Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Search Redirect / Random Tab Openings


  • This topic is locked This topic is locked
15 replies to this topic

#1 -TX-

-TX-

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 06 September 2010 - 05:36 PM

Hi there!

For the past while now, maybe a month, I've had some random search redirections to fake anti-viruses, and my tabs on Mozilla Firefox keep opening random sites too. Most of those tab sites redirect me to hxxp://www.google.com/webhp; but there is some sort of IP address that shows up before the webhp site.
Recently, I've had error pop-ups as well, such as Win 32 errors, and then when clicking cancel, or OK, my computer freezes and crashes down.

I did not find this problem on the family laptop, nor the family PC.

This is getting annoying, because I've done many scans with AVG, MBAM, and a few other anti-virus programs, and the problem still exists.

I've searched this up, and apparently it could be a backdoor trojan, and the best thing to do is reinstall the OS, but I have many files and programs I need that I don't have enough space to back-up, so I need some other way of help, or some identification on what type of virus I've been inflicted with.

I'm using
Microsoft Windows XP
Media Center Edition
Version 2002
Service Pack 2

I am new to some of the terminology used in this site, so please excuse me if I seem like a newbie.

Thank you!

Edited by Orange Blossom, 06 September 2010 - 06:57 PM.
Deactivate link. ~ OB


BC AdBot (Login to Remove)

 


#2 MrBruce1959

MrBruce1959

    My cat Oreo


  • BC Advisor
  • 6,377 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Norwich, Connecticut. in the USA
  • Local time:07:00 AM

Posted 06 September 2010 - 05:54 PM

Hello and welcome to Bleepingcomputer.

If you permit me, I will have your post moved to AII (Am I Infected) forums where your concerns will be properly addressed.

Thanks for using Bleepingcomputer.

Bruce.

Edited by MrBruce1959, 07 September 2010 - 08:30 AM.

Welcome to Bleeping Computer! :welcome:
New Members: Please click here for the Bleeping Computer Forum Board Rules
 
My Career Involves 37 Years as an Electronics Repair Technician, to Which I am Currently Retired From.

I Am Currently Using Windows 10 Home Edition.

As a Volunteer Staff Member of Bleeping Computer, the Help That I Proudly Provide Here To Our BC Forum Board Membership is Free of Charge. :wink:

#3 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 06 September 2010 - 06:13 PM

All right, thank you for the reply! :thumbsup:

#4 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,011 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:07:00 AM

Posted 06 September 2010 - 06:58 PM

Hello,

I'll get you started off here:

Please download Malwarebytes Anti-Malware (v1.46) and save it to your desktop.Download Link 1
Download Link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#5 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 06 September 2010 - 07:05 PM

I have MBAM already installed, and updated to v1.46.
On average, my Quick Scans take an hour or two, which is pretty hefty, so once the scan is complete I'll post again with the log once it's done, or tomorrow morning.
Thank you for the response. :thumbsup:

Edited by -TX-, 06 September 2010 - 07:06 PM.


#6 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 06 September 2010 - 10:15 PM

Alright, here is the MBAM log.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4557

Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18372

9/6/2010 8:58:17 PM
mbam-log-2010-09-06 (20-58-17).txt

Scan type: Quick scan
Objects scanned: 228731
Time elapsed: 46 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{e02229b6-8b82-eb32-c5d5-0d3246955e1c} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\drivers\vlhfuny.sys (Rootkit.Bubnix) -> Delete on reboot.
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\WDDfzEhS.exe.part (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\tmp598b92e6\Java.Net.5.71.12.8.exe (Backdoor.Agent) -> Quarantined and deleted successfully.

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:00 AM

Posted 06 September 2010 - 10:32 PM

Hello, you needed to reboot after that if you haven't.
These malwares found indicate the possibility of others.

Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 07 September 2010 - 05:36 PM

Alright, thank you.

Here is the log;

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/07/2010 at 06:17 PM

Application Version : 4.42.1000

Core Rules Database Version : 5462
Trace Rules Database Version: 3274

Scan type : Complete Scan
Total Scan Time : 08:13:20

Memory items scanned : 229
Memory threats detected : 0
Registry items scanned : 8989
Registry threats detected : 28
File items scanned : 271768
File threats detected : 130

Application.Oreans32
HKLM\System\ControlSet001\Services\oreans32
C:\WINDOWS\SYSTEM32\DRIVERS\OREANS32.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_oreans32
HKLM\System\ControlSet003\Services\oreans32
HKLM\System\ControlSet003\Enum\Root\LEGACY_oreans32
HKLM\System\CurrentControlSet\Services\oreans32
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_oreans32

Unclassified.Oreans32
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#DeviceDesc
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Capabilities
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000#Driver
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_OREANS32\0000\LogConf
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Type
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#Start
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ErrorControl
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#ImagePath
HKLM\SYSTEM\CurrentControlSet\Services\oreans32#DisplayName
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Security#Security
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#0
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#Count
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\Enum#NextInstance

Adware.Tracking Cookie
149.memecounter.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
acvs.mediaonenetwork.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
ads1.msn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
bc.youporn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
burstnet.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
cdn.insights.gravity.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
cdn4.specificclick.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
cdn5.specificclick.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
content.flashtrackz.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
content.oddcast.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
core.insightexpressai.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
ds.serving-sys.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
gomedia.us [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
googleads.g.doubleclick.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
i.adultswim.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
ia.media-imdb.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
interclick.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
m.uk.2mdn.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
m1.2mdn.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
m1.emea.2mdn.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.entertonement.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.exgfdump.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.filb.de [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.ign.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.jambocast.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.kelbymediagroup.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.mtvnservices.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.nintendo.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.onsugar.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.podaddies.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.resulthost.org [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.scanscout.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.socialvibe.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.tattomedia.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.thewb.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.winamp.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.y8.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media.ytv.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media01.kyte.tv [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media1.break.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
media1.clubpenguin.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
mediafileshost.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
memecounter.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
msnbcmedia.msn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
naiadsystems.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
objects.tremormedia.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
oddcast.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
pornotube.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
preview.imhomedia.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
richmedia247.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
s0.2mdn.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
secure-us.imrworldwide.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
serving-sys.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
static.eporner.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
static.sexsearchcom.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
static.themis-media.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
static.youporn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
udn.specificclick.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
vitamine.networldmedia.net [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.bootcampmedia.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.hentaimedia.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.kinxxx.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.naiadsystems.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.pornhub.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.sextube.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
www.ziporn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
wwwstatic.megaporn.com [ C:\Documents and Settings\HP_Administrator\Application Data\Macromedia\Flash Player\#SharedObjects\QS9WG6BJ ]
cdn4.specificclick.net [ C:\Documents and Settings\LocalService\Application Data\Macromedia\Flash Player\#SharedObjects\KZXQ8NNF ]
media1.break.com [ C:\Documents and Settings\LocalService\Application Data\Macromedia\Flash Player\#SharedObjects\KZXQ8NNF ]
cdn4.specificclick.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
media.heavy.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
media.scanscout.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
media.wholesite.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
media1.break.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
objects.tremormedia.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
secure-us.imrworldwide.com [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
vitamine.networldmedia.net [ C:\Documents and Settings\NetworkService\Application Data\Macromedia\Flash Player\#SharedObjects\C7UMLRZU ]
247realmedia.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
adbureau.net [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
ads1.msn.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
adverts.freeloader.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
euroclick.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
fastclick.net [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
files.adbrite.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
interclick.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
macromedia.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.ign.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.jambocast.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.putfile.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.scanscout.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.tattomedia.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
media.ytv.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
memecounter.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
msnbcmedia.msn.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
naiadsystems.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
oddcast.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
pointroll.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
stat.radioblogclub.com [ C:\Documents and Settings\Saad&Umayr\Application Data\Macromedia\Flash Player\#SharedObjects\8NUFTNTF ]
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@adcentriconline[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@adknowledge[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ads.adbrite[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ads.cartoonnetwork[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ads.labpixies[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ads.turner[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@discounthotels[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@eb.adbureau[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@edge.ru4[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-corusentertainment.hitbox[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-hasbro.hitbox[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-legonewyorkinc.hitbox[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-segaofamerica.hitbox[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-veohnetworksinc.hitbox[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@ehg-yellowpages.hitbox[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@keywordmax[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@media.mtvnservices[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@media.ytv[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@mywebsearch[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@partypoker[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@reduxads.valuead[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@tremor.adbureau[2].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@www.pokemonelite2000[1].txt
C:\Documents and Settings\Saad&Umayr\Local Settings\Temp\Cookies\saad&umayr@www.ppctracking[1].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\administrator@ehg-bestbuy.hitbox[2].txt
C:\WINDOWS\system32\config\systemprofile\Cookies\administrator@msnclassifieds.112.2o7[1].txt

Trojan.Agent/Gen
C:\DOCUMENTS AND SETTINGS\HP_ADMINISTRATOR\LOCAL SETTINGS\TEMP\WROMACSXEN.TMP

Malware.Installer-Pkg/Gen
C:\PROGRAM FILES\WILDTANGENT\APPS\GAME CONSOLE - WILDGAMES\DOWNLOADS\INSTALLERS\{4A993F42-A63D-4A08-9066-127FFD22DFC7}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\GAME CONSOLE - WILDGAMES\DOWNLOADS\INSTALLERS\{CD6FA8EE-7903-4FF6-811C-5D86A97EEA16}.EXE
C:\PROGRAM FILES\WILDTANGENT\APPS\GAME CONSOLE - WILDGAMES\DOWNLOADS\INSTALLERS\{D8EBE721-1A6F-4615-9D4E-C16860EB2796}.EXE

Rogue.Agent/Gen-Nullo[DLL]
C:\WINDOWS\SYSTEM32\FIREFOXS.DLL

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:00 AM

Posted 07 September 2010 - 07:46 PM

Still having Redirects and Tabs??

Do an Online scan and a Rootkit check.
ESET
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the ESET Online Scanner button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Export to text file... to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Eset Smart Installer icon on your desktop.
  • Check the "YES, I accept the Terms of Use"
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push "List of found threats"
  • Push "Export to text file", and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the "<<Back" button.
  • Push Finish
In your next reply, please include the following:
  • Eset Scan Log


NOTE: In some instances if no malware is found there will be no log produced.



Please run the following scan.

Please download Rootkit Unhooker and save it to your Desktop
  • Double-click on RKUnhookerLE to run it
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth, and uncheck the rest
  • Click OK
  • Wait until it's finished and then go to File > Save Report
  • Save the report to your Desktop
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#10 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 08 September 2010 - 10:23 PM

Still getting some tab openings.

Here is the ESET log ;
C:\Documents and Settings\HP_Administrator\Desktop\Mozilla FireFox Downloads\Hahaz_01.09.2010.dll a variant of Win32/Packed.VMProtect.AAD trojan cleaned by deleting - quarantined
C:\Documents and Settings\HP_Administrator\Desktop\Mozilla FireFox Downloads\Hahaz_06.09.2010.dll a variant of Win32/Packed.VMProtect.AAD trojan cleaned by deleting - quarantined
C:\Documents and Settings\HP_Administrator\Desktop\Mozilla FireFox Downloads\MPGHCA.dll probably a variant of Win32/TrojanDownloader.Agent.GHKJKGU trojan cleaned by deleting - quarantined
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\jar_cache5324149940649476975.tmp multiple threats deleted - quarantined
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\jar_cache7981632265695974790.tmp multiple threats deleted - quarantined
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\xc.exe probably a variant of Win32/Injector.CKO trojan cleaned by deleting - quarantined
C:\Documents and Settings\HP_Administrator\My Documents\My Music\iTunes\iTunes Music\Mobile Applications\Jailbreaker Lite 1.ipa HTML/Iframe.B.Gen virus deleted - quarantined
C:\Documents and Settings\HP_Administrator\My Documents\My Music\iTunes\iTunes Music\Mobile Applications\Jailbreaker Lite.ipa HTML/Iframe.B.Gen virus deleted - quarantined
C:\Documents and Settings\HP_Administrator\Start Menu\eBay.lnk Win32/Adware.ADON application cleaned by deleting - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\3\4e84bf83-19c0dfe9 multiple threats deleted - quarantined
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\44\34db286c-2b967ab9 multiple threats deleted - quarantined
C:\WINDOWS\system32\autorun.ini INF/Autorun virus deleted - quarantined


Here is the RKUnhooker log;


RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 2)
Number of processors #2
==============================================
>Drivers
==============================================
0xBF1CC000 C:\WINDOWS\System32\ati3duag.dll 3887104 bytes (ATI Technologies Inc. , ati3duag.dll)
0xF6E73000 C:\WINDOWS\system32\DRIVERS\ati2mtag.sys 3817472 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Miniport Driver)
0xBF9C4000 C:\WINDOWS\System32\ativvaxx.dll 2646016 bytes (ATI Technologies Inc. , Radeon Video Acceleration Universal Driver)
0xEE807000 C:\WINDOWS\system32\drivers\RtkHDAud.sys 2220032 bytes (Realtek Semiconductor Corp., Realtek® High Definition Audio Function Driver)
0x804D7000 C:\WINDOWS\system32\ntkrnlpa.exe 2142208 bytes (Microsoft Corporation, NT Kernel & System)
0x804D7000 PnpManager 2142208 bytes
0x804D7000 RAW 2142208 bytes
0x804D7000 WMIxWDM 2142208 bytes
0xBF800000 Win32k 1851392 bytes
0xBF800000 C:\WINDOWS\System32\win32k.sys 1851392 bytes (Microsoft Corporation, Multi-User Win32 Driver)
0xF6BFB000 C:\WINDOWS\system32\DRIVERS\AGRSM.sys 1269760 bytes (Agere Systems, SoftModem Device Driver)
0xF73DA000 vlhfuny.sys 794624 bytes
0xB2A63000 C:\WINDOWS\system32\DRIVERS\RT2860.sys 679936 bytes (Ralink Technology, Corp., Ralink 802.11 Wireless Adapter Driver)
0xBF065000 C:\WINDOWS\System32\ati2cqag.dll 626688 bytes (ATI Technologies Inc., Central Memory Manager / Queue Server Module)
0xF72A7000 Ntfs.sys 577536 bytes (Microsoft Corporation, NT File System Driver)
0xBF0FE000 C:\WINDOWS\System32\atikvmag.dll 536576 bytes (ATI Technologies Inc., Virtual Command And Memory Manager)
0xB2983000 C:\WINDOWS\system32\drivers\EagleNT.sys 462848 bytes
0xB65A5000 C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 454656 bytes (Microsoft Corporation, Windows NT SMB Minirdr)
0xF6A6D000 C:\WINDOWS\system32\DRIVERS\update.sys 364544 bytes (Microsoft Corporation, Update Driver)
0xB674D000 C:\WINDOWS\system32\DRIVERS\tcpip.sys 360448 bytes (Microsoft Corporation, TCP/IP Protocol Driver)
0xB39C2000 C:\WINDOWS\system32\DRIVERS\srv.sys 356352 bytes (Microsoft Corporation, Server driver)
0xBF012000 C:\WINDOWS\System32\ati2dvag.dll 339968 bytes (ATI Technologies Inc., ATI Radeon WindowsNT Display Driver)
0xB6554000 C:\WINDOWS\System32\Drivers\avgldx86.sys 331776 bytes (AVG Technologies CZ, s.r.o., AVG AVI Loader Driver)
0xBF181000 C:\WINDOWS\System32\atiok3x2.dll 307200 bytes (ATI Technologies Inc., Ring 0 x2 component)
0xBFFA0000 C:\WINDOWS\System32\ATMFD.DLL 286720 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver)
0xB3A91000 C:\WINDOWS\System32\Drivers\HTTP.sys 266240 bytes (Microsoft Corporation, HTTP Protocol Stack)
0xB670D000 C:\WINDOWS\System32\Drivers\SYMTDI.SYS 262144 bytes (Symantec Corporation, Network Dispatch Driver)
0xF6AC6000 C:\WINDOWS\system32\DRIVERS\rdpdr.sys 200704 bytes (Microsoft Corporation, Microsoft RDP Device redirector)
0xF74AD000 ACPI.sys 188416 bytes (Microsoft Corporation, ACPI Driver for NT)
0xF727A000 NDIS.sys 184320 bytes (Microsoft Corporation, NDIS 5.1 wrapper driver)
0xB3DCA000 C:\WINDOWS\system32\DRIVERS\mrxdav.sys 180224 bytes (Microsoft Corporation, Windows NT WebDav Minirdr)
0xB6614000 C:\WINDOWS\system32\DRIVERS\rdbss.sys 176128 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver)
0xB66AB000 C:\WINDOWS\system32\DRIVERS\netbt.sys 163840 bytes (Microsoft Corporation, MBT Transport driver)
0xF7395000 dmio.sys 155648 bytes (Microsoft Corp., Veritas Software, NT Disk Manager I/O Driver)
0xF6E3B000 C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 147456 bytes (Windows ® Server 2003 DDK provider, High Definition Audio Bus Driver v1.0)
0xB6531000 C:\WINDOWS\System32\Drivers\Fastfat.SYS 143360 bytes (Microsoft Corporation, Fast FAT File System Driver)
0xF6D31000 C:\WINDOWS\system32\DRIVERS\ks.sys 143360 bytes (Microsoft Corporation, Kernel CSA Library)
0xF6E18000 C:\WINDOWS\system32\DRIVERS\USBPORT.SYS 143360 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver)
0xB6689000 C:\WINDOWS\System32\drivers\afd.sys 139264 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock)
0xB6667000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS)
0xB66EC000 C:\WINDOWS\system32\DRIVERS\ipnat.sys 135168 bytes (Microsoft Corporation, IP Network Address Translator)
0xEE7E6000 C:\WINDOWS\system32\drivers\portcls.sys 135168 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices))
0x806E2000 ACPI_HAL 134400 bytes
0x806E2000 C:\WINDOWS\system32\hal.dll 134400 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL)
0xF735D000 fltMgr.sys 131072 bytes (Microsoft Corporation, Microsoft Filesystem Filter Manager)
0xF73BB000 ftdisk.sys 126976 bytes (Microsoft Corporation, FT Disk Driver)
0xF6D54000 C:\WINDOWS\system32\DRIVERS\hcwPP2.sys 122880 bytes (Hauppauge Computer Works, Inc., WinTV PVR PCI II (v2) WDM Video Capture)
0xF725F000 Mup.sys 110592 bytes (Microsoft Corporation, Multiple UNC Provider driver)
0xB66D3000 C:\WINDOWS\System32\Drivers\avgtdix.sys 102400 bytes (AVG Technologies CZ, s.r.o., AVG Network connection watcher)
0xF737D000 atapi.sys 98304 bytes (Microsoft Corporation, IDE/ATAPI Port Driver)
0xF7334000 KSecDD.sys 94208 bytes (Microsoft Corporation, Kernel Security Support Provider Interface)
0xF6BA8000 C:\WINDOWS\system32\DRIVERS\ndiswan.sys 94208 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption))
0xB3E44000 C:\WINDOWS\system32\drivers\wdmaud.sys 86016 bytes (Microsoft Corporation, MMSYSTEM Wave/Midi API mapper)
0xF6BE7000 C:\WINDOWS\system32\DRIVERS\parport.sys 81920 bytes (Microsoft Corporation, Parallel Port Driver)
0xF6E5F000 C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS 81920 bytes (Microsoft Corporation, Video Port Driver)
0xB67A5000 C:\WINDOWS\system32\DRIVERS\ipsec.sys 77824 bytes (Microsoft Corporation, IPSec Driver)
0xB38BF000 c:\Program Files\Norton AntiVirus\SAVRTPEL.SYS 77824 bytes (Symantec Corporation, SAVRTPEL)
0xBF000000 C:\WINDOWS\System32\drivers\dxg.sys 73728 bytes (Microsoft Corporation, DirectX Graphics Driver)
0xF734B000 sr.sys 73728 bytes (Microsoft Corporation, System Restore Filesystem Filter Driver)
0xF749C000 pci.sys 69632 bytes (Microsoft Corporation, NT Plug and Play PCI Enumerator)
0xF6AF7000 C:\WINDOWS\system32\DRIVERS\psched.sys 69632 bytes (Microsoft Corporation, MS QoS Packet Scheduler)
0xB3C42000 C:\WINDOWS\System32\Drivers\Cdfs.SYS 65536 bytes (Microsoft Corporation, CD-ROM File System Driver)
0xF76AC000 C:\WINDOWS\system32\DRIVERS\nic1394.sys 65536 bytes (Microsoft Corporation, IEEE1394 Ndis Miniport and Call Manager)
0xF6B68000 C:\WINDOWS\system32\DRIVERS\arp1394.sys 61440 bytes (Microsoft Corporation, IP/1394 Arp Client)
0xF77BC000 C:\WINDOWS\system32\drivers\drmk.sys 61440 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter)
0xF764C000 ohci1394.sys 61440 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver)
0xF76FC000 C:\WINDOWS\system32\DRIVERS\redbook.sys 61440 bytes (Microsoft Corporation, Redbook Audio Filter Driver)
0xB3EB1000 C:\WINDOWS\system32\drivers\sysaudio.sys 61440 bytes (Microsoft Corporation, System Audio WDM Filter)
0xF77CC000 C:\WINDOWS\system32\DRIVERS\usbhub.sys 61440 bytes (Microsoft Corporation, Default Hub Driver for USB)
0xB2CD4000 C:\WINDOWS\System32\Drivers\usbaapl.sys 57344 bytes (Apple, Inc., Apple Mobile Device USB Driver)
0xF765C000 C:\WINDOWS\system32\DRIVERS\1394BUS.SYS 53248 bytes (Microsoft Corporation, 1394 Bus Device Driver)
0xF76EC000 C:\WINDOWS\system32\DRIVERS\cdrom.sys 53248 bytes (Microsoft Corporation, SCSI CD-ROM Driver)
0xF761C000 C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS 53248 bytes (Microsoft Corporation, SCSI Class System Dll)
0xF76CC000 C:\WINDOWS\system32\DRIVERS\i8042prt.sys 53248 bytes (Microsoft Corporation, i8042 Port Driver)
0xF770C000 C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 53248 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver)
0xF75FC000 VolSnap.sys 53248 bytes (Microsoft Corporation, Volume Shadow Copy Driver)
0xF774C000 C:\WINDOWS\System32\Drivers\pcouffin.sys 49152 bytes (VSO Software, low level access layer for CD/DVD/BD devices)
0xF772C000 C:\WINDOWS\system32\DRIVERS\raspptp.sys 49152 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol)
0xF76DC000 C:\WINDOWS\system32\DRIVERS\imapi.sys 45056 bytes (Microsoft Corporation, IMAPI Kernel Driver)
0xF75EC000 MountMgr.sys 45056 bytes (Microsoft Corporation, Mount Manager)
0xF771C000 C:\WINDOWS\system32\DRIVERS\raspppoe.sys 45056 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver)
0xF778C000 C:\WINDOWS\System32\Drivers\NDProxy.SYS 40960 bytes (Microsoft Corporation, NDIS Proxy)
0xF762C000 PxHelp20.sys 40960 bytes (Sonic Solutions, Px Engine Device Driver for Windows 2000/XP)
0xF763C000 SISAGPX.sys 40960 bytes (Silicon Integrated Systems Corporation, SiS AGPv3.5 Filter)
0xF775C000 C:\WINDOWS\system32\DRIVERS\termdd.sys 40960 bytes (Microsoft Corporation, Terminal Server Driver)
0xF760C000 disk.sys 36864 bytes (Microsoft Corporation, PnP Disk Driver)
0xEE766000 C:\WINDOWS\System32\Drivers\Fips.SYS 36864 bytes (Microsoft Corporation, FIPS Crypto Driver)
0xF6B88000 C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS 36864 bytes (Microsoft Corporation, Hid Class Library)
0xF76BC000 C:\WINDOWS\system32\DRIVERS\intelppm.sys 36864 bytes (Microsoft Corporation, Processor Device Driver)
0xF75DC000 isapnp.sys 36864 bytes (Microsoft Corporation, PNP ISA Bus Driver)
0xF773C000 C:\WINDOWS\system32\DRIVERS\msgpc.sys 36864 bytes (Microsoft Corporation, MS General Packet Classifier)
0xF6B58000 C:\WINDOWS\system32\DRIVERS\netbios.sys 36864 bytes (Microsoft Corporation, NetBIOS interface driver)
0xB32EF000 C:\WINDOWS\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver)
0xF783C000 C:\WINDOWS\system32\DRIVERS\wanarp.sys 36864 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver)
0xF78DC000 C:\WINDOWS\System32\Drivers\Modem.SYS 32768 bytes (Microsoft Corporation, Modem Device Driver)
0xF78C4000 C:\WINDOWS\System32\Drivers\Npfs.SYS 32768 bytes (Microsoft Corporation, NPFS Driver)
0xF791C000 C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library)
0xF785C000 C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS 28672 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension)
0xF7954000 C:\WINDOWS\system32\DRIVERS\RimSerial.sys 28672 bytes (Research in Motion Ltd, RIM Virtual Serial Driver)
0xF78B4000 C:\WINDOWS\system32\DRIVERS\usbehci.sys 28672 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver)
0xF7914000 C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 28672 bytes (Microsoft Corporation, USB Mass Storage Class Driver)
0xB4039000 C:\WINDOWS\system32\windrvNT.sys 28672 bytes
0xF78D4000 C:\WINDOWS\System32\Drivers\avgmfx86.sys 24576 bytes (AVG Technologies CZ, s.r.o., AVG Resident Shield Minifilter Driver)
0xF7904000 C:\WINDOWS\SYSTEM32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter)
0xF78E4000 C:\WINDOWS\system32\DRIVERS\kbdclass.sys 24576 bytes (Microsoft Corporation, Keyboard Class Driver)
0xF795C000 C:\WINDOWS\system32\DRIVERS\mouclass.sys 24576 bytes (Microsoft Corporation, Mouse Class Driver)
0xF78FC000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS)
0xF79E4000 C:\WINDOWS\System32\drivers\vga.sys 24576 bytes (Microsoft Corporation, VGA/Super VGA Video Driver)
0xF79DC000 C:\WINDOWS\system32\DRIVERS\AegisP.sys 20480 bytes (Cisco Systems, Inc., IEEE 802.1X Protocol Driver)
0xF78A4000 C:\WINDOWS\System32\Drivers\Msfs.SYS 20480 bytes (Microsoft Corporation, Mailslot driver)
0xF7864000 PartMgr.sys 20480 bytes (Microsoft Corporation, Partition Manager)
0xF7934000 C:\WINDOWS\system32\DRIVERS\ptilink.sys 20480 bytes (Parallel Technologies, Inc., Parallel Technologies DirectParallel IO Library)
0xF7944000 C:\WINDOWS\system32\DRIVERS\raspti.sys 20480 bytes (Microsoft Corporation, PTI DirectParallel® mini-port/call-manager driver)
0xF7924000 C:\WINDOWS\system32\DRIVERS\TDI.SYS 20480 bytes (Microsoft Corporation, TDI Wrapper)
0xF78AC000 C:\WINDOWS\system32\DRIVERS\usbuhci.sys 20480 bytes (Microsoft Corporation, UHCI USB Miniport Driver)
0xF790C000 C:\WINDOWS\System32\watchdog.sys 20480 bytes (Microsoft Corporation, Watchdog Driver)
0xF7AD4000 C:\WINDOWS\system32\DRIVERS\mssmbios.sys 16384 bytes (Microsoft Corporation, System Management BIOS Driver)
0xF7A90000 C:\WINDOWS\system32\DRIVERS\PS2.sys 16384 bytes (Hewlett-Packard Company, PS2 SYS)
0xF7AB4000 C:\WINDOWS\system32\DRIVERS\srvkp.sys 16384 bytes (Silicon Integrated Systems Corporation, SiS VGA Driver Manager)
0xF79EC000 C:\WINDOWS\system32\BOOTVID.dll 12288 bytes (Microsoft Corporation, VGA Boot Driver)
0xB67EC000 C:\WINDOWS\System32\drivers\Dxapi.sys 12288 bytes (Microsoft Corporation, DirectX API Driver)
0xF7AA4000 C:\WINDOWS\system32\DRIVERS\fsvga.sys 12288 bytes (Microsoft Corporation, Full Screen Video Driver)
0xF6BC7000 C:\WINDOWS\system32\DRIVERS\hidusb.sys 12288 bytes (Microsoft Corporation, USB Miniport Driver for Input Devices)
0xF6A5D000 C:\WINDOWS\system32\DRIVERS\mouhid.sys 12288 bytes (Microsoft Corporation, HID Mouse Filter Driver)
0xF7AAC000 C:\WINDOWS\system32\DRIVERS\ndistapi.sys 12288 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver)
0xF6BE3000 C:\WINDOWS\system32\DRIVERS\rasacd.sys 12288 bytes (Microsoft Corporation, RAS Automatic Connection Driver)
0xF7AFE000 C:\WINDOWS\System32\Drivers\Beep.SYS 8192 bytes (Microsoft Corporation, BEEP Driver)
0xF7AE2000 dmload.sys 8192 bytes (Microsoft Corp., Veritas Software., NT Disk Manager Startup Driver)
0xF7AFA000 C:\WINDOWS\System32\Drivers\Fs_Rec.SYS 8192 bytes (Microsoft Corporation, File System Recognizer Driver)
0xF7AE0000 intelide.sys 8192 bytes (Microsoft Corporation, Intel PCI IDE Driver)
0xF7ADC000 C:\WINDOWS\system32\KDCOM.DLL 8192 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL)
0xF7B02000 C:\WINDOWS\System32\Drivers\mnmdd.SYS 8192 bytes (Microsoft Corporation, Frame buffer simulator)
0xF7B62000 C:\WINDOWS\system32\drivers\MSPQM.sys 8192 bytes (Microsoft Corporation, MS Proxy Quality Manager)
0xF7B06000 C:\WINDOWS\System32\DRIVERS\RDPCDD.sys 8192 bytes (Microsoft Corporation, RDP Miniport)
0xF7AE8000 C:\WINDOWS\System32\Drivers\RootMdm.sys 8192 bytes (Microsoft Corporation, Legacy Non-Pnp Modem Device Driver)
0xF7AEE000 C:\WINDOWS\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator)
0xF7AF6000 C:\WINDOWS\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver)
0xF7ADE000 C:\WINDOWS\system32\DRIVERS\WMILIB.SYS 8192 bytes (Microsoft Corporation, WMILIB WMI support library Dll)
0xF7CAF000 C:\WINDOWS\system32\DRIVERS\audstub.sys 4096 bytes (Microsoft Corporation, AudStub Driver)
0xF7CAB000 C:\WINDOWS\System32\drivers\dxgthk.sys 4096 bytes (Microsoft Corporation, DirectX Graphics Driver Thunk)
0xF7D08000 C:\WINDOWS\System32\Drivers\Null.SYS 4096 bytes (Microsoft Corporation, NULL Driver)
0x867553F8 unknown_irp_handler 3080 bytes
!!!!!!!!!!!Hidden driver: 0x864FEAEA ?_empty_? 1302 bytes
0x864FEEC5 unknown_irp_handler 315 bytes
!!!!!!!!!!!Hidden driver: 0x86565630 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xF737D000 WARNING: suspicious driver modification [atapi.sys::0x864FEAEA]
0xF76CC000 WARNING: Virus alike driver modification [i8042prt.sys], 53248 bytes

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:00 AM

Posted 08 September 2010 - 10:39 PM

Hello, there are some unknown and modified/suspicious .sys filres here. We need a deeper look. Please follow these instructions to post needed logs.

Preparation Guide . proceed to steps 6 through 9.
If you cannot perform a step move on to the next. Post all required logs and the complete log.
Instead of GMER post the RKUnhooker log from above.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 09 September 2010 - 04:56 PM

defogger_disable by jpshortstuff (23.02.10.1)
Log created at 17:37 on 09/09/2010 (HP_Administrator)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...
Unable to read vlhfuny.sys


-=E.O.F=-


Defogger log ;

Edited by -TX-, 09 September 2010 - 04:58 PM.


#13 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 09 September 2010 - 04:58 PM

EDIT:

Can't post logs for some reason;
here is a .zip folder with all logs.

http://www.mediafire.com/?hnw2n3lcs76k9lw

Edited by -TX-, 09 September 2010 - 05:02 PM.


#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:00 AM

Posted 09 September 2010 - 07:23 PM

Hi,can you create the New topic there and let me know. This way you will get email notification. Then I can copy your logs into the topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 -TX-

-TX-
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 10 September 2010 - 08:35 AM

Done.
Sent a PM too.

Thanks! :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users