Search Redirect Virus remains after restore

Discussion in 'Malware Help (A Specialist Will Reply)' started by nildram, May 9, 2010.

  1. nildram

    nildram Private E-2

    About a month ago my google searches began redirecting to sites like results.overture.com and googleadservices.com, on the first click and then working on the second click.

    I also have occasional pop ups requesting permission to allow the "online protection tool" from Microsoft, it just doesn't look or sound right though.

    I'm using Vista on an HP laptop, and went so far as to do a system restore(using f11 on startup), which I think is an HP feature below the windows system.
    I don't know how, but somehow the bug is still with me. Both the redirect and the pop up persist. I'm running Norton Internet Security 2010 (trial version) since the start up. Was using Avast before, but I don't think it was automatically scanning and I wasn't really concious of it.

    I'll attach my logs below, any help will be much appreciated. If it means anything, I find it strangely inspiring that there are people out there, on their computers, who choose to spend their free time debugging other peoples computers.
     

    Attached Files:

  2. nildram

    nildram Private E-2

    RR Log
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please open this folder and slide ComboFIx.exe out of it and onto your desktop:
    Running from: c:\av software\ComboFix.exe

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  4. nildram

    nildram Private E-2

    Hi Tim,
    The regedit was successful.

    Afterwards, I was still being redirected.

    I've attached the new MGtools log.

    I moved combofix, do you want me to run it? I'd started running it then stopped when I realized you only asked me to move it.

    After doing all of the above, I realized I only had local access to the internet via my wifi connection. I restarted, still no connection. Then I ran the repair function and the connection came back.

    Also, it's no longer redirecting me! I don't know about the fraudware pop ups, since they were pretty occasional.

    Does this make sense? Did the restart fix my problem?
     

    Attached Files:

  5. nildram

    nildram Private E-2

    update:
    Just got the "online protection tool" pop up again.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It should have fixed it. Since you just got another re-direct, do go ahead and run ComboFix as well as getting me a new MGLogs.zip.

    In the meantime, lets also do this:

    Download HostsXpert and then follow the below steps.

    • Unzip HostsXpert.zip
    • It will create a folder named HostsXpert in whatever folder you extract it to.
    • Run HostsXpert.exe by double clicking on it.
    • Click the Make Writeable? button. (if you only see a Make Read-Only selection, it is already writeable so skip this button).
    • Click Restore Microsoft's Hosts File and then click OK.
    • Click the X to exit the program
     
  7. nildram

    nildram Private E-2

    OK, ran combofix.

    Ran Hostxpert.

    Here's the MGtools log.

    No search redirects, but still the occasional pop up imploring me to install "online protection tool.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    @TimW: The DNS Hijacker lines are still present in runkeys.txt. I suggest that you use ComboFix to remove them. That is if ComboFix is working properly which it may not be since there is no new log.
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Something is preventing the fixes to work. Are you sure you have disabled all AV and AS software?

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    Registry::
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset001\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset003\services\tcpip\parameters]
    "DhcpNameServer"=""
    [-HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{cf9215c0-69be-40d9-ac1e-e23fe07dd777}]
    [-HKEY_LOCAL_MACHINE\system\controlset001\services\tcpip\parameters\interfaces\{cf9215c0-69be-40d9-ac1e-e23fe07dd777}]
    [-HKEY_LOCAL_MACHINE\system\controlset003\services\tcpip\parameters\interfaces\{cf9215c0-69be-40d9-ac1e-e23fe07dd777}]
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  10. nildram

    nildram Private E-2

    Sorry for the delayed response.

    The redirect, which had stopped, has started again. I think this may have happened when I disabled Norton. I've since uninstalled Norton and replaced it with Avast, since Norton was difficult to work with, disabling and re-enabling.

    I ran combofix again with the cfscript.txt, from the desktop.
    I've attached the logs for combofix and mgtools.

    Is it relevant that after running combofix, and after it restarts my sytem, chrome and IE have error messages saying they can't be found in the registry, but after another restart, it's fine?

    Thanks again.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sometimes these DNS Hijackers can infect router hardware. Please read and print or save the below instructions locally so that you can refer to them while offline. You will be disconnected as soon as you run the third step of the procedure with the ipconfig command and I don't want you to try reconnecting. That should be automatic later when we reboot.

    Follow all steps in the order given.

    Step1:

    Since the infection you have is known to infect router hardware. If you have a router hooked up then you need to follow the instructions for your hardware and reset it to factory default settings. Normally there is a recessed push button type switch that needs to be held down for some number of seconds to do this. After resetting to factory defaults on your router, you will need to reconfigure the router for your network if you have made any changes to the default network setup.


    Step2:



    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop but do not run it yet. We will use it later.
    Step3:



    Please click Start, All Program, Accessories and you will see ( among other things ) a Command Prompt entry.
    • Right click the Command Prompt entry and select Run As Administrator.
    • It is critical that you run it this way.
    • If you do this properly, a command prompt window will open with a title of Administrator Command Prompt
    • Enter the below commands at the command prompt each followed by the enter key. (note the space after ipconfig)
      • ipconfig /flushdns
        [*]ipconfig /releas
    • Exit the command window
    Step4:

    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Step5:

    Since Avenger should have rebooted your PC, you should be backup now and have an internet connection again.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\avenger.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  12. nildram

    nildram Private E-2

    Hi Chaslang,
    I'm still working on this one, as I need to get my neighbour to agree to resetting the router that we share and he owns. Hopefully I'll have it done soon.
     
  13. nildram

    nildram Private E-2

    Hi Chaslang,
    Thanks for the help! I reset the factory setting on the router, but in order to get it working again, I had to upload a backup of the configuration I'd saved. I hope that didn't reinfect, I'd scanned the cfg file with avast.

    However,
    I didn't have much luck with the ipconfig. ipconfig/ releas wasn't recognized.
    ipconfig /release returned the response:

    No operation can be performed on Local Area Connection while it has it's media disconnected.

    I made sure to use right click, run as administrator.

    Should I do the rest of the suggestions anyways?
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, you need to do the rest of the instructions. ;)
     
  15. nildram

    nildram Private E-2

    Logs!
     

    Attached Files:

  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please re-run MBAM. You still have the dns hijack.

    After running MBAM, copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * MBAM log
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  17. nildram

    nildram Private E-2

    I ran a boot time scan in Avast. It found some things that it doesn't find in it's regular scans. I moved them to "the chest", and pasted a screenshot of the log (sorry txt file wasn't available).

    I'm going to delete them now.

    I also ran MBAM again. It found a few things.

    The reg edit was successful.

    I currently can't use google, gmail or yahoo in chrome.

    In IE, I can check gmail, but not load google or yahoo.
     

    Attached Files:

  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    At this point, your logs are clean. You may need to post in the software forum for your remaining issues. I would first try uninstalling Chrome, run CCleaner, and after a reboot, try reinstalling it. Your main infection was with the dns changer, which is now gone.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:

     
  19. nildram

    nildram Private E-2

    I'm not sure, TIMW.

    I've attached two more MBAM logs. The first showing nothing, and the second showing the same DNS trojans. The trojans must be hiding somewhere on my computer, since they will be removed and then return.

    I followed the directions you gave about protecting from malware, and I noticed that a lot of those steps are blocked to me. I can't access windows update, either from the website or in the windows application. I also can't visit the Super Anti Spyware website, the mbam website, etc. It seems to be trying to preserve these deficiencies in my security. I do now have Comodo instead of windows firewall alone.
     
  20. nildram

    nildram Private E-2

    You can see from the date on the MBAM logs that they're returning.

    Thanks for everything, truly.
     

    Attached Files:

  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Although he may have reset the router, if he is also infected with this, it will just keep reoccurring on your system. No matter how many times we remove it, it will come back. You need to check his system also!! Easiest way is to open a command prompt and type:
    ipconfig /all

    Then see if his DNS is set to
    93.188.161.105
    93.188.166.105

    You can also try by right clicking your wireless connection, go to tcp/ip settings and see if that shows the DNS settings ( which should be on auto ).

    This is what yours is set to:
    Code:
    Wireless LAN adapter Wireless Network Connection:
    
       Connection-specific DNS Suffix  . : 
       Description . . . . . . . . . . . : Atheros AR5007 802.11b/g WiFi Adapter
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::61a5:5748:913c:133d%10(Preferred) 
       IPv4 Address. . . . . . . . . . . : 192.168.1.2(Preferred) 
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Lease Obtained. . . . . . . . . . : May-20-10 8:27:17 AM
       Lease Expires . . . . . . . . . . : May-21-10 7:16:20 AM
       Default Gateway . . . . . . . . . : 192.168.1.1
       [B]DNS Servers . . . . . . . . . . . : 93.188.161.105[/B]
                                           [B]93.188.166.105[/B]
       NetBIOS over Tcpip. . . . . . . . : Enabled
    If your neighbors settings are the same ( The DNS settings ) then you will not be clean until he also is clean. All of the previous fixes are valid and should work on his system as well, though it would be best to see the MGLog.zip from his system.
     
  22. nildram

    nildram Private E-2

    Just so I can clarify, for myself and my neighbour, "all of the previous fixes are valid", but are a certain subset of the previous fixes sufficient? It seems that MBAM alone can do it, and I imagine I can convince him to run that. Is that correct?
     
  23. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    MBAM has been able to find it, but it still does not remove the registry keys. That part is also important to have done. The thing is that his system may have it slightly differently that what is on your system. Therefore, I would need to see an MGLogs.zip from his system to be sure of the exact fix. And of course, the router would again need to be reset.
     
  24. nildram

    nildram Private E-2

    Hi Again,
    It's taken me a while to get access to the neighbours computer, but I've got it now. I've rerun MBAM and mgtools on both computers.

    He did indeed have the DNS Changer trojans.

    These are my logs. I'll post his next.
     

    Attached Files:

  25. nildram

    nildram Private E-2

    And here are my neighbour's logs.
     

    Attached Files:

  26. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Ok, assuming that the router has been reset to factory settings, on your computer do this:

    Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now on his machine, he needs to clean out these folders:
    C:\Windows\Temp\
    C:\USERS\SUNTERRA\LOCALS~1\TEMP\

    He needs to uninstall one of these:
    Norton Internet Security
    AVG Free 9.0

    Then he can:
    Copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Then he needs to right click his Wireless LAN adapter Wireless Network Connection, click on Internet protocol version 4 and then click properties and make sure to remove any settings and have both Obtain ip address and Obtain DNS server set to automatic.

    Then re-run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip --> for both yours and his.

    Make sure you tell me how things are working now!
     
  27. nildram

    nildram Private E-2

    OK, well he's taken his computer to florida for a week, so that'll have to wait.
    Quick question about execution, is it a bad idea to download the current routers settings to a .cfg file and upload them after? I've opened the file in notepad and it looks fairly harmless.
     
  28. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let me get this straight, he has his computer but you are still accessing through his router? If you have done the reset on his router, and the registry fix on your computer, then you are fine, but only until he returns with his infected machine and plugs it back into the router or uses his wifi with his still infected machine.
     
  29. nildram

    nildram Private E-2

    You've go it straight. That's why I'm not applying the fixes until he's back.

    I'll just play it safe and write down all the router settings then restore them after the reset to factory default.

    Thanks.
     
  30. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You just need to make sure that neither machine has the DNS settings set to this:
    93.188.161.105
    93.188.166.105
    as well as removing the registry keys associated with that.
     
  31. nildram

    nildram Private E-2

    I think I've got it! this is the neighbours computer's log.

    Thanks for your help!
     

    Attached Files:

  32. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I believe you do have it!!

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds