Trojan help please

Discussion in 'Malware Help (A Specialist Will Reply)' started by page28, Jan 4, 2007.

  1. page28

    page28 Private E-2

    Day before yesterday, I downloaded new AntiVir definitions and it said my system was infected with PWS.Maran.1.4 (the fille was C:\Windows\smss.exe). I had it quarantine the file and yesterday ran an online scan with Trend Housecall. It said the infected file is windows\system32\ou9sound.dll. I rescanned with AntiVir (updated again) and it found nothing. I tried deleting the file<ou9sound.dll> (it has no version or other info other than the "created and modified dates along with size). I was denied access. I renamed it with a vir extension and immediately lost connection with the internet. Changed it and had internet access again. I then renamed it as a text file and not only lost access but had to do a system restore to change it back to a .dll. On both occasions, not only did I lose access to the internet, the guard function of AntiVir was disabled (don't know if that means anything).

    I performed all the scans and will attach them. I couldn't get a full report from Panda. I scanned 3 times and each time it disconected from the internet immediately following the scan. I went back a 4th time and scanned only until it showed the one object it found ( a cookie).

    If I can get rid of this file, I will probably need instructions on how to reconfigure my computer to get back online.

    Thank you!

    Page
     
  2. page28

    page28 Private E-2

    Here are the other 3 scan results.
     

    Attached Files:

  3. page28

    page28 Private E-2

    I thought I uplaoded all of them so here are the 3 that are missing.

    Thanks again,
    Page
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majrogeeks!

    Now download LSP - Fix

    Run LSP-Fix.

    Check the Box labeled "I know what I'm doing" and then click on the ou9sound.dll file (in the “Keep” section) to select it.

    Then, Select the >> button to move ou9sound.dll into the Remove section.

    Now, click the Finish Button. When the Repair Summary box appears, click OK.
    If it is already in the Remove section, just click Finish.

    Uninstall CounterSpy now since it is only a trial and we are finished with it.

    Now Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 10
    J2SE Runtime Environment 5.0 Update 8
    Java 2 Runtime Environment, SE v1.4.2

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe" <--- unnecessary unless you have a remote control for your PCs DVD player.
    O4 - HKLM\..\Run: [Microsoft Works Update Detection] C:\Program Files\Common Files\Microsoft Shared\Works Shared\WkUFind.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - Startup: PowerReg Scheduler V3.exe

    After clicking Fix, exit HJT.

    Now delete any of the ou9sound.dll files or whatever you renamed them to.

    Now Run Ccleaner!

    Also delete all files in the below folder except ones from the current date (Windows will not let you delete the files from the current day). If you ran CCleaner, it should have already emptied this but your previous log showed it was not emptied. There were about 2300 files using about 150 Megabyte of disk space.
    "C:\Documents and Settings\Owner\Local Settings\Temp\

    Now attach the a new HJT log

    Make sure you tell me how things are working now!
     
  5. page28

    page28 Private E-2

    Thank you, thank you, thank you!!! I think I'm in love LOL! You are the best! I'll attach the latest HJT log. Again many thanks:clap

    Page
     

    Attached Files:

  6. page28

    page28 Private E-2

    I don't understand this... I have used HJT twice to remove the following per your instructions:

    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

    But, it keeps coming back. Should I just leave it?

    Many thanks,
    Page
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Some people seem to run into this problem! Use this Disable/Remove Windows Messengerto remove it.

    Why did you skip step 3 of the READ ME? You have Symantec and Antivir install. You must uninstall one of these.

    You should also run this ViewpointKiller to remove Viewpoint Media Player

    Then attach a new log from ShowNew. How is everything working?
     
  8. page28

    page28 Private E-2

    Thanks for the reply! I was able to uninstall Windows Messenger with the tool.

    Regarding step 3 :eek: , I just missed it because I had Norton's disabled so it wouldn't conflict with AntiVir. Sorry!

    I ran Viewpoint Killer and the results were:
    Did not find the folder C:\ProgramFiles\Viewpoint\Viewpoint Media Player
    Did not find the folder C:\ProgramFiles\MetaStream
    Did not find the folder C:\Documents and Settings\AllUsers\Windows\Application Data\Viewpoint

    I also tried to have Hijackthis remove (from 023 on the HJT report) Service: Card Adaptor (NetDown)- Unknown Owner-C:Windows\smss.exe (file missing). That was the file that was originallly marked as a trojan by AntiVir. The file was quarantined and then deleted per one of the "read this first" instructions regarding emptying the quarantine files. The entry is still in the registry, but I went into services.msc and marked all to disable. I assume since the exe file was no longer on my computer, it wouldn't matter. Just made me feel better. :)

    I haven't dumped my restore points yet. I was just waiting to get everything finished. It all seems fine, but it did at the start of this mess too. But everything is updated, I think.

    Once again, many, many thanks for your help, not just for me, but for all of us who come to the support forum. I'm attaching a newfile log (check out the temp files!!).

    Page
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Service removals have to be done differently with HJT. If the O23 line is still there, do the below.
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Card Adapter
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste NETDown into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT and reboot when it tells you it needs to.
    After reboot attach a new HJT log.

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  10. page28

    page28 Private E-2

    Everything's been done including flushing the system restore and creating a new restore point. I've attached the HJT log.

    Many many thanks for all your help!!

    Page
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome! You log is clean!

    Non-Malware Tip!

    I would suggest you think about whether you really need C:\Program Files\BigFix\BigFix.exe


    It is a massive resource hog. Do you really use it? If not then uninstall it. If you do use it, reconsider whether you want it to always load at startup and only load it when you want to use it.
     
  12. page28

    page28 Private E-2

    No, I don't use it. So I uninstalled it. Thanks for the advice.

    BTW, because of the trojan, my credit card was used to start an "adult oriented" web site. So the card had to be canceled. Just glad AntiVir found the trojan and we got it off my computer.

    Page
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    Yeah there are a lot of malware infections out there whose main purpose is to steal passwords and credit card IDs.

    The ou9sound.dll file is known as PSW.Generic2.WKN and the PSW stands for Password Stealer.

    You need to also check with all you credit card companies and banks, online companies,....etc where you may do online transactions. It would be in your best interest to change all passwords and for additional security, change them from a different PC or over the phone if possible.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds