Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Web Browser keeps getting redirected


  • This topic is locked This topic is locked
10 replies to this topic

#1 StrummingLevi

StrummingLevi

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:01:46 PM

Posted 25 November 2009 - 04:22 PM

I keep getting redirected to random sites when I click on links. I am using Mozilla Firefox as a browser. I followed the instructions on this discussion because I felt like it best described my problems.

Rootkit Repeal Log
ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/11/25 12:41
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA9FC2000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B38000 Size: 8192 File Visible: No Signed: -
Status: -

Name: mchInjDrv.sys
Image Path: C:\WINDOWS\system32\Drivers\mchInjDrv.sys
Address: 0xF7C3E000 Size: 2560 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA8A72000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\Temp\1fcaded7-0135-4450-a1f3-9d6c4eabb69e.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\7d0ff8d1-3c04-44ad-a803-be1620bfdff6.tmp
Status: Invisible to the Windows API!

Path: c:\program files\updates from hp\309731\users\default\data\inuse.txt
Status: Allocation size mismatch (API: 48, Raw: 32)

Path: C:\Documents and Settings\HP_Owner\Application Data\Mozilla\Firefox\Profiles\x92p08xs.default\144BA8E3d01
Status: Locked to the Windows API!

Path: c:\documents and settings\hp_owner\local settings\application data\mozilla\firefox\profiles\x92p08xs.default\cache\_cache_map_
Status: Allocation size mismatch (API: 280, Raw: 0)

SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "<unknown>" at address 0x869ddcc0

#: 013 Function Name: NtAlertThread
Status: Hooked by "<unknown>" at address 0x86821250

#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "<unknown>" at address 0x86a3f680

#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x868c0160

#: 041 Function Name: NtCreateKey
Status: Hooked by "PCTCore.sys" at address 0xf7410d72

#: 043 Function Name: NtCreateMutant
Status: Hooked by "<unknown>" at address 0x865aaa30

#: 047 Function Name: NtCreateProcess
Status: Hooked by "PCTCore.sys" at address 0xf73f19a6

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "PCTCore.sys" at address 0xf73f1b98

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0x8682ac78

#: 063 Function Name: NtDeleteKey
Status: Hooked by "PCTCore.sys" at address 0xf7411568

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "PCTCore.sys" at address 0xf7411820

#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "<unknown>" at address 0x86a2fc70

#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "<unknown>" at address 0x868a7e98

#: 091 Function Name: NtImpersonateThread
Status: Hooked by "<unknown>" at address 0x867cd338

#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "<unknown>" at address 0x8682b4e8

#: 114 Function Name: NtOpenEvent
Status: Hooked by "<unknown>" at address 0x869ea148

#: 119 Function Name: NtOpenKey
Status: Hooked by "PCTCore.sys" at address 0xf740fa80

#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "<unknown>" at address 0x867e2248

#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "<unknown>" at address 0x867de5e8

#: 192 Function Name: NtRenameKey
Status: Hooked by "PCTCore.sys" at address 0xf7411c8a

#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x8689d238

#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x863b22e0

#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "<unknown>" at address 0x869fba68

#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x865b12a8

#: 247 Function Name: NtSetValueKey
Status: Hooked by "PCTCore.sys" at address 0xf7411036

#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x869fb278

#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x867efe98

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "PCTCore.sys" at address 0xf73f1656

#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x867fde98

#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "<unknown>" at address 0x86811a30

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x86b8f660

==EOF==


Win32Diag Log
Volume in drive C is HP_PAVILION
Volume Serial Number is EC1F-592D

Directory of C:\WINDOWS\$hf_mig$\KB968389\SP2QFE

02/06/2009 10:46 AM 408,064 netlogon.dll
1 File(s) 408,064 bytes

Directory of C:\WINDOWS\$hf_mig$\KB975467\SP2QFE

02/06/2009 10:46 AM 408,064 netlogon.dll
1 File(s) 408,064 bytes

Directory of C:\WINDOWS\system32

08/03/2004 08:00 PM 180,224 scecli.dll

Directory of C:\WINDOWS\system32

08/03/2004 08:00 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\system32

08/03/2004 08:00 PM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Directory of C:\WINDOWS\system32\dllcache

08/03/2004 08:00 PM 180,224 scecli.dll

Directory of C:\WINDOWS\system32\dllcache

08/03/2004 08:00 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\system32\dllcache

08/03/2004 08:00 PM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Total Files Listed:
8 File(s) 2,102,272 bytes
0 Dir(s) 24,375,459,840 bytes free


I attached both the Attach and DDS logs in a zip file as previously instructed

Thanks for any help

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 30 November 2009 - 08:31 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#3 StrummingLevi

StrummingLevi
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:01:46 PM

Posted 01 December 2009 - 09:08 PM

StrummingLevi reporting for duty and ready for orders (Saluting)

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 02 December 2009 - 08:29 AM

At ease, soldier. :(

There's nothing showing in the logs which makes me think that we're dealing with a rootkit which is evading RootRepeal.


Please run Combofix, which can detect these infected system files. Make sure you do install the recovery console

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop but rename it Combo-Fix.exe
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combo-Fix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#5 StrummingLevi

StrummingLevi
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:California
  • Local time:01:46 PM

Posted 03 December 2009 - 12:55 AM

I did everything you said. The program ran, restarted the computer and ran, and then restarted again. After the last restart one of the blue error screens showed up. I turned the computer off and went to work. When I got back I turned it on and it booted up perfectly. Here is a copy of the ComboFix.txt


ComboFix 09-12-02.05 - HP_Owner 12/02/2009 15:30:35.1.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1015.419 [GMT -8:00]
Running from: C:\Documents and Settings\HP_Owner\Desktop\Combo-Fix.exe.exe
AV: Norton Security Online *On-access scanning disabled* (Outdated) {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton Security Online *disabled* {7C21A4C9-F61F-4AC4-B722-A6E19C16F220}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Documents and Settings\HP_Owner\Application Data\Desktopicon
C:\LOG.TXT
C:\Program Files\\uninstaller.exe
C:\Program Files\MorpheusBar\bar\1.bin\M0PLUGIN.DLL
C:\Program Files\MorpheusBar\bar\1.bin\M0POPSWT.DLL
C:\Program Files\MorpheusBar\bar\1.bin\NPMORPBR.DLL
C:\RECYCLER\S-1-5-21-3226460740-3585114723-1574626625-1003
C:\smp.bat
C:\WINDOWS\Fonts\acrsec.fon
C:\WINDOWS\MailSwitch.ocx
C:\WINDOWS\patch.exe
C:\WINDOWS\system32\cache329
C:\WINDOWS\system32\cache329\B_329_0_0_106800.htm
C:\WINDOWS\system32\cache329\B_329_0_0_107400.htm
C:\WINDOWS\system32\cache329\B_329_1_0_449200.gif
C:\WINDOWS\system32\cache329\B_329_1_0_449600.gif
C:\WINDOWS\system32\cache329\B_329_1_0_454300.gif
C:\WINDOWS\system32\cache329\B_329_2_0_105300.htm
C:\WINDOWS\system32\cache329\B_329_2_0_106800.htm
C:\WINDOWS\system32\cache329\B_329_2_0_107400.htm
C:\WINDOWS\system32\cache329\B_329_3_0_106800.htm
C:\WINDOWS\system32\cache329\B_329_3_0_107400.htm
C:\WINDOWS\system32\cache329\B_329_4_0_111600.htm
C:\WINDOWS\system32\cache329\B_329_4_0_152400.htm
C:\WINDOWS\system32\cache329\B_329_4_0_155300.htm
C:\WINDOWS\system32\cache329\B_329_4_0_164100.htm
C:\WINDOWS\system32\cache329\t_B_329_0_0_106800.htm
C:\WINDOWS\system32\cache329\t_B_329_0_0_107400.htm
C:\WINDOWS\system32\cache329\t_B_329_2_0_105300.htm
C:\WINDOWS\system32\cache329\t_B_329_2_0_106800.htm
C:\WINDOWS\system32\cache329\t_B_329_2_0_107400.htm
C:\WINDOWS\system32\cache329\t_B_329_3_0_106800.htm
C:\WINDOWS\system32\cache329\t_B_329_3_0_107400.htm
C:\WINDOWS\system32\cache329\t_B_329_4_0_111600.htm
C:\WINDOWS\system32\cache329\t_B_329_4_0_152400.htm
C:\WINDOWS\system32\cache329\t_B_329_4_0_155300.htm
C:\WINDOWS\system32\cache329\t_B_329_4_0_164100.htm
C:\WINDOWS\system32\ps2.bat
C:\WINDOWS\system32\rtutv.bak2
C:\WINDOWS\system32\rtutv.ini
C:\WINDOWS\system32\tdlcmd.dll
C:\WINDOWS\system32\ttutv.bak2
C:\WINDOWS\system32\ttutv.ini
C:\WINDOWS\viassary-hp.reg
D:\Autorun.inf

Infected copy of C:\WINDOWS\system32\DRIVERS\atapi.sys was found and disinfected
Restored copy from - Kitty ate it :(
.
((((((((((((((((((((((((( Files Created from 2009-11-02 to 2009-12-02 )))))))))))))))))))))))))))))))
.

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 05 December 2009 - 05:06 AM

The log stopped. Please rerun Combofix and see if we can get a full log.


Then Please run MBAM

Please download Posted Image Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application or, if you are using Vista, right-click and select Run As Administrator on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Full Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.

Edited by m0le, 05 December 2009 - 05:07 AM.

Posted Image
m0le is a proud member of UNITE

#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 09 December 2009 - 07:41 PM

Hi,

I have not had a reply from you for 4 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 11 December 2009 - 05:09 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE

#9 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 17 December 2009 - 05:43 PM

Reopened at user's request

-------------------------------------------------------

See my second to last post for the instructions.
Posted Image
m0le is a proud member of UNITE

#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 22 December 2009 - 05:43 PM

Hi,

I reopened this five days ago and I have had no reply.

You have until 6pm Wednesday 23rd December (GMT) to reply or I will permanently close this topic.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#11 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:08:46 PM

Posted 23 December 2009 - 08:54 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. :(

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users