Malware infection

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by BA_09, May 7, 2007.

  1. BA_09

    BA_09 Private E-2

    Attached are my log files...
     

    Attached Files:

  2. BA_09

    BA_09 Private E-2

    and the rest. I have several adware popups from Winpro virus removal, and I have followed all of the steps without much success.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are using a very outdated version of Windows XP which is a major security risk and you will remain very susceptible to infections until you get updated.

    After we finish removing any current malware, you MUST get updated. Do not attempt to update until we have removed your malware!

    Start working on the below while I read thru your logs!

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 6

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After completing the steps in message # 3, continue with the below.

    You have a lot more problems than just WinAntiVirus Pro!
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to MWSDS
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteMicrosoft Allocation Protocol Service into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads
    tab at the top.

    Once you see this screen click on each instance of atntr.dll once and then click the kill button. After you have killed all of the atntr.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of atntr.dll and kill it. (If you do not find the dll, just continue on.)

    Next double click on iexplore.exe and again click once on each instance of atntr.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right
    now:

    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: H - {5142FE17-20E6-4121-A925-A4C6385CDDAA} - D:\WINDOWS\System32\rem.dll (file missing)
    O2 - BHO: (no name) - {ba948dc1-b9a0-4e12-b13f-4414d62ae491} - D:\WINDOWS\system32\atntr.dll
    O2 - BHO: (no name) - {DE0B3210-B828-475B-96F0-6796FE533E46} - D:\WINDOWS\system32\drivere.dll (file missing)
    O4 - HKLM\..\Run: [Norton Antivirus 2004] SYMANTECAV2.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "D:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SpamBlocker] D:\Program Files\SpamBlockerUtility\Bin\4.8.0.0\SbOEAddOn.exe
    O4 - HKLM\..\Run: [DSS] D:\WINDOWS\BBSTORE\DSS\DSSAGENT.EXE
    O4 - HKLM\..\Run: [Lexmark_X79-55] D:\WINDOWS\System32\lsasss.exe
    O4 - HKLM\..\Run: [mav_startupmon] "D:\Program Files\Common Files\WinAntiVirus Pro 2007\mav_startupmon.exe"
    O4 - HKLM\..\RunServices: [LMA Manager] lmamanager.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
    O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.imgfarm.com/images/nocache/funwebproducts/ei/SmileyCentralFWBInitialSetup1.0.0.15.cab
    O16 - DPF: {8C875948-9C60-4381-9248-0DF180542D53} - http://installs.spamblockerutility.com/installs/spamblockerutility/programs/spamblockerutility.cab
    O20 - AppInit_DLLs:
    O20 - Winlogon Notify: atntr - D:\WINDOWS\SYSTEM32\atntr.dll

    NOTE: HJT might popup an error about the AppInit_DLLs line. Ignore it and click OK to continue.

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you
    have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list
    the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just
    continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting,

    • right-click and choose copy):
    D:\Program Files\SpamBlockerUtility\Bin\4.8.0.0\SbOEAddOn.exe
    D:\Program Files\Common Files\WinAntiVirus Pro 2007\mav_startupmon.exe
    D:\Documents and Settings\Home\Desktop\update.exe
    D:\WINDOWS\repair\svchost.exe
    D:\WINDOWS\system32\atntr.dll
    D:\WINDOWS\system32\lmamanager.exe
    D:\WINDOWS\System32\lsasss.exe
    D:\WINDOWS\System32\SYMANTECAV2.EXE
    D:\Program Files\Internet Explorer\iexplore.exe.local
    D:\Program Files\Internet Explorer\wininet.dll
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But if you do get this message, please let me
    know!)

    If Killbox does not reboot just reboot your PC yourself.
    After reboot locate the below folder and delete if found:
    D:\Documents and Settings\Home\Application Data\WinAntiVirus Pro 2007
    D:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2007
    D:\Program Files\Common Files\WinAntiVirus Pro 2007
    D:\Program Files\SpamBlockerUtility
    D:\Program Files\Viewpoint

    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per
    step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  5. BA_09

    BA_09 Private E-2

    Okay thanks, I was just reviewing the instructions and realized I had not run the spybot when I was supposed to... sorry. I just ran it, but the log is too big at 288k; so it has been split up into two different reports.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We do not request Spybot logs and normally do not require them unless it cannot remove something.
     
  7. BA_09

    BA_09 Private E-2

    Thanks, it appears to be working right now! Attached are the new logs as requested.

    When I was fixing the problems in HJT,
    could not be found.

    and when I was deleting folders,
    could not be found.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you miss the below while fixing things?
    O4 - HKLM\..\Run: [LMA Manager] lmamanager.exe

    This is a worm! See: http://www.sophos.com/virusinfo/analyses/w32tilebotad.html



    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O4 - HKLM\..\Run: [LMA Manager] lmamanager.exe
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "D:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
    O8 - Extra context menu item: &Search - http://edits.mywebsearch.com/toolbaredits/menusearch.jhtml?p=zuzeb004YYUS_ZNxmk772DFUS

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete
    D:\WINDOWS\system32\lmamanager.exe
    D:\WINDOWS\system32\rem1.dll
    D:\WINDOWS\system32\ps.dat

    Now run Ccleaner

    Now reboot in normal mode

    Now attach the below new logs and tell me how the above steps went.

    1. ShowNew
    2. HJT


    Make sure you tell me how things are working now!
     
  9. BA_09

    BA_09 Private E-2

    I didn't think I missed it, but I must have. I remember checking it, but it must have unchecked somehow. I did everything else below except delete D:\WINDOWS\system32\lmamanager.exe it wasn't there. Thanks
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  11. BA_09

    BA_09 Private E-2

    Thanks Chaslang for all that you do!
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds