Help me see if I'm clear of trojan downloader,adirss.exe, game#.exe, etc

Discussion in 'Malware Help (A Specialist Will Reply)' started by steve-o-reeno, Mar 21, 2007.

  1. steve-o-reeno

    steve-o-reeno Private E-2

    I would appreciate any help I can get in determining if my computer is clean. I picked up some nasties a while back which I would be glad to be rid of. The first items I noticed running on my PC were "adirss.exe" and several "game#.exe" programs. Before finding majorgeeks I had completed most of the initial suggested step (multiple different scans, etc), which found and cleaned quite a few different items. I started to get worried when I noticed that if I ran the same scan multiple times it would fine problems again and again. I also noticed on one particular boot-up that Windows firewall had been disabled (not by my doing). Because of that I’m not very confident that I really was getting everything clean.

    So, I have completed all the steps outlined here:

    http://forums.majorgeeks.com/showthread.php?t=35407

    And I believe I am ready for help. One other bit of information, when I was doing my initial scans “adirss.exe” was identified, however each time I rebooted I found that it was running again. I searched this specific file out and deleted it manually, and from what I can tell it hasn’t shown up again.

    Also, you’ll notice that the scans I ran have a fairly old date on them. However, before anyone suggests I get the lastest updates and run again, I should mention that I actually have not used this computer (nor had it online) since those last scans were run. I have 2 computers, and I’ve been using the clean one ever since due to a severe lack of time to work on the infected one. Rest assured, though, that I followed the posted instructions to the “T” (I think, there's a lot of text there :D ), and each scan was performed using the latest updates for all programs.

    I'm not sure what you can deduce from my log files, but any help to determine if I'm finally clean would be greatly appreciated.
     

    Attached Files:

  2. steve-o-reeno

    steve-o-reeno Private E-2

    The rest of the attachments...
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majrogeeks!

    Okay you have a bunch of work to do. ;)

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 10
    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Now please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to the following key and take ownership of it (explained further down):

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32\0000\Control
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32\Security
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32\Enum
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32\0000\Control
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32\Enum
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32\Security
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINCOM32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32\Security
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32

    To take ownership of the key do the following:
    • Copy & Paste the registry key (one at a time) from above into the address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the Menu
    • Select Take Ownership
    • Then repeat for each key given above
    • Now leave RegistrarLite running and continue
    • Now run the fixWC.reg REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages? Make sure it gives you a success message.
    • Now in RegistrarLite click View and then Refresh
    • Now navigate to each of the above keys (one at a time) that we took ownership of and verify that it no longer exists.
    • if any of the above keys still exist, right click on it and select Delete.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixWC.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    After completing ALL of the above instructions, continue here!

    Start by downloading another tool we will need - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate them later.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
    O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [sysinter] C:\WINDOWS\system32\adirss.exe
    O4 - HKLM\..\Run: [lnwin.exe] C:\WINDOWS\system32\lnwin.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.5.0) - http://javadl-esd.sun.com/update/1.5.0/jinstall-1_5_0_10-windows-i586-jc.cab

    After clicking Fix, exit HJT.


    If you get an error message while doing the above command prompt step, just ignore it and continue!

    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\wincom32.ini
    C:\WINDOWS\system32\wincom32.sys
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now delete the below folder:
    C:\Documents and Settings\MyFamily\.housecall6.6

    Now download and install the current versions of both GetRunKey and ShowNew from the links in the READ & RUN ME.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey - from the new version of the tool
    2. ShowNew - from the new version of the tool
    3. HJT


    Make sure you tell me how things are working now!
     
  4. steve-o-reeno

    steve-o-reeno Private E-2

    Ok, so I completed the first few steps, down through the registry patch. The patch ran successfully, but is seems like quite a few of the keys still exist. From your instructions it sounded like most of them, if not all, should be gone. Does it appear I did a something wrong, or shall I proceed to manually delete these? I did make sure to take ownership of each before running the patch...

    The following still exist:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32\0000\Control
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_WINCOM32
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32\0000\Control
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINCOM32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINCOM32\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINCOM32


    The following ones I initially found, and under the "Name" column it gave a red folder and the words "ACCESS DENIED". However now when I check back it appears they are gone:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32\Security
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wincom32\Enum
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32\Enum
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32\Security


    And these ones were gone immediately following the patch:

    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32\Security
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\wincom32
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to follow my instructions all the way thru and attach the requested logs! We will continue from there. Sometimes registry keys get lock and require additional special procedures to remove.
     
  6. steve-o-reeno

    steve-o-reeno Private E-2

    Ok, so I followed the directions correctly this time, and everything seemed to work fine. Here are the things I noted:

    When I performed the key removal, the key below initially showed as "ACCESS DENIED" when after I ran the patch. However, after checking another key I tried this one again and it was gone.

    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wincom32\Enum

    When I ran the HJT step the following two items did not exist:

    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.5.0) - http://javadl-esd.sun.com/update/1.5...ws-i586-jc.cab


    When I ran pocket killbox I copied both lines, as directed, and pasted into pocket killbox. However, it appeared that only the .ini file was selected for deletion. I wasn't sure if I was supposed to copy each one over separately, however the instructions seemed very clear to select all lines at once to copy-paste, so that is what I did. Also, I see reference to "wincom32.ini" in the newfiles.txt file, but not "wincom32.sys". Let me know if I need to re-run pocket killbox on "wincom32.sys".

    The computer seems to be operating well now, at least no obvious signs of intruders. Whether any more subversive issues exist, I'm not sure. I did forget to mention that when I first got infected I started occasionally getting the blue screen of death, with the error "page fault in non-paged area". I haven't seen that recently, so that seems like a good sign. I had wondered if it was caused by one of the anti-spyware/virus tools, since I've read Norton can make changes in non-paged areas. I haven't removed any of those programs, though, and the blue screen hasn't resurfaced.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It always helps to follow directions properly! ;)

    Did you forget to fix the below? You don't need it to load at startup. It may come back if you reload or update QuickTime at some point but it is not required.
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime

    You can also fix the below line too which will also help improve performance:
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0\bin\jusched.exe"



    Your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  8. steve-o-reeno

    steve-o-reeno Private E-2

    I'm pretty sure I fixed everything you mentioned, but I guess I must have missed that. I went back and cleaned that and the Java line in HJT, then after reboot I checked again and they're gone.

    Thanks for all the help! I guess it goes without saying I wouldn't have figured that all out myself rolleyes.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds