Originally posted by rmano:
Originally posted by 2oldGeek:
Looks good,
Please run a scan with SuperAntiSpyware and it should clean up any leftovers and maybe find something that was missed in your first scan:
Vista and 7 users - to turn off UAC ( UAC = User Account Control )
1. Click Start, and then click Control Panel.
2. In Control Panel, click User Accounts.
3. In the User Accounts window, click User Accounts.
4. In the User Accounts tasks window, click Turn User Account Control on or off.
5. If UAC is currently configured in Admin Approval Mode, the User Account Control message appears. Click Continue.
6. Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK. If it is already uncheck, then you should also notice a red shield with an X in it located in your system tray. Ignore any mesages about UAC being disabled.
7. Click Restart Now to apply the change right away. (Restart even if you did not make the above change, we need to be sure that a reboot has occurred since the first time that UAC was disabled.)
NOTE: DO NOT CONTINUE UNTIL UAC has been disabled and you have rebooted.
Reverse the process to turn UAC back on after completing your scans:
Download
SUPERAntispyware Free Edition (SAS)
Double-click the icon on your desktop to run the installer.
When asked to
Update the program definitions, click
Yes
If you encounter any problems while downloading the updates, manually download and unzip them from HERE.
Next click the
Preferences button.
Click the
Scanning Control tab.
Under
Scanner Options make sure only the following are checked:
o Close browsers before scanning
o Scan for tracking cookies
o Terminate memory threats before quarantining
o Please leave the others unchecked.
Click the
Close button to leave the control center screen.
On the main screen click
Scan your computer
On the left check the box for the drive you are scanning.
On the right choose
Perform Complete Scan
Click
Next to start the scan. Please be patient while it scans your computer.
After the scan is complete a summary box will appear. Click
OK
Make sure everything in the white box has a check next to it, then click
Next
It will quarantine what it found and if it asks if you want to reboot, click
Yes
To retrieve the removal information please do the following:
o After reboot, double-click the SUPERAntiSpyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (preferably Notepad).
o Save the notepad file to your desktop by clicking (in notepad) File > Save As...
Click close and close again to
exit the program.
Please copy and then paste the log in your next post.
2oG
I don't see how to disable UAC in the User Control window. There is no box to click.
Figured it out.
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 03/31/2010 at 04:37 PM
Application Version : 4.35.1000
Core Rules Database Version : 4755
Trace Rules Database Version: 2567
Scan type : Complete Scan
Total Scan Time : 00:34:44
Memory items scanned : 556
Memory threats detected : 0
Registry items scanned : 7233
Registry threats detected : 0
File items scanned : 33380
File threats detected : 67
Adware.Tracking Cookie
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\baby@atdmt[2].txt
C:\Users\AppData\Local\Temp\Cookies\@atdmt[2].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@ad.wsod[2].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@ads.cnn[1].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@atdmt[2].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@bs.serving-sys[2].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@doubleclick[1].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@msnportal.112.2o7[1].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@openxxx.viragemedia[1].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@revsci[1].txt
C:\Users\AppData\Local\Temp\Low\Cookies\@serving-sys[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@adserver.adtechus[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@tribalfusion[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@cdn4.specificclick[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@apmebf[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@specificclick[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@adecn[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@media6degrees[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ads.bleepingcomputer[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ads.gmodules[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@serving-sys[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@counter.rewardsnetwork[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@tacoda[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@at.atwola[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@smartadserver[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@adbrite[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@content.yieldmanager[3].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@trvlnet.adbureau[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ads.cnn[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@247realmedia[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@2o7[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@a1.interclick[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@account.live[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ad.wsod[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ad.yieldmanager[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ads.pointroll[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@ads.undertone[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@advertising[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@atdmt[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@collective-media[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@bs.serving-sys[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@chitika[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@content.yieldmanager[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@data.coremetrics[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@doubleclick[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@fastclick[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@hospitalityebusiness.112.2o7[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@imrworldwide[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@insightexpressai[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@interclick[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@invitemedia[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@kontera[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@mediaplex[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@msnaccountservices.112.2o7[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@msnportal.112.2o7[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@oasn04.247realmedia[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@pointroll[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@questionmarket[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@realmedia[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@revsci[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@richmedia.yahoo[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@specificmedia[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@statcounter[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@trafficmp[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@traveladvertising[2].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@xiti[1].txt
C:\Users\AppData\Roaming\Microsoft\Windows\Cookies\Low\@zedo[2].txt