Google Links being Redirected

Lenovo / 6459cto
June 21, 2009 at 16:35:05
Specs: Microsoft Windows XP Professional, 2.094 GHz / 3054 MB
Hi there,
Like others on here I seem to have a virus that hijacks my browser. When attempting to click on google search links my browser instead goes to other random advertising websites. This may or may not be related, but some accounts I have have had their passwords changed, so I also may have a keylogger. Upon reading some other posts, I noticed that gmer logs have been requested, so I preemptively ran a scan that finished 5 minutes ago. Thank you in advance!

gmer log: http://rapidshare.com/files/2471681...


See More: Google Links being Redirected

Report •


#1
June 21, 2009 at 16:45:44
I don't know if this is helpful, but I have ESET Nod32 and I've ran a full AV scan over the past few days. Here's the log:

6/20/2009 11:26:34 PM HTTP filter file http://b.arvzoao.info/ql/pdf.php PDF/Exploit.Gen trojan connection terminated - quarantined RICHARD\Richard Serrano Threat was detected upon access to web by the application: C:\Program Files\Internet Explorer\iexplore.exe.

6/20/2009 11:10:21 AM HTTP filter file http://theinstalls.com/files/uprogr... a variant of Win32/Kryptik.UR trojan connection terminated - quarantined RICHARD\Richard Serrano Threat was detected upon access to web by the application: C:\WINDOWS\system32\svchost.exe.

6/20/2009 10:56:00 AM Real-time file system protection file C:\WINDOWS\system32\drivers\SKYNEToyyfdcrr.sys a variant of Win32/Kryptik.TV trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\Program Files\Mozilla Firefox\firefox.exe.

6/20/2009 10:55:36 AM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\bucksnet.tmp a variant of Win32/Kryptik.UQ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.

6/20/2009 10:55:35 AM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\rasesnet.tmp a variant of Win32/Olmarik.II trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.

6/20/2009 10:55:34 AM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\prun.tmp a variant of Win32/TrojanClicker.Punad.AA trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.

6/19/2009 1:55:49 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\Av-test.txt Eicar test file cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\cmd.exe.

6/17/2009 2:46:17 PM HTTP filter file http://theinstalls.com/files/uprogr... a variant of Win32/Kryptik.UD trojan connection terminated - quarantined RICHARD\Richard Serrano Threat was detected upon access to web by the application: C:\WINDOWS\system32\svchost.exe.

6/17/2009 2:45:45 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\asoxnwcrem.tmp Win32/TrojanDownloader.FakeAlert.ACE trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\mshta.exe.

6/17/2009 2:45:23 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\rnxwsmoaec.tmp a variant of Win32/Olmarik.II trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\mshta.exe.

6/17/2009 2:45:13 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\sarmcwenxo.tmp a variant of Win32/TrojanClicker.Punad.AA trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\mshta.exe.

6/17/2009 2:39:59 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\rasesnet.tmp a variant of Win32/Olmarik.II trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\xpre.tmp.

6/17/2009 2:39:58 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\prun.tmp a variant of Win32/TrojanClicker.Punad.AA trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\xpre.tmp.

6/17/2009 2:31:54 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\incosnet.tmp a variant of Win32/Kryptik.RQ trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.

6/17/2009 2:31:54 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\rasesnet.tmp a variant of Win32/Olmarik.II trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.

6/17/2009 2:31:53 PM Real-time file system protection file C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\prun.tmp a variant of Win32/TrojanClicker.Punad.AA trojan cleaned by deleting - quarantined NT AUTHORITY\SYSTEM Event occurred on a new file created by the application: C:\WINDOWS\system32\rn.tmp.


Report •

#2
June 21, 2009 at 17:36:45
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteAVUpdateEx( 'http://avz.virusinfo.info/avz_up/', 1, '','','');
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#3
June 22, 2009 at 10:28:40
As you requested, the AVZ log and the DDS Logs. Thanks again for your help :)

AVZ log: http://rapidshare.com/files/2474382...

1. DDS.txt: http://rapidshare.com/files/2474385...

2. Attach.txt: http://rapidshare.com/files/2474388...


Report •

Related Solutions

#4
June 22, 2009 at 12:20:43
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\avyaaomn.sys','');
 QuarantineFile('\\?\globalroot\systemroot\system32\UACxgpamoatclbyksa.dll','');
 QuarantineFile('\\?\globalroot\systemroot\system32\UACaunpoupawyfvltm.dll','');
 DeleteFile('\\?\globalroot\systemroot\system32\UACaunpoupawyfvltm.dll');
 DeleteFile('\\?\globalroot\systemroot\system32\UACxgpamoatclbyksa.dll');
 DeleteFile('C:\DOCUME~1\RICHAR~1\LOCALS~1\Temp\avyaaomn.sys');
BC_ImportDeletedList;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

2) After reboot execute following script in AVZ:

begin
CreateQurantineArchive('C:\quarantine1.zip');    
end.


A file called quarantine1.zip should be created in C:\. Upload that file to rapidshare.com and Private message me download link.

3) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

4) Please zip up C:\qoobox\quarantine and upload it, to a filehost such as http://rapidshare.com/ Then, Private Message me the Download links to the uploaded files.

Note: Note piracy is not supported i suggest you buy adobe software legally.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#5
June 22, 2009 at 15:13:36
I tried to send you a PM but it doesn't allow me to send PMs to repliers of my post. I followed your instructions and here are all the files you requested. There was a problem that I noticed, and it is that I checked in AVZ's C:/quarantine1.zip and there were no file contents inside. I did not want to repeat the AVZ script again since I'd already performed steps 3 and 4 at that time, in case that would affect anything. So here are the files (minus quarantine1.zip)

<Removed Links>

The second file is a folder that belongs in C:/Qoobox/Quarantine. For some reason my computer was not allowing me to zip it all up as one file so I compressed it as a separate one. Thank you!!


Report •

#6
June 22, 2009 at 15:15:52

Report •

#7
June 22, 2009 at 15:17:19
Oh, sorry for that. Here's the Combofix log:

http://rapidshare.com/files/2475284...


Report •

#8
June 22, 2009 at 15:31:59
Please remove links from Response Number 5 now. Is your original problem solved?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#9
June 22, 2009 at 15:33:12
Done :)

Report •

#10
June 22, 2009 at 15:37:04
Is your original problem fixed? Run a full scan with eset. Also:

Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Lastly, uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#11
June 22, 2009 at 15:49:51
Woot! Yes my problem is fixed. I can actually click google links that route to their intended address. Does this fix also address the virus/keylogger that's been in my computer? Things seem to be running a bit smoother now, but I don't want to type in sensitive information if the virus is still on my computer. Thank you!

Report •

#12
June 22, 2009 at 16:18:49
Run full scan with eset on high and post your scan results.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#13
June 22, 2009 at 17:13:09
I just ran a full scan with eset with "on high" as you said and here is the log:

http://rapidshare.com/files/2475552...

It found 6 infected objects, all of which were in the quarantine.zip file and in the Qoobox directory so technically it found nothing of significance. My only concern is that I ran scans before where it found nothing when in fact I had these viruses on my computer. What do you think? Am I safe? Thanks :D


Report •

#14
June 22, 2009 at 17:41:23
Seems like it :). Your malware free. If any more related malware problem feel free to private message me.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •


Ask Question