Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

2 Haxdoors: Ps.a3d And Tmpf00.exe


  • Please log in to reply
6 replies to this topic

#1 ericwilmoth

ericwilmoth

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:06:48 AM

Posted 13 March 2007 - 11:27 AM

Hi. Having issues with a couple of haxdoors I found on my system using XoftSpy. They’re ps.a3d and tmpf00.exe.
By now I’ve learned how troublesome removing these puppies permenantly can be. So far all I’ve really done is use XoftSpy to remove them temporarily—a number of times. The only direct problems I’ve noticed is that at irregular intervals my internet connection gets dropped. Short of rebooting to fix it, logging off and logging back in gets my connection back. Still, from what I’ve read, the haxdoors are potentially relaying all sorts of other data I’m unaware of, so I recognize the level of the threat.

I found you guys while searching for solutions and took the advice posted on one of your pages about getting some additional spyware software and firewall, etc—so thanks for that. Clearly, though, I need to do something about the returning haxdoors. So far only XoftSpy shows them; I’m also using spybot, adaware and Symantec antivirus.

I’m rather inexperienced at handling complicated computer issues, but more than capable of learning. If you good folks can help me out it would be most appreciated.

Thanks!

Oh, yeah--i'm on windows XP. I think it's professional version...

Edited by ericwilmoth, 13 March 2007 - 11:33 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,766 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:48 AM

Posted 13 March 2007 - 12:38 PM

XoftSpy is an program that was previously listed as a rogue on the Rogue/Suspect Anti-Spyware List because of concerns with false positives, questionable license terms, and the use of aggressive, deceptive advertising. It has been been de-listed as a rogue because the vendor has taken some actions to correct these concerns. (scroll down and read the Note on this application).

I am still skeptical and would recommend you rescan using a progam with a proven track record like Sunbelt's Counterspy or one of the other Trustworthy Anti-Spyware Products.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 ericwilmoth

ericwilmoth
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:06:48 AM

Posted 14 March 2007 - 04:30 AM

Ok, I did the sunbelt thing and it came back with these items, which are now quarantined:
Trojan-Dnet.E
Trojan.BankAsh
Haxdoor.Fam
Goldun.Fam
AntiVirus Gold
HotWebFinder.Winbrume



Not sure what i should do next...

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,766 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:48 AM

Posted 14 March 2007 - 07:08 AM

You are dealing with several malware issues and more bad files may be on your system.

Please read and follow all instructions in the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". You may have performed some of these steps already. In step #9 there are instructions for downloading HijackThis and creating a log. (This is a self-extracting version which will automatically install HJT in the proper location.)

When you have done that, post your log in the HijackThis Logs and Analysis Forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. Please include the top portion of the HijackThis log that lists version information. An expert will analyze your log and reply with instructions advising you what to fix.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc.) unless advised by a HJT Team member. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 ericwilmoth

ericwilmoth
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:06:48 AM

Posted 16 March 2007 - 07:54 AM

Thanks, QM7. I appreciate the help.

My only question before moving on—and maybe this is explained a bit further in the guide for using the hijackthis—what if I post a log, and say create a temporary Microsoft word document that I decide I want to delete, or perhaps have an older word document I want to delete? Should I just make a folder to save them and wait to get rid of them until after getting the rest of this resolved?

Thanks again for the help!

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,766 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:48 AM

Posted 16 March 2007 - 08:15 AM

I'm not quite sure what your asking here. Anything in temporary folders are subject to deletion by various cleaning tools. If you want to ensure they your data documents are safe, then never keep them in a temp folder. If you plan on getting rid of the documents, then why would you want to move them elsewhere before deleting them?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 ericwilmoth

ericwilmoth
  • Topic Starter

  • Members
  • 38 posts
  • OFFLINE
  •  
  • Local time:06:48 AM

Posted 16 March 2007 - 06:44 PM

After posting a log you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc.)



i was referring to the comment about not deleting anything after posting my log. The temp folder i mentioned was a general folder as opposed a 'temporay files' folder. i was simply wanting to clarify if you meant don't deltet anything--period--and if so, maintaining some sense of organization of outdated material untill i could properly delete it. sorry for any confusion.

-------------

another question: the adaware instructions says to wait to delet things in quaratine untill using your system for a while to make sure everything works. I've got a variety of systems i use, but infrequently. for now i've left the stuff i've found in quarantine because there's a number of programs i haven't had use of just yet, but will later. Is it going to pose a problem if i don't delete them from quarantine before moving on to the hijack this? if so, what do you recomend i do to make sure i'm not potentially handicapping other programs that might be compromised by deleting these threats?

Also, i only turned off the system restore once i got to the stage about the stinger, since it instructed me do do so...is there any concern about all the things scanned and quarantined by other sytems prior to this? What i mean is, should i have had the system restore turned off while using adaware, etc--or does it not matter?

Edited by ericwilmoth, 17 March 2007 - 06:38 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users