Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Redirect After Effects


  • Please log in to reply
21 replies to this topic

#1 Jimbotron

Jimbotron

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 22 June 2011 - 03:53 PM

Hi,

I have a co-worker who is suffering from the Google Redirect issue. A while back, I was able to find and clean out the Alureon rootkit which resulted in us finding a whole bunch of other nasties.

Her computer appears to be running fine except for the Google Redirects.

I have run multiple types of antivirus and anti-spyware scans with no success. The only thing we're finding are cookies. TDSSKiller, SuperAntiSpyware, Malwarebytes, HitmanPro 3.5 (to look for stuff), GMER, Trend Micro Online scan, other online scans and more to try and stop whatever's running (eg RKILL) and then hopefully find and remove it. I've tried running searches in Safe Mode with no success in finding anything.

ATAPI.sys appears to be the correct size.

Is it possible that the virus is gone? Is there something left over in Windows that could be still causing the issue? If necessary, I can check registry settings or other places.

I'm tempted to try ComboFix, but I wanted to go through the process with somebody on this site, just to be safe.

Any advice would be very much appreciated. If necessary, I will probably have to come in on a Saturday morning and do the work, but probably not for several weeks. I'm writing this just to start the groundwork.

Thank you in advance!

BC AdBot (Login to Remove)

 


#2 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 15 July 2011 - 11:14 AM

I posted this on June 22nd - no responses yet.

Any suggestions?

#3 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 15 July 2011 - 11:52 AM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List last 10 Event Viewer log
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#4 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 15 July 2011 - 12:01 PM

Thank you for promptly replying. It is very much appreciated!

I will work on the stuff you gave me and get you the results as soon as I can.

Thanks again,

Jim

#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 15 July 2011 - 12:06 PM

You're very welcome Posted Image

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#6 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 15 July 2011 - 02:42 PM

I was able to get all of your requests done:

SecurityCheck.exe - checkup.txt

Results of screen317's Security Check version 0.99.7
Windows XP Service Pack 3
Internet Explorer 8
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
Windows Firewall Disabled!
Symantec Endpoint Protection
Antivirus up to date!
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
Java™ 6 Update 26
Out of date Java installed!
Adobe Flash Player 10.0.12.36
Adobe Reader 9.4.5
Out of date Adobe Reader installed!
Mozilla Firefox (x86 en-US..) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Microsoft Small Business Business Contact Manager BcmSqlStartupSvc.exe
``````````End of Log````````````

************************************************************************************
*************************** END OF SECURITYCHECK.EXE *******************************
************************************************************************************

Next, MiniToolBox - result.txt - Please note I changed our company name in this file so it just reads as "companyname.com" - This computer has been having issues with Symantec and it may be related to this virus issue.

MiniToolBox by Farbar
Ran by angelab (administrator) on 15-07-2011 at 12:08:50
Microsoft Windows XP Service Pack 3 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

"network.proxy.type", 0
========================= Hosts content: =================================

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost

========================= IP Configuration: ================================

# ----------------------------------
# Interface IP Configuration
# ----------------------------------
pushd interface ip


# Interface IP Configuration for "Local Area Connection"

set address name="Local Area Connection" source=dhcp
set dns name="Local Area Connection" source=dhcp register=PRIMARY
set wins name="Local Area Connection" source=dhcp


popd
# End of interface IP configuration


Windows IP Configuration Host Name . . . . . . . . . . . . : p4309
Primary Dns Suffix . . . . . . . : companyname.com
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : companyname.com companyname.com
Ethernet adapter
Local Area Connection:
Connection-specific DNS Suffix . : companyname.com
Description . . . . . . . . . . . : Marvell Yukon 88E8057 PCI-E Gigabit Ethernet Controller
Physical Address. . . . . . . . . : 90-FB-A6-01-FE-9E
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 172.31.1.203
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 172.31.1.1
DHCP Server . . . . . . . . . . . : 172.31.1.132
DNS Servers . . . . . . . . . . . : 172.31.1.132 172.31.1.130
Lease Obtained. . . . . . . . . . : Wednesday, July 13, 2011 7:37:54 AM
Lease Expires . . . . . . . . . . : Tuesday, July 19, 2011 7:37:54 AMServer:
serverdb.companyname.com
Address: 172.31.1.132

Name: google.com
Addresses: 74.125.226.18, 74.125.226.19, 74.125.226.20, 74.125.226.16
74.125.226.17

Pinging google.com [74.125.226.18] with 32 bytes of data:
Reply from 74.125.226.18: bytes=32 time=29ms TTL=58
Reply from 74.125.226.18: bytes=32 time=29ms TTL=58
Ping statistics for 74.125.226.18:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds: Minimum = 29ms, Maximum = 29ms, Average = 29ms
Server: serverdb.companyname.com
Address: 172.31.1.132

Name: yahoo.com
Addresses: 69.147.125.65, 72.30.2.43, 98.137.149.56, 209.191.122.70
67.195.160.76

Pinging yahoo.com [69.147.125.65] with 32 bytes of data:
Reply from 69.147.125.65: bytes=32 time=48ms TTL=57
Reply from 69.147.125.65: bytes=32 time=49ms TTL=57
Ping statistics for 69.147.125.65:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds: Minimum = 48ms, Maximum = 49ms, Average = 48ms
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average =

0ms===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...90 fb a6 01 fe 9e ...... Marvell Yukon 88E8057 PCI-E Gigabit Ethernet Controller - Packet

Scheduler Miniport
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 172.31.1.1 172.31.1.203 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
172.31.1.0 255.255.255.0 172.31.1.203 172.31.1.203 20
172.31.1.203 255.255.255.255 127.0.0.1 127.0.0.1 20
172.31.255.255 255.255.255.255 172.31.1.203 172.31.1.203 20
224.0.0.0 240.0.0.0 172.31.1.203 172.31.1.203 20
255.255.255.255 255.255.255.255 172.31.1.203 172.31.1.203 1
Default Gateway: 172.31.1.1
===========================================================================
Persistent Routes:
None

========================= Event log errors: ===============================

Application errors:
==================
Error: (07/15/2011 07:53:00 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: The Group Policy client-side extension Software Installation failed to execute. Please look for any errors reported earlier by that extension.

Error: (07/15/2011 07:53:00 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: Failed to apply changes to software installation settings. Software changes could not be applied. A previous log entry with details should

exist. The error was : %%1612

Error: (07/15/2011 07:52:59 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: The install of application Previous Versions Client from policy Default Domain Policy failed. The error was : %%1612

Error: (07/15/2011 07:52:57 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: The install of application Symantec AntiVirus from policy Default Domain Policy failed. The error was : %%1612

Error: (07/15/2011 07:52:34 AM) (Source: MSSQLServerADHelper) (User: )
Description: '0' is an invalid number of start up parameters. This service takes two start up parameters.

Error: (07/14/2011 08:03:36 AM) (Source: Userenv) (User: SYSTEM)SYSTEM
Description: The Group Policy client-side extension Software Installation failed to execute. Please look for any errors reported earlier by that extension.

Error: (07/14/2011 08:03:36 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: Failed to apply changes to software installation settings. Software changes could not be applied. A previous log entry with details should

exist. The error was : %%1612

Error: (07/14/2011 08:03:36 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: The install of application Previous Versions Client from policy Default Domain Policy failed. The error was : %%1612

Error: (07/14/2011 08:03:34 AM) (Source: Application Management) (User: SYSTEM)SYSTEM
Description: The install of application Symantec AntiVirus from policy Default Domain Policy failed. The error was : %%1612

Error: (07/14/2011 08:03:09 AM) (Source: MSSQLServerADHelper) (User: )
Description: '0' is an invalid number of start up parameters. This service takes two start up parameters.


System errors:
=============
Error: (07/15/2011 00:07:46 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 00:02:16 PM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:56:47 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:51:16 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:45:46 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:40:16 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:34:46 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:29:16 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:23:46 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}

Error: (07/15/2011 11:18:16 AM) (Source: DCOM) (User: SYSTEM)
Description: DCOM got error "%%1058" attempting to start the service Symantec AntiVirus with arguments ""
in order to run the server:
{5CEC0E13-CF22-414C-8D67-D44B06420FC1}


Microsoft Office Sessions:
=========================
Error: (07/05/2011 10:19:33 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6557.5000, Microsoft Office Version: 12.0.6425.1000. This session

lasted 4 seconds with 0 seconds of active time. This session ended with a crash.

Error: (07/05/2011 08:37:38 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 6, Application Name: Microsoft Office Outlook, Application Version: 12.0.6557.5001, Microsoft Office Version: 12.0.6425.1000. This

session lasted 220 seconds with 180 seconds of active time. This session ended with a crash.

Error: (05/27/2011 11:03:29 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 25 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/25/2011 08:09:45 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 7 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/20/2011 01:37:55 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 9254 seconds with 1860 seconds of active time. This session ended with a crash.

Error: (05/19/2011 08:58:40 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 12 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/11/2011 04:13:08 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 6 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/11/2011 00:12:13 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 7 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/11/2011 00:12:02 PM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 1, Application Name: Microsoft Office Excel, Application Version: 12.0.6550.5004, Microsoft Office Version: 12.0.6425.1000. This session

lasted 6 seconds with 0 seconds of active time. This session ended with a crash.

Error: (05/11/2011 11:37:05 AM) (Source: Microsoft Office 12 Sessions)(User: )
Description: ID: 0, Application Name: Microsoft Office Word, Application Version: 12.0.6545.5000, Microsoft Office Version: 12.0.6425.1000. This session

lasted 6 seconds with 0 seconds of active time. This session ended with a crash.


========================= Memory info: ===================================

Percentage of memory in use: 17%
Total physical RAM: 3037.17 MB
Available physical RAM: 2511.7 MB
Total Pagefile: 4923.21 MB
Available Pagefile: 4473.8 MB
Total Virtual: 2047.88 MB
Available Virtual: 1998.58 MB

========================= Partitions: =====================================

1 Drive c: (Preload) (Fixed) (Total:294.53 GB) (Free:254.81 GB) NTFS
3 Drive e: (KINGSTON) (Removable) (Total:7.45 GB) (Free:7.29 GB) FAT32
4 Drive g: (Data) (Network) (Total:322.19 GB) (Free:81.86 GB) NTFS
5 Drive h: (Data) (Network) (Total:322.19 GB) (Free:81.86 GB) NTFS
6 Drive i: (Data) (Network) (Total:322.19 GB) (Free:81.86 GB) NTFS
7 Drive j: (Data) (Network) (Total:322.19 GB) (Free:81.86 GB) NTFS
8 Drive s: (Data) (Network) (Total:322.19 GB) (Free:81.86 GB) NTFS

========================= Users: ========================================

User accounts for \\P4309

Administrator ASPNET Guest
HelpAssistant Perfered User SUPPORT_388945a0


== End of log ==


************************************************************************************
*************************** END OF MINITOOLBOX *******************************
************************************************************************************


Malwarebytes' Anti-Malware:

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7149

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

7/15/2011 12:21:41 PM
mbam-log-2011-07-15 (12-21-41).txt

Scan type: Quick scan
Objects scanned: 313779
Time elapsed: 9 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

************************************************************************************
*************************** END OF MALWAREBYTES *******************************
************************************************************************************

Last, GMER:

GMER 1.0.15.15640 - http://www.gmer.net
Rootkit scan 2011-07-15 14:17:28
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-6 WDC_WD3200AAJS-08L7A0 rev.03.03E03
Running: 63ob5tlr.exe; Driver: C:\DOCUME~1\angelab\LOCALS~1\Temp\pgtdapog.sys


---- System - GMER 1.0.15 ----

SSDT 8A2D3558 ZwConnectPort
SSDT \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xA7C28620]

---- Devices - GMER 1.0.15 ----

Device Ntfs.sys (NT File System Driver/Microsoft Corporation)
Device Fastfat.SYS (Fast FAT File System Driver/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip fssfltr_tdi.sys (Family Safety Filter Driver (TDI)/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp fssfltr_tdi.sys (Family Safety Filter Driver (TDI)/Microsoft Corporation)

Device rdpdr.sys (Microsoft RDP Device redirector/Microsoft Corporation)

AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp fssfltr_tdi.sys (Family Safety Filter Driver (TDI)/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)

AttachedDevice fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device \FileSystem\Cdfs \Cdfs DLAIFS_M.SYS (Drive Letter Access Component/Roxio)

---- EOF - GMER 1.0.15 ----

************************************************************************************
*************************** END OF GMER SECTION *******************************
************************************************************************************

There you go. I hope this is useful and gives us a direction in which to proceed one way or another.

Thanks again!

Jim

#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 15 July 2011 - 04:45 PM

All looks clean.

Does the redirection happen in both browsers?

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
Click the "Scan" button to start scan:
Posted Image

On completion of the scan click "Save log", save it to your desktop and post in your next reply:
Posted Image

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 16 July 2011 - 12:40 PM

Thank you for your prompt replies. I couldn't reply yesterday, but came into work for a few minutes to run the scan today.

Yes, the redirection happens in both IE and Firefox.

The version of aswMBR.exe I downloaded is different from the in the screenshots. It scanned a lot more, but I let it go since it probably wouldn't hurt...and it found something!

aswMBR version 0.9.7.753 Copyright© 2011 AVAST Software
Run date: 2011-07-16 12:04:07
-----------------------------
12:04:07.271 OS Version: Windows 5.1.2600 Service Pack 3
12:04:07.271 Number of processors: 2 586 0x170A
12:04:07.271 ComputerName: P4309 UserName:
12:04:07.762 Initialize success
12:06:04.703 AVAST engine defs: 11071600
12:06:45.137 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-6
12:06:45.137 Disk 0 Vendor: WDC_WD3200AAJS-08L7A0 03.03E03 Size: 305245MB BusType: 3
12:06:47.072 Disk 0 MBR read successfully
12:06:47.072 Disk 0 MBR scan
12:06:47.101 Disk 0 unknown MBR code
12:06:49.006 Disk 0 scanning sectors +625139712
12:06:49.096 Disk 0 scanning C:\WINDOWS\system32\drivers
12:06:58.650 Service scanning
12:06:59.572 Disk 0 trace - called modules:
12:06:59.572 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS
12:06:59.572 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a49aab8]
12:06:59.572 3 CLASSPNP.SYS[ba108fd7] -> nt!IofCallDriver -> \Device\00000081[0x8a4a7f18]
12:06:59.572 5 ACPI.sys[b9f7f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-6[0x8a49dd98]
12:07:00.183 AVAST engine scan C:\WINDOWS
12:20:01.607 File: C:\WINDOWS\system32\setupt.dll **INFECTED** Win32:MalOb-GD [Cryp]
12:22:41.818 AVAST engine scan C:\Documents and Settings\angelab
12:29:45.085 AVAST engine scan C:\Documents and Settings\All Users
12:31:43.920 Scan finished successfully
12:31:59.370 Disk 0 MBR has been saved successfully to "E:\Angela's Computer\logs\MBR.dat"
12:31:59.386 The log file has been saved successfully to "E:\Angela's Computer\logs\aswMBR.txt"


I was going to click on the option to fix the MBR, but I was concerned when it gave me the standard warning. I thought it would be better to wait for you to let me know if I should or not.

I won't be here very long (10-15 minutes). If I don't get a reply, I'll leave the PC up and running so I can work on it Monday.

Thank you,

Jim

#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 16 July 2011 - 01:21 PM

Open Windows Explorer. Go Tools>Folder Options>View tab, put a checkmark next to Show hidden files, and folders.
Upload following files to http://www.virustotal.com/ for security check:
- C:\WINDOWS\system32\setupt.dll
IMPORTANT! If the file is listed as already analyzed, click on Reanalyse file now button.
Post scan results.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 18 July 2011 - 07:52 AM

I had to uncheck "Hide protected operating system files" to see setupt.dll.

When I tried to upload it to VirusTotal, I ended up back at the upload screen. Yes, this is on the infected computer.

I tried another site (Jotti's Malware scan) and it indicated that the file is empty. Windows indicates that the file was created on 3/29/2011 7:56am and is 105 KB. That roughly matches when these redirect issues started.

Any other suggestions?

Thanks,

Jim

#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 18 July 2011 - 11:34 AM

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

64-bit users go HERE
  • Double-click SystemLook.exe to run it.
  • Vista\Win 7 users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    :file
    C:\WINDOWS\system32\setupt.dll
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 18 July 2011 - 11:37 AM

SystemLook:

SystemLook 04.09.10 by jpshortstuff
Log created at 11:35 on 18/07/2011 by angelab
Administrator - Elevation successful

No Context: C:\WINDOWS\system32\setupt.dll

-= EOF =-

#13 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 18 July 2011 - 11:54 AM

You didn't copy my whole script.
Most likely you missed a "colon" in front of "file" (1st line).
Please redo.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#14 Jimbotron

Jimbotron
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:07:04 PM

Posted 18 July 2011 - 12:00 PM

Sorry about that. My fault entirely for not paying attention.

SystemLook 04.09.10 by jpshortstuff
Log created at 11:56 on 18/07/2011 by angelab
Administrator - Elevation successful

========== file ==========

C:\WINDOWS\system32\setupt.dll - Unable to find/read file.

-= EOF =-

#15 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,735 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:06:04 PM

Posted 18 July 2011 - 12:04 PM

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users