Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Spyware and viruses not removed on reboot


  • Please log in to reply
19 replies to this topic

#1 Rafinad

Rafinad

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 11:40 AM

Hello friends,

I ran Malwarebytes and it found several trojans and spyware and marked them
for removal on reboot. yet it does not happening for some reason.
I run MB again and the same bad stuff is still there.
The log file is attached.
How to get rid of it?


Thanks .
R.

Attached Files



BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 11:59 AM

Hi, moving this from XP to the Am I Infected forum as it's a malware issue.

First let me ask did you check that all the boxes were checked and click the remove selected button before rebot?

Let's do this anyway.

RERUN MBAM

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 12:27 PM

Hi boopme

I did what you suggested.

MB ver. 1702 69005 entries

It found 12 infections (it were 11 before)

Now I do not see how to attach a log file.


Thanks.
R.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 12:31 PM

Open MNAM.. along the tabs...
The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply

Edited by boopme, 28 January 2009 - 12:32 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 12:41 PM

Hi


Malwarebytes' Anti-Malware 1.33
Database version: 1702
Windows 5.1.2600

1/28/2009 12:08:58 PM
mbam-log-2009-01-28 (12-08-58).txt

Scan type: Quick Scan
Objects scanned: 47674
Time elapsed: 3 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 5
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\winbh72 (Rootkit.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\winbh72 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\winbh72 (Rootkit.Agent) -> Delete on reboot.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> Delete on reboot.
C:\WINDOWS\System32\drivers\Winbh72.sys (Rootkit.Agent) -> Delete on reboot.



here now are the results of scan after reboot i did not run remove


Malwarebytes' Anti-Malware 1.33
Database version: 1702
Windows 5.1.2600

1/28/2009 12:37:30 PM
mbam-log-2009-01-28 (12-37-23).txt

Scan type: Quick Scan
Objects scanned: 47899
Time elapsed: 4 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 5
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> No action taken.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\winbh72 (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\winbh72 (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\winbh72 (Rootkit.Agent) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> No action taken.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> No action taken.
C:\WINDOWS\System32\drivers\Winbh72.sys (Rootkit.Agent) -> No action taken.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 01:10 PM

after reboot i did not run remove

Meaning you did not click Remove selected?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 01:12 PM

yes

Just to show that they are still there.

Thanks.
R.

Edited by Rafinad, 28 January 2009 - 01:12 PM.


#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 01:33 PM

But if you do not click it, it will not remove them,,or am I moissing something.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 01:44 PM

Hi


I do click Remove selected the first time I run MB. Then I reboot and the infections should be gone.

After reboot I ran MB again and before Remove step I save the log just to show that the infections are

still present. Reboot did not remove them. Otherwise how would I know if infections are gone or are still there?

I have to run MB again, do I not?


Do I have to use IE after reboot? I use Mozilla as browser.


Thanks.
R.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 02:10 PM

Ok i just needed to be clear. IE is not necessary.
Let's run two diiferent apps next to see what we get.


From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opers browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.

Now Part 1 of S!Ri's SmitfraudFix
Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm


Ok i just needed to be clear. IE is not necessary.
Let's run two diiferent apps next to see what we get.


From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opers browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.

Now Part 1 of S!Ri's SmitfraudFix
Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 28 January 2009 - 05:43 PM

Hi boopme


sorry for delay, i had to do smth away from PC

(at boot a window opened "ViewMgr encountered a problem and needed to close. ")

here are the logs


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/28/2009 at 03:30 PM

Application Version : 4.25.1012

Core Rules Database Version : 3733
Trace Rules Database Version: 1702

Scan type : Complete Scan
Total Scan Time : 00:47:04

Memory items scanned : 216
Memory threats detected : 1
Registry items scanned : 4749
Registry threats detected : 17
File items scanned : 45408
File threats detected : 2

Trojan.Unclassified/Dropper-WinNT32
C:\WINDOWS\SYSTEM32\WINCTRL32.DLL
C:\WINDOWS\SYSTEM32\WINCTRL32.DLL
Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32

Rootkit.RunTime3/WinCtrl32
HKLM\System\ControlSet001\Services\Winbh72
C:\WINDOWS\SYSTEM32\DRIVERS\WINBH72.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_Winbh72
HKLM\System\CurrentControlSet\Services\Winbh72
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_Winbh72

Trojan.DNSChanger-Codec
HKU\S-1-5-21-507921405-1788223648-682003330-1003\Software\uninstall

Rogue.AntiSpywareExpert
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32#DLLName
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32#StartShell
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32#Impersonate
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WinLogon\Notify\WinCtrl32#Asynchronous

Rogue.Component/Trace
HKLM\Software\Microsoft\B7B816E1
HKLM\Software\Microsoft\B7B816E1#b7b816e1
HKLM\Software\Microsoft\B7B816E1#Version
HKLM\Software\Microsoft\B7B816E1#b7b8bb61
HKLM\Software\Microsoft\B7B816E1#b7b8d284

Trojan.Fake-Alert/Trace
HKU\S-1-5-21-507921405-1788223648-682003330-1003\SOFTWARE\Microsoft\fias4013






===================



SmitFraudFix v2.392

Scan done at 17:31:37.79, Wed 01/28/2009
Run from C:\Documents and Settings\Me\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is FAT32
Fix run in normal mode

Process

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Verizon\Verizon Internet Security Suite\rps.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
C:\Program Files\Spyware Terminator\sp_rsser.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Verizon\VSP\VerizonServicepointComHandler.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\WINDOWS\SYSTEM32\osk.exe
C:\WINDOWS\SYSTEM32\MSSWCHX.EXE
C:\WINDOWS\System32\dwwin.exe
C:\WINDOWS\System32\devldr32.exe
C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\WINDOWS\System32\cmd.exe

hosts


C:\


C:\WINDOWS


C:\WINDOWS\system


C:\WINDOWS\Web


C:\WINDOWS\system32

C:\WINDOWS\system32\migicons.exe FOUND !

C:\Documents and Settings\Me


C:\DOCUME~1\Me\LOCALS~1\Temp


C:\Documents and Settings\Me\Application Data


Start Menu


C:\DOCUME~1\ME\FAVORI~1


Desktop


C:\Program Files

C:\Program Files\Google\googletoolbar1.dll FOUND !

Corrupted keys


Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
"Source"="About:Home"
"SubscribedURL"="About:Home"
"FriendlyName"="My Current Home Page"


o4Patch
!!!Attention, following keys are not inevitably infected!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix
!!!Attention, following keys are not inevitably infected!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"="karna.dat"


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\WINDOWS\\system32\\userinit.exe,"
"System"=""


RK



DNS

Description: HP EN1207D-TX PCI 10/100 Fast Ethernet Adapter - Radialpoint Miniport (x86)
DNS Server Search Order: 192.168.1.1
DNS Server Search Order: 192.168.1.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=24.29.103.15 24.29.103.16
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=24.29.103.15 24.29.103.16


Scanning for wininet.dll infection


End






Thank you.
R.

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 28 January 2009 - 09:10 PM

Hi, we need to run S!Ri's SmitfraudFix part 2 ,cleaning.

You should print out these instructions, or copy them to a Notepad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, double-click SmitfraudFix.exe
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart anyway into normal Windows. A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
The report can also be found at the root of the system drive, usually at C:\rapport.txt


NOW RERUN MBAM

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot.

ViewMgr
This program is not required to start automatically as you can run it when you need to. It is advised that you disable this program so that it does not take up necessary resources.
Bleeping Computer Startup List
To Remove
Go to Control Panel, Add/Remove Programs, select it and hit Remove. It seems that the uninstall is less than complete, however, and you'll probably still need to go looking for the files - search for viewmgr.exe and delete it. (If you can't delete it, you may need to fire up Task Manager and end the task first: right click on the clock in your task bar, click on Task Manager, locate viewmgr.exe in the Processes tab, right click on it and select End Process. Now you should be able to delete the file.)
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 29 January 2009 - 09:37 AM

morning boopme


I did according to your instructions

here are the logs


SmitFraudFix v2.392

Scan done at 8:54:16.07, Thu 01/29/2009
Run from C:\Documents and Settings\Me\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is FAT32
Fix run in safe mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

Killing process


hosts


127.0.0.1 localhost

VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


Generic Renos Fix

GenericRenosFix by S!Ri


Deleting infected files

C:\WINDOWS\system32\migicons.exe Deleted
C:\Program Files\Google\googletoolbar1.dll Deleted

IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


RK


DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{2A31A20A-C4AE-41F0-96F3-AFA25865928C}: DhcpNameServer=24.29.103.15 24.29.103.16
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.1 192.168.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=24.29.103.15 24.29.103.16


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


End





=============================================================



Malwarebytes' Anti-Malware 1.33
Database version: 1705
Windows 5.1.2600

1/29/2009 9:12:04 AM
mbam-log-2009-01-29 (09-12-04).txt

Scan type: Quick Scan
Objects scanned: 47773
Time elapsed: 4 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 2
Registry Values Infected: 4
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2912717c-5546-44f9-abe0-d95b2671d129} (Spyware.BZub) -> Delete on reboot.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bf (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\bk (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\iu (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Settings\mu (Trojan.Agent) -> Delete on reboot.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\SYSTEM32\urlmo.dll (Spyware.BZub) -> Delete on reboot.


============================================================



I edit this post because i realised that there were some messages from Smitfraudfix
not in the log:

can not open windows\system32\drivers\beep.sys

deleting temp files
access denied
Documents..\me\Locals\temp\ioikcldm.dat

This .dat file was accessed on Monday 26 when this virus problem started I think.



I ran MBAM again after reboot and unfortunately the bad stuff is still there.
But now it is only 7, when before it were 12 entries.
3 are somewhere in system32 and 4 are in the last part of the scan
I also noticed that the scan runs not as smooth as before, the display of the filenames
freezes from time to time.

We make some progress, it seems that this bunch of viruses is tough.

Are there more tricks to try?


I did not do anything about Viewmgr yet, it did not pop-up this time.

One more thing: the Desktop background changed from green hills to plane blue.





I appreciate all the help you provide.

R.

Edited by Rafinad, 29 January 2009 - 10:15 AM.


#14 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,339 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:03 AM

Posted 29 January 2009 - 11:13 AM

You may need to run a reboot with MBAm a few more times to finish this. Sometomes it has to go back and get the next. Run 1 Full scan and then a quick scan.

Edited by boopme, 29 January 2009 - 11:15 AM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#15 Rafinad

Rafinad
  • Topic Starter

  • Members
  • 40 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 29 January 2009 - 02:20 PM

Hi again


I tried several times to run MBAM and reboot

The virus is still there. It seems as if reboot maybe kills these entries but then later they are

recreated again by some program that runs later in the reboot sequence.


I googled the BZub and there is a lot of info but then how to know which is reliable?


This virus entrenched in my system really deep.

What is my next angle of action?


Thanks,
R.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users