Help with hopefully last of malware!

Discussion in 'Malware Help (A Specialist Will Reply)' started by unclebill2717, Jul 10, 2006.

  1. unclebill2717

    unclebill2717 Private E-2

    Thanks in advance for the help. My neice brought her computer back from college and after numerous scans with Zonealarm, as well as all of the "required before posting" scans, her system is looking better.

    I'm still concerned as I see Zonealarm is still blocking some unknown process that is attempting to contact uzoogle.com. Before running the required scans, we were also seeing some pop ups without Internet Explorer, or any other browser running. Those pop ups were promoting spyware removal software.

    I've attached the required logs and your further help is appreciated. She's leaving at the end of this week, so I was hoping to have her system all cleaned up.

    Thanks,
    Bill
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Make sure viewing of hidden files is enabled (per the tutorial).

    Look in Add/Remove programs for Weather Studio and uninstall if found.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R3 - URLSearchHook: (no name) - - (no file)
    O2 - BHO: (no name) - {19C8ACB6-8CDC-446D-80CC-82FBF28F2127} - (no file)
    O3 - Toolbar: Weather Studio - {C6139A57-16FB-4FA4-8045-A847FBFFD695} - C:\Program Files\Weather Studio\bin\WeatherStudio.dll (file missing)
    O20 - AppInit_DLLs: repairs303169587.dll
    O20 - Winlogon Notify: RunOnce - C:\WINDOWS\
    O20 - Winlogon Notify: ShellCompatibility - C:\WINDOWS\

    NOTE: HJT will popup an error about the AppInit_DLLs line. Ignore it and click OK to continue.

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete:
    C:\Program Files\Weather Studio <--- the whole folder
    C:\windows\system32\repairs303169587.dll

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now run Ccleaner (installed while running the READ ME FIRST).

    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!

    Now reboot in normal mode and post a new HJT log.

    Make sure you tell me how things are working now.

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  3. unclebill2717

    unclebill2717 Private E-2

    Thanks for the response.

    Completed the steps with the exception of deleting repairs303169587.dll. It did not exist (yes viewing hidden files was enabled) in the windows\system32 directory. A search of the hard drive did not turn up the file either. I am posting a new HJT log.

    I am still seeing where Zonealarm is still blocking connecting to "spy site" uzoogle.com

    Thanks for the continued help.
     

    Attached Files:

  4. unclebill2717

    unclebill2717 Private E-2

    Viewing ZoneAlarm alert log it is also blocking access to media.deskwizz.com, and mmm.media_motor.net. These attempts happen every 3-13 minutes. No other applications (Internet Explorer etc.) are running during these attempts.

    Thanks again.

    Bill
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What direction (that is are they incoming or outgoing?)


    Run the below procedure and attach the newfiles.txt log.
     
  6. unclebill2717

    unclebill2717 Private E-2

    Thanks for the reply.

    Attached is the requested text file.

    As to your question if they are income or outgoing, They are not recorded by the firewall. ZoneAlarm has added Spy Site Blocking. These show up in the Spy Site Blocking log. Its purpose is to keep someone from accidentally accessing a known spyware site.

    ZoneAlarm describes this feature as:

    "Spy Site Blocking**
    Blocks you from accidentally visiting or being redirected to websites that distribute spyware.

    Prevents spyware on your computer from contacting web sites to exchange information, give out your personal data, or get updates."

    I would have thought this feature would normally be accessed by an individual through IE.

    I would normally expect an outgoing (or incoming) request to show on the firewall. As this machine is at my work now, it's behind a hardware firewall with incoming blocked.

    As this machine is not being used, all of these occurences happen when no applications are running and the machine is not in use.

    Again the sites cited in the Spy Site Blocking log by ZoneAlarm are:
    uzoogle.com
    games.uzoogle.com
    media.deskwizz.com
    adserving.budsinc.com
    content.bannerconnect.net

    Thanks again for your assistance.

    Bill
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay let's try the below!

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of kxara.dll once and then click the kill button. After you have killed all of the kxara.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of kxara.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    Now back on Killbox's main window, Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.

    C:\WINDOWS\kxara.dll


    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    Now attach a new HJT log and a new log from ShowNew

    Also tell me how the steps went.

    Make sure you tell me how things are working now!
     
  8. unclebill2717

    unclebill2717 Private E-2

    Thanks again for the follow up. Ran Process Explorer - no kxara.dll in either winlogon or explorer.exe.

    Added fixme.reg to registry. Ran Pocket Box killer and it removed kxara.dll.

    Attached is a new HJT log and a new log from ShowNew.

    Have had no pop ups and no log activity from ZoneAlarm about Spy Site Blocking with attempts to reach uzoogle.com

    It appears that this machine may finally be clean. Please check the logs to see if they look good. I'll post again if anything changes while the machine runs throughout the day.

    Thanks again.
     

    Attached Files:

  9. unclebill2717

    unclebill2717 Private E-2

    Well, unfortunately, ZoneAlarm's site blocking log is again reporting blocking uzoogle.com. It began about 1.5 hours after the previous post.

    After getting this report, I set ZoneAlarm to block access to the internet, and disabled ZA's Spy Site Blocking.

    With no DHCP server, the wireless network card went to 169.254.194.230 and ZoneAlarm did record a blocked outgoing attempt to 224.0.0.22 (IGMP.MCAST.NET). Is this related to the problem?

    Unfortunately, I'm running out of time. This computer is being packed up on Saturday.

    Thanks for your continued help.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No this is not a problem! Windows will sometimes ping a multicast address like that.


    You logs are pretty clean! Just delete the below file:

    C:\WINDOWS\SYSTEM32\w00e0c2f.ini


    Let's look at a couple more things!

    Run the below procedure and attach the runkeys.txt log.
    Let's get an installed programs list from HijackThis too!
    • Run HijackThis, click Open the Misc Tools section
    • Click Open Uninstall Manager
    • Click Save List (generates uninstall_list.txt)
    • Click Save, to save it to a file where you can find it.
    • Attach the uninstall_list.txt file to your next message.
    However I do want to point something out to you that McAfee says about uzoogle.

    http://www.siteadvisor.com/sites/uzoogle.com/

    Basically it is not a problem site!
     
    Last edited: Jul 14, 2006
  11. unclebill2717

    unclebill2717 Private E-2

    Thanks again for the help. Good to hear that uzoogle is not a problem site. It's still bothersome that something in the system is attempting to contact uzoogle and other sites. Seems like a problem waiting to happen.

    I deleted the suggested .ini file and attached are the text files. I did notice that GdiPlusUpgrade shows on the uninstall list but not in Control Panels Add or Remove list. I have never seen the GdiPlusUpgrade before. Is it any cause for concern?

    While entering this post, ZA blocked uzoogle.com again. Is just blocking this as good as it gets?

    Thanks again.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now attach a new runkeys.txt log and let me know if you are still getting that site blocked. If so, what exactly is running when they occur. Do they ever occur when you are not connected to the internet and all browsers are closed? Do they occur in safe mode.

    Also download the new version (it changed since you last downloaded it) of ShowNew from the link below and attach the newfiles.txt log.
    Note the below two items our old and you need to update to the new program versions:
    J2SE Runtime Environment 5.0 Update 6
    Mozilla Firefox (1.5)


    You can get them here:

    Sun Java Runtime Environment

    Mozilla FireFox
     
  13. unclebill2717

    unclebill2717 Private E-2

    Attached are the requested text files. With show keys, "dlh9jkdq7.exe is not recognized..." came up, but it still created the text file. I did see the file wnscpsu.exe which is shown as a type of malware. I don't see this as the problem, but should this be removed?

    Unfortunately, the registration modification was not the fix.

    As I explained in the previous posts, NO foreground applications are running. No browsers. No other programs. In the background, ZoneAlarm and mostly processes that manage display etc. The system appears pretty clean when looking at the logs. There is not a lot of the extra crap that floats around in most systems.

    To me, it seems that this could be one of a couple of things. One, a process that normally exists has been replaced with a "modified" version that "calls" out. Two, there may be a process that is running through Java or some sort of scheduler application. It attempts to contact uzoogle.com and then unloads itself. I say that because there doesn't appear to be anything unusual running.

    In talking to my niece, she felt her machine was compromised in the first or second week of May. She said she clicked on an email link from a friend and then everything started to happen. This machine was a wreck. The initial ZA scan had over 70 viruses, and 80 spyware. Every scan, including the "before you submit" scan turned up more issues.

    I'd like to resolve this so she can use this machine with confidence. So what do we try now?

    Thanks.
     

    Attached Files:

  14. unclebill2717

    unclebill2717 Private E-2

    Attached are the most recent runkeys.txt, newfiles.txt and hjt log. Looking through my niece's files, it appears she was hit on May 15, 2006 at about 4:19 p.m. Local service still had most of the cookies and temporary internet files. Clearing the files with ccleaner and Internet Explorer did not clean the files.

    There appeared to be a few additional directories including c:\windows\zabstract. These files were cleaned up, but still seeing the ZoneAlarm log attempting to contact uzoogle.com. It does not appear to do it from safe mode. Unfortunately, the way ZA has their screen, I can't view the log while in safe mode. It also does not attempt without the connection to the internet.

    Let me know if you have any further ideas. I have to give this computer back Sunday morning, so she can take it with her to California.

    Thanks for all of your assistance to this point, and any further ideas.

    Regards,
    Bill
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'm not sure if it is too late now since you said you had to give the PC back today.

    I don't really see any problems in any of your logs! You could just check the below files whose dates are around the time the problems began, but note that these are valid files names used with Sun Java. You just need to look at Properties information to make sure they are really from Sun.

    C:\WINDOWS\SYSTEM32\
    java.exe Wed May 3 2006 1:19:30a A.... 49,248 48.09 K
    javaw.exe Wed May 3 2006 1:19:40a A.... 53,346 52.09 K
    javaws.exe Wed May 3 2006 2:56:58a A.... 127,078 124.10 K

    I would also recommend updating to the current Sun Java (yours is one version out of date) and I would then uninstall all old versions and make sure your empty the Java cache.

    Then I would recommend completing the below!

    Go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds