Spent a week on the malware removal guide

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by drdunk, Jun 2, 2007.

  1. drdunk

    drdunk Private E-2

    You geeks are tough! Among other things I had several years of MS updates to do. Most malware is in my mailbase. Can it be cleaned?

    Some advised scans did not complete:

    Bitdefender indicated seemingly thousands of the same thing in mailbase, then finally hung on something innocent looking in the second and last hard drive. I ** could not get a report from it,** but i did pause it several times as it ran. It said it deleted all problems in old mail but the file never shrinks does it?

    I guess I'll run it again to see what happens. I deleted some stuff on drive F.



    Pandascan slowed waaay down on the mailbase. the first couple times I thought it had stopped. Third time, I finally noticed that it did a new file every few minutes. After clicking stop (it would have taken months to run at that speed based on bitdefender) and waiting a long time it put up a prompr that allowed me to get the incomplete report.

    Spybot worked nicely.

    CounterSpy: found some problems. It ran itself again last night after Kaspersky finished, found no problems.

    Kaspersky (alternate scan due to problems with the others) ran fine.
    Oops! The report file is too large:

    Kaspersky_scan_report.txt:
    Your file of 982.5 KB bytes exceeds the forum's limit of 250.0 KB for this filetype.

    If there is a way to clean the mail base then I think everything can be done properly.
     

    Attached Files:

  2. drdunk

    drdunk Private E-2

    Here are the other attachments. When I boot up and check for email there is a very suspicious loong delay during which nothing happens. Afterward things happen normally. As far as I know, the viruses indicated in old email did not do anything. Evidently they could not escape from Netscape. Spyware is my big concern.
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do a search for this and remove it:
    C:\Documents and Settings\User\.jpi_cache\jar\1.0\archive.jar-487b52a0-4abd63ce.zip[winmodem.exe]

    Use add/remove programs to uninstall:
    Viewpoint Media Player (Remove Only)

    Download SuperAntiSpyware Home Edition Free Version

    Install the program

    Run SuperAntiSpyware and click: Check for updates
    Once the update is finished, on the main screen, click: Scan your computer
    Check: Perform Complete Scan
    Click Next to start the scan.

    Superantispyware scans the computer, and when finished, lists all the infections found.
    Make sure everything found has a check next to it, and press: Next
    Click Finish

    It is possible that the program asks to reboot in order to delete some files.

    Obtain the SuperAntiSpyware log as follows:
    Click: Preferences
    Click the Statistics/Logs tab
    Under Scanner Logs, double-click SuperAntiSpyware Scan Log
    It opens in your default text editor (such as Notepad)

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking fis, exit HJT.

    Now attach new logs for:

    * GetRunKey
    * ShowNew - please download the current version first!
    * HJT
    * SuperAntispyware log
     
  4. drdunk

    drdunk Private E-2

    "Now attach new logs for:

    * GetRunKey
    * ShowNew - please download the current version first!
    * HJT
    * SuperAntispyware log
    "

    Ok, here are the first two.

    And Thanks!!!
     

    Attached Files:

  5. drdunk

    drdunk Private E-2

    The next two logs:
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please use windows explorer to find and delete:
    F:\Net\zip\WINZIP32.EXE

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Did we forget this part:
    After clicking fix, exit HJT

    Attach new logs for:
    GetRun
    HJT
     
  7. drdunk

    drdunk Private E-2

    Thanks again. I don't think I forgot steps yesterday but I'm glad to run things again anyway.

    regedit: done

    Superantispyware today found no problems.

    HiJackThis did indeed have the items you mention. I got rid of the urlSearchHook noname.

    The HKCU...blank.htm won't go a way after several tries.
    Bestbuy also won't go away.

    Other notes
    yesterday I was going to run Bitdefender again - decided to take them up on the download version (trial) that does not require connection to run. It ran and found no problems, not even the Worm.Evilbot-B found a little later by SuperAntiSpyware. Worm.Evilbot-B is a new name to me.

    I could not get back on the net yesterday until I uninstalled Bitdefender. Then I ran CCleaner for good measure.

    By the way I chose my user name here because my first choice had been taken. I'm not actually a basket ball player ;).

    What now?

    Thanks!

    Pete
     

    Attached Files:

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Boot into safe mode.
    Turn off system restore.

    Run HJT with no other programmes open. Have HJT fix the following
    Now download The Avenger by Swandog469, and save it to your Desktop.

    * Extract avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * Check the 'Input script manually' box.
    * Click on the magnifying glass icon.
    * Copy everything in the Quote box below, and paste it in the box that opens:

    * Now click the 'Done' button.
    * Click on the traffic light icon and OK the prompt.
    * You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt
    Reboot into normal mode and turn system restore back on.
    Attach new logs for:
    HJT
    GetRun
    Avenger
     
  9. drdunk

    drdunk Private E-2

    Whew! Long story short, I think I'm back to square one.

    Hijack in safe mode seemed to get rid of the checked items but they are back now. I can't get online in safe mode, and trying that as Admin was really strange. I've had more reboots, hangups, getting on and off line, reboots,,,,,
    than you can imagine.

    Got Avenger downloaded and unzipped despite the fact that you wanted my to delete winzip earlier. tried to run it -- figured out to modify script to include the first line

    Files to delete:

    then it ran, but said the file could not be found. Then HJK said everything was back. I boldly tried Avenger with this:

    Registry values to replace with dummy:
    HKCU\Software\Microsoft\Internet Explorer\Main,Local Page | C:\WINDOWS\SYSTEM\plank.htm

    but is said that was not a valid script. Well anyway I'll attach the logs.
    Sheesh, now I can't find the Avenger log from the second run when it said it couldn't find the file. Oh well, that was the message.
    What next?
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download HOSTER and then follow the below steps.
    • Unzip HOSTER to a convenient folder such as C:\Hoster
    • Run Hoster.exe, click Restore Microsoft's Hosts File and then click OK.
    • Click the X to exit the program.
    Re-run H|JT and have it fix these lines:
    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm

    Now go to immunise section of spybot and check what options you have ticked.

    Tell me how that went and attach logs for:
    HJT
     
  11. drdunk

    drdunk Private E-2

    Ok, things are looking up. Got Hoster, got a new unzipper to unzip it, ran it no problem, then back to Hijack.

    These guys
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.bestbuy.msn.com
    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

    were all still there despite various other things I had tried. For instance this am I used a CCleaner option to get rid of
    O4 - HKLM\..\Run: [OemReset] %systemroot%\OPTIONS\OEMRESET.EXE /AUDIT
    to see if that would help HJT. It didn't.

    SO I ran HJT after Hoster. Only the R3 - URLSearchHook: (no name) went away. Unfortunately I didn't keep every HJT log but I thought it came back after a shut down and restart. However than I ran Spybot, which found one seemingly unimpressive commercial item which I quarantined.

    I wanted to make a Hijack log to show that the url no name came back after a restart, but it wouldn't come back anymore Yay!

    I still have blank.htm and bestbuy. If they are related maybe they won't hurt me. Do you know if they are part of the same thing?


    Looking at this
    "Now go to immunise section of spybot and check what options you have ticked."

    I realized you didn't ask me to run Spybot. I was not sure what you were asking, but this innocent little question turned out to be a big deal. I guess I clicked on immunize to see what would come up. It started a long process and finally informed me that I am now permanently immunized against 18758 bad things. Thanks!
     
  12. drdunk

    drdunk Private E-2

    Drat! hit the wrong thing. Here's the HJT log:
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please use windows explorer to find and delete:
    C:\Program Files\InCode Solutions\RemoveIT Pro v4-Trial\removeit.exe

    Run HJT again and have it fix these two items:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\SYSTEM\blank.htm
    O4 - HKCU\..\Run: [RemoveIT Pro XT] "C:\Program Files\InCode Solutions\RemoveIT Pro v4-Trial\removeit.exe"

    Did you do a search for C:\Windows\System\blank.htm?
    Delete files/folder from the following directories (But not the directory itself, for example delete all files/folder IN temp; but not temp itself!)
    [*]C:\Windows\Temp\
    [*]C:\Documents and Settings\\Local Settings\Temp\
    [*]C:\Documents and Settings\\Local Settings\Temp\
    [*]C:\Documents and Settings\\Local Settings\Temporary Internet Files\ <---This will delete your internet cache--including cookies. This is recommended and strongly suggested.
    [*]C:\Documents and Settings\\Local Settings\Temporary Internet Files\
    [*]Empty your "Recycle Bin"

    Please attach new logs for:
    HJT
    ShowNew
    GetRun
     
  14. drdunk

    drdunk Private E-2

    Ok, did that, also found No C:\Windows\System\blank.htm but a bunch of old blank.htm files from years 1998 through 2001. Deleted them.

    About the directories and such deleted - they come back. Contents mainly repetitive ini files like this:

    /History
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
    CLSID={FF393560-C2A7-11CF-BFF4-444553540000}


    C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\C1KB6RO1

    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}


    ===
    C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\MB2XYF07
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}


    C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\STKYN23M
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}



    ====
    C:\Documents and Settings\LocalService\Local Settings\Temp\Temporary Internet Files\Content.IE5\YXJX2NNB
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}

    ===
    C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}

    =====

    C:\Documents and Settings\LocalService\Local Settings\Temp\History\History.IE5
    [.ShellClassInfo]
    UICLSID={7BD29E00-76C1-11CF-9DD0-00A0C9034933}
    CLSID={FF393560-C2A7-11CF-BFF4-444553540000}


    that last one has an extra line.
    What's with the IE5 business? Is that a useful clue?


    Using safe mode, system restore off, Hijack got rid of all three bad items (url searchHook noname was back; (It seems to come back in 24 hours) but after rebooting in normal mode,
    ** blank.htm and bestbuy were back. **
    by the way last night I tried deleting them from the registry by hand. Windows said Unable to comply.
     

    Attached Files:

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF Cleaner menu to close the program.

    Tell me how that went.
     
  16. drdunk

    drdunk Private E-2

    Hi Tim,

    Thanks, it went as well as the others ... AFT Cleaner may not get quite as much as CCleaner but both are good, yet some "deleted" files don't go away.
    Deletion test log attached.

    I found that booting in safe mode I could use both cleaners and then delete other files by hand; evidently they weren't protected in that situation. Then HJT worked well, disposing of blank.htm, Url searchHandle noname and best buy. Rebooting in normal mode (but with System Restore still off) blank.htm and best buy were right back and the nameless url is doubtless just being shy again.

    This morning I used CCLeaner options to get rid of some other stuff including several Active X keys; Don't miss them; I think I'll get rid of them all. As far as I know I only need Active X when I use the MS browser every few years to download MS updates.

    What can my current problems, that Hijack can't get rid of, do to me? I don't know of any harm done yet, but on the other hand anything tougher than you are could do anything it wants. My main concern is that I need to make critical online purchases. Soon.
    ???

    Pete
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download SilentRunners from this link Please download SilentRunners from here: http://www.silentrunners.org/Silent Runners.zip. Unzip it to the desktop and double-click on it. If you get any kind of warning message about scripts, please choose to allow the script to run. When the scan is finished, it will create a logfile on the desktop. Please post the entire contents of this logfile in a reply to this post.. Unzip it to the desktop and double-click on it. If you get any kind of warning message about scripts, please choose to allow the script to run. When the scan is finished, it will create a logfile on the desktop. Please attach the entire contents of this logfile in a reply to this post.
     
  18. drdunk

    drdunk Private E-2

    Thanks, I did that. I put it on the desktop, but please tell me, is that really important? I must confess I didn't put Avenger on my desktop. But still, it couldn't have removed a file that wasn't there. I guess I could run it from the desktop to see if there's any difference.

    Log attached.
     

    Attached Files:

  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Turn off the showing of hidden files and tell me what happens with those items.
     
  20. drdunk

    drdunk Private E-2

    Ok, tried that. Files avenger*.* and the two from Silentrunner do not appear to be hidden. However I see that changing the status to hidden only causes files on the desktop to gray out, not disappear.
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    HERE's A TIP: You cannot fix things when you have antispyware tools blocking the fixes! And you have multiple tools installed doing just that!

    Uninstall CounterSpy and if Spy Sweeper is the free trial version, uninstall it too. If Spy Sweeper is not free, you must disable all realtime protection before trying to make any fixes and then after you reboot or renable the protection you must allow/approve any changes that Spy Sweeper may popup a warning about something being changed. It should be rather obvious when you are trying to make changes vs when malware is trying to make changes.
     
  22. drdunk

    drdunk Private E-2

    Darn, almost forgot to post reply --
    per email message I temporarily disabled my anti Spyware programs and then tried to get rid of unwanted items in the HJT log.
    First I tried CCleaner. As before three 'temporary internet files" come back after being erased when I close cleaner then open it and analyze again.

    However, Hijack removed all three items!
    Blank.htm, best buy and url searchHook noname.
    But ...
    Upon re-enableing Webroot anti spy pgm, best buy and blank.htm came back, just as before in safe mode then back to regular mode.

    What conclusions do you draw?

    I then changed my firewall from Sygate to Outpost. Outpost seems to run a tighter operation.
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Exactly as my message implied. You are allowing Spy Sweeper to put things back to what it has backed up as your defaults. You must not do this. You must accept the changes that you make in order for them to stick. If you don't understand how to do this (Spy Sweeper should be prompting you about the changes unless you told it not to) then uninstall Spy Sweeper completely. Then make the changes. Afterwards you can reinstall Spy Sweeper.
     
  24. drdunk

    drdunk Private E-2

    Thanks! This was already a good day and now it's even better. Per last email I uninstalled Webroot Spy Sweeper.

    Then HijackThis worked and got rid of the three suspects. Well I thought, urlsearchHook noname always plays hide & seek. He'll be back tomorrow. But what's time to a computer? I set the date ahead and rebooted and ran Hijack again. The url stayed gone! Thanks mucho.

    I have a slight problem reinstalling Spy Sweeper. It wants a bid key that I don't have any more. I may be able to find it in the morning.

    Meanwhile, CCleaner still can't get rid of these three files:

    Details of files to be deleted (Note: No files have been deleted yet)
    ------------------------------------------------------------------------------------------
    C:\Documents and Settings\User\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini 67 bytes
    C:\Documents and Settings\User\Local Settings\Temporary Internet Files\desktop.ini 67 bytes
    C:\Documents and Settings\User\Local Settings\History\History.IE5\desktop.ini 145 bytes
    ------------------------------------------------------------------------------------------

    They come back when I close CCleaner, as before. I just got CCleaner a few days ago and I'm sure I didn't tell it to put back these files.

    What could it mean?

    Pete
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Those are normal and don't need to be deleted and will come back. They are part of normal system operation. They bacsically tell the system not to show files in those folders in the normal form (i.e., files will not show as usual in Windows Explorer).
     
  26. drdunk

    drdunk Private E-2

    Whew! Thanks for that information. Now I can stop trying to get rid of them.

    Meanwhile:
    Trying some rootkit removers today, one of them being Trojan Remover, I ran into:
    C:\WINDOWS\system32\drivers\sbapifs.sys
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SBAPIFS\"ImagePath"

    This is just one of the items the program questioned, but this one is special: Trojan Remover can't remove it.

    And
    url searchHook noname is back. It was back early this morning, and seems to return more quickly now.

    Can anything be done about these two items? Is there a need to get rid of them?

    and Windows Installer has become hyperactive. It keeps installing Total Access Core Applications, part of Earthlink I've had for a long time. I must have done something to cause this.

    Thanks,

    Pete
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It is not a trojan! It is part of CounterSpy. If CounterSpy is the free trial from the READ ME you should have uninstalled it as requested a few messages ago.

    Not malware! It is something about how you are using Spy Sweeper and or CounterSpy. Try the below!

    Uninstall CounterSpy and Spy Sweeper (you must uninstall these or the below probably will not work).

    Then reboot!

    Delete the C:\Program Files\Webroot folder.


    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now you can reinstall Spy Sweeper if desired.


    Not malware. You have problems with incomplete installs or with Windows Installer. You should address these in the Software Forum but you could try running this: Windows Installer CleanUp Utility
     
  28. drdunk

    drdunk Private E-2

    Thanks! I did all that. The other day I just disabled CounterSpy by temporarily renaming the main exe to axe. This time I used CCleaner to uninstall it. CCleaner does this very well. My new HJT log is leaner and better than ever; total size 5120 bytes, and no url searchHook noname. (Yesterday I eliminated some other things from it based on what other people were told to fix).

    One last easy question: is there a reason to not use the free CounterSpy?

    Thanks again. I appreciate all the help from Major Geeks.
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes and that is why we said to uninstall it. It is a 15 day trial. Afterwards it is of no use to you unless you purchase it.
     
  30. drdunk

    drdunk Private E-2

    Disaster!

    I should have written hours earlier but it's so bad I don't know what to say.

    I ran HJT again early in the afternoon. I noticed that the url with no name was back. then I noticed that the log had increased in size too much for just one extra item. I found a couple of extra buttons that I had removed yeaterday, then I noticed a 17:

    O17 - HKLM\System\CCS\Services\Tcpip\..\{52F7E777-AEAF-44D0-B5FB-9CD355D14EEA}: NameServer = 207.69.188.185 207.69.188.186

    I hadn't had a 17 before so I clicked for more information. 17 implies a hijack!!

    more bad news kept comming.

    By and by I noticed that my new Outpost firewall had essentially disappeared. It had been disabled and infected.

    Before all this I had downloaded a Defrag program from Major Geeks: JkDefrag-3.14.zip
    It ran straight out with no options and outwardly appeared to do fine. Afterward I soon noticed that MS explored search wasn't working properly. I found a searchoption to index files. I thought that might be needed; it turns out that MS does it slowly; I;ll have to let it run overnight and see if search works in the morning.

    Luckily Trojan Remover keeps working. Some details from its log:

    Where do they go?

    Well first on a reboot TR spotted a file called 3.tmp called by memsweep2 (?)
    alleged trojan or hijack and cleared it out.

    Well the second round of bad news was:
    After I tried to uninstall Outpost and had to reboot, TR running at startup said the remains of Outpost were trojan:

    C:\PROGRA~1\Agnitum\OUTPOS~1.0\kernel\HTMLFILT.DLL
    HKLM\SYSTEM\CurrentControlSet\Services\HTMLFILT.DLL\

    C:\PROGRA~1\Agnitum\OUTPOS~1.0\kernel\POP3FILT.DLL
    HKLM\SYSTEM\CurrentControlSet\Services\POP3FILT.DLL\

    ...
    My Sygate firewall is back in action in place of Outpost which was conquered.
    url searchHook noname comes back with every reboot. Hijack 17 comes back with every dial up to the net, as does url nameless if I have alreaded Fixed it HJT.

    What can I do?
     

    Attached Files:

  31. drdunk

    drdunk Private E-2

    Sygate log file attached:
     

    Attached Files:

  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There is nothing wrong with your HJT log. The O17 line is the IP address of your ISP's DNS (Domain Name Server).

    Paranoia can be a bad thing! ;)

    The below is not really a problem either and it just related to Internet Explorer.

    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

    I'm not exactly sure why it keeps coming back. If could be due to things you are doing on your own and what you are running.

    I see the below files in your ShowNew log!
    Code:
    "C:\WINDOWS\SYSTEM32\drivers\"
    bdlxvxry.sys  Jun  3 2007       60416  "bdlxvxry.sys"
    xpckmvbl.sys  Jun  3 2007       60416  "xpckmvbl.sys"
    Looking back in your logs I see they showed up when you posted logs in message number 14. See if you can delete these after booting in safe mode. If you cannot delete them, see if you can rename them to bdlxvxry.sys.bak and xpckmvbl.sys.bak

    If you believe you were able to rename them then reboot into normal mode and attach a new log from ShowNew.
     
  33. drdunk

    drdunk Private E-2

    Thanks to Webroot Software. They graciously helped me get my Spy Sweeper back in operation.

    I was glad to see your new message in the morning.
    <quote>
    Paranoia can be a bad thing!
    </quote>

    Good point. I still tried to get rid of the url with no name. It's well embedded in the registry. I tried putting XXX in front of his value: XXXCFBFAE00-17A6-11D0-99CB-00C04FD64497 a couple places but the url is still winning. I guess I'll have to call him Duke.

    It seems that the # 017 in my HJT log is only there when I'm logged onto the net. That would explain why I never noticed a 17 before.

    I also reinstalled Superantispyware. Various tests do not reveal a problem since the Duke of Url and # 17 are OK.

    Thanks very much for helping and explaining.
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay if you system is running okay without the files you renamed
    Code:
     
    "C:\WINDOWS\SYSTEM32\drivers\"
    bahbdl~1.bah  Jun  3 2007       60416  "bahbdlxvxry.bah"
    bahxpc~1.bah  Jun  3 2007       60416  "bahxpckmvbl.bah"
     
    I would suggest that you delete them after a couple days.

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds