Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My browser is directing Google pages to clickover.cn and other sites, help?!


  • This topic is locked This topic is locked
21 replies to this topic

#1 blackbirdbree

blackbirdbree

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 12 August 2009 - 11:38 AM

It's redirecting my Google pages to the said sites, and Blue Coat K9 Web Protection has been blocking it. It may have been caught when I downloaded something off Limewire, or came across a designer bag reproduction site while looking for a new bag. Every so often my computer will slow down while using internet, shut down and flash it's blue screen, mentioning a " Driver_IRQL_NOT_LESS_OR_EQUAL"
Also the internet has not always been functioning, and I've been having to refresh pages, sephora.com in particular, that also may be a source.
I'll restart after that, then the computer will say "it has recovered from a serious error, report?" and I will, which has happened many times. After a power outage today, it started to say an error with connection with the report, which I will quote after it happens once again.
I scanned using DDS , if the files are needed, I have the main DDS file and Addon file if they are needed.

Edited by blackbirdbree, 12 August 2009 - 11:40 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 12 August 2009 - 01:38 PM

DDS/HijackThis logs are not permitted in this forum. The HJT Team members are all volunteers who contribute to helping members as time permits but currently there is a backup and you may have to wait for assistance. Referrals are made to the HJT forum if we cannot assist you here and we need to use more powerful tools or you don't mind waiting.

Please download Malwarebytes Anti-Malware (v1.40) and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

-- If Malwarebytes Anti-Malware results in any error messages, please refer to Fixes for common problems and Error Codes. Some issues with errors can be related to malware infection but others are not.

-- Some types of malware will disable Malwarebytes Anti-Malware and other security tools. If MBAM will not install, try renaming it first.
  • Right-click on the mbam-setup.exe file file and rename it to mysetup.exe.
  • Double-click on mysetup.exe to start the installation.
  • If that did not work, then try renaming and changing the file extension. <- click this link if you do not see the file extension
  • Right-click on the mbam-setup.exe file, rename it to mysetup and change the .exe extension to .scr, .com, .pif, or .bat.
  • Then double-click on mysetup.scr (or whatever extension you renamed it) to begin installation.
If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files.
  • Right-click on mbam.exe, rename it to myscan.exe.
  • Double-click on myscan.exe to launch the program.
  • If that did not work, then right-click on the file and rename it to winlogon.exe.
  • If that still did not work, then try renaming and change the .exe extension in the same way as noted above.
  • Double-click on myscan.scr (or whatever extension you renamed it) to launch the program.
If using Windows Vista, refer to How to Change a File Extension in Windows Vista.

Please download Rooter.exe and save to your desktop.
alternate download link
  • Double-click on Rooter.exe to start the tool. If using Vista, right-click and Run as Administrator...
  • Click the Scan button to begin.
  • Once the scan is complete, Notepad will open with a report named Rooter_#.txt (where # is the number assigned to the report).
  • A folder will be created at the %systemdrive% (usually, C:\Rooter$) where the log will be saved.
  • Rooter will automatically close. If it doesn't, just press the Close button.
  • Copy and paste the contents of Rooter_#.txt in your next reply.
Important: Before performing a scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 12 August 2009 - 04:09 PM

The Rooter program doesn't seem to be responding.
I rebooted, it responded.
I am still having problems with Google redirection. After the first Malwarebyte scan, I rebooted and ran the full scan again, with no report of Malware.
---------------------------------------------------
Malwarebytes' Anti-Malware 1.40
Database version: 2611
Windows 5.1.2600 Service Pack 2

12/08/2009 14:15:40
mbam-log-2009-08-12 (14-15-40).txt

Scan type: Full Scan (C:\|)
Objects scanned: 225637
Time elapsed: 1 hour(s), 11 minute(s), 24 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 17
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 12
Files Infected: 20

Memory Processes Infected:
C:\Program Files\SpyNoMore\SNM.exe (Rogue.SpyNoMore) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\sssinstaller.installer (Adware.Comet) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sssinstaller.installer.1 (Adware.Comet) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sssinstaller.sinstaller (Adware.Comet) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sssinstaller.sinstaller.1 (Adware.Comet) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{4d25f920-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{4d25f923-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4d25f921-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f924-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{4d25f924-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spynomore (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Illysoft (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Illysoft (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SNM.exe (Rogue.SpyNoMore) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{4d25f926-b9fe-4682-bf72-8ab8210d6d75} (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\MyWaySA (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWaySA\SrchAsDe (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\Screensavers.com (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\SSSInstaller (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\SSSInstaller\bin (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\SSSInstaller\Ready (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\SSSInstaller\temp (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\SSSInstaller\Upload (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\RollBack (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brenna Fines\Start Menu\Programs\SpyNoMore (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\WINDOWS\Fonts\' (Worm.Archive) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll (Adware.MyWebSearch) -> Delete on reboot.
C:\Documents and Settings\Brenna Fines\Desktop\Virus Removal\spynomore.exe (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brenna Fines\Local Settings\Temporary Internet Files\Content.IE5\71RYULAV\load[1].php (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\Program Files\Screensavers.com\Thumbs.db (Adware.Comet) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\DetectionLog.dtl (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\license.txt (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\SNM.chm (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\SNM.exe (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\snm.ico (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\snmIeGuard.dat (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\snmIeGuard.dll (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\SNMMain.da3 (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\SNMMain.da4 (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\snmShield.dat (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\snmVaccinate.dat (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\SpyNoMore.url (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Program Files\SpyNoMore\uninst.exe (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brenna Fines\Start Menu\Programs\SpyNoMore\SpyNoMore.lnk (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brenna Fines\Start Menu\Programs\SpyNoMore\Uninstall.lnk (Rogue.SpyNoMore) -> Quarantined and deleted successfully.
C:\Documents and Settings\Brenna Fines\Start Menu\Programs\SpyNoMore\Website.lnk (Rogue.SpyNoMore) -> Quarantined and deleted successfully.

-------------------------------------------------------------------------------------------------------------------
Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows XP Home Edition (5.1.2600) Service Pack 2
[32_bits] - x86 Family 15 Model 4 Stepping 1, GenuineIntel
.
[wscsvc] (Security Center) RUNNING (state:4)
[SharedAccess] RUNNING (state:4)
Windows Firewall -> Enabled
.
Internet Explorer 7.0.5730.13
.
C:\ [Fixed-NTFS] .. ( Total:71 Go - Free:34 Go )
D:\ [CD_Rom]
.
Scan : 17:18.46
Path : C:\Documents and Settings\Brenna Fines\Desktop\Rooter.exe
User : Brenna Fines ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
______ System (4)
______ \SystemRoot\System32\smss.exe (1360)
______ \??\C:\WINDOWS\system32\csrss.exe (1412)
______ \??\C:\WINDOWS\system32\winlogon.exe (1436)
______ C:\WINDOWS\system32\services.exe (1484)
______ C:\WINDOWS\system32\lsass.exe (1496)
______ C:\WINDOWS\system32\svchost.exe (1696)
______ C:\WINDOWS\system32\svchost.exe (1772)
______ C:\Program Files\Windows Defender\MsMpEng.exe (1844)
______ C:\WINDOWS\System32\svchost.exe (1904)
______ C:\Program Files\Ahead\InCD\InCDsrv.exe (1928)
______ C:\WINDOWS\system32\svchost.exe (132)
______ C:\WINDOWS\system32\svchost.exe (320)
______ C:\WINDOWS\system32\LEXBCES.EXE (624)
______ C:\WINDOWS\system32\spoolsv.exe (664)
______ C:\WINDOWS\system32\LEXPPS.EXE (672)
______ C:\WINDOWS\system32\acs.exe (784)
______ C:\WINDOWS\system32\svchost.exe (832)
______ C:\PROGRA~1\COMMON~1\AOL\ACS\AOLacsd.exe (892)
______ C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe (912)
______ C:\PROGRA~1\BLUECO~1\k9filter.exe (956)
______ C:\PROGRA~1\TRENDM~1\INTERN~1\PcCtlCom.exe (1048)
______ C:\WINDOWS\system32\PSIService.exe (1144)
______ C:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe (1204)
______ C:\WINDOWS\system32\svchost.exe (1284)
______ C:\PROGRA~1\TRENDM~1\INTERN~1\Tmntsrv.exe (1344)
______ C:\PROGRA~1\TRENDM~1\INTERN~1\tmproxy.exe (1460)
______ C:\Program Files\Viewpoint\Common\ViewpointService.exe (224)
______ C:\PROGRA~1\TRENDM~1\INTERN~1\TmPfw.exe (2392)
______ C:\WINDOWS\System32\alg.exe (2788)
______ C:\WINDOWS\Explorer.EXE (3640)
______ C:\WINDOWS\system32\wscntfy.exe (3764)
______ C:\WINDOWS\system32\wuauclt.exe (2904)
______ C:\Program Files\Analog Devices\Core\smax4pnp.exe (3540)
______ C:\WINDOWS\system32\hkcmd.exe (3472)
______ C:\WINDOWS\system32\igfxpers.exe (3572)
______ C:\Program Files\Java\jre1.6.0_02\bin\jusched.exe (3608)
______ C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe (3616)
______ C:\Program Files\Real\RealPlayer\RealPlay.exe (3636)
______ C:\WINDOWS\system32\dla\tfswctrl.exe (3664)
______ C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe (3724)
______ C:\Program Files\Dell\Media Experience\DMXLauncher.exe (3744)
______ C:\Program Files\Trend Micro\Internet Security 12\pccguide.exe (3804)
______ C:\Program Files\Common Files\Corel\Corel PhotoDownloader\Corel Photo Downloader.exe (3784)
______ C:\Program Files\D-Link\RangeBooster G WUA-2340\AirPlusCFG.exe (3980)
______ C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe (4024)
______ C:\Program Files\ScanSoft\OmniPageSE\opware32.exe (4088)
______ C:\Program Files\Windows Defender\MSASCui.exe (3008)
______ C:\Program Files\iTunes\iTunesHelper.exe (1228)
______ C:\Program Files\Corel\Corel MediaOne\CorelIOMonitor.exe (3244)
______ C:\Program Files\Trend Micro\Internet Security 12\TMAS_OE\TMAS_OEMon.exe (3428)
______ C:\Program Files\DellSupport\DSAgnt.exe (3632)
______ C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe (3840)
______ C:\WINDOWS\system32\ctfmon.exe (428)
______ C:\Program Files\Digital Line Detect\DLG.exe (2868)
______ C:\Program Files\NETGEAR\WN111v2\WN111V2.exe (4064)
______ C:\Program Files\Common Files\Nikon\Monitor\NkMonitor.exe (2220)
______ C:\Program Files\Fotki Desktop\fotki.exe (3224)
______ C:\Program Files\iPod\bin\iPodService.exe (3752)
______ C:\Program Files\Java\jre1.6.0_02\bin\jucheck.exe (1508)
______ C:\Program Files\Mozilla Firefox\firefox.exe (2424)
______ C:\Documents and Settings\Brenna Fines\Desktop\Rooter.exe (3856)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 (Start_Offset:32256 | Length:41094144)
\Device\Harddisk0\Partition2 --[ MBR ]-- (Start_Offset:41126400 | Length:76725411840)
\Device\Harddisk0\Partition3 (Start_Offset:76766538240 | Length:3224309760)
.
----------------------\\ Scheduled Tasks
.
C:\WINDOWS\Tasks\AppleSoftwareUpdate.job
C:\WINDOWS\Tasks\desktop.ini
C:\WINDOWS\Tasks\Google Software Updater.job
C:\WINDOWS\Tasks\MP Scheduled Scan.job
C:\WINDOWS\Tasks\Norton Security Scan.job
C:\WINDOWS\Tasks\SA.DAT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 17:19.20
.
C:\Rooter$\Rooter_1.txt - (12/08/2009 | 17:19.21)

Edited by blackbirdbree, 12 August 2009 - 04:32 PM.


#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 13 August 2009 - 06:25 AM

Rescan again with Malwarebytes Anti-Malware (Quick Scan) in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Your Java is out of date. Older versions have vulnerabilities that malicious sites can use to exploit and infect your system. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) Version 6 and save it to your desktop.
  • Look for "Java Runtime Environment (JRE)" JRE 6 Update 16.
  • Click the Download button to the right.
  • Select your Platform: "Windows".
  • Select your Language: "Multi-language".
  • Read the License Agreement, and then check the box that says: "Accept License Agreement".
  • Click Continue and the page will refresh.
  • Under Required Files, check the box for Windows Offline Installation, click the link below it and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button and follow the onscreen instructions for the Java uninstaller.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u16-windows-i586.exe to install the newest version.
-- If using Windows Vista and the installer refuses to launch due to insufficient user permissions, then Run As Administrator.
-- If you choose to update via the Java applet in Control Panel, uncheck the option to install the Toolbar unless you want it.
-- The uninstaller incorporated in this release removes previous Updates 10 and above, but does not remove older versions, so they still need to be removed manually.


Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications but it's not necessary.
To disable the JQS service if you don't want to use it:
  • Go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter.
  • Click Ok and reboot your computer.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 13 August 2009 - 09:51 AM

--------

Malwarebytes' Anti-Malware 1.40
Database version: 2615
Windows 5.1.2600 Service Pack 2

13/08/2009 10:49:26
mbam-log-2009-08-13 (10-49-26).txt

Scan type: Quick Scan
Objects scanned: 107216
Time elapsed: 16 minute(s), 12 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 13 August 2009 - 10:44 AM

That's better.

Lets do another anti-malware scan to see if we find anything else that MBAM may have missed.

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you cannot boot into safe mode, then perform your scans in normal mode.

-- Some types of malware will disable SUPERAntiSpyware and other security tools. If SAS will not install, please refer to these instructions for using the SAS Installer (SAS_FREE.EXE). If SAS is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 13 August 2009 - 01:29 PM

Still having problems with redirection, but it's to other sites such as a ' primowebsearch' and 'advancegangbang,' and some things that don't seem like websites, more like series of numbers with occasional periods. However it's not shutting itself down anymore, and no blue screen.
---------------------------

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/13/2009 at 02:18 PM

Application Version : 4.27.1002

Core Rules Database Version : 4040
Trace Rules Database Version: 1980

Scan type : Complete Scan
Total Scan Time : 00:35:59

Memory items scanned : 273
Memory threats detected : 0
Registry items scanned : 5529
Registry threats detected : 0
File items scanned : 21442
File threats detected : 17

Adware.Tracking Cookie
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@247realmedia[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@ad.yieldmanager[2].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@adserver.adtechus[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@apmebf[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@atdmt[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@bs.serving-sys[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@casalemedia[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@collective-media[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@dmtracker[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@doubleclick[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@fastclick[2].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@imrworldwide[2].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@oasn04.247realmedia[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@revsci[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@serving-sys[2].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@trafficmp[1].txt
C:\Documents and Settings\Katie Brian\Cookies\katie_brian@tribalfusion[2].txt

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 13 August 2009 - 04:22 PM

Please download and scan with Dr.Web CureIt - alternate download link.
Follow these instructions for performing a scan in "safe mode".
If you cannot boot into safe mode or complete a scan, then try doing it in normal mode. Be aware, this scan could take a long time to complete.
-- Post the log in your next reply. If you can't find the log, try to write down what was detected/removed before exiting Dr.WebCureIt so you can provide that information.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 13 August 2009 - 06:07 PM

It's still redirecting, but it doesn't happen right as I pull up a Google link, then it does, and then occassionally recesses.

Here's the statistics:

---------------------------------------

Total Sat
Objects scanned:39511
Infected:1
Actions- Deleted

Object: 3 Months Free Netzero- Trojan.click.1487

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 14 August 2009 - 08:32 AM

Please download RootRepeal.zip and save it to your Desktop.
alternate download link 1
alternate download link 2
  • Unzip the file on your Desktop or create a new folder on the hard drive called RootRepeal (C:\RootRepeal) and extract it there.
    (click here if you're not sure how to do this. Vista users refer to these instructions.)
  • Disconnect from the Internet as your system will be unprotected while using this tool.
  • Close all programs and temporarily disable your anti-virus, Firewall and any anti-malware real-time protection before performing a scan.
    This will ensure more accurate results and avoid common issues that may cause false detections.
  • Click this link to see a list of such programs and how to disable them.
  • Open the RootRepeal folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
  • When the program opens, click the Report tab at the bottom, then click the Scan button.
  • In the Select Scan, dialog which asks What do you want to include in the scan?, check all the boxes.
    Posted Image
  • Click OK.
  • In the Select Drives, dialog Please select drives to scan: select your primary system drive (usually C:), then click OK.
  • The scan can take some time to finish. Do not use the computer while the scan is running.
  • When the scan has completed, a list of files will be generated in the RootRepeal window.
  • Click on the Save Report button and save it as rootrepeal.txt to your desktop.
  • A copy of the report with the date (i.e. RootRepeal report 07-30-09 (17-35-54).txt) is also saved to the root of your system drive (usually C:\).
  • Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
  • Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
Note: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "safe mode".
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 14 August 2009 - 11:07 AM

Some of the characters appear to be in Chinese. Just a side question- After I get rid of the Google redirection, I'd like to keep some of the programs to delete the malware which may occasionally pop-up on my computer; which of the programs you listed should keep, and which ones could be deleted?
------------------------------------------------------------

ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/08/14 11:23
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEB634000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7A12000 Size: 8192 File Visible: No Signed: -
Status: -

Name: PCI_PNP7928
Image Path: \Driver\PCI_PNP7928
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xECD3B000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETouigapjn.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETouigapjn.sys
Address: 0xEE168000 Size: 151552 File Visible: - Signed: -
Status: Hidden from the Windows API!

Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: spxn.sys
Image Path: spxn.sys
Address: 0xF7377000 Size: 1040384 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\SKYNETkftprujc.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETkltfmlwl.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETvqhxowmx.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETxdpgljaa.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETouigapjn.sys
Status: Invisible to the Windows API!

Path: c:\program files\dellsupport\html\am\localization\lang_main.xml
Status: Allocation size mismatch (API: 4096, Raw: 71494644084510720)

Stealth Objects
-------------------
Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: winlogon.exe (PID: 1436) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: services.exe (PID: 1484) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: lsass.exe (PID: 1496) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkltfmlwl.dll]
Process: svchost.exe (PID: 1692) Address: 0x007d0000 Size: 53248

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 1692) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 1756) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: MsMpEng.exe (PID: 1828) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 1888) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: InCDsrv.exe (PID: 1924) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 164) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 320) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: LEXBCES.EXE (PID: 632) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: spoolsv.exe (PID: 664) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: LEXPPS.EXE (PID: 672) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: acs.exe (PID: 780) Address: 0x00760000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 836) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: AOLacsd.exe (PID: 888) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: AppleMobileDeviceService.exe (PID: 908) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: k9filter.exe (PID: 952) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: jqs.exe (PID: 1020) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: PcCtlCom.exe (PID: 1064) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: PSIService.exe (PID: 1140) Address: 0x008e0000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: PsiService_2.exe (PID: 1220) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: svchost.exe (PID: 1324) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: Tmntsrv.exe (PID: 1400) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: tmproxy.exe (PID: 1552) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: ViewpointService.exe (PID: 236) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: TmPfw.exe (PID: 2432) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: alg.exe (PID: 2844) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: Explorer.EXE (PID: 3604) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: wscntfy.exe (PID: 2368) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: smax4pnp.exe (PID: 2588) Address: 0x00bf0000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: hkcmd.exe (PID: 2608) Address: 0x00990000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: igfxpers.exe (PID: 2640) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: DVDLauncher.exe (PID: 2644) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: RealPlay.exe (PID: 3736) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: tfswctrl.exe (PID: 3724) Address: 0x00a30000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: issch.exe (PID: 2668) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: DMXLauncher.exe (PID: 2680) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: pccguide.exe (PID: 2692) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: Corel Photo Downloader.exe (PID: 2596) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: AirPlusCFG.exe (PID: 2972) Address: 0x00bf0000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: WZCSLDR2.exe (PID: 2984) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: opware32.exe (PID: 356) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: MSASCui.exe (PID: 1092) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: iTunesHelper.exe (PID: 3704) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: CorelIOMonitor.exe (PID: 3860) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: wuauclt.exe (PID: 4080) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: jusched.exe (PID: 2664) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: TMAS_OEMon.exe (PID: 2936) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: DSAgnt.exe (PID: 724) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: GoogleToolbarNotifier.exe (PID: 3048) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: ctfmon.exe (PID: 2704) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: DLG.exe (PID: 1700) Address: 0x00e80000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: WN111V2.exe (PID: 1764) Address: 0x00b20000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: NkMonitor.exe (PID: 2304) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: iPodService.exe (PID: 4072) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: fotki.exe (PID: 3160) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: RootRepeal.exe (PID: 3252) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: SKYNETkftprujc.dll]
Process: logon.scr (PID: 5224) Address: 0x10000000 Size: 28672

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_POWER]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: atapi, IRP_MJ_PNP]
Process: System Address: 0x8636c1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x861ee500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x86222500 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x863da1f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x85d121f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x862541f8 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x85e56500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_CREATE]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_CLOSE]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_READ]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_SHUTDOWN]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_CLEANUP]
Process: System Address: 0x85f1f500 Size: 121

Object: Hidden Code [Driver: CdfsЅ灐潩⦈ʨЂః扏济BCKD, IRP_MJ_PNP]
Process: System Address: 0x85f1f500 Size: 121

Hidden Services
-------------------
Service Name: SKYNETjlqbbwou
Image Path: C:\WINDOWS\system32\drivers\SKYNETouigapjn.sys

==EOF==

Edited by blackbirdbree, 14 August 2009 - 11:08 AM.


#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,885 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:20 PM

Posted 14 August 2009 - 03:23 PM

Double-click on RootRepeal.exe to launch it.
  • Click the Drivers tab, then click the Scan button.
  • Right-click on SKYNETouigapjn.sys and then click the Wipe File option only.
  • Click on the Files tab, then click the Scan button.
  • In the Select Drives, dialog Please select drives to scan: select your primary system drive (usually C:), then click OK.
  • When the scan has completed, a list of files will be generated in the RootRepeal window.
  • Use your mouse to highlight the following files:
    Path: C:\WINDOWS\system32\SKYNETkftprujc.dll
    Path: C:\WINDOWS\system32\SKYNETkltfmlwl.dll
    Path: C:\WINDOWS\system32\SKYNETvqhxowmx.dat
    Path: C:\WINDOWS\system32\SKYNETxdpgljaa.dat
    Path: C:\WINDOWS\system32\drivers\SKYNETouigapjn.sys
  • Right-click on those files and then click the Wipe File option only.
  • Click the Hidden Services tab, then click the Scan button.
  • Right-click on SKYNETjlqbbwou and then click the Wipe File option.
  • Exit RootRepeal and immediately restart the computer.
Then rescan again with Malwarebytes Anti-Malware (Full Scan) in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#13 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 15 August 2009 - 11:59 AM

Ok. I wiped the files that you told me to, but the "SKYNETjlqbbwou" under "Hidden Services" didn't disappear after I wiped it, although it did say wiped successfully. While doing the scan, the computer shut down showing a blue screen saying " page_fault_in_nonpaged_area," then said it recovered from a serious error. The scan passed by the 'SKYNET' file in 'system32' without fault, or report of virus, but I'm going to try the scan again.

Edited by blackbirdbree, 15 August 2009 - 12:06 PM.


#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,528 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:20 PM

Posted 15 August 2009 - 02:09 PM

Don't forget the updated MBAM scan also.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 blackbirdbree

blackbirdbree
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Virginia
  • Local time:02:20 PM

Posted 15 August 2009 - 02:14 PM

I haven't deleted the files yet, but here's the log.
-----

Malwarebytes' Anti-Malware 1.40
Database version: 2630
Windows 5.1.2600 Service Pack 2

15/08/2009 15:13:49
mbam-log-2009-08-15 (15-13-47).txt

Scan type: Full Scan (C:\|)
Objects scanned: 209767
Time elapsed: 1 hour(s), 12 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\SKYNETvqhxowmx.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETxdpgljaa.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETkftprujc.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\SKYNETkltfmlwl.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\SKYNETouigapjn.sys (Trojan.Agent) -> No action taken.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users