Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Cannot Navigate Far In Ie To Access Bleepcomp Instructions To Fix Malware Problems


  • This topic is locked This topic is locked
13 replies to this topic

#1 wxwindmill

wxwindmill

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 24 May 2008 - 09:36 PM

XP home ed. Internet Explorer.
My computer is infected with Advanced XP Defender and tons of malware/trojans.
I would follow the instuctions/helps here at bleepingcomputer, but I can't go anywhere in IE.... can't go to bleepingcomputer fix instructions, malwarebytes, or really anywhere.

What do I need to do to IE to be able to navigate here to bleepingcomputer??
An example of what happens... I can get google up and get search results, but when I click a result link, the malware takes me elsewhere or nothing loads at all.
I emailed (cableISPemail) myself the malwarebytes mbam-setup.exe, but Outlook won't let me access it. I can't get it out of yahoo email either. I also can't get to my ISP webbased email to try getting the attachment that way.

edit: was reading other posts and realized I need to add that I have SP2 installed, my ISP is midcontinent communications, norton (but not updated), spydoctor, adaware gives error message on update

Edited by wxwindmill, 24 May 2008 - 09:42 PM.


BC AdBot (Login to Remove)

 


m

#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:35 PM

Posted 25 May 2008 - 07:38 AM

If you cannot get your Internet working properly, you are going to need access to another computer (family member, friend, etc) with an Internet connection. Download the programs I recommend and save them to a flash (usb, pen, thumb, jump) drive or CD. Then transfer these programs directly to the infected computer where you can use them and follow these directions.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Acan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 25 May 2008 - 06:46 PM

Thanks for the help. I'm afraid I can't work on it until early June, but I will get the programs on a CD for that time.

#4 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 04 June 2008 - 01:38 AM

Back and ran the program....

Malwarebytes' Anti-Malware 1.14

Database version: 820



1:02:06 AM 6/4/2008

mbam-log-6-4-2008 (01-02-06).txt



Scan type: Quick Scan

Objects scanned: 40402

Time elapsed: 6 minute(s), 22 second(s)



Memory Processes Infected: 1

Memory Modules Infected: 0

Registry Keys Infected: 20

Registry Values Infected: 8

Registry Data Items Infected: 2

Folders Infected: 18

Files Infected: 64



Memory Processes Infected:

C:\WINDOWS\SYSTEM32\xwusuhzh.exe (Trojan.Agent) -> Unloaded process successfully.



Memory Modules Infected:

(No malicious items detected)



Registry Keys Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9506910a-0f94-4ea1-b567-7070428b8b2b} (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{1e404d48-670a-4085-a6a0-d195793ddd33} (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Interface\{9f593aac-ca4c-4a41-a7ff-a00812192d61} (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\Typelib\{749ec66f-a838-4b38-b8e5-e65d905fff74} (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{1e404d48-670a-4085-a6a0-d195793ddd33} (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321e378-ffad-4999-8c62-03ca8155f0b3} (Trojan.BHO) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{c7bbc1fa-e415-4926-9a47-9ab58d0b3bc8} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c7bbc1fa-e415-4926-9a47-9ab58d0b3bc8} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{988f587e-fbf7-aa46-f1ff-2695f0c9b597} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{988f587e-fbf7-aa46-f1ff-2695f0c9b597} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CLASSES_ROOT\CLSID\{e0deb352-5bb6-21aa-f6cf-318b89f5aec7} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{e0deb352-5bb6-21aa-f6cf-318b89f5aec7} (Trojan.Agent) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mySearchAssistant (Adware.BHO) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.



Registry Values Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{c7bbc1fa-e415-4926-9a47-9ab58d0b3bc8} (Trojan.Vundo) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\General\BackupWallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\Wallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\OriginalWallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\ConvertedWallpaper (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Control Panel\Desktop\SCRNSAVE.EXE (Trojan.FakeAlert) -> Quarantined and deleted successfully.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BMef8cd82b (Trojan.Agent) -> Quarantined and deleted successfully.



Registry Data Items Infected:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Agent) -> Data: c:\windows\system32\xwusuhzh.exe -> Quarantined and deleted successfully.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.



Folders Infected:

C:\WINDOWS\SYSTEM32\polX (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\GUI2 (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\binR (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\3036a (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\BrowserObjects (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Packages (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\HKCU (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\HKLM (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\StartMenuAllUsers (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\StartMenuCurrentUser (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\HKCU\RunOnce (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\AXPDefender\AXPDefender\Quarantine\Autorun\HKLM\RunOnce (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.



Files Infected:

C:\Program Files\AXPDefender\AXPDefender.exe (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\avblxtdc.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\blackster.scr (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\ehamaemk.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\fppugsdv.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\nlhvgdfw.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\qoinngyn.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\sbuslsiv.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\wgofymqy.exe (Trojan.LowZones) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\DRIVERS\raspptpp.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.ttA4.tmp (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\nsc6.tmp\Dialer.dll (Adware.SoftMate) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\nsc6.tmp\InetLoad.dll (Adware.SoftMate) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\polX\roEbdll2.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\GUI2\FI-dt4x.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\AXPDefender.exe.local (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\AXPDefenderSkin.dll (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\database.dat (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\license.txt (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\MFC71.dll (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\MFC71ENU.DLL (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\msvcp71.dll (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Program Files\AXPDefender\msvcr71.dll (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender\Advanced XP Defender.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender\How to register.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender\License Agreement.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender\Register.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender\Uninstall.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\WINDOWS\explore.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\iexplorer.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\x.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\y.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\xxxvideo.hta (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\default.htm (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\svchost32.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\loader.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\internet.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\gside.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\xwusuhzh.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\winpfz33.sys (Malware.Trace) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\{65944e3b-2de8-be4b-c13e-a4edb04f3f3e}.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\system32\cdosys.dll (Trojan.Agent) -> Delete on reboot.

C:\WINDOWS\SYSTEM32\bmjmsmtq.dll (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\000060.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\000090.exe (Trojan.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\DRIVERS\vmdesched.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\bwfanibk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\DRIVERS\core.cache.dsk (Malware.Trace) -> Quarantined and deleted successfully.

C:\Documents and Settings\All Users\Start Menu\Programs\Advanced XP Defender.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Application Data\Microsoft\Internet Explorer\Quick Launch\AXPDefender.lnk (Rogue.AdvancedXPDefender) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Start Menu\Programs\Startup\DW_Start.lnk (Trojan.Agent) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt3.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt5.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt6.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt7.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt8.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\.tt9.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.

C:\Documents and Settings\windmill\Local Settings\Temp\ismtpa16.exe (Adware.ISM) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\DRIVERS\ETC\Services.000 (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

C:\WINDOWS\SYSTEM32\DRIVERS\ETC\Services.001 (Heuristics.Reserved.Word.Exploit) -> Quarantined and deleted successfully.

#5 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 05 June 2008 - 07:05 PM

Bump (probably went to the back of the line for this but couldn't resist reporting good results so far). Malwarebyte's AntiMalware has fixed my inability to navigate in IE, returned the task manager ability, ridded the rogue 'advanced xp defender' upon startup, and fixed the cockroaches screensaver.
http://www.bleepingcomputer.com/forums/t/150249/cockroach-eating-away-screen/
These seem to be common problems for many recently. Are they all tied together in all/most cases? Is there a thread that summarizes well the steps to return to normal?? If so, I suggest a sticky.

I believe normal mode is still slow on my computer and I suspect it's not entirely clean, so I'll wait for suggestions for the next steps (instead of randomly trying things I see in the other threads such as Attribune's ATF Cleaner or SUPERAntiSpyware or SDfix or smitfraudfix etc). btw which of these does what?? what order?? I got the impression it doesn't pay to run smitfraudfix now that malwarebyte's has worked?? I guess I could sort all this out, but I don't think I want to spend too much time going thru all the threads, particularly when long log posts are interspersed. I sure do appreciate this source of computer help here at bleepingcomputer

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,270 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:35 PM

Posted 06 June 2008 - 12:14 AM

best to ask first as certain tools can make things worse.
Not sure if I missed it but is this an XP pc???
As the author puts it.

ATF-Cleaner.exe was once upon a time just my personal temp file cleaner. There became a need for a good temp file cleaner that could do the job safely and without removing files that are crucial to windows, so I decided I'd share it with the public.


Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Follow with SAS
Download and scan with SUPERAntiSpyware Free for Home Users
  • Double-click SUPERAntiSpyware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
  • Under "Configuration and Preferences", click the Preferences button.
  • Click the Scanning Control tab.
  • Under Scanner Options make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen.
  • Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan.
  • Click "Next" to start the scan. Please be patient while it scans your computer.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes".
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

We can also run the 1st part of S!Ri's SmitfraudFix ,safely as this part determines if a spcific family of malware is existing.
Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:35 PM

Posted 06 June 2008 - 06:51 AM

If you are not finding any more malware after following boopme's instructions and your computer still seems to be slow, read Slow Computer/Browser? Check here first; it may not be malware. There are reasons for slowness besides malware - i.e. disk fragmentation, disk errors, corrupt system files, too many startup programs, unnecessary services running, not enough RAM, dirty hardware components, etc. As your system gets older it becomes filled with more files/programs and has a natural tendency to slow down so cleaning and regular maintenance is essential.
Note: If you are not on a local area network (LAN), disable the Workstation Service which creates and maintains client network connections to remote servers and that should also help to speed up your boot time.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 dj_wonderdog

dj_wonderdog

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 06 June 2008 - 08:24 AM

I had the same exact problem as Windmill did and was instructed to download and use Malwarebytes software but I cannot. When I load the program off of the flashdrive I put it in my Downloads floder. But when I click on it to run or even right-click to run as admin, nothing happens. Ruby1 instructed me to run superantispyware (which I did and it deleted a bunch of stuff) and then run malwarebytes but it won't load.

(I am only posting in here b/c I have a similar problem and my thread has been closed.)

#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:35 PM

Posted 06 June 2008 - 09:03 AM

Your thread was closed because you posted a hijackthis log. After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 06 June 2008 - 12:02 PM

@dj - I had the same problem with one of the mbamsetup.exe not opening. The one I put on a CD the first time did not work. Then a friend put all 3 versions on a different CD and the first one I tried worked. I don't know from which site the one that worked came though. pm'd you this also in case you don't come back to this thread.

#11 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 06 June 2008 - 02:17 PM

I realized my computer since the malwarebyte run isn't really that slow -- either the malware or the fix disconnected part of hotsync with it's start program and also similar with a different program. Those alerts on my desktop made me paranoid. Things seem to be working normally now. That being said, I'm glad I run the SUPERantispyware etc as I believe you'll see below.

Now I know why there are multiple 'vundo' threads in this forum -- guess I start going thru them to familiarize myself with the situation. The SUPERAntiSpyware results look similar to the Spyware Doctor (pctools) scans. The similar trojans etc (but not all named the same) reappeared with every Spyware Doctor scan. I have since uninstalled Spyware Doctor and got my money back (uninstalled this morning before I started bleepingcomputer instructions).

I'm CRINGING at the rootkit entries below -- I've been thru a thread or two on that topic so will be a little familiar with that situation if it's confirmed I indeed have rootkit(s).


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/06/2008 at 01:37 PM

Application Version : 4.15.1000

Core Rules Database Version : 3476
Trace Rules Database Version: 1467

Scan type : Complete Scan
Total Scan Time : 01:15:57

Memory items scanned : 271
Memory threats detected : 0
Registry items scanned : 4744
Registry threats detected : 10
File items scanned : 59975
File threats detected : 113

Parasite.CoolWebSearch Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00110011-4b0b-44d5-9718-90c88817369b}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1f48aa48-c53a-4e21-85e7-ac7cc6b5ffb1}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{587dbf2d-9145-4c9e-92c2-1f953da73773}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{98dbbf16-ca43-4c33-be80-99e6694468a4}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3eebbe8-9cab-4c76-b26a-747e25ebb4c6}
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fd9bc004-8331-4457-b830-4759ff704c22}
C:\WINDOWS\OLEHELP.EXE

HTMLCore Module BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{086ae192-23a6-48d6-96ec-715f53797e85}

CoolWebSearch Parasite Variant
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{467faeb2-5f5b-4c81-bae0-2a4752ca7f4e}

Browser Hijacker.Tubby
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{cf021f40-3e14-23a5-cba2-717765721306}

ClientMan BHO
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fcaddc14-bd46-408a-9842-cdbe1c6d37eb}

Adware.ClickSpring
C:\Program Files\Common Files\STEM32~1\SRVICE~1.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0075871.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0079885.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0079903.EXE

Trojan.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0074861.SYS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0075789.SYS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0075840.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0075870.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0076862.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0077873.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0077892.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0078883.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0078886.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0079898.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080888.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080931.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080971.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0081057.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0081068.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0081094.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0082091.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0082108.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0082262.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0082269.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0082290.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083289.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083343.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083351.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083363.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083390.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083431.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083433.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083434.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083435.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083436.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083437.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083438.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083464.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083468.SYS

Adware.Vundo Variant
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0075830.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0079884.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1845\A0079899.DLL
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080942.DLL

Adware.AdSponsor/ISM
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080913.EXE
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080914.EXE

Adware.Unknown Origin
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0080935.CFG

Rogue.AdvancedXPDefender
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083430.EXE

Rootkit.TNCore-Variant/A
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083439.SYS

Rootkit.TNCore-Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083441.EXE

Rogue.Multi-Dropper/Installer
C:\SYSTEM VOLUME INFORMATION\_RESTORE{11B4CBB0-31B0-483C-A4FE-D6E9E8C1A928}\RP1846\A0083462.EXE

Trojan.Fake-Drop/Gen
C:\WINDOWS\ACCESSS.EXE
C:\WINDOWS\AVPCC.DLL
C:\WINDOWS\CLRSSN.EXE
C:\WINDOWS\CPAN.DLL
C:\WINDOWS\CTFMON32.EXE
C:\WINDOWS\CTRLPAN.DLL
C:\WINDOWS\DIRECTX32.EXE
C:\WINDOWS\DNSRELAY.DLL
C:\WINDOWS\EDITPAD.EXE
C:\WINDOWS\EXPLORER32.EXE
C:\WINDOWS\FUNNIEST.EXE
C:\WINDOWS\FUNNY.EXE
C:\WINDOWS\GFMNAAA.DLL
C:\WINDOWS\HELPCVS.EXE
C:\WINDOWS\IEDLL.EXE
C:\WINDOWS\INETINF.EXE
C:\WINDOWS\MSCONFD.DLL
C:\WINDOWS\MSSPI.DLL
C:\WINDOWS\MSSYS.EXE
C:\WINDOWS\MSUPDATE.EXE
C:\WINDOWS\MSWSC10.DLL
C:\WINDOWS\MSWSC20.DLL
C:\WINDOWS\MTWIRL32.DLL
C:\WINDOWS\NOTEPAD32.EXE
C:\WINDOWS\QTTASKS.EXE
C:\WINDOWS\QUICKEN.EXE
C:\WINDOWS\RUNDLL16.EXE
C:\WINDOWS\SEARCHWORD.DLL
C:\WINDOWS\SISTEM.EXE
C:\WINDOWS\SVCINIT.EXE
C:\WINDOWS\TIME.EXE
C:\WINDOWS\USERS32.EXE
C:\WINDOWS\WAOL.EXE
C:\WINDOWS\WIN32E.EXE
C:\WINDOWS\WIN64.EXE
C:\WINDOWS\WINAJBM.DLL
C:\WINDOWS\WINDOW.EXE
C:\WINDOWS\WINMGNT.EXE
C:\WINDOWS\XPLUGIN.DLL

Trojan.Dropper/ASTCTL32
C:\WINDOWS\ASTCTL32.OCX

Trojan.CWS/VBE
C:\WINDOWS\RUNDLL32.VBE

Trojan.Downloader-Systeem
C:\WINDOWS\SYSTEEM.EXE

Trojan.Vundo-Variant/Small
C:\WINDOWS\SYSTEM32\AJCXUMKW.DLL
C:\WINDOWS\SYSTEM32\BEGRSAJE.DLL
C:\WINDOWS\SYSTEM32\CKFDNKOQ.DLL
C:\WINDOWS\SYSTEM32\GLASXCDU.DLL
C:\WINDOWS\SYSTEM32\GMRCEVUG.DLL
C:\WINDOWS\SYSTEM32\JSHYGEJR.DLL
C:\WINDOWS\SYSTEM32\MDQUCRVT.DLL
C:\WINDOWS\SYSTEM32\NGVFUAOO.DLL
C:\WINDOWS\SYSTEM32\NQDXGAVB.DLL
C:\WINDOWS\SYSTEM32\PMCYWABS.DLL
C:\WINDOWS\SYSTEM32\RAQRISRV.DLL
C:\WINDOWS\SYSTEM32\RUVGQVKD.DLL
C:\WINDOWS\SYSTEM32\SFNVAXQU.DLL
C:\WINDOWS\SYSTEM32\SPHNKUDV.DLL
C:\WINDOWS\SYSTEM32\WFCAQDAW.DLL
C:\WINDOWS\SYSTEM32\YNNJNEDF.DLL

Adware.Vundo Variant/Rel
C:\WINDOWS\SYSTEM32\MCRH.TMP

Adware.DeeWoo/ThinkAdz
C:\WINDOWS\SYSTEM32\RCNTKKDM.EXE

Adware.ClickSpring/Outerinfo
C:\WINDOWS\SYSTEM32\PPPATC~1\LOGONUI.EXE

Trojan.Downloader-SystemCritcial/Fake Alert
C:\WINDOWS\SYSTEMCRITICAL.EXE


SmitFraudFix v2.323

Scan done at 14:04:19.67, Fri 06/06/2008
Run from C:\Documents and Settings\windmill\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\ctfmon.exe
C:\PROGRA~1\NORTON~1\navapw32.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\PROGRA~1\MICROS~2\Office10\OUTLOOK.EXE
C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\cmd.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32


C:\WINDOWS\system32\LogFiles


C:\Documents and Settings\windmill


C:\Documents and Settings\windmill\Application Data


Start Menu


C:\DOCUME~1\windmill\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""


Rustock



DNS

Description: CNet PRO200WL PCI Fast Ethernet Adapter - Packet Scheduler Miniport
DNS Server Search Order: 24.220.0.10
DNS Server Search Order: 24.220.0.11

HKLM\SYSTEM\CCS\Services\Tcpip\..\{E590B804-3AB6-4EB2-8BDD-E4F6C692E6A8}: DhcpNameServer=24.220.0.10 24.220.0.11
HKLM\SYSTEM\CS1\Services\Tcpip\..\{E590B804-3AB6-4EB2-8BDD-E4F6C692E6A8}: DhcpNameServer=24.220.0.10 24.220.0.11
HKLM\SYSTEM\CS3\Services\Tcpip\..\{E590B804-3AB6-4EB2-8BDD-E4F6C692E6A8}: DhcpNameServer=24.220.0.10 24.220.0.11
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=24.220.0.10 24.220.0.11
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=24.220.0.10 24.220.0.11
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=24.220.0.10 24.220.0.11


Scanning for wininet.dll infection


End

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:35 PM

Posted 06 June 2008 - 09:43 PM

Yes, one or more of the identified infections (Rootkit-TnCore = core.cache.dsk) was related to a rootkit component.

Files related to this rootkit were found in RP***\A00*****.exe file(s) located in the System Volume Information Folder (SVI) which is a part of System Restore. This is the feature that allows you to set points in time to roll back your computer to a clean working state. The SVI folder is protected by permissions that only allow the system to have access and is hidden by default unless you have reconfigured Windows to show it.

System Restore will back up the good as well as the bad files so when malware is present on the system it gets included in any restore points as an A00***** file. The rootkit that was on your system may or may not have been removed. Hard to tell without further investigation.

Rootkits are very dangerous because they use advanced techniques (backdoors) as a means of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoor Trojans and rootkits as part of an exploit to gain unauthorized access to a computer and take control of it without your knowledge.

If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the rootkit was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the rootkit has been removed the computer is now secure. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read "When should I re-format? How should I reinstall?", "Help: I Got Hacked. Now What Do I Do?" and "Reformatting the computer or troubleshooting; which is best?".

Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. If you wish to proceed, please do the following.

Since your system was so heavily infected and we found evidence of this rootkit component, I recommend more thorough investigation by creating a hijackthis log.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log" and complete all the steps. There are instructions for downloading and running Deckard's System Scanner (DSS) which will create a hijackthis log for you, or automatically download and install the most current version of HijackThis if it's not already installed on your computer.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#13 wxwindmill

wxwindmill
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:09:35 PM

Posted 16 June 2008 - 01:12 PM

After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.


Sorry missed this part. Got great help from the HJT team.
http://www.bleepingcomputer.com/forums/ind...mp;#entry854652

Thanks again!!

#14 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,609 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:35 PM

Posted 16 June 2008 - 01:18 PM

You're welcome.

Since you are already getting assistance, I am closing this topic to avoid any confusion. The HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Thanks for your cooperation and good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users