connecting for bitdefender did me in

Discussion in 'Malware Help (A Specialist Will Reply)' started by id2.1k, Sep 6, 2006.

  1. id2.1k

    id2.1k Private E-2

    hi, i'll post my files as soon as i get them in order (if i can), but first a question about the single antivirus application i'm supposed to have running. i have symantec, but i also now have counterspy running, and it has that scanner. the counterspy and symantec both create little popups above the system tray reporting things.

    which brings me to my second point. in safe mode (no networking) i eventually get **clean** scans with:
    norton antivirus scan (always clean)
    microsoft windows maliciou software removal tool (always clean)
    spybot search & destroy (always clean)
    microsoft windows defender (always clean)
    ewido (eventually clean)
    and for all of several scans with counterspy but one, it found the winlogon hook (only once, about 3rd scan out of 6, did it find nothing).

    but, when i logged on in safe mode WITH networking, and started the bitdefender scan, it started to find a ton of stuff, and all hell broke loose. the counterspy popups started reporting bho's among other things and somewhere during all the "block" buttons i was clicking, the bitdefender just disappeared. now i can no longer boot into safe mode. i'll have to ill try to run some scans in normal mode.

    i think clearly whatever last bit of malware is eluding my scans is downloading new malware every time i connect to the internet. even though i blast away all tmp files, any scan (ewido and counterspy) that turns something up usually finds it in either c:\windows\temp or c:\documents and settings\[me]\local settings\temp.

    i really would like to follow the instructions in READ & RUN ME FIRST, but after connecting to the internet to run the bitdefender online scan, i'm a little wary of plugging back in!

    i'll start over soon and try to get to the point where i can actually send the files i've collected, but i've been going back and forth with this thing over the last 2 days, and since it always gets worse when i plug in, is there any hope of nailing whatever this is before it just completely floods my machine as soon as i plug in? (by the way, i'm using a different computer now obviously).

    sorry for the horribly long post without following directions, but it's pretty frustrating thinking i'm making headway only to get slammed when i plug in.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What's your question? Symantec is an antivirus application and CounterSpy is an antispyware application.

    You just need to complete the directions and attach all the logs. Don't worry about all the temp files and anything else that occurs. We will fix all of these problems once you get us all of the logs. Everyone who has problems with winlogonhook/conhook (and you may have Virtumonde too) has the same problems. Complete the steps so we can start the fixes.
     
  3. id2.1k

    id2.1k Private E-2

    thanks,

    ok i have the runkey.txt and newfile.txt here, gathered in normal boot mode.

    spybot found and cleaned some items, so i attached the spybot generated .txt file also.

    the microsoft windows malicious software removal tool and the microsoft windows defender both found nothing.

    all scans up to this point were done in **normal boot mode** (lan cable unplugged) since when i booted in safe mode, there was no explorer.exe task, and i could not start one.

    i did not run ewido or counterspy this time, as they were not specified in the steps, and went straight to the bitdefender, which is running right now in **safe boot mode with networking**

    i'll upload the bitdefender scan, panda scan and hjt results when i get them, probably tomorrow.

    thanks

    (although i have recently loaded ewido and counterspy, they normally aren't there, and i stopped and exited them for all of the above scans. symantec is usally running, and was running during the above scans. adaware and spybot are usually loaded also, but without any background scanning active other than the spybot immunize. i also just downloaded outpost firewall, but it is not active. can't seem to get it to work...)
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are CounterSpy and Ewido the free trial versions? If so, uninstall them.

    Do you plan on keeping AOL's antiospyware application installed and running? If so, also uninstall Windows Defender.

    You really should have completed all steps in the READ ME before posting. It just slows things down when you post in pieces because each time you add a message you goto the bottom of the work queue. After completing the rest of the READ ME, run the below.


    Now Download SmitfraudFix (by S!Ri) to your Desktop.

    Extract all the files to your Destop. A folder named
    SmitfraudFix will be created on your Desktop.

    Open the
    SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press Enter
    This program will scan large amounts of files on your computer for known patterns so please be patient while it works. When it is done, the results of the scan will be displayed and it will create a log named rapport.txt in the root of your drive, eg: Local Disk C: or partition where your operating system is installed. Please attach that log in your next reply.

    Note:process.exe ( which is used my SmitFraudFIx ) is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user. The below is a link to what process.exe is.

    http://www.beyondlogic.org/consulting/proc...processutil.htm


    IMPORTANT: Do NOT run any other options until you are asked to do so!
     
  5. id2.1k

    id2.1k Private E-2

    done
    didn't even know i had antiospyware installed. which one do you recommend i keep? if you recommend i keep windows defender, then i may need instructions uninstalling antiospyware (though i haven't even tried yet)
    sorry, will do. though, i only get the pleasure of fighting spyware on my laptop in the evenings...

    attached should be the bdscan.txt and the activescan.txt. then after that should be the hijackthis.log and the rapport.txt.
     

    Attached Files:

  6. id2.1k

    id2.1k Private E-2

    hijackthis.log and rapport.txt
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    PLEASE READ ALL OF THESE INSTRUCTIONS FIRST BEFORE DOING ANYTHING. Ask any questions that you may have before starting.

    Please print out or copy these instructions to Notepad as the internet will not be (while in Safe Mode) available to you at certain points of the removal process. Make sure to work through all the Steps in the exact order in which they are listed below. Again, if there's anything that you don't understand, ask your question(s) before moving on with the fixes.

    Reboot your computer into Safe Mode per the safe directions in the READ & RUN ME.

    Open the SmitfraudFix Folder of your Desktop, then double-click smitfraudfix.cmd file to start the tool.

    Select option #2 - Clean by typing 2 and press Enter.
    Wait for the tool to complete and disk cleanup to finish.
    You will be prompted : "Registry cleaning - Do you want to clean the registry ?" answer Yes by typing Y and hit Enter.

    The tool will also check if wininet.dll is infected. If it is infected and a clean version is found, you will be prompted to replace the infected wininet.dll with the clean file. Answer Yes to the question "Replace infected file ?" by typing Y and hit Enter.

    A reboot may be needed to finish the cleaning process, if you computer does not restart automatically please do it yourself manually. BUT Reboot in Safe Mode.

    The tool will create a log named rapport.txt in the root of your drive, eg: Local Disk C: or partition where your operating system is installed. Please attach this log along in your next reply.

    After doing the above and attach the new rapport.txt log, also attach a new log from the below:
    - HJT log
    - GetRunKey
    - ShowNew
     
  8. id2.1k

    id2.1k Private E-2

    well, i can't seem to get explorer.exe task to come up in safe mode, same condition as before, probably some maleware is keeping me from it. (after running READ ME step5 in normal boot mode the first time, i was able to get into safe boot mode with networking on the next try). i had been going into safe mode with the f8 method, but changed the boot.ini with msconfig as instructed. now i'm stuck in this safe boot mode with no explorer.exe task, which makes it more difficult to run programs.

    i guess i have at least a couple of options, since i can still get a command prompt. i can:

    1. just run smitfraudfix.cmd from the command line (i can cd to the smitfraudfix file i have on the desktop)
    2. modify the boot.ini manually, go back into normal boot mode, and then run whatever scans to try to get back into a "standard" safe bood mode.
    3. some other option.

    what should i do?

    thanks
     
  9. id2.1k

    id2.1k Private E-2

    also, should i run the hjt, getrunkey and show new in safe mode as well?

    i have been moving the .txt files around with a usb storage device. i'm not sure how to do that in safe mode. when is it safe to go back into normal boot mode?

    thanks
     
  10. id2.1k

    id2.1k Private E-2

    i went ahead and smitfraudfix.cmd from the prompt, it seemed to run fine. the rapport.txt should be attached.

    i rebooted in safe mode a few times to see if the explorer.exe task would come back, it didn't.

    i figured out i could still get to msconfig, and went back to normal boot mode. sorry if that screwed things up.
     

    Attached Files:

  11. id2.1k

    id2.1k Private E-2

    newfiles and hjt files
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below software (two of which are malware, the others are old versions).
    J2SE Runtime Environment 5.0 Update 2
    J2SE Runtime Environment 5.0 Update 4
    J2SE Runtime Environment 5.0 Update 6
    Java 2 Runtime Environment, SE v1.4.2_06
    Safety Bar <--- this is bigtime malware
    Viewpoint Media Player <--- this is minor malware

    Okay on to the rest of your malware removal! As you can see there is a lot to do!

    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to the following key and take ownership of it (explained further down):

    HKEY_LOCAL_MACHINE\software\microsoft\mssmgr

    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the Menu
    • Select Take Ownership
    • Now leave RegistrarLite running and continue
    • Now run the REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages?
    • Now in RegistrarLite click View and then Refresh
    • Now navigate to HKEY_LOCAL_MACHINE\software\microsoft\mssmgr
    • Does the above mssmgr key still exist! If so, right click on it and select Delete.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixWLK.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    After completing ALL of the above instructions, continue here!

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of efcdd.dll once and then click the kill button. After you have killed all of the efcdd.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    winjmf32.dll
    opnmmmj.dll
    opnkhif.dll
    Next double click on explorer.exe and again click once on each instance of efcdd.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    winjmf32.dll
    opnmmmj.dll
    opnkhif.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {04E0A9A3-7A63-4199-AA45-1B509B4C31ED} - C:\WINDOWS\system32\efcdd.dll
    O2 - BHO: (no name) - {a43385f0-7113-496d-96d7-b9b550e3fcca} - C:\WINDOWS\system32\ixt0.dll (file missing)
    O2 - BHO: (no name) - {D3B3C51E-8D11-4667-85B9-0930F519BED7} - C:\WINDOWS\system32\opnmmmj.dll
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O4 - HKCU\..\Run: [1c94b92b.exe] C:\Documents and Settings\shsieh\Local Settings\Application Data\1c94b92b.exe
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O16 - DPF: {97B79133-88F0-45F0-8D57-0F2EF27D9C66} - http://85.255.114.166/1/rdgUS2404.exe
    O16 - DPF: {BCBC9371-595D-11D4-A96D-00105A1CEF6C} (View22RTE Class) - http://66.242.36.104/app/view22RTE.cab
    O20 - Winlogon Notify: efcdd - C:\WINDOWS\system32\efcdd.dll
    O20 - Winlogon Notify: h618 - C:\WINDOWS\g4711434.dll (file missing)
    O20 - Winlogon Notify: opnmmmj - C:\WINDOWS\SYSTEM32\opnmmmj.dll
    O20 - Winlogon Notify: winjmf32 - C:\WINDOWS\SYSTEM32\winjmf32.dll
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)

    After clicking Fix, exit HJT.


    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    Now back on Killbox's main window, Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.
    C:\\Program Files\Common Files\{5CF870F4-09C2-1033-0611-040305280001}\Update.exe
    C:\WINDOWS\hh.ico
    C:\WINDOWS\launcher.exe
    C:\WINDOWS\system32\cbxvtqo.dll
    C:\WINDOWS\system32\efcdd.dll
    C:\WINDOWS\system32\opnkhif.dll
    C:\WINDOWS\system32\opnmmmj.dll
    C:\WINDOWS\system32\winjmf32.dll
    C:\WINDOWS\system32\zjkowbg.dll
    C:\WINDOWS\system32\ddcfe.tmp
    C:\WINDOWS\system32\ddcfe.ini
    C:\WINDOWS\system32\ddcfe.ini2

    If Killbox does not reboot or if you get a Pending Operations type error message just click OK to continue and then just reboot your PC yourself.

    After reboot locate the below folders and delete them if found:
    C:\Program Files\Safety Bar
    C:\Program Files\Common Files\{5CF870F4-09C2-1033-0611-040305280001}

    Also delete all files in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\shsieh\Local Settings\Temp

    Now attach a new HJT log and tell me how the steps went.

    Now download the current version of ShowNew (yours is out of date).
    Now attach new logs from ShowNew and from GetRunKey.

    Make sure you tell me how things are working now!
     
    Last edited: Sep 8, 2006
  13. id2.1k

    id2.1k Private E-2

    all software successfully removed except the "safety bar", which was not found. i did a search on "safety bar" and found nothing. i moved on.
    ran the steps for mssmgr. no errors were reported. mssmgr key remained so i deleted it. subsequently, that key came back(!), so i repeated steps until it seemed that the key stayed gone, maybe 2-3 times. and moved on.
    all items found except the 2 above. clicked fix, seemed to work fine and moved on.
    done
    done
    done
    as noted above, i couldn't find "safety bar" directory. the other file was deleted fine.
    done
    i got the version of ShowNew from here http://forums.majorgeeks.com/showthread.php?t=95941. if you let me know where the current one is, i will download and use the new one. in the meantime, i have attached the latest shownew, getrunkey and hijackthis files.

    also, it's only been a little while, but the laptop appears fine (so far anyway). hopefully it will last! being exhausted now after this latest round, i'm gonna wait a while until i check things our more thoroughly. but things look good so far!

    thanks
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That is where you always get the current version. But you have to redownload and reextract the files. You are use version 0.14 and we are now on version 0.16. Also I just updated GetRunKey today too. You need to download the current version for it too.

    Run HijackThis and have it fix the below lines:
    O2 - BHO: (no name) - {5F29807A-6FD5-4A27-AFA2-0E27B916F3F7} - C:\WINDOWS\system32\efcdd.dll (file missing)
    O20 - Winlogon Notify: winjmf32 - winjmf32.dll (file missing)

    The HKEY_LOCAL_MACHINE\software\microsoft\mssmgr came back. Try fixing it again now that the rest of the infection has been removed. One you see it go away. Reboot and check again. Let me know what happens.


    Then attach a new log from the NEW version of GetRunKey.
    Also attach a new HJT log.

    How are things working?
     
  15. id2.1k

    id2.1k Private E-2

    found both entries via HJT and fixed. seemed to work fine.

    repeated steps to remove mssmgr. after refreshing view, mssmger key was gone. rebooted, fired up registrar lite, and the key was still gone.

    ran shownew, getrunkey and hjt again. files are attached.

    even before this last set of steps was executed, the machine seemed to be running without problems, light years better than before. no NAV alerts or anything. hope i'm seeing the light at the end of this tunnel!

    thanks
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     
  17. id2.1k

    id2.1k Private E-2

    thanks much! i was very close to opting for the "nuclear option" and just reformatting and reinstalling since my data is already pretty much backed up, but that in itself would have been an ordeal. going through these steps wasn't that bad. thanks again!
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds