Infected Despite following How-To guide

Discussion in 'Malware Help (A Specialist Will Reply)' started by chrisK, Apr 22, 2005.

  1. chrisK

    chrisK Private E-2

    Hi - I've removed virus and spyware before, and familiar ith the tools and procedures used. I read and followed all steps in you How to guide, and I've still got something. I'll describe the situation below, and would very much appreciate any help.
    Computer is WinXP Pro
    Browser is IE (will change when this is over)
    Running Avast Virus Scanner
    Running Sygate Firewall (plus Hardware firewall through router)

    Problem is a file in System32 directory that is running as a process and keeps trying to access an http address. Sygate alerts me with "TODO [filename.exe] is trying to access... and it's usually ABetterinternet.com or btgrab.com. Neither SpyBot, nor AdAware, nor PestPatrol pick it up, and I don't see any evidence of a BI file or infection.

    The filename is always something like jnhyyg.exe, and if you kill the process, another one (with a different but equally random) name begins to run. The old file in System32 disappears and the new one appears... Obviously can't delete them.

    There is reference to them in the Registry, and removing it does nothing.

    That's about where I'm at... Over the course of the week, lots of various spyware adware and perhaps some trojans have been removed.. with Sygate running I'm able to block out the reinfection.... but I can't get rid of it... I have two computers dealing with the same thing (they are networked normally).
    I appreciate any help. I'm stuck. Thanks!!
    Chris
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you have run all the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal and you are still having problems, follow the steps below.


    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).
     
  3. chrisK

    chrisK Private E-2

    Thanks for the response... Here we go!
    Attached is the logfile of Hijack This, run as instructed.
    Chris
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You never completed the steps in the READ ME FIRST. I see no evidence of the Trend Micro and Symantec online scanners being run. Is there a reason you did not run them. Did you skip anything else?

    Your OS and IE versions are seriously out of date. You MUST get updated after we address your current problems.

    You have a few items that can be difficult to remove. We must run some special tools to find hidden files related to them.

    1) Please EXTRACT all files from Qoologic Tool to its own folder - C:\Program Files\QoologicFinder . Then, DoubleClick Find-Qoologic.bat to run the tool. It should produce two log files. - Please attach them with your next post! It is possible that one of them will be too large to attach. If so, you should put it into a ZIP file and attach that. If you do not know how to do that, just skip the one that is too large.

    2) Please EXTRACT all the files form RKFiles Tool to its own folder named C:\Program Files\RKTOOL. Then, please boot to SAFE MODE and DoubleClick rkfiles.bat to run the tool. Let it run and then, when it finishes, look for a log at C:\Log.txt and please attach that log.


    Now come back here and post the logs as attachments. Three attachments will take two messages.
     
  5. chrisK

    chrisK Private E-2

    Thanks for the instructions. As for the two scans you referred to - I missed them... skipped them and went to the Alternative Scans... read right over them I suppose. So I have since performed them (in safe mode) and am posting the results of the scans with this attachment - they found (but coudln't clean) a few things.
    The next to posts will contain the results of Qoologic and RK
    Let me know what you see or what else I need to do. Thanks!
    Chris
     

    Attached Files:

  6. chrisK

    chrisK Private E-2

    The Qoologic directory only has the one file... did I do something wrong?
    Also in another folder are a few files I will attach to this and next...
     

    Attached Files:

  7. chrisK

    chrisK Private E-2

    And here is the RK File
     

    Attached Files:

    • log.txt
      File size:
      862 bytes
      Views:
      2
  8. chrisK

    chrisK Private E-2

    The rest of the Qool files (I think)
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please download Pocket KillBox and extract it to its own folder somewhere

    Now run KillBox.

    Below you will be entering items into Pocket KillBox. Please read thru all of the instructions so that you understand the steps and do not do something we do not want. Okay! Now select the “Delete on Reboot” and “End Explorer Shell While Killing File ” Options.Now Copy&Paste each of the below files into the box, making sure Delete on Reboot and End Explorer Shell While Killing File are Checked for each entry. Click the Red X to Delete each one, but DO NOT Allow your machine to Reboot until the last item has been entered:


    ** Note: For the DLLs, instead of End Explorer Shell While Killing File , check the Unregister .dll Before Deleting box instead.

    Okay here is the list of files:

    C:\WINDOWS\system32\Cache\Advtg.exe
    C:\WINDOWS\system32\Cache\pop.exe
    C:\WINDOWS\system32\Cache\VCM2 Qinstaller 282_190.exe
    C:\WINDOWS\system32\Cache\WebRebates_Auto_InstallSilent.exe
    C:\WINDOWS\System32\drnacaa.exe
    C:\WINDOWS\system32\dpkrn.dll
    C:\WINDOWS\system32\impzrz.exe
    C:\WINDOWS\system32\shiypyy.dll
    C:\WINDOWS\system32\wbauq.dat
    C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rpka.exe




    When the last item has been entered and you are prompted to reboot, allow Pocket KillBox to Reboot your computer. If you get a Pending File operations type error message, just reboot your PC yourself.

    After reboot attach a new HijackThis Log and tell me how things are working and if you had any trouble with the above instructions.
     
  10. chrisK

    chrisK Private E-2

    Thanks! I followed the steps you suggested, and so far don't see any problems...
    The computer somehow rebooted after the dll entry the first time through (it prompts twice, but this one only prompted once, and it rebooted)... so I went back and enteredt them all in again, and allowed KillBox to reboot me.

    Attached is the Hijack this log...

    I don't see any funky looking processes running, but let me know what you see in the log. Assuming it worked (miracle worker, you are :)) can we try again on my wife's computer? I don't know what steps of the how-to I have and haven't done on hers, so I'll just start over and setup a new post?

    Chris
     

    Attached Files:

  11. chrisK

    chrisK Private E-2

    And then it happened...
    I am starting the scans on the laptop (equally infected) and doesn't the firewall on this one (that we've been working on) alert me about a blocked outgoing attempt: btg.btgrab.com
    Also, a succesfull reach to a.tribalfusion.com....
    So I guess we're not done yet...
    Chris
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We need to take care of the below service:

    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)

    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.

    On the page that opens, scroll down to System Startup Service or SvcProc ... right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Next, open up HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    SvcProc

    Now exit HijackThis!

    Tell me if you run into any problems doing the above.

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\System32\impzrz.exe
    O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O15 - Trusted Zone: http://mail.aps1.net
    O15 - Trusted Zone: *.aps1.net
    O15 - Trusted Zone: www.msn.com
    O23 - Service: System Startup Service (SvcProc) - Unknown owner - C:\WINDOWS\svcproc.exe (file missing)
    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\System32\impzrz.exe <--- I was hoping the previous step with Killbox delete this. Is it really here still.

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST). Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  13. chrisK

    chrisK Private E-2

    Hi chaslang,
    I think *maybe* we got it this time - log looks pretty good to me (and my untrained eye!) I've only just rebooted, and no problems. I'm going out for an hour or so and will see how things look when I return. A few notes about the removal:
    I rebooted after selecting to remove the SvcProc in HJT (but before Fixing the other processes). When I came back, the last item to check: 023: System Startup Service... was not there. Hopefully that was a good thing.
    Additionally, when I went to SafeMode, now impzrz.exe file in the System32 subfolder. Again, I think that's a good thing.
    Thanks for all the help. Please look for another thread from me later tonight about the laptop... I've just about completed all of the steps in the How-to (and yes, I believe it's *all* of them this time :))
    Keeping my fingers crossed!
    Chris
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're log is clean! But now you have more work to do on this PC to help keep it this way.
    You must run the steps in the below link, the first of which is to get your Windows Updates.

    How to Protect yourself from malware!
     
  15. chrisK

    chrisK Private E-2

    Aurora Popped Up (c:\windows\hnhjlijadt.exe) trying to connect to btg.btgrab.com

    Also, a few items in Sygate referring to outgoing access to: doubleclick.net, tribalfusion.com

    I'm doing the recommended updates for Windows Update and the Spyware blocker in the meantime. Perhaps a scan will catch aurora?
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds