Help, my computer is infested

Discussion in 'Malware Help (A Specialist Will Reply)' started by perrinaybara, Mar 19, 2005.

  1. perrinaybara

    perrinaybara Private E-2

    Apparently there is a virus on my computer that I can't seem to get rid of. I can find it in the processes, it's called vyvwyu.exe, and there's another called kykyhg.exe. I know that the file is located in the the prefatch folder, but when I try and delete the file it returns, I've also tried to run a selective startup making sure to not run the program, yet it still seems to startup. The wonderful virus is downloading other viruses and random programs onto my computer and I'm starting to have trouble keeping up with it...any help would be much appreciated.
     
  2. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    First:

    Download Windows XP Prefetch Clean And Control

    Run this to flush out your Prefecth folder.

    Second:

    Please follow ALL the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal


    After doing ALL of the above if you still have a problem:

    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).
     
  3. perrinaybara

    perrinaybara Private E-2

    hey, sorry, I was in such a rush to post and get this fixed I didn't read the sticky's, I was actually running through them when I got your reply...that may have helped...we shall see
     
  4. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    No Biggie! Just be sure you do as much as possible so we can make sure we get it all!

    Good Luck!:)

    Will be awaiting a response on how everything goes.
     
  5. perrinaybara

    perrinaybara Private E-2

    Ok, 2 problems,
    1. I can't connect to the online scans because of my school firewall..
    2. for some reason attachments is not working for me in the forum so I can't attatch the hijack this file.
     
  6. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Copy and paste the log inline and I will have it converted into an attachment.
     
  7. perrinaybara

    perrinaybara Private E-2

    Edit by chaslang: Inline log changed to attachment
     

    Attached Files:

    Last edited by a moderator: Mar 21, 2005
  8. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Please EXTRACT HijackThis from the ZIP File to a Safer location. Here's how:

    To create a new folder:
    Click START > My Computer > Local Disc C: > Program Files
    Now, RightClick on an Empty Area and select New > Folder & name it HijackThis and ENTER

    To Extract HijackThis:
    Now, Right Click your HijackThis ZIP File and select Extract All > Next > and browse to your newly created HijackThis Folder
    (C:\Program Files\HJT) and click Next.

    Now run HJT from there. Please save your HJT Log as a .txt File and attach it via the "Manage Attachments" tool in the Additional Options section when you post.

    The reason HJT needs its own safe folder is so that backups will be safely preserved. That way, if a mistake is made in the removal process, the mistakenly deleted entry can be restored.


    Post a new log after doing this and closing ALL browsers.
     
  9. perrinaybara

    perrinaybara Private E-2

    I have done all of those steps excluding the one I can't do...sending it as an attatchment. As I told you before, my browser is not letting me attatch files, I tried to and you told me to send it as a text and you would convert. Sorry, but the school network here is crap.
     
  10. TheOldThug

    TheOldThug First Sergeant

    Perr

    The big change he wants you to do is get HJT into a correct folder.
    C:\DOCUME~1\MATTSM~1\LOCALS~1\Temp\Temporary Directory 1 for hijackthis.zip\HijackThis.exe
    This shows you are running it from a temp folder. Just follow BJ's steps for extracting to the correct place. By giving him another log, inline if that is the only way you can, he can make sure you have HJT in a proper place. Actually if your log hasn't changed you could just copy the line that shows where HJT is in your running processes of your HJT log, to confirm proper placement.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please do not propose doing things that are illegal. The school has setup a firewall for a reason and we do not support suggesting ways to bypass restrictions like this.
     
  12. perrinaybara

    perrinaybara Private E-2

    Edit by chaslang: Inline log attached
     
    Last edited by a moderator: Mar 23, 2005
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Since BJ and Thug are not around I'll try to keep you moving on this:

    You must stop using msconfig to control what programs are being loaded at boot up. Please run msconfig and select normal startup. You don't need to reboot right now if prompted to do so. Wait until later.

    Please download the following tools and save them where you will be able to find them. I save stuff like this to a C:\downloads\Spyware-Stuff folder and I put each in their own subfolder. It makes it easy to find. Make sure you download them from the links below:

    L2MeFix Tool

    Generic Detection Tool - NT/2000/XP

    VX2.BetterInternet Finder XP/2k - Version Msg126

    Pocket KillBox

    LSP - Fix


    Please make sure System Restore is OFF and the Viewing of Hidden Files is Enabled as per the tutorial.

    Please print out these instructions now or save locally so that you can operate with All Browser Windows CLOSED.

    Exit Browsers now before continuing


    First Step:

    Now run LSP-Fix.

    Check the Box labeled "I know what I'm doing" and then click on the dolsp.dll
    file (in the “Keep” section) to select it.

    Then, Select the >> button to move dolsp.dll into the Remove section.

    Now, click the Finish Button. When the Repair Summary box appears, click OK.

    Second Step:

    Extract all the files from the Generic Detection Tool into its own folder.
    Then run find.bat. Post the log it creates back here as an attachment (do it later when we reconnect).

    Third Step:
    Please move the L2MeFix Tool to your Desktop and DoubleClick l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix Folder on your Desktop. DoubleClick l2mfix.bat and Type 1 and ENTER to select Option #1 for Run Find Log . Allow it as much time as it needs to run until NotePad opens with a log.

    NOTE: Please do not run any other options or files in the l2mfix Folder!

    Fourth Step:
    Get a new HJT log.

    Now reconnect and come back here and post as attachments the l2mfix log the find.bat log (normally already named output.txt) and the new HJT log (this will require two posts as only two attachments can be made in a message).Based on those logs, we will determine the next steps.

    Please DO NOT REBOOT after scanning for these logs!! Otherwise problems may mutate and spread. Wait for me to get back to you with the next steps.
     
  14. perrinaybara

    perrinaybara Private E-2

    ok, I did all 4 steps. here's the logs.
     

    Attached Files:

  15. perrinaybara

    perrinaybara Private E-2

    and the 3rd
     

    Attached Files:

  16. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    WOW! tons of baddies!

    Chas, you going to take this one my friend?
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Damn! You have a lot of bad stuff in there. Even more than yesterday. Hang on I'll be posting the next steps soon!
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! Perrinaybara is a spyware collector! :D


    Here are the next steps! I know this is tedious but we are making progress and this next step is going to clean up a load of bad stuff.

    Step 1:

    Print or save these instructions locally now because you will have to be disconnected with no browsers open in the next step.

    Please make sure ALL Browser Windows are Closed and also you should physically disconnect from the Internet by unplugging your cable.

    Go to the L2MFix Folder on your Desktop and DoubleClick l2mfix.bat and type 2 and ENTER to select option #2 for Run Fix. Then, press any key to Reboot your machine.
    Your computer will go bazonkers (now there's a great technical term!) for a bit, but just let it run. It should eventually spit out another log in Notepad. Please attach that log later when the remaining steps are completed.

    Again, don't run any other files in the L2MFix folder.

    Step 2:

    Run "find.bat" from the Generic Detection Tool again!

    Okay after doing the above DO NOT REBOOT. Now reconnect to the internet and come back here and post and attach the find.bat log along with the L2MeFix Log.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After completing the steps in my last message and posting the new logs! Do the following.

    Look in Add/Remove programs for the following and uninstall if found (tell me which ones you do find):
    BullsEye Network
    ClockSync
    Delfin Media Viewer or DMV or DMVlite
    Ebates_MoeMoneyMaker
    Internet Optimizer
    SED
    Search-exe or Ezula
    SurfSideKick or SurfSideKick 2
    WeatherBug
    WebRebates0 or WebRebates
    Web Offer
    WhenUSave or WhenU or Save

    Now download and install Microsoft Windows AntiSpywareduring the install make sure you get any updates BUT DO NOT RUN A SCAN YET.

    Print or save these instructions locally now because you will have to be physically disconnected (unplug your cable) with no browsers open while performing the following steps.

    Okay exit ALL Browser sessions and unplug your cable now!
    Do not reconnect or open a browser again until requested.

    Reboot your PC into safe mode and then run a full scan with Microsoft Antispyware. After it completes, note what problems are found and fixed and any that are not fixed then reboot in normal boot mode. And plug your cable back in.

    Run the following online scanners:
    Bitdefender
    RavAntivirus <-- select Auto Clean then click Scan My PC
    TrojanScan

    Exit all browser sessions and get a new HJT log. Now run your browser and come back here and post a the HJT log and tell me the results of all the above steps.
     
  20. perrinaybara

    perrinaybara Private E-2

    Sorry it's taken me so long to reply...my computer restarted itself and then wouldn't start up correctly. I had to go in and found that it was most likely a loose connection to the hard drive that made it not start..and may have caused the restart...is the restart a problem..I'm gonna run through the steps anyway.
     
  21. perrinaybara

    perrinaybara Private E-2

    here are he first 2 logs
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You must complete the steps in message # 20.
     
  23. perrinaybara

    perrinaybara Private E-2

    Those scans are done..figured I'd send the first batch as soon as it was done..here's the stuff for #20
    The troj scan didn't find anything. Bit defender is not working for some reason. It won't update...perhaps a problem with my firewall.
    I copied the info from the rav into a text and the hjt txt is here as well.
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Look in Add/Remove Programs for the below and uninstall if found:
    ClockSync
    Save or WhenUSave
    Delfin Media Viewer or DMVLite

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\windows\system32\netdaemon.exe
    C:\WINDOWS\system32\winupdt.exe
    C:\WINDOWS\system32\wintask.exe
    C:\WINDOWS\system32\vmss\vmss.exe
    C:\WINDOWS\system32\Eztbhz.exe
    C:\Documents and Settings\All Users\Application Data\msw\MSW.exe
    C:\Documents and Settings\All Users\Application Data\msw\BMan1.exe
    C:\WINDOWS\system32\sysmonnt.exe
    C:\WINDOWS\system32\n?pdb.exe
    C:\Documents and Settings\Matt Small\Application Data\aawo.exe
    C:\DOCUME~1\ALLUSE~1\APPLIC~1\msw\BMan.exe

    After killing all the above processes, click "Back".

    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 127.0.0.1:1080
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O2 - BHO: (no name) - {19F869D9-B2A0-4B19-0B86-2FEF1867D1B0} - C:\WINDOWS\system32\nmdncwlw.dll
    O2 - BHO: (no name) - {8E54E360-258C-2A22-8291-76A2AAD23ECD} - C:\WINDOWS\system32\jgpugv.dll
    O2 - BHO: (no name) - {CBC3C5AF-D7CA-964F-7756-846B27993CED} - C:\WINDOWS\system32\hrocrytt.dll (file missing)
    O2 - BHO: (no name) - {FD8AB6C2-2292-8C12-56AF-FB729D561146} - C:\WINDOWS\system32\phwdfqqx.dll
    O4 - HKLM\..\Run: [ENCNetwork] encnetgo.bat
    O4 - HKLM\..\Run: [etbrun] C:\windows\system32\eliteovy32.exe
    O4 - HKLM\..\Run: [netdaemon] C:\windows\system32\netdaemon /v
    O4 - HKLM\..\Run: [winupdtl] C:\WINDOWS\system32\winupdt.exe
    O4 - HKLM\..\Run: [WinTask driver] C:\WINDOWS\system32\wintask.exe
    O4 - HKLM\..\Run: [WhenUSave] C:\PROGRA~1\Save\Save.exe
    O4 - HKLM\..\Run: [vmss] C:\WINDOWS\system32\vmss\vmss.exe
    O4 - HKLM\..\Run: [version] C:\WINDOWS\system32\Joazsc.exe
    O4 - HKLM\..\Run: [snuxqwrl] C:\WINDOWS\system32\snuxqwrl.exe
    O4 - HKLM\..\Run: [SESync] "C:\Program Files\SED\SED.exe"
    O4 - HKLM\..\Run: [secure] C:\WINDOWS\system32\Eztbhz.exe
    O4 - HKLM\..\Run: [salm] c:\temp\salm.exe
    O4 - HKLM\..\Run: [nsvcin] C:\WINDOWS\system32\n20050308.exe
    O4 - HKLM\..\Run: [msw] C:\Documents and Settings\All Users\Application Data\msw\MSW.exe
    O4 - HKLM\..\Run: [msmc] C:\WINDOWS\system32\msmc.exe
    O4 - HKLM\..\Run: [jen2juco] C:\Program Files\jen2juco\jen2juco.exe
    O4 - HKLM\..\Run: [exp.exe] C:\WINDOWS\system32\exp.exe
    O4 - HKLM\..\Run: [BMan] C:\Documents and Settings\All Users\Application Data\msw\BMan1.exe
    O4 - HKLM\..\Run: [AUNPS2] RUNDLL32 AUNPS2.DLL,_Run@16
    O4 - HKCU\..\Run: [wufk] C:\PROGRA~1\COMMON~1\wufk\wufkm.exe
    O4 - HKCU\..\Run: [sysmonnt] C:\WINDOWS\system32\sysmonnt
    O4 - HKCU\..\Run: [Paefs] C:\WINDOWS\system32\n?pdb.exe
    O4 - HKCU\..\Run: [ClockSync] "C:\Program Files\ClockSync\Sync.exe" /q
    O4 - HKCU\..\Run: [Celc] C:\Documents and Settings\Matt Small\Application Data\aawo.exe
    O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O9 - Extra button: (no name) - {237AA178-C3BC-4f67-A8BB-D8BC14BA0B89} - C:\WINDOWS\remove_me.dll (file missing) (HKCU)
    O9 - Extra button: Ebates - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
    O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/25f8a3f2fbd9c25b4206/netzip/RdxIE601.cab
    O23 - Service: byyzxmgjbwfo (vkvfplvs5) - Unknown owner - C:\WINDOWS\System32\klgkydbn5.exe (file missing)

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\Program Files\Save <--- the whole folder
    C:\Documents and Settings\All Users\Application Data\msw <--- the whole folder
    C:\WINDOWS\system32\vmss <--- the whole folder
    C:\Program Files\SED <--- the whole folder
    C:\Program Files\jen2juco <--- the whole folder
    C:\Program Files\Common Files\wufk <--- the whole folder
    C:\Program Files\ClockSync <--- the whole folder
    C:\Documents and Settings\Matt Small\Application Data\aawo.exe
    C:\WINDOWS\system32\nmdncwlw.dll
    C:\WINDOWS\system32\jgpugv.dll
    C:\WINDOWS\system32\phwdfqqx.dll
    C:\WINDOWS\system32\AUNPS2.DLL
    C:\windows\system32\encnetgo.bat
    C:\windows\system32\netdaemon.exe
    C:\WINDOWS\system32\winupdt.exe
    C:\WINDOWS\system32\wintask.exe
    C:\WINDOWS\system32\vmss\vmss.exe
    C:\WINDOWS\system32\Eztbhz.exe
    C:\WINDOWS\system32\sysmonnt.exe
    C:\WINDOWS\system32\Joazsc.exe
    C:\WINDOWS\system32\snuxqwrl.exe
    C:\WINDOWS\system32\n20050308.exe
    C:\WINDOWS\system32\msmc.exe
    C:\WINDOWS\system32\exp.exe
    C:\windows\system32\eliteovy32.exe <--- while looking for this one look for any other similiar files that begin with elite and end with the .exe extension and delete them too.
    c:\temp\salm.exe

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST).
    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.


    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  25. perrinaybara

    perrinaybara Private E-2

    everything seems to be working fine, a couple of the files you wanted me to delete weren't there, but I got rid of everything I could find.
    I'm getting an error trying to upload the hjt log but I'll keep trying it.
    Thanks alot.
     
  26. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Get me a current HJT log with another Generic Detection Log.

    If you cant attach it paste it inline and I will have it converted.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    An inline log should not be necessary. Just rename the hijackthis.log file to a different name and see if you can upload it. You have already attached logs before so I'm assuming you are not having a problem just figuring out how to do that.
     
  28. perrinaybara

    perrinaybara Private E-2

    after giving it some time, I'm still getting redirected to sites allthe time...the computer is running alot smoother though
     

    Attached Files:

  29. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Please print out these instructions so that you can operate with All Browser Windows CLOSED.

    Please make sure System Restore is OFF and the Viewing of Hidden Files & Folders is Enabled as per the tutorial.



    Now, look in Task Manager (Ctrl-Alt-Del) for the following running process and, if you see any it, try to END it:

    Rsbgub.exe

    Now scan with HijackThis and Check the Boxes for the following:

    Make sure All Browser Windows are Closed when you Click FIX.

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.thinkexist.com/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,First Home Page = C:\Program Files\AOL Toolbar\welcome.html
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://pac.enc.edu

    R3 - Default URLSearchHook is missing

    O2 - BHO: (no name) - {19F869D9-B2A0-4B19-0B86-2FEF1867D1B0} - (no file)
    O2 - BHO: (no name) - {CBC3C5AF-D7CA-964F-7756-846B27993CED} - (no file)
    O2 - BHO: (no name) - {FD8AB6C2-2292-8C12-56AF-FB729D561146} - (no file)

    O4 - HKLM\..\Run: [secure] C:\WINDOWS\system32\Rsbgub.exe

    O16 - DPF: {27EB254C-C724-43B1-8DD8-F3AC9ED761B2} (Wavexpress Cab Helper) - http://client2.tvtonic.com/Webservice/Public/WXStageInstall/2.6/TVTStage1.cab

    Again, make sure All Browser Windows are Closed when you Click FIX.

    NOW:
    Please boot into Safe Mode with the Viewing of Hidden Files & Folders Enabled and navigate to and DELETE the following if they should remain:

    C:\WINDOWS\system32\Rsbgub.exe

    NEXT:
    Run CCleaner

    Reboot to Normal Windows

    FINAL STEP

    Reset Web Settings & Default Security Settings:


    To Reset Web Settings:
    Right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK


    To Default Security Settings:
    Right click on your desktop Internet Explorer icon and select Properties. Then click the Security Tab and click Default Level for Internet, Local Intranet, Trusted Sites, and Restricted Sites.

    After doing the above steps, scan with HJT and attach the new log. Also attach one more log from the Generic Detection log just to be sure.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You missed one BJ:

    O23 - Service: byyzxmgjbwfo (vkvfplvs5) - Unknown owner - C:\WINDOWS\System32\klgkydbn5.exe (file missing)

    This line needs to be fixed too. But HJT may not be able to simply fix it. The service may need to be stopped and disabled first and then HJT can be used to Delete an NT Service.

    Also I see no reason to remove:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.thinkexist.com/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,First Home Page = C:\Program Files\AOL Toolbar\welcome.html
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://pac.enc.edu
     
  31. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Damn! Thanks Chas! About those other, I just like everything to be default. (sorry) :D
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Unless they are problems they should not be fixed. You may like them at defaults but the user may not. Resetting Web settings should only be done when necessary to fix true problems, like when there are hijacker problems. Another approach that can be taken is to ask the user if they use the settings shown on the R0 & R1 lines and if they do not, they could then choose to fix them.
     
  33. perrinaybara

    perrinaybara Private E-2

    Alright, here's the latest hjt log
     

    Attached Files:

  34. perrinaybara

    perrinaybara Private E-2

    oops forgot generic det. tool
     

    Attached Files:

  35. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Please print out these instructions so that you can operate with All Browser Windows CLOSED.

    Please boot into Safe Mode with the Viewing of Hidden Files & Folders Enabled

    NOW:
    Click Start > Run > type services.msc and Click OK

    Locate byyzxmgjbwfo (vkvfplvs5) and RightClick on it to bring up the Service Properties Window.
    First: Stop the service by clicking the Stop Button.
    Next: Disable it by changing the Startup Type to Disabled and click Apply

    Now scan with HijackThis and Check the Boxes for the following:

    Make sure All Browser Windows are Closed when you Click FIX.

    O2 - BHO: (no name) - {19F869D9-B2A0-4B19-0B86-2FEF1867D1B0} - (no file)
    O2 - BHO: (no name) - {CBC3C5AF-D7CA-964F-7756-846B27993CED} - (no file)
    O2 - BHO: (no name) - {FD8AB6C2-2292-8C12-56AF-FB729D561146} - (no file)

    O23 - Service: byyzxmgjbwfo (vkvfplvs5) - Unknown owner - C:\WINDOWS\System32\klgkydbn5.exe (file missing)

    Again, make sure All Browser Windows are Closed when you Click FIX.

    NEXT:
    Download and Run CWShredder 2.14
    *Click FIX instead of scan*

    NOW:
    Navigate to and DELETE the following if they should remain:

    C:\WINDOWS\System32\services ←–– Delete this whole folder if it exist!

    C:\WINDOWS\System32\system32.dll

    C:\WINDOWS\System32\msxslab.dll

    C:\WINDOWS\System32\jac.dll

    C:\WINDOWS\System32\d2kpax.dll

    C:\WINDOWS\System32\d2kpax.exe

    C:\WINDOWS\System32\n?pdb.exe

    NOW:
    Copy the contents of the Quote Box below to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file VX2FIX.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.)

    Double-click on the VX2FIX.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to merge, click YES!

    NEXT:
    Run CCleaner

    Reboot to Normal Windows , Scan with HijackThis and attach the new log along with one last Generic Detection Log.
     
  36. perrinaybara

    perrinaybara Private E-2

    sorry the reply took so long...been really busy
     

    Attached Files:

  37. perrinaybara

    perrinaybara Private E-2

    sorry for the time, I haven't used my computer much since the 6th...haven't even had a lot of time to sleep.
     
  38. bjgarrick

    bjgarrick MajorGeeks Admin - Malware Expert

    Scan with HijackThis and Check the Boxes for the following:

    Make sure All Browser Windows are Closed when you Click FIX.

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.thinkexist.com/
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.trustyhound.com/sidebar-search.php

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://pac.enc.edu
    (If you know this entry, leave it as is!)

    O2 - BHO: (no name) - {19F869D9-B2A0-4B19-0B86-2FEF1867D1B0} - (no file)
    O2 - BHO: (no name) - {CBC3C5AF-D7CA-964F-7756-846B27993CED} - (no file)
    O2 - BHO: (no name) - {FD8AB6C2-2292-8C12-56AF-FB729D561146} - (no file)

    O16 - DPF: {205FF73B-CA67-11D5-99DD-444553540012} (CInstall Class) - http://www.funnytaf.com/fun/installer/Install.cab

    O23 - Service: iPod Service (iPodService) - Unknown owner - C:\Program Files\iPod\bin\iPodService.exe (file missing)

    Again, make sure All Browser Windows are Closed when you Click FIX.

    NEXT:
    Locate PocketKillbox

    Now, Copy and Paste CC:\WINDOWS\System32\msxslab.dll into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\jac.dll into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\d2kpax.dll into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\system32.dll into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\d2kpax.exe into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\n?pdb.exe into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO.

    Now, Copy and Paste C:\WINDOWS\System32\services into the box – If it exists, it will show up in Blue. Check the option to Delete on Reboot and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click YES.

    Reboot into Safe Mode

    NEXT:
    Run CCleaner

    Then, as an added precaution, Go to Start > Run and type: cleanmgr and then click OK. Make sure the boxes for these are checked:
    Temporary Files
    Temporary Internet Files
    Recycle Bin


    And Click OK.


    Reboot to Normal Windows , Scan with HijackThis and attach the new log.
    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now.

    Good Luck!:)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds