Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google redirect/clicksor virus


  • This topic is locked This topic is locked
25 replies to this topic

#1 natleed

natleed

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 30 October 2010 - 01:52 PM

To whom may help me,

Running Windows Vista Home edition- 32 bit

Experiencing problems with a possible google redirect/pop-up virus. Sometimes web pages freeze with "www.google-analyics.com" at the bottom, or occasionally a seperate pop-up window will open with only a white screen with "clicksor.com" type addresses at the bottom. I have tried all browsers from Chrome to Explorer to Mozilla, all with similar results on different pages. One example is a page that freezes with the "google-analytics.com" in Mozilla, may work perfectly in Explorer, and so on.

Not sure how virus was picked up, but the time frame is coincidental to the installation of a new wireless router(Netgear N150) in my home network. I'm not sure if that can have any effect, but the timing does seem fishy. I have tried to reinstall the oprating system(Vista Home) a few times, followed by antivirus installation, followed by Windows updates, but alas the problem remains. I have attached the three files requested in the Preparation Guide, and also have run combofix once(I ran it before I read the preparation guide, hopefully with no ill effects). Any help is appreciated.

Nat

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 30 October 2010 - 03:25 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • Do not Attach logs unless I ask you to.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond to your topic and facilitate the cleaning of your machine.

Note** If you are having problems posting the complete log into this thread upload them here http://www.rapidshare.com/ and post the links in this thread

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.



Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"



Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 02 November 2010 - 02:15 AM

Hello

three day bump

It has been Three days since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 05 November 2010 - 01:00 AM

Due to lack of feedback, this topic is now Closed

If you need this topic reopened, please send me a PM.
Please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic.

The fixes and advice in this thread are for this machine only.
Do not apply the instructions from this thread to your own machine.
Please start a new thread describing your issue and someone will be along to assist you.


With Regards,
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 10:39 AM

Hello

try this please the website has been closed as of late

Scan With RKUnHooker

  • Please Download Rootkit Unhooker Save it to your desktop.
  • extract RKUnhooker to your desktop
    Note** it is zipped up in a .rar file - If you do not have a program to unzip this type of file
    you can get a free one from here - http://www.7-zip.org/
  • Now double-click on RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan.
  • Check (Tick) Drivers, Stealth,. Uncheck the rest. then Click OK.
  • Wait till the scanner has finished and then click File, Save Report.
  • Save the report somewhere where you can find it. Click Close.
Copy the entire contents of the report and paste it in a reply here.

Note** you may get this warning it is ok, just ignore

"Rootkit Unhooker has detected a parasite inside itself!
It is recommended to remove parasite, okay?"


"just click on Cancel, then Accept".

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 natleed

natleed
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 10 November 2010 - 11:27 AM

I downloaded the files, but when I click on RkUnhooker from the desktop I only briefly see the small black window before it disappears.

#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 11:40 AM

Hello

I Would like you to do the following.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 natleed

natleed
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 10 November 2010 - 01:35 PM

I had no problems downloading and running combofix. I am still getting google redirects, and blank pop-ups from google-analytics and epoclick. Here is the log from combofix:

ComboFix 10-11-09.03 - Duvall 11/10/2010 13:19:43.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.2429.1764 [GMT -5:00]
Running from: c:\users\Duvall\Downloads\ComboFix.exe
SP: SUPERAntiSpyware *enabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}
.

((((((((((((((((((((((((( Files Created from 2010-10-10 to 2010-11-10 )))))))))))))))))))))))))))))))
.

2010-11-10 18:24 . 2010-11-10 18:24 -------- d-----w- c:\users\Default\AppData\Local\temp
2010-11-10 16:20 . 2010-11-10 16:20 -------- d-----w- c:\program files\7-Zip
2010-11-09 23:05 . 2010-10-07 11:37 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat
2010-11-09 12:43 . 2010-10-18 13:41 6146896 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{9114A2EE-CDC9-429E-94C7-13D8A9C5AC0E}\mpengine.dll
2010-11-05 11:00 . 2008-01-21 02:23 89600 ----a-w- c:\windows\system32\Spool\prtprocs\w32x86\HPZPPLHN.DLL
2010-11-03 07:20 . 2010-11-03 07:20 -------- d-----w- c:\program files\Windows Portable Devices
2010-11-03 07:03 . 2009-10-01 01:02 30208 ----a-w- c:\windows\system32\WPDShextAutoplay.exe
2010-11-03 07:03 . 2009-10-01 01:02 31232 ----a-w- c:\windows\system32\BthMtpContextHandler.dll
2010-11-03 07:03 . 2009-10-01 01:01 81920 ----a-w- c:\windows\system32\wpdbusenum.dll
2010-11-03 07:03 . 2009-10-01 01:01 60928 ----a-w- c:\windows\system32\PortableDeviceConnectApi.dll
2010-11-03 07:03 . 2009-10-01 01:02 2537472 ----a-w- c:\windows\system32\wpdshext.dll
2010-11-03 07:03 . 2009-10-01 01:02 334848 ----a-w- c:\windows\system32\PortableDeviceApi.dll
2010-11-03 07:03 . 2009-10-01 01:02 87552 ----a-w- c:\windows\system32\WPDShServiceObj.dll
2010-11-03 07:03 . 2009-10-01 01:01 546816 ----a-w- c:\windows\system32\wpd_ci.dll
2010-11-03 07:03 . 2009-10-01 01:01 160256 ----a-w- c:\windows\system32\PortableDeviceTypes.dll
2010-11-03 07:03 . 2009-10-01 01:01 350208 ----a-w- c:\windows\system32\WPDSp.dll
2010-11-03 07:03 . 2009-10-01 01:01 196608 ----a-w- c:\windows\system32\PortableDeviceWMDRM.dll
2010-11-03 07:03 . 2009-10-01 01:01 100864 ----a-w- c:\windows\system32\PortableDeviceClassExtension.dll
2010-11-03 07:03 . 2009-10-01 01:01 227840 ----a-w- c:\windows\system32\drivers\UMDF\WpdFs.dll
2010-11-03 07:02 . 2009-10-08 21:08 555520 ----a-w- c:\windows\system32\UIAutomationCore.dll
2010-11-03 07:02 . 2009-10-08 21:08 234496 ----a-w- c:\windows\system32\oleacc.dll
2010-11-03 07:02 . 2009-10-08 21:07 4096 ----a-w- c:\windows\system32\oleaccrc.dll
2010-11-03 02:36 . 2010-11-03 02:36 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2010-11-03 02:36 . 2010-11-03 02:36 -------- d-----w- c:\program files\SUPERAntiSpyware
2010-11-02 23:29 . 2010-11-02 23:29 -------- d-----w- c:\windows\system32\ca-ES
2010-11-02 23:29 . 2010-11-02 23:29 -------- d-----w- c:\windows\system32\eu-ES
2010-11-02 23:29 . 2010-11-02 23:29 -------- d-----w- c:\windows\system32\vi-VN
2010-11-02 22:03 . 2010-11-02 22:03 -------- d-----w- c:\windows\system32\EventProviders
2010-11-02 12:36 . 2009-04-11 05:03 12240896 ----a-w- c:\windows\system32\NlsLexicons0007.dll
2010-11-02 12:35 . 2009-04-11 06:28 1591296 ----a-w- c:\windows\system32\setupapi.dll
2010-11-02 12:23 . 2010-09-06 16:20 125952 ----a-w- c:\windows\system32\srvsvc.dll
2010-11-02 12:23 . 2010-09-06 13:45 304128 ----a-w- c:\windows\system32\drivers\srv.sys
2010-11-02 12:23 . 2010-09-06 13:45 145408 ----a-w- c:\windows\system32\drivers\srv2.sys
2010-11-02 12:23 . 2010-09-06 13:45 102400 ----a-w- c:\windows\system32\drivers\srvnet.sys
2010-11-02 12:23 . 2010-09-06 16:19 17920 ----a-w- c:\windows\system32\netevent.dll
2010-11-02 12:23 . 2010-03-05 14:01 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-11-02 12:23 . 2009-08-24 11:36 377344 ----a-w- c:\windows\system32\winhttp.dll
2010-11-02 12:23 . 2010-08-31 15:44 531968 ----a-w- c:\windows\system32\comctl32.dll
2010-11-02 12:22 . 2009-04-23 12:15 784896 ----a-w- c:\windows\system32\rpcrt4.dll
2010-11-02 12:22 . 2010-05-27 20:08 739328 ----a-w- c:\windows\system32\inetcomm.dll
2010-11-02 12:22 . 2009-10-07 11:36 243712 ----a-w- c:\windows\system32\rastls.dll
2010-11-02 12:22 . 2009-08-10 12:35 355328 ----a-w- c:\windows\system32\WSDApi.dll
2010-11-02 12:16 . 2009-12-04 18:29 1314816 ----a-w- c:\windows\system32\quartz.dll
2010-11-02 12:16 . 2009-12-04 18:30 12288 ----a-w- c:\windows\system32\tsbyuv.dll
2010-11-02 12:16 . 2009-12-04 18:28 31744 ----a-w- c:\windows\system32\msvidc32.dll
2010-11-02 12:16 . 2009-12-04 18:28 13312 ----a-w- c:\windows\system32\msrle32.dll
2010-11-02 12:16 . 2009-12-04 18:28 22528 ----a-w- c:\windows\system32\msyuv.dll
2010-11-02 12:16 . 2009-12-04 18:28 82944 ----a-w- c:\windows\system32\mciavi32.dll
2010-11-02 12:16 . 2009-12-04 18:28 50176 ----a-w- c:\windows\system32\iyuv_32.dll
2010-11-02 12:16 . 2009-12-04 18:27 91136 ----a-w- c:\windows\system32\avifil32.dll
2010-11-02 12:16 . 2009-12-04 18:28 123904 ----a-w- c:\windows\system32\msvfw32.dll
2010-11-02 12:16 . 2009-05-08 12:53 604672 ----a-w- c:\windows\system32\WMSPDMOD.DLL
2010-11-02 07:00 . 2009-11-08 14:55 99176 ----a-w- c:\windows\system32\PresentationHostProxy.dll
2010-11-02 07:00 . 2009-11-08 14:55 49472 ----a-w- c:\windows\system32\netfxperf.dll
2010-11-02 07:00 . 2009-11-08 14:55 297808 ----a-w- c:\windows\system32\mscoree.dll
2010-11-02 07:00 . 2009-11-08 14:55 295264 ----a-w- c:\windows\system32\PresentationHost.exe
2010-11-02 07:00 . 2009-11-08 14:55 1130824 ----a-w- c:\windows\system32\dfshim.dll
2010-11-02 01:57 . 2010-10-19 15:41 222080 ------w- c:\windows\system32\MpSigStub.exe
2010-11-02 01:39 . 2008-05-27 04:59 18904 ----a-w- c:\windows\system32\StructuredQuerySchemaTrivial.bin
2010-11-02 01:18 . 2010-08-26 04:23 13312 ----a-w- c:\program files\Internet Explorer\iecompat.dll
2010-11-02 01:16 . 2010-09-08 05:57 1469440 ----a-w- c:\windows\system32\inetcpl.cpl
2010-11-02 01:15 . 2009-03-08 11:35 233984 ----a-w- c:\program files\Internet Explorer\jsprofilerui.dll
2010-11-02 00:38 . 2010-02-20 23:06 24064 ----a-w- c:\windows\system32\nshhttp.dll
2010-11-02 00:38 . 2010-02-20 20:53 411648 ----a-w- c:\windows\system32\drivers\http.sys
2010-11-02 00:38 . 2010-02-20 23:05 30720 ----a-w- c:\windows\system32\httpapi.dll
2010-11-02 00:35 . 2008-02-29 06:35 6656 ----a-w- c:\windows\system32\kbd106n.dll
2010-11-02 00:32 . 2009-06-10 11:41 2868224 ----a-w- c:\windows\system32\mf.dll
2010-11-02 00:32 . 2009-04-11 06:28 98816 ----a-w- c:\windows\system32\mfps.dll
2010-11-02 00:32 . 2009-04-11 06:27 53248 ----a-w- c:\windows\system32\rrinstaller.exe
2010-11-02 00:32 . 2009-04-11 06:27 24576 ----a-w- c:\windows\system32\mfpmp.exe
2010-11-02 00:32 . 2009-04-11 04:54 2048 ----a-w- c:\windows\system32\mferror.dll
2010-11-02 00:32 . 2009-07-15 12:39 313344 ----a-w- c:\windows\system32\wmpdxm.dll
2010-11-02 00:32 . 2009-07-15 10:21 43520 ----a-w- c:\windows\system32\msdxm.tlb
2010-11-02 00:32 . 2009-07-15 10:21 18432 ----a-w- c:\windows\system32\amcompat.tlb
2010-11-02 00:32 . 2010-06-22 13:30 2048 ----a-w- c:\windows\system32\tzres.dll
2010-11-02 00:30 . 2010-01-25 12:00 471552 ----a-w- c:\windows\system32\secproc.dll
2010-11-02 00:29 . 2009-10-23 17:10 714240 ----a-w- c:\windows\system32\timedate.cpl
2010-11-02 00:29 . 2010-02-23 11:10 212992 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-11-02 00:29 . 2010-02-23 11:10 79360 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-11-02 00:29 . 2010-02-23 11:10 106496 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-11-02 00:29 . 2010-06-28 17:00 1316864 ----a-w- c:\windows\system32\ole32.dll
2010-11-02 00:29 . 2010-06-28 14:54 339968 ----a-w- c:\program files\Windows NT\Accessories\wordpad.exe
2010-11-02 00:29 . 2010-01-29 15:40 1616384 ----a-w- c:\program files\Windows Mail\msoe.dll
2010-11-02 00:29 . 2010-08-10 15:53 274944 ----a-w- c:\windows\system32\schannel.dll
2010-11-02 00:29 . 2009-07-17 13:54 71680 ----a-w- c:\windows\system32\atl.dll
2010-11-02 00:29 . 2010-05-27 20:08 81920 ----a-w- c:\windows\system32\iccvid.dll
2010-11-02 00:29 . 2010-04-05 17:02 317952 ----a-w- c:\windows\system32\MP4SDECD.DLL
2010-11-02 00:29 . 2009-09-04 11:41 60928 ----a-w- c:\windows\system32\msasn1.dll
2010-11-02 00:29 . 2010-04-16 16:46 502272 ----a-w- c:\windows\system32\usp10.dll
2010-11-02 00:14 . 2009-09-10 14:58 1418752 ----a-w- c:\program files\Windows Media Player\setup_wm.exe
2010-11-02 00:14 . 2009-09-10 14:58 310784 ----a-w- c:\windows\system32\unregmp2.exe
2010-11-02 00:13 . 2009-12-23 11:33 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-11-02 00:12 . 2010-01-13 17:34 98304 ----a-w- c:\windows\system32\cabview.dll
2010-11-02 00:07 . 2009-08-07 02:24 44768 ----a-w- c:\windows\system32\wups2.dll
2010-11-02 00:07 . 2009-08-07 02:24 53472 ----a-w- c:\windows\system32\wuauclt.exe
2010-11-02 00:07 . 2009-08-07 02:23 1929952 ----a-w- c:\windows\system32\wuaueng.dll
2010-11-02 00:07 . 2009-08-07 01:45 2421760 ----a-w- c:\windows\system32\wucltux.dll
2010-11-02 00:06 . 2009-08-07 02:24 35552 ----a-w- c:\windows\system32\wups.dll
2010-11-02 00:06 . 2009-08-07 02:23 575704 ----a-w- c:\windows\system32\wuapi.dll
2010-11-02 00:06 . 2009-08-07 01:44 87552 ----a-w- c:\windows\system32\wudriver.dll
2010-11-02 00:06 . 2009-08-06 23:23 171608 ----a-w- c:\windows\system32\wuwebv.dll
2010-11-02 00:06 . 2009-08-06 22:44 33792 ----a-w- c:\windows\system32\wuapp.exe
2010-11-01 23:46 . 2010-11-01 22:51 -------- d-----w- c:\windows\Panther
2010-11-01 23:46 . 2010-11-02 23:36 -------- d-----w- C:\Boot
2010-11-01 23:46 . 2010-11-01 23:46 -------- d-----w- c:\windows\system32\OEM
2010-11-01 22:53 . 2010-11-02 23:27 -------- d-----w- c:\windows\Debug
2010-11-01 21:43 . 2010-11-01 21:43 -------- d-----w- c:\program files\Common Files\Adobe
2010-11-01 21:42 . 2010-11-01 21:42 -------- d-----w- c:\program files\Common Files\Adobe AIR
2010-11-01 21:08 . 2007-07-27 16:15 5455872 ----a-w- c:\windows\system32\IDTSG.cpl
2010-11-01 21:08 . 2007-07-27 15:49 102400 ----a-w- c:\windows\system32\stacsv.exe
2010-11-01 21:08 . 2007-07-27 15:48 405504 ----a-w- c:\windows\sttray.exe
2010-11-01 21:08 . 2007-04-11 00:02 1601536 ----a-w- c:\windows\system32\stlang.dll
2010-11-01 21:07 . 2007-07-27 15:48 146944 ----a-w- c:\windows\system32\staco.dll
2010-11-01 21:07 . 2007-07-27 15:50 329728 ----a-w- c:\windows\system32\drivers\stwrt.sys
2010-11-01 21:07 . 2007-07-27 15:50 328704 ----a-w- c:\windows\system32\stcplx.dll
2010-11-01 21:07 . 2007-07-27 15:48 299008 ----a-w- c:\windows\system32\stapi32.dll
2010-11-01 21:07 . 2007-01-30 19:37 562176 ----a-w- c:\windows\system32\stapo.dll
2010-11-01 21:07 . 2010-11-01 21:08 -------- d-----w- c:\program files\IDT
2010-11-01 21:02 . 2010-11-01 21:02 -------- d-----w- c:\program files\Realtek
2010-11-01 20:54 . 2006-10-26 15:08 50752 ------w- c:\windows\system32\agrsmdel.exe
2010-11-01 20:54 . 2010-11-01 20:54 -------- d-----w- c:\windows\Options
2010-11-01 20:52 . 2007-06-16 01:47 47616 ----a-w- c:\windows\system32\drivers\RTSTOR.sys
2010-11-01 20:52 . 2007-06-15 22:08 4840232 ----a-w- c:\windows\system\DriveIcon.dll
2010-11-01 20:52 . 2010-11-01 20:52 -------- d-----w- c:\program files\Common Files\InstallShield
2010-11-01 20:47 . 2010-11-01 20:48 -------- d-----w- c:\program files\ATI Technologies

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-08-26 16:33 . 2010-11-02 00:30 173056 ----a-w- c:\windows\apppatch\AcXtrnal.dll
2010-08-26 16:33 . 2010-11-02 00:30 542720 ----a-w- c:\windows\apppatch\AcLayers.dll
2010-08-26 16:33 . 2010-11-02 00:30 458752 ----a-w- c:\windows\apppatch\AcSpecfc.dll
2010-08-26 16:33 . 2010-11-02 00:30 2159616 ----a-w- c:\windows\apppatch\AcGenral.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2010-10-25 2424560]
"Google Update"="c:\users\Duvall\AppData\Local\Google\Update\GoogleUpdate.exe" [2010-11-10 136176]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"avast5"="c:\program files\Alwil Software\Avast5\avastUI.exe" [2010-09-07 2838912]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-11-17 815104]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2006-11-10 90112]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2010-09-23 35760]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-09-21 932288]
"SigmatelSysTrayApp"="sttray.exe" [2007-07-27 405504]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"

R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R3 Microsoft SharePoint Workspace Audit Service;Microsoft SharePoint Workspace Audit Service;c:\program files\Microsoft Office\Office14\GROOVE.EXE [2010-01-21 30963576]
R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-10 4640000]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
S1 aswSP;aswSP; [x]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
S2 aswFsBlk;aswFsBlk; [x]
S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-09-07 50768]
S3 RTL8187B;Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\DRIVERS\RTL8187B.sys [2010-03-31 350720]


[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Contents of the 'Scheduled Tasks' folder

2010-11-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296391984-2133094976-2399343027-1000Core.job
- c:\users\Duvall\AppData\Local\Google\Update\GoogleUpdate.exe [2010-11-10 14:32]

2010-11-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296391984-2133094976-2399343027-1000UA.job
- c:\users\Duvall\AppData\Local\Google\Update\GoogleUpdate.exe [2010-11-10 14:32]
.
.
------- Supplementary Scan -------
.
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files\Common Files\microsoft shared\OFFICE14\MSOXMLMF.DLL
FF - ProfilePath - c:\users\Duvall\AppData\Roaming\Mozilla\Firefox\Profiles\jyjaiw5h.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.yahoo.com/
FF - plugin: c:\progra~1\MICROS~2\Office14\NPAUTHZ.DLL
FF - plugin: c:\progra~1\MICROS~2\Office14\NPSPWRAP.DLL
FF - plugin: c:\users\Duvall\AppData\Local\Google\Update\1.2.183.39\npGoogleOneClick8.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

---- FIREFOX POLICIES ----
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqz9s", true); // Traditional
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--fiqs8s", true); // Simplified
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--j6w193g", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4a87g", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7c0a67fbc", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbqly7cvafr", true);
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kpry57d", true); // Traditional
c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--kprw13d", true); // Simplified
c:\program files\Mozilla Firefox\defaults\pref\firefox.js - pref("dom.ipc.plugins.enabled", false);
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-11-10 13:24
Windows 6.0.6002 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe,-101"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10k_ActiveX.exe"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2010-11-10 13:25:52
ComboFix-quarantined-files.txt 2010-11-10 18:25
ComboFix2.txt 2010-11-10 18:04

Pre-Run: 194,205,335,552 bytes free
Post-Run: 194,183,507,968 bytes free

- - End Of File - - 20801923CD5CE77ED437C3FE4237498A

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 02:03 PM

we are going to check the router

Create and Run Batch File
Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

It should look like this: Posted Image <--XP
Double-click on router.bat to run it. it will open notepad when done please post back the results
gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 natleed

natleed
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 10 November 2010 - 02:07 PM

Windows IP Configuration

Host Name . . . . . . . . . . . . : Duvall-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Physical Address. . . . . . . . . : 00-16-44-A4-C3-11
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b193:160:7811:47a8%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Wednesday, November 10, 2010 1:27:58 PM
Lease Expires . . . . . . . . . . : Thursday, November 11, 2010 1:27:58 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 268441156
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-60-D3-1D-00-03-25-59-33-8D
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : 00-03-25-59-33-8D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{5F93002B-D120-4136-96A5-78618FD13D5F}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 72.14.204.99
72.14.204.103
72.14.204.147
72.14.204.104

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 67.195.160.76
98.137.149.56
69.147.125.65
209.191.122.70
72.30.2.43



Pinging google.com [72.14.204.99] with 32 bytes of data:

Reply from 72.14.204.99: bytes=32 time=47ms TTL=52

Reply from 72.14.204.99: bytes=32 time=52ms TTL=52



Ping statistics for 72.14.204.99:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 47ms, Maximum = 52ms, Average = 49ms



Pinging yahoo.com [72.30.2.43] with 32 bytes of data:

Reply from 72.30.2.43: bytes=32 time=94ms TTL=48

Reply from 72.30.2.43: bytes=32 time=90ms TTL=48



Ping statistics for 72.30.2.43:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 90ms, Maximum = 94ms, Average = 92ms

===========================================================================
Interface List
11 ...00 16 44 a4 c3 11 ...... Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
10 ...00 03 25 59 33 8d ...... Realtek PCIe FE Family Controller
1 ........................... Software Loopback Interface 1
13 ...00 00 00 00 00 00 00 e0 isatap.{5F93002B-D120-4136-96A5-78618FD13D5F}
14 ...00 00 00 00 00 00 00 e0 isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
12 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.2 281
192.168.1.2 255.255.255.255 On-link 192.168.1.2 281
192.168.1.255 255.255.255.255 On-link 192.168.1.2 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.2 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.2 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 306 ::1/128 On-link
11 281 fe80::/64 On-link
11 281 fe80::b193:160:7811:47a8/128
On-link
1 306 ff00::/8 On-link
11 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 02:30 PM

Hello

Can you connect to the modem and see if you can run the batch file again and let me know if you get redirected also


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 natleed

natleed
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 10 November 2010 - 02:40 PM

There seems to be no redirect or pop-ups when connected directly to the modem.

New batch file:


Windows IP Configuration

Host Name . . . . . . . . . . . . : Duvall-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : cfl.rr.com

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Physical Address. . . . . . . . . : 00-16-44-A4-C3-11
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b193:160:7811:47a8%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Wednesday, November 10, 2010 1:27:58 PM
Lease Expires . . . . . . . . . . : Thursday, November 11, 2010 1:27:58 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 268441156
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-60-D3-1D-00-03-25-59-33-8D
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : cfl.rr.com
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : 00-03-25-59-33-8D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::61bf:ae7b:7cb3:edfc%10(Preferred)
IPv4 Address. . . . . . . . . . . : 72.188.145.88(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.252.0
Lease Obtained. . . . . . . . . . : Wednesday, November 10, 2010 2:33:51 PM
Lease Expires . . . . . . . . . . : Wednesday, November 10, 2010 3:33:51 PM
Default Gateway . . . . . . . . . : 72.188.144.1
DHCP Server . . . . . . . . . . . : 10.193.64.1
DHCPv6 IAID . . . . . . . . . . . : 167772965
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-60-D3-1D-00-03-25-59-33-8D
DNS Servers . . . . . . . . . . . : 65.32.5.111
65.32.5.112
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . : cfl.rr.com
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 12:

Connection-specific DNS Suffix . : cfl.rr.com
Description . . . . . . . . . . . : Microsoft 6to4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2002:48bc:9158::48bc:9158(Preferred)
Default Gateway . . . . . . . . . : 2002:c058:6301::c058:6301
DNS Servers . . . . . . . . . . . : 65.32.5.111
65.32.5.112
NetBIOS over Tcpip. . . . . . . . : Disabled
Server: UnKnown
Address: 192.168.1.1

Server: UnKnown
Address: 192.168.1.1



Pinging google.com [74.125.159.147] with 32 bytes of data:

Reply from 74.125.159.147: bytes=32 time=50ms TTL=53

Reply from 74.125.159.147: bytes=32 time=31ms TTL=53



Ping statistics for 74.125.159.147:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 31ms, Maximum = 50ms, Average = 40ms



Pinging yahoo.com [69.147.125.65] with 32 bytes of data:

Reply from 69.147.125.65: bytes=32 time=41ms TTL=53

Reply from 69.147.125.65: bytes=32 time=41ms TTL=53



Ping statistics for 69.147.125.65:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 41ms, Maximum = 41ms, Average = 41ms

===========================================================================
Interface List
11 ...00 16 44 a4 c3 11 ...... Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
10 ...00 03 25 59 33 8d ...... Realtek PCIe FE Family Controller
1 ........................... Software Loopback Interface 1
13 ...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
14 ...00 00 00 00 00 00 00 e0 isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
12 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
21 ...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.2 25
0.0.0.0 0.0.0.0 72.188.144.1 72.188.145.88 20
72.188.144.0 255.255.252.0 On-link 72.188.145.88 276
72.188.145.88 255.255.255.255 On-link 72.188.145.88 276
72.188.147.255 255.255.255.255 On-link 72.188.145.88 276
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.2 281
192.168.1.2 255.255.255.255 On-link 192.168.1.2 281
192.168.1.255 255.255.255.255 On-link 192.168.1.2 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 72.188.145.88 276
224.0.0.0 240.0.0.0 On-link 192.168.1.2 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 72.188.145.88 276
255.255.255.255 255.255.255.255 On-link 192.168.1.2 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
21 1125 ::/0 2002:c058:6301::c058:6301
1 306 ::1/128 On-link
21 1025 2002::/16 On-link
21 281 2002:48bc:9158::48bc:9158/128
On-link
10 276 fe80::/64 On-link
11 281 fe80::/64 On-link
10 276 fe80::61bf:ae7b:7cb3:edfc/128
On-link
11 281 fe80::b193:160:7811:47a8/128
On-link
1 306 ff00::/8 On-link
10 276 ff00::/8 On-link
11 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 03:26 PM

Hello

Good - now hook back up the router and lets do a reset


Resetting Router

Let’s try to reset the router to its default configuration.
  • This can be done by inserting something tiny like a paper clip end or pencil tip into a small hole labeled "reset" located on the back of the router.
  • Press and hold down the small button inside until the lights on the front of the router blink off and then on again (usually about 10 seconds).
  • If you don’t know the router's default password, you can look it up. Here
  • You also need to reconfigure any security settings you had in place prior to the reset.
  • You may also need to consult with your Internet service provider to find out which DNS servers your network should be using or you can use OpenDNS
Note: After resetting your router, it is important to set a non-default password, and if possible, username, on the router. This will assist in eliminating the possibility of the router being hijacked again.

flush the DNS:

Now lets flush the DNS on the computer:

  • click on Start
  • select run
  • enter cmd and hit enter
  • a black window will open.
  • please enter the following text into that window and hit enter:


    ipconfig /flushdns

Now lets check the router again

Create and Run Batch File
Open Notepad and copy/paste the entire contents of the codebox below, into Notepad:
@echo off
>Log1.txt (
ipconfig /all
nslookup google.com
nslookup yahoo.com
ping -n 2 google.com
ping -n 2 yahoo.com
route print
)
start Log1.txt
del %0
Save this as router.bat Choose to Save type as - All Files and where to save - Desktop - then close the Notepad file.

It should look like this: Posted Image <--XP
Double-click on router.bat to run it. it will open notepad when done please post back the results

gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 natleed

natleed
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:04:33 AM

Posted 10 November 2010 - 04:38 PM

I reset the router, but when I tried to run the DNS flush I get the message "The requested operation requires elevation".

New router log-


Windows IP Configuration

Host Name . . . . . . . . . . . . : Duvall-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Physical Address. . . . . . . . . : 00-16-44-A4-C3-11
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b193:160:7811:47a8%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.3(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Wednesday, November 10, 2010 4:30:41 PM
Lease Expires . . . . . . . . . . : Thursday, November 11, 2010 4:30:42 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 268441156
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-60-D3-1D-00-03-25-59-33-8D
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : 00-03-25-59-33-8D
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 6:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 7:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 02-00-54-55-4E-01
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:49a:14bc:3f57:fefc(Preferred)
Link-local IPv6 Address . . . . . : fe80::49a:14bc:3f57:fefc%12(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled
Server: UnKnown
Address: 192.168.1.1

Name: google.com
Addresses: 74.125.229.19
74.125.229.20
74.125.229.16
74.125.229.17
74.125.229.18

Server: UnKnown
Address: 192.168.1.1

Name: yahoo.com
Addresses: 209.191.122.70
67.195.160.76
69.147.125.65
72.30.2.43
98.137.149.56



Pinging google.com [72.14.209.104] with 32 bytes of data:

Reply from 72.14.209.104: bytes=32 time=29ms TTL=51

Reply from 72.14.209.104: bytes=32 time=29ms TTL=51



Ping statistics for 72.14.209.104:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 29ms, Maximum = 29ms, Average = 29ms



Pinging yahoo.com [69.147.125.65] with 32 bytes of data:

Reply from 69.147.125.65: bytes=32 time=39ms TTL=52

Reply from 69.147.125.65: bytes=32 time=38ms TTL=52



Ping statistics for 69.147.125.65:

Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 38ms, Maximum = 39ms, Average = 38ms

===========================================================================
Interface List
11 ...00 16 44 a4 c3 11 ...... Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
10 ...00 03 25 59 33 8d ...... Realtek PCIe FE Family Controller
1 ........................... Software Loopback Interface 1
14 ...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
13 ...00 00 00 00 00 00 00 e0 isatap.{D23E0C53-22C4-4551-A381-F6CAE56AEA37}
12 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.3 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.3 281
192.168.1.3 255.255.255.255 On-link 192.168.1.3 281
192.168.1.255 255.255.255.255 On-link 192.168.1.3 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.3 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.3 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
12 18 ::/0 On-link
1 306 ::1/128 On-link
12 18 2001::/32 On-link
12 266 2001:0:4137:9e76:49a:14bc:3f57:fefc/128
On-link
11 281 fe80::/64 On-link
12 266 fe80::/64 On-link
12 266 fe80::49a:14bc:3f57:fefc/128
On-link
11 281 fe80::b193:160:7811:47a8/128
On-link
1 306 ff00::/8 On-link
12 266 ff00::/8 On-link
11 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:33 AM

Posted 10 November 2010 - 11:11 PM

hello

to elivate the prompt check here - http://www.winhelponline.com/articles/158/1/How-to-open-an-elevated-Command-Prompt-in-Windows-Vista.html

and tell me how things are now


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users