Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I have a virus(i think) that redirects google and i cant use my anti virus scan to delete it.?


  • Please log in to reply
19 replies to this topic

#1 subin100

subin100

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 17 August 2009 - 01:02 PM

windowsclick.com

This is what i get when google redirects me. If i go directly to googles site it usually works but i cant type anything in the toolbar. Also my computer will sometimes just randomly shut off.

Any help would be greatly helpful!

I cant run AVG rootkit in safe mode(because it says i need to restart which i did) and when i ran it normally it told me to delete system32/drivers/UACcxnmmvcbwad.sys.

Should i do it. Also, malwarebytes wont run.


* 2 hours ago
* - 4 days left to answer.

Edited by The weatherman, 17 August 2009 - 01:57 PM.


BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 August 2009 - 01:51 PM

Hello and welcome to Bleeping Computer.


Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the FILES tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
Computer Pro

#3 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 17 August 2009 - 02:18 PM

ok i did the scan with no problems

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/17 12:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Hidden/Locked Files
-------------------
Path: C:\MiktexSetup\uaclasses.cab
Status: Invisible to the Windows API!

Path: C:\texmf\source\uaclasses-src.cab
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACltrdukauge.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACndxyvatuyi.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACyuwkumwdrn.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UAC96c1.tmp
Status: Invisible to the Windows API!

Path: C:\RECYCLER\S-1-5-21-4181295455-3683288297-1672917351-1005\Dc8\uaclasses.cab
Status: Invisible to the Windows API!

Path: C:\texmf\doc\latex\uaclasses
Status: Invisible to the Windows API!

Path: C:\texmf\tex\latex\uaclasses
Status: Invisible to the Windows API!

Path: C:\texmf\tpm\packages\uaclasses.tpm
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\UACxnmmvcbwad.sys
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\punnen\Local Settings\Temp\UACfa76.tmp
Status: Invisible to the Windows API!

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 August 2009 - 02:24 PM

Please right click on each of those files and select Wipe File. Then reboot, and run a Quick Scan with Malwarebytes.
Computer Pro

#5 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 17 August 2009 - 02:46 PM

had one problem 2 cant be wiped


Path: C:\texmf\doc\latex\uaclasses
Status: Invisible to the Windows API!

Path: C:\texmf\tex\latex\uaclasses
Status: Invisible to the Windows API!

these can only be force deleted but i do it anymore because i rebooted

the scan finished with these results

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 5.1.2600 Service Pack 3 (Safe Mode)

8/17/2009 12:40:32 PM
mbam-log-2009-08-17 (12-40-28).txt

Scan type: Quick Scan
Objects scanned: 99810
Time elapsed: 4 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 5
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 7

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{f919fbd3-a96b-4679-af26-f551439bb5fd} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b64f4a7c-97c9-11da-8bde-f66bad1e3f3a} (Rogue.WinAntiVirus) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2d2bee6e-3c9a-4d58-b9ec-458edb28d0f6} (Rogue.DriveCleaner) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Auto HotKey Poller (Backdoor.IRCBot) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> No action taken.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\drivers\svchost.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\Sysvxd.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\UACltrdukauge.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACndxyvatuyi.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACyuwkumwdrn.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\UACxnmmvcbwad.sys (Trojan.Agent) -> No action taken.

all of these were removed

anything else i need to do?

Edited by subin100, 17 August 2009 - 02:48 PM.


#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 August 2009 - 05:22 PM

Please run a fresh RootRepeal scan and post the log here.

And then:

Please run ATF and SAS:
Credits to Boopme

Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note 2: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware, Free Home Edition

Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
Computer Pro

#7 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 17 August 2009 - 07:02 PM

the problem is fixed.

do you still want me to post the other logs?

#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 August 2009 - 08:07 PM

Yes, because that might not have been the only piece of malware on your system
Computer Pro

#9 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 17 August 2009 - 10:16 PM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/17 17:10
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\Documents and Settings\punnen\Application Data\Macromedia\Flash Player\#SharedObjects\3QZQ3382\s.ytimg.com
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\punnen\Application Data\Mozilla\Firefox\Profiles\2woloiec.default\sessionstore.js
Status: Could not get file information (Error 0xc0000008)

Path: c:\documents and settings\punnen\local settings\application data\mozilla\firefox\profiles\2woloiec.default\cache\63b63a40d01
Status: Size mismatch (API: 7503872, Raw: 7307264)

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 17 August 2009 - 10:27 PM

And then SUPER antispyware log?
Computer Pro

#11 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 18 August 2009 - 11:26 AM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/18/2009 at 09:24 AM

Application Version : 4.27.1002

Core Rules Database Version : 4060
Trace Rules Database Version: 2000

Scan type : Complete Scan
Total Scan Time : 00:38:05

Memory items scanned : 306
Memory threats detected : 0
Registry items scanned : 6857
Registry threats detected : 0
File items scanned : 33231
File threats detected : 12

Adware.Tracking Cookie
C:\Documents and Settings\punnen\Cookies\punnen@fastclick[1].txt
C:\Documents and Settings\punnen\Cookies\punnen@bs.serving-sys[1].txt
C:\Documents and Settings\punnen\Cookies\punnen@serving-sys[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@realmedia[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@overture[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@casalemedia[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@tacoda[1].txt
C:\Documents and Settings\punnen\Cookies\punnen@media.mtvnservices[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@ads.pointroll[1].txt
C:\Documents and Settings\punnen\Cookies\punnen@specificclick[2].txt
C:\Documents and Settings\punnen\Cookies\punnen@viacom.adbureau[1].txt
C:\Documents and Settings\punnen\Cookies\punnen@apmebf[1].txt

#12 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:41 PM

Posted 18 August 2009 - 05:26 PM

How are things running now?
Computer Pro

#13 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 19 August 2009 - 02:28 PM

perfect is that it then?

#14 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:06:41 PM

Posted 19 August 2009 - 02:37 PM

Update MBAM and run a complete scan
Chewy

No. Try not. Do... or do not. There is no try.

#15 subin100

subin100
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:03:41 PM

Posted 19 August 2009 - 04:30 PM

it found nothing




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users