Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Google search re-directs - Methinks I've been hijacked!


  • This topic is locked This topic is locked
5 replies to this topic

#1 ptijerm

ptijerm

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 25 August 2009 - 07:04 AM

Hello:

This is my first post to this forum, and before I unload with the details of my problem I'd like to say what a great forum this is. I've read several topics/posts and have to commend the volunteers who take their time to help strangers solve various computer system concerns and issues. Great job everyone!

Now it's my turn to present a system issue.

For the last few weeks, I have noticed when conducting various Google searches using Firefox (primarily as this is my browser of choice) and also Internet Explorer that often, when clicking on one of the search result links, that I get redirected to some spam site rather than to the actual URL of the search result that I want. These spam sites usually contain ads to any number of things - medical offices to computer software to vacation packages, etc.

This doesn't happen with every search, but it does happen often enough that it becomes very annoying. When it does happen, it usually takes three tries on the search result before it actually takes me to the correct URL.

I am currently running Microsoft Windows XP Professional, Version 2002 as an operating system.

I've noticed in other threads that HijackThis is first used to run logs; I do not have HijackThis installed on my computer.

I do have various tools on my system that I would think would help solve/prevent any problem - CCleaner, CleanUp!, Malwarebyte’s Anti-Malware and McAfee. McAfee has found and deleted several things:

- Generic Downloader.x!mi (Trojan)
- DNSChanger!bc (Trojan)
- NTOSKRNL-HOOK Generic Rootkit.d!rootkit(Trojan)
- FakeAlert-GV(Trojan)
- a bunch of Cookies (e.g. 207, Yieldmanager, Atdmt, Doubleclick, Insightexpres, Mediaplex, Overture, ProMarket, AdBureau, and Zedo)

Unfortunately, the problem still has not gone away. And NTOSKRNL-HOOK keeps re-appearing.

Any help/advice would be greatly appreciated.

Thanks,

Jeremy

BC AdBot (Login to Remove)

 


#2 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:01:12 PM

Posted 25 August 2009 - 07:29 AM

Hello ptijerm and :thumbsup: to BleepingComputer.

We need to do a Rootkit Scan.

Please install RootRepeal
Note: Vista users ,, right click on desktop icon and select "Run as Administrator."
  • Go HERE, HERE, or HERE and download RootRepeal.zip to your Desktop.
Disconnect from the Internet or physically unplug your Internet cable connection.
Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
Temporarily disable your anti-virus and real-time anti-spyware protection.
After starting the scan, do not use the computer until the scan has completed.
When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
  • Extract RootRepeal.exe from the zip archive.
  • Open Posted Image on your desktop.
  • At the top of the window, click Settings, then Options.
  • Click the Ssdt & Shadow Ssdt Tab.
  • Make sure the box next to "Only display hooked functions." is checked.
  • Click the "X" in the top right corner of the Settings window to close it.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.
~Blade


In your next reply, please include the following:
RootRepeal Log

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#3 ptijerm

ptijerm
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 25 August 2009 - 12:50 PM

Done. Here's the Root Report:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 11:19
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAA9C7000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B24000 Size: 8192 File Visible: No Signed: -
Status: -

Name: nwfilter.sys
Image Path: nwfilter.sys
Address: 0xF79DA000 Size: 15808 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA996D000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: Volume C:\
Status: MBR Rootkit Detected!

Path: Volume C:\, Sector 1
Status: Sector mismatch

Path: Volume C:\, Sector 2
Status: Sector mismatch

Path: Volume C:\, Sector 3
Status: Sector mismatch

Path: Volume C:\, Sector 4
Status: Sector mismatch

Path: Volume C:\, Sector 5
Status: Sector mismatch

Path: Volume C:\, Sector 6
Status: Sector mismatch

Path: Volume C:\, Sector 7
Status: Sector mismatch

Path: Volume C:\, Sector 8
Status: Sector mismatch

Path: Volume C:\, Sector 9
Status: Sector mismatch

Path: Volume C:\, Sector 10
Status: Sector mismatch

Path: Volume C:\, Sector 11
Status: Sector mismatch

Path: Volume C:\, Sector 12
Status: Sector mismatch

Path: Volume C:\, Sector 13
Status: Sector mismatch

Path: Volume C:\, Sector 14
Status: Sector mismatch

Path: Volume C:\, Sector 15
Status: Sector mismatch

Path: Volume C:\, Sector 16
Status: Sector mismatch

Path: Volume C:\, Sector 17
Status: Sector mismatch

Path: Volume C:\, Sector 18
Status: Sector mismatch

Path: Volume C:\, Sector 19
Status: Sector mismatch

Path: Volume C:\, Sector 20
Status: Sector mismatch

Path: Volume C:\, Sector 21
Status: Sector mismatch

Path: Volume C:\, Sector 22
Status: Sector mismatch

Path: Volume C:\, Sector 23
Status: Sector mismatch

Path: Volume C:\, Sector 24
Status: Sector mismatch

Path: Volume C:\, Sector 25
Status: Sector mismatch

Path: Volume C:\, Sector 26
Status: Sector mismatch

Path: Volume C:\, Sector 27
Status: Sector mismatch

Path: Volume C:\, Sector 28
Status: Sector mismatch

Path: Volume C:\, Sector 29
Status: Sector mismatch

Path: Volume C:\, Sector 30
Status: Sector mismatch

Path: Volume C:\, Sector 31
Status: Sector mismatch

Path: Volume C:\, Sector 32
Status: Sector mismatch

Path: Volume C:\, Sector 33
Status: Sector mismatch

Path: Volume C:\, Sector 34
Status: Sector mismatch

Path: Volume C:\, Sector 35
Status: Sector mismatch

Path: Volume C:\, Sector 36
Status: Sector mismatch

Path: Volume C:\, Sector 37
Status: Sector mismatch

Path: Volume C:\, Sector 38
Status: Sector mismatch

Path: Volume C:\, Sector 39
Status: Sector mismatch

Path: Volume C:\, Sector 40
Status: Sector mismatch

Path: Volume C:\, Sector 41
Status: Sector mismatch

Path: Volume C:\, Sector 42
Status: Sector mismatch

Path: Volume C:\, Sector 43
Status: Sector mismatch

Path: Volume C:\, Sector 44
Status: Sector mismatch

Path: Volume C:\, Sector 45
Status: Sector mismatch

Path: Volume C:\, Sector 46
Status: Sector mismatch

Path: Volume C:\, Sector 47
Status: Sector mismatch

Path: Volume C:\, Sector 48
Status: Sector mismatch

Path: Volume C:\, Sector 49
Status: Sector mismatch

Path: Volume C:\, Sector 50
Status: Sector mismatch

Path: Volume C:\, Sector 51
Status: Sector mismatch

Path: Volume C:\, Sector 52
Status: Sector mismatch

Path: Volume C:\, Sector 53
Status: Sector mismatch

Path: Volume C:\, Sector 54
Status: Sector mismatch

Path: Volume C:\, Sector 55
Status: Sector mismatch

Path: Volume C:\, Sector 56
Status: Sector mismatch

Path: Volume C:\, Sector 57
Status: Sector mismatch

Path: Volume C:\, Sector 58
Status: Sector mismatch

Path: Volume C:\, Sector 59
Status: Sector mismatch

Path: Volume C:\, Sector 60
Status: Sector mismatch

Path: Volume C:\, Sector 61
Status: Sector mismatch

Path: Volume C:\, Sector 62
Status: Sector mismatch

Path: C:\WINDOWS\system32\ytasfwfmmsmlhm.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\ytasfwlqkwbetb.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\ytasfwpaapexwb.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\ytasfwqxmqwuws.dat
Status: Invisible to the Windows API!

Path: c:\windows\temp\sqlite_19z5r7bqnzeczzt
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\sqlite_mg1tsuryt4fesi8
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\windows\temp\sqlite_ufhyltz8i9wbmjs
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: C:\WINDOWS\Temp\ytasfwnsvxbfpyyq.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\ytasfwxjcjjomp.sys
Status: Invisible to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: services.exe (PID: 924) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: lsass.exe (PID: 936) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwfmmsmlhm.dll]
Process: svchost.exe (PID: 1132) Address: 0x00670000 Size: 53248

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1132) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1212) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1264) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1308) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1464) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1488) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: LocalSch.EXE (PID: 544) Address: 0x003e0000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: tmcsvc.exe (PID: 668) Address: 0x00b20000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1472) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1560) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: svchost.exe (PID: 1656) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: Explorer.EXE (PID: 2456) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: igfxpers.exe (PID: 1988) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: DLACTRLW.EXE (PID: 2628) Address: 0x00910000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: spoolsv.exe (PID: 3196) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: McSACore.exe (PID: 2588) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: AppleMobileDeviceService.exe (PID: 4048) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: RootRepeal.exe (PID: 3548) Address: 0x10000000 Size: 28672

Object: Hidden Module [Name: ytasfwlqkwbetb.dll]
Process: ctfmon.exe (PID: 3628) Address: 0x10000000 Size: 28672

Hidden Services
-------------------
Service Name: ytasfwsaltmapi
Image Path: C:\WINDOWS\system32\drivers\ytasfwxjcjjomp.sys

==EOF==

#4 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:01:12 PM

Posted 25 August 2009 - 01:03 PM

You have a rootkit embedded in your machine. With the information you have provided I believe you will need help from the malware removal team. Please read the information about getting started. After you have followed the steps in that guide, I would like you to start a new thread HERE and include a link to this thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. The HJT team is very busy, so it could be several days before you receive a reply. But rest assured, help is on the way!

~Blade

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#5 ptijerm

ptijerm
  • Topic Starter

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 25 August 2009 - 01:53 PM

Thanks for the assistance.

I have started a new thread here

Jeremy

#6 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,993 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:12 PM

Posted 25 August 2009 - 03:33 PM

Hello,

Now comes the hard part: waiting.

Now that you have posted a log, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users