Malware Removal Help Request

Discussion in 'Malware Help (A Specialist Will Reply)' started by Rob11, Jul 16, 2006.

  1. Rob11

    Rob11 Private E-2

    I've got a Windows XP HE machine, SP2 with P4 @ 2.40GHz, 512MB RAM, 80GB HD. All latest Windows updates have been installed.

    The Symptoms:

    Pop ups and redirects, hindered performance, and ultimately loss of control of the browser. Pop ups occur even when not using a browser.

    The Suspects:

    My scans have detected SurfSideKick, Command Service, PSHost, and several trojans such as Trojan.KillAV.ABN, Trojan.Agent.RL, and Trojan.Dropper.Agent.HL.

    My Actions so far:
    I've gone through all steps in "READ & RUN ME FIRST Before Asking for Support". Here's a brief summary:
    0: Preliminary House Cleaning: Did not find any obvious malware to uninstall, specifically looked for SurfSideKick, SurfSideKick 2, and SurfSideKick 3.

    1: Will wait until I'm running a clean system before disabling System Restore. Message understood and will disable and enable once all problems are gone.

    2: Enabled viewing of hidden system files, system files, and extensions.

    3: As mentioned above, using only McAfee viruscan.

    4: Downloaded and installed all referenced SW per instructions - Ad-Aware SE, SpyBot S&D, & CounterSpy already on system & up to date.

    5: Physicall unplugged Internet access and did the following:
    • Ran CCleaner on all user accounts, then ran it on admin acct in safe mode
    • Downloaded MS Mal SW Removal Tool, but did not receive a rpt
    • Ran Ad-Aware SE in safe mode in full scan mode and fixed all identified probs
    • Ran SpyBot S&D in safe mode per instructions
    • Ran MS Windows Defender in safe mode and fixed all found
    • Scanned with CWShredder in safe mode and fixed all found
    • Ran Kill2Me in safe mode and found nothing

    6: Updated Sun Java to v5.0 Update 7 and ran Bitdefender in safe mode, bdscan report attached.

    Ran Panda ActiveScan in safe mode and found 2 viruses & 10 spyware occurrences, but could NOT find any way to save a report. Note: the only choice I could find was to purchase and download Panda ActiveScan. Unless I missed it, and I looked far and wide for a report selection, Panda is limiting what you can do until you pay???

    7: Rebooted in normal mode, ran HJT, log attached. I then disabled Internet access as my recent experience shows that there are downloader or BHO files lurking to download more nasty stuff.

    Separate Problem: I have a presistent message when logging in:
    Rundll: Error loading W205017b.dll "The specified module could not be found."
    So far, this has no obvious impact on the use of the system.

    Thanks for helping me with this, my bdscan & HJT logs are attached.
     

    Attached Files:

    Last edited: Jul 16, 2006
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Click the link that gives more details on using PandaActiveScan. It is given in step 6. I need this log even if you have to do it in normal boot mode.

    Is your copy of CounterSpy a free trial or paid version? If free you should uninstall it because it expires in 15 days and is of no use afterwards. Also you have Windows Defender install and you only want one such realtime blocker installed. If CounterSpy is a paid version that you keep up to date, then uninstall Windows Defender.

    You have a bunch of malware problems. One includes a Qoologic infection.

    Let's get started.

    First run this: Qoologic Removal Procedure



    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of vtutq.dll once and then click the kill button. After you have killed all of the vtutq.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below two DLLs:
    pmkjk.dll
    sempapi.dll

    Next double click on explorer.exe and again click once on each instance of vtutq.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below two DLLs:
    pmkjk.dll
    sempapi.dll

    Now just exit Process Explorer.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.

    C:\dfndrad_5.exe


    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:


