Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google links keep directing me back to google and I can't access any AV sites!


  • Please log in to reply
10 replies to this topic

#1 B_evzy

B_evzy

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 09:28 AM

Hello, right where do I start?

A few weeks ago I believe I had some sort of trojan on my computer which resulted in me having the same problems as I'm having currently i.e When I click on a google link I am redirected back to google by some ixfind.com, well i thought I fixed that but this morning when I made a google search a similar situation occured but this time before I was redirected to google my browser displayed a find28.com?

I'm getting really sick of this and would appreciate any help given.

Some other information is that I have tried to remove it with malwarebytes, it said that it had had found a few trojans etc but when I reboot my system the problem still persists, I also tried to run combofix, but it gave me a message saying that combofix was compromised and that I may have a file patching virus?
Also I cant update any AV software and I cant access any AV sites.

BC AdBot (Login to Remove)

 


#2 B_evzy

B_evzy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 09:51 AM

If this helps here is the log file from the malwarebytes scan done today:


Malwarebytes' Anti-Malware 1.37
Database version: 2269
Windows 5.1.2600 Service Pack 2

29/06/2009 13:45:13
mbam-log-2009-06-29 (13-45-07).txt

Scan type: Quick Scan
Objects scanned: 114438
Time elapsed: 31 minute(s), 36 second(s)

Memory Processes Infected: 5
Memory Modules Infected: 2
Registry Keys Infected: 17
Registry Values Infected: 20
Registry Data Items Infected: 4
Folders Infected: 3
Files Infected: 35

Memory Processes Infected:
C:\Program Files\Manson\liser.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Ben Evans\reader_s.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\3361\SVCHOST.EXE (Trojan.Agent) -> No action taken.
c:\WINDOWS\pp10.exe (Worm.KoobFace) -> No action taken.

Memory Modules Infected:
C:\WINDOWS\system32\bqnatpc.dll (Trojan.FakeAlert) -> No action taken.
c:\WINDOWS\system32\msncav32.dll (Rootkit.Agent) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\bqnatpc (Trojan.FakeAlert) -> No action taken.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> No action taken.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> No action taken.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> No action taken.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sopidkc (Trojan.Downloader) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\isadisk (Rootkit.GamesThief) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\isadisk (Rootkit.GamesThief) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\isadisk (Rootkit.GamesThief) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\msncache (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msncache (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\msncache (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msncache (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DhcpSrv (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4efd3aea-b660-4f24-8519-12531d2a3b0c} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{4efd3aea-b660-4f24-8519-12531d2a3b0c} (Trojan.BHO) -> No action taken.

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kell (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pp (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost.exe (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> No action taken.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysldtray (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\guid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mms (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Agent) -> Data: c:\progra~1\manson\liser.dll -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\oembios.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\oembios.exe,) Good: (Userinit.exe) -> No action taken.

Folders Infected:
C:\WINDOWS\system32\sysproc64 (Trojan.Agent) -> No action taken.
c:\documents and settings\NetworkService\Application Data\sysproc64 (Trojan.Agent) -> No action taken.
C:\Program Files\Manson (Trojan.Agent) -> No action taken.

Files Infected:
C:\WINDOWS\system32\bqnatpc.dll (Trojan.FakeAlert) -> No action taken.
c:\WINDOWS\system32\wtukd32.exe (Trojan.Downloader) -> No action taken.
c:\WINDOWS\system32\sopidkc.exe (Trojan.Downloader) -> No action taken.
c:\WINDOWS\system32\isadisk.sys (Rootkit.GamesThief) -> No action taken.
c:\WINDOWS\system32\tpsaxyd.exe (Trojan.Downloader) -> No action taken.
c:\WINDOWS\system32\tpszxyd.sys (Trojan.Downloader) -> No action taken.
c:\WINDOWS\system32\msncache.dll (Backdoor.Bot) -> No action taken.
c:\WINDOWS\system32\sysproc64\sysproc32.sys (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\sysproc64\sysproc86.sys (Trojan.Agent) -> No action taken.
c:\documents and settings\networkservice\application data\sysproc64\sysproc32.sys (Trojan.Agent) -> No action taken.
c:\program files\Manson\liser.dll (Trojan.Agent) -> No action taken.
c:\program files\Manson\liser.exe (Trojan.Agent) -> No action taken.
c:\WINDOWS\pp10.exe (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\reader_s.exe (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\3361\SVCHOST.EXE (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\oembios.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\comsa32.sys (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\lsass.dll (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\5.tmp (Trojan.Agent) -> No action taken.
c:\WINDOWS\system32\6.tmp (Trojan.Agent) -> No action taken.
c:\documents and settings\Ben Evans\reader_s.exe (Trojan.Agent) -> No action taken.
c:\WINDOWS\ld10.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\msncav32.dll (Rootkit.Agent) -> No action taken.
C:\WINDOWS\system32\certstore.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\dncyool32.sys (Trojan.Backdoor) -> No action taken.
C:\WINDOWS\system32\c2d.dat (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\idm.dat (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\q1.dat (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\ck.dat (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\xd.dat (Malware.Trace) -> No action taken.
C:\WINDOWS\system32\3361\mlog (Malware.Trace) -> No action taken.
c:\WINDOWS\KBPK090615.log (Malware.Trace) -> No action taken.
c:\WINDOWS\KBPK090617.log (Malware.Trace) -> No action taken.
c:\WINDOWS\system32\svchost.dll (Heuristics.Reserved.Word.Exploit) -> No action taken.

#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,265 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:55 PM

Posted 29 June 2009 - 09:55 AM

I also tried to run combofix, but it gave me a message saying that combofix was compromised and that I may have a file patching virus?

Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer.

With this infection, ComboFix may not work and if detected, ComboFix will provide a warning that you may be infected with a file patching virus (Virut).

According to this Norman White Paper Assessment of W32/Virut, some variants can infect the HOSTS file and block access to security related web sites. Virux is an even more complex file infector which can embed an iframe into the body of web-related files and infect script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutThis kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#4 B_evzy

B_evzy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 10:12 AM

am I able to back up any of the files I have on the computer? also is it a 100% necessary to cancel my credit cards?

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,265 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:55 PM

Posted 29 June 2009 - 10:37 AM

As I said, you should consider your computer compromised to include your passwords and financial information if you conduct online banking. Contact your bank and speak to a representative, explain what happened and they will assist you from there. To not take action, you are gambling and it is better to be safe and reassured about your financial accounts.

Caution: Reformatting a hard disk deletes all data. If you are considering backing up data, keep in mind, with a Virut infection, there is always a chance of backed up data reinfecting your system. If the data is that important to you, then you can try to salvage some of it but there is no guarantee so be forwarded that you may have to start over again afterwards if reinfected by attempting to recover your data. Only back up your important documents, personal data files, photos to a CD or DVD drive, not a flash drive or external hard drive as they may become compromised in the process. The safest practice is not to backup any executable files (*.exe), screensavers (*.scr), autorun (.ini) or script files (.php, .asp, and .html) files because they may be infected by malware. Avoid backing up compressed files (.zip, .cab, .rar) that have executable files inside them as some types of malware can penetrate and infect .exe files within compressed files too. Other types of malware may even disguise itself by adding and hiding its extension to the existing extension of file(s) so be sure you look closely at the full file name. After reformatting, scan the backed up data with your anti-virus prior to to copying it back to your hard drive.

If you're not sure how to reformat or need help with reformatting, please review:These links include step-by-step instructions with screenshots:Don't forget you will have to go to Microsoft Update and apply all Windows security patches after reformatting.
Also see How to keep your Windows XP activation after clean install.

Note: If you're using an IBM, Sony, HP, Compaq or Dell machine, you may not have an original XP CD Disk. By policy Microsoft no longer allows OEM manufactures to include the original Windows XP CD-ROM on computers sold with Windows preinstalled. Instead, most computers manufactured and sold by OEM vendors come with a vendor-specific Recovery Disk or Recovery Partition for performing a clean "factory restore" that will reformat your hard drive, remove all data and restore the computer to the state it was in when you first purchased it. See Technology Advisory Recovery Media.

If you need additional assistance with reformatting or have questions about multiple hard drives, you can start a new topic in the Windows XP Home and Professional forum. If you don't get a reply, please send me a PM and I will get someone to take a look.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 B_evzy

B_evzy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 10:52 AM

Thanks for your help just one last question, I am unsure how to re-install windows, my laptop is a dell and windows was already on it when I had it, do i need a windows disk to reinstall as i dont think i have one? If so could i use a friends windows disk?

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,265 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:55 PM

Posted 29 June 2009 - 11:02 AM

If you have a Dell computer, see:
How To Restore or Reinstall Windows on a Dell Computer
Restoring Your Computer's Software to the Factory Settings
Inside the Dell PC Restore Partition
Dell Support
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 B_evzy

B_evzy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 11:06 AM

and is there some way of wiping the drive clean before doing the system restore? Sorry and not the most technically gifted. Or does the system restore prompt me to do this?

#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,265 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:55 PM

Posted 29 June 2009 - 11:11 AM

You are not doing a System Restore as that will not help. You need to use the other options they list.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 B_evzy

B_evzy
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:55 AM

Posted 29 June 2009 - 11:18 AM

Sorry I am still a little confused, could you explain how i wipe my hard drive? and then re-install windows?

#11 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,265 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:55 PM

Posted 29 June 2009 - 11:34 AM

There are several ways to reformat and perform a clean install depending on the type (Model) of Dell computer you are using. The links I posted provide step by step instructions for those methods. If they are confusing, you can start a new topic in the Windows XP Home and Professional forum or use the link I provided to contact Dell Support directly where one of their techs can assist you with determinding which method is applicable to your model.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users