js:ScriptPE-inf and mal:url on Google websites/Chrome.exe--HELP!

I switched on my laptop today and I got these Avast pop-ups:

Object: http://92.242.144.10/wpad.dat
Infection: JS:ScriptPE-inf [trj]
Process: C:\Windows/system32/svchost.exe

Object: http://92.242.144.10/wpad.dat
Infection: URL:Mal
Process: C:\Windows/system32/svchost.exe

The pop-ups always appear when I try to access Gmail and Google+, also when starting Chrome. I’ve done an Avast full system scan and it traced the problem to a tmp file in “avast” folder located in windows temp files folder and a “History index 2009-2011” file in Chrome. I moved the infected files to the chest and thought the problem was resolved, but the popups keep appearing.

I’m not sure what to do anymore and where this infection even came from. I’ve used ComboFix, HiJackThis, MBAM, TDSSKiller but I’m not sure how to interpret the log files. Would appreciate any experienced help I can get on this.

follow essexboys guide here and attach the logs http://forum.avast.com/index.php?topic=53253.0

lower left corner > additional options > attach
if the logs are to big upload to http://www.mediafire.com/ and post the download link here

essexboy will then have a look when he arrive

Thanks for the quick reply. Here are the log files from MBAM, OTL and aswMBR

if you have log files from Combofix / TDSSkiller you may add those also

essexboy is notified :wink:

Could you post the TDSSKiller and combofix logs please

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:OTL IE - HKU\S-1-5-21-1076999903-3715112832-1848899827-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.bigseekpro.com/tempcleaner/{050A7A67-11E0-4BCE-B3ED-26FA9FCC51C0} FF - prefs.js..browser.startup.homepage: "http://www.bigseekpro.com/tempcleaner/{050A7A67-11E0-4BCE-B3ED-26FA9FCC51C0}" [2011/09/25 11:17:06 | 000,000,000 | ---D | M] (DealBulldog Toolbar) -- C:\Users\Evan Yap\AppData\Roaming\Mozilla\Firefox\Profiles\8gn78kg4.default\extensions\{75656794-AB59-4712-BFBC-5D816D56F3BC} O3 - HKU\S-1-5-21-1076999903-3715112832-1848899827-1000\..\Toolbar\WebBrowser: (no name) - {32099AAC-C132-4136-9E9A-4E364A424E17} - No CLSID value found. [2011/09/25 11:17:03 | 000,000,000 | ---D | C] -- C:\Program Files\DealBulldog Toolbar

:Files
ipconfig /flushdns /c

:Commands
[purity]
[resethosts]
[emptytemp]
[EMPTYFLASH]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

Ok, I ran the fix and rebooted. I’m still getting this alert whenever I try to load Gmail, Google+ and apparently also with GTalk too (I only noticed this now):

Object: http://92.242.144.10/wpad.dat
Infection: URL:Mal
Process: C:\Windows/system32/svchost.exe

I ran ComboFix and TDSSKiller before running the OTL fix.

Awaiting your next instructions. Thanks for the quick help!

Does thios happen in both IE and firefox or just one of them ?

It does not happen with Firefox. It happens on Internet Explorer when I load the same websites. Also, the address bar has this upon loading IE:

http://www.bigseekpro.com/tempcleaner/{050A7A67-11E0-4BCE-B3ED-26FA9FCC51C0}

OK I missed two elements in IE ::slight_smile:

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:OTL IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.bigseekpro.com/tempcleaner/{050A7A67-11E0-4BCE-B3ED-26FA9FCC51C0} IE - HKU\S-1-5-21-1076999903-3715112832-1848899827-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://www.bigseekpro.com/tempcleaner/{050A7A67-11E0-4BCE-B3ED-26FA9FCC51C0} O2 - BHO: (SMTTB2009 Class) - {FCBCCB87-9224-4B8D-B117-F56D924BEB18} - C:\Program Files\DealBulldog Toolbar\tbcore3.dll ()

:Reg

:Files
ipconfig /flushdns /c
C:\Program Files\DealBulldog Toolbar

:Commands
[purity]
[resethosts]
[emptytemp]
[EMPTYFLASH]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

Ok, I ran the new fix and I’m still getting the same alert popups with same triggers.

A new one popped out though right after Windows loaded, but I wasn’t able to copy the process. It seems to be related to Avast itself. This particular popup is rarer than the other ones I’ve posted because I’ve only seen it now and it hasn’t showed up again since the system started:

Object: http://wpad/wpad.dat
Infection: URL:Mal
Process: Program Files/Avast…

I’ll also post the details of the two infected files that were removed earlier when I did a full system scan with Avast, might come in handy:

Name: History index 2009-2011
Original Location: C:\Users\Evan Yap\AppData\Local\Google\Chrome\User Data\Default
Last changed: 9/25/2011 5:35:15AM
Virus: HTML:Script-inf

Name: unp39816800.tmp
Original location: C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp_avast_
Last changed: 5/18/2011 2:58:21 PM
Virus: JS:ScriptPE-inf [Trj]

FYI: I haven’t deleted these from the system. From what I know, keeping them in the chest already prevents viruses from working. But will permanently deleting these two files from the virus chest help?

Awaiting orders :stuck_out_tongue:

Hi nuttytuter,

It would appear that someone has placed a corrupt wpad file in the path of the site you are accessing. Avast is stopping the file being executed, but there seems to be a copy lurking on your system that is accessed every time you start to browse, thus triggering your avast av again.
Essexboy will certainly get rid of all the remnants of it. All temp internet files should be searched on your computer for any wpad.* files and then deleted,

polonus

polonus, thanks for that explanation. how can we trace the corrupt wpad file and wipe it out completely?

I tried unchecking “automatically detect settings” under LAN settings in Chrome, and then I reloaded Gmail, Google Plus, etc. The popups don’t appear at all when I do that. But when I activate “auto detect settings”, I get the alert popups.

I did a scan using hijack this if it will provide more useful info

OK that gives me an area to look in - so lets reset one of your ip addresses and retry

Warning This fix is only relevant for this system and no other, using on another computer may cause problems

Run OTL

[*]Under the Custom Scans/Fixes box at the bottom, paste in the following

:OTL O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{BC0754A6-8A21-4725-BD0C-4C79220F8174}: DhcpNameServer = 124.106.4.2 124.106.7.2

:Files
ipconfig /flushdns /c

:Commands
[purity]
[resethosts]
[emptytemp]
[EMPTYFLASH]
[CREATERESTOREPOINT]
[Reboot]


[*]Then click the Run Fix button at the top
[*]Let the program run unhindered, reboot the PC when it is done
[*]Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.

Essexboy: Ok, I ran the new fix. I’m still getting the same alert popup when auto detect settings are on. when it’s off, the popups seem to stop

Any other scans we can run to give more info?

Awaiting orders :stuck_out_tongue:

Hi nuttytuter,

Change DNS to Secure Comodo settings: http://www.comodo.com/secure-dns/switch/router.html

polonus

I’m having some trouble logging into the router. I think the network administrator changed the default password and has forgotten the password. I will get back to you as soon as I switch the DNS to Comodo secure DNS.

Can you please explain why I’m changing the DNS? Will this help fix my problem with the wpad file that Avast keeps detecting?

Thanks!

Hi nuttytuter,

I saw you had that installed from inside the HJT log you provided. In another similar cleansing routine this also helped towards the final solution of this (where it was an infected site update that was at the culprit of this issue). Anyway as it is not interfering in any way with essexboy’s cleansing routines I put that suggestion forward. On the other hand you should follow essexboys’ instructions to the dot, and after he is done, you might also need some additional crap cleaning and a check for corrupted system files, but that is for him to decide. This particular malware does not belong to the real easy ones to cleanse, but essexboy is a renowned malware cleanser, and everything will be OK,

polonus

OK that is DNS cache poisoning - I am now researching that one as I have never come across it before. For the moment deselect auto detect

First we will flush the DNS cache on your system

Go to start > All Programs > Accessories
Right click Command Prompt and select run as Administrator
In the black box type or paste the following

ipconfig /flushdns