Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Search engines redirecting me after 2010 internet virus


  • This topic is locked This topic is locked
2 replies to this topic

#1 Isuckbutt

Isuckbutt

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:48 PM

Posted 24 January 2010 - 08:29 PM

I finally got rid of the trojan but cant exactly get rid of this redirecting that was the aftermath of it
This is what DDS showed me


DDS (Ver_09-12-01.01) - NTFSx86
Run by Noah at 20:16:02.97 on Sun 01/24/2010
Internet Explorer: 6.0.2900.2180

============== Running Processes ===============


============== Pseudo HJT Report ===============

uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
mRun: [IMJPMIG8.1] "c:\windows\ime\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
mRun: [PHIME2002ASync] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /SYNC
mRun: [PHIME2002A] c:\windows\system32\ime\tintlgnt\TINTSETP.EXE /IMEName
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [HPDJ Taskbar Utility] c:\windows\system32\spool\drivers\w32x86\3\hpztsb04.exe
mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [AirPort Base Station Agent] "c:\program files\airport\APAgent.exe"
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Notify: igfxcui - igfxsrvc.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\noah\applic~1\mozilla\firefox\profiles\3wlvkpwh.default\
FF - prefs.js: keyword.URL - hxxp://click.w3i.com/?Programid=132&Elementname=Keyword&Applicationid={8069627F-B13A-444A-B05E-A486BEE168AC}&Version=3.6.2&Vintage=20100104&Defaultbrowserid=9&Productid=2246&Vendorid=5750&Offerid=6327&searchterm=
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2010-01-20 18:34:07 0 d-----w- c:\docume~1\noah\applic~1\BitZipper
2010-01-20 18:33:52 0 d-----w- c:\program files\BitZipper
2010-01-14 03:46:24 0 d-----w- c:\program files\AirPort
2010-01-12 03:32:27 0 d-----w- c:\docume~1\noah\applic~1\AVG8
2010-01-11 23:39:49 800 ----a-w- c:\windows\hpinfo.lnk
2010-01-11 23:36:08 0 d-----w- c:\program files\hp deskjet 930c series
2010-01-11 23:35:16 53248 ----a-w- c:\windows\system32\hpfinsta.exe
2010-01-11 23:35:13 274432 ------w- c:\windows\system32\hpfinst.dll
2010-01-11 23:35:05 262144 ----a-w- c:\windows\system32\hpzcon04.dll
2010-01-11 23:35:05 200704 ----a-w- c:\windows\system32\hpzcoi04.dll
2010-01-11 23:35:03 114744 ----a-w- c:\windows\system32\hpzlnt04.dll
2010-01-10 17:16:46 0 d-----w- C:\divx
2010-01-09 01:32:31 0 ----a-w- c:\windows\system32\31558.exe
2010-01-09 01:21:16 0 d--h--w- c:\windows\PIF
2010-01-09 01:12:30 0 ----a-w- c:\windows\system32\1903.exe
2010-01-09 01:02:11 0 d-----w- c:\docume~1\noah\applic~1\Malwarebytes
2010-01-09 01:02:06 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-09 01:02:04 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-01-09 01:02:03 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-09 01:02:03 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-09 00:55:52 0 d-s---w- c:\documents and settings\noah\UserData
2010-01-08 23:35:13 0 ----a-w- c:\windows\system32\11478.exe
2010-01-08 23:15:12 0 ----a-w- c:\windows\system32\15724.exe
2010-01-08 22:55:31 499712 ----a-w- c:\windows\system32\MSVCP71.dll
2010-01-08 22:55:31 348160 ----a-w- c:\windows\system32\MSVCR71.dll
2010-01-08 22:55:31 1060864 ----a-w- c:\windows\system32\MFC71.dll
2010-01-08 22:55:12 0 ----a-w- c:\windows\system32\19169.exe
2010-01-08 22:35:11 0 ----a-w- c:\windows\system32\26500.exe
2010-01-08 22:15:11 0 ----a-w- c:\windows\system32\6334.exe
2010-01-08 21:55:10 0 ----a-w- c:\windows\system32\18467.exe
2010-01-08 21:23:26 1 ----a-w- C:\s
2010-01-07 14:47:24 25856 -c--a-w- c:\windows\system32\dllcache\usbprint.sys
2010-01-07 14:47:24 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2009-12-28 14:50:31 0 d-----w- c:\program files\DivX
2009-12-28 14:50:31 0 d-----w- c:\program files\common files\DivX Shared

==================== Find3M ====================

2010-01-23 12:45:07 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-12-23 19:20:56 21640 ----a-w- c:\windows\system32\emptyregdb.dat
2009-11-14 00:49:00 129784 ------w- c:\windows\system32\pxafs.dll
2009-11-14 00:49:00 120056 ------w- c:\windows\system32\pxcpyi64.exe
2009-11-14 00:49:00 118520 ------w- c:\windows\system32\pxinsi64.exe
2009-11-14 00:47:32 90112 ----a-w- c:\windows\system32\dpl100.dll
2009-11-14 00:47:28 856064 ----a-w- c:\windows\system32\divx_xx0c.dll
2009-11-14 00:47:28 856064 ----a-w- c:\windows\system32\divx_xx07.dll
2009-11-14 00:47:28 847872 ----a-w- c:\windows\system32\divx_xx0a.dll
2009-11-14 00:47:28 843776 ----a-w- c:\windows\system32\divx_xx16.dll
2009-11-14 00:47:28 839680 ----a-w- c:\windows\system32\divx_xx11.dll
2009-11-14 00:47:28 696320 ----a-w- c:\windows\system32\DivX.dll

============= FINISH: 20:16:49.20 ===============

Edited by IMBSUCKSASS, 24 January 2010 - 08:30 PM.


BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:48 PM

Posted 26 January 2010 - 06:42 PM


Hello Isuckbutt smile.gif Welcome to the BC HijackThis Log and Analysis forum. I will be assisting you in cleaning up your system.


I ask that you refrain from running tools other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.


Please keep in mind that we have a large backlog of users just like yourself waiting to be helped so try to be as timely as possible in your replies. Since we do this on a part-time voluntary basis we are limited on how many logs we can respond to and keep open due to time restraints. If you have to be away or can't answer for some other reason just let me know. Thank you for your understanding.



After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.





I need for you to perform the following:


Download GMER Rootkit Scanner from here to your desktop.
  • Double click the exe file.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO, then use the following settings for a more complete scan.



    Click the image to enlarge it


  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file which cannot be uploaded to your post.
Save it where you can easily find it, such as your desktop, and post it in reply.

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries




If GMER does not want to run add the following to those that you unchecked and try it again:

  • Registry
  • Files










Note: Please post the log in the reply window and do not make it an attachment. Do this with all subsequent replies unless I ask otherwise.







Thanks,



thewall





If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:02:48 PM

Posted 31 January 2010 - 11:10 AM

Due to the lack of feedback This Topic is closed.

Should you need it reopened, please contact my by PM. Include the address of this thread in your request.

If you have a new issue, please start a New Topic.

This applies only to the original poster. Everyone else please begin a New Topic.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users