Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect Problem


  • This topic is locked This topic is locked
26 replies to this topic

#1 RunningJumper

RunningJumper

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 20 May 2009 - 08:09 AM

Hello,

During a prolonged trip out of the country I let my daughter borrow my laptop while I was away. When I returned I bought her one and got mine back from her.
She told me that there were some problems with it and that was a bit of an understatement.

When I booted the laptop it had the following symptoms:
  • I couldn't change my wallpaper. It had one that said my system was infected and that I should buy this wonderful great product that would make it shine like new.
  • Firefox had overlays on the webpages that told me I had a possible infection and I should buy the aforementioned product.
  • If I did searches in the search bar of the browser they often redirect the webpage to a seemingly random page.
I started poking around and found this site. After reading a few of the cases that are exactly like mine I followed the advice in one of them and it rid me of the first two issues, but not the redirects.

In safemode I ran the following:

ATF Cleaner
MBAM
SUPERantispyware

I have also run:
Flashdisinfector
VundoFix



I do not do any banking or shopping online so there is no threat there,but it is just plain aggravating having my searches messed with.

I have the original scan log from MBAM and a scan log from SUPERantispyware.

Thank you in advance for your patience and time!

RJ

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:41 AM

Posted 20 May 2009 - 08:03 PM

Hello and welcome please run these next. If you have Spybot installed temporarily disable it.
Now run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 21 May 2009 - 10:39 AM

boopme,

Thank you very much for your time!

I ran MBAM as requested, but it came up with nothing. This is because I ran it three days ago and it found and removed some stuff. I still have the logs if you are interested.

This is the log from my scan today:
Malwarebytes' Anti-Malware 1.36
Database version: 2162
Windows 5.1.2600 Service Pack 3

5/21/2009 10:25:26 AM
mbam-log-2009-05-21 (10-25-26).txt

Scan type: Quick Scan
Objects scanned: 93204
Time elapsed: 4 minute(s), 17 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


On my first scan a few days ago it found and removed:

Trojan.Downloader
Malware.Trace
Rootkit.Trace
Trojan.Ertfor
Trojan.Ertfor
Trojan.Ertfor

They are still under quarantine.

#4 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 21 May 2009 - 11:22 AM

I forgot to mention:

I am still getting redirects to sites that my Avast 4.8 Professional informs me of malicious intentions and blocks them.

The rest of my system "appears" to be normal. I can access everything in my Security settings, my taskmanager, etc etc unlike others on here.

One thing I have noticed though is that in Safemode, it shows an account called Administrator along with my account. When not in safemode under Control Panel--->UserAccounts it shows my account, a guest account, and an ASP.Net Machine account (limited, password protected), but it does not show an account labeled Administrator.

#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:41 AM

Posted 21 May 2009 - 08:45 PM

Hi, yes post an infected log as it may hold a clue for another step.

Run ATF and SAS:
From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware

, Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you

should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#6 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 22 May 2009 - 10:11 AM

Thank you boopme! I will post my original log files that show the infections after this post.

I have run the follwing in safemode after updating and applying your settings in regular mode:
  • ATF
  • SUPERAntiSpyware
Here is the log from SAS:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/22/2009 at 09:43 AM

Application Version : 4.26.1002

Core Rules Database Version : 3906
Trace Rules Database Version: 1851

Scan type : Complete Scan
Total Scan Time : 02:38:26

Memory items scanned : 261
Memory threats detected : 0
Registry items scanned : 5978
Registry threats detected : 0
File items scanned : 65044
File threats detected : 0

#7 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 22 May 2009 - 10:40 AM

As requested here are the very first scans I made:

MBAM Log May 18, 2009

Malwarebytes' Anti-Malware 1.36
Database version: 2149
Windows 5.1.2600 Service Pack 3

5/18/2009 6:21:29 PM
mbam-log-2009-05-18 (18-21-29).txt

Scan type: Quick Scan
Objects scanned: 86684
Time elapsed: 4 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b2ba40a2-74f0-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b2ba40a2-74f0-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\seneka (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{b2ba40a2-74f0-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\p2hhr.bat (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lmppcsetup.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

After Reboot:

Malwarebytes' Anti-Malware 1.36
Database version: 2149
Windows 5.1.2600 Service Pack 3

5/18/2009 6:32:51 PM
mbam-log-2009-05-18 (18-32-51).txt

Scan type: Quick Scan
Objects scanned: 86192
Time elapsed: 5 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

SAS Log May 19, 2009:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/19/2009 at 11:23 AM

Application Version : 4.26.1002

Core Rules Database Version : 3895
Trace Rules Database Version: 1845

Scan type : Complete Scan
Total Scan Time : 03:36:01

Memory items scanned : 273
Memory threats detected : 0
Registry items scanned : 5989
Registry threats detected : 2
File items scanned : 100580
File threats detected : 21

Trojan.Sino-PWS/Gen
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B2BA40A2-74F0-42BD-F434-12345A2C8953}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B2BA40A2-74F0-42BD-F434-12345A2C8953}

Adware.Tracking Cookie
C:\Documents and Settings\Guest\Cookies\guest@2o7[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ad.yieldmanager[2].txt
C:\Documents and Settings\Guest\Cookies\guest@ad1.king[1].txt
C:\Documents and Settings\Guest\Cookies\guest@adrevolver[1].txt
C:\Documents and Settings\Guest\Cookies\guest@ads.pointroll[1].txt
C:\Documents and Settings\Guest\Cookies\guest@atdmt[2].txt
C:\Documents and Settings\Guest\Cookies\guest@avgtechnologies.112.2o7[1].txt
C:\Documents and Settings\Guest\Cookies\guest@doubleclick[1].txt
C:\Documents and Settings\Guest\Cookies\guest@dynamic.media.adrevolver[1].txt
C:\Documents and Settings\Guest\Cookies\guest@media.adrevolver[1].txt
C:\Documents and Settings\Guest\Cookies\guest@media.mtvnservices[1].txt
C:\Documents and Settings\Guest\Cookies\guest@msnportal.112.2o7[1].txt
C:\Documents and Settings\Guest\Cookies\guest@overture[2].txt
C:\Documents and Settings\Guest\Cookies\guest@questionmarket[1].txt
C:\Documents and Settings\Guest\Cookies\guest@richmedia.yahoo[2].txt
C:\Documents and Settings\Guest\Cookies\guest@specificclick[2].txt
C:\Documents and Settings\Guest\Cookies\guest@statse.webtrendslive[2].txt
C:\Documents and Settings\Guest\Cookies\guest@viacom.adbureau[2].txt

Rogue.FakeAlert/Wallpaper
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEMPROFILE\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\O3TMUVNF\WARNING[1].GIF

Trace.Known Threat Sources
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\R0VO277K\winlogon[1].htm
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\R0VO277K\loads[1].htm


And after:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 05/19/2009 at 04:18 PM

Application Version : 4.26.1002

Core Rules Database Version : 3895
Trace Rules Database Version: 1845

Scan type : Complete Scan
Total Scan Time : 04:20:34

Memory items scanned : 263
Memory threats detected : 0
Registry items scanned : 5987
Registry threats detected : 0
File items scanned : 99438
File threats detected : 0

All of the infections are being maintained in the MBAM quarantine.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:12:41 AM

Posted 22 May 2009 - 03:01 PM

looks real good. just one more.

Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 22 May 2009 - 05:01 PM

Malwarebytes' Anti-Malware 1.36
Database version: 2167
Windows 5.1.2600 Service Pack 3

5/22/2009 4:10:22 PM
mbam-log-2009-05-22 (16-10-22).txt

Scan type: Quick Scan
Objects scanned: 90291
Time elapsed: 7 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


It doesn't show anything. I was still being redirected yesterday, but I switched to Safari and the Yahoo search engine so that I would not be directed to the sites that ruffled Avast's feathers. Is it true that rootkits are difficult to get rid of? I would just assume reinstall windows than take a chance at leaving anything behind :thumbsup:

#10 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 23 May 2009 - 08:32 AM

I started Firefox again this morning and still receive the redirected webpages. I have the name of the site it directs me too now. Avast displayed it while blocking it.

Edited by RunningJumper, 23 May 2009 - 08:37 AM.


#11 xblindx

xblindx

  • Banned
  • 1,923 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:41 AM

Posted 23 May 2009 - 08:33 AM

  • Please download GooredFix and save it to your desktop
  • Double click Goored.exe to open it.
    • Select 1. Find Goored (no fix) by typing 1 and pressing Enter.
    • A log will open which you can just close. The log file is named Goored.txt and is on your Desktop.
  • Please post the contents of Goored.txt in your next reply.
Note:Do not use Option 2 (Fix Goored) unless instructed to.

#12 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 23 May 2009 - 08:43 AM

GooredFix v1.92 by jpshortstuff
Log created at 08:42 on 23/05/2009 running Option #1 (User)
Firefox version 3.0.10 (en-US)

=====Suspect Goored Entries=====

C:\Program Files\Mozilla Firefox\extensions\{BDA0696C-9998-4555-B718-4654D7904332}

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\"

#13 xblindx

xblindx

  • Banned
  • 1,923 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:41 AM

Posted 23 May 2009 - 08:44 AM

You should print these instructions because all instances of Firefox MUST be closed before running the fix.
  • Double click Goored.exe on your desktop to open it.
    • Select 2. Fix Goored by typing 2 and pressing Enter.
    • Make sure all instances of Firefox are CLOSED at this point
    • Type y at the prompt and press Enter again.
    • A log will open which you can just close. The log file is named Goored.txt and is on your Desktop.
  • Now open Firefox and please attach the new Goored.txt log to your next reply


#14 RunningJumper

RunningJumper
  • Topic Starter

  • Members
  • 35 posts
  • OFFLINE
  •  
  • Local time:11:41 PM

Posted 23 May 2009 - 08:50 AM

I cannot find the attach feature on this forum:

GooredFix v1.92 by jpshortstuff
Log created at 08:47 on 23/05/2009 running Option #2 (User)
Firefox version 3.0.10 (en-US)

=====Goored Deletions=====
C:\Program Files\Mozilla Firefox\extensions\{BDA0696C-9998-4555-B718-4654D7904332}
->Backing up folder... Done.
->Emptying folder... Done.
->Deleting folder... Done.

=====Dumping Registry Values=====

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Plugins"="C:\Program Files\Mozilla Firefox\plugins"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox 3.0.10\extensions]
"Components"="C:\Program Files\Mozilla Firefox\components"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"jqs@sun.com"="C:\Program Files\Java\jre6\lib\deploy\jqs\ff"

[HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Firefox\extensions]
"{20a82645-c095-46ed-80e3-08825760534b}"="C:\WINDOWS\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\"

#15 xblindx

xblindx

  • Banned
  • 1,923 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:41 AM

Posted 23 May 2009 - 08:51 AM

By attach, I meant copy and paste :thumbsup:

Are you still getting redirected?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users