Internet connection problem

Discussion in 'Malware Help (A Specialist Will Reply)' started by IMSA, Jan 15, 2005.

  1. IMSA

    IMSA Private First Class

    Girlfriend went out to some movie star website and now can't connect to the internet. She ran Ad Aware and had 140+ problems, then the coumpter showed a box that said system is shutting down in 60 seconds. We deleted Ad Aware thinking something got attached to it and tried to get on the internet again. No go. She goes into internet options and the home page says "blank". She changes the address to Google to access the net, she gets some page saying she can't access the net. She rechecks the home page address and it says "blank" again. We Tried MS internet wizard, tried re starting her computer in " last known configuration that worked" and still no luck. Any ideas or what to look for? By the way, her computer is exactly like mine listed below.

    IMSA
     
  2. tigerray00

    tigerray00 Specialist

    Ok, what you have here is a spyware problem. Hopefully one of the MOD's will move this thread there. Here's a link that should help you fix what need's to be fixed.

    http://forums.majorgeeks.com/showthread.php?t=35407


    Try to go through each and every step that applies to you(basicly all of them). As you go through them keep us posted on what happens, and let us know if you run into any problems. But, please at least attempt each step. This will give our people here a better chance to work on exactly what you need to do to fix this.:)
     
  3. IMSA

    IMSA Private First Class

    Thank you Tigerray00, I'll give it a shot

    IMSA
     
  4. IMSA

    IMSA Private First Class

    Been trying to work through the instructions . We get to Remote Procedure Call Helper and disable as directed. We disable the RPC yet it will not stay disabled. Any ideas?

    IMSA
     
  5. tigerray00

    tigerray00 Specialist

    When you click apply does it remain disabled as long as you don't reboot?
     
  6. IMSA

    IMSA Private First Class

    Correct. When we reboot it's on again.

    IMSA
     
  7. tigerray00

    tigerray00 Specialist

    When you turned it off, did you have to reboot?

    Try not to reboot when going through the steps until you absolutely have to.
    Chaslang or one of our other experts will come and help you through all of this as soon as they get the chance to.
     
  8. IMSA

    IMSA Private First Class

    I tried to stop and disable the "Remote Procedure Call (RPC) Helper" selecting appropriate functions on the General tab. I then noticed that under the Logon tab there is also a way to disable the hardware profile which I did also. Since performing all this disabling I haven't needed to reboot the system (it hasn't automatically closed down on me) so in theory, I should be able to proceed forward.
    I should mention that I'm following steps1-4 (Getting Prepared: Steps to be sure your system is ready to be scanned). In step #1 the directions weren't exactly XP-specific, but I think I got through the steps as they were described. The only part of step #1 that I may have missed was that I wasn't able to "scan for the problem" as I didn't exactly know what I should be looking for.
    I'm now on step #4 (Dowloading Tools), however I can't download anything as I don't have internet access ("about:blank" issue). Any ideas?
     
  9. tigerray00

    tigerray00 Specialist

    If you have access to another computer, (preferably one with a cd burner) you can download the files you need there. Then you can either burn them(if a burner is available) to a cd, or you can e-mail them to yourself(assuming you can still check your mail).
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you sure you saw "Remote Procedure Call (RPC) Helper" and not "Remote Procedure Call (RPC)" ?

    You must make sure you match the service listed EXACTLY as indicated in the thread. If you shutdown the wrong service you could make big problems for yourself.

    Also is your OS fully up to date with ALL Windows updates. It sounds like your "system is shutting down in 60 seconds" message is related to a Blaster worm. Perhaps you should run the below just in case:
    Symantec W32.Blaster.Worm Removal Tool

    I moved you to the Spyware Forum!
     
  11. IMSA

    IMSA Private First Class

    Tigerray00 - Yes, thanks, we'll try the e-mail idea first as that appears to still be working.

    ------------------------------------------------------------------------

    Chaslang - Yes, we saw "Remote Procedure Call (RPC) Helper" NOT "Remote Procedure Call (RPC)" and have disabled it.

    The OS is fully up to date with all Windows updates. __________________
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! I did not see where that was stated for an absolute fact. And disabling the regular RPC can do what was stated (restart).

    You should skip that step and continue finishing the rest of the READ ME FIRST and see where things stand. At that point, if still having a problem:

    Make sure you have HijackThis 1.99 and follow the guidelines on where to install it and how to post a log as an attachment. This is all covered in the sticky thread NO HIJACK THIS LOG FILES BEFORE READING THIS: HJT Tutorial & LOG File Posting

    Now post a HijackThis log as an attachment to your message (Do not post the log inline). All running programs should be closed, including your web browser, e-mail. Close before running Hijack This!

    To repeat: Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file. Place it in its own folder, for example C:\Program Files\HJT
     
  13. IMSA

    IMSA Private First Class

    Hello wonderful Computer Experts,
    This is IMSA's girlfriend replying with an update. I've completed the steps listed on the "Getting Prepard & Scanning Cleaning Steps" document. In most cases I ran the software listed multiple times, especially if it kept indicating errors. There appear to have been hundreds of problems, even though the machine was Ad Aware clean a week previously. One of the major issues appears to be the "about:blank" issue that many other people are experiencing. I first noticed this when using the SpyWare Blaster tool. In examining the IE browser page entries I noticed multiple "about:blank" entires which I manually changed to "www.google." That was when I immediately got back internet access. As previous entires indicated there was also the problem with the Remote Procedure Call (RPC) Helper. This helper no longer appears as one of the msc services. Presumably one of the tools removed it.
    A current issue involves running Ad Aware SE with the plug-in. After I ran this multiple times attempting to remove problems I eventually (with much rebooting and reloading of Ad Aware software) was able to get down to "O" problems. Unfortunately, when running it the next day there were at least 40 "new" critical problems. When trying to remove these errors using Ad Aware SE the system seizes up, forcing a reboot. One of these errors reads "Win32.TrojanDownloader.Agent.al." Is there a reason why this particular agent can't be removed (along with the other 39 issues?) Can trojan's send out intelligence to the mother ship after they are removed and subsequently send out more agents to infect your machine? Also, I'm concerned with so many problems currently being "blocked" is there a way to remove them permanently? Thanks so much for your help. Perhaps you may have some ideas concerning how to remove the TrojanDownloader agent which may be the reason the machine keeps getting reinfected (?). We've performed many hours of blasting, cleaning, shredding, killing, stinging, and removing. Hopefuly you have a few more ideas to resolve this issue...Thank you again for all your patience and help...
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes the can phone home! That's why (if you read some of the thousand or so related threads) you will se us recommending things like:
    - no browsers being run
    - no internet access available (unplug the cable - they can still get out if it is connected)

    Post the HJT log per my previous directions. I believe the TrojanDownloader agent is just another name for the HSA/about:blank hijacker family. They can literally put hundreds or more files in both c:\windows and c:\windows\system32 They will be of many extension types ( .DLL, .EXE, .DAT, .HTML) Quite often they are hidden and system files making them harder to find. And some will be ADS infected making them harder to remove. There are also many places they will insert items into the registry to make removal more difficult.

    Post the log and let's see what your current state is.
     
  15. IMSA

    IMSA Private First Class

    Re: Internet connection prob./Trojan & Critical Errors

    Thanks Chaslang:

    I've included the info from the HJT Log and also from a TrojanHunter log. The machine still locks up when running Ad-Aware SE after it discovers 40 some critical errors. Hope you see something we can address-

    Edit by chaslang: Inline HJT and Trojan Hunter logs changed to attachment
     

    Attached Files:

    Last edited by a moderator: Jan 23, 2005
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Internet connection prob./Trojan & Critical Errors

    Please read the below again! You ignored all of it but the version number of HJT! Hi changed your logs into attachments this time. (Not next time) But you must correct the other issues.

    Make sure you have HijackThis 1.99 and follow the guidelines on where to install it and how to post a log as an attachment. This is all covered in the sticky thread NO HIJACK THIS LOG FILES BEFORE READING THIS: HJT Tutorial & LOG File Posting

    Now post a HijackThis log as an attachment to your message (Do not post the log inline). All running programs should be closed, including your web browser, e-mail. Close before running Hijack This!

    To repeat: Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file. Place it in its own folder, for example C:\Program Files\HJT


    The below should not be running and you MUST correct the HJT installation:
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Microsoft Office\Office10\WINWORD.EXE
    C:\Program Files\Lavasoft\Ad-Aware SE Personal\Ad-Aware.exe

    Your running HJT from the ZIP file:
    C:\DOCUME~1\cynthia\LOCALS~1\Temp\Temporary Directory 1 for hijackthis[1].zip\HijackThis.exe

    Notice you have one of the services related to HSA running:
    O23 - Service: Workstation NetLogon Service - Unknown - C:\WINDOWS\netaq32.exe

    Did you try to stop and disable per the tutorial? Did it immediately restart?

    Try booting in safe mode (with viewing of hidden files enabled) and see if you can delete any of those files Trojan Hunter complained about. They are all part of the HSA infection. Let me know what happens.

    You have other stuff we need to fix before we tackle the HSA problem.
     
    Last edited: Jan 23, 2005
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Internet connection prob./Trojan & Critical Errors

    It maybe necessary to uninstall or disable PowerPanelPlus later (we will see) in order to work on this problem. It may become necessary for us to pull your power plug at a point and we do not want an orderly shut down. That's how this hijacker respawns itself.
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Internet connection prob./Trojan & Critical Errors

    After resolving where HJT is installed. Let's start the first step of the fixes.

    First step:
    Copy the contents of the Quote Box below to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file move.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.)

    Double-click on the move.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to merge say yes.


    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O15 - Trusted IP range: 206.161.125.149
    O15 - Trusted IP range: (HKLM)
    O23 - Service: X10 Device Network Service - Unknown - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete:

    Now reboot in normal mode and post a new HJT log.

    After you come back and post your follow up HJT log DO NOT REBOOT. That could cause the hijacker to mutate making any fixes I suggest useless. You can disconnect from the internet for security (by unplugging the cable) but do not reboot!!!!
     
  19. IMSA

    IMSA Private First Class

    Thanks Chaslang,

    I'm sorry about the incorrect HJT logs and appreciate your patience.
    I'll try and go through the directions again and see how far I get.
    This is my first HJ problem, so I'm rediculously new to all of this....~The girlfriend
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    OK! Let me know when you finish those steps. Remember!! Do not reboot.
     
  21. IMSA

    IMSA Private First Class

    Okey. Dokey. I started in again from the top and have tried to attach the latest HJT file as requested. I've also included some information derived from some of the scanning/cleaning tools in case that helps with troubleshooting.

    The only step I haven't attempted yet is to try and delete some of the files that Trojan Hunter considered possible problems. I've attached them for your review so that you can select any items that seem appropriate. I'm afraid I would select something that would screw things up further, so I'll await your reply concerning this piece of the project. (They indicate that these may or may not be issues.)

    A positive event is that all of the tools are now working properly and that it appears that some fairly suspicious items such as a file "c:\ntdetect.hta Download.Trojan" (which Symantec detected) have been deleted. I was also able to run additional software that wasn't possible the first time around and presumably have deleted additional critical items.
    I'm still curious about messages such as the one SpyBot produces which indicates that "749 bad products are blocked, 1583 additional protections are possible. Please immunize." I "immunized", but does this software continuously block these items? It seems like that would create at least a minor bit of overhead. It would be nice to get rid of them completely.

    I may have uploaded the files incorrectly or made other mistakes so just let me know what needs to be done. I appreciate your help and expertise. Thank you in advance. ~Girlfriend in Training......
     

    Attached Files:

  22. IMSA

    IMSA Private First Class

    Oh, I forgot to mention that I wasn't sure about the very last instructions that I was given regarding the move.reg file. At the end of the instructions the message indicated to "Boot into safe mode and use Windows Explorer to delete:" but there wasn't anything after the colon. I may have screwed up because I continued on with the instructions and rebooted back into normal mode and posted a new HJT log (as the next instruction indicates.) If there was something I was supposed to delete in Windows Explorer, I'll need some further instruction. Sorry if this was a problem. ~Girlfriend in Training
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There were no files to delete in safe mode. I just forgot to delete that line from a copy and paste of standard message.

    Did you forget to fix these last time with HJT:
    O15 - Trusted IP range: 206.161.125.149
    O15 - Trusted IP range: (HKLM)
    O23 - Service: X10 Device Network Service - Unknown - C:\PROGRA~1\ATIMUL~1\RemCtrl\x10nets.exe (file missing)

    They are still there. Try again! Make sure you click FIX. Let me know what happens. Just look at a new HJT log and see if they are gone.
     
    Last edited: Jan 26, 2005
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have to remember to always shut down Internet Explorer sessions (and other browsers) before running HijackThis. You had this running:
    C:\Program Files\Internet Explorer\iexplore.exe

    The below notepad session should not be running either:
    C:\WINDOWS\system32\notepad.exe

    Also you never finish putting HijackThis where I requested. You are still running it from the ZIP file:
    C:\DOCUME~1\cynthia\LOCALS~1\Temp\Temporary Directory 1 for hijackthis.zip\HijackThis.exe

    You are not getting any backups doing this. You must fix this now.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    And about those files Trojan Hunter found, yes try to delete them. Boot into safe mode and delete:


    C:\WINDOWS\system32\apiop.exe
    C:\WINDOWS\system32\apiwi32
    C:\WINDOWS\system32\appdm.exe
    C:\WINDOWS\system32\atlal32
    C:\WINDOWS\system32\atlea32.exe
    C:\WINDOWS\system32\crau32.exe
    C:\WINDOWS\system32\crnz32.exe
    C:\WINDOWS\system32\d3dy32
    C:\WINDOWS\system32\iphl.exe
    C:\WINDOWS\system32\ipjs32.exe
    C:\WINDOWS\system32\mfcaa.exe
    C:\WINDOWS\system32\mfcdh32.exe
    C:\WINDOWS\system32\mfcfz.exe
    C:\WINDOWS\system32\mfcrm32.exe
    C:\WINDOWS\system32\netah.exe
    C:\WINDOWS\system32\ntkz32.exe
    C:\WINDOWS\system32\sdkcg32.exe
    C:\WINDOWS\system32\sdkhm32.exe
    C:\WINDOWS\system32\sdkik.exe
    C:\WINDOWS\system32\sdkug.exe
    C:\WINDOWS\system32\sysbk32.exe
    C:\WINDOWS\system32\sysdy.exe
    C:\WINDOWS\system32\winen32.exe
    C:\WINDOWS\system32\wings32.exe
    C:\WINDOWS\system32\winjd32.exe

    Let me know the results of trying to find and delete these files! Also post a new HJT log and do not reboot.
     
  26. IMSA

    IMSA Private First Class

    Thanks for the reply. Before I begin again, I guess I'll need help with a couple of things.

    First, concerning the HJT zip file, I did create a new folder for it and installed the zipped file there but it looks like it ran it from the previous place it was installed. Hopefully I can delete it from the previous folder so that this won't happen again. What I need help with is how do I not run it from the zip file? Do I need to unzip it somehow, and if so, how do I get it in the directory? I may not be making any sense, but I know how to move the zipped file to a new folder/directory but not how to move an unzipped file to a directory. Or maybe I've misunderstood and I just need to put the zipped file into an appropriate folder/directory and that will suffice.

    Also, I didn't have any IE sessions running (and it wasn't visible in the lower toolbar.) Also, a notebook task wasn't visible either and I don't remember opening one. Do I need to go into Administrative Tools/Component services (or somewhere else) to actually stop IE (assuming it is there as a service to stop)? I'll definitely double check this though to see what I could be doing wrong before I run HJT again.

    I did delete the files (015, 015, & 023), but I'll try it again. Obviously I did something wrong or something didn't take.

    Also, I'll try and delete those files identifed by Trojan Hunter. I just wasn't sure they all should be deleted. I'll use the list you gave me.

    I may not have totally understood your directions, so any clarification will help. Thanks again...I'll keep trying....
     
  27. IMSA

    IMSA Private First Class

    Located all the files found by Trojan Hunter and deleted them. Reran TrojanHunter with new results "No Trojans Found." (Didn't reboot.) ~Girlfriend in Training
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you put the HijackThis.zip file in the C:\Program Files\HJT folder you still need to extract the hijackthis.exe file from the zip file into the same folder. Otherwise you will still get the same results because you would be running it out of the ZIP file. That is one of the things we said we do not want. A folder and a directory are the same thing. Just different words meaning the same thing.

    If you are not running IE, something else is because it does show in your HJT log.

    Try correcting the above and post a new HJT log with no browsers running. If IE still shows up, post the log so I know. And then press CTRL-ALT-DEL simultaneously to bring up Task Manager and click Processes and right click on iexplore.exe and select End. Does that end the process.
     
  29. IMSA

    IMSA Private First Class

    Oops. I forgot to post the HJT log for you (which is saved) before presing CTRL-ALT-DEL and ending IE. When I did this I lost all icons on my desktop. Yes, the process is stopped, but the screen is totally black. How do I get my desktop back so I can use my computer? Will I need to reboot?

    Although I didn't send you the log, the processes that you had told me to delete weren't present this time. Also, I figured out how to extract the file into the same folder (and I also deleted the program from the temp folder) so I think it was run correctly.

    Have I really screwed things up by ending IE? I guess I didn't know what that would do. I was hoping to end IE and run HJT again for you. I'm using a different computer to send you this message, because I didn't want to reboot. I'll wait until I hear from you before doing anything else to my computer. Hopefully I haven't ruined everything. ~Girlfriend in remedial training.....
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you sure you ended iexplore.exe and not explorer.exe
    Your symptoms sound like you ended explorer.exe

    If that is the case, just reboot.

    After reboot, post your HJT log first before doing anything else.
     
  31. IMSA

    IMSA Private First Class

    About whether or not I deleted iexplore or explorer.exe last night, of course I thought I had deleted iexplore.exe, but I wouldn't bet my life on it. I've been
    working such long hours anything is possible.

    I rebooted and everything appears to be back in a normal state. I'm attaching the HJT log as you've requested. We'll see where we are after you get a chance to look at it. (I haven't done anything else on the computer yet.)

    Thanks for your long hours of help, ~Girlfriend in Training
     

    Attached Files:

  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First run Spybot and disable its TeaTimer program. It could interfere with some of the cleanup steps.

    To disable TeaTimer, run Spybot and click Mode and select Advanced Mode. Then click Tools and select Resident. Now in the right window pane, uncheck TeaTimer.

    Also while this is open, in the left column now select IE Tweaks and then in the right pane make sure all the Miscellaneous locks are unchecked.

    Now quit Spybot!


    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system32\nyfbd.dll/sp.html#28129
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system32\nyfbd.dll/sp.html#28129
    R3 - Default URLSearchHook is missing
    O2 - BHO: (no name) - {C40457D9-D338-5738-22C0-B94004FBA803} - C:\WINDOWS\addnv.dll (file missing)

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\system32\nyfbd.dll

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again.

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  33. IMSA

    IMSA Private First Class

    Followed instructions running Spybot and disabling TeaTimer. Also unchecked "IE Tweaks" as requested. Followed additional instructions selecting the R1, R0, R3, and O2 entries and fixing them.

    The only anomaly encountered was that I did not find the "nyfbd.dll" file either in the C:\WINDOWS\system32 directory or anywhere else on the computer (and I should be able to see the hidden files).

    I rebooted in normal mode and when you said "post a new HJT log" I assumed you meant to run HJT again. I have the results of both HJT runs and am attaching the second results to this reply. (Hope that is what you wanted.)

    The IE Options General Tab address now reads correctly for the first time.

    Hopefully things are looking better from your educated point of view.....~Girlfriend in Training....
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log now looks clean. You can re-enable any protections you like now with Spybot and any other tools.
     
  35. IMSA

    IMSA Private First Class

    Thanks so much for all your help. I really appreciate it. Hopefully everything will work as it should now! ~Girlfriend in Training
     
  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds