldmanager[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@atwola[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@microsoftwlmessengermkt.112.2o7[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@eas.apm.emediate[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cgm.adbureau[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnservices.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.undertone[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@interclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@kontera[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cdn4.specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@warnerbrosads.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@msnbc.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@questionmarket[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@rotator.adjuggler[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@statcounter[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@a1.interclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adlegend[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@scotts.122.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@sugarloot.teen[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advertising[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@mediaplex[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@videoegg.adbureau[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@collective-media[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.bridgetrack[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@c7.zedo[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.pointroll[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ak[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@zedo[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@media.adrevolver[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.yieldmanager[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstnet[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@html[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@warnerbros.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tacoda[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.techguy[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.mediamayhemcorp[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ncp.imrworldwide[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@smartadserver[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@insightexpressai[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.findstuff[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@safeway.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adbureau[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ehg-eset.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@network.realmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@polls.clickability[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cdn.at.atwola[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ad.bodybuilding[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@yieldmanager[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@borders.112.2o7[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@www.homemediaretailing[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@bfast[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@media5.sitebrand[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@itxt.vibrantmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@fhm.valueclick[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@homemediaretailing[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-stubhub.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-eline.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@teenmag[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-mastercard.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@pt.crossmediaservices[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@insightexpressai[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@teenscenemag[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@icc.intellisrv[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-warnerbrothers.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@questionpro[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-hillspet.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-questex.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@id.teenblvd[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@banners.nbcupromotes[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-davita.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@classicmedia.eprize[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@trafficresults[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-gameshownet.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-newyorklife.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@soundtrack[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@clickability[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@teenhollywood[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-dig.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-zoomerang.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-lgusa.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@citi.bridgetrack[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-knightridder.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-designreactor.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@s.clickability[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@admarketplace[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-wacomtechnology.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@goodcounter[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@insightfirst[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-nestleusainc.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-chrysler.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-hasbro.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@indexstats[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@partner2profit[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ww2.xfxmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-viacom.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@monstersandcritics.advertserve[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-hitent.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@roiservice[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@adopt.euroclick[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@www.29insidetrack[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@doubleclick[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-kodak.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-harleydavidson.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@vhost.oddcast[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@revsci[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@teenfx[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-ctv.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-hollywood.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@valueclick[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@valueclick[3].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-bestbuy.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@account.winzy[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@countryweekly[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@moviepie.sitetracker[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@www.macromedia[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-attworldnet.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-stampsdotcom.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-churchilldownsinc.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-console.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@medianewsgroup[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ads.tbs[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg-zoom.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@s.teenblvd[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@image.masterstats[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@ehg.hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@sales.liveperson[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@indextools[1].txt
C:\Documents and Settings\Administrator\Cookies\compaq_administrator@2.go.globaladsales[1].txt

Rogue.Component/Trace
HKU\S-1-5-21-1251991624-339526414-3531243508-500\Software\Microsoft\FIAS4057

Trojan.Agent/Gen-iMod
C:\WINDOWS\SYSTEM32\00SETUP.EXE
C:\WINDOWS\Prefetch\00SETUP.EXE-118D8A03.pf


Report •

#17
July 3, 2009 at 21:01:55
What's the next step? Thanks.

Report •

#18
July 3, 2009 at 22:06:50
Isn't your original problem fixed? What is still broken?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#19
July 4, 2009 at 03:38:07
It appears that things are cleaned up. I no longer have the Google redirect issue. I would like to uninstall the programs I installed to clean this up (MBAM, AVZ, BitDefender Online Scanner, HiJackThis, SUPERAntiSpyware, etc.) so I can install the retail Kaspersky Anti-Virus/Anti-Spyware software I purchased. Wasn't sure if there was any specific order or instructions I needed to uninstall any of them.

The one remaining problem is that my clock in the bottom right is in military time and I would like to get it back to the 12-hour time with the A.M./P.M. next to it.


Report •

#20
July 4, 2009 at 04:21:48
For Combofix: uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok.

For AVZ: Just delete the folder.

For rest of them go to control panel add/remove programs.

Clock problem: http://www.pixel2life.com/publish/t...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •


Ask Question