Google Redirect Malware :(

Discussion in 'Malware Help (A Specialist Will Reply)' started by dosilegecko, Jun 17, 2010.

  1. dosilegecko

    dosilegecko Private E-2

    Hello. I have the google redirect malware and I am completely stumped. I have looked everywhere for a solution but cant find one still. I have run many things: hitman pro 3.5, malware bytes, ccleaner, spybot...

    I have Windows 7 64-bit...

    Any help would be excellent :cry

    I ran hi-jack this and this is the output:

    Logfile of Trend Micro HijackThis v2.0.4
    Scan saved at 10:29:17 PM, on 6/17/2010
    Platform: Windows 7 (WinNT 6.00.3504)
    MSIE: Internet Explorer v8.00 (8.00.7600.16385)
    Boot mode: Normal

    Edit by chaslang: Inline HJT log removed. READ & RUN ME sticky not followed.
     
    Last edited by a moderator: Jun 18, 2010
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:
    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. dosilegecko

    dosilegecko Private E-2

    Hello chaslang,
    I do not see a link there, could the malware be hiding these links? I also have 64 bit OS so most of the tools I tried didn't work.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I have no idea what you are saying. The blue underlines text are links.

    We tell you exactly which tools will not work with x64 in the procedure. You just need to follow it. Many of the steps work just fine.
     
  5. dosilegecko

    dosilegecko Private E-2

    I apologize, my ad-block plus was blocking the forum links! I disabled it and followed the instructions. Please see my log files as the problem still persists.

    Thanks again and sorry for the confusion.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is nothing in any of your logs to indicate a problem. Let's try a couple of things.

    First, if you use a router, then follow the instructions for your hardware and reset it to factory default settings. Normally there is a recessed push button type switch that needs to be held down for some number of seconds to do this. After resetting to factory defaults on your router, you will need to reconfigure the router for your network if you have made any changes to the default network setup.

    If the above does not help, continue with the second step.



    Second, Click Start > Run and type in cmd
    • Click OK.
    • This will open a command prompt.
    • Type or copy and paste the following line in the command window:
      ipconfig /flushdns
    • Hit Enter
    • Exit the command window
    Now no matter what happens above, continue with the below.


    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
     
    C:\Windows\TEMP\CMDriverInstall.ini
    C:\Windows\TEMP\DMI5B1A.tmp
    C:\Windows\TEMP\DMI6B11.tmp
    C:\Windows\TEMP\DMIC33E.tmp
    C:\Windows\TEMP\fwtsqmfile00.sqm
    C:\Windows\TEMP\TS_33BD.tmp
    C:\Windows\TEMP\TS_3747.tmp
    C:\Windows\TEMP\TS_3979.tmp
    C:\Windows\TEMP\TS_3E89.tmp
    C:\Windows\TEMP\TS_3FD2.tmp
    C:\Windows\TEMP\TS_49F1.tmp
    C:\Windows\TEMP\TS_4C23.tmp
    C:\Windows\TEMP\TS_5181.tmp
    C:\Windows\TEMP\TS_545F.tmp
    C:\Windows\TEMP\TS_9F5A.tmp
    C:\Users\Dave\Local Settings\TEMP\d02dd859-7a51-11df-a62a-00248c384f7b
    C:\Users\Dave\Local Settings\TEMP\DMI1C09.tmp
    C:\Users\Dave\Local Settings\TEMP\DMI9C9C.tmp
    C:\Users\Dave\Local Settings\TEMP\Low
    C:\Users\Dave\Local Settings\TEMP\test.wav
    C:\Users\Dave\Local Settings\TEMP\ufddrkob.sys
    C:\Users\Dave\Local Settings\TEMP\~DF1E0B89E5DDE5AA48.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF244526D284C3863D.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF2F4B23D0F7F2C064.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF3D127A63C4D85F87.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF414E75704BD19FB4.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF457F2F5056B29828.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF55336EEB571A8596.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF5BF34841D3C96C71.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF782BB0E3C1B2AB69.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF95B42FE1A4E940A4.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF98A0F170D3AE59E8.TMP
    C:\Users\Dave\Local Settings\TEMP\~DF9E98502964B7CC51.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFAA372BD163F79C13.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFAB93BBAEDCEA55AD.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFAF815134481AD7CD.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFD4B90A9B427EF71E.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFE1ACA1CC768289B9.TMP
    C:\Users\Dave\Local Settings\TEMP\~DFF854EDA80C5B449A.TMP
     
    :Commands
    [purity]
     
    [EmptyTemp]
    [start explorer]
    [Reboot]
    
    
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )



    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  7. dosilegecko

    dosilegecko Private E-2

    Hello,
    Thanks so much for the help so far! I reset my router using the button on it, ran the two programs you directed me to and attached the logs.

    I have been surfing without the redirection so far... but I'm not 100% sure the malware is gone. Is there a way to verify that its gone? I also do not want to get reinfected... This is a fresh install of windows!

    Thanks again!
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There was no malware in your logs for us to remove. All I cleaned up was some temporary files and reset some settings. If the problem is gone now, it was due to your router.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  9. dosilegecko

    dosilegecko Private E-2

    Thanks a bunch, everything seems to be clear!
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds