Trojan Horses Dialer.COH; Dialer.28.A; Generic2.HLG

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by enemigoman, Nov 8, 2006.

  1. enemigoman

    enemigoman Private E-2

    Hello:

    I have a malware problem that has escalated to the point of total despair.

    It all started when my trial NAV detected a certain dialer.generic trojan horse. Since it wouldn't go away, I seeked help in forums. Meanwhile, the NAV expired and I installed the free edition of AVG Anti-Virus.

    I followed the other forum's instruction and installed Spybot Search & Destroy, Lavasoft's AD-Aware SE Personal, AVG's Anti-Spyware and Microsoft's Window Defender, Disk Cleaner, Spyware Blaster and KillBox.

    I've run them in the order I was told, in safe mode and normal mode, deleted the files I was supposed to delete, but still, the AVG Anti-Spyware kept warning me about the following trojan horses: Dialer.COH, Dialer.28.A and Generic2.HLG. Sometimes it would prompt me to move 'em to the vault (which I always did) and sometimes it would give me the choice to heal (in which case I also did).

    Before, the problem was the annoying warning from AVG. Now, I have a bigger problem. One of the instructions in the other forum was to update my Windows, which I did. The updated included the new Internet Explorer, which started working just fine. But today no more. Every time I start it, it will crash. Also, Searh & Distroy started a few days ago to warn me about changes in the registry. I denied them and, I suppose, it created a rule and now it doesn't stop denying some change in the registry from a certain ITBarLaoyout. This occurs every second, if not sooner, and won't stop.

    Please help!

    I attach my system's summary. If you do need any further info, just let me know.

    Many thanks
     

    Attached Files:

    Last edited: Nov 8, 2006
  2. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Hi

    Please follow the below only and attach the requested logs, if after the running of this your still infected our malware experts will look through the attached logs and issue some further removal instructions tailored to your PC and infection.

    Our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Downloading, Installing, and Running HijackThis

    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.


    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy - ONLY IF you were not able to run Windows Defender
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  3. enemigoman

    enemigoman Private E-2

    where do I find "Read and run me first"

    Excuse me but the link you sent me for "Read and run me first" sends me to the following page

    http://forums.majorgeeks.com/showthread.php?t=35407

    and in it it reads the following message:

    "The board has been moved to a new server. If you still seeing this message, you could try the following to flush your DNS cache: ipconfig /flushdns"


    I already did this procedure, to no avail. This page also asks me to log in, but it doesn't recognize my name or password.

    Where else can I find the "Read and run me first" info?
     
  4. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

  5. enemigoman

    enemigoman Private E-2

    Special Removal Procedures

    Sorry again, but the "Read and run me first" instructions refer to a "Special removal procedures" before following the steps.

    I'm again having the same accesibility problem as before, since I am sent to:

    http://forums.majorgeeks.com/showthread.php?t=74501

    where the same message

    "The board has been moved to a new server. If you still seeing this message, you could try the following to flush your DNS cache: ipconfig /flushdns"

    appears.

    My gut feeling is that my case doesn't apply, but I am done thinking I'm smarter than the malware.

    Please send me the correct link in the same manner as you did with the "Read and run me first" as this worked wonderfully fine.

    Thank you very much
     
  6. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Here you go http://208.101.7.150/forums/showthread.php?t=74501


    also I have the same issue with the ipconfig, but just tried something different on my laptop as I needed to get into safe mode for a setting, but I also tried the ipconfig /flushdns in safe mode and it reset my DNS back to how it should be.

    So try booting into safe mode then going to Start > RUN > type CMD and hit enter then at the command prompt type ipconfig /flushdns and hit enter

    then reboot into normal mode and try the forum again may clear yours up like its just done mine.
     
  7. enemigoman

    enemigoman Private E-2

    OK, finally back.

    First of all, after follwing the Read and Run me first steps, I continue to have the same problems.

    I did what was instructed, but, in order to be sure, I'll repeat it, step by step and let you know what were the results.

    • I found no unknown/suspicious programs via the Add/Remove Programs feature.
    • The MSConfig Startup Mode was already in Normal. However, I still clicked apply and restarted
    • I emptied the vaults of the anti-virus and anti-spyware programs that I installed previously
    • Emptied the Recycle Bin
    • Hidden files, system files and file extensions were already enabled
    • Currently, I am only using AVG Anti-Virus Free version. However, I did un-install all but one of the anti-spyware tools I was adviced to intall from another forum: Lavasoft's AD-Aware SE. If you have any suggestion of a better anti-virus, I will appreciate it
    • Currently, I am only using the MS Windows XP firewall. Again, if you have a better suggestion...
    • I created a new folder directly under C: and downloaded all the tools directly into it
    • Unzipped, installed and updated as told
    • Rebooted in Safe Mode. It did work.
    • Unplugged the modem cable and shut down all apps
    • Ran CClean with the default settings. I did this with every account, including Administrator, for which I had to reboot every time in safe-mode. Lots of stuff cleaned
    • Ran MS Windows Malicious Software Tool in my account, which has administrator privileges, and didn't find anything wrong
    • Ran Spybot S&D and didn't find anything wrong. However, I was confused since at no time I was asked any Teatime option. I just ran it with default settings
    • Ran MS Windows Defender and didn't find anything wrong
    • Additionally to the Read and Run me First steps; I ran AD-Aware SE. This one did find bad stuff and I proceeded to move the infected files to it's vault and, subsequently, deleted it. I attach the report (named Adaware.txt) just in case you are interested
    • Rebooted in Safe Mode with Networking Capabilities
    • Went to BitDefender page, agreed to it's terms, installed the Active X controls and proceeded with the scan. It did find something wrong and I attach the log as requested
    • Went to the Panda page, installed the Active X controls and proceeded with the scan. It also found bad stuff and I attach the log as requested. However, something happened during the scan. When the red status bar was more ore les 80% done, a Windows messagge popped telling me that no "profile is create", refering to MS Outlook account and indicating me how to create one. It is true that I haven't created an Outlook account, but when I clicked OK (the only option), the on-line scan stopped. I ran the same scan again, and again the same happened
    • Rebooted in Normal Mode
    • Ran getrunkey.bat and then shownew.bat. I attach the respective reports
    • Checked the Special Removal Procedures and couldn't find any match to my problem, so I didn't follow any of it's instructions.
    • Downloaded HijackThis to the specified folder. Then renamed the file as told, ran it and saved the log, which I attach.
    Back again in Normal Mode, I discovered that my problem was unsolved. AVG detected a dialer trojan, only this time with a different name: Trojan horse Generic2.IKA. I rushed to grab a pen where to write it's name and it disppeared before I could heal it. Also, a flashing "malware warning" appears on the lower right side of the Taskbar (Quicklaunch is it called?). When clicked, it opens a window which has all the appearance of a legit MS Windows XP program (I mean graphically), with an apparent XP logo and all, but it does not indicate any company/software name. It just makes some "quick scan" and in a few seconds it tells me I am infected with about 9 malicious items. By this time I know this is fake (or isn't it?) and I don't proceed with the "full scan", something it urges me to do. Finally, I noticed that there are 2 un-identified entries in the Start/All Programs from the Taskbar (they have unidentified icons). They are located not inbetween the regular programs, but "up there", where some MS utilities are, such as Windows Update, etc. Their names are Online Security Guide, which refers to the web page http//www.protectionlist.com, and Security Troubleshooting, which refers to http//www.asecuritytest.com. I have never knowingly installed these.

    Now, since it was already late for me, I went to bed and decided to post the reply tomorrow (today Novembr 17th). And today, immediately upon starting, AVG ran an automatic test (this had never happened before), found the above mentioned trojan and vaulted it. As for the "spyware warning" it's also not there. I will keep and eye on it and inform you if it comes back.

    What still doesn't work is Internet Explorer! And this is perhaps the worst thing of all. It did work in Safe Mode with Networking Capabilities, but not in Normal Mode. As i told you before, I was instructed by another forum to run Windows Update. This, however, coincided with the release of the newest version of IE. In the beginning it worked just fine. Now, I don't know if the IE problem is malware/virus-related or is it just an awful coincidence and the IE just doesn't work. But I haven't heard of any problems with it, have you? Any advice on how I can fix this or go back to the previous version of IE will be greatly appreciated.

    By the way, the problem with IE is that it crashes upon start. It never really opens, just prompts me a Window with the Send/Don't Send Report, but it also has another opiton, Debug. The latter doesn't appear to solve the problem and the IE just closes.

    For info on my PC, please note that I already uploaded the AIDA32 report in my first post.

    Thanks a lot for the help so far and I hope my logs and reports are as helpful.
     

    Attached Files:

  8. enemigoman

    enemigoman Private E-2

    Continuing the uploadig...
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'. On the page that opens, scroll down to DirectX common ... then right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Now repeat the above stop and disable for the following services:
    ODBC service
    Next, run HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    DirectX common

    Now repeat the Delete NT Service steps for:
    ODBC service

    If you receive any error messages just ignore them and continue.

    Now exit HJT and reboot when it tells you it needs to.

    After reboot continue on to the below instructions!


    You still have things from Norton/Symantec trying to run! We will fix them later!!!


    I'm going to post two sets of instructions below. Each will be enclosed in separate Quote boxes. Make sure to complete the first one 100% before moving on to the second one.


    Now attach new logs from:
    • GetRunKey
    • ShowNew
    • HJT
    How are things working now?
     
    Last edited: Nov 17, 2006
  10. enemigoman

    enemigoman Private E-2

    Hello Chaslang:

    I just did the first set of instructions and, following them, I will wait for you or anyone else to indicate me when to continue with the second set of instructions.

    However -and this might be foolish of me-, I am not quite sure what are these procedures about. Are we addressing the malware problem, the IE problem, or both of them? Alsi, what is your last post about?

    Thank you for your help
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to complete all the steps as requested and attach remaining logs.

    We are working on ALL of your problems (there are a bunch).
     
  12. enemigoman

    enemigoman Private E-2

    Hello:

    Problem 1, Malware, seems to be gone ever since this morning. Problem 2, IE crash, however, remains.

    I finished the second set of instructions and proceed now to attach the logs.

    FYI, DirectX common and ODBC Service were already set in Stop Service, but their Start-up Type was set to Automatic. I changed them as told and subsequently deleted the NT Services, again as told.

    Please note that the rapport.txt file I uploaded in my previous post was run right after installing SmitfraudFix and ran the Search option in Normal Mode. The file I am attaching now is the report after I ran the Clean option in Safe Mode. By the way, I had no problem with the process.exe file.

    Also, FYI, wininet.dll was not infected, as I didn't get any prompt to replace it. The computer did not reboot automatically. In fact, it opened the new rapport file right away. Nevertheless, I followed the instructions and rebooted manually in Safe Mode, although there was no apparent change, prompt or anything. I immediately rebooted in Normal Mode, as told.

    I had a question. I noticed that nobody has viewed the BitDefender report I was asked to post earlier in this thread. Not that I'm complaining of the help I am being given; all the contrary I appreciate it infinitelly. Just courious though.

    I await your next instructions to fix the remaining "bunch" of problems.

    Many thanks
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You never attached the second rapport.txt log! I need to see this!

    In reality, you would not know whether we viewed it or not. However I did look at it when you first posted it. There was nothing in it.


    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 5
    J2SE Runtime Environment 5.0 Update 8
    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Did you buy PC-Doctor 5 for Windows or is this just the demo version?

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    • Now Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Symantec Lic NetConnect service
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteCLTNetCnService into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:


    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://securityresponse.symantec.com/avcenter/fix_homepage
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: (no name) - {0647F9D1-0D7D-4B2F-1C1B-095BB78EA220} - C:\WINDOWS\system32\csewlmk.dll
    O2 - BHO: (no name) - {68BE6BB0-C1CD-C20F-13A5-02957E5E1FE7} - C:\WINDOWS\system32\ctsozyf.dll
    O4 - HKLM\..\Run: [win32] C:\WINDOWS\system32\winpack32.exe
    O4 - HKLM\..\Run: [osCheck] "C:\Program Files\Norton AntiVirus\osCheck.exe"
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [fxjtape.dll] C:\WINDOWS\system32\rundll32.exe C:\WINDOWS\system32\fxjtape.dll,ereaume
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [win32] C:\WINDOWS\system32\winpack32.exe
    O20 - Winlogon Notify: winhab32 - winhab32.dll (file missing)


    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete (if found):
    C:\Program Files\Common Files\Symantec Shared <--- the whole folder:
    C:\WINDOWS\system32\csewlmk.dll
    C:\WINDOWS\system32\ctsozyf.dll
    C:\WINDOWS\system32\drvjit.dll
    C:\WINDOWS\system32\fxjtape.dll
    C:\WINDOWS\system32\winpack32.exe

    Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now run Ccleaner.

    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!

    Now reboot in normal mode

    Now attach a the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT

    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Nov 18, 2006
  14. enemigoman

    enemigoman Private E-2

    Indeed. My appologies. I am doing it now.

    Well, right on the side of the attachements, I can read "1 view" or "0 views". But nevermind. I appreciatte your help.

    It is just the demo version.

    I haven't done anything you say in your latest post because I need to go out for a while. Once I do it, I will tell you.

    Again, many thanks
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay just attach the 3 followup logs when you finish all the other steps!
     
  16. enemigoman

    enemigoman Private E-2

    I just finished the remaining steps and here are the logs
     

    Attached Files:

  17. enemigoman

    enemigoman Private E-2

    Sorry, I forgot to tell you that IE is working fine now. By now, problems appear to be completely gone. If, however, there was more to be done, of course I will do it.

    I cannot thank you guys enough
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We have a few more things to delete.

    Delete the below folders:
    C:\Program Files\Common Files\{3AE4FCD1-06A1-1033-1028-050513200001}
    C:\Program Files\Common Files\{6AE4FCD1-06A1-1033-1028-050513200001}

    And delete the below file.
    C:\WINDOWS\system32\fliheql.dll

    Other than those, your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    4. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    7. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  19. enemigoman

    enemigoman Private E-2

    OK, I deleted the last two folders and file. I've been starting the PC in order to check things out, although I haven't work throughly and, so far, nothing wrong has happened. For all I know, the problems have been fixed. I don't know if I shoul wait, or do something specific in order to be really, really sure that I am bug-free now.

    Once again, I cannot thank you enough.

    Regards
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome! Don't hesitate on working thru all those final steps I gave you! Do them ASAP.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds