Google Redirect, I tried everything..Help!

June 30, 2009 at 15:47:11
Specs: Windows XP
Hi also am havin problems with redirect.

I used spysweeper and mcfee but it didn't see the problem.

I went to virus forums and tried to copy what others have done. I downloaded superanti spyware and malwarebytes and they both found malware and trojans which they quarenteened but i still am redirected with the google toolbar.

I tried to use combofix as i saw posted but it wont' run properly it just shows a bar loading up then nothing happens.

Right now i'm trying to use kaspersky online scan to see if can help me.

Someone please help!


See More: Google Redirect, I tried everything..Help!

Report •


#1
June 30, 2009 at 17:08:26
What site does it redirect too and what web browsers?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#2
June 30, 2009 at 22:28:57
its on both firefox and internet explorer.

google redirects me to various other webpages anytime i try to use it either via the tool bar or the actual google page. it looks like adware pages


Report •

#3
July 1, 2009 at 05:33:57
Follow these steps in order numbered:

1) Download GMER: http://gmer.net/download.php
[This version will download a randomly named file (Recommended).]

2) Disconnect from the Internet and close all running programs.

3) Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.

4) Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.

5) GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)

6) If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.

7) Now click the Scan button. If you see a rootkit warning window, click OK.

8) When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log and upload it rapidshare.com. Post the download link to the uploaded file in your post.

9) Exit GMER and re-enable all active protection when done.

Note: Please give me the exact name of the file you downloaded in step 1 + post your log from step 8 in your next post.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

Related Solutions

#4
July 1, 2009 at 09:59:05
Hi, i followed your instructions and turned off all active scanners and turned off the internet

However, when i run the file it detects an intrusion but while scanning and getting to "Hard disk/Volume 4" the program file freezes giving this error.

AppName: 6n752gcp.exe AppVer: 1.0.15.14972 ModName: 6n752gcp.exe
ModVer: 1.0.15.14972 Offset: 0000c4b1

I"m going to restart the computer and try again.


Report •

#5
July 1, 2009 at 14:29:42
Okay, after restarting the computer i was able to complete the scan. Here is the gmer.log link:

http://rapidshare.com/files/2508299...

The exact file i downloaded is 6n752gcp.exe


Report •

#6
July 1, 2009 at 14:35:03
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteAVUpdateEx( 'http://avz.virusinfo.info/avz_up/', 1, '','','');
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#7
July 2, 2009 at 00:13:18
Hello, I followed your instructions and here are the files:

virusinfo:

http://rapidshare.com/files/2509526...

DDS:

http://rapidshare.com/files/2509529...

Attach:

http://rapidshare.com/files/2509530...

I hope this is sufficient, and once again thank you for your help i really appreciate it.


Report •

#8
July 2, 2009 at 06:27:44
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('C:\WINDOWS\system\rundll32.exe','');
BC_ImportDeletedList;
ExecuteSysClean;
EcecuteRepair(7);
ExecuteRepair(13);
BC_Activate;
RebootWindows(true);
end.

2) After reboot execute following script in AVZ:

begin
CreateQurantineArchive('C:\quarantine1.zip');    
end.


A file called quarantine1.zip should be created in C:\. Upload that file to rapidshare.com and Private message me download link.

3) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

4) Please zip up C:\qoobox\quarantine and upload it, to a filehost such as http://rapidshare.com/ Then, Private Message me the Download links to the uploaded files.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#9
July 2, 2009 at 11:11:54
I had a slight complication please check your private messages.

Report •

#10
July 2, 2009 at 13:15:22
Disable your antivirus and try again. Make sure you download it again. It detected AVZ as false positive.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#11
July 2, 2009 at 19:25:58
I did it again this time disablling all antivirus. The final result was still an empty quarenteen zip.

One thing though. When running the first part of the script you gave me right before the reboot I saw an error msg in red in the log window of AVZ although the pop up that came up said "script ran with no errors"

Is there anyway i can run that script with out the reboot so i can cut and past that log to show you what errors came up?


Report •

#12
July 2, 2009 at 19:40:14
Ok continue with the rest of the steps.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#13
July 3, 2009 at 00:33:45

This is an interesting discussion.. thank you for sharing.


[url=http://pret-auto.org][color=#FFFFFF][u]pret auto[/u][/color][/url]


Report •

#14
July 3, 2009 at 09:10:53
Hi,

I"m getting pretty fustrated. Not only is the quartine.zip file empty. When i ran combo fix after following you instructions and renaming it "123.exe" all that happened was a lil graphic came up on my computer named "combofix" which had a green status bar that seemed like it was loading up, it took about 20 secs then it disappeared adn thats it. Nothing else happpened with my computer and there was no combofix.log that was created i searched my computer. The qoobox\quarentine folder is empty as well. I'm not sure what is going on why these processes are not being allowed to run appropriately.

There was no combofix.tx but there was a "bug.txt" file that was created the same time i ran combo fix i will upload that and private msg it to you. Thank you so much for your help this is really frustrating.


Report •

#15
July 3, 2009 at 09:33:17
Note if you can't run following in normal mode run it in safe mode. Follow:

Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:

# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Zip/Rar Scan log/Summary and upload it to rapidshare.com. Post download link in your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#16
July 3, 2009 at 09:45:48
Hey Neo,

I tried to run kaprasky before and it took 7 hours and was only 46% through. Have 3 drives and i dont' know how to make it just search my C: Drive.

Also i have attached the avz.log file that was produced when trying to run the script you initially gave me. Please see it in your private msg.

After you review that file should i still continue on with the scan? thanks.


Report •

#17
July 3, 2009 at 09:51:22
Follow Response Number 15 Illustrated tutorial and complete Response Number 15. No need to do AVZ anymore.

Note: Do Response Number 15 in safe mode.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#18
July 5, 2009 at 10:53:10
Sorry for the delay, 4th of july weekend i uploaded the file.

Report •

#19
July 5, 2009 at 11:22:16
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

2) House cleaning. Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#20
July 6, 2009 at 09:34:39
Ok I ran both software in safe mode with the internet off and the both found nothing. This is so frustrating because when i try to use google it still redirects and when i try to go to gmail internet explorer and firefox says the certificate is invalid.

I'm posting 4 logs: 2 logs are what superspyware and malwarebytes showed from todays scan. However, I"m also posting the logs of what i found when i first ran these two scans on around 6/30 after my computer was infected and I picked up this virus. It supposedly quarenteened and deleted these infections but my computer still has this problem.

Database version: 2379
Windows 5.1.2600 Service Pack 3

7/6/2009 8:45:49 AM
mbam-log-2009-07-06 (08-45-49).txt

Scan type: Full Scan (C:\|F:\|M:\|)
Objects scanned: 327280
Time elapsed: 1 hour(s), 53 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


UPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/06/2009 at 10:46 AM

Application Version : 4.26.1006

Core Rules Database Version : 3973
Trace Rules Database Version: 1913

Scan type : Complete Scan
Total Scan Time : 01:48:10

Memory items scanned : 275
Memory threats detected : 0
Registry items scanned : 8782
Registry threats detected : 0
File items scanned : 44107
File threats detected : 84

Adware.Tracking Cookie
C:\Documents and Settings\Michael\Cookies\michael@media6degrees[3].txt
C:\Documents and Settings\Michael\Cookies\michael@collective-media[1].txt
C:\Documents and Settings\Michael\Cookies\michael@mediaplex[3].txt
C:\Documents and Settings\Michael\Cookies\michael@yieldmanager[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.burstbeacon[3].txt
C:\Documents and Settings\Michael\Cookies\michael@eas.apm.emediate[3].txt
C:\Documents and Settings\Michael\Cookies\michael@adbrite[1].txt
C:\Documents and Settings\Michael\Cookies\michael@fastclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@stats2.clicktracks[1].txt
C:\Documents and Settings\Michael\Cookies\michael@stats.paypal[1].txt
C:\Documents and Settings\Michael\Cookies\michael@iacas.adbureau[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adbureau[1].txt
C:\Documents and Settings\Michael\Cookies\michael@zedo[1].txt
C:\Documents and Settings\Michael\Cookies\michael@stat.onestat[2].txt
C:\Documents and Settings\Michael\Cookies\michael@kontera[2].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.yieldmanager[3].txt
C:\Documents and Settings\Michael\Cookies\michael@adserver.adtechus[1].txt
C:\Documents and Settings\Michael\Cookies\michael@dc.tremormedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@xiti[2].txt
C:\Documents and Settings\Michael\Cookies\michael@doubleclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@specificclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@list[1].txt
C:\Documents and Settings\Michael\Cookies\michael@paypal.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@yadro[1].txt
C:\Documents and Settings\Michael\Cookies\michael@specificmedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@realmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@revsci[3].txt
C:\Documents and Settings\Michael\Cookies\michael@toseeka[3].txt
C:\Documents and Settings\Michael\Cookies\michael@pro-market[2].txt
C:\Documents and Settings\Michael\Cookies\michael@insightexpressai[1].txt
C:\Documents and Settings\Michael\Cookies\michael@server.cpmstar[2].txt
C:\Documents and Settings\Michael\Cookies\michael@imrworldwide[2].txt
C:\Documents and Settings\Michael\Cookies\michael@hitbox[2].txt
C:\Documents and Settings\Michael\Cookies\michael@burstbeacon[2].txt
C:\Documents and Settings\Michael\Cookies\michael@casalemedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@socialmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@adlegend[2].txt
C:\Documents and Settings\Michael\Cookies\michael@smartadserver[2].txt
C:\Documents and Settings\Michael\Cookies\michael@serving-sys[1].txt
C:\Documents and Settings\Michael\Cookies\michael@trafficmp[2].txt
C:\Documents and Settings\Michael\Cookies\michael@tribalfusion[2].txt
C:\Documents and Settings\Michael\Cookies\michael@wwww.toseeka[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.pointroll[1].txt
C:\Documents and Settings\Michael\Cookies\michael@burstnet[2].txt
C:\Documents and Settings\Michael\Cookies\michael@statcounter[1].txt
C:\Documents and Settings\Michael\Cookies\michael@apmebf[2].txt
C:\Documents and Settings\Michael\Cookies\michael@247realmedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@at.atwola[3].txt
C:\Documents and Settings\Michael\Cookies\michael@advertising[1].txt
C:\Documents and Settings\Michael\Cookies\michael@skype.122.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.burstnet[1].txt
C:\Documents and Settings\Michael\Cookies\michael@tacoda[1].txt
C:\Documents and Settings\Michael\Cookies\michael@interclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@questionmarket[3].txt
C:\Documents and Settings\Michael\Cookies\michael@ehg-emmiscommunications.hitbox[2].txt
C:\Documents and Settings\Michael\Cookies\michael@iacsb1.adbureau[1].txt
C:\Documents and Settings\Michael\Cookies\michael@richmedia.yahoo[1].txt
C:\Documents and Settings\Michael\Cookies\michael@atdmt[3].txt
C:\Documents and Settings\Michael\Cookies\michael@overture[2].txt
C:\Documents and Settings\Michael\Cookies\michael@bs.serving-sys[1].txt
C:\Documents and Settings\Michael\Cookies\michael@oasn04.247realmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@a1.interclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@atdmt[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.burstnet[2].txt
C:\Documents and Settings\Michael\Cookies\michael@mediaplex[1].txt
C:\Documents and Settings\Michael\Cookies\michael@xiti[1].txt
C:\Documents and Settings\Michael\Cookies\michael@questionmarket[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.yieldmanager[2].txt
C:\Documents and Settings\Michael\Cookies\michael@stats2.clicktracks[2].txt
C:\Documents and Settings\Michael\Cookies\michael@zedo[2].txt
C:\Documents and Settings\Michael\Cookies\michael@tacoda[3].txt
C:\Documents and Settings\Michael\Cookies\michael@tacoda[2].txt
C:\Documents and Settings\Michael\Cookies\michael@burstnet[1].txt
C:\Documents and Settings\Michael\Cookies\michael@tribalfusion[1].txt
C:\Documents and Settings\Michael\Cookies\michael@revsci[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.burstbeacon[1].txt
C:\Documents and Settings\Michael\Cookies\michael@eas.apm.emediate[2].txt
C:\Documents and Settings\Michael\Cookies\michael@at.atwola[2].txt
C:\Documents and Settings\Michael\Cookies\michael@media6degrees[1].txt
C:\Documents and Settings\Michael\Cookies\michael@apmebf[1].txt
C:\Documents and Settings\Michael\Cookies\michael@burstbeacon[1].txt
C:\Documents and Settings\Michael\Cookies\michael@doubleclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@kaspersky.122.2o7[1].txt

NOW HERE ARE THE LOGS FROM 6/30 that showed the infections that were supposedly cleaned:

Malwarebytes' Anti-Malware 1.38
Database version: 2355
Windows 5.1.2600 Service Pack 3

6/30/2009 2:09:45 PM
mbam-log-2009-06-30 (14-09-45).txt

Scan type: Full Scan (C:\|F:\|M:\|)
Objects scanned: 344969
Time elapsed: 3 hour(s), 8 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 3
Files Infected: 12

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\xInsIDE (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\kernelexe (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Temporary (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nGpxx01 (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\xInsIDE (Adware.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system\svchost.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\MSINET.oca (Rogue.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system\dop.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\Michael\application data\microsoft\internet explorer\quick launch\Antivirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.
c:\documents and settings\all users\Desktop\Antivirus Plus.lnk (Rogue.AntiVirusPlus) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pac.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\wr.txt (Malware.Trace) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\ClickToFindandFixErrors_US.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dmns.cfg (Rogue.AntiVirusPro) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\avp.id (Rogue.AntiVirusPro) -> Quarantined and deleted successfully.
C:\WINDOWS\system\cmd (Malware.Trace) -> Quarantined and deleted successfully.


UPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/30/2009 at 05:59 PM

Application Version : 4.26.1006

Core Rules Database Version : 3963
Trace Rules Database Version: 1904

Scan type : Complete Scan
Total Scan Time : 01:40:00

Memory items scanned : 269
Memory threats detected : 0
Registry items scanned : 8785
Registry threats detected : 3
File items scanned : 46061
File threats detected : 211

Adware.Vundo Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DC192567-65F9-4AB6-ADB7-E13575F81726}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks#{DC192567-65F9-4AB6-ADB7-E13575F81726}
HKU\S-1-5-21-2717771209-577382643-762127250-1005\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DC192567-65F9-4AB6-ADB7-E13575F81726}

Adware.Tracking Cookie
C:\Documents and Settings\Michael\Cookies\michael@ad.iconadserver[1].txt
C:\Documents and Settings\Michael\Cookies\michael@media6degrees[1].txt
C:\Documents and Settings\Michael\Cookies\michael@collective-media[2].txt
C:\Documents and Settings\Michael\Cookies\michael@mediaplex[1].txt
C:\Documents and Settings\Michael\Cookies\michael@banner509[2].txt
C:\Documents and Settings\Michael\Cookies\michael@electronicarts.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@optimize.indieclick[3].txt
C:\Documents and Settings\Michael\Cookies\michael@atwola[2].txt
C:\Documents and Settings\Michael\Cookies\michael@msnportal.112.2o7[2].txt
C:\Documents and Settings\Michael\Cookies\michael@invitemedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@youporn[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adbrite[3].txt
C:\Documents and Settings\Michael\Cookies\michael@redhousebanner[2].txt
C:\Documents and Settings\Michael\Cookies\michael@fastclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@s.clickability[3].txt
C:\Documents and Settings\Michael\Cookies\michael@stats2.clicktracks[1].txt
C:\Documents and Settings\Michael\Cookies\michael@cb.adbureau[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.zanox[3].txt
C:\Documents and Settings\Michael\Cookies\michael@kontera[3].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.yieldmanager[2].txt
C:\Documents and Settings\Michael\Cookies\michael@dc.tremormedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@adserver.adtechus[2].txt
C:\Documents and Settings\Michael\Cookies\michael@adserver.easyadult[1].txt
C:\Documents and Settings\Michael\Cookies\michael@doubleclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@medhelpinternational.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@aoluk.122.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@traffic.buyservices[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ar.atwola[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adinterax[2].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.lucidmedia[4].txt
C:\Documents and Settings\Michael\Cookies\michael@advertising.sheknows[1].txt
C:\Documents and Settings\Michael\Cookies\michael@specificmedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@www.apartmentfinder[2].txt
C:\Documents and Settings\Michael\Cookies\michael@realmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@microsoftgamestudio.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@insightexpressai[2].txt
C:\Documents and Settings\Michael\Cookies\michael@eaeacom.112.2o7[2].txt
C:\Documents and Settings\Michael\Cookies\michael@kellyfind[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.xapads[1].txt
C:\Documents and Settings\Michael\Cookies\michael@imrworldwide[2].txt
C:\Documents and Settings\Michael\Cookies\michael@server.cpmstar[3].txt
C:\Documents and Settings\Michael\Cookies\michael@a1.interclick[3].txt
C:\Documents and Settings\Michael\Cookies\michael@socialmedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@trafficmp[1].txt
C:\Documents and Settings\Michael\Cookies\michael@serving-sys[2].txt
C:\Documents and Settings\Michael\Cookies\michael@smartadserver[1].txt
C:\Documents and Settings\Michael\Cookies\michael@banner.getyourglamtone[1].txt
C:\Documents and Settings\Michael\Cookies\michael@tribalfusion[2].txt
C:\Documents and Settings\Michael\Cookies\michael@content.yieldmanager[2].txt
C:\Documents and Settings\Michael\Cookies\michael@clicksor[2].txt
C:\Documents and Settings\Michael\Cookies\michael@microsoftsto.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@247realmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@apmebf[1].txt
C:\Documents and Settings\Michael\Cookies\michael@animetoplist[2].txt
C:\Documents and Settings\Michael\Cookies\michael@msnbc.112.2o7[2].txt
C:\Documents and Settings\Michael\Cookies\michael@findrealbuys[1].txt
C:\Documents and Settings\Michael\Cookies\michael@at.atwola[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.widgetbucks[2].txt
C:\Documents and Settings\Michael\Cookies\michael@media.medhelp[2].txt
C:\Documents and Settings\Michael\Cookies\michael@advertising[2].txt
C:\Documents and Settings\Michael\Cookies\michael@greenlightbanner[2].txt
C:\Documents and Settings\Michael\Cookies\michael@tacoda[1].txt
C:\Documents and Settings\Michael\Cookies\michael@interclick[3].txt
C:\Documents and Settings\Michael\Cookies\michael@content.yieldmanager[3].txt
C:\Documents and Settings\Michael\Cookies\michael@ads-dev.youporn[1].txt
C:\Documents and Settings\Michael\Cookies\michael@cdn.at.atwola[1].txt
C:\Documents and Settings\Michael\Cookies\michael@microsoftwlmessengermkt.112.2o7[2].txt
C:\Documents and Settings\Michael\Cookies\michael@richmedia.yahoo[3].txt
C:\Documents and Settings\Michael\Cookies\michael@intermundomedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@atdmt[2].txt
C:\Documents and Settings\Michael\Cookies\michael@bs.serving-sys[1].txt
C:\Documents and Settings\Michael\Cookies\michael@buycom.122.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@apartmentfinder[2].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.bridgetrack[3].txt
C:\Documents and Settings\Michael\Cookies\michael@adserv.brandaffinity[2].txt
C:\Documents and Settings\Michael\Cookies\michael@specificclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@xiti[1].txt
C:\Documents and Settings\Michael\Cookies\michael@clicktorrent[1].txt
C:\Documents and Settings\Michael\Cookies\michael@208.122.40[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.imarketservices[2].txt
C:\Documents and Settings\Michael\Cookies\michael@media.buysheerskin[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.porndad[1].txt
C:\Documents and Settings\Michael\Cookies\michael@myroitracking[3].txt
C:\Documents and Settings\Michael\Cookies\michael@questionmarket[2].txt
C:\Documents and Settings\Michael\Cookies\michael@crackle[1].txt
C:\Documents and Settings\Michael\Cookies\michael@overture[2].txt
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.fastclick.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.adopt.euroclick.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.insightexpressai.com [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
.msnportal.112.2o7.net [ C:\Documents and Settings\Guest\Application Data\Mozilla\Firefox\Profiles\w440cuby.default\cookies.txt ]
C:\Documents and Settings\Guest\Cookies\guest@media6degrees[2].txt
C:\Documents and Settings\Guest\Cookies\guest@adbrite[2].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.clubplanet[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.as4x.tmcs[1].txt
C:\Documents and Settings\Guest\Cookies\guest@revsci[1].txt
C:\Documents and Settings\Guest\Cookies\guest@interclick[2].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.monster[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ad.convertsmart[2].txt
C:\Documents and Settings\Guest\Cookies\guest@myroitracking[1].txt
C:\Documents and Settings\Guest\Cookies\guest@media.ntsserve[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.adbrite[2].txt
C:\Documents and Settings\Guest\Cookies\guest@servedby.adxpower[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.mediamayhemcorp[1].txt
C:\Documents and Settings\Guest\Cookies\guest@partner2profit[1].txt
C:\Documents and Settings\Guest\Cookies\guest@adopt.euroclick[1].txt
C:\Documents and Settings\Guest\Cookies\guest@precisionclick[1].txt
C:\Documents and Settings\Guest\Cookies\guest@insightexpressai[2].txt
C:\Documents and Settings\Guest\Cookies\guest@serv.clicksor[1].txt
C:\Documents and Settings\Guest\Cookies\guest@fastclick[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.as4x.tmcs.ticketmaster[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.bridgetrack[1].txt
www.fpctraffic2.com [ C:\Documents and Settings\Michael\Application Data\Mozilla\Firefox\Profiles\i3vjf35t.default\cookies.txt ]
C:\Documents and Settings\Michael\Cookies\michael@richmedia.yahoo[1].txt
C:\Documents and Settings\Michael\Cookies\michael@fastclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@kontera[2].txt
C:\Documents and Settings\Michael\Cookies\michael@link.mercent[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.googleadservices[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ad.zanox[2].txt
C:\Documents and Settings\Michael\Cookies\michael@adserver.bettyconfidential[2].txt
C:\Documents and Settings\Michael\Cookies\michael@banner509[1].txt
C:\Documents and Settings\Michael\Cookies\michael@smartadserver[2].txt
C:\Documents and Settings\Michael\Cookies\michael@myroitracking[2].txt
C:\Documents and Settings\Michael\Cookies\michael@paypal.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@collective-media[1].txt
C:\Documents and Settings\Michael\Cookies\michael@msnbc.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@specificmedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.mediamayhemcorp[1].txt
C:\Documents and Settings\Michael\Cookies\michael@advertising.paltalk[1].txt
C:\Documents and Settings\Michael\Cookies\michael@z.blogads[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.bridgetrack[2].txt
C:\Documents and Settings\Michael\Cookies\michael@mediaoutrage[1].txt
C:\Documents and Settings\Michael\Cookies\michael@skype.122.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@socialmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@s.clickability[2].txt
C:\Documents and Settings\Michael\Cookies\michael@interclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.clicktorrent[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.addfreestats[1].txt
C:\Documents and Settings\Michael\Cookies\michael@www.tomtracker[2].txt
C:\Documents and Settings\Michael\Cookies\michael@e-2dj6wml4sgc5ekq.stats.esomniture[1].txt
C:\Documents and Settings\Michael\Cookies\michael@serw.clicksor[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adbrite[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.evasivelabs[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.widgetbucks[1].txt
C:\Documents and Settings\Michael\Cookies\michael@crackle[2].txt
C:\Documents and Settings\Michael\Cookies\michael@chitika[1].txt
C:\Documents and Settings\Michael\Cookies\michael@sales.liveperson[2].txt
C:\Documents and Settings\Michael\Cookies\michael@sales.liveperson[1].txt
C:\Documents and Settings\Michael\Cookies\michael@microsoftwlmessengermkt.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@revsci[2].txt
C:\Documents and Settings\Michael\Cookies\michael@track.ireel[2].txt
C:\Documents and Settings\Michael\Cookies\michael@tracking.realtor[2].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.ad4game[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.clicksor[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.monster[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.bootcampmedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@intermundomedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@dc.tremormedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.lucidmedia[2].txt
C:\Documents and Settings\Michael\Cookies\michael@optimize.indieclick[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.lucidmedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.lucidmedia[3].txt
C:\Documents and Settings\Michael\Cookies\michael@microsoftwindows.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@media6degrees[2].txt
C:\Documents and Settings\Michael\Cookies\michael@d.mediaforceads[2].txt
C:\Documents and Settings\Michael\Cookies\michael@d.kaizentraffic[1].txt
C:\Documents and Settings\Michael\Cookies\michael@invitemedia[1].txt
C:\Documents and Settings\Michael\Cookies\michael@adserver.adtechus[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ad3.clickhype[1].txt
C:\Documents and Settings\Michael\Cookies\michael@eaeacom.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.imarketservices[1].txt
C:\Documents and Settings\Michael\Cookies\michael@a1.interclick[2].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.associatedcontent[1].txt
C:\Documents and Settings\Michael\Cookies\michael@ads.thesmokinggun[1].txt
C:\Documents and Settings\Michael\Cookies\michael@borders.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@buzznet.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@insightexpressai[1].txt
C:\Documents and Settings\Michael\Cookies\michael@msnportal.112.2o7[1].txt
C:\Documents and Settings\Michael\Cookies\michael@server.cpmstar[1].txt

Browser Hijacker.Favorites
C:\DOCUMENTS AND SETTINGS\MICHAEL\DESKTOP\DESK TOP ICONS\CLICK TO FIND AND FIX ERRORS.URL

Malware.Installer-Pkg/Gen
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{6B6A7665-DB48-4762-AB5D-BEEB9E1CD7FA}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{26D2C2C3-CF14-4ED7-B1FC-0BE64AFBA3B3}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{3C48F877-A164-45E9-B9DA-26A049FFC207}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{6293BC00-4EB8-4C65-8548-53E2FC3BF937}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{651956B7-1969-42AA-9453-E0B813019D54}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{989E4C3B-B2C9-4486-9A09-D5A8F953837C}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{C0A0AA4D-C79B-48CA-8843-2B02B626C9E6}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{C2D8F0E2-6978-4409-8351-BA8785DA11EE}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{D1A6F3FD-7B40-443F-8767-BADB25A0D222}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{E0814F95-5380-4892-B8C8-7FA4B349EF46}.EXE

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\CCBEG.INI
C:\WINDOWS\SYSTEM32\CCBEG.INI2
C:\WINDOWS\SYSTEM32\EGJLM.INI
C:\WINDOWS\SYSTEM32\STVWA.BAK1

One last piece of information:

One all this happened, my mcaffee virus scanner picked up some errors on 6/29. I had restarted my computer and it kept shutting down svchost.exe saying it was running an illegal operation this happened about 10 times before my computer started and I was able to run windows. I will private message you the logs from mcacfee showing what it found privately. It also quarenteened 6 versions of the redirect virus that are still in quarentine from 6/29.

One again thank you, i know this is more work then both of us though this would be.


Report •

#21
July 6, 2009 at 10:06:25
Run Response Number 8 Step 1 and 2 in safe mode. Then remake a new hijackthis log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#22
July 6, 2009 at 13:37:32
I dont 'know what the heck happened, but it think its gone!

I ran what you told me but everything still looked the same, although hijack this did look a lil different.

i will send u the file. thank you so much for your help i can now go into gmail and use google search...


Report •

#23
Report •

#24
July 9, 2009 at 02:24:34
I spoke to soon, i thought i had cleaned the system completely but i'm getting redirected to brazzers.com when i try to access flurl.com..

then i looked it up and i see that that redirect happens for a few other video sites that are mostly adult so i attempted to acces them to see if it would give me the same issue and it did.

so i still have some sort of redirect virus on my computer.

have you heard of this one?


Report •

#25
July 10, 2009 at 06:20:26
Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:
# Check below options:

    * Select all the objects/places to be scanned. 

# Click Scan
# Fix what it detects
# Zip/Rar Scan log/Summary and upload it to rapidshare.com. Post download link in your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •


Ask Question