After "READ & RUN ME" I still have a trojan (ardamax keylogger I think)

Discussion in 'Malware Help (A Specialist Will Reply)' started by GodlessXVIII, Nov 22, 2006.

  1. GodlessXVIII

    GodlessXVIII Private E-2

    I admire this site's commitment to the betterment of the Net. I wouldn't be wasting your time without a good reason.

    I first found out about my problem through bitdefender:

    C:\WINDOWS\Sys\Explorer.006

    Infected with: Generic.Ardamax.C2516FF5

    Since the file infected is a system file, I figured I needed professional advice. I then followed every steps of your READ AND RUN ME preambule, without getting rid of the infection.

    Instead, the thing seems to shift form with every different tool I throw at it:

    CounterSpy identified it as: "IExplores Trojan Trojan", located in c:\windows\sys\explorer.exe

    A second go with bitdefender yielded the same "Generic.Ardamax.C2516FF5" result, in the same "explorer.006" location as before.

    Strangely, PandaActiveScan didn't seem to find out about my original trojan, but discovered two spyware cookies: "Tribalfusion" and "Atlas DMT". It didn't disinfect them, though.

    I also ran GetRunKey ShowNew, and HijackThis, as prescribed. Their results are in my next post.

    What is exceedingly frustrating for me is that, not two weeks ago, I reformated my hard disk. I would really appreciate if there was a way to get rid of the trojan without reformating again.

    Here are my logs, in the designated order:
     

    Attached Files:

  2. GodlessXVIII

    GodlessXVIII Private E-2

    And the rest of the log:
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    But it is not a system file. C:\Windows\explorer.exe is a system file. c:\windows\sys\explorer.exe is not a system file.


    Make sure you go back and EXACTLY follow the directions in step 2 of the READ ME. It looks like you did not uncheck the option for hiding extensions for known file types.

    What do you see in each the below folders?
    C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033
    C:\Program Files\Common Files\Microsoft Shared\Web Folders\1036

    Start by downloading a tool we will need - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    Now Copy the bold text below to notepad. Save it as fixWLK.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    c:\windows\sys\explorer.exe
    C:\WINDOWS\Sys\Explorer.006
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folder and delete if found:
    c:\windows\sys

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Nov 23, 2006
  4. GodlessXVIII

    GodlessXVIII Private E-2

    Okay, thanks for fast reply. I did uncheck that option for hiding extensions already.

    Inside:
    C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033
    C:\Program Files\Common Files\Microsoft Shared\Web Folders\1036

    I have:
    1033\NSEXTINT.DLL
    1036\MSOSVINT.DLL and NSEXTINT.DLL plus a folder named "Webview" (full of .htt files and another folder named "Images")

    During the Killbox procedure, I deleted the temp files as prescribed. Then I copied the file path "c:\windows\sys\explorer.exe" in the slot, then clicked delete and skipped reboot, then copied the file path "C:\WINDOWS\Sys\Explorer.006", clicked delete and clicked yes to reboot.
    (just want to make sure with you)
    It gave me the PendingFileRenameOperations prompt, I clicked OK. It didn't reboot, so I did manually.

    Afterwards, I found the sys folder, but the .006 and .exe files weren't there (there were other .00s though). I deleted it.

    Edit: About the Killbox bit, I tried highlighting both file path at once, copying and pasting through the file menu as you said, but when I clicked the delete button, It said I didn't enter a file path, and the slot was empty.

    Here are my new logs:
     

    Attached Files:

    Last edited: Nov 23, 2006
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well it is okay now but previously your runkeys.txt log had this:
    And now it has the below which is correct:
    This "SuperHidden"=dword:00000000 meant that extensions were hidden. Not sure why it did not show properly last time.

    You logs are clean! Is everything working OK now?

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    4. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    7. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  6. GodlessXVIII

    GodlessXVIII Private E-2

    All scans are clean. :)

    Thank you for your time. Much appreciated.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds