Changing file association

Discussion in 'Malware Help (A Specialist Will Reply)' started by tm711, Feb 13, 2009.

  1. tm711

    tm711 Corporal

    Winpatrol keeps posting the following:

    Scotty has detected a change to one of your file associations .DOC

    The program currently associated is MicroSoft Office XP.
    C:\Program Files\Microsoft Office\Office 10\WINWORD.EXE/n/dde
    to
    C:\Program Files\Office\WINWORD.EXE/n

    I went to Add/Remove programs and this is all the stuff I have that looks like it could be relevant:
    Microsoft Office 2000 Professional
    Microsoft Word 2002
    Microsoft word 2002 Setup Launcher
    Microsoft Work Suite Add-on for Microsoft Word

    What is going on here? Do I have too many versions of Word installed - if I do I have no idea how that happened. Do I uninstall one? which one? how do I do that?

    So far every time that Winpatrol ask I have denied the change.

    I have noticed no other problems. My operating system is XP home edition,; computer is about 6 years old.
     
  2. tm711

    tm711 Corporal

    I thought it might be useful if I went through all the steps in Read Me First.

    Spybot found nothing.

    Mbam found one thing and fixed it.

    While restarting BOClean reported the following: RSK_HIDESAA malware stopped by BOClean. C;\32788R22FWJW\HIDEC>EXE contained the trojan.........trohjan was shut down.

    Logs are attached.
     

    Attached Files:

  3. tm711

    tm711 Corporal

    Combofix log attached
     

    Attached Files:

  4. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Pre-Instructions:
    1. First, please disable any antivirus and/or antispy programs you have installed so they will not block this fix.
    2. Print out these instructions or save them to a text file so that you can operate with All Browser Windows CLOSED.

    Step 1:
    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    Again, make sure ALL browser windows are closed when you click FIX.

    Step 2:
    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Step 3:
    Default Security Settings

    To Default Security Settings:
    For Internet Explorer 6 users:
    Click Start > Run > type inetcpl.cpl and press ENTER, when Internet Properties comes up navigate to the Security Tab and click Default Level for the following:
    • Internet
    • Local Intranet
    • Trusted Sites
    • Restricted Sites.
    Click OK to exit.

    For Internet Explorer 7 users:
    Click Start > Run > type inetcpl.cpl and press ENTER, when Internet Properties comes up, navigate to the Security Tab and simply click the "Reset all zones to default level" button. Click OK to exit.

    NOTE: If it's "grey" then it's already at the default level.​
    Step 4:
    Please download ATF-Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF-Cleaner menu to close the program.​

    Step 5:
    Finally, run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now.
     
  5. tm711

    tm711 Corporal

    I went through all steps you described. I think everything went ok except for two things.

    1) I expected the text to merge with Combofix -sort of disappear into the Combofix icon- it did not. I tried it three times, and finally I just ran it (with the text icon on top of the Combofix icon).

    2) I thought I had all the anti-malware off, but I missed BOClean - sorry -
    BOClean posted this in its report:

    02/15/2009 10:55:55: RSK-HIDE.SAA VARIANT STOPPED BY BOCLEAN!
    Trojan horse was found in memory.
    contained the trojan.
    Active trojan horse WAS shut down. System safe.
    Logged in user:D

    ------------------------------
    02/15/2009 10:58:49: RSK-HIDE.SAA MALWARE STOPPED by BOCLEAN!
    Trojan horse was found in memory.
    C:\COMBOFIX\HIDEC.EXE contained the trojan.
    Active trojan horse WAS shut down. System now safe.
    Logged in user: D

    I hope this did not screw things up!

    I noticed that Combofix installed the recovery console. If this is something you did in the text - thank you, thank you, thank you.

    Logs are attached.

    Thank you for your assistance.
     

    Attached Files:

  6. tm711

    tm711 Corporal

    The more I thought about it, the more I figured that BOClean did screw up the Combofix scan. I reran Combo fix and MgLogs. New logs attached.
     

    Attached Files:

  7. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    First, are you familiar with the AskBar?? Did you install it?

    Second, copy the contents of the below Quote Box to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file fixme.reg and then click save it to your C:\ drive. Should be (C:\fixme.reg)
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will pop up for you to view when you login after reboot. Please attach this log to your next post.
    Finally, run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now.
     
  8. tm711

    tm711 Corporal

    I installed AskBar. It came with Zone Alarm. I figured I would give it a try.

    The first two times I tried to run Avenger it failed. This was my fault. I had not done the cut and paste properly.

    The third time, it asked to run on reboot and I said yes. At reboot the text file popped up almost instantly.

    Also at reboot Winpatrol said that it had found an iehelper object that was asking permission to run, but it could not identify it (no company name, etc), so I denied it. I hope this did not screw up Avenger! Come to think of it just a few minutes before windows updates had been installed.

    Logs attached.
     

    Attached Files:

  9. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Your logs are clean! If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware & Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources (except a little disk space) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\combofix folder from combofix (if it exists)
    3. If we had you run Avenger, you can delete all files related to Avenger now.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to Add/Remove Programs and uninstall HijackThis.
    8. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    9. If you are running Windows Vista, Windows XP or Windows ME, you need to follow the below:
      • Refer to the cleaning steps in the READ ME for your Windows version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  10. tm711

    tm711 Corporal

    Thank you! In particular I am impressed with your second postinging where you made sure I was clean of virii. Major Geeks is the best! I used the computer yesterday afternoon, and it did seem to be faster.:)
     
  11. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    You're Welcome!:major
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds