Need Help with Downloader Trojan

Discussion in 'Malware Help (A Specialist Will Reply)' started by gregowen, Feb 7, 2008.

  1. gregowen

    gregowen Private E-2

    I have been running and building computers since they were first introduced and nothing has ever got me more infuriated than the Downloader Trojan so in desperation I have turned to you guys for help.

    I cant find out how to remove it despite following all the suggestions on these pages and elsewhere. The thing self perpetuates and I cant see where from. Sometimes its the Vundo trojan, then last time the Trojan Panddos. Symtoms include painfully slow performance, NAV not working, frequent failure of my Avant Browser and windows error messages saying either win.exe or avp.exe have encountered a problem and need to close. Once these appear the system usual just shuts down. Safe mode seems to be ok at least. I'm running XP Pro SP2 version.

    So far, Norton AV 2007 finds it (until I reboot at least) and then it reappears.
    I have also run Ad-aware 2007, Spybot S&D, PC Bug Doctor, AVG Anti spyware, Root kit buster besides the usual disk clean up, Ccleaner etc. And yes I have followed the instructions about "read this first" and done that. I have disabled Messenger also. It was preceeded by and Infostealer.gampass problem which I did at least manage to finally beat.

    I have run "Highjack This" and found a number of items to delete along with a few items of rogue code in the registry but I am at the limit of my expertise now so any help would be great.

    Cheers in anticipation.
     
  2. abri

    abri MajorGeek

    Hi gregowen!
    Welcome to Major Geeks!


    Please work through the instructions in the READ & RUN ME FIRST and attach the requested logs with your next post. From what you're telling, it sounds like it will be possible for us to create a fix specific to your computer and problems, but to do that we need to see the logs. When you work through this, please be sure to put your computer in normal startup mode using msconfig.
    abri
     
  3. gregowen

    gregowen Private E-2

    Many thanks for the offer of help. I have attached the three files for your consideration and thoughts.

    My pc is so sick it would not run the tests with MSconfig running in Normal Mode as it switches off before completion so it was running in diagnostic mode.

    AVG found and quarantined the Downloader.delf.enm trojan located in the C:/System Volume Information folder (which I have not seen before).

    This virus appeared last Saturday as I settled down to watch the Rugby on a Chinese P2P website on a player I downloaded called Uusee. I should have known better.

    Many Thanks in Anticipation.
     

    Attached Files:

  4. abri

    abri MajorGeek

    Hi greg,

    We need to do things in several steps. Please begin as follows:


    1) To begin with, please disable Spybot's TeaTimer. This can be done two ways.
    First:
    • Right-click the Spybot Icon in the System Tray (looks like a blue/white calendar with a padlock symbol)
    • If you have the new version 1.5, Click once on Resident Protection, then Right click the Spybot icon again and make sure Resident Protection is now Unchecked. The Spybot icon in the System tray should now be now colorless.
    • If you have Version 1.4, Click on Exit Spybot S&D Resident
    or Second, For Either Version :
    • Open Spybot S&D
    • Click Mode, choose Advanced Mode
    • Go To the bottom of the Vertical Panel on the Left, Click Tools
    • then, also in left panel, click Resident shows a red/white shield.
    • If your firewall raises a question, say OK
    • In the Resident protection status frame, Uncheck the box labeled Resident "Tea-Timer"(Protection of over-all system settings) active
    • OK any prompts.
    • Use File, Exit to terminate Spybot
    2) Go to add/remove programs and uninstall the below:

    ewido anti-malware <--- outdated and replace by AVG AS
    J2SE Runtime Environment 5.0 Update 2
    J2SE Runtime Environment 5.0 Update 4
    Java 2 Runtime Environment, SE v1.4.2_07
    Java(TM) 6 Update 3
    Prevx1"<--- just installed. probably in an attempt to fix issues. It will get in your way.
    Spybot - Search & Destroy 1.4 <--- old verions should be removed

    3) Reboot after uninstalling the above.

    4) Install the current version of Sun Java from: Sun Java Runtime Environment


    5) Download and install Erunt. Use it to create a backup of your registry.

    6) Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    7) Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    8) Please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF Cleaner menu to close the program.


    9) Please run C:\MGtools\GetLogs.bat and attach the fresh MGlogs.zip it generates along with the Avenger log. Also, please let me know if you got a success message on the registry patch (regedit4).


    Let me know how things are running now?

    abri
     
  5. gregowen

    gregowen Private E-2

    Abri

    Many thanks for the prompt response. I am very grateful to you.

    I followed your instructions. I did have a problem uninstalling Spybot S&D 1.4 because it said the installation was corrupt. The same happened with Ewido.

    Everything else went well, the registry patch worked ok.

    However, upon reboot, AVG did announce the quarantine of m1.exe after it discovered the downloader.delf.enm trojan after I carried out your instructions.

    New logs are attached.

    Once again, many thanks for your help

    Greg
     
  6. gregowen

    gregowen Private E-2

    I think I forgot to attach the files. Here they are

    Greg
     

    Attached Files:

  7. abri

    abri MajorGeek

    Hi greg,
    The avenger you posted is the program, not the log. Please look for a file called Avenger.txt. You should be able to attach that without zipping it.
    Thanks.
    abri
     
  8. gregowen

    gregowen Private E-2

    Apologies for my mistake.

    New file is attached.

    Greg
     

    Attached Files:

  9. abri

    abri MajorGeek

    Hi greg,

    We still have to get your computer into normal startup mode so we can get out the startup items that are a problem.

    1) Please disable your guest account if this has not already been done.

    2) What are the following files?

    C:\Documents and Settings\Greg\My Documents\
    7290e_~1.exe Feb 2 2008 34862984 "7290E_PBrER4.1.0_rel556_PL1.8.0.154_A4.1.0.377_AWS.exe"
    7290e_~2.exe Feb 2 2008 21088144 "7290E_PBr4.0.0_rel274_PL1.8.0.129_A4.0.0.219-Cingular.exe

    C:\Documents and Settings\Greg\Desktop\
    quickb~1.tor Jan 26 2008 46326 "QuickBooks.Premier.2007 + Crack.torrent"
    QUICKB~1.200 Jan 26 2008 "QuickBooks.Premier.2007 + Crack"

    3) Run C:\MGtools\analyse.exe by double clicking on it. This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://channels.aimtoday.com/search/aimtoolbar.jsp
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = \blank.htm
    F2 - REG:system.ini: UserInit=C:\WINDOWS\SYSTEM32\Userinit.exe,,C:\WINDOWS\system32\host.exe
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

    Do the following belong to programs you know or want to keep? If not, please fix them as well.


    O16 - DPF: {0D859AF0-C75E-11D4-B760-00E0B81077E8} - http://mfr.mlxchange.com/Control/FileCruiser.cab
    O16 - DPF: {16FD824B-8E7B-11D2-9855-00802962956C} - http://mfr.mlxchange.com/Control/Specfile.cab
    O16 - DPF: {284DAE3C-A691-11D3-AD58-00E0B8107A24} (SISCtrl Class) - http://mfr.mlxchange.com/Control/SISC.cab
    O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} - http://lads.myspace.com/upload/MySpaceUploader1005.cab
    O16 - DPF: {4989312D-58CF-11D5-A7D7-00E02911103E} (Interealty MultiSelect) - http://mfr.mlxchange.com/Control/MultiSelectComboBox.cab
    O16 - DPF: {5EB6A98B-F75B-4AC7-821D-BAD2C29D18C2} - https://onlineservice4.progressivedirect.com/SelfService.Web/TalkToMe/cv/CVALAX.CAB
    O16 - DPF: {6FD482A3-7B57-438B-B040-52CAA30147EE} (MLXchange Client Utils) - http://mfr.mlxchange.com/Control/MLXClientUtils.cab
    O16 - DPF: {78523E50-56EB-11D3-B739-CAA1986A452F} - http://mfr.mlxchange.com/Control/LiteGrid.cab
    O16 - DPF: {83AB6E4D-CDD7-11D3-B5E7-00104B9AFF6E} - http://mfr.mlxchange.com/4.2.05.20/Control/IRCSharc.cab
    O16 - DPF: {C5E28B9D-0A68-4B50-94E9-E8F6B4697516} (NsvPlayX Control) - http://www.nullsoft.com/nsv/embed/nsvplayx_vp6_mp3.cab
    O16 - DPF: {F060A272-A18A-11D3-B75B-00E0B81077E8} - http://mfr.mlxchange.com/Control/AspCustomCtrls.cab

    After you click fix, just close hijackthis.


    4) Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    5) Run CCleaner at the default setting with the Windows tab as the one on top.


    6) Please run C:\MGtools\GetLogs.bat and attach the fresh MGlogs.zip it generates along with the Avenger log.


    Let me know how things are running now?

    abri
     
  10. gregowen

    gregowen Private E-2

    Abri

    I disabled the guest account (plus one other I was unaware of) so now there is just me as administrator and the guest is off.

    I deleted all the files listed under item 2. They were software files for my blackberry.

    I ran highjack this and clicked the items and then on "fix this" including all the O16 entries as I can easlily add them later.

    I then ran The Avenger an copied the text as before and rebooted the machine.

    On reboot, the MSconfig has selective startup and all services running (i think I did that earlier). One box was unchecked for AppleMobile Device Service.exe so I checked that and continued.

    There are now repeated findings of the Trojan by AVG and an error message came up saying Internet Explorer needs to close even though it wasn't running. Win.exe error messages and avp.exe messages keep appearing.

    Mg tools took ages to complete.

    Greg
     

    Attached Files:

  11. abri

    abri MajorGeek

    Hi Gregowen,

    I think your getting the safemode startup menu may be something in your boot.ini file. We'll look at that next.

    Please do the following first:


    1) To begin with, please disable Spybot's TeaTimer as this can block any fixes we try to do. This can be done two ways.
    First:
    • Right-click the Spybot Icon in the System Tray (looks like a blue/white calendar with a padlock symbol)
    • If you have the new version 1.5, Click once on Resident Protection, then Right click the Spybot icon again and make sure Resident Protection is now Unchecked. The Spybot icon in the System tray should now be now colorless.
    • If you have Version 1.4, Click on Exit Spybot S&D Resident
    or Second, For Either Version :
    • Open Spybot S&D
    • Click Mode, choose Advanced Mode
    • Go To the bottom of the Vertical Panel on the Left, Click Tools
    • then, also in left panel, click Resident shows a red/white shield.
    • If your firewall raises a question, say OK
    • In the Resident protection status frame, Uncheck the box labeled Resident "Tea-Timer"(Protection of over-all system settings) active
    • OK any prompts.
    • Use File, Exit to terminate Spybot
    2) Next, please tell me what's in the following folder? (don't open any files)

    100OLYMP


    3) If the following item is one that is familiar to you and a service you want, then skip this step 3:
    Quote:
    O23 - Service: Network Connections Management (RemoteStorage) - Unknown owner - C:\WINDOWS\system32\ma[1].exe (file missing)
    If you do not know what it is, continue as follows to disable it:
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Network Connections Management
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste RemoteStorage into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.

    4
    ) [FONT=&quot]Now scan with (this is analyse.exe in the MGTools folder under C) and check the boxes for the following entries[/FONT][FONT=&quot]:[/FONT]
    [FONT=&quot]( Make sure ALL browser windows are closed when you click FIX )[/FONT]

    O23 - Service: Network Connections Management (RemoteStorage) - Unknown owner - C:\WINDOWS\system32\ma[1].exe (file missing)

    After you click fix, just close hijackthis.


    5) Now rerun Avenger as you did in step 8 of post 4 only this time use the contents of this box:
    Quote:
    Files to delete:
    C:\Start_.cmd
    C:\WINDOWS\system32\wincom.exe
    c:\win.exe
    c:\avp.exe
    C:\WINDOWS\system32\msapi32.dll
    6) Run CCleaner in the default setting with the Windows tab as the one on top.

    7) Please run C:\MGtools\GetLogs.bat and attach the fresh MGlogs.zip it generates along with the Avenger log.


    Let me know how things are running now?

    abri
     
  12. gregowen

    gregowen Private E-2

    Abri

    So here's what happened.

    1) Turned off Tea Timer ..OK

    2) The folder is one of mine, contains pictures taken from my Olympus Digital Camera.

    3) Went into service.msc and successfully disabled Network Connections Management.. OK. Also disabled another line of code that was part of the virus and had a bunch of symbol writing... OK

    Ran HJT and deleted NT Service/ Remote Storage as advised .. OK

    4) Ran analyze.exe .. OK file attached.

    The O23 line to which you refer was not there. I think I already deleted it last night. - That was part of the trojan. esp the file ma[1].exe

    5) Ran avenger... OK file attached.

    6) Ran Ccleaner ..OK

    7) Ran MGtools and the zip file is attached.

    AVG Is still finding the malware and the win.exe and avp.exe Windows error messages still appear but less than they did.
     

    Attached Files:

  13. gregowen

    gregowen Private E-2

    Now I am unable to upload the MGlogs.zip file. Says I already did it.
     
  14. gregowen

    gregowen Private E-2

    OK, here it is.
     

    Attached Files:

  15. gregowen

    gregowen Private E-2

    Abri

    In addition, I have attached a copy of the dialogue box for the extra service I disabled in services.msc just in case it helps you to find the bug.

    Many Thanks

    Greg
     

    Attached Files:

  16. abri

    abri MajorGeek

    Hi greg,

    That's a weird file in your screen shot for sure. I need to determine the best way to get rid of it as it seems to also be showing up in your msconfig services. While you're waiting, please do the following and attach the requested logs.

    Teatimer is still showing as being active. Please disable it as per the instructions in the previous post and check to make sure it stays inactive, also after you reboot. Otherwise it may be necessary to uninstall Spybot until we've finished.

    1) Please run Avenger again, but before you start, check the new file I added which comes from your Desktop called dss.exe and see if it's something you're familiar with and want. If so, remove it from the Avenger fix. Also, I'm not sure what the folder is under Folders to delete:, but it looks like something which needs to be deleted as well. Please check both of these before continuing.
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    2) Now run CCleaner at the default setting with the Windows tab as the one on top.


    3) And finally run C:\MGtools\GetLogs.bat and attach the fresh MGlogs.zip it generates along with the Avenger log.

    abri
     
  17. gregowen

    gregowen Private E-2

    Abri

    Logs attached. Her is whats happening: -

    1. Stopped Tea Timer in startup. OK

    2. Ran Avenger - Log attached.

    3. Ran CCleaner

    4. Ran MG Tools - Log Attached.

    I had manually removed the Hide IP file off the desktop as I had placed it there before running Avenger. DSS.exe was another spyware cleaner I had downloaded before and that has now gone too.

    Even though win.exe and avp.exe were deleted, they are back again and AVG reports the following Malware on reboot: -

    C:/Program Files / Common Files / M[1].exe
    C:/Program Files / ver.txt

    Other notable observations are that I am unable to re-install Norton Antivirus. I had taken this off some while ago to prevent it getting in the way of the clean up. I still have on the computer Ewido. It s not possible to uninstall as the installation files are corrupt. I can manually terminate the process though. I deleted one or two other files off my desktop that were not needed.

    The files relating to the Apple Mobile Device are not mine and can go.

    When I open MSConfig and start up in diagnostic mode, there are no problems.

    On another note, the computer no longer switches off and starts and runs much faster - so for that I thank you again.

    Greg
     

    Attached Files:

  18. abri

    abri MajorGeek

    Hi gregowen,

    Avenger was not able to delete the keygens folder on the desktop. Can you see it there? If so, please delete it.

    Next run CCleaner at the default setting with the Windows tab as the one on top.

    Then run Combofix again.

    Your MGlogs.zip only includes one log (runkeys) and is missing all the rest. Please rerun the GetLogs.bat (in the MGTools folder) and make sure to allow it to run all the way to the end. You'll get a message like click on any key to close the window and produce the logs. The logs will be located directly under C.

    Attach the Combofix and MGlogs.zip with your next post.

    Does AVG report quarantining or deleting the files it's finding? Do they just come back again after that? Or can AVG not delete them?

    The reason you're having trouble with uninstalling Norton's (which is behind the problems reinstalling it) is because it was uninstalled without msconfig being in normal startup mode. This leaves a lot of entries behind. You have quite a few symantec services still running. Before you can fix this, we have to get your msconfig back to where it needs to be.
    Thanks.
    abri
     
  19. gregowen

    gregowen Private E-2

    Hi Abri

    1) The file to which you refer has been deleted previously by me (the keygens one) and I doubt was related.

    2) The computer is running in Normal Start Up Mode in MSConfig and has been for some time.

    3) I ran both CCleaner and Getlogs.bat and the two files are attached.

    4) AVG Does report that the infected files are cleaned and quarantined but I have to delete them manually. Even so they still come back during the same session.

    Greg
     

    Attached Files:

  20. gregowen

    gregowen Private E-2

    Abri

    I think I found the little bleeder !!!

    Check the Combofix.txt file and in particular the following three changes made on 02/02/2008 (exactly the time of the infection)

    2008-02-02 14:05 . 2008-02-02 14:05 280 ---hs---- C:\WINDOWS\system32\xhqq.cfg
    2008-02-02 14:05 . 2008-02-02 14:05 144 ---hs---- C:\WINDOWS\system32\niluw.cfg
    2008-02-02 14:05 . 2008-02-02 14:05 144 ---hs---- C:\WINDOWS\system32\naixuhz.cfg

    When I google these file names there are references to a trojan. When I searched for one of them on my PC the two locations appeared (I attached the screen shot so you can see). If that is so, should we not just delete them?

    I hope this is it. :)

    Greg
     

    Attached Files:

  21. gregowen

    gregowen Private E-2

    Here are the two other screen shots for the last comments.

    Greg
     

    Attached Files:

  22. abri

    abri MajorGeek

    Hi greg,

    Yes, you can delete them, but use Avenger as you did in post 16, only this time use the contents of this box:
    After running Avenger, please run CCleaner in the default setting with the Windows tab as the one on top.


    I would like for you to rename the following file C:\WINDOWS\system32\drivers\pfvaqyvm.sys to pfvaqyvm.sys.zzz

    Try rebooting your computer a few times and see if you notice problems with any of your programs. If not, you can also delete this.

    Please attach the Avenger log with your next post.

    Thanks.
    abri
     
  23. gregowen

    gregowen Private E-2

    Abri

    1) The avenger log failed to materialise but the new files have gone.

    2) I found no trace anywhere of pvfaqyvm anywhere.

    3) I did manage to remove norton finally using diagnostic set up in MSConfig

    4) Found some more lines of junk code an the Registry and deleted them too.

    5) I disabled all windows services and start up together with system.ini and win.ini (except for avg) and the win.exe and avp.exe still appeared as did wincom.exe even though I used avenger to delete them first.

    6) Highjack this and Avenger latest logs attached

    Any ideas?

    Greg
     
  24. gregowen

    gregowen Private E-2

    Attached Files:

  25. abri

    abri MajorGeek

    Hi greg,
    This looks like the wrong Avenger log. Did you try to delete those files I asked you to delete?
    abri
     
  26. gregowen

    gregowen Private E-2

    Abri

    I did but the avenger log came up as error.

    This is a later one I ran after with my attempt to re-delete others just in case they came back.

    Greg
     
  27. abri

    abri MajorGeek

    Hi greg,
    did you try the instructions you posted the link for?
    Please run GetLogs.bat which can be found in the MGTools folder and then post the logs called MGlogs.zip which are located directly under C.
    Thanks.
    abri
     
  28. gregowen

    gregowen Private E-2

    Abri

    I read the pages where the link goes and was under the impression it explain how the virus infects the computer and not how to rid it from the pc. Was I wrong?

    I have attached the logs for you.

    Thanks for your patience again.

    greg
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    While working on fixing your malware problems, please avoid downloading and installing anything on your PC other then what we are asking you to install. Also do not run any steps on your own as it can only cause confusion for us when we see things going on that don't make sense.

    Please first uninstall ewido anti-malware. It is old and out of date and Ewido was purchased by Grisoft and has been replaced by AVG Antispyware which you already have installed.

    I'm also going to have you stop PrevxCSI from starting up by removing the startup entry with HijackThis further down in these instructions. I want to make sure that PrevxCSI is not getting in our way.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    In the below instructions where I say to look for COM+ Windows System, make sure you select ONLY THIS EXACT SERVICE name if found. DO NOT confuse it with two other similarly named Windows services named COM+ Event System and COM+ System Application.
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to COM+ Windows System
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run C:\MGtools\analyse.exe which is really HijackThis, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteWinCOM into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Please run C:\MGtools\analyse.exe by double clicking on it. This is really HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for all occurrences of the following processes and one at a time kill them by selecting it and then click Kill process. Then click yes. ( If they startup again try killing them again one more time and just ignore them restarting and move on to the next step. )

    c:\win.exe
    c:\avp.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - Startup: PrevxCSI.lnk = ?

    After clicking Fix, exit HJT.


    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    Driver::
    wincom
    pxark
    bdwwnarb
    bccpukbn
     
    File::
    C:\Program Files\Common Files\m1.exe
    C:\WINDOWS\system32\wincom.exe
    C:\WINDOWS\system32\winsys.sys
    C:\WINDOWS\system32\winsys.inf
    C:\WINDOWS\system32\drivers\pxark.sys
    C:\WINDOWS\system32\drivers\bdwwnarb.sys
    C:\WINDOWS\system32\drivers\bccpukbn.sys
    C:\WINDOWS\system32\drivers\winsys.sys
    C:\WINDOWS\system32\drivers\winsys.inf
    C:\win.exe
    C:\avp.exe
    C:\wincom.exe
    C:\winsys.sys
    C:\winsys.inf
    C:\Program Files\jtvvbxwo.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\ecff_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\BBED60.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\1f9e_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\BC1664.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\2dd6_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\C03283.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\48ab_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\C05DF8.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\ca7_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\fe3_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\5724_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\50c6_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\C15614.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\C15633.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\C15E42.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\C15EBF.dmp
    C:\Documents and Settings\Greg\Local Settings\Temp\ae1e_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\ffe4_appcompat.txt
    C:\Documents and Settings\Greg\Local Settings\Temp\C94DA1.dmp
     
    Registry::
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WinCOM\0000\Control]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WinCOM\0000]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinCOM\Security]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinCOM\Enum]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WinCOM\0000]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinCOM\Security]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WinCOM\0000]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\WinCOM\Security]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WinCOM\0000\Control]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WinCOM\0000]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WinCOM]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinCOM\Security]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinCOM\Enum]
    [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinCOM]
     
    DirLook::
    C:\WINDOWS\system32\backuped
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it.

    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  30. gregowen

    gregowen Private E-2

    I tried to uninstall Ewido using Control panel add / remove programs and received a error message (see attcahed screen shot). The same error message appears when trying to remove a number of diferent programs and has done since infection.

    I will avoid doing anything else until I receive further instructions.

    Appreciate your help.
     

    Attached Files:

  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then just skip that step and continue.
     
  32. gregowen

    gregowen Private E-2

    Hi

    I followed the instructions and attached the files.

    When I reached the point about Killing the win.exe process and avp.exe there were two instances of win.exe and none of avp.exe even thought the file is still there located at C:\avp.exe

    It did not request a reboot after completion of HJT but did after running Combofix which I allowed it to do.

    Getlogs.bat took ages to complete after re-start and running Ccleaner first and the pc shut down half way through. I rebooted and ran through the entire process again but this time the it did ask to reboot after HJT first run.

    The logs attached are the original running of Combofix and the second successful running of Getlogs.bat

    There are numerous reports by AVG of Malware still running. I will attached screen shots in my next post.

    Greg
     

    Attached Files:

  33. gregowen

    gregowen Private E-2

    Here are the AVG malware findings flashing up on the screen.
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you have it Quarantine these? You said "numerous reports" this is only two items. Were there more?

    Do you need LogMeIn to be running right now? Would it be a problem to have this uninstalled while we work thru your malware issues? It is strongly recommended that you do not connect to this PC from another PC anyway since you could spread this infection. So if it is okay with you to uninstall it, please do it right now and then continue.

    Much of what we attempted to fix has come back and has spawned some new services for the malware. We will need to try again.


    Please run C:\MGtools\analyse.exe by double clicking on it. This is really HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for all occurrences of the following processes and one at a time kill them by selecting it and then click Kill process. Then click yes. ( If they startup again try killing them again one more time and just ignore them restarting and move on to the next step. )

    c:\win.exe
    c:\avp.exe

    Then just exit HijackThis.


    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    Driver::
    ewido
    kavshell
    msskye
    Ndisprot
    nuhlefkm
    qraxrnhr
    QJ
    QQHX
    WinCOM
    ZX
     
    DirLook::
    C:\WINDOWS\TEMP
    C:\WINDOWS\vf_hip
     
    File::
    C:\Program Files\ver.txt
    C:\Program Files\Common Files\m1.exe
    C:\WINDOWS\tmfcxglg.txt
    C:\WINDOWS\pfirewall.log
    C:\WINDOWS\pfirewall.log.old
    C:\WINDOWS\system32\kavshell.sys
    C:\WINDOWS\system32\wincom.exe
    C:\WINDOWS\system32\drivers\pxark.sys
    C:\WINDOWS\system32\drivers\bdwwnarb.sys
    C:\WINDOWS\system32\drivers\bccpukbn.sys
    C:\WINDOWS\system32\drivers\hybyujxv.sys
    C:\WINDOWS\system32\drivers\msaclue.sys
    C:\WINDOWS\system32\drivers\pfvaqyvm.sys
    C:\WINDOWS\system32\drivers\winsys.inf
    C:\WINDOWS\system32\DRIVERS\winsys.sys
    c:\win.exe
    c:\win.exe
    c:\win.exe
    c:\avp.exe
    c:\avp.exe
    C:\wincom.exe
    C:\winsys.sys
    C:\winsys.inf
    C:\Documents and Settings\Greg\Local Settings\tmp5D7.tmp
    C:\Documents and Settings\Greg\Local Settings\tmpB.tmp
    C:\Documents and Settings\Greg\Local Settings\tmp8.tmp
    C:\Documents and Settings\Greg\Local Settings\Temp\fla3B.tmp
     
    Folder::
    C:\Documents and Settings\Greg\Application Data\PrevxCSI
    C:\Program Files\ewido anti-malware
    C:\Program Files\PrevxCSI
    C:\WINDOWS\system32\backuped
     
    Registry::
    [HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
    "DisableRegistryTools"=-
    [HKEY_LOCAL_MACHINE\software\Microsoft\windows\currentversion\Explorer\ShellExecuteHooks]
    "{54D9498B-CF93-414F-8984-8CE7FDE0D391}"=-
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.


    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Administrator\Local Settings\Temp

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it.

    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
    Last edited: Feb 17, 2008
  35. gregowen

    gregowen Private E-2

    I did uninstall LogMeIn and another remote control software (Netop) prior to running the fix.

    There are numerous reports of Malware, each one I quarantine. AVG Has 44 at last count and I go in and delete them from quarantine too.

    1) I did manage to kill the two processes using analyse prior to running the rest.

    2) Combofix went as normal after I had to install the latest version as the old one had expired. On reboot the following messages came up. Internet explorer encountered a problem and needs to close, The warning message about the privacy icon, and a windows defender message about blocking or unblocking windows live messenger (i said to keep blocking for now).

    3) Installed (or rather reinstalled Sunjava)

    4) Deleted the temp folders.

    5) Ran Ccleaner

    6) Ran Getlogs .bat

    Two things were odd. Half way through Getlogs.bat a message comes up saying the system needs to restart in order for the infection to clear and the other was a folder I have not seen before in C:\documents and settings \ local service\ANONYMOUS LOGONS DOCUMENTS

    The contents of this file is a desktop.ini a copy of which is attached just in case.

    There are the usual Malware reports by AVG on startup so I guess its still there.

    Greg
     

    Attached Files:

  36. gregowen

    gregowen Private E-2

    Here are the other attachments
     

    Attached Files:

  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It would be more helpful if you attached a log so I could see what is being found.

    Your ComboFix log is incomplete which indicates that it never finished running properly. Please run the procedure again but this time just leave out the reinstall of Sun Java. Make sure that you allow ComboFix to run after reboot and do not interrupt it. Do not run anything else until it finishes and shows you the log. Also add the below folder to the list to delete all files from:

    C:\Documents and Settings\Greg\Local Settings\temp

    Part of what we are fighting is this: http://www.sophos.com/virusinfo/analyses/w32sdbothh.html

    I would also like you to run this before running GetLogs.bat: SUPERAntiSpyware - running & getting a log and attach the SASlog.txt file that is requested. Then get the new MGlogs.zip file by running GetLogs.bat.

    Hopefully you meant you deleted the files from the temp folders. ;)

    Only a few minor things would be automatically deleted while running GetLogs.bat and none of these would require a reboot nor would a request for reboot be issued. Are you sure that you waited for ComboFix to finish running before you ran GetLogs.bat? When ComboFix reboots your PC, it will run again after reboot to finish cleaning and to create a log and this can take awhile to finish. During that time, nothing else should be run. ComboFix normally even pops up a message to tell you this.

    The C:\documents and settings\local service\ANONYMOUS LOGONS DOCUMENTS may be from using LogMeIn.
     
  38. gregowen

    gregowen Private E-2

    Here is one report from AVG and a snap of the current files in quarantine.
     

    Attached Files:

  39. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please complete the instructions given in my last message. (Message # 37).
     
  40. gregowen

    gregowen Private E-2

    Here are the reports. I have tried the combofix log twice and both times it gives this abbreviated report. I have reinstalled combofix also without success however, it does perform normally and goes through the re-boot process and finishes after restart as it should.
     

    Attached Files:

  41. gregowen

    gregowen Private E-2

    Finally managed to get MGlogs to work properly (I hope)
     

    Attached Files:

  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  43. gregowen

    gregowen Private E-2

    MGlogs and results from GMER attached. I was not able to find a way to save the trend log but it found and fixed 31 virus files and 2 security holes and 87 files infected and fixed them all. It also suggested I run the s=test a second time which I did and it found no similar files.

    Win.exe, winlog and avp.exe still reside on my C:/ drive but AVG is no longer having to quarantine any files AFTER reboot even though win.exe appears to start on its own it is having little effect.

    I have a renewed sense of optimism now.

    :)
     

    Attached Files:

  44. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay since we have had a few issues with ComboFix not running properly, we will use Avenger to try and remove the remaining problem files.

    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this and also attach the log from Avenger.

    Make sure you tell me how things are working now!
     
  45. gregowen

    gregowen Private E-2

    That all seemed to go as planned and the logs are attached.

    AVG has no recorded infections BUT when I click Analysis and Tools there is still running avp.exe (1 instance) win.exe (4 instances and M1.exe (1 instance) even after avenger ran. There are no more pop-ups from AVG warning of malware.
     

    Attached Files:

  46. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you have any idea what the below file is that is running?
    C:\WINDOWS\system32\Rpccwcamh.exe

    Please see if you can put all of the below files into a ZIP file and attach that ZIP here:
    C:\WINDOWS\system32\Rpccwcamh.exe
    C:\Program Files\Common Files\m1.exe
    C:\win.exe
    C:\winsys.exe
    C:\winsys.inf
    C:\avp.exe
    C:\winsys.sys
    C:\WINDOWS\system32\wincom.exe


    You should print the below instructions of save them to a local file because I will be having you lock the internet with the ZoneAlarm firewall to block the trojan from having internet access. Also you should print or save the procedure from message # 44 because you will need to run it again while disconnected.

    Now I want to get an antivirus installed (if possible) and real firewall. So download and installed the below.

    AVG Free Edition - make sure you update it too!

    ZoneAlarmFree - The new 7 version of Zone Alarm free includes Zone Alarm Security Suite, making the download larger then it used to be. Do not install the Security Suite.

    Then use ZoneAlarm's ability to lock the internet. Right click on the icon in the tray and select Engage Internet Lock. Also for safety and since we will be rebooting at points below, physically unplug your cable to the internet now. This is very important!!! Do not plug it back in until requested.

    Then run a full system scan with AVG Antivirus just instralled and allow it to fix any problems it finds.

    After the above is finished run the same procedure from msg number 44 again. Run the whole procedure including creating a new MGlogs.zip file.

    Now plugin your cable to the internet and open your browser and come here and attach the new c:\avenger.txt file and the new c:\MGlogs.zip file.

    Then run C:\MGtools\GetLogs.bat again to create another MGlogs.zip file. I want to see if it changes after connecting to the internet. Attach this second MGlogs.zip file.
     
  47. gregowen

    gregowen Private E-2

    I have no idea of the the Rpccwccamh.exe file but I suspect it came with the trojan.

    The files you requested have been zipped and attached. I am just about to follow the proceedure you requested and will post the additional logs on completion.


    [EDIT BY CHASLANG] **** WARNING NOTE **** TO ALL PEOPLE READING THIS. DO NOT DOWNLOAD THIS ATTACHED ZIP FILE. IT CONTAINS LIVE MALWARE THAT WE ARE EVALUATING.
     

    Attached Files:

    Last edited by a moderator: Feb 24, 2008
  48. gregowen

    gregowen Private E-2

    Here are the first logs (prior to reconnecting to the internet)

    The others will follow shortly.
     

    Attached Files:

  49. gregowen

    gregowen Private E-2

    Here is the second Mglogs file after connecting to the internet.
     

    Attached Files:

  50. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay those all look clean! See if you can find the below file:

    C:\WINDOWS\system32\Rpccwcamh.exe

    and if it is still there rename to Rpccwcamh.xxx

    Now no matter whether you found the above or not, reboot your PC and then get another MGlogs.zip file. We are now testing to see if a reboot will cause the problem to come back. If you see any messages from ZoneAlarm or from AVG Antivirus or Antispyware about any of the files we have been trying to remove, be sure to block them and also tell me what you saw.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds