Hijacked home page

Page 2 of 2 Previous  1, 2

View previous topic View next topic Go down

Re: Hijacked home page

Post by Dr Jay on Thu Dec 24, 2009 6:33 am

You need that file. Not sure how you would get it. But, since that file is not there, you will get that error continually.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 13719
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Protection Protection : Bitdefender Total Security
Points Points : 302143
# Likes # Likes : 10

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Thu Dec 31, 2009 12:56 am

Thanks for all your help. I have been away for a while. Just got back.

An attempt to change the home page just occurred. I ran Malwarebytes (full version now) and it found nothing.

My web access is still OK. I tried to download combifix from BleepingComputer.com and I noticed it is blocked by the list in my new hosts file.

Any clues?

see ya

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by Dr Jay on Thu Dec 31, 2009 3:14 am

Go to C:\windows\system32\drivers\etc

You will see something that says HOSTS

Double-click on it, and open it with Notepad.

Please post the contents of that in your next reply.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 13719
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Protection Protection : Bitdefender Total Security
Points Points : 302143
# Likes # Likes : 10

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Thu Dec 31, 2009 6:56 am

It's over 2mbs and keeps freezing things when I cut to paste.
Should I send it in bits?

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by Dr Jay on Thu Dec 31, 2009 7:06 am

Take a different route here:

Please download the latest version of Kaspersky GetSystemInfo (GSI) from [You must be registered and logged in to see this link.] and save it to your Desktop.
Please close all other applications running on your system.

Please double click GetSystemInfo.exe to open it.

Click the Settings button.



Set it to Maximum



IMPORTANT! Then please click Customize - choose Driver / Ports tab and uncheck Scan Ports.


Click Create Report to run it.

It will create a zip folder called GetSystemInfo_XXXXXXXXXXXXXX.zip on your Desktop. Please upload the folder to [You must be registered and logged in to see this link.] and click the Submit button.

Please copy and paste the url of the GSI Parser report (not the log) in your next reply.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 13719
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Protection Protection : Bitdefender Total Security
Points Points : 302143
# Likes # Likes : 10

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Thu Dec 31, 2009 7:27 am

here ya go.....

[You must be registered and logged in to see this link.]

see ya

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Thu Dec 31, 2009 8:52 pm

Malwarebytes ran a scheduled scan last night and picked up and removed Disabled.SecurityCenter

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Thu Dec 31, 2009 9:15 pm

After reboot Superantispyware has just identified an attempt to change home page again. I'll run Superantispyware now.

see ya

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by Dr Jay on Thu Dec 31, 2009 9:29 pm

Seems to be ok.

Let's do another close check for rootkits:

Please download the [You must be registered and logged in to see this link.]. Unzip it to your Desktop.

Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while the scan is being performed. Do not use your computer for anything else during the scan.

Double-click gmer.exe. The program will begin to run.

**Caution**
These types of scans can produce false positives. Do NOT take any action on any
"<--- ROOKIT" entries unless advised!

If possible rootkit activity is found, you will be asked if you would like to perform a full scan.

  • Click NO
  • In the right panel, you will see a bunch of boxes that have been checked ... leave everything checked and ensure the Show all box is un-checked.
  • Now click the Scan button.
    Once the scan is complete, you may receive another notice about rootkit activity.
  • Click OK.
  • GMER will produce a log. Click on the [Save..] button, and in the File name area, type in "GMER.txt"
  • Save it where you can easily find it, such as your desktop.

Post the contents of GMER.txt in your next reply.


Dr. Jay (DJ)


[You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

Dr Jay
Head Administrator
Head Administrator

Posts Posts : 13719
Joined Joined : 2009-09-06
Gender Gender : Male
OS OS : Windows 10 Home & Pro
Protection Protection : Bitdefender Total Security
Points Points : 302143
# Likes # Likes : 10

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Fri Jan 01, 2010 2:48 am

Interesting... while I was away form the computer and internet explorer was off I got a message from MWB saying that it had blocked access to a malicious ip adress. Here is the log:

07:43:31 BryanC MESSAGE Protection started successfully
07:43:41 BryanC MESSAGE IP Protection started successfully
12:16:37 BryanC MESSAGE Protection started successfully
12:16:45 BryanC MESSAGE IP Protection started successfully
12:47:31 BryanC IP-BLOCK 222.64.96.48
12:47:39 BryanC IP-BLOCK 94.96.12.63
13:33:56 BryanC IP-BLOCK 89.28.26.125

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Fri Jan 01, 2010 2:50 am

Here is the teh gmer log:

GMER 1.0.15.15281 - [You must be registered and logged in to see this link.]
Rootkit scan 2010-01-01 12:06:37
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\bryanc\LOCALS~1\Temp\kgrorpog.sys


---- System - GMER 1.0.15 ----

SSDT 8A45C818 ZwAlertResumeThread
SSDT 8A43F888 ZwAlertThread
SSDT 8A3FA3D8 ZwAllocateVirtualMemory
SSDT 8A56F008 ZwConnectPort
SSDT 8A35B8A0 ZwCreateMutant
SSDT 8A641550 ZwCreateThread
SSDT 89F97D90 ZwFreeVirtualMemory
SSDT 8A465450 ZwImpersonateAnonymousToken
SSDT 8A465488 ZwImpersonateThread
SSDT 8A608E60 ZwMapViewOfSection
SSDT 8A45BCD0 ZwOpenEvent
SSDT 8A366A70 ZwOpenProcessToken
SSDT 8A369218 ZwOpenThreadToken
SSDT 8A4AE518 ZwResumeThread
SSDT 8A464DD8 ZwSetContextThread
SSDT 8A37CD30 ZwSetInformationProcess
SSDT 8A38F008 ZwSetInformationThread
SSDT 8A4570B8 ZwSuspendProcess
SSDT 8A473908 ZwSuspendThread
SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xA96E00B0]
SSDT 8A45B878 ZwTerminateThread
SSDT 8A4746E8 ZwUnmapViewOfSection
SSDT 8A35F988 ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwCallbackReturn + 2FF0 8050488C 4 Bytes CALL C4DA8FD7
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB86BD380, 0x381B8D, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[2940] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device Ntfs.sys (NT File System Driver/Microsoft Corporation)
Device Ext2Fsd.SYS (Ext2 File System Driver for Windows/www.ext2fsd.com)
Device Fastfat.SYS (Fast FAT File System Driver/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device rdpdr.sys (Microsoft RDP Device redirector/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)

AttachedDevice fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by bryanc on Fri Jan 01, 2010 2:52 am

And another attempt to access an IP adress. this time with explorer running:

07:43:31 BryanC MESSAGE Protection started successfully
07:43:41 BryanC MESSAGE IP Protection started successfully
12:16:37 BryanC MESSAGE Protection started successfully
12:16:45 BryanC MESSAGE IP Protection started successfully
12:47:31 BryanC IP-BLOCK 222.64.96.48
12:47:39 BryanC IP-BLOCK 94.96.12.63
13:33:56 BryanC IP-BLOCK 89.28.26.125
13:50:25 BryanC IP-BLOCK 218.8.103.222

bryanc
Intermediate
Intermediate

Posts Posts : 132
Joined Joined : 2009-05-24
OS OS : XP
Points Points : 29580
# Likes # Likes : 0

View user profile

Back to top Go down

Re: Hijacked home page

Post by Dr Jay on Fri Jan 01, 2010 3:21 am


  1. Download Win32kDiag from any of the following locations and save it to your Desktop.

  • Double-click Win32kDiag.exe to run Win32kDiag and let it finish.
  • When it states "Finished! Press any key to exit...", press any key on your keyboard to close the program.
  • Double-click on the Win32kDiag.txt file that is located on your Desktop and post the entire contents of that log as a reply to this topic.


  • Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 5:37 am

    the number of malicious sites being blocked by MWBs is growing. It happens when internet explorer is not up and running as well as when it is.

    here is the win32kdiag log. It is very short.

    Running from: C:\Documents and Settings\bryanc\Desktop\Win32kDiag.exe

    Log file at : C:\Documents and Settings\bryanc\Desktop\Win32kDiag.txt

    WARNING: Could not get backup privileges!

    Searching 'C:\WINDOWS'...





    Finished!

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Fri Jan 01, 2010 6:23 am

    It has got to be somewhere.

    Please download the [You must be registered and logged in to see this link.] and save it to your desktop.

    You will need to enter your name, e-mail address and location in order to access the download page.

    • Once you have downloaded the file, double click the sarsfx icon
    • Review the licence agreement and click on the Accept button
    • The scanner will prompt you to extract the files to C:\SOPHTEMP - DO NOT change this location, simply click the Install button

    • Once the files have been extracted; using Windows Explorer, navigate to C:\SOPHTEMP and double click on the blue shield icon called sargui
    • Ensure that there are checkmarks next to Running processes, Windows registry and Local hard drives, then click Start scan
    • Allow the program to scan your computer - please be patient as it may take some time
    • Once the scan has completed a window will pop-up with the results of the scan - click OK to this
    • In the main window, you will see each of the entries found by the scan (if any)

      • If the scanner generated any warning messages, please click on each warning and copy and paste the text of it into this thread for me to review
      • Once you have posted any warning messages here, you can close the scanner and wait for me to get back to you

    • If you have not had any warnings, any entries which can be cleaned up by the scanner will have a box with a green checkmark in it next to the entry
    • To clean up these entries click on the Clean up checked items button
    • If you accidentally check a file NOT recommended for clean up, you will get a warning message and if necessary can re-select the entries you want to clean up
    • Once you have cleaned the selected files, you will be prompted to re-boot your computer - please do so
    • When you have re-booted, please post a fresh HijackThis log into this thread and tell me how your computer is running now


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 8:21 am

    There were no warnings but it did find 6 unknown hȋdden files:
    This one is a mazaic program recently downloaded?
    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Program Files\Mazaika\mz003.exe
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    Not sure what this is :
    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Documents and Settings\bryanc\Local Settings\Temporary Internet Files\Content.IE5\QNWT6PGV\GL_Top_20pct_Buyers;seg=GL_AllRegisteredUsers;seg=GL_AllSucBuy_Mar05;sz=300x250;ord=1262325610915;dcopt=ist;tile=1;um=8;us=11;eb_trk=117035;pr=22;xp=34;np=22[1].htm
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    Or this:
    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Documents and Settings\bryanc\Local Settings\Temporary Internet Files\Content.IE5\QZW4F87E\GL_Top_20pct_Buyers;seg=GL_AllRegisteredUsers;seg=GL_AllSucBuy_Mar05;sz=300x250;ord=1262325576388;dcopt=ist;tile=1;um=8;us=11;eb_trk=117035;pr=22;xp=34;np=22[1].htm
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    Not sure:
    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Program Files\MediaCoder\mplayer\mencoder.exe
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    Oziexplorer, I trust this one

    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Documents and Settings\bryanc\My Documents\Oziexplorer\OziExp3961c.exe
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    Also Oziexplorer, I trust this one too:

    Area: Local hard drives
    Description: Unknown hȋdden file
    Location: C:\Documents and Settings\bryanc\My Documents\Oziexplorer\OziExp.exe
    Removable: Yes (but clean up not recommended for this file)
    Notes: (no more detail available)

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 8:24 am

    MWB's is still blocking access to malicious sites.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Fri Jan 01, 2010 1:43 pm

    Please go to this webpage: [You must be registered and logged in to see this link.]

    This is a Conficker test. Please let me know if you see all the images at the table at the top of the page. If you do not, please tell me which ones are missing. (I.E. Top Row Second Column, or Bottom Row First Column, etc.).


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 10:30 pm

    I can see all of them.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 10:38 pm

    I assume MWB's is using it's own database to block all these malicious IP's?

    I could reset my host file and try to download combofix again?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Fri Jan 01, 2010 10:57 pm

    No. Do you have the premium version of Malwarebytes' Anti-Malware?

    If so, I had no idea. Which would solve this issue now.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 11:19 pm

    I'm not sure what you mean. I paid for Malwarebytes only a few days ago. Does that mean I have the premium version?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 11:26 pm

    I was wondering if all these attempts to access malicious ip adresses was a new occurrence or is it just that the paid version of MWB's is now picking it up?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Fri Jan 01, 2010 11:36 pm

    Yes. The paid version of Malwarebytes' Anti-Malware has IP protection. See this article: [You must be registered and logged in to see this link.]

    The IP protection is automatic. You can learn everything in the above thread.

    Now, how is your computer running?


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 11:38 pm

    My computer is running fine. It hasn't had a homepage change attempt in a while, but I have a list of "access to malicious Ip adress" a mile long. They happen every 15mins or so.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 01, 2010 11:42 pm

    Funny thing about the ip adress access attempts is that they seem to occur even when explorer is off. Is this access by my computer out? or by another computer in. I guess through my wireless network?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Fri Jan 01, 2010 11:50 pm

    I suggest to post for help about it in the following forum: [You must be registered and logged in to see this link.]

    Or send a message to support: [You must be registered and logged in to see this link.]


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sat Jan 02, 2010 12:05 am

    Thanks for the Ip protection site. I read up on the ip blocking. I understand a bit more now. Yesterday the ip access attempts were happening while I was away from the computer, which is apparently a bad thing. Today they have only occurred while I have benn on the computer. I might close everything down and let it sit idol for a while and see what happens.

    see ya

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Sat Jan 02, 2010 12:25 am

    Very well! Smile


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sat Jan 02, 2010 1:44 am

    all these adresses were logged while the computer sat idol with all programs closed.

    Is that good?

    11:54:34 BryanC IP-BLOCK 94.96.86.69
    12:10:22 BryanC IP-BLOCK 94.96.86.69
    12:25:27 BryanC IP-BLOCK 94.96.60.33
    12:25:28 BryanC IP-BLOCK 212.113.47.189
    12:25:36 BryanC IP-BLOCK 121.9.130.51
    12:26:06 BryanC IP-BLOCK 94.96.247.248

    see ya

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Sat Jan 02, 2010 2:38 am

    Not necessarily. Like I said, do the support with Malwarebytes, and see what they say. The IP Protection module is new, and I have not used it yet. So, I know very little information.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sat Jan 02, 2010 2:45 am

    thanks Jay, I have already sent them an email.

    My system now includes:
    Symantec (a work thing so I have to keep it)
    Malware Bytes Premium
    Superantispyware Paid up version
    and Spywareblaster

    all running at the same time. Is that about as good as it gets?

    see ya

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Sat Jan 02, 2010 6:58 am

    That seems fine.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sun Jan 03, 2010 9:18 pm

    Just when you thought it was safe to go back in the water!!

    Disabled.SecurityCentre was detected by MWB yesterday during its scheduled run late at night. It was cleared. During the day I used Firefox only.

    As an experiment I ran MWB's quick scan late in the day and found Disabled,SecurityCentre again. I cleared it, rebooted and the ran the full scan. Found nothing! I did nothing more, turned off all programs and went to bed last night.

    Disabled.SecurityCentre was found by MWB's again last night..

    Looks like its hiding somewhere.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Sun Jan 03, 2010 9:41 pm

    There is nothing hiding. We will fix it manually and lock it.

    Please copy and paste the following in to Notepad:

    Code:
    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
    "AntiVirusDisableNotify"=dword:00000000
    "FirewallDisableNotify"=dword:00000000
    "UpdatesDisableNotify"=dword:00000000
    "AntiVirusOverride"=dword:00000000
    "FirewallOverride"=dword:00000000

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc]
    "Type"=dword:00000020
    "Start"=dword:00000002
    "ErrorControl"=dword:00000001
    "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
      74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
      00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
      6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,00,00
    "DisplayName"="Security Center"
    "DependOnService"=hex(7):52,00,70,00,63,00,53,00,73,00,00,00,77,00,69,00,6e,00,\
      6d,00,67,00,6d,00,74,00,00,00,00,00
    "ObjectName"="LocalSystem"
    "Description"="Monitors system security settings and configurations."

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc\Parameters]
    "ServiceDll"=hex(2):25,00,53,00,59,00,53,00,54,00,45,00,4d,00,52,00,4f,00,4f,\
      00,54,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
      77,00,73,00,63,00,73,00,76,00,63,00,2e,00,64,00,6c,00,6c,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc\Security]
    "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
      00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
      00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,\
      05,12,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
      20,02,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
      00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,01,01,\
      00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc\Enum]
    "0"="Root\\LEGACY_WSCSVC\\0000"
    "Count"=dword:00000001
    "NextInstance"=dword:00000001

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs]
    "Description"="Provides the endpoint mapper and other miscellaneous RPC services."
    "DisplayName"="Remote Procedure Call (RPC)"
    "ErrorControl"=dword:00000001
    "Group"="COM Infrastructure"
    "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
      74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
      00,76,00,63,00,68,00,6f,00,73,00,74,00,20,00,2d,00,6b,00,20,00,72,00,70,00,\
      63,00,73,00,73,00,00,00
    "ObjectName"="NT Authority\\NetworkService"
    "Start"=dword:00000002
    "Type"=dword:00000020
    "FailureActions"=hex:00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,\
      00,02,00,00,00,60,ea,00,00
    "DependOnService"=hex(7):44,00,63,00,6f,00,6d,00,4c,00,61,00,75,00,6e,00,63,00,\
      68,00,00,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters]
    "ServiceDll"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
      00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
      72,00,70,00,63,00,73,00,73,00,2e,00,64,00,6c,00,6c,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security]
    "Security"=hex:01,00,14,80,a8,00,00,00,b4,00,00,00,14,00,00,00,30,00,00,00,02,\
      00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
      00,00,02,00,78,00,05,00,00,00,00,00,14,00,8d,00,02,00,01,01,00,00,00,00,00,\
      05,0b,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
      20,02,00,00,00,00,18,00,8d,00,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
      02,00,00,00,00,14,00,9d,00,00,00,01,01,00,00,00,00,00,05,04,00,00,00,00,00,\
      18,00,9d,00,00,00,01,02,00,00,00,00,00,05,20,00,00,00,21,02,00,00,01,01,00,\
      00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Enum]
    "0"="Root\\LEGACY_RPCSS\\0000"
    "Count"=dword:00000001
    "NextInstance"=dword:00000001

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs]
    "Description"="Provides the endpoint mapper and other miscellaneous RPC services."
    "DisplayName"="Remote Procedure Call (RPC)"
    "ErrorControl"=dword:00000001
    "Group"="COM Infrastructure"
    "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
      74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
      00,76,00,63,00,68,00,6f,00,73,00,74,00,20,00,2d,00,6b,00,20,00,72,00,70,00,\
      63,00,73,00,73,00,00,00
    "ObjectName"="NT Authority\\NetworkService"
    "Start"=dword:00000002
    "Type"=dword:00000020
    "FailureActions"=hex:00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,\
      00,02,00,00,00,60,ea,00,00
    "DependOnService"=hex(7):44,00,63,00,6f,00,6d,00,4c,00,61,00,75,00,6e,00,63,00,\
      68,00,00,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Parameters]
    "ServiceDll"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
      00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
      72,00,70,00,63,00,73,00,73,00,2e,00,64,00,6c,00,6c,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Security]
    "Security"=hex:01,00,14,80,a8,00,00,00,b4,00,00,00,14,00,00,00,30,00,00,00,02,\
      00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
      00,00,02,00,78,00,05,00,00,00,00,00,14,00,8d,00,02,00,01,01,00,00,00,00,00,\
      05,0b,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
      20,02,00,00,00,00,18,00,8d,00,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
      02,00,00,00,00,14,00,9d,00,00,00,01,01,00,00,00,00,00,05,04,00,00,00,00,00,\
      18,00,9d,00,00,00,01,02,00,00,00,00,00,05,20,00,00,00,21,02,00,00,01,01,00,\
      00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs\Enum]
    "0"="Root\\LEGACY_RPCSS\\0000"
    "Count"=dword:00000001
    "NextInstance"=dword:00000001

    Then, click File > Save as
    Save it as fixSec.reg
    Choose Save as type: All Files.
    Click Save.

    Once saved, double-click on the file and merge it in to the Registry.

    Reboot your computer.


    Then, let me know if the Security Center is still being alerted.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sun Jan 03, 2010 9:44 pm

    And now I've just had a home page change attempt :-(

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Sun Jan 03, 2010 11:57 pm

    Just did that. Rebooted and ran mwb's quick scan. It found disabled.securitycentre again.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Mon Jan 04, 2010 1:15 am

    What is your home page? Please note the address, and I can do an analysis.

    Disabled.SecurityCenter is not an actual threat. It is just a change by malware, when it affects your system. The effects this has on your system are slim to nȯne.

    Symantec Endpoint Protection, which I am guessing you still have active, correct? This is what is causing the entries in the Registry to change back.

    My script above was a total fix for the Security Center in Windows XP. Since the result is the same, it means that Security software, like Symantec, will disable Security Center. It does this because it has its own security center, so using Windows Security Center would be pointless. Malwarebytes' Anti-Malware continually detects it, but can be ignored. Go ahead and add that detection to your ignore list in MBAM, and you should not get prompted about it.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Mon Jan 04, 2010 6:24 am

    My home page is
    [You must be registered and logged in to see this link.]
    It is password protected, it is is work page. I actually never input the password, I just ignore it and move on :-)

    I do have Symantec Endpoint still active.

    I will add disabled security centre to the ignore list.

    see ya

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Mon Jan 04, 2010 7:23 am

    ok


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Mon Jan 04, 2010 7:42 am

    Do we need to do anything about the homepage change attempt?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Mon Jan 04, 2010 10:28 am

    It has to be Symantec.

    Go in to Symantec's options, and see if you can find home page locking options, or home page changing options. Also look in Malwarebytes options as well.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Mon Jan 04, 2010 11:28 am

    There is something in Symantec that says:
    "specify the address to use as the home page when a security risk changes it."

    I have put my regular home page in there.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Mon Jan 04, 2010 2:04 pm

    Good. Any change attempts?


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Tue Jan 05, 2010 1:01 am

    Not yet :-) I will let you know.

    thankyou

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Tue Jan 05, 2010 1:23 am

    Alright.


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 08, 2010 10:32 pm

    Hi there. I just had a home page change attempt. All browsers were off at the time.

    I'll run mwb's to see if it finds anything. The change attempt was picked up by Superantispyware.

    see ya

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Fri Jan 08, 2010 10:52 pm

    MWB's found nothing.

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by bryanc on Tue Jan 19, 2010 11:09 am

    Hi there. Are you still there?

    I am still getting the odd home page change attempt to that microsoft page.

    Also intermittently firefox (and explorer) bombs out and wont connect. I change the proxy settings and it works again, sometimes. It does not seem to be consistent.

    any clues?

    bryanc
    Intermediate
    Intermediate

    Posts Posts : 132
    Joined Joined : 2009-05-24
    OS OS : XP
    Points Points : 29580
    # Likes # Likes : 0

    View user profile

    Back to top Go down

    Re: Hijacked home page

    Post by Dr Jay on Tue Jan 19, 2010 4:40 pm

    Noo idea. Goofy


    Dr. Jay (DJ)


    [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.] ~ [You must be registered and logged in to see this link.]

    Dr Jay
    Head Administrator
    Head Administrator

    Posts Posts : 13719
    Joined Joined : 2009-09-06
    Gender Gender : Male
    OS OS : Windows 10 Home & Pro
    Protection Protection : Bitdefender Total Security
    Points Points : 302143
    # Likes # Likes : 10

    View user profile

    Back to top Go down

    Page 2 of 2 Previous  1, 2

    View previous topic View next topic Back to top

    - Similar topics

     
    Permissions in this forum:
    You cannot reply to topics in this forum