    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://searchbar.findthewebsiteyouneed.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://searchbar.findthewebsiteyouneed.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://searchbar.findthewebsiteyouneed.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.findthewebsiteyouneed.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.meloco.com/index.php?i=sm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.mrfindalot.com/search.asp?si=20065&k=
    R3 - URLSearchHook: (no name) - {CFBFAE00-17A6-11D0-99CB-00C04FD64497}_ - (no file)
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,nhyhnhb.exe
    O3 - Toolbar: (no name) - {ACB1E670-3217-45C4-A021-6B829A8A27CB} - (no file)
    O4 - HKLM\..\Run: [defender] C:\\dfndrad_5.exe
    O4 - HKLM\..\Run: [keyboard] C:\\kybrdad_5.exe
    O4 - HKLM\..\Run: [Hhl7RfpJ] "C:\WINDOWS\system32\ssn6tuu.exe"
    O4 - HKLM\..\Run: [crt774ff] RUNDLL32.EXE w205017b.dll,n 001774fe00000003205017b
    O4 - HKLM\..\Run: [win32097114838447] C:\WINDOWS\win32097114838447.exe
    O4 - HKLM\..\Run: [ms038384477114] C:\WINDOWS\ms038384477114.exe
    O4 - HKCU\..\Run: [hqmse] C:\WINDOWS\system32\lcbydc.exe reg_run
    O4 - HKCU\..\Run: [PSHope] "C:\Program Files\PSHope\PSHope.exe"
    O4 - HKCU\..\Run: [sys_up1] C:\Program Files\Common Files\svchostsys\svchostsys.exe
    O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
    O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Program Files\PartyPoker\PartyPoker.exe (file missing)
    O20 - Winlogon Notify: pmkjk - pmkjk.dll (file missing)
    O20 - Winlogon Notify: Themes - C:\WINDOWS\system32\sempapi.dll (file missing)
    O20 - Winlogon Notify: vtutq - vtutq.dll (file missing)



    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.


    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):
    C:\Program Files\PSHope\PSHope.exe
    C:\Program Files\Common Files\svchostsys\svchostsys.exe
    C:\dfndrad_5.exe
    C:\kybrdad_5.exe
    C:\WINDOWS\ms038384477114.exe
    C:\WINDOWS\win32097114838447.exe
    C:\WINDOWS\system32\lcbydc.exe
    C:\WINDOWS\system32\nhyhnhb.exe
    C:\WINDOWS\system32\ssn6tuu.exe
    C:\WINDOWS\system32\w205017b.dll
    C:\WINDOWS\system32\pmkjk.dll
    C:\WINDOWS\system32\sempapi.dll
    C:\WINDOWS\system32\vtutq.dll
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    After reboot look for the below and delete if found:
    C:\Program Files\PSHope <--- the whole folder
    C:\Program Files\Common Files\svchostsys <--- the whole folder

    Now attach a new HJT log and tell me how the steps went.
    Make sure you tell me how things are working now!
     
  3. Rob11

    Rob11 Private E-2

    Chaslang, thanks for spending time on this. Attached is the Panda Activescan report. I missed the line recommending it be done in normal mode the last time.

    As for Counterspy, I'm going to disable it and try Windows Defender, as my subscription is almost up and I want to see how WD compares. Will uninstall the one I don't continue with.

    I'm working through the problems using the steps you described and will come back to you with the a status of actions, a pc performance assessment, and a new HJT log. Thanks again!
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    OK! Add the below to the list of files to delete. If you already ran the previous steps then just delete the below using Windows Explorer.

    C:\Documents and Settings\Alix\Application Data\s?stem\n?tepad.exe
    C:\Mendoza1.exe
    C:\WINDOWS\keyboard1.dat
    C:\WINDOWS\PreProcess.data
     
  5. Rob11

    Rob11 Private E-2

    Alright! Next phase is done. Here is a summary of the results:

    1. Qoologic - Ran as directed and results came back as "No malicious modules found! No Qoologic infected files found! Note: Some Registry keys may have been removed."

    2. Ran Process Explorer and did not find any of the dlls listed (vtutq.dll, pmkjk.dll, or sempapi.dll) under winlogon or explorer.exe.

    3. Ran HJT and killed the c:\dfndrad_5.exe process. Then in the scan fixed all lines listed with 2 exceptions that were not present:
    F2 - REG:system.ini: UserInit=C:\WINDOWS\system3\userinit.exe,nhyhnhb.exe
    O4 - HKCU\..\Run: [hqmse] C:\WINDOWS\system32\lcbydc.exe reg_run

    4. Successfully merged the listed lines to the registry.

    5. Ran Pocket Killbox and deleted Temp Files, then added the files to delete on Reboot. Note: One confusing thing for me until reading the online help for Pocket Killbox is that it will only list the added files it is able to find on the system, so at first, I thought it wasn't accepting the full list. Once I learned that, I had no problems with proceeding. I did NOT receive the PendingFileRenameOperations prompt.

    6. After reboot I could not locate the PSHost or svchostsys folders.

    7. Last action was to delete the files from your last post based on the Panda Activescan. I was not able to locate these files immediately via Windows Explorer. I did a search and chose hidden and system files, and they were there. This is after setting the View tab to show all hidden and system files. That's stealth!

    The Mondoza1.exe started behaving strangely when I attempted to delete it in normal mode, so I rebooted into safe mode and completed all actions. I then rechecked in both modes to ensure no files remained.

    One more point, the C:\Documents and Settings\Alix\Application Data\s?stem\n?tepad.exe file was listed as a 418KB file named notepad.exe in the same directory. It looked like no other notepad file I've seen, so I deleted it, as it was in the target directory listed. Let me know if you concur with this.

    The Results
    I've been messing around with this pc for the past hour accessing Internet sites, etc. Performance seems back to normal, I'm not getting that w205017b.dll missing error at all, and no popups or redirects. So far, so good, but we've got a kid on this pc accessing MySpace, and I've come to believe that it's a cesspool of bad things. So we'll have to make some changes with browsing habits.

    I've attached the latest HJT log scanned after all this. Let me know what you think.

    Again, thanks for all your help on this! This website and the positive attitude of the experts who post here is a tremendous resource!
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That is because the Qoologic procedure removed them.

    Did you have Windows Explorer set to see hidden and system files exactly as step 2 f the READ ME indicates? If search can find them, then so will Windows Explorer.

    This is fine? This is PurityScan and it corrupts the filenames with unprintable characters. This makes them look like something they are not and is the reason for the question marks being seen. The real filename was not simply notepad.exe. What was the full path? Did it look to you like: C:\Documents and Settings\Alix\Application Data\system\notepad.exe

    If so, was anything else in the system folder. This is not a normal folder and probably should be deleted.

    Make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: EffBarBHO - {15E38167-B065-4BB5-B987-9F04B1E85AEA} - C:\Program Files\EngageSidebar\EffBar.dll
    O3 - Toolbar: AOL Toolbar - {DE9C389F-3316-41A7-809B-AA305ED9D922} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll (file missing)
    O9 - Extra button: AOL Toolbar - {3369AF0D-62E9-4bda-8103-B4C75499B578} - C:\Program Files\AOL\AOL Toolbar 2.0\aoltb.dll (file missing)
    O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} - https://components.viewpoint.com/MTSInstallers/MetaStream3.cab?url=http://instantgreetings.aol.com/prod/install.html
    O16 - DPF: {CA034DCC-A580-4333-B52F-15F98C42E04C} - http://www.stopzilla.com/_download/Auto_Installer/dwnldr.cab

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete
    :
    C:\Program Files\EngageSidebar <--- the whole folder

    Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now run Ccleaner (installed while running the READ ME FIRST)
    .

    Now reboot in normal mode and post a new HJT log.

    Make sure you tell me how things are working now.

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  7. Rob11

    Rob11 Private E-2

    Chas - completed the steps outlined in your post above:

    1. Deleted the following system folder for C:\Documents and Settings\Alix\Application Data\system\notepad.exe

    Note that before we began this process, I enabled the viewing of all hidden and system files as per the instructions. I can't figure why I wasn't able to view some files or directories from Windows Explorer until I did a search. I verified these settings several times.

    2. Using HJT, fixed all files listed in your previous post.

    3. While in safe mode, did not find C:\Program Files\EngageSidebar, I again verified that all hidden and system files were displayed.

    4. Deleted all files in c:\windows\Prefetch

    5. Ran CCleaner

    6. Ran HJT in normal mode. Log is attached. In connecting to the Internet and using IE, I'm not getting rogue pop ups. I'll continue to verify this, but the system seems fairly stable at this point.

    Thanks again, and let me know what you think regarding next steps.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    Your log is clean. If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     
  9. Rob11

    Rob11 Private E-2

    Thanks, chas, system is back to normal operations with a clean System Restore point. I appreciate your disciplined approach to walking me through the repair process.
     
  10. Rob11

    Rob11 Private E-2

    HOLD ON!!!

    As I finished setting a new System Restore point, I went into another account on the system and got an alert regarding an outgoing attempt on the Internet.

    The good news is that I had just finished installing the free version of Zone Alarm firewall to supplement my router firewall. Zone Alarm caught a file called:

    C:\WINDOWS\SYSTEM32\Ldresb\Ldresb.exe

    Upon accessing additional information provided by Zone Alarm, I found out this is a SurfSideKick variant. Without Zone Alarm, this would have gone on without my knowledge and re-established itself. I still don't know whether there are more problems, but here's the action I took:

    1. Started Pocket Killbox in normal mode and deleted C:\WINDOWS\SYSTEM32\Ldresb\Ldresb.exe on reboot.

    2. Upon reboot, entered safe mode and deleted the whole Ldresb folder via Windows Explorer.

    3. Emptied the Prefetch folder in \Windows.

    In addition, in my daughter's user account on the system, I cannot log out or shut down without the system freezing. This is not happening with my account. It so happens that this was the account I was using where Zone Alarms discovered the attempt made by Ldresb.exe.

    I've included a HJT log. Appreciate it if you can give me an assessment.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'm going to be on vacation until 7/31/06 so I'm going to give you a bunch of things to do all at once.

    The file you mentioned is EngageSidebar

    Take a look back at message number 6 and you will see ithis is one of the items I had you fixing.

    This new HJT log shows no problems! You really should run all the other steps of the READ ME on this account to see if they find anything. In addition, check all other user accounts on the PC for problems.

    Login to your daughter's account and get the two below logs!

    Now run the below procedure and attach the runkeys.txt log.
    Now run the below procedure and attach the newfiles.txt log.
    Now while still logged into your daughters account run the below procedure if you can (I'm not sure if her account priviledges will allow it. If not, run it from your account.)

    Running Ewido Anti-Malware

    Attach the Ewido log here too!

    Your daughter's account may not be having active malware problems. They may have been caused by malware, but there may not be any apparent reason for the current problems. There could be damage to her registry hive too. Try two things.

    1) Shut down all McAfee software before exiting her account. Does that make shutdown work.

    2) Create a new user account! Can you shutdown from the new user account?
     
    Last edited: Jul 20, 2006
  12. Rob11

    Rob11 Private E-2

    Chas - actions are complete.

    1. Ran Ewido in safe mode first as per the Ewido instructions. Then ran it last on my daughter's account. I'll attach the two files in the next post, as I have the GetRunKey and ShowNew reports attached to this post.

    2. Ran GetRunKey on my account, as it would not run on my daughter's account. Report attached.

    3. Ran ShowNew in my account, as it would not run on my daughter's account. Report attached.

    Next post will contain the Ewido reports.
     

    Attached Files:

  13. Rob11

    Rob11 Private E-2

    Chas - here's the Ewido reports attached. The first was run in safe mode, the second was run on my daughter's account.

    Also, am now having no problem logging off or shutting down from my daughter's account. It hesitated at first, but seems to be ok now.
     

    Attached Files:

    Last edited: Jul 20, 2006
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your Ewido logs say no action taken! Did you allow Ewido to fix what it found? If not, run it again and let it fix the problems.

    Look for the below files using Windows Explorer and delete them. They were in the ShowNew log. The two DLL files may not delete. If they do not delete, it could be a form or Virtumonde or winlogonhook/conhook that needs special procedures to remove.

    C:\WINDOWS\elpp100drop.exe
    C:\WINDOWS\media_motor_bundle.exe
    C:\WINDOWS\ms0438447711482006.exe
    C:\WINDOWS\Setup1.exe
    C:\WINDOWS\sys0114838447712006.exe
    C:\WINDOWS\system32\icon_mediamotor.exe
    C:\WINDOWS\system32\ts_mediamotor.exe
    C:\WINDOWS\system32\wintsvcc.exe

    C:\WINDOWS\kwigt.dll
    C:\WINDOWS\rrtct.dll


    Now I really am heading out for vacation!
     
  15. Rob11

    Rob11 Private E-2

    Chas - Thanks for squeezing this in. I did take action with Ewido after I printed the reports. I'll tend to the DLL files, and if I have any probs, I'll post for another mod or expert to help.

    Thanks again for everything, and enjoy your vacation!
     
  16. Rob11

    Rob11 Private E-2

    All files deleted in safe mode with no problems. Set a new System Restore point. Will play with this system to see if there are any other surprises, but the performance and behavior are an improvement so far. Enjoy you time away, chas!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds