I'm Baffled, this junk keeps coming back

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Fuelman, Dec 15, 2004.

  1. Fuelman

    Fuelman Private First Class

    I have been fighting this browser hijacking and junk for a long time, I think I drove the folks at Lavasoft nuts on thier help forums.
    I have followed the steps listed at the top of the forum with the following exceptions: trend micro scan will not work for me and spybot download kept timing out (i'm on slow dialup), and HSRemove would not download. I do have Norton AV Corporate and keep it current and for some reason the Panda virus scan online thing works for me but it takes three hours, Panda and norton say my machine is clean.
    I have been running AdAware SE Plus with AdWatch, using HJT and about buster as directed by Lavasoft forum advise.
    Everything has been downloaded (with above exceptions) and followed as best as I could. i just got online after following all this and AdWatch is going nuts with registry modifications. This is what has been going on for some time- neither of my cd drives is working, nothing will autoload or autostart when trying to install new software, notepad is missing and the list goes on.
    Can anybody HELP???
    I'm not a bright person when it comes to computer stuff, so keep actions I need to perform in terms a child can understand. If you want any logfiles posted, I'l try to figure that out too.

    Thanks a bunch
    Brian
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Make sure you have HijackThis 1.99 and follow the guidelines on where to install it and how to post a log as an attachment. This is all covered in the sticky thread NO HIJACK THIS LOG FILES BEFORE READING THIS: HJT Tutorial & LOG File Posting

    Now post a HijackThis as a .txt file attachment to your message. All running programs should be closed, including your web browser, e-mail. Close before running Hijack This!

    To repeat: Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file. Place it in its own folder, for example C:\Program Files\HJT
     
  3. Fuelman

    Fuelman Private First Class

    Chaslang,
    HJT is the latest version, as well as everything else. I put it in: C:\hjt\hijackthis and run the .exe from there and leave the zipped file elsewere.
    Hopefully I will figure out how to attach a logfile. I'll try it in its format from hjt and in MS Word.
    On the lavasoft forum, at one time they told me to remove the entries ending with 37049, I do and it keeps coming back along with the sysmy, ieam and a few others. Every time I reboot, it all comes back.

    Thank you
    Brian
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We only need the log file no Word files!

    Is this log from normal boot mode or safe mode? I need a normal boot log!

    Make sure you have system restore disabled and viewing of hidden files enabled (per the tutorial).
    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Look for the below process(es) and if found, End them:
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\llzwy.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\llzwy.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {46E12037-4A39-43D9-3B76-14AD3F253732} - C:\WINDOWS\system32\winez32.dll
    O4 - HKLM\..\Run: [sysmy.exe] C:\WINDOWS\system32\sysmy.exe
    O4 - HKLM\..\Run: [ieam.exe] C:\WINDOWS\system32\ieam.exe
    O23 - Service: Network Security Service - Unknown - C:\WINDOWS\system32\atleg32.exe (file missing)

    Boot into safe mode and use Windows Explorer (click Start and select Explore to bring it up) to delete:
    C:\WINDOWS\system32\llzwy.dll
    C:\WINDOWS\system32\winez32.dll
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe
    Now reboot in normal mode and post a new HJT log. And tell us how things are working.

    This next O23 line is Adware from Compaq. It's up to you whether you want to remove it or not.
    O23 - Service: Content Monitoring Tool - Unknown - C:\WINDOWS\system32\msCMTSrvc.exe
     
  5. Fuelman

    Fuelman Private First Class

    Chaslang,
    system restore is disabled and viewing hidden files is enabled

    these files were not found in task manager
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    HJT was run with browser closed, identified files were checked to be fixed in hjt.

    Booted into safe mode and could only find and remove:
    C:\WINDOWS\system32\llzwy.dll

    These next three could not be found and therefore not removed:
    C:\WINDOWS\system32\winez32.dll
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    The hjt logs attached, one is before and the other is after, you can see the time stamps. both are in normal mode and second one is after "fix" and after rebooting. "It's Back"


    Thanks for your help, I'll keep plugging away if you're willing to see this through.

    Thanks
    Brian
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Have you run about:Buster? If not, please run it once in normal boot mode (make sure no browsers are open) and save the log to ab1.txt. Then immediately reboot into safe mode and run it again (save the log to ab2.txt). Then reboot normal mode open one IE session and then exit. Now get a new HJT log before doing anything else and post it here along with the two about:Buster logs.

    We may have to run the Generic Solution sticky thread.
     
  7. Fuelman

    Fuelman Private First Class

    Chaslang,
    About buster logs, one in normal and one in safe mode are in one .txt file one right after the other.

    HJT logfile after reboot into normal and one quick open IE session, is the next attachment

    This is a persistant little bugger , aint it?

    Brian
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! Real HSA hijackers are tough. I say real because sometimes these infections are minor and do not have all the real nasty components like hidden DLLs, Alternate Data Streams (ADS), hidden respawning EXEs, hidden services. You have them all and even have a double DLL in the RO & R1 section which is unusual.

    Let's try one more thing before we will have to hit the long Generic Solution.

    Make sure you have system restore disabled and viewing of hidden files enabled (per the tutorial).

    Please download ADSspy unzip to someplace you can find later.
    Please download: Pocket KillBox unzip to someplace you can find later.

    Print these instructions or save locally. You must not be connected to the internet during this. That means after reading this sentence, I want you to disconnect.

    Close all open programs, windows and browsers and run Killbox. Select Delete on Reboot and End Explorer Shell While Killing File. Note on any DLL file we have below, the Unregister .dll Before Deleting will become available. Make sure you select it.

    Enter each of the below filenames (one at a time) into the box for Full Path of File to Delete. Then press Delete button (red X), when it says reboot now, say no and continue to paste in all the filenames and follow the above procedure every time, DO NOT let it reboot yet until I say to. (Just say no when prompted.

    C:\WINDOWS\ahdcj.dll
    C:\WINDOWS\qkxwe.dll
    C:\WINDOWS\javaaa32.dll
    C:\WINDOWS\system32\atltf32.exe
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    After entering all those files into Killbox, Exit Killbox.

    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Look for the below process(es) and if found, End them:
    C:\WINDOWS\winqu32.dll:wsely
    C:\WINDOWS\system32\atltf32.exe

    Exit Task Manager

    Run ADSspy and click Scan the system for alternate data streams. I expect you to find the two files below (ignore any others but write them down and tell me if you find others)
    C:\WINDOWS\winqu32.dll:wsely
    C:\WINDOWS\appnk.dll:wpnkc

    If you find those two files, put check marks next to them and click Remove selected streams. Answer OK/yes to continue with the delete.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ahdcj.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ahdcj.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {FA763F3C-E4F7-7BA9-D285-9D9E6544FFA5} - C:\WINDOWS\javaaa32.dll
    O4 - HKLM\..\Run: [sysmy.exe] C:\WINDOWS\system32\sysmy.exe
    O4 - HKLM\..\Run: [ieam.exe] C:\WINDOWS\system32\ieam.exe
    O23 - Service: Network Security Service - Unknown - C:\WINDOWS\system32\atleg32.exe (file missing)

    After clicking Fix exit HJT.

    Then click Start > Run and type %temp% in the Run box, press OK. The Temp folder will open. Click Edit > Select All then Edit > Delete to delete the entire contents of that Temp folder. Also, empty the contents of your Recycle bin and c:\windows\Prefetch folder.

    Now reboot your PC. Come back here with a new HJT log and tell me how things are looking.
     
  9. Fuelman

    Fuelman Private First Class

    I think this is going to be a real bugger to get rid of.
    went through exactly as noted and here's what happened;
    could not find in task manager to delete:
    C:\WINDOWS\winqu32.dll:wsely,
    C:\WINDOWS\system32\atltf32.exe

    After running ADSspy, I found the two you mentioned and deleted them, however, a few more files were there, like 502 more ads's. Is that suposed to be correct?

    Ran HJT and fixed everything you said, most of it came back after reboot as you can see.

    Whats next?

    Quick question, I have a good copy of windows xp pro and sp2, can this be installed over my existing system and fix all this garbage?

    thanks
    Brian
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Installing over this (upgrading) will not help and likely would corrupt the upgrade. Obviously a format and a complete reinstall will but that is a lot of work too especially if yo have lots of data you need to backup and lots of applications to reinstall and tweak back to how you have them setup.

    What were some of the 502 more ads's filenames you found? Did you only search the Windows folder?

    Start reading When all else fails - Generic Solution to HSA (Only the Best) & About:Blank hijack

    It may have to be our next step. It is long! It has almost always worked but you do have some new stuff popping up. Perhaps a new variation. Anyway read it to get familiar and ask questions of things you don't understand and if you cannot figure out what lines from your log relate. But do on thing first! Goto step 6 of the Generic Procedure and tell me if you find those EXACT service names (THEY MUST MATCH EXACTLY).
     
  11. Fuelman

    Fuelman Private First Class

    OK chaslang,
    I did step 6 and Network Security Service was found and stopped and disabled, path was c:\windows\system32\atleg32.exe\s.
    I also found Remote Procedure Call, it COULD NOT be disabled or stopped, path was: c:\windows\system32\svchost -k rpcss

    attached is the logfile fo the adsspy run, i'm up to a total of 515 alternate data streams.

    I read through the generic solution and tried to go to the sites you mention to identify the O4 section files as good or bad. I guess that stuff is a bit over my head. I guess I'll need a little coaching on the files needed to be fixed.

    I'll hang on as long as you're willing to help.

    Thanks
    Brian
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Brian,

    Please remember to read carefully and follow directions exactly.

    In my last message I said,
    Note the work EXACTLY. Had you disabled Remote Procedure Call, you would be in deep doodoo right now. Step 6 of the Generic Solution mentions three services to look for:
    1. Network Security Service
    2. Workstation Netlogon Service
    3. Remote Procedure Call (RPC) Helper
    When looking for these services, it must match exactly those, word for word or they should not be touched. You found Network Security Service and I have been seeing that one in your HJT logs in one of the O23 lines. But even though it is stop and disabled, and according to HJT the file is missing, we still have not been able to have HJT fix that line. I'm trying to find out why.

    Don't take this the wrong way, I'm not scolding/yelling at you. I just want to stress the importance of following steps exactly. Malware likes to try to trick you and name things very much like valid items. They sometimes even name a bad file exactly the same as a good file but they will located theirs in a different directory. For example:
    - C:\WINDOWS\system32\svchost.exe <--- this is a valid windows process
    - C:\WINDOWS\system32\svchoste.exe <--- this is malware
    - C:\WINDOWS\system\svchost.exe <--- this is malware or does not belong there anyway
    - C:\WINDOWS\svchost.exe <--- this is malware or does not belong there anyway

    Another example:
    C:\WINDOWS\system32\winlogon.exe <--- this is a valid windows process
    C:\WINDOWS\system32\winlogin.exe <--- this is malware
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have a ton of infected files in that list (not all of them are bad).

    Can you please try running Hsremove? Run it about 6 times in succession let me know what it finds each time (if anything). The run it one after booting in safe mode. Let me know what it finds in safe mode.
     
  14. Fuelman

    Fuelman Private First Class

    Chasling,
    I was finally able to get HSRemove downloaded and working as well as SpyBot Search and destroy and got it updated.

    I ran HSremove several times and the only thing it has when finished is that it removed 8 entries. It removed 8 things each time it ran after the first time which it removed something like 23 things. In safe mode, it removed 8 things as well.

    Sorry about misunderstanding the instructions, I'll read more carefully for now on.

    Thanks
    Brian
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay run HSremove a few (let's say 3) more time. Tell me how many (if any) problems are found each time. Then post a new HJT log and get another log from ADSspy and post it too.
     
  16. Fuelman

    Fuelman Private First Class

    chaslang,
    I ran HS Remove three more times and each time it came up with 8 items removed. attached is the adsspy log run immediatly following the hs remove actions.

    thanks
    Brian
     

    Attached Files:

  17. Fuelman

    Fuelman Private First Class

    OOPS,
    forgot to post a HJT Logfile. I had to log off real quick run HJT and then get back online to post the logfile. Hope that did'nt screw anything up.
    The adsspy and hjt logfiles are befoe rebooting again.

    Brian
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    HSremove is not giving you any information on the filenames at all?

    I'm surprised at how many items ADSspy is picking up. Some of the filenames seem typical of HSA infections but others do not. I'm trying to figure out a safe way to remove these files. ADSspy has no backup capability.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    1. Download Service Filter from here:
    http://home.comcast.net/~rand1038/vbscript/ServiceFilter.zip
    2. Extract it to it's own folder.
    3. Double Click on ServiceFilter.vbs
    4. A text file called POST_THIS will be in the same folder
    5. Attach the contents of POST_THIS here. You will have to rename the file to have a .log or .txt extenstion so you can upload it.

    I also want you to download and install AVG7 from: http://www.majorgeeks.com/download886.html

    It will ask questions on how to install - go with the defaults - allow it to update (until no updates are found) but otherwise just hit the next button till it finishes installing.

    Now make sure ALL other programs are closed. You cannot be online during the remainder of this procedure so print or save these instructions locally and then physically disconnect (unplug cable) before going to the next steps.

    Then run AVG7 and choose 'selective scanning'

    Select the c: drive.

    if it finds an infected file it will ask what to do - choose 'delete' file when it asks for 'can it reboot to remove a file' say no. When it has finished, run a scan a second time with the same responses to the infected files. Each time you run it. make a note of some of the filenames, if finds (if any).

    Make sure you have system restore disabled and viewing of hidden files enabled (per the tutorial).
    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Look for the below process(es) and if found, End them:
    C:\WINDOWS\javaic32.exe:luiih
    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\qkxwe.dll/sp.html#37049
    O4 - HKLM\..\Run: [sysmy.exe] C:\WINDOWS\system32\sysmy.exe
    O4 - HKLM\..\Run: [ieam.exe] C:\WINDOWS\system32\ieam.exe
    O23 - Service: Network Security Service - Unknown - C:\WINDOWS\system32\atleg32.exe (file missing)

    Make sure you click Fix in HJT this and then immediately do another HJT scan and post the HJT log when you come back after completing the remaining steps below.
    Now exit HJT and Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\qkxwe.dll
    C:\WINDOWS\javaic32.exe
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    Remember to tell me if there are any errors or problems deleting those files after you come back online.

    Now reboot in normal mode and run AVG7 two more times answering any questions on files it finds as we did above.

    Okay now reconnect your cable and come back here. Now post the HJT log from above and let me know the results from the AVG7 scans too.
     
    Last edited: Dec 19, 2004
  20. Fuelman

    Fuelman Private First Class

    Chaslang,
    Took three hours to download the AVG7, and then updated it, On the first scan after shutting everything down like you mentioned, it found 238 of these:
    Trojan horse Downloader.Agent.5.M, it had various ending characters such as ....4.A, 2.BM, BN, BU, BV, 2.Z, AE, 3.O, T and one lonely line in there somewhere was listed as Downloader.Presario.A

    All the above junk was deleted.

    After going in and running HJT and deleting the stuff mentioned except the O23 item which could not be found (could it have changed names?)

    In safe mode and windows explorer, I could only find the javaic32.exe. The other three lines could not be found at all.

    Rebooted and ran twice more, no additional things found in AVG7

    Service Filter and HJT logs attached.
    Hopefully I did everything correctly.
    Thanks

    Brian
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Brian,

    Please give this tool from Symantec a run: http://securityresponse.symantec.com/avcenter/FxAgentB.exe


    Tell me if and what it finds.

    I think our next step has to be my Generic Solution thread. So start reading to get familiar with it and ask any questions that you may have. You cannot stop in the middle and you absolutely must not go online or open a browser during the steps. I wil help you identify the items you need to know from your HJT log. But I need to see another one right now. (Some items appeared to be missing from the last one that are not normally missing.) So post a new log now and (VERY important) do not shutdown/reboot your PC. This hijacker can morph and changes names of certain files or even spawn more hijacker files if you do. You can disconnect your phone line (physically - yes even a dialup is not safe) to protect yourself while waiting to come back here looking for my response.

    Also before doing the steps below (even if you did them before) and tell me if you have each item set as requested:

    Click Start.
    Open My Computer.
    Select the Tools menu and click Folder Options.
    Select the View Tab.
    Under the Hidden files and folders heading select Show hidden files and folders.
    Uncheck the Hide extensions for known file types option.
    Uncheck the Hide protected operating system files (recommended) option.
    Click Apply.
    Click OK.
     
    Last edited: Dec 21, 2004
  22. Fuelman

    Fuelman Private First Class

    Chaslang,
    Ran the symantic thing, did'nt come up with anything that I could tell since I cant open up .log files. Its attached.
    A new HJT log is attached and I will not shut down or reboot untill the instructions say to.
    I read over and printed out the generic solution and it seems a bit on the confusing side since looking at these strings of files is like looking into a bowl of alphabet soup to me. If you could just help me identify what I need to look for in which step (specific files), that would be of great help to me.

    I'm ready!
    Thanks
    Brian
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well I'm going to hold off one more time on the Generic Solution. The for that decision is that you no longer show the Browser Helper Object (BHO) or the Network Security Serivce at all. So lets try one more time using Pocket Killbox.

    Physically Disconnect (unplug cable) from the internet.

    Close all open programs, windows and browsers and run Killbox. Select Delete on Reboot and End Explorer Shell While Killing File. Enter each of the below filenames (one at a time) into the box for Full Path of File to Delete. Then press Delete button (red X), when it says reboot now, say no and continue to paste in all the filenames and follow the above procedure every time, DO NOT let it reboot yet until you enter the last file (ieam.exe). Then say yes and allow it to reboot your PC.
    C:\WINDOWS\qkxwe.dll
    C:\WINDOWS\system32\sysmy.exe
    C:\WINDOWS\system32\ieam.exe

    After reboot, immediately post a new HJT log.
     
  24. Fuelman

    Fuelman Private First Class

    OK,
    Ran the kill box (phone line disconnected) did what you said and when the last one was done, I asked to to reboot and it would'nt, an error message came up. So I rebooted manually then ran hjt, log attached. The stuff you asked me to delete is still there.
    I don't seem to be getting any more browser hijacks (at least that I'm aware of) and AdWatch is blinking red a little bit less now.

    What exactly are these things you asked me to remove do anyway? Are they data miners or hide and do somethi9ng malisious like corrupt my drivers or do they go out to the net and say hello to all there spyware buddies and invite them in via a secret handshake? ,just curious since I have no idea what the exact effect these have.

    I'll check in later tonight.

    Brian
     
  25. Fuelman

    Fuelman Private First Class

    OOPS, here's the attachment
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What was the exact error message? Did it occur while pasting the last file into PocketKillbox.

    These files are the part of the HSA hijacker. If we do not get rid of them, it can come back. They are sitting there and running the whole time. We need to find out why they are not deleting and staying deleted.

    The problem may still be the hundreds of ADS files that were in your directory. Many of them appeared to be HSA similar filenames. Another strange thing here is that your filenames are not mutating each time we try to delete them. They always have in the past. I'm starting to wonder if Ad-Aware and/or anything else is getting in the way of cleaning these.

    You do have System Restore disabled, don't you.
    Did I have you download any tools from SysInternals yet. Like ProcessExplorer, Regmon, and Filemon?
     
  27. Fuelman

    Fuelman Private First Class

    You had me download process explorer.
    System restore is disabled.
    I turn off norton corporate before every run
    I turn monitoring off on AdWatch.
    If you think it'll work, I can start deleting adsspy identified strings, you'll have to identify which ones. How many things should be there anyway?

    I'll run kill box again and paste the error here. One thing that struck me funny was that as soon as I typed in the C: in kill box, an error box poped up and I had to click ok to continue typing in the file name.

    Why, since these files exist, can I not see them when I open up explorer or do a search for them in windows? All the boxes are checked accordingly to unhide all the files.

    I'll get offline and rerun kill box and then post the errors.

    Brian
     
  28. Fuelman

    Fuelman Private First Class

    here's what kill box says

    when typing in the C: it comes up with " Error:5. Invalid procedure call or argument"

    When finished with the last entry and I click on reboot now in the window, it waits for a few seconds and has "verify registry entries, plz wait"
    then a few seconds later a box pops up with a great big red X with the following: "PendingfileRenameOperations Registry Data has been Removed by External Process!"

    Hope some of this makes sence to you 'cause I'm still just as baffled as I started out.

    I hope you get paid for helping out here.

    Brian
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What version of PocketKillbox do you have?
     
  30. Fuelman

    Fuelman Private First Class

    2.0.0.76

    It just says killbox, not pocket killbox
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! Instead of typing in the file names and paths use cut & paste of the whole string.
    Do you know what I mean?

    This time select Replace on Reboot and Use Dummy and also for the DLL file select the Unregister .dll Before Deleting option (it will become available as soon as you paste in the dll file).

    Let me know if you have any errors doing that. After the third file name is entered and you click the all the options. This time say yes to reboot.

    After your system reboots get a new HJT log and post it.
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmm! Mine says Pocket Killbox at the top of the window and also says the same in the About popup window.

    Did you download it from the link I gave?
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! We do not get paid!
     
  34. Fuelman

    Fuelman Private First Class

    Sorry about that, the icon in the folder jsut says killbox, the header once the program is opened does say Pocket Killbox.

    OK, here's what happened after doing the cut and paste method:
    The "Unregister dll" would not light up and could not be checked. Other boxes checked fine.
    Once run, it gives me the exact same error message: "PendingfileRenameOperations Registry Data has been Removed by External Process!"

    Am I doing something extremely wrong here?

    Brian
     
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    When you paste in this filename: C:\WINDOWS\qkxwe.dll
    The Unregister .dll button should be available. Check it again.

    What do you mean by "Once run" ? Do you mean when you choose yes to reboot after entering the last file name?
     
  36. Fuelman

    Fuelman Private First Class

    When you paste in this filename: C:\WINDOWS\qkxwe.dll
    The Unregister .dll button should be available. Check it again.

    What do you mean by "Once run" ? Do you mean when you choose yes to reboot after entering the last file name?



    I checked it again, NOPE !!, can not get that box to check, even tried differrent combinations of the other checkboxes.

    Yes, I was referring to when I chose yes to reboot after entering the last file name.

    Now what?
     
  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay find ProcessExplorer that you downloaded. Unzip it and now run ProcessExplorer and lets configure some options first:

    Click View and select Show Lower Pane. And where it says "Lower Pane View" make sure DLL's is checked. Now click on explorer.exe. Now also under the View menu choose "Select columns" and put a check mark on "Image Path".

    Now click on File and then Save As. And save the process list. Post it back here as an attachment. Also, from now on if I say to kill a process, use ProcessExplorer instead of Task Manager. Sometimes ProcessExplorer can kill things that Task Manager cannot.

    I think a process may be interferring with the operation of killbox when it tries to delete. That is the reason for the error messages (I think). I don't know why you cannot get the Unregister dll box to become useable.
     
  38. Fuelman

    Fuelman Private First Class

    Heres the Process Explorer logfile

    Hope I followed your instructions correctly.
     

    Attached Files:

  39. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I cannot find any bad process running. Try having ProcessExplorer kill the following and then use killbox again. Make sure no browser sessions are running too:

    avgamsvr.exe
    avgupsvc.exe
    defwatch.exe
    incdsrv.exe
    rtvscan.exe
    InCD.exe
    vptray.exe
    Ad-Watch.exe
    acrotray.exe
    qbupdate.exe
    WINWORD.EXE

    Post another HJT log now too.
     
  40. Fuelman

    Fuelman Private First Class

    I killed the identified processes, and tried re-accomplishing the Kill box steps agian, The exact same error pops up just like it has been.

    I'll hang in there as long as you will.

    Brian
     

    Attached Files:

  41. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Damn! This is become a real challenge!

    Now we are going to use notepad to erase the contents of the DLL file shown in the R0 & R1 lines of your HijaakThis log. To do this click Start, Run, and enter the following command "notepad C:\WINDOWS\qkxwe.dll" (without the quotes) and click OK.

    Now in the notepad window, hit CTRL-A to select all contents of the file then hit the Delete key to delete all lines of the file. Now save the file (yes as an empty file). Now using Windows Explorer, locate the file qkxwe.dll and right click on it and select Properties and change the attributes to Read Only and click OK.

    Tell me when you get that done. Let me know if you have any problems doing that.

    Also use Windows Explorer to get into C:\WINDOWS\system32
    Do you see the below files:
    sysmy.exe
    ieam.exe
     
  42. Fuelman

    Fuelman Private First Class

    You think this is a challange? , I can think of some other explictives !
    Challange for you, frustrating for me. Guess this when solved can be "Brian's malware"

    OK,
    did the notepad thing and it came up blank, having the qkxwe.dll in the notepad border and nothing in the notepad, just blank. there was a note that said something like "file not found", or something of that nature.

    Could not find sysmy or ieam files of any type in c:\windows\system32.

    I did notice a bunch of .exe lines in that system 32 floder that resemble the sys or ie files but have different ending letters like iebi.exe. funny thing was none of these files had any size to them. file size was all zero and the dates were relatively recent (not the 2003 and 2002 dates on most of the stuff there).

    hope this is of some help.

    I'm grabbing a beer for this one and will be hanging here.

    Brian
     
  43. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're positive you have viewing of hidden files enabled?

    Delete all those recent 0 length files but before doing so sort the directory by created date and look for other similarly named files in the same date range.
     
  44. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do the following:

    1) Open up a command prompt by click Start, Run and entering cmd and click OK
    2) Enter the following sequence of commands each followed by the enter key (let me know the result for each)
    - cd C:\WINDOWS\system32
    - attrib -r -h -s sysmy.exe
    - attrib -r -h -s ieam.exe
    - dir sysmy.exe
    - dir ieam.exe
    - del sysmy.exe
    - del ieam.exe
    - cd ..
    - attrib -r -h -s qkxwe.dll
    - notepad qkxwe.dll

    If the notepad line works and actually finds the file. Blank it and write it as requested previously.
     
  45. Fuelman

    Fuelman Private First Class

    Answer for each was "file not found" or "could not find" when going to the cmd prompt.


    Here's what I found in explorer for the empty files in windows\system32

    all this has an .exe ending and file size of zero with a date within the last 6 weeks.
    iefr, iegk, ieis32, ieki, sysfk, sysas32, sysdp32, sysih, syslm, sysnm, syspf, sysxb sysuv32 and a few more and a couple that end in .dll such as syssc32.dll

    should I delete these, there are literally hundreds more with every alphabet combo you can think of, all with zero file size, these need to be deleted too?

    I could not figure out how to copy the filenames and paste them here.

    any suggestions?
     
  46. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You could make a temporary folder (like c:\junk) and move the file to that folder rather than deleting them. Sort of like a back up. I think this is the reason we are having problems. There are just too many of them. All those ADS files that ADSspy found are also problems. And this is just the Windows folder. What about c:\windows\system32?

    Sorting by dates and size may help in the process of moving these a little faster.

    The easiest way to move files is to run two Win Explorer sessions, select the files in one window and while holding down the right mouse button drag them into the other Win Explorer window which should loaded with the c:\junk folder selected. When you let go of the mouse select Move not copy.
     
  47. Fuelman

    Fuelman Private First Class

    That was in the windows\system32 folder

    So you just want me to move all the .exe files with zero file size to a junk folder, am I completely understanding this?

    So why can we not find the qkxwe, sysmy and ieam folders?, is this thing hiding in some other fictous folder someplace or is it morphing into this other stuff that has zero file size?

    Brian
     
  48. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's right! You did say system32. But remember ADSspy reported a whole load more filenames with ADS that are in c:\windows many of them are problems too.

    Yes move all the 0 byte files to the junk folder. Also look for similarly named .dll and .dat files within the same date of file creation range and we should move them too.

    I'm not exactly sure why we cannot find them but there have been cases like this (they call them super hidden files). Sometimes you need to find a particular process or registry entry and change it inorder to get the file to become visible.
     
  49. Fuelman

    Fuelman Private First Class

    system32 is all cleaned out of zero size files, just the .exe's at the moment.
    I'll hit all the zero size dll's too.

    In five minutes, c:\windows will be cleaned out of zero size files too.

    I did find the qkxwe.dll, it popped up in the windows folder
     
  50. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I had you looking for qkxwe.dll in c:\windows several times but you said you could not find it before?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds