Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Redirect Virus


  • Please log in to reply
4 replies to this topic

#1 wired124

wired124

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:55 AM

Posted 16 August 2011 - 12:28 PM

Hi All,

I am facing an issue with the google search engine. It doesnt seem to be the ususal TDSS issue. When i click on a search result it redirects me to a random site. When I double click, I get the desired result. I've done a symantec Antivirus scan and found the virus as conhost.exe a Backdoor.cycbot. However, I am not sure if it is completely deleted.Please help me undestand if Symantec Antivirus sucessfully gets rid of the virus.Thanks?

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,911 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:11:25 PM

Posted 16 August 2011 - 12:42 PM

Hello,

Please follow the instructions in ==>This Guide<== starting at step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then post them in a reply to this topic by using the Add Reply button.

If you can produce at least some of the logs, then please create the post and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the reply and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Please note that I am not a member of the Malware Removal Team and will not be assisting you in removing the infection. I'm simply helping you to post the information they need in order to assist you.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 wired124

wired124
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:55 AM

Posted 16 August 2011 - 09:48 PM

Hi Orange Blossom,

Ive installed Malware Bytes and am currently running the full scan will post the log shortly. Thanks for your prompt response

#4 wired124

wired124
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:08:55 AM

Posted 16 August 2011 - 09:57 PM

Malwarebytes' Anti-Malware 1.51.1.1800
www.malwarebytes.org

Database version: 7483

Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13

8/17/2011 10:55:55 AM
Log.txr

Scan type: Full scan (C:\|D:\|E:\|)
Objects scanned: 198177
Time elapsed: 18 minute(s), 12 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 4
Registry Data Items Infected: 4
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
d:\documents and settings\avril.carolyn.pinto\application data\dwm.exe (Trojan.FakeAlert) -> 2616 -> No action taken.
d:\documents and settings\avril.carolyn.pinto\application data\microsoft\conhost.exe (Trojan.FakeAlert) -> 2220 -> No action taken.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost (Trojan.FakeAlert) -> Value: conhost -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.Agent) -> Value: Load -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell.Gen) -> Value: Shell -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer (PUM.Bad.Proxy) -> Value: ProxyServer -> No action taken.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Load (Trojan.FakeAlert) -> Bad: (D:\DOCUME~1\AVRILC~1.PIN\LOCALS~1\Temp\csrss.exe) Good: () -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig (Windows.Tool.Disabled) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
d:\documents and settings\avril.carolyn.pinto\application data\dwm.exe (Trojan.FakeAlert) -> No action taken.
d:\documents and settings\avril.carolyn.pinto\application data\microsoft\conhost.exe (Trojan.FakeAlert) -> No action taken.
d:\Documents and Settings\avril.carolyn.pinto\Local Settings\Temp\csrss.exe (Trojan.FakeAlert) -> No action taken.

#5 shelf life

shelf life

  • Malware Response Team
  • 2,648 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:@localhost
  • Local time:11:25 PM

Posted 21 August 2011 - 08:01 AM

hi wired124,

After you ran Malwarebytes you clicked *Remove selected* and rebooted your machine? Also can you post a current DDS log.

How Can I Reduce My Risk to Malware?





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users