G35Driver Feedback & Suggestions NO Car Questions! For posting Feedback, Suggestions or Questions regarding G35Driver website ONLY.

Trojan

Thread Tools
 
Search this Thread
 
Rate Thread
 
Old Jul 29, 2010 | 07:29 PM
  #31  
fatlip's Avatar
Registered User
iTrader: (1)
Joined: Mar 2010
Posts: 353
Likes: 4
I logged on 5 mins ago and my laptop antivirus picked it up too.
 
Reply
Old Jul 29, 2010 | 07:51 PM
  #32  
Day177017's Avatar
Registered User
iTrader: (8)
Joined: Aug 2005
Posts: 1,057
Likes: 3
From: Socal - SGV
Simply accessing the homepage started my Java. Next thing i knew Trend micro picked up a bunch of Trojans in my Temp folder with the file names

jar_cacheXXXXXXXX.tmp (sunny\MyFiles.class)
jar_cacheXXXXXXXX.tmp (sunny\MyBuilds.class)

It was named TROJ_JAVA.BD and TROJ_JAVA.BE
 
Reply
Old Jul 29, 2010 | 08:34 PM
  #33  
blnewt's Avatar
Registered User
iTrader: (3)
Joined: Aug 2007
Posts: 1,699
Likes: 137
From: New Mexico
Just had Norton block an attack, but it seems to only occur when I go the the home page. The G35 07+ Sedan Subforum no attacks.
 
Reply
Old Jul 30, 2010 | 12:52 AM
  #34  
5150DS's Avatar
Registered User
iTrader: (1)
Joined: Aug 2005
Posts: 3,984
Likes: 162
From: So Cal
Getting a Trojan attack warning from Avast when accessing the first page. The Avast warning says, "JS: script ip-inf (trj)"
 

Last edited by 5150DS; Jul 30, 2010 at 10:58 AM.
Reply
Old Jul 30, 2010 | 09:24 AM
  #35  
darnelled's Avatar
Registered User
iTrader: (2)
Joined: Oct 2004
Posts: 3,439
Likes: 26
I get a pop up on the first page asking if I want to allow a program to open. I click cancel and no virus is on my PC yet (that I can detect). I can't print screen for some reason while there.

It says-

From Horyq.info
Program Microsoft help and Support
Address hcp://services/sender?query=&topic=hcp://system/systeminfo/systemofmain.htm%A%A%A%A%A%A%A%A%A%%A%A%A%A%A%A%A% A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A%A (goes on with more)
 
Reply
Old Jul 30, 2010 | 11:28 AM
  #36  
Massios's Avatar
Registered User
iTrader: (4)
Joined: Dec 2009
Posts: 436
Likes: 41
From: South Carolina
When on the main page, on firefox, it asks to install a missing plugin.
That might be an issue, a simple image rotation does not need a plugin.
 
Reply
Old Jul 30, 2010 | 02:30 PM
  #37  
nyqueenz's Avatar
Registered User
iTrader: (10)
Joined: Feb 2007
Posts: 6,572
Likes: 63
From: NYC/MD
MacAfee just kicked two one today and one the otherday.. don't know why im gettin attacked?
 
Reply
Old Jul 30, 2010 | 03:19 PM
  #38  
ThePhoenix's Avatar
Registered User
Joined: Apr 2010
Posts: 1,152
Likes: 1
From: Seattle, WA
here is a screenshot of what i am getting with the attack, also with the chrome element app i highlighted where the attack is originating from (red squares) there is a white line in upper left, thats where the element is coming from.


need to fix that home page if you need anything else let me know
 
Attached Thumbnails Trojan-attack.jpg  
Reply
Old Jul 30, 2010 | 07:53 PM
  #39  
Miller's Avatar
Registered User
Joined: Jun 2010
Posts: 12
Likes: 3
From: NWI
Virus' can be embedded in Jpegs as well as Gifs, or as shown in the above image even a "strand" of pixels. The home page image rotates doesn't it? It's possible. Your computer automatically downloads the images that you see in a cache in your temp files - I'm not 100% but that could get the embedded virus to your system.
 
Reply
Old Jul 30, 2010 | 09:30 PM
  #40  
jonnylaw's Avatar
Thread Starter
|
Registered User
iTrader: (5)
Joined: Jun 2005
Posts: 1,498
Likes: 1
From: Meifumado
Originally Posted by Miller
Virus' can be embedded in Jpegs as well as Gifs, or as shown in the above image even a "strand" of pixels. The home page image rotates doesn't it? It's possible. Your computer automatically downloads the images that you see in a cache in your temp files - I'm not 100% but that could get the embedded virus to your system.
+1

There can also be coding that directs toward a malicious url that then proceeds to download trojans/malicious software. A virus check on the forums may come up clean, but that does not mean that there is not embedded coding that is directing to malicious url's. Coding could be in pictures, video, comments, etc. All of this occurring with different persons on different antivirus programs would suggest imho that this is not a false positive--I'm not an expert--just an observer....
 
Reply
Old Jul 30, 2010 | 09:36 PM
  #41  
ThePhoenix's Avatar
Registered User
Joined: Apr 2010
Posts: 1,152
Likes: 1
From: Seattle, WA
there is a element in the front page trying to download a java/ZIP attack so that home page has been altered.
 
Reply
Old Jul 31, 2010 | 01:34 PM
  #42  
jonnylaw's Avatar
Thread Starter
|
Registered User
iTrader: (5)
Joined: Jun 2005
Posts: 1,498
Likes: 1
From: Meifumado
yep, I see the same thing on the home page. This isn't a false positive imho.
 
Reply
Old Jul 31, 2010 | 08:39 PM
  #43  
RiversideS13's Avatar
Registered User
iTrader: (2)
Joined: Jun 2010
Posts: 229
Likes: 1
From: Riverside, Loma Linda, Hacienda hts
this is quite scary
 
Reply
Old Jul 31, 2010 | 09:21 PM
  #44  
StratagemII's Avatar
Registered User
Joined: May 2006
Posts: 57
Likes: 3
From: Poughkeepsie NY
Same thing happened yesterday
 
Reply
Old Aug 1, 2010 | 12:31 AM
  #45  
kvangil's Avatar
Registered User
Joined: Dec 2006
Posts: 1,281
Likes: 1
From: Aurora, IL
I got infected when the g35driver.com frontpage is loaded. Basically, using Firefox, I get a message that Firefox is unable install a Add-on or plug-in (can't remember exactly). Next thing that happens is that Windows Media Player will open. I close Firefox and close Media Player, and my PC gives me the blue screen of death. I reboot, and now I have a fake antivirus/alert installed on my PC. I used Malware Bytes Anti-Malware to remove it. I was able to recreate this condition 3 times, all when going to g35driver.com's front page.

Admins, here is the log in case it will help you to narrow down the issue. In the meantime, I'm shortcutting straight to the forums and bypassing the front page..

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4356

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/31/2010 1117 PM
mbam-log-2010-07-31 (23-23-17).txt

Scan type: Quick scan
Objects scanned: 149593
Time elapsed: 5 minute(s), 46 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 2
Registry Keys Infected: 0
Registry Values Infected: 5
Registry Data Items Infected: 13
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\wibcic.dll (Trojan.Hiloti) -> Delete on reboot.
C:\WINDOWS\system32\helpers32.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Run\vdiwev (Trojan.Hiloti) -> Delete on reboot.
HKEY_CURRENT_USER\Software\Microsoft\idln2 (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run\registrymonitor1 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\winlogon32.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\ActiveDesktop\NoChangingWallpap er (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Policies\activedesktop\NoChangingWallpa per (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings\ZoneMap\Domains\download-software-package.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings\ZoneMap\Domains\is-software-download.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com\http (Hijack.TrustedZone) -> Bad: (2) Good: (4) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\winlogon32.exe) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\wibcic.dll (Trojan.Hiloti) -> Delete on reboot.
C:\Documents and Settings\Kong\Local Settings\Temp\4E5.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kong\Local Settings\Temp\4E6.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kong\Local Settings\Temp\7785258.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Documents and Settings\Kong\Local Settings\Temporary Internet Files\Content.IE5\3STL3VB0\exe[1].exe (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Userinitxx.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\41.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ES15.exe (Rogue.SecurityEsssentials) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\helpers32.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\smss32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\Winlogon32.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
 
Reply


You have already rated this thread Rating: Thread Rating: 0 votes,  average.


All times are GMT -4. The time now is 09:59 AM.