Infected

Discussion in 'Malware Help (A Specialist Will Reply)' started by ichthus05, Feb 18, 2007.

  1. ichthus05

    ichthus05 Private E-2

    I'm not much of a "tech geek" but I've tried to purge my PC of infections with no success. Have been running Symantec/Norton NIS 2006 plus regular Spybot scans. Apparently neither is effective in purging what's gotten in, though NIS does regularly put lots of stuff in quarrantine.

    I had tried a few things on my own (such as SmitFraudFix and VundoFix), and also ran through all the steps spelled out here:
    http://forums.majorgeeks.com/showthread.php?t=35407
    I was not able to scan in Safe Mode--the PC would boot OK but desktop icons and task bar would not load. Got only a frozen black screen. For reasons I won't go into, ran CounterSpy three times over two days, will provide logs from each one.

    Will appreciate whatever help you can offer. Thanks much.

    Attached:
    CounterSpy logs 1, 2, 3
     

    Attached Files:

  2. ichthus05

    ichthus05 Private E-2

    Next three attachments:

    BitDefender log
    Panda ActiveScan
    GetRunKey
     

    Attached Files:

  3. ichthus05

    ichthus05 Private E-2

    Additional scan logs:

    ShowNew
    HijackThis
     

    Attached Files:

  4. ichthus05

    ichthus05 Private E-2

    Final attachments, run prior to MajorGeeks routine:

    SmitFraudFix
    VundoFix

    One last comment...I've been plagued by lots of pop-ups, some of which led me to the above referenced tools. In case it helps, the pop-up that is now most regularly appearing is the one that reads:

    Visual C++ Runtime Library
    Buffer overrun detected!
    Program: C:/Windows/Explorer.exe[/I][/I]
     

    Attached Files:

  5. ichthus05

    ichthus05 Private E-2

    Sorry for the multiple posts...first time user errors. Anyway, thought it's worth noting that my IE homepage has been redirected and locked for some time, originally to a Symantec page and now to the MSN main page.
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Uninstall the Sunbelt CounterSpy trial since we are finished with it now! Then delete the below two folders which may be left behind by the uninstall:
    C:\Documents and Settings\All Users\Application Data\Sunbelt Software
    C:\Program Files\Spyware Tool Downloads\Sunbelt CounterSpy

    Also delete the below two folders from Viewpoint Media:
    C:\Documents and Settings\HP_Administrator\Local Settings\Application Data\Viewpoint
    C:\Program Files\Common Files\Viewpoint

    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.


    Make sure you have rebooted in Normal Mode (do not open any other processes)
    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of mlljk.dll once and then click the kill button. After you have killed all of the mlljk.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs(If you do not find the dll, just continue on):
    jkkli.dll
    fccayxy.dll
    xxywvvv.dll

    Next double click on explorer.exe and again click once on each instance of mlljk.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    jkkli.dll
    fccayxy.dll
    xxywvvv.dll
    Next double click on iexplore.exe and again click once on each instance of mlljk.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    jkkli.dll
    fccayxy.dll
    xxywvvv.dll

    Now just exit Process Explorer.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.
    C:\WINDOWS\surfmonkey\smproxy.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    O2 - BHO: (no name) - {1267E18D-FA54-44E3-924F-645D247ED919} - C:\WINDOWS\system32\jkkli.dll (file missing)
    O2 - BHO: (no name) - {371AE1A8-E5BA-4328-A66D-7CFAF10D4E26} - C:\WINDOWS\system32\mlljk.dll
    O2 - BHO: (no name) - {A203EE6B-DAA2-4F2F-BB08-0B664BDB751C} - C:\WINDOWS\system32\xxywvvv.dll (file missing)
    O4 - HKLM\..\Run: [ELNKProxy] C:\WINDOWS\surfmonkey\smproxy.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0\bin\jusched.exe"
    O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O9 - Extra button: Poker.com - {6FDD5236-C9F0-49ef-935D-385F5E21991A} - L:\Games\Poker.com\poker.exe (file missing) (HKCU)
    O16 - DPF: {9522B3FB-7A2B-4646-8AF6-36E7F593073C} - http://a19.g.akamai.net/7/19/7125/4056/ftp.coupons.com/r3302/Coupons.cab
    O20 - Winlogon Notify: fccayxy - fccayxy.dll (file missing)
    O20 - Winlogon Notify: jkkli - C:\WINDOWS\system32\jkkli.dll (file missing)
    O20 - Winlogon Notify: mlljk - C:\WINDOWS\system32\mlljk.dll
    O20 - Winlogon Notify: winbfi32 - winbfi32.dll (file missing)
    O20 - Winlogon Notify: xxywvvv - xxywvvv.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\1008511642
    C:\xrnotif.txt
    C:\WINDOWS\cpbrkpie.ocx
    C:\WINDOWS\system32\fccayxy.dll
    C:\WINDOWS\system32\jkkli.dll
    C:\WINDOWS\system32\mlljk.dll
    C:\WINDOWS\system32\kjllm.tmp
    C:\WINDOWS\system32\kjllm.ini
    C:\WINDOWS\system32\kjllm.ini2
    C:\WINDOWS\system32\xxywvvv.dll
    C:\WINDOWS\surfmonkey\smproxy.exe
    C:\Program Files\Online Services\PeoplePC\ISP5900\Dll\RAS.DLL
    C:\WINDOWS\system32\config\systemprofile\Desktop\DATA FROM OLD MACHINE\WINDOWS\Downloaded Program Files\MyPointsPointAlert_InstallSilent.inf
    C:\WINDOWS\system32\config\systemprofile\Desktop\DATA FROM OLD MACHINE\WINDOWS\Downloaded Program Files\UpromiseRemindU_InstallSilent.inf
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folders and delete if found:
    C:\WINDOWS\surfmonkey
    C:\Program Files\Online Services\PeoplePC

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  7. ichthus05

    ichthus05 Private E-2

    Dear Chaslang,

    Thanks so much for the detailed assistance. I followed the steps you provided and encountered only one small anomaly...

    When using HijackThis to fix selected items, one of the ones you identified was not found, namely
    O2 - BHO: (no name) - {371AE1A8-E5BA-4328-A66D-7CFAF10D4E26} - C:\WINDOWS\system32\mlljk.dll

    Instead, I found and selected one that was most similar:
    O2 - BHO: (no name) - {83457F53-2BB0-4A72-A7C5-04B4D7F561D0} - C:\WINDOWS\system32\mlljk.dll

    Otherwise things went just as you described. The three new logs are attached.

    As for how things are working, I'm happy to report at least two immediately evident improvements:
    1) The "Buffer Overrun" popup box has not reappeared since the last reboot
    2) The IE homepage was no longer locked but allowed me to redefine it. Norton jumped in to verify that the change was intended rather than due to malware but I assume that's normal.

    Thanks again for your help. I apologize that it took me so many days to get back to this. Since I'm not really sure what I'm looking for, I admit that I didn't look carefully at the scan results. Your expert interpretation and follow-up advice will be most appreciated!
     

    Attached Files:

  8. Shadow_Puter_Dude

    Shadow_Puter_Dude MG Authorized Malware Fighter

    Run HijackThis. Click the 'Do a system scan only' button. Place a checkmark in the box next to the following lines:
    Click on the 'Fix checked' button. Wait for HijackThis to finish; close HijackThis.

    Now run Pocket Killbox:

    Choose Tools -> Delete Temp Files and click Delete Selected Temp Files
    Then after it deletes the files click the Exit (Save Settings) button.

    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue..

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    Post the following logs:
    1. ShowNew
    2. HijackThis
     
  9. ichthus05

    ichthus05 Private E-2

    Thanks for the quick response. I followed directions given--received no PendingFileRenameOperations prompts or any other unpredicted messages. The two new logs are attached.

    Thanks in advance for your assessment of these logs and subsequent recommendations.
     

    Attached Files:

  10. Shadow_Puter_Dude

    Shadow_Puter_Dude MG Authorized Malware Fighter

    Your logs look fine. How is your system running?
     
  11. ichthus05

    ichthus05 Private E-2

    Thanks again for your help. As to how the system is running, the most obvious symptoms of the original infection have subsided. However, there is still evidence that I'm not fully clean. Subsequent to the last post, Norton Antivirus detected and deleted yet another instance of Trojan_Vundo. Spybot continues to detect multiple spyware items at each scan and an online Kaspersky scan ran yesterday suggests the continued existence of virus-infected files.

    I've attached the Kaspersky log to this post and will post a new set of lrunkeys, newfiles, and hijackthis logs in the next. Your assistance and step-by-step directions have been excellent thus far and I will look forward to any futher suggestions you can offer on how to kill the Vundo-bug and all of its evil cousins once and for all.

    Thanks.
     

    Attached Files:

  12. ichthus05

    ichthus05 Private E-2

    Here are the other three updated logs.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs are clean accept for the below which you should have HJT fix:

    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)

    All Kaspersky reported were items in System Restore which we have not addressed yet since we were not done yet. You jumped the gun running things we did not asked for.

    Run all of the below final steps and then tell me if you are still having problems:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
    If you still have malware reports now, attach the logs showing what is being found!
     
  14. ichthus05

    ichthus05 Private E-2

    Thank you once again. I apologize for jumping the gun with the last scan. I have now run through all the steps you suggested with only a couple noteworthy events:

    1) Prior to starting I updated and ran Spybot. It detected and removed two items though I forgot to write down the specifics. (I believe "Avenue A" might have been one of them.) A second scan was clean.

    2) I ran Killbox and fixed the entry you named:
    R3 - URLSearchHook: (no name) - ~CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    However, after the final "Disable System Restore...Reboot...Enable System Restore" sequence I ran another Killbox and was alarmed to find the same entry reappearing. Maybe this is normal but it seemed odd to me. Needless to say, I fixed it again.

    3) Considering that I did finally perform the last steps as directed, afterwards I ran a couple system scans. Norton came back 100% clean but the Kaspersky online scan found one item:
    C:\WINDOWS\system32\config\systemprofile\Desktop\DATA FROM OLD MACHINE\WINDOWS\SYSTEM\hicsie.dll Infected: Email-Worm.Win32.Tanatos.b.dam2
    Is this an issue?

    So far as I can tell, the PC is responding fine--no evident symptoms of my former problems. I've attached a new HJT log as well as the Kaspersky log.

    I'm sorry if I'm making this more drawn out than it ought to be, but I'm really not sure what "clean" should look like or when I should rightfully be concerned about such log entries.

    Thanks so much! You have been great to work with!
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Cookies are not problems as explain in the How to protect link I gave you.

    You mean HijackThis not Killbox. Are you closing ALL browsers before fixing?? Also try shutting down any other protection software first since they all could block changes too. This is really not a problem key anyway but it is nice to clean everything up. Did you have IE7 installed at some point?


    Just delete the file. Do you need to keep this DATA FROM OLD MACHINE folder? If not, delete it.
     
    Last edited: Mar 14, 2007
  16. ichthus05

    ichthus05 Private E-2

    Dear Chaslang,

    Thanks again for your patience, your expertise, and your helpful, detailed instructions. Forgive me for the well-worn cliche' but...I have good news and I have bad news:

    The good news is that all of malware that had been a plague to my PC is now completely gone.

    The bad news is that despite your extremely thorough job of walking me through the necessary removal steps, that award-worthy effort is not the reason for the present clean bill of health. Rather, my clean PC is the direct result of an unexpected hard disk failure that led to a complete hard drive replacement with an out-of-the-box factory-original HP software image. Out with the old, in with the new! Not my preferred method for purging the machine of malware, but that's the way it played out.

    Again, many thanks. You were a source of both information and inspiration. Blessings on your day and on your work.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Sorry to hear of your hard disk crash but at least you should be clean of malware. You may not be clean of the junkware that original PC manufacturers install on PCs though. So you should go thru and uninstall all software that you have no plans on using. There can sometimes be a fairly significant amount junkware.

    Also you should work thru the below to help keep you clean:

    How to Protect yourself from malware!
     
  18. ichthus05

    ichthus05 Private E-2

    Agreed! The extra and unwanted junkware installs and promotional shortcuts that came with the image, both then and now, is a bit irritating. I do plan to do a full purge when I have the time as well as running through the "protect yourself" sequence.

    Thanks again for your help. God's blessings to you and yours.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. And thanks!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds