Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

New Variant of Webplains Redirect?


  • This topic is locked This topic is locked
4 replies to this topic

#1 Rick008

Rick008

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 02 October 2011 - 03:21 PM

I'm having a big time problem resolving this issue. It started about 3 weeks ago when all of a sudden my Google search result links were being automatically redirected to a different page through webplains whenever I clicked one.

I did some some practices that I already knew such as clearing the browsers history cache everything, clearing the systems temp files location, resetting the router, and a couple of other things I can't remember at this time. It appeared to be fixed. I was so happy.

Two weeks later here we are now. Back with the same problem. I can remove it somehow, but it always comes back whenever I seem to restart the computer. The way I removed it the first time around doesn't seem to work at all anymore. What seems to temporarily fix it is using Spybot-SD in which case it will find a Microsoft security firewall bypass or disabler in the registry, and thus removing it.

Here are the Spybot-SD logs:
--- Report generated: 2011-10-01 23:44 ---

Microsoft.WindowsSecurityCenter.FirewallBypass: [SBI $D80580B5] Settings (Registry value, fixed)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\H:\WINDOWS\explorer.exe

Microsoft.WindowsSecurityCenter.FirewallBypass: [SBI $B067B5B7] Settings (Registry value, fixed)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\H:\WINDOWS\explorer.exe

Microsoft.WindowsSecurityCenter_disabled: [SBI $2E20C9A9] Settings (Registry change, fixed)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc\Start
---------------------------------------------------------------------------------------------------
--- Report generated: 2011-10-02 12:12 ---

Microsoft.WindowsSecurityCenter_disabled: [SBI $2E20C9A9] Settings (Registry change, fixed)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc\Start


Furthermore I just got done with a online scan by F-Secure and it found this and cleaned it:

Trojan-Downloader:Java/Agent.DTCZ (virus)

H:\DOCUMENTS AND SETTINGS\FRANK\APPLICATION DATA\SUN\JAVA\DEPLOYMENT\CACHE\6.0\62\2BC3143E-3B5AD765 (Renamed & Submitted)


Here's a list of programs that haven't yielded any results:
TDSSKILLER
SUPERANTISPYWARE
HITMANPRO
ANTIZEROACCESS
MALWAREBYTES


I feel I'm going to need all the help I can get on this. This is by far the most tricky infection I've come across.

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,845 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:04:00 AM

Posted 02 October 2011 - 11:16 PM

Hello,

Please follow the instructions in ==>This Guide<== starting at step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then post them in a reply to this topic by using the Add Reply button.

If you can produce at least some of the logs, then please create the post and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the reply and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Please note that I am not a member of the Malware Removal Team and will not be assisting you in removing the infection. I'm simply helping you to post the information they need in order to assist you.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 Rick008

Rick008
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 03 October 2011 - 03:14 PM

Thanks, Orange Blossom!

I tried running DDS earlier and it literally stays on for hours. Not really frozen, just completely unclosable. Even in task manager via process selection or application selection. I also have to force boot my computer to turn it off as selecting shutdown will turn off everything else but that program and it doesn't ever come up with a window to terminate it thus halting the shutdown indefinitely. It happens every time I run it. It was downloaded to the desktop and the whole nine yards. When I try to minimize it it pops back up every single time. MBR.DAT shows up in my process list when it is running as well. One thing that's even weirder is while I can turn off DDS.SCR in the process section of task manager I can't turn off MBR.DAT and it still stays open with the DDS window. So, obviously I have no log for it.

I also noticed one other thing that strikes me as a bit odd, I have 2 rundll32.exe's in my process manager and have never had this happen before.

My ESET NOD32 Antivirus won't even update anymore. It comes backs with the error "error creating temporary file" it downloads the update half way and then the percentage drops to 0% and continues until the visual data number is achieved in which case it returns the error. This antivirus hasn't detected a single thing and its last update was 08/30/11.

GMER scan was successful. Here is the log:

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-10-03 13:11:42
Windows 5.1.2600 Service Pack 2
Running: gmer.exe; Driver: H:\DOCUME~1\Frank\LOCALS~1\Temp\ugtdqpoc.sys


---- System - GMER 1.0.15 ----

SSDT \??\H:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS (SASKUTIL.SYS/SUPERAdBlocker.com and SUPERAntiSpyware.com) ZwTerminateProcess [0xAD203640]

---- Kernel code sections - GMER 1.0.15 ----

.text H:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xAF4FC380, 0x566445, 0xE8000020]
? H:\DOCUME~1\Frank\LOCALS~1\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text H:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe[952] kernel32.dll!SetUnhandledExceptionFilter 7C8447ED 4 Bytes [C2, 04, 00, 00]
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] ntdll.dll!LdrLoadDll 7C915CBB 5 Bytes JMP 0121FAE0 H:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!DrawTextW 7E41D7C2 5 Bytes JMP 0C44CFED
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!DrawTextExW 7E41DD7F 5 Bytes JMP 0C44D1AF
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!DialogBoxParamW 7E42555F 5 Bytes JMP 0C44C0A2
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!SetClipboardData 7E430F5E 5 Bytes JMP 0C44CC63
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!DrawTextA 7E43C6CA 5 Bytes JMP 0C44CF12
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] USER32.dll!DrawTextExA 7E43C701 5 Bytes JMP 0C44D0C8
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!TextOutW 77F17EAC 5 Bytes JMP 0C44CE46
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!ExtTextOutW 77F18086 5 Bytes JMP 0C44D37A
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!TextOutA 77F1BC14 5 Bytes JMP 0C44CD7A
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!ExtTextOutA 77F1D45A 5 Bytes JMP 0C44D296
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!GetGlyphIndicesA 77F3DB23 5 Bytes JMP 0C44D73A
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] GDI32.dll!GetGlyphIndicesW 77F51D6E 5 Bytes JMP 0C44D807
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!getaddrinfo 71AB2A6F 5 Bytes JMP 0C44BBFA
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!send 71AB428A 5 Bytes JMP 0C44C731
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!WSARecv 71AB4318 5 Bytes JMP 0C44C958
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!gethostbyname 71AB4FD4 5 Bytes JMP 0C44BB39
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!recv 71AB615A 5 Bytes JMP 0C44C7D6
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!WSASend 71AB6233 5 Bytes JMP 0C44C884
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!closesocket 71AB9639 5 Bytes JMP 0C44CBBC
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WS2_32.dll!WSAAsyncGetHostByName 71ABE985 5 Bytes JMP 0C44BFC3
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WININET.dll!InternetCrackUrlA 771C7519 5 Bytes JMP 0C44DACD
.text H:\Program Files\Mozilla Firefox\firefox.exe[2964] WININET.dll!InternetCrackUrlW 771F920C 5 Bytes JMP 0C44DC16
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!DrawTextW 7E41D7C2 5 Bytes JMP 00A7CFED
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!DrawTextExW 7E41DD7F 5 Bytes JMP 00A7D1AF
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!DialogBoxParamW 7E42555F 5 Bytes JMP 00A7C0A2
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!SetClipboardData 7E430F5E 5 Bytes JMP 00A7CC63
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!DrawTextA 7E43C6CA 5 Bytes JMP 00A7CF12
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] USER32.dll!DrawTextExA 7E43C701 5 Bytes JMP 00A7D0C8
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!TextOutW 77F17EAC 5 Bytes JMP 00A7CE46
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!ExtTextOutW 77F18086 5 Bytes JMP 00A7D37A
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!TextOutA 77F1BC14 5 Bytes JMP 00A7CD7A
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!ExtTextOutA 77F1D45A 5 Bytes JMP 00A7D296
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!GetGlyphIndicesA 77F3DB23 5 Bytes JMP 00A7D73A
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] GDI32.dll!GetGlyphIndicesW 77F51D6E 5 Bytes JMP 00A7D807
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!getaddrinfo 71AB2A6F 5 Bytes JMP 00A7BBFA
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!send 71AB428A 5 Bytes JMP 00A7C731
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!WSARecv 71AB4318 5 Bytes JMP 00A7C958
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!gethostbyname 71AB4FD4 5 Bytes JMP 00A7BB39
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!recv 71AB615A 5 Bytes JMP 00A7C7D6
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!WSASend 71AB6233 5 Bytes JMP 00A7C884
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!closesocket 71AB9639 5 Bytes JMP 00A7CBBC
.text H:\Program Files\Internet Explorer\iexplore.exe[3888] WS2_32.dll!WSAAsyncGetHostByName 71ABE985 5 Bytes JMP 00A7BFC3

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs eamon.sys (Amon monitor/ESET)

---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk1\DR4 MBR read error
Disk \Device\Harddisk1\DR4 MBR BIOS signature not found 0

---- EOF - GMER 1.0.15 ----

Attached Files

  • Attached File  ark.txt   8.31KB   0 downloads

Edited by Rick008, 03 October 2011 - 11:47 PM.


#4 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:00 AM

Posted 07 October 2011 - 03:25 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/421600 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice


Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#5 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:00 AM

Posted 12 October 2011 - 03:30 PM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users