Home > General > Rootkit.Agent/GEN-DNSHack


I am running Vista Hoem Premium (64 bit) SP2, pre-installed on a notebook I just bought. If you would like to download SUPERAntiSpyware, please click here. Emergency Update.job 2014-03-05 09:34 - 2010-03-12 15:43 - 00000882 _____ () C:\WINDOWS\Tasks\GoogleUpdateTaskMachineCore.job 2014-03-04 17:08 - 2009-06-30 04:57 - 00000000 __SHD () C:\Documents and Settings\LocalService 2014-03-04 16:33 - 2014-03-04 16:32 - 00000000 I am curious about whether this has something to do with my getting infected in the first place....anyway thanks again for your help - it's greatly appreciated!

You're welcome!Are you still weblink

If we have ever helped you in the past, please consider helping us. See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Processes (Whitelisted) ================= (SUPERAntiSpyware.com) C:\Program Files\SUPERAntiSpyware\SASCORE.EXE (Bioscrypt Inc.) c:\Program Files\Hewlett-Packard\IAM\Bin\AsGHost.exe (AVAST Software) C:\Program Files\AVAST Software\Avast\AvastUI.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [zCpqset] - C:\Program Files\Hewlett-Packard\Default Settings\cpqset.exe I deleted both of them from the Qurantine as ZA said they were infections and didn't serve any useful purpose. However, you may, gradually, note that your computer system is acting strangely.

FF - ProfilePath - c:\documents and settings\administrator\application data\mozilla\firefox\profiles\c9tu64h8.default\ FF - plugin: c:\program files\adobe\reader 11.0\reader\air\nppdf32.dll FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll FF - plugin: c:\program files\google\update\\npGoogleUpdate3.dll FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll FF If you are interested in purchasing SUPERAntiSpyware, please click here for more information. Operating System:Windows Vista Home Premium Software Version:8.0 Product Name:ZoneAlarm Extreme Security faxJune 27th, 2009, 04:52 AMHi!please follow the standard procedure detailed herebelow, see also last point if you are not able For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

More comments Leave your comment... ? BleepingComputer is being sued by Enigma Software because of a negative post of SpyHunter. Fix / Info: Use Andy manchesta's SDFix tool http://spywareinfoforum.com/index.php?act=ST&f=37&t=81454 Windows ALL; discovered by nasdaq (X) C:\WINDOWS\fonts\services.exe A variant of the Trojan-Dropper.Win32.Agent.aven. The worst part of this is that these kinds of applications support each other.

My first guess is one of your admins created a script that references those executables.Legacy Forum Name: General Discussion, Legacy Posted By Username: boudj You have posted to a forum that If you have any reason to believe that there is a rootkit like Rootkit.Agent/Gen-Local on your computer, it is urgent that you remove Rootkit.Agent/Gen-Local immediately. It also contains backdoor Trojan functionality, allowing unauthorized remote access to the infected computer via IRC channels. Thanks.

Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE. It seems though that everytime I run AVG it always finds the same files as infected. Ran ComboFix but rootkit persists. Some signs of a Rootkit.Agent/Gen-Local rootkit infection include: Disappearing files on your computer.

First name Last name Username * Email * Password * Confirm password * * Required field Cancel Sign up × Sign in Username or email Password Forgot your password? However I still have an infection. Subscribe via RSS Share this Similar Posts Kalua.dll detected as Rootkit? Popular Malware Kovter Ransomware Cerber 4.0 Ransomware [email protected] Ransomware Al-Namrood Ransomware '[email protected]' Ransomware Zepto Ransomware Popular Trojans HackTool:Win32/Keygen JS/Downloader.Agent Popular Ransomware VXLOCK Ransomware Jew Crypt Ransomware Jhon Woddy Ransomware DNRansomware CloudSword

Pleeeease...Legacy Forum Name: General Discussion, Legacy Posted By Username: Nightwalker You have posted to a forum that requires a moderator to approve posts before they are publicly available. have a peek at these guys Superantispyware is just showing false positives on those files. Fix / Info: Delete the file - Virus/trojan scan. Security Doesn't Let You Download SpyHunter or Access the Internet?

Posted by LegacyPoster on Apr 17, 2010 5:07 AM kevinmcc23The files are script executables created by a program called Autoit. http://spywareinfoforum.com/index.php?act=ST&f=6&t=72875 Windows ALL; discovered by nasdaq (X) C:\windows\igator\trickler3103_pic_fs_dmpt_3103.exe Related to Gator. Another minor problem I'm having is right after I boot up, I get a message from Windows saying that "ZoneAlarm ForceField stopped working and was closed." When I go the ZA's check over here Members Home > Threat Database > Rootkits > Rootkit.Agent/Gen-Local Products SpyHunter RegHunter Spyware HelpDesk System Medic Malware Research Threat Database MalwareTracker Videos Glossary Company Mission Statement ESG and SpyHunter in the

Find out more about VirusTotal Community. Read more on SpyHunter. Post comment You have not signed in.

No one has voted on this item yet, be the first one to do so!

Gator removal tool. It would show up when running SAS in safe mode after performing an AVG rescue disc scan which did remove several infected files. I believe they come with the sample script pack. All Rights Reserved.

Is it serious or false positive? This rootkit has also been known to steal credit card and bank account information and the computer user's passwords. Posted by LegacyPoster on Apr 16, 2010 11:16 AM Superantispyware found these on Kaseya server: Trojan.Agent/Gen HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN#KASHNWMY9945517563483500 Rootkit.Agent/Gen-DNSHack C:\KASEYA\WEBPAGES\MANAGEDFILES\VSASHAREDFILES\AUTOIT\ENTER.EXE C:\KASEYA\WEBPAGES\MANAGEDFILES\VSASHAREDFILES\AUTOIT\LEFT.EXE C:\KASEYA\WEBPAGES\MANAGEDFILES\VSASHAREDFILES\AUTOIT\RIGHT.EXE C:\KASEYA\WEBPAGES\MANAGEDFILES\VSASHAREDFILES\AUTOIT\TAB.EXE I quarantined them, for a while. http://indignago.org/general/rootkit-win32-agent-fi.html To learn more and to read the lawsuit, click here.

Severely decreased system performance and Internet browsing speed. More votes Blog | Twitter | | Google groups | ToS | Privacy policy × Recover your password Enter the email address associated to your VirusTotal Community account and we'll send Better yet, do the comparison inside a virtual machine, just in case it IS a virus and goes off. ZoneAlarm Forums - Your ZoneAlarm Information Source > ZoneAlarm Forums > Malware Discussion > Malware Win32.Downloader.Small.afwj and Win32.Trojan.Dropper.VB.TR PDA View Full Version : Malware Win32.Downloader.Small.afwj and Win32.Trojan.Dropper.VB.TR earlinJune 27th, 2009, 04:30

Superantispyware is just showing false positives on those files. Thank you!Legacy Forum Name: General Discussion, Legacy Posted By Username: Nightwalker You have posted to a forum that requires a moderator to approve posts before they are publicly available. Rootkits Almost Never Travel Alone One of the main issues when removing Rootkit.Agent/Gen-Local, is that rootkits like this one never travel alone. a0c0a2b461cc8dac33e1502f15efadac657d78db993224bd221d1bf5af062937 Compressed bundles This file was also submitted to VirusTotal in the following compressed file bundles. 30ae8fe3632cb069b803031d7f8f8119d44efb073dbca3dcdc774c8545a50c7d 8f1d36edff3a0eed5dd30cee7edfae13bd830aff3f2a81ae04ac51874a065a80 An error occurred File identification MD5 443c9daa92e9224a9bf086550ac9d59b SHA1 e442ffa1875b0b58c1786e877220576f0c6a489a SHA256 055ffd5d4d9e4381a85ee2e5cf5395f9b458882b9530afbd5db4661aea3a31d4 ssdeep 6144:bxlZam+akqx6YQJXcNlEHUIQeE3mmKJZNu:Flf5j6zCNa0xeE3mBJZs

or read our Welcome Guide to learn how to use this site. No comments. Several functions may not work. Symantec reputation Suspicious.Insight No comments.

The legit Services.exe file is always found in Located in \%WINDIR%\%System%\ Fix / Info: Stop the process delete the file in the \fonts\ folder only. Kaseya sets a lot of alarms off because, well, in the hands of a malicious user it could do a lot of damage. I am curious about whether this has something to do with my getting infected in the first place....anyway thanks again for your help - it's greatly appreciated! For billing issues, please refer to our "Billing Questions or Problems?" page.

Free Antivirus (HKLM\...\Avast) (Version: 9.0.2013 - Avast Software) BIOS Configuration for HP ProtectTools (HKLM\...\{BB662A7E-DFF6-47C9-BBD2-430079EA8E74}) (Version: 4.00 C1 - Hewlett-Packard) BufferChm (Version: - Hewlett-Packard) Hidden C7200 (Version: - Hewlett-Packard) Hidden Posted by LegacyPoster on Apr 16, 2010 11:22 PM Looks like that's in your shared directory (put there for script access?). If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter. Antivirus; C:\Program Files\AVAST Software\Avast\AvastSvc.exe [50344 2014-02-26] (AVAST Software) S4 FLCDLOCK; c:\WINDOWS\system32\flcdlock.exe [349432 2008-08-06] (Hewlett-Packard Ltd) S4 HP ProtectTools Service; c:\Program Files\Hewlett-Packard\HP ProtectTools Security Manager\PTChangeFilterService.exe [45056 2009-02-12] (Hewlett-Packard Development Company, L.P) S4

http://www.sophos.com.au/virusinfo/analyses/w32tilebotd.html Windows ALL; discovered by nasdaq (X) C:\windows\gdp32.exe Trojan:Win32/Dynamer!ac https://www.virustotal.com/en/file/0af81b1587e0c57773f7a220a0ec4fe480e52c8b9092303d2f7d285635c4a008/analysis/ Windows ALL; discovered by Nasdaq (X) C:\Windows\GPlrLanc.dat PUP.Optional.SweetIM https://forums.malwarebytes.org/topic/183662-removal-instructions-for-sweetpacks-mahjong/ Windows ALL; discovered by Nasdaq (X) C:\windows\icm32.exe Win32:Malware-gen http://www.herdprotect.com/icm32.exe-6eb60a0d1c22d9c7c6eb94465284e9716c3d78ab.aspx Windows ALL; discovered My AV (avast) is still disabled when I boot normally.