Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Overclick.cn - Search Redirect


  • Please log in to reply
3 replies to this topic

#1 troytucker

troytucker

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:52 PM

Posted 05 July 2009 - 11:50 AM

This seems to be a common problem, but when I click on a search result (both in google and bing), my searches are re-directed all over the place. The main domain that usually comes up is overclick.cn. I've run malwarebytes and it came up clean. I've downloaded combofix already too but see that I need guidance before I run it.
Thanks a lot,

Troy

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:52 PM

Posted 05 July 2009 - 01:36 PM

Hello, Please start with a ROOTREPEAL

Next Please install RootRepeal scan.


Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K.
Unzip that,(7-zip tool if needed) and then click RootRepeal.exe to open the scanner.
Next click on the Report tab, now click on Scan. A Window will open asking what to include in the scan. Check all of the below and then click OK.

Drivers
Files
Processes
SSDT
Stealth Objects
Hidden Services


Now you'll be asked which drive to scan. Check C: and click OK again and the scan will start. Please be patient as the scan runs. When the scan has finished, click on Save Report.
Name the log RootRepeal.txt and save it to your Documents folder (it should automatically save it there).
Please copy and paste that into your next reply.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 troytucker

troytucker
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:52 PM

Posted 05 July 2009 - 01:57 PM

Here's the report. Thanks a lot for helping. I think it's awesome that you guys do this.

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Time: 2009/07/05 12:50
Program Version: Version 1.3.0.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEE1BE000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7C53000 Size: 8192 File Visible: No Signed: -
Status: -

Name: ejeaxnr.sys
Image Path: C:\WINDOWS\system32\drivers\ejeaxnr.sys
Address: 0xF6BD4000 Size: 61440 File Visible: No Signed: -
Status: -

Name: hiber_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\hiber_WMILIB.SYS
Address: 0xF7CC7000 Size: 8192 File Visible: No Signed: -
Status: -

Name: hjgruiqmdwjneo.sys
Image Path: C:\WINDOWS\system32\drivers\hjgruiqmdwjneo.sys
Address: 0xEE457000 Size: 163840 File Visible: - Signed: -
Status: Hidden from Windows API!

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xED0EB000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\hjgruibndqcoyn.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruikjaguvpw.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruinfvakjtd.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\hjgruiwstwdrxp.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruiiujkigabwt.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\hjgruiwqecxgnwby.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\hjgruiqmdwjneo.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Ivan\Local Settings\Temporary Internet Files\Content.IE5\NOFU1M24\hasTargetedPI[2]
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Ivan\Local Settings\Temporary Internet Files\Content.IE5\NOFU1M24\displayAd[1].htm
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Ivan\Local Settings\Temporary Internet Files\Content.IE5\NOFU1M24\stream[3].mp3
Status: Visible to the Windows API, but not on disk.

Stealth Objects
-------------------
Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: winlogon.exe (PID: 740) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: services.exe (PID: 788) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: lsass.exe (PID: 800) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiwstwdrxp.dll]
Process: svchost.exe (PID: 976) Address: 0x007c0000 Size: 53248

Object: Hidden Module [Name: hjgruibndqcoyn.dll]
Process: svchost.exe (PID: 976) Address: 0x01100000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 976) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 1056) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 1228) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 1308) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 1576) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: Explorer.EXE (PID: 1584) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: spoolsv.exe (PID: 1904) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: SynTPLpr.exe (PID: 588) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: SynTPEnh.exe (PID: 608) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: igfxtray.exe (PID: 620) Address: 0x009c0000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: hkcmd.exe (PID: 628) Address: 0x009a0000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: EabServr.exe (PID: 672) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: jusched.exe (PID: 872) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: tfswctrl.exe (PID: 924) Address: 0x00a20000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: E_FATI9AA.EXE (PID: 1164) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: WDBtnMgrUI.exe (PID: 1352) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: PicasaMediaDetector.exe (PID: 1496) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: avgtray.exe (PID: 1532) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: iTunesHelper.exe (PID: 1564) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: ctfmon.exe (PID: 1632) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: GoogleToolbarNotifier.exe (PID: 1672) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: wkcalrem.exe (PID: 1704) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 256) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: AppleMobileDeviceService.exe (PID: 400) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: avgwdsvc.exe (PID: 1536) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: mDNSResponder.exe (PID: 460) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: svchost.exe (PID: 320) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: WDBtnMgrSvc.exe (PID: 2108) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: avgrsx.exe (PID: 2368) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: avgnsx.exe (PID: 2384) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: iPodService.exe (PID: 2852) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: Tanagra.Utility.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x09710000 Size: 749568

Object: Hidden Module [Name: Tanagra.Interop.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x098f0000 Size: 61440

Object: Hidden Module [Name: XMLSettings.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0be90000 Size: 45056

Object: Hidden Module [Name: System.ServiceProcess.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c0e0000 Size: 126976

Object: Hidden Module [Name: Tanagra.DataClad.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0bfc0000 Size: 1003520

Object: Hidden Module [Name: Tanagra.DataClad.DataAccess.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c430000 Size: 307200

Object: Hidden Module [Name: System.Runtime.Remoting.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c510000 Size: 307200

Object: Hidden Module [Name: SQLite.NET.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c560000 Size: 86016

Object: Hidden Module [Name: Tanagra.BMU.Providers.HardDiskBackupProvider.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c5c0000 Size: 69632

Object: Hidden Module [Name: System.Data.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0c600000 Size: 2908160

Object: Hidden Module [Name: Tanagra.BMU.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0ca10000 Size: 1282048

Object: Hidden Module [Name: Tanagra.BMU.Providers.FileCopyBackupProvider.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0d170000 Size: 77824

Object: Hidden Module [Name: Tanagra.Third-party.Security.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0d1b0000 Size: 28672

Object: Hidden Module [Name: hjgruiiujkigabwt.tmpll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: Interop.Outlook.dll]
Process: MemeoBackup.exe (PID: 1876) Address: 0x0edc0000 Size: 405504

Object: Hidden Module [Name: hjgruibndqcoyn.dll]
Process: wuauclt.exe (PID: 4036) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruibndqcoyn.dll]
Process: iexplore.exe (PID: 2780) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: hjgruibndqcoyn.dll]
Process: RootRepeal.exe (PID: 380) Address: 0x10000000 Size: 32768

Hidden Services
-------------------
Service Name: hjgruipppkelso
Image Path: C:\WINDOWS\system32\drivers\hjgruiqmdwjneo.sys

==EOF==

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:52 PM

Posted 05 July 2009 - 02:44 PM

You're welcomr and thanks...

Now the next step...

Rerun Rootrepeal. After the scan completes, go to the files tab and find these files:

C:\WINDOWS\system32\hjgruibndqcoyn.dll

C:\WINDOWS\system32\hjgruiwstwdrxp.dll

C:\WINDOWS\system32\drivers\hjgruiqmdwjneo.sys


Then use your mouse to highlight it in the Rootrepeal window.
Next right mouse click on it and select *wipe file* option only.
Then immediately reboot the computer.




Next run MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users