please help

Discussion in 'Malware Help (A Specialist Will Reply)' started by d8648272, Jan 17, 2007.

  1. d8648272

    d8648272 Private E-2

    I'm pretty sure that I've had somethng on my conputer all week...last night my 9 year old was standing here talking to me and porn pop-ups started. it is usually just spyware ads and movie ticket ads.
    can someone please help? I'll attach the log
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Downloading, Installing, and Running HijackThis

    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.


    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy
      • AVG Antispyware log - ONLY IF NEEDED you were not able to run CounterSpy
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  3. d8648272

    d8648272 Private E-2

    ok. went through the tutorial and now eveything is SLOW. here are the attachments.
    thanks in advance:)
     

    Attached Files:

  4. d8648272

    d8648272 Private E-2

    and the other 3.
    I REALLY hope I did this right...it took about 8 hours:D
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yeah but you are badly infected. It took me a long time to sort thru all your data and put together the below fix.

    You have LCC-Win32 C compiler installed. It was probably broken when CounterSpy put one of its library files into the Quarantine. You should restore this zlib.dll if you need it.
    After restoring this file, you should uninstall this CounterSpy trial. It will help speed things up since you already have Windows Defender protection installed.


    Uninstall the below software:
    J2SE Runtime Environment 5.0 Update 2
    J2SE Runtime Environment 5.0 Update 4
    Java 2 Runtime Environment, SE v1.4.2_06
    Kazaa Lite K++ v2.4.3 <-- should have been uninstalled in step 0 of the READ ME. Tell your kids not to use this anymore!!!


    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment


    Now let's start the real malware removal!
    • Now Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to COM+ Messages
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteCOM+ Messages into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)
    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of ddayy.dll once and then click the kill button. After you have killed all of the ddayy.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    hggedax.dll

    Next double click on explorer.exe and again click once on each instance of ddayy.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    hggedax.dll

    Next double click on iexplore.exe and again click once on each instance of ddayy.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    hggedax.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://my.myway.com/
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O2 - BHO: (no name) - {664A7BBA-92C4-4086-8B63-D029A149629E} - C:\WINDOWS\system32\hggedax.dll
    O2 - BHO: (no name) - {7DA39570-5FD2-4f18-94B4-20730CB3F727} - C:\WINDOWS\system32\thoersxd.dll (file missing)
    O2 - BHO: (no name) - {95537A6D-B923-4D8C-9F7C-DDB9AB4D7C63} - C:\WINDOWS\system32\ddayy.dll
    O4 - HKLM\..\Run: [CaISSDT] "C:\Program Files\CA\CA Internet Security Suite\caissdt.exe"
    O4 - HKLM\..\Run: [{1CD1F3FC-0958-1033-1002-020816020001}] "C:\Program Files\Common Files\{1CD1F3FC-0958-1033-1002-020816020001}\Update.exe" mc-110-12-0000272
    O4 - HKLM\..\Run: [DllRunning] rundll32.exe "C:\WINDOWS\system32\xswfwqdu.dll",setvm
    O4 - HKCU\..\Run: [LDM] \Program\BackWeb-8876480.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O20 - Winlogon Notify: ddayy - C:\WINDOWS\system32\ddayy.dll
    O20 - Winlogon Notify: hggedax - C:\WINDOWS\SYSTEM32\hggedax.dll

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    c:\program files\common files\svchost.exe
    C:\Program Files\CrazyMates\euni_bbi8015.exe
    C:\WINDOWS\SYSTEM32\hggedax.dll
    c:\windows\inf\biini.inf
    C:\WINDOWS\gendel32.exe
    c:\windows\ss3unstl.exe
    C:\WINDOWS\system32\xswfwqdu.dll
    C:\WINDOWS\SYSTEM32\wnsintsu.exe
    C:\WINDOWS\SYSTEM32\ddayy.dll
    C:\WINDOWS\SYSTEM32\hggedax.dll
    C:\WINDOWS\SYSTEM32\yyadd.tmp
    C:\WINDOWS\SYSTEM32\udqwfwsx.ini
    C:\WINDOWS\SYSTEM32\yyadd.ini
    C:\WINDOWS\SYSTEM32\SR2.dat
    C:\WINDOWS\SYSTEM32\{21EC023E-9CC4-4FF3-A982-06D2D02A6812}.dat
    C:\WINDOWS\SYSTEM32\{3478D0A3-6994-43FD-B3E6-0D3146E589A9}.dat
    C:\WINDOWS\SYSTEM32\{65C53FA3-33FB-48BA-954D-4C9F72F06BF9}.dat
    C:\WINDOWS\SYSTEM32\{8F08CFE0-D893-4E99-9F62-4A7A6D727522}.dat
    C:\WINDOWS\SYSTEM32\{E225D19A-646F-4237-B2C5-BDB30F79627C}.dat
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folders and delete if found:
    C:\Documents and Settings\Dave\Local Settings\Application Data\Viewpoint
    C:\Program Files\Common Files\Viewpoint
    C:\Documents and Settings\Dave\Local Settings\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software
    C:\Program Files\Common Files\{1CD1F3FC-0958-1033-1002-020816020001}
    c:\program files\CrazyMates
    C:\Program Files\SpywareDetector

    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Note: The LEGACY_NETWORK_MONITOR registry keys in the above patch will probably come back. We may need to make a special procedure to remove them.


    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  6. d8648272

    d8648272 Private E-2

    :) Thank you again for your help, I really appreciate it.

    here are the requested logs
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that looks much better, but as expected the Nework_Monitor stuff did not get removed from the registry.



    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to each of the following keys (one at a time) and take ownership of them (I explained how to do that further down).

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR\0000



    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Take Ownership
    • Repeat these steps for all of the registry keys given above before continue to the next steps below.
    • Now leave RegistrarLite running and continue
    • Now run the fixME.reg REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages?
    • Now in RegistrarLite click View and then Refresh
    • Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
    • If any of the keys still exist, move on down to PART 2 - Setting Permissions for Everyone below!.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the &quot;Save as&quot; type is set to &quot;all files&quot; Once you have saved it double click it and allow it to merge with the registry.

    PART 2 - Setting Permissions for Everyone
    Run the below if some of the registry keys still exist after running the above steps.

    Now I want you to use Registar Lite again to navigate to each of the below keys (one at a time) by pasting them into the Address Bar and hitting return. But this time click the Security menu item and select Edit Permissions so we can change permissions to everyone ( I describe this down below the list of registry keys).
    After click Edit Permissions , here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Nowright click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Then reboot your PC!

    Now run GetRunKey again and attach a new log!
     
  8. d8648272

    d8648272 Private E-2

    Thank you.
    none of the keys were deleted, so when I went to delete them in step 2...I got an "access denied" error (same thing happened in safe mode)
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you sure you took ownership of them?

    Try taking ownership at a higher level! That is take ownership here:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003


    Then try the registry patch!

    If that does not work, now try setting the permissions to Everyone at the higher level like above. Then try the registry patch or manual deletion. For manual deletion, remember you are not deleting at the level show above!!!!!!! You only want to delete the below keys

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR\0000

     
  10. d8648272

    d8648272 Private E-2

    that time it worked.
    her is the Renkey log.

    on a side note, things have been running MUCH better. I can't thank you enough.:)
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot the log!

    Assuming that it will be clean and if you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  12. d8648272

    d8648272 Private E-2

    I'm sorry, I thought I attached it:eek:
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    All clean! Now get started on those final steps! ;)
     
  14. d8648272

    d8648272 Private E-2

    I'll do that.
    thank you SO much for all of your hard work and time spent on this!
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds