View Full Version
:
Browser Hijacking Virus/Malware Issue
Cman333
02-03-2012, 03:55 AM
Hey RS Guru's. I'm at witt's end right now. My gf somehow has installed some sort of browser hijacking virus onto her comp. I've spent the last 6 hours reading and trying so many things with no luck.
Basically what happens is when I google something and click any link it redirects me to random sites. (ie. yellowpages, lycos, etc etc). Doesn't matter if I use IE or Firefox. Same thing happens.
I've tried the following software with ZERO luck.
MSE, AVG, Ad-Aware, Malawarebytes.
I've tried hard resetting the router thinking maybe it got hijacked. I changed the network pw and router pw. I've changed the DNS.
All with the same result.
I've googled every single process that was open in task manager and everything seemed legit.
I really don't want to format because theres alot her school data and programs, and also running windows 7 that came pre-installed with the laptop.
I've read so many forums and had no luck finding out how to get rid of it. People keep recommending different software. If anyone has had this issue that could shed some light pllllllease help me out.
Thanks in advance guys!!!!
bluejays
02-03-2012, 08:40 AM
Try spybot s&d and ccleaner.
If that doesn't work hopefully she has a system restore point on it
Posted via RS Mobile (http://www.revscene.net/forums/announcement.php?a=228)
G-spec
02-03-2012, 09:29 AM
^ no, if Malware bytes doesn't find it Spybot for sure won't I know this for a fact...
as recently as last week I did a scan with both of these while Spybot came up with nothing, Malware bytes came up with 5 items.
Cman I had to fix the same thing on my aunt's pc few months ago, fck I'd love to tell you exactly how to fix it but I do not remember since I've done so many repairs on her pc....
I do remember however it did involve me fckin around with the RegEdit (start button and type in regedit open it, mostly in the HK user and local machine SOFTWARE folder) and manually deleting everything that looked fishy, that solved the issue.
A lot of times I would do a scan thinking I deleted certain stuff, only to go into regedit and still see the registry files there for whatever reason
Manic!
02-03-2012, 09:42 AM
Click start then type system restore. It will make the computer like it was before she got the virus. Will keep all her files that she made before the restore date.
Cman333
02-03-2012, 11:44 AM
Click start then type system restore. It will make the computer like it was before she got the virus. Will keep all her files that she made before the restore date.
Sorry forgot to mention the rest of the story. Didn't think I needed to.
She did do a system restore a couple times with no luck. Originally the virus deleted some vital files off the pc. So she ended up bringing to a computer repair place and the recovered the data she needed.
It's been about a week since this ordeal.
Soundy
02-03-2012, 12:06 PM
Click Start and enter "cmd" in the search box, then hit Enter to open a command prompt.
In the prompt, type "ipconfig /all". Copy and paste the results here.
Also, check the LMHOSTS file in c:\windows\system32\drivers\etc - copy and paste the contents of that file as well.
lilaznviper
02-03-2012, 12:20 PM
try scanning in safe mode as it will pick up more things if you haven't done so
Also see if the host file got screwed up. should be in c:\windows\system32\drivers\etc
G-spec
02-03-2012, 12:35 PM
yea I forgot to mention as well, that system restore is useless... I've never once managed to find a use out of it including when it comes to viruses and malware...
also that thing I told you to do with REGEDIT, aznVipers post reminded me just now that I did it all in Safe Mode.... as well as what Soundy says, the contents of that System32 folder are very important, that's where most of the shit ends up going so you gotta check that folder manually... I know myself I've found a shitload of crap in that folder including viruses and dialers, etc... over the years
So the REGEDIT thing, just boot the PC into safe mode when you're doing it, that way you know for sure none of these malware programs are running and you're free to tinker and delete all the registry files you want, since this type of shit boots itself up automatically soon as windows does and makes it impossible to delete at times
Cman333
02-04-2012, 01:23 PM
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Flo>ipconfig/all
Windows IP Configuration
Host Name . . . . . . . . . . . . : Flo-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : A4-BA-DB-D4-FA-FE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::7c5f:d190:2492:68cf%12(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.0.3(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : February-04-12 2:07:12 PM
Lease Expires . . . . . . . . . . : February-04-12 3:07:12 PM
Default Gateway . . . . . . . . . : 192.168.0.1
DHCP Server . . . . . . . . . . . : 192.168.0.1
DHCPv6 IAID . . . . . . . . . . . : 296008411
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-13-C6-00-57-A4-BA-DB-D4-FA-FE
DNS Servers . . . . . . . . . . . : 68.105.28.12
68.105.29.12
68.105.28.11
NetBIOS over Tcpip. . . . . . . . : Enabled
Wireless LAN adapter Wireless Network Connection:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Dell Wireless 1397 WLAN Mini-Card
Physical Address. . . . . . . . . : 70-F1-A1-C2-CB-62
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap.{7EB444C1-01E2-4BD4-AE62-D7EC05E871D7}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap.{8428EE03-ED6F-4C51-8428-9FE5401679F2}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter Teredo Tunneling Pseudo-Interface:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:4137:9e76:301d:33fe:b723:58df(Pref
erred)
Link-local IPv6 Address . . . . . : fe80::301d:33fe:b723:58df%13(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled
Cman333
02-04-2012, 01:25 PM
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample LMHOSTS file used by the Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to computernames
# (NetBIOS) names. Each entry should be kept on an individual line.
# The IP address should be placed in the first column followed by the
# corresponding computername. The address and the computername
# should be separated by at least one space or tab. The "#" character
# is generally used to denote the start of a comment (see the exceptions
# below).
#
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:<domain>
# #INCLUDE <filename>
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:<domain>" tag will associate the
# entry with the domain specified by <domain>. This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The <domain> is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE <filename>" will force the RFC NetBIOS (NBT)
# software to seek the specified <filename> and parse it as if it were
# local. <filename> is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
#
# The following example illustrates all of these extensions:
#
# 102.54.94.97 rhino #PRE #DOM:networking #net group's DC
# 102.54.94.102 "appname \0x14" #special app server
# 102.54.94.123 popular #PRE #source server
# 102.54.94.117 localsrv #PRE #needed for the include
#
# #BEGIN_ALTERNATE
# #INCLUDE \\localsrv\public\lmhosts
# #INCLUDE \\rhino\public\lmhosts
# #END_ALTERNATE
#
# In the above example, the "appname" server contains a special
# character in its name, the "popular" and "localsrv" server names are
# preloaded, and the "rhino" server name is specified so it can be used
# to later #INCLUDE a centrally maintained lmhosts file if the "localsrv"
# system is unavailable.
#
# Note that the whole file is parsed including comments on each lookup,
# so keeping the number of comments to a minimum will improve performance.
# Therefore it is not advisable to simply add lmhosts file entries onto the
# end of this file.
TOS'd
02-04-2012, 03:40 PM
Download HiJackThis, Run it in safemode, look through the log for anything unusual (if you don't think you see anything, post log on RS)
I fixed this exact problem a long time ago and it ended up being something like (randomnumbers).exe that was running.
In HiJackThis you can checkmark it and get it removed. Then manually locate the folder it was found in and double check to make sure it has been removed. Restart computer.
Cman333
02-12-2012, 05:53 PM
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 6:46:38 PM, on 12/02/2012
Platform: Windows 7 (WinNT 6.00.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16912)
Boot mode: Safe mode with network support
Running processes:
C:\Program Files (x86)\Trend Micro\HiJackThis\HiJackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = Dell | MSN (http://g.msn.com/USCON/23)
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = Bing (http://go.microsoft.com/fwlink/?LinkId=54896)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = Google (http://www.google.ca/)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = MSN.com (http://go.microsoft.com/fwlink/?LinkId=69157)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = Bing (http://go.microsoft.com/fwlink/?LinkId=54896)
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = Bing (http://go.microsoft.com/fwlink/?LinkId=54896)
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = MSN.com (http://go.microsoft.com/fwlink/?LinkId=69157)
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Int ernet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe
O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Search Helper - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files (x86)\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O2 - BHO: SkypeIEPluginBHO - {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files (x86)\Google\GoogleToolbarNotifier\5.7.7227.1100\s wg.dll
O2 - BHO: URLRedirectionBHO - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~2\MICROS~2\Office14\URLREDIR.DLL
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
O2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll
O4 - HKLM\..\Run: [StartCCC] "c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [PDVDDXSrv] "C:\Program Files (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe"
O4 - HKLM\..\Run: [Dell Webcam Central] "C:\Program Files (x86)\Dell Webcam\Dell Webcam Central\WebcamDell2.exe" /mode2
O4 - HKLM\..\Run: [Desktop Disc Tool] "c:\Program Files (x86)\Roxio\Roxio Burn\RoxioBurnLauncher.exe"
O4 - HKLM\..\Run: [DellSupportCenter] "C:\Program Files (x86)\Dell Support Center\bin\sprtcmd.exe" /P DellSupportCenter
O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files (x86)\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
O4 - HKLM\..\RunOnce: [Launcher] C:\Program Files (x86)\Dell DataSafe Local Backup\Components\scheduler\Launcher.exe
O4 - HKLM\..\RunOnce: [STToasterLauncher] C:\Program Files (x86)\Dell DataSafe Local Backup\toasterLauncher.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Skype] "C:\Program Files (x86)\Skype\Phone\Skype.exe" /nosplash /minimized
O4 - HKCU\..\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNo tifier.exe"
O4 - HKCU\..\Run: [Google Update] "C:\Users\Flo\AppData\Local\Google\Update\GoogleUpd ate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - .DEFAULT User Startup: Dell Dock First Run.lnk = C:\Program Files\Dell\DellDock\DellDock.exe (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files (x86)\HP\Digital Imaging\bin\hpqtra08.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~2\MICROS~2\Office14\EXCEL.EXE/3000
O8 - Extra context menu item: Se&nd to OneNote - res://C:\PROGRA~2\MICROS~2\Office14\ONBttnIE.dll/105
O9 - Extra button: @C:\Program Files (x86)\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1004 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra 'Tools' menuitem: @C:\Program Files (x86)\Windows Live\Writer\WindowsLiveWriterShortcuts.dll,-1003 - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files (x86)\Windows Live\Writer\WriterBrowserExtension.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: Se&nd to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll
O9 - Extra button: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll
O9 - Extra 'Tools' menuitem: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll
O9 - Extra button: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
O9 - Extra 'Tools' menuitem: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
O9 - Extra button: Show or hide HP Smart Web Printing - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O9 - Extra button: UB - {1FBA04EE-3024-11d2-8F1F-0000F87ABD16} - C:\Users\Flo\AppData\Roaming\Microsoft\Windows\Sta rt Menu\Programs\UB\UB.lnk (file missing) (HKCU)
O9 - Extra 'Tools' menuitem: UB - {1FBA04EE-3024-11d2-8F1F-0000F87ABD16} - C:\Users\Flo\AppData\Roaming\Microsoft\Windows\Sta rt Menu\Programs\UB\UB.lnk (file missing) (HKCU)
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O18 - Protocol: cozi - {5356518D-FE9C-4E08-9C1F-1E872ECD367F} - c:\Program Files (x86)\Cozi Express\CoziProtocolHandler.dll
O18 - Protocol: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - C:\Program Files (x86)\Windows Live\Photo Gallery\AlbumDownloadProtocolHandler.dll
O18 - Filter hijack: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: AMD Fusion Utility Service (AMDFusionSVC) - Advanced Micro Devices - c:\Program Files (x86)\AMD\Fusion Utility for Mobility\FusionSVC.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Dock Login Service (DockLoginService) - Stardock Corporation - C:\Program Files\Dell\DellDock\DockLogin.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: GameConsoleService - WildTangent, Inc. - C:\Program Files (x86)\WildTangent\Dell Games\Dell Game Console\GameConsoleService.exe
O23 - Service: GoToAssist - Citrix Online, a division of Citrix Systems, Inc. - C:\Program Files (x86)\Citrix\GoToAssist\514\g2aservice.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: SoftThinks Agent Service (SftService) - SoftThinks - C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: SupportSoft Sprocket Service (DellSupportCenter) (sprtsvc_DellSupportCenter) - SupportSoft, Inc. - C:\Program Files (x86)\Dell Support Center\bin\sprtsvc.exe
O23 - Service: Audio Service (STacSV) - IDT, Inc. - C:\Windows\System32\DriverStore\FileRepository\stw rt64.inf_amd64_neutral_afc3018f8cfedd20\STacSV64.e xe
O23 - Service: TeamViewer 6 (TeamViewer6) - TeamViewer GmbH - C:\Program Files (x86)\TeamViewer\Version6\TeamViewer_Service.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: Dell Wireless WLAN Tray Service (wltrysvc) - Unknown owner - C:\Program Files\Dell\Dell Wireless WLAN Card\WLTRYSVC.EXE
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 13876 bytes
Cman333
02-12-2012, 05:56 PM
I googled a buncha stuff I found looked odd, but all seemed to check out ok.
It only seems to hijack my browser when I click any links from a google search. When I use Bing it seems to be okay.
It did it to me in safe mode also.
Thanks guys, I'm outta ideas
beatdownvictim
02-12-2012, 07:43 PM
combofix?
StylinRed
02-12-2012, 08:55 PM
cman i went through this same problem very recently
ended up just reinstalling windows :okay: its less stressful than trying to figure out the problem at least
Cman333
02-13-2012, 01:25 PM
cman i went through this same problem very recently
ended up just reinstalling windows :okay: its less stressful than trying to figure out the problem at least
Yeah thats kind of my last resort. Problem is her copy of windows came pre-installed by Dell. Would have to buy another copy of windows just for her comp again. Then the hassle of reinstalling everything just to get it working.
dhawes
02-13-2012, 01:54 PM
had this before, the malware/virus whatever changes a setting in your internet connection that keeps you going through a proxy.
You gotta go through your internet settings I forget if it's IE settings or your connection at the bottom right. Find the checked marked box for "use this proxy" or something along those lines and un-check it....that's all I can remember, I spent days trying to figure it out.
TekDragon
02-13-2012, 02:19 PM
Doesn't her computer have a backup or restore feature if it's from dell?
muteki
02-13-2012, 02:32 PM
This happened to me recently.
Run this in IE: ESET :: Get a FREE Online Virus Scan (http://www.eset.com/us/online-scanner/)
It's been the only method that worked for me. o_o
Mr.HappySilp
02-13-2012, 02:46 PM
Same thing happen to my pc a while back. I was too lazy to try to figure what's wrong so I just re-format my PC. I have most of my important stuff back up every week anways with all the software setup so it didn't take too long to get my pc up and running again.
Cman333
02-13-2012, 03:51 PM
combofix?
just tried it with no luck. Now after running combofix, IE keeps crashing. FML
Doesn't her computer have a backup or restore feature if it's from dell?
It does. As I said before, after the restore it's still there.
This happened to me recently.
Run this in IE: ESET :: Get a FREE Online Virus Scan (http://www.eset.com/us/online-scanner/)
It's been the only method that worked for me. o_o
I'll give that a try too.
had this before, the malware/virus whatever changes a setting in your internet connection that keeps you going through a proxy.
You gotta go through your internet settings I forget if it's IE settings or your connection at the bottom right. Find the checked marked box for "use this proxy" or something along those lines and un-check it....that's all I can remember, I spent days trying to figure it out.
I looked in the Internet Setting. No luck. Proxy is unchecked.
THANKS EVERYONE FOR THEIR INPUT
beatdownvictim
02-13-2012, 04:31 PM
damn sorry about combofix crashing your ie >.>
try tdskille?
How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDSServ, Alureon)? (http://support.kaspersky.com/viruses/solutions?qid=208280684&ClickID=cspvisiilseepppvivwiwexnalelqfifakxk)
also try a linux live cd and scanner from there.
from another malware thread, someone also suggested taking out the harddrive and scanning it in another computer.
Cman333
02-13-2012, 10:45 PM
This happened to me recently.
Run this in IE: ESET :: Get a FREE Online Virus Scan (http://www.eset.com/us/online-scanner/)
It's been the only method that worked for me. o_o
I just tried it. Still same thing.
Thanks for the suggestion. It was the only program that found any viruses. I thought I lucked out. :(
OMFG I can't believe how hard these viruses are to remove.
asiandude
02-13-2012, 11:16 PM
Open Internet Explorer go to TOOLS < Manage ADDONS and check for anything unusual.
Post your C:\Windows\System32\Drivers\etc\hosts file
Any particular reason you using those DNS numbers? 68.105.28.12 68.105.29.12 68.105.28.11
Go to local area connection properties, TCP/IP properties set to obtain DNS automatically.
open CMD and do
ipconfig /release
ipconfig /renew
ipconfig /flushdns
Cman333
02-14-2012, 02:33 PM
Open Internet Explorer go to TOOLS < Manage ADDONS and check for anything unusual.
Post your C:\Windows\System32\Drivers\etc\hosts file
Any particular reason you using those DNS numbers? 68.105.28.12 68.105.29.12 68.105.28.11
Go to local area connection properties, TCP/IP properties set to obtain DNS automatically.
open CMD and do
ipconfig /release
ipconfig /renew
ipconfig /flushdns
Here's what the host file says
127.0.0.1 localhost
No particular reason why were using those DNS. I'm thinking maybe the computer tech did it when we tried to recover the data.
I looked at the local network connections and both IP and DNS were already set to obtain automatically.
You have a rootkit virus. I don't run windows any more so I'm not familiar with all the ins and outs.
But this is a simple thing to try:
How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDSServ, Alureon)? (http://support.kaspersky.com/faq/?qid=208280684)
edit: I just noticed someone posted this earlier. Did it work?
Psykopathik
02-16-2012, 11:11 AM
... My gf somehow has installed some sort of browser hijacking virus onto her comp.
next time don't put a PC in the kitchen.
:lawl:
N.V.M.
02-16-2012, 11:24 AM
all this time working on it instead of reinstalling the OS? really?
Psykopathik
02-16-2012, 01:13 PM
^^backup favorites and reinstall windows. fastest fix by far. I never store anything on the main drive.
also helps my as my main drive is a paltry 128GB SSD :lawl: no choice but to move everything to E or F drives
rental_metard
02-18-2012, 03:26 AM
Are you still encountering this behaviour? I'll chime in
underscore
02-18-2012, 12:41 PM
try Panda online virus scanner, that saved my ass the last/only time I've had a virus.
Cman333
02-20-2012, 12:12 AM
You have a rootkit virus. I don't run windows any more so I'm not familiar with all the ins and outs.
But this is a simple thing to try:
How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDSServ, Alureon)? (http://support.kaspersky.com/faq/?qid=208280684)
edit: I just noticed someone posted this earlier. Did it work?
I havent tried Kaspersky yet. I'll give it a shot. Thanks.
all this time working on it instead of reinstalling the OS? really?
The computer came pre installed with windows. I don't have a copy to reinstall and don't want pirated copy on it.
try Panda online virus scanner, that saved my ass the last/only time I've had a virus.
I'll try that if Kaspersky idea doesn't work. Thanks.
Are you still encountering this behaviour? I'll chime in
Unfortunately yes.
mk1freak
02-20-2012, 05:48 PM
if you feel you have a good grasp of processes and whats legit, and if you are anal to the point of hunting down the evil manipulator of your girlfriend's goods,
download this:
Process Monitor (http://technet.microsoft.com/en-us/sysinternals/bb896645)
run it from USB if you are able to,
once running use browser surf to your favorite pron site (or was it your wife's :p)
*this next part optional but recommended*
open revscene.net, login to account, hit user cp and click "send pm"
in To field put in "mk1freak" and in message body copy and paste all favorite pron sites links and and requisite user/pw combos. tyvm
*end of optional*
find bad process and process threads (research process for what can be safely deleted) and eradicate with cmd prompt
mind you, if your not comfortable booting into and running ms-dos cmd prompts (for deletion of derrty files) you might want to remove drive and connect it to a another computer.
this is a little time consuming and theres a chance you may remove something your not supposed to so be very careful on how you proceed!
and oh yea have fun reading! funtimes ahead for you.
whitev70r
02-20-2012, 06:03 PM
Can you find out name of program that she downloaded and go to Control Panel and remove program?
N.V.M.
02-20-2012, 06:06 PM
The computer came pre installed with windows. I don't have a copy to reinstall and don't want pirated copy on it.
you're sure there's not a partitioned back up of the OS on the HDD?
is there a legit sticker on the machine with a valid key # ? then any OEM disk will do.
iwantaskyline
02-20-2012, 11:31 PM
use hitmanpro
http://www.surfright.nl/en/downloads
90 percent sure this will resolve your issue
Psykopathik
02-21-2012, 02:23 PM
you're sure there's not a partitioned back up of the OS on the HDD?
is there a legit sticker on the machine with a valid key # ? then any OEM disk will do.
ooohh...i still have a legit serial sticker and a dead PC. the OEM disc was for a gateway. wonder if i can get another OEM disk and use my serial? whatever.. XP is soo old anyways lol!
vBulletin® v3.8.11, Copyright ©2000-2026, vBulletin Solutions Inc.