Malware & HJT trouble

Discussion in 'Malware Help (A Specialist Will Reply)' started by Lain, May 8, 2007.

  1. Lain

    Lain Private E-2

    Hi all,
    a few days ago I had a pop-up saying I needed to download & run SystemDoctor as my system was infected.I ran Spybot and it found,aside from the usual cookies,SystemDoctor2006,BlackCore & ErrorSafe all of which sound scary! I did read & run me but was having trouble downloading some tools at first & still when I download HJT this I get hijackthis_sfx but it isn't on of thos folders with a zip on,the icon looks like a peice of paper with something on it a picture of a pc and a folder I think confused when I right click on it there is no option to extract anway just open,run as etc.
    When I ran AVG anti spyware it found Trojan.Slime
    Here are the scan results I have now.Can anyone tell me what I'm doing wrong with HJT? I've used it before and not had this problem.I'm probably being dense about this but I can't figure it out.Any help as always is appreciated,
    Thanks guys :)
     

    Attached Files:

  2. Lain

    Lain Private E-2

    other scan results
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please use windows explorer to find and delete this:
    C:\WINDOWS\flashax.exe

    Go ahead and uninstall this using add/remove programs:
    J2SE Runtime Environment 5.0 Update 11

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Just double click on the hijackthis_sfx.exe. It is a self-extract executable that will default to installing HijackThis into a proper folder. Then all you need to do is rename HijackThis.exe to analyse.exe

    I am not seeing anything else from your logs .....are you still having problems?

    Post a new:
    ShowNew
    GetRun
    HJT
     
    Last edited by a moderator: May 8, 2007
  4. Lain

    Lain Private E-2

    Thanks guys,
    I've done those things.I haven't had any more pop-ups but everytime I run spybot it finds BlackCore after I remove it it comes back and it says this about it :
    which you probably already know but that worries me a bit.Other than that things seem fine.Thanks again:)
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Woud you post exactly what spybot is reporting....the whole path/location.

    You could also run (http://housecall.trendmicro.com/) and see if it picks it up.
     
  6. Lain

    Lain Private E-2

    Hi,
    I ran trendmicro housecall and it didn't find anything then I ran spybot this is the info it gave on BlackCore:
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    How rude!! Let's try this:
    Please download and run SuperAntispyware


    * Double-click SUPERAntiSpyware.exe and use the default settings for installation.
    * An icon will be created on your desktop. Double-click that icon to launch the program.
    * If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download and unzip them from here.)
    * Under "Configuration and Preferences", click the Preferences button.
    * Click the Scanning Control tab.
    * Under Scanner Options make sure the following are checked (leave all others unchecked):
    o Close browsers before scanning.
    o Scan for tracking cookies.
    o Terminate memory threats before quarantining.
    * Click the "Close" button to leave the control center screen.
    * Back on the main screen, under "Scan for Harmful Software" click Scan your computer.
    * On the left, make sure you check C:\Fixed Drive.
    * On the right, under "Complete Scan", choose Perform Complete Scan.
    * Click "Next" to start the scan. Please be patient while it scans your computer.
    * After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
    * Make sure everything has a checkmark next to it and click "Next".
    * A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
    * If asked if you want to reboot, click "Yes".
    * To retrieve the removal information after reboot, launch SUPERAntispyware again.
    o Click Preferences, then click the Statistics/Logs tab.
    o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    o If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    o Please copy and paste the Scan Log results in your next reply.
    * Click Close to exit the program.


    Post the scan results from SuperAntispyware.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did anyone read step 11 in How to Protect yourself from malware! ;)
     
  9. Lain

    Lain Private E-2

    Thankyou,
    here are the results
    So it could be that this is a harmless cookie then? it was just that I'd never seen BlackCore in scan results before and with Spybot calling it a Trojan that freaked me out.confused
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    As Chas mentioned.....read the thread ....cookies are generally harmless ...but I wanted you to be certain that you were ok.

    If you are not having any other malware problems, it is time to do our final steps:

    1. If we used Pocket Killbox during your cleanup, do the below
    * Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
    * go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
    * Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
    * How to Protect yourself from malware!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds