Persistent spyware attack

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by clarks_Magic_sack, Jul 24, 2005.

  1. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Guys (and gals) I hope you can provide me a bit of a hand removing some persistant malware on my machine.

    Symptoms are:
    1) When internet explorer is opened McAffee Virusscan keeps picking up the following files
    "C:\WINDOWS\system32\rdsndin.exe\RDSNDIN.EXE" and / or
    "search[1].exe| MhtRedir.gen"
    Ewido also cleans "C:\Windows\System32\ntfsnlpa.exe" at the same time as I get a warning message from McAfee
    2) When searching on Google, often when I click on a result I am redirected to www.ABCsearch.com or to www.adultfriendfinder.com.

    Diagnosis
    I first thought something was up when a shortcut to WareOut appeared on my desktop and I tried to kill it by unistalling and using SpyBot and other software packages I could find on the web. I also shut the stable door after the horse had bolted so to speak and installed SP2 for XP and all the various patches I had never done.

    Subsequently I found this forum and have followed the instructions on the sticky thread. The only directive I couldn't follow was to conduct the online scans in safe mode as I couldn't get onto the 'net so I had to do them in normal mode.

    Can you please help this idiot for not putting the patches in when he should have done?

    Ian
     
  2. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Ewido has just picked up another attack whilst the internet was idle for an hour or so from

    c:\Windows\System32\hclean32.exe.

    I'm getting a bit paranoid that there is some sort of beacon for all the nasty in the world to infect my machine. Any guidance/advice chaps?

    Ian
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please follow the steps below:

    - Run ALL the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal

    Make sure you check version numbers and get all updates.

    - Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.


    After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps below:

    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).
     
  4. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Chaslang,

    I have run all the steps in the sticky thread. The only directive I couldn't follow was to conduct the online scans in safe mode as I couldn't get onto the net so I had to do them in normal mode.

    Spybot S&D found Findspy.a
    RAV found MhtRedir.gen which had been quarantined earlier.

    I attach my HJT log although will be away for the next few days so won't get back to you immediately.

    Thanks for all your time

    Ian
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    HJT logs must be posted from normal boot mode. I will look at this current log but we may not get everything fixed this way.

    Download HOSTER and then follow the below steps.
    • Unzip Hoster to a convenient folder such as C:\Hoster
    • Run Hoster.exe, click Restore Original Hosts and then click OK.
    • Click the X to exit the program
    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = about:blank
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
    R3 - URLSearchHook: (no name) - {6017D482-C3A3-0C05-8359-2EF6BAA8EFEB} - AppMasterCenter.dll (file missing)
    O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)

    After clicking Fix, exit HJT.

    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  6. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Attached Files:

  7. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Chaslang is on vacation for a few days so I will be helping you from here.

    Please update to Hijack This 1.99.1 and attach a new log using the new version.
     
  8. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    bjgarrick

    Thanks for your help. Please see the attached log file. Ewido suppresses hclean32.exe and ntfsnlpa.exe on a daily basis and McAfee deals with rdsndin.exe
     

    Attached Files:

  9. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Please look in Add or Remove Programs for the following and Uninstall them if found:

    Ewido

    Microsoft AntiSpyware


    The reason for the above is so they will not block anything we try to fix!

    Please download HOSTER and then follow the below steps.
    • Unzip Hoster to a convenient folder such as C:\Hoster
    • Run Hoster.exe, click Restore Original Hosts and then click OK.
    • Click the X to exit the program.

    After you complete the above, reboot and attach a fresh HJT log.
     
  10. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    I have carried out the steps and attach my HJT log. It's weird because I had run HOSTER previously when asked by chaslang and the changes HOSTER had made seemed to make then had been undone.
     

    Attached Files:

  11. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Your HJT log is clean, please follow the below.

    Generate a StartupList log using HijackThis.
    Run HJT and on the first screen, click the button that says "Open the Misc Tools section". In the next window first select "List also minor sections (full)" and then click the button that says "Generate StartupList log". CLick Yes to the Do you want to continue prompt. Now a notepad window will come up with the Startuplist.txt file. It is already saved in the the directory HJT is running from. So just come back here and upload the file as an attachment to your next message.
     
  12. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Here you go
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'm back! The Startuplist log did not show anything.

    Did you uninstall Ewido & MS AntiSpyware as BJ requested?

    Use Windows Explorer to look for the below files and tell me if found. Make sure viewing of hidden files is enabled.

    c:\windows\system32\hclean32.exe
    c:\windows\system32\ntfsnlpa.exe
    c:\windows\system32\rdsndin.exe
     
  14. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Hi chaslang, hope you had a good holiday, tell me about it when you have time.

    I had uninstalled Ewido as BJ requested, I don't have MS anti spyware installed.

    I can't find any of the files you mention using windows explorer, however when Ewido was installed it used to block and delete
    c:\windows\system32\hclean32.exe
    c:\windows\system32\ntfsnlpa.exe
    This usually happened just after starting the machine up. McAfee usually finds
    c:\windows\system32\rdsndin.exe
    at the same time and deletes it.

    I now see a fake windows security pop up message in the taskbar which says

    "Your computer might be at risk
    Your virus protection status is bad
    Spyware activity detected
    Click the balloon to fix this problem”

    Hope this helps, Ian
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If Ewido was finding those files after reboot, why would they not be present now since Ewido is uninstalled. Did you check after uninstalling Ewido and then rebooting?

    Post a new HJT log too.
     
  16. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Chaslang,

    I am reasonably sure hclean32.exe is around given that I am getting fake security centre popups

    I have rechecked the paths you listed and I cannot find

    c:\windows\system32\hclean32.exe
    c:\windows\system32\ntfsnlpa.exe

    I have show hidden files enabled and hide extensions for known files types disabled.

    In this forum http://forums.net-integration.net/index.php?showtopic=32220&st=0&#entry154175
    there is the suggestion that hclean32.exe could hide itself from windows explorer. Do you buy it?
     
  17. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    New HJT log attached for you
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It could be possible. Try downloading and using the following tool. It is very useful for things like this and even shows files in C:\windows\Downloaded Program Files which Windows Explorer will not show. ExplorerXP

    Let me know if it finds anything. Is McAfee still finding rdsndin.exe?

    What do "security centre popups" look like and what do they say?
     
  19. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    ExplorerXp couldn't see the files

    McAfee still picks up rdsndin.exe. Almost immediately afterwards the balloon shows up.

    See the screenshot attached
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you boot in safe mode, does this popup still occur?

    If you boot in either safe mode or normal boot mode, but have no physical connection (unplug cable) to the internet does it appear? When does it appear? Does it come up immediately after reboot or after you run some particular program (like IE)?

    Windows Security Center is part of Windows XP SP2. See the below for more info on it:

    http://www.theeldergeek.com/security_center.htm
     
    Last edited: Aug 9, 2005
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Copy the contents of the below Quote Box to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file fixit.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.) Then double-click on the fixit.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to Add in to the registry, say yes

    Also look again for any of the below files and delete them. Let me know if you find any of them:
    C:\WINDOWS\SYSTEM32\NTFSNLPA.EXE
    C:\WINDOWS\SYSTEM32\RDSNDIN.EXE
    C:\WINDOWS\RDT.INI
    C:\WINDOWS\SYSTEM32\HCLEAN32.EXE
    C:\WINDOWS\BALLOON.WAV or C:\WINDOWS\BALOON.WAV

    Now reboot your PC.

    Hijackthis will run just before windows. Have it do a scan and have it fix the below items if present. If not, present just exit HijackThis.
    O4 - HKLM\..\Run: [HCLEAN32.EXE] C:\WINDOWS\HCLEAN32.EXE


    Download FindT.zip to the root folder of drive C

    - Extract the files inside also to your root folder.
    - open the "FindT" folder and run the runthis.bat file
    - a text will open post the results


    Now let me know where things stand.




     
    Last edited: Aug 9, 2005
  22. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Chaslang,

    I was able to delete C:\WINDOWS\RDT.INI and C:\WINDOWS\BALLOON.WAV.

    I then made the changes to the registry as recommended.

    HJT did a scan but did not show O4 - HKLM\..\Run: [HCLEAN32.EXE] C:\WINDOWS\HCLEAN32.EXE. HJT log is posted

    I ran FindT and results are posted.

    I could find C:\WINDOWS\SYSTEM32\NTFSNLPA.EXE and
    C:\WINDOWS\SYSTEM32\HCLEAN32.EXE using windows explorer and deleted them - hurrah!
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! But FindT show another file (in addition to the two you deleted). Find C:\WINDOWS\SYSTEM32\CSLKO.EXE

    and rename the CSLKO.EXE file to CSLKO.XXX

    Your HJT log shows a new problem:

    O4 - HKLM\..\Run: [dmkai.exe] C:\WINDOWS\system32\dmkai.exe

    Have HJT fix that line and boot in safe mode and find and delete that file.

    Reboot in normal mode and post a new log and also indicate how things are working.
     
  24. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Chaslang

    I have renamed CSLKO.EXE to CSLKO.XXX

    I used HJT to fix O4 - HKLM\..\Run: [dmkai.exe] C:\WINDOWS\system32\dmkai.exe

    But I couldn't find DMKAI.EXE to delete.

    The popups have stopped and McAfee no longer has to stop C:\WINDOWS\SYSTEM32\RDSNDIN.EXE.

    I think we got it! ;) but I'll check back in a couple of days to confirm.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sounds good but let's see another HJT log to make sure nothing else showed up.
     
  26. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Apologies for forgetting, here it is with a findt log
     

    Attached Files:

  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  28. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Chaslang,

    There appears to be no sign of infection at all now, McAfee no longer picks up C:\WINDOWS\SYSTEM32\RDSNDIN.EXE.

    I reinstalled Ewido and did a quick scan, it no longer finds hclean32.exe. However there were a few remnants to be swept up, the file we renamed clsko.xxx but also C:\WINDOWS\SYSTEM32\__delete_on_reboot__ntfsnlpa.exe

    A quick question, I can now reenable system restore by unchecking the box and this means there will be a new system restore point?

    Many thanks for all your help!

    Ian
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! Uncheck the box to enable system restore and have restore points start creating again.

    You're welcome!
     
  30. clarks_Magic_sack

    clarks_Magic_sack Private E-2

    Absolutely no signs of reinfection 2 weeks on. I can't thank you guys enough. Do you have a favourite charity or shall I just pick one to give a donation to?
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    It's up to you what you want to do but for reference, my favorite charity is the American Cancer Society! I have lost a lot of friends and family to cancer.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds