Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32.TDSS.rtk and MS.WindowsSecurityCtr disabled


  • Please log in to reply
1 reply to this topic

#1 ladydime2000

ladydime2000

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:21 AM

Posted 13 July 2010 - 10:59 AM

Hello, Iím finally back to tell you about the problems with my computer. I don't know how to back up logs etc., so here goes!

Briefly, the 2 threats are:


Microsoft.WindowsSecurityCenter_disabled: [SBI $2E20C9A9] Settings (Registry change
Win32.TDSS.rtk: [SBI $848E9B52] File (File, fixed)

C:\Documents and Settings\All Users\Application Data\pragmamfeklnmal.dll
Properties.size=0
Properties.md5=493D65902F8BF3B774E034C97A24D6E4

I just ran another Spybot check after I posted this, and another entry is in the rtk section. It is
[SBI $57574D18] File
C:WINDOWS/temp/PRAGMAaa89.tmp


Computer details as follows:

Microsoft Windows XP
Home Edition
Version 2
Service Pack 3

Manufactured and supported by Gateway
505GR
Intel ģ
Pentium 4 CPU 3.00 GHz
3.00 GHz. 0.99 GB of RAM

Recently Microsoft support helped me remove the threats listed below. The tool they provided was called VIPrescue, and it was an MS DOS program, which took about 3 Ĺ hours to complete.
  • Trojan:Win32/Tibs.JF
  • TrojanDropper:Win32/Udslee.gen!A
  • Exploit:Java/CVE-2008-5353.C
  • Trojan:WinNT/Udslee.gen!A
  • Trojan:Win32/FakeCog
  • Trojan:Java/Selace.M
  • Trojan:Win32/FakeCog
  • Trojan:Win32/FakeCog (donít know why the cleaning program used listed this twice)
  • Trojan:Win32/Alureon.gen!J
  • Exploit:Win32/Pdfjsc.EM
  • Trojan:WinNT/Udslew.gen!A
  • TrojanDownloader:JS/Renos
Also, after researching the symptoms, I discovered and deleted something called Defense Center from the registry keys, which I had hoped would solve the last problems.

After the VIPrescue tool removed all these, with the exception of the Defense Center registry key, my computer runs a lot better. However, there are a few remnants of something. Spybot keeps finding threats, says it has fixed the problems, but they come right back with the next scan.

The threats it lists are:
Microsoft.WindowsSecurityCenter_disabled: [SBI $2E20C9A9] Settings (Registry change
HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet\Services\wscsvc\Start
[is not] W=2
And
Win32.TDSS.rtk: [SBI $848E9B52] File (File, fixed)
C:\Documents and Settings\All Users\Application Data\pragmamfeklnmal.dll
Properties.size=0
Properties.md5=493D65902F8BF3B774E034C97A24D6E4

I have two applications to help with threats. They are Spybot Search and Destroy and Microsoft Security Essentials. Would they possibly conflict with each other to disable the Security center thereby alerting Spybot to list it as a threat, or is it connected to a virus?

I read more about the Win32.TDSS.rtk, I found a thread on bleeping computer that talked about registry keys to look for that may actually give the virus(es) capability to update. Even though it didnít seem to cause any problems when I deleted the Defense Center registry key, I decided to not mess any more with the registry keys since I am a novice. On the thread though, it listed a whole bunch of keys to look for, which are listed below and I have not removed these.

HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
DisableTaskMgr = 0x00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Program Groups]
ConvertedToLinks = 0x00000001


[HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\feature_enable_ie_compression]
svchost.exe = 0x00000001

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
ProxyEnable = 0x00000000 THIS ONE HAS A (0) after it in my registry key so I donít know if this one can be considered identical, but I listed it anyhow


I also reset my IE privacy settings to exclude websites that put third party cookies, as well as blocking third party cookies. I removed a CR64Loader Object that was in my downloaded applications temp file that I read was a malware threat.

I appreciate all that you can do.

Edited by ladydime2000, 13 July 2010 - 11:13 AM.


BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,989 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:02:21 AM

Posted 13 July 2010 - 09:33 PM

Hello,

You've got a bad rootkit aboard. Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues and what you have done to try to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users