Google Redirect

Discussion in 'Malware Help (A Specialist Will Reply)' started by marky1991, Jul 19, 2012.

  1. marky1991

    marky1991 Private E-2

    As mentioned in the title, my google results are redirecting me to other pages (this occurs both in chrome and IE). It redirects me to something from get-answers-fast.com . I've had the problem for about a month now.

    I've read the redirect sticky thread and the the main instruction thread ("Run me first"). Attached are the requested logs.

    Also, I believe my services.exe may infected as well, as I've intermittently had it begin to consume 100% of my CPU. I can't say whether it's really infected or if it's just occasionally consuming lots of resources in its normal operations. It doesn't do it frequently, but it's done it twice within a couple of minutes today.

    Thanks a lot for helping me disinfect my computer.
     

    Attached Files:

  2. marky1991

    marky1991 Private E-2

    Oops, I forgot to attach the rest of the logs.
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thankyou for running everything and providing all of the requested logs. I just want you to run the below now before I give out a fix because I would like to see if there are any infected files.

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  4. marky1991

    marky1991 Private E-2

    Thank for the help so far.
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    --------------------

    Run FRST again like you did the very first time and attach the log it produces please. Explain how things are running.
     

    Attached Files:

  6. marky1991

    marky1991 Private E-2

    Currently, I'm not seeing seeing any problems. Google results seem to be clean.
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Don't forget, I had said:
     
  8. marky1991

    marky1991 Private E-2

    Oh, I misinterpreted your last post. Sorry about that. Here's the new log.
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No worries.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  10. marky1991

    marky1991 Private E-2

    Thanks a lot!
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. :)
     
  12. marky1991

    marky1991 Private E-2

    I'm sad to say that the redirects are back. Apparently the infection was never completely removed.
     
  13. marky1991

    marky1991 Private E-2

    Running scans now. Will include logs in a second.
     
  14. marky1991

    marky1991 Private E-2

    1234
     

    Attached Files:

  15. marky1991

    marky1991 Private E-2

    I hope I didn't forget anything.
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes, I apologise, I just actually looked at the last FRST log and saw I missed something.


    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.





    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 5 detections:
    • [BLACKLIST DLL] HKCU\[...]\Run : Google (rundll32.exe "C:\Users\Patty\AppData\Local\VirtualStore\Google\qofbfdk.dll",CreateInstance) -> FOUND
    • [BLACKLIST DLL] HKUS\.DEFAULT[...]\Run : Google (rundll32.exe "C:\Users\Patty\AppData\Local\VirtualStore\Google\qofbfdk.dll",CreateInstance) -> FOUND
    • [BLACKLIST DLL] HKUS\S-1-5-21-3661343363-1381438154-1969294843-1000[...]\Run : Google (rundll32.exe "C:\Users\Patty\AppData\Local\VirtualStore\Google\qofbfdk.dll",CreateInstance) -> FOUND
    • [BLACKLIST DLL] HKUS\S-1-5-18[...]\Run : Google (rundll32.exe "C:\Users\Patty\AppData\Local\VirtualStore\Google\qofbfdk.dll",CreateInstance) -> FOUND
    • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Patty\AppData\Local\{c73bfc7e-6fb9-643d-3ab8-77bf598f9bf6}\n.) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    Do the same for these on the Files/Folders tab:

    • [ZeroAccess][FILE] @ : c:\windows\installer\{c73bfc7e-6fb9-643d-3ab8-77bf598f9bf6}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : c:\windows\installer\{c73bfc7e-6fb9-643d-3ab8-77bf598f9bf6}\U --> FOUND
    • [ZeroAccess][FOLDER] L : c:\windows\installer\{c73bfc7e-6fb9-643d-3ab8-77bf598f9bf6}\L --> FOUND

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    ---------------------------------------------

    • Reboot the machine.
    • Run Roguekiller normally. no fix just a scan and attach that log too please.
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
    Last edited: Jul 25, 2012
  17. marky1991

    marky1991 Private E-2

    I successfully modified merged the new registry values in.

    I didn't see the google-related registry entries. The only entry I modified was teh zero_access one: [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Patty\AppData\Local\{c73bfc7e-6fb9-643d-3ab8-77bf598f9bf6}\n.).

    When running rogueKiller, I was having some issues: I wasn't able to do an MBR scan (it would crash at that part of the scan), so I disabled the MBR scan (it worked fine after rebooting); It looked like I wasn't able to delete the three bad files found (there were no checkboxes and highlighting the three and clicking the "Delete" button didn't seem to do anything), but it appears that they were successfully deleted, as they did not appear in the final scan. I tried multiple times to delete them, creating multiple reports (sorry about that). I'm including the one that I think successfully removed it [3], the final scan I did before rebooting [8] (looking at the logs, it appears I somehow accidentally "fixed" all of the remaining registry entries it found. I'm sorry about that too, I honestly have no clue how I managed to do that), as well as the scan done after rebooting [9]. None of the files were found in the final scan.

    I just clicked through an entire page of google results in IE and saw no redirects, but was redirected once in chrome.

    Thanks a lot and sorry for messing up.
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  19. marky1991

    marky1991 Private E-2

    Here's the log.
     

    Attached Files:

  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -------------------------------------------

    Delete this folder if it is there now:

    C:\Users\Patty\AppData\Local\VirtualStore\Google

    -----------------------------------------------

    Now run FRST normally, no fix, just a scan and attach the log. Describe how things are running now.
     

    Attached Files:

  21. marky1991

    marky1991 Private E-2

    I thought it was all clear, but I got a redirect in chrome again. : (

    Thanks again for the help so far.
     

    Attached Files:

  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The only thing I can advise is that you uninstall Chrome using Revo Uninstaller and then reinstall and see if you still have redirects or not.


    Try Revo Uninstaller.
    Choose the option on the bottom of the list (#4). Be very careful while deleting the bolded registry items ONLY!! This software will create a system restore point for you as well prior to uninstalling a software program.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds