Solved Redirecting Problem, 8 Steps Completed

Status
Not open for further replies.

Eulie

Posts: 9   +0
It looks like I'm one of many that have caught the redirecting problem. AVG Free 9.0 detected a trojan a few days ago and put it in the vault and then Spybot S&D alerted me to attempted registry changes by "Lrudozahuyur" and "Chejepuxek", which I blacklisted. I started getting bombarded with notices of the changes being blocked so I ran Malwarebytes, which detected and deleted problems. The registry change attempts stopped. However, I'm still getting a ton of redirects, and AVG, Spybot, Ad-aware, and Malwarebytes all come up clean.

So I've come to you guys for help. I did the 8 steps. GMER crashed my computer twice so I ended up running it in safe mode.

Thank you,

Eulie


Here are my logs, the text files are attached:

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4227

Windows 6.0.6002 Service Pack 2
Internet Explorer 7.0.6002.18005

29/06/2010 10:20:29 PM
mbam-log-2010-06-29 (22-20-29).txt

Scan type: Quick scan
Objects scanned: 131312
Time elapsed: 7 minute(s), 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-06-29 23:08:02
Windows 6.0.6002 Service Pack 2
Running: yog98guo.exe; Driver: C:\Users\Allison\AppData\Local\Temp\ugrdqpow.sys


---- Kernel code sections - GMER 1.0.15 ----

.rsrc C:\Windows\system32\drivers\nvstor32.sys entry point in ".rsrc" section [0x807F1014]

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\svchost.exe[888] ntdll.dll!NtProtectVirtualMemory 774B4D34 5 Bytes JMP 0021000A
.text C:\Windows\system32\svchost.exe[888] ntdll.dll!NtWriteVirtualMemory 774B5674 5 Bytes JMP 0022000A
.text C:\Windows\system32\svchost.exe[888] ntdll.dll!KiUserExceptionDispatcher 774B5DC8 5 Bytes JMP 0011000A
.text C:\Windows\system32\svchost.exe[888] ole32.dll!CoCreateInstance 771C9EA6 5 Bytes JMP 0081000A
.text C:\Windows\Explorer.EXE[1192] ntdll.dll!NtProtectVirtualMemory 774B4D34 5 Bytes JMP 0025000A
.text C:\Windows\Explorer.EXE[1192] ntdll.dll!NtWriteVirtualMemory 774B5674 5 Bytes JMP 0026000A
.text C:\Windows\Explorer.EXE[1192] ntdll.dll!KiUserExceptionDispatcher 774B5DC8 5 Bytes JMP 0024000A

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [741F7817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [7424A86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [741FBB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [741EF695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [741F75E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [741EE7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [74228395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [741FDA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [741EFFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [741EFF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [741E71CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [7427CAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [7421C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [741ED968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [741E6853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [741E687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[1192] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [741F2AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18005_none_9e50b396ca17ae07\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device -> \Driver\nvstor32 \Device\Harddisk0\DR0 854B4EC5

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\0002760d8595
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\0002760d8595@001cef2f36d1 0xA9 0xBD 0x64 0xF1 ...
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\0002760d8595 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\BTHPORT\Parameters\Keys\0002760d8595@001cef2f36d1 0xA9 0xBD 0x64 0xF1 ...

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\nvstor32.sys suspicious modification

---- EOF - GMER 1.0.15 ----
 

Attachments

  • DDS.txt
    15.8 KB · Views: 1
  • Attach.txt
    13.6 KB · Views: 0
Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  1. Please, never rename Combofix unless instructed.
  2. Close any open browsers.
  3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    NOTE1. If Combofix asks you to install Recovery Console, please allow it.
    NOTE 2. If Combofix asks you to update the program, always do so.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
  4. Double click on combofix.exe & follow the prompts.
  5. When finished, it will produce a report for you.
  6. Please post the "C:\ComboFix.txt"
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Make sure, you re-enable your security programs, when you're done with Combofix.

DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
 
About 15mins ago Combofix detected rootkit activity and rebooted my computer. Since then my screen has been black except for the scan window and my mouse cursor is very sluggish. Is it still scanning or should I reboot or something?
 
I ended up having to reboot and start again. The second scan went much more smoothly. Strange thing though, after the scan I had IE reinstalled and set as my primary browser.
 

Attachments

  • ComboFix.txt
    14.5 KB · Views: 1
How is redirection issue?

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

Code:
File::
C:\ugrdqpow.sys
c:\users\Allison\AppData\Local\Ggacinohaz.dat
c:\users\Allison\AppData\Local\Brexoxicak.bin


3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

CFScript.gif



5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
 
I haven't experienced the redirection issue since starting this process, but I also haven't been using my infected computer for idle surfing.

I've attached the new ComboFix log. Do you prefer attachments or would you rather I copy and paste the logs into my posts?
 

Attachments

  • ComboFix.txt
    14 KB · Views: 3
Either way is fine :)

Delete your GMER file, download fresh one and post new log.
 
GMER didn't crash my computer this time!

Edit: I'm going to have to head off to bed, but I'll be back tomorrow to continue with your next instructions. Thank you so much for taking the time to help me!

Edit2: When I booted up my computer this morning, two things. a) It started up like a dream! So fast! b) Spybot detected a huge pile of changes, mostly "value deleted". I ended up just disabling Spybot for now because I don't know if those changes are related to what we're doing here or not and I don't want to mess things up.
 

Attachments

  • gmer2.log
    16.6 KB · Views: 2
Very good :)
Until we're done with cleaning process, disregard any Spybot complains.

Uninstall Combofix:
Go Start > Run [Vista users, go Start>"Start search"]
Type in:
Combofix /Uninstall
Note the space between the "Combofix" and the "/Uninstall"
Click OK (Vista users - press Enter).
Restart computer.

=====================================================================

Download OTL to your Desktop.

* Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
* Under the Custom Scan box paste this in:



netsvcs
drivers32 /all
%SYSTEMDRIVE%\*.*
%systemroot%\system32\Spool\prtprocs\w32x86\*.dll
%systemroot%\*. /mp /s
CREATERESTOREPOINT
%systemroot%\system32\*.dll /lockedfiles
%systemroot%\Tasks\*.job /lockedfiles
%systemroot%\System32\config\*.sav
%systemroot%\system32\user32.dll /md5
%systemroot%\system32\ws2_32.dll /md5
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU



* Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
 
Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following

    Code:
    :OTL
    O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - No CLSID value found.
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    O2 - BHO: (no name) - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - No CLSID value found.
    O3 - HKCU\..\Toolbar\ShellBrowser: (no name) - {5CBE3B7C-1E47-477E-A7DD-396DB0476E29} - No CLSID value found.
    O16 - DPF: Microsoft XML Parser for Java file:///C:/Windows/Java/classes/xmldso.cab (Reg Error: Key error.)
    O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
    
    
    :Services
    
    :Reg
    
    :Files
    
    :Commands
    [purity]
    [emptytemp]
    [emptyflash]
    [resethosts]
    [Reboot]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • You will get a log that shows the results of the fix. Please post it.
  • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.
 
Sorry it took me a bit to reply!

Attached are the logs of the fix and the second OTL run.
 

Attachments

  • 07012010_222257.log
    7.6 KB · Views: 1
  • OTL.Txt
    81.5 KB · Views: 0
Cool :)

1. Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.


2. Go to Kaspersky website and perform an online antivirus scan.

1. Disable your active antivirus program.
2. Read through the requirements and privacy statement and click on Accept button.
3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
4. When the downloads have finished, click on Settings.
5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

  • Spyware, Adware, Dialers, and other potentially dangerous programs
    [*] Archives
    [*] Mail databases
6. Click on My Computer under Scan.
7. Once the scan is complete, it will display the results. Click on View Scan Report.
8. You will see a list of infected items there. Click on Save Report As....
9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.
 
Wow, that took a long time!

Here's the report for you...
 

Attachments

  • kaspersky.txt
    875 bytes · Views: 1
Good :)

OTL Clean-Up
Clean up with OTL:

* Double-click OTL.exe to start the program.
* Close all other programs apart from OTL as this step will require a reboot
* On the OTL main screen, press the CLEANUP button
* Say Yes to the prompt and then allow the program to reboot your computer.

If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

====================================================================

Your computer is clean

1. Turn off System Restore:

- Windows XP:
1. Click Start.
2. Right-click the My Computer icon, and then click Properties.
3. Click the System Restore tab.
4. Check "Turn off System Restore".
5. Click Apply.
6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
7. Click OK.
- Windows Vista:
1. Click Start.
2. Right-click the Computer icon, and then click Properties.
3. Click on System Protection under the Tasks column on the left side
4. Click on Continue on the "User Account Control" window that pops up
5. Under the System Protection tab, find Available Disks
6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
8. Click OK

2. Restart computer.

3. Turn System Restore on.

4. Make sure, Windows Updates are current.

5. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

7. Run defrag at your convenience.

8. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

9. Please, let me know, how is your computer doing.
 
Ah thank you so much Broni!

My computer is running brilliantly now. It's way faster on start up and I haven't had any problems with redirection at all. All I have left to do is run a defrag, which I'll be doing tonight as I'm going out.

Really, thank you for taking the time to help me out like this. I really appreciate it.
 
Status
Not open for further replies.
Back