Persistent Redirect Problem

Discussion in 'Malware Help (A Specialist Will Reply)' started by OzWizard, Dec 29, 2010.

  1. OzWizard

    OzWizard Private E-2

    After I clean-installed Win 7 Home Premium as 64 bit - repalcing 32 bit Vista on my HP Compaq Presario - I began noticing unusual redirection of IE to sites that had either "pagead2", google analytics" or epoclick" in their url's.

    The redirection can be initiated from any trusted site by either
    (a) clicking built-in links,
    (b) selecting random text on a page,
    (c) clicking in any blank space on a page.

    Chrome and Firefox (which I'd never used before) gave exactly the same symptoms.

    After doing all of your Vista cleaning procedures - see attached logs - the problem persists at the same level.

    I find that the redirection does not persist if I kill the rogue IE window and then CTRL-click on the link. However, CTRL-clicking in the first instance is ineffective.

    I look forward to your diagnosis and remedy.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )
     
  3. OzWizard

    OzWizard Private E-2

    Wow! That was quick. TDS Killer log attached. Nothing found
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I won't be back for a couple of hours, so I have glanced through your logs and found a DNS infection present. I'll post a fix for you and then review the logs more thoroughly to see if anything else remains.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    File::
    C:\Users\Pat\AppData\Roaming\GetValue.vbs
    C:\Users\Pat\AppData\Roaming\SetValue.bat
    Registry::
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset001\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset002\services\tcpip\parameters]
    "DhcpNameServer"=""
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let us know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  5. OzWizard

    OzWizard Private E-2

    Hi Kestrel,

    Good news. It seems as though the "IE redirect ghost" has been tamed. [Touch wood!]

    OBSERVATIONS:
    1. Combofix updated, then restarted and ran OK.
    2. One reboot during Combofix run. No problem.
    3. 5 "PEV.cfxxe has stopped working" notices (see attached screen clip); all "Closed".
    4. Possible problem: "MGlogs.zip" will not 'attach' to this message.

    UPDATE: I had copied MGlogs.zip to the desktop at the end of the previous cleanup run [so that all the attachments were in one place] so there was no MGlogs.zip in the c:\ directory and the one on the desktop would not attach.

    Resolution: I moved MGlogs.zip back to root directory and re-ran Getlogs.bat; Now zip file (from root directory) attaches OK.

    Thanks again. I'll certainly get back to you in a day or so to confirm whether the problem is definitely gone.
     

    Attached Files:

  6. OzWizard

    OzWizard Private E-2

    New avatar adopted as a result of your help. No more head-banging!!!
     
  7. OzWizard

    OzWizard Private E-2

    Uh oh! I spoke too soon. (back to previous avatar.)

    Redirection has started again. First, from 'selecting random text' on a page, then from a "google search" link for Climate Depot.

    PC Tools Spyware Doctor with Antivirus [ver 7.0.0.545] is picking up 'infections' but they seem to reappear almost immediately after being 'fixed' by PC Tools [see two attached screen snips, taken 14 minutes apart]. I'm not creating restore points with PC Tools at this point.

    Four more 'infections' are showing up on a scan I'm running now. I'll attach the results when its finished. [Done]
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Spyware Doctor is picking up on simple cookies however there is still a DNS infection present! If Spyware Doctor is just a trial then uninstall it.

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :reg
    [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset001\services\tcpip\parameters]
    "DhcpNameServer"=""
    [HKEY_LOCAL_MACHINE\system\controlset002\services\tcpip\parameters]
    "DhcpNameServer"=""
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  9. OzWizard

    OzWizard Private E-2

    Spyware Doctor was a "free trial". Now removed.
    OTM results and new MGLogs attached.

    11.5 hours to the New Year here in Australia. Hope we can start it off with a clean machine. But don't interrupt your own celebrations on my account. Have a good one.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No celebrations to interrupt. I'll be off to work at 6pm. Do you use a router? There is a little button on the bottom ( on most models ) to reset it to factory settings. Do that. You may then need to go back into it to set any special setting that you may have set up originally.

    DNS infection still there.

    Do this in safe mode first and then in normal mode.

    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  11. OzWizard

    OzWizard Private E-2

    Wireless router (Netgear) reset with paper-clip; re-established security settings OK.
    Your fixME.reg script ran successfully: I confirmed by regedit inspection that the three DhcpNameServer settings are "null".

    I'm curious; where do you see evidence of the DNS infection? I'm willing to learn.

    "Happy New Year" from Oz, anyway.
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I was seeing the below in your runkeys.log but fortunately NOT in your latest logs. :)

    Those IP addresses are from the Russian Federation. Not good!

    Now, considering they are no longer showing in the runkeys.log, explain to me how things are running. Still okay? (I will have to review your last set of logs properly when I return from work around 12.30am.)
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Oh, and wishing you all the very best for the new year too!
     
  14. OzWizard

    OzWizard Private E-2

    Fingers crossed! Seems good for the moment. If I get more redirects, I'll check those ControlSet Parameters and let you know.

    It's 3:15 am here. What time is it there?
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    17.20 UK time. Just make another reply to me later letting me know how it's running. Then your thread will come up for me as unread and I will go through the last set of logs in depth after work. But I think that was the only issue remaining.
     
  16. OzWizard

    OzWizard Private E-2

    "The Kestrel swooped; its prey was despatched with grace and precision."

    No redirects in two days seems to indicate SUCCESS. Thanks, again!!!

    Would you recommend any defences other than Windows Defender, MalwareBytes, Spybot and Avast?
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I would drop SpyBot and replace it with SUPERantispyware. Then the rest of what you mentioned is fine. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  18. OzWizard

    OzWizard Private E-2

    All done. Many thanks.
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're very welcome!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds