Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hijacked Browser


  • This topic is locked This topic is locked
5 replies to this topic

#1 slimcoolie

slimcoolie

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:55 AM

Posted 24 November 2009 - 08:59 PM

The problems I'm experiencing are as follows: When I click on any google search link, I'm redirected to a number of different sites. If I copy the link and paste it in the address box, this does not occur. I've tried an alternative browser, running a norton scan, ran malwarebytes, adware 6, etc. Nothing worked. I've attached the attach.text file. When I attemted to run root repeal, I got a blue windows shut down screen with code IRQL_Not_LESS_OR_EQUAL, so I'm not able to attach the root repeal file. Any help will be greatly appreciated. I will be checking my email frequently so if you need more info I can get it too you soon. Thank you.

Attached Files


Edited by slimcoolie, 24 November 2009 - 09:02 PM.


BC AdBot (Login to Remove)

 


#2 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:05:55 AM

Posted 27 November 2009 - 12:12 PM

Hello slimcoolie :( Welcome to the BC HijackThis Log and Analysis forum. I will be assisting you in cleaning up your system.


I ask that you refrain from running tools other than those we suggest while we are cleaning up your computer. The reason for this is so we know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.



In the upper right hand corner of the topic you will see a button called Options. If you click on this in the drop-down menu you can choose Track this topic. By doing this and then choosing Immediate E-Mail notification and then clicking on Proceed you will be advised when we respond the your topic and facilitate the cleaning of your machine.

After 5 days if a topic is not replied to we assume it has been abandoned and it is closed.



When you ran DDS there should have been two logs generated. I need the other one you didn't post which is DDS.txt. If you don't have it on your computer still the directions for downloading and running it are below. I won't need the Attach.txt again.



Posted Image
Download DDS and save it to your desktop from here or here.
Disable any script blocker, and then double click dds.scr to run the tool.
  • When done, DDS will open two (2) logs:
    • DDS.txt
    • Attach.txt
  • Save both reports to your desktop.









Download GMER Rootkit Scanner from here to your desktop.
  • Double click the exe file.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO, then use the following settings for a more complete scan.


    Posted Image
    Click the image to enlarge it


  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish.
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file which cannot be uploaded to your post.
[*]Save it where you can easily find it, such as your desktop, and post it in reply.

**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries





Please do not post any logs as an attachment unless asked to do so.





Thanks,



thewall
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#3 slimcoolie

slimcoolie
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:55 AM

Posted 27 November 2009 - 09:12 PM

Thanks so much for responding and for your help Mwall. First I've copied and pasted the dds log and then the Gmer.txt
Thanks again, I'll check for your response in the morining.

DDS (Ver_09-11-24.02) - NTFSx86
Run by SHAY SHAY at 16:59:46.71 on Tue 11/24/2009
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.254.21 [GMT -8:00]

AV: Norton AntiVirus *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\Dell\Media Experience\DMXLauncher.exe
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe
C:\Program Files\Dell Support\DSAgnt.exe
C:\WINDOWS\system32\ctfmon.exe
svchost.exe
C:\WINDOWS\system32\dlbucoms.exe
C:\Program Files\Dell Network Assistant\hnm_svc.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Dell Network Assistant\ezi_hnm2.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\Norton AntiVirus\Engine\17.1.0.19\ccSvcHst.exe
C:\Program Files\Norton AntiVirus\Engine\17.1.0.19\ccSvcHst.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\SHAY SHAY\Desktop\dds.scr

============== Pseudo HJT Report ===============

uSearch Bar = hxxp://www.google.com/hws/sb/dell-usuk-rel/en/side.html?channel=us
uStart Page = hxxp://www.google.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {5CA3D70E-1895-11CF-8E15-001234567890} - No File
BHO: {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - No File
BHO: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - No File
BHO: {CA6319C0-31B7-401E-A518-A07C3DB8F777} - No File
uRun: [DellSupport] "c:\program files\dell support\DSAgnt.exe" /startup
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [DMXLauncher] c:\program files\dell\media experience\DMXLauncher.exe
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [ISUSPM Startup] c:\progra~1\common~1\instal~1\update~1\ISUSPM.exe -startup
mRun: [ISUSScheduler] "c:\program files\common files\installshield\updateservice\issch.exe" -start
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [DLBUCATS] rundll32 c:\windows\system32\spool\drivers\w32x86\3\DLBUtime.dll,_RunDLLEntry@16
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\dellne~1.lnk - c:\windows\installer\{0240bdfb-2995-4a3f-8c96-18d41282b716}\Icon0240BDFB3.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBC} - c:\program files\java\jre1.5.0_06\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\mi1933~1\office11\REFIEBAR.DLL
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - {FE54FA40-D68C-11d2-98FA-00C0F0318AFE} - c:\windows\system32\Shdocvw.dll
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {D4323BF2-006A-4440-A2F5-27E3E7AB25F8} - hxxp://3dlifeplayer.dl.3dvia.com/player/install/installer.exe
Notify: igfxcui - igfxdev.dll

============= SERVICES / DRIVERS ===============

R1 BHDrvx86;BHDrvx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\bashdefs\20091104.001\BHDrvx86.sys [2009-11-4 524848]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nav\1101000.013\cchpx86.sys [2009-11-24 501888]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-11-23 102448]
R3 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\ipsdefs\20091111.001\IDSXpx86.sys [2009-11-23 329592]

=============== Created Last 30 ================

2009-11-24 00:07:36 0 d-sh--w- c:\documents and settings\shay shay\IECompatCache
2009-11-24 00:06:50 0 d-sh--w- c:\documents and settings\shay shay\PrivacIE
2009-11-24 00:04:40 0 d-sh--w- c:\documents and settings\shay shay\IETldCache
2009-11-23 22:30:18 0 d-----w- c:\windows\ie8updates
2009-11-23 22:20:19 0 dc-h--w- c:\windows\ie8
2009-11-23 22:14:04 92160 ------w- c:\windows\system32\dllcache\iecompat.dll
2009-11-23 22:13:47 12800 ------w- c:\windows\system32\dllcache\xpshims.dll
2009-11-23 22:13:44 246272 ------w- c:\windows\system32\dllcache\ieproxy.dll
2009-11-23 19:58:16 0 d-----w- c:\docume~1\shaysh~1\applic~1\Malwarebytes
2009-11-23 19:57:33 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-11-23 18:03:03 7443 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2009-11-23 18:03:03 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2009-11-23 18:03:02 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2009-11-23 18:03:02 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2009-11-23 18:01:31 0 d-----w- c:\windows\system32\drivers\NAV
2009-11-23 18:01:20 0 d-----w- c:\program files\Norton AntiVirus
2009-11-23 18:01:18 0 d-----w- c:\docume~1\alluse~1\applic~1\Norton
2009-11-23 18:00:34 0 d-----w- c:\program files\NortonInstaller
2009-11-23 18:00:34 0 d-----w- c:\docume~1\alluse~1\applic~1\NortonInstaller
2009-11-20 01:27:27 0 d-----w- c:\program files\PokerStars
2009-11-19 03:45:25 0 d-----w- c:\program files\dl_Cats
2009-11-17 20:58:46 0 d-----w- c:\windows\system32\CatRoot_bak
2009-11-17 14:58:21 0 d-----w- c:\windows\ServicePackFiles
2009-11-17 12:42:37 272128 ------w- c:\windows\system32\drivers\bthport.sys
2009-11-17 12:42:37 272128 ------w- c:\windows\system32\dllcache\bthport.sys
2009-11-17 12:40:55 128512 ------w- c:\windows\system32\dllcache\dhtmled.ocx
2009-11-17 12:39:56 331776 ------w- c:\windows\system32\dllcache\msadce.dll
2009-11-17 12:39:19 655872 ------w- c:\windows\system32\dllcache\mstscax.dll
2009-11-17 12:38:58 1193414 ------w- c:\windows\system32\dllcache\sysmain.sdb
2009-11-17 12:38:57 215552 ------w- c:\windows\system32\dllcache\wordpad.exe
2009-11-16 22:51:24 2 ----a-w- c:\windows\msoffice.ini
2009-11-16 21:46:31 25856 ----a-w- c:\windows\system32\drivers\usbprint.sys
2009-11-16 21:46:31 25856 ----a-w- c:\windows\system32\dllcache\usbprint.sys
2009-11-16 21:44:45 31616 ----a-w- c:\windows\system32\drivers\usbccgp.sys
2009-11-16 21:44:45 31616 ----a-w- c:\windows\system32\dllcache\usbccgp.sys

==================== Find3M ====================

2009-11-23 22:50:07 95360 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-11-23 22:50:07 95360 ----a-w- c:\windows\system32\dllcache\atapi.sys
2009-11-19 04:21:08 1134 ----a-w- c:\docume~1\shaysh~1\applic~1\wklnhst.dat
2009-10-22 09:19:04 5939712 ------w- c:\windows\system32\dllcache\mshtml.dll
2009-09-11 14:33:52 133632 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-11 14:33:52 133632 ------w- c:\windows\system32\dllcache\msv1_0.dll
2009-09-04 20:45:26 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-04 20:45:26 58880 ------w- c:\windows\system32\dllcache\msasn1.dll
2009-08-29 08:08:21 916480 ----a-w- c:\windows\system32\wininet.dll
2009-08-29 08:08:21 916480 ------w- c:\windows\system32\dllcache\wininet.dll
2009-08-29 08:08:21 1208832 ------w- c:\windows\system32\dllcache\urlmon.dll
2009-08-29 08:08:20 206848 ------w- c:\windows\system32\dllcache\occache.dll
2009-08-29 08:08:18 594432 ------w- c:\windows\system32\dllcache\msfeeds.dll
2009-08-29 08:08:18 55296 ------w- c:\windows\system32\dllcache\msfeedsbs.dll
2009-08-29 08:08:18 25600 ------w- c:\windows\system32\dllcache\jsproxy.dll
2009-08-29 08:08:18 1985536 ------w- c:\windows\system32\dllcache\iertutil.dll
2009-08-29 08:08:17 184320 ------w- c:\windows\system32\dllcache\iepeers.dll
2009-08-29 08:08:16 11069440 ------w- c:\windows\system32\dllcache\ieframe.dll
2009-08-29 08:08:13 387584 ------w- c:\windows\system32\dllcache\iedkcs32.dll
2009-08-29 07:36:24 133120 ------w- c:\windows\system32\dllcache\extmgr.dll
2009-08-28 10:35:52 173056 ------w- c:\windows\system32\dllcache\ie4uinit.exe
2009-08-28 10:28:59 13824 ------w- c:\windows\system32\dllcache\ieudinit.exe
2008-03-17 13:45:45 88 --sh--r- c:\windows\system32\6149B7C848.sys
2008-03-17 13:45:54 2516 --sha-w- c:\windows\system32\KGyGaAvL.sys

============= FINISH: 17:02:59.07 ===============



GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-11-27 18:06:18
Windows 5.1.2600 Service Pack 2
Running: wmr9lheq.exe; Driver: C:\DOCUME~1\SHAYSH~1\LOCALS~1\Temp\uxtdrpob.sys


---- System - GMER 1.0.15 ----

SSDT FF7C5AF8 ZwAlertResumeThread
SSDT FF7C5BD8 ZwAlertThread
SSDT FF7DEBE8 ZwAllocateVirtualMemory
SSDT FF7DA5C8 ZwAssignProcessToJobObject
SSDT FF93B638 ZwConnectPort
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwCreateKey [0xB2690210]
SSDT FF7C64D0 ZwCreateMutant
SSDT FF7DAB28 ZwCreateSymbolicLinkObject
SSDT FFBB82D8 ZwCreateThread
SSDT FF7DA6A8 ZwDebugActiveProcess
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteKey [0xB2690490]
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey [0xB26909F0]
SSDT FF8DA5B0 ZwDuplicateObject
SSDT FF7DEA08 ZwFreeVirtualMemory
SSDT FF7C65C0 ZwImpersonateAnonymousToken
SSDT FF7C5A18 ZwImpersonateThread
SSDT FF8B50E8 ZwLoadDriver
SSDT FFBB7118 ZwMapViewOfSection
SSDT FF7C63F0 ZwOpenEvent
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwOpenKey [0xB26907A0]
SSDT FF993B70 ZwOpenProcess
SSDT FF7DECB8 ZwOpenProcessToken
SSDT FF7D26E0 ZwOpenSection
SSDT 819A6AB8 ZwOpenThread
SSDT FF7DA4D8 ZwProtectVirtualMemory
SSDT FF7C5CB8 ZwResumeThread
SSDT FF7C5808 ZwSetContextThread
SSDT FF7CC980 ZwSetInformationProcess
SSDT FF7D2598 ZwSetSystemInformation
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey [0xB2690C40]
SSDT FF7D27C0 ZwSuspendProcess
SSDT FF7C5648 ZwSuspendThread
SSDT FF7DE808 ZwTerminateProcess
SSDT FF7C5728 ZwTerminateThread
SSDT FF7CCA70 ZwUnmapViewOfSection
SSDT FF7DEAF8 ZwWriteVirtualMemory

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)

Device mrxsmb.sys (Windows NT SMB Minirdr/Microsoft Corporation)
Device AF0BFC8A

AttachedDevice fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

Device Cdfs.SYS (CD-ROM File System Driver/Microsoft Corporation)
Device DLAIFS_M.SYS (Drive Letter Access Component/Sonic Solutions)
Device -> \Driver\atapi \Device\Harddisk0\DR0 81AD7369

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#4 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:05:55 AM

Posted 28 November 2009 - 10:37 AM

You're welcome. We'll try to get you cleaned up.


Please download ComboFix from one of these locations:

Link 1
Link 2

* IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. Instruction can be found HERE
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


Posted Image


Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#5 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:05:55 AM

Posted 02 December 2009 - 05:55 PM

Are you still with me?
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you

#6 thewall

thewall

  • Malware Response Team
  • 6,425 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Florida
  • Local time:05:55 AM

Posted 04 December 2009 - 11:31 AM

Due to the lack of feedback This Topic is closed.

Should you need it reopened, please contact my by PM. Include the address of this thread in your request.

If you have a new issue, please start a New Topic.

This applies only to the original poster. Everyone else please begin a New Topic.
If I have helped you then please consider donating so I can continue the fight against malware Posted Image
All donations go directly to the helper

Posted Image

Due to the large amount of backlogs we have I cannot respond to PMs for help unless I am already working with you




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users