Next! :)

Discussion in 'Malware Help (A Specialist Will Reply)' started by darco, Aug 29, 2007.

  1. darco

    darco Private E-2

    I ran my trusty Spybot S&D and it tells me that it found Win32.Agent.AT and Smitfraud-C.CoreService and then it tells me its in memory and needs to run at next boot up. Well next boot up it fails to clean it and tells me it needs to run at next boot up to clean it!!...
    AV progs dont see this spyware.
    thxs
    darco
     

    Attached Files:

  2. darco

    darco Private E-2

    two more files
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to attach the HijackThis log as requested in the READ ME (see step 7) Make sure it is installed properly and also renamed as requested.

    I also suggest that you attach a log from Spybot so we can see exactly what it is finding. Many times this is a few registry keys that require removal.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I also noticed that you did not complete step 2 of the READ ME properly. Please make sure complete that step properly now.
     
  5. darco

    darco Private E-2

    ok, sorry about step 2, I overlooked the one checkbox but got the other ones..
    thxs
    darco
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below old versions of software:
    Java 2 Runtime Environment, SE v1.4.2_03
    Java(TM) SE Runtime Environment 6 Update 1

    Continue by downloading a tool we will need

    - Process Explorer

    Extract it to its own folder somewhere that you will be able to locate it later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of any of the below DLL files (if found) and then click the kill button.
    ftpmc.dll
    vtsqn.dll

    After you have killed all instances of any of the above DLLs under winlogon click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on explorer.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    ftpmc.dll
    vtsqn.dll

    After you have killed all instances of any of the above DLLs under Explorer click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on iexplore.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    ftpmc.dll
    vtsqn.dll

    After you have killed all instances of any of the above DLLs under iexplore click ok.
    (If you do not find these DLLS, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {10028EB8-CC68-4DC2-8C70-2177163910Ea} - (no file)
    O2 - BHO: (no name) - {3E8EC2D9-806B-4C7F-AE7F-F44AD4ABE8B5} - (no file)
    O2 - BHO: (no name) - {47230C72-B047-4106-A930-41B235113F9F} - (no file)
    O2 - BHO: (no name) - {55DB983C-BDBF-426f-86F0-187B02DDA39B} - (no file)
    O2 - BHO: PsapiAnalyzer Object - {CB8B69CF-31AF-40D0-A119-5A8435BC1534} - c:\windows\fonts\ftpmc.dll
    O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
    O20 - Winlogon Notify: ftpmc - c:\windows\fonts\ftpmc.dll
    O20 - Winlogon Notify: vtsqn - C:\WINDOWS\
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it
    double click it and allow it to merge with the registry.
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  7. darco

    darco Private E-2

    ok, things went well. Found alot of the ftpmc.dll in the Process Explorer prog...did everything else correctly I hope...here are my logs...
     

    Attached Files:

  8. darco

    darco Private E-2

    last one....
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that looks much better. There is one folder & one file we were trying to delete with Avenger that did not get deleted. This is because the actual names contain unprintable characters so what they look like in your logs and also what you would see in a Windows Explorer window does not really show the real folder names. I need you to find and delete these yourself.


    Please delete the below folder and file? Note that the strange characters represent unprintable characters that were found during the scans, but they may appear to you as normal characters when you locate them using Windows Explorer. I will add comments in RED next to each item. Note the date of the folder & file which will help you to properly locate them:
    Code:
    "C:\Program Files\Common Files\"
    àDOBE     Jun  2 2007       "àdobe"   [B][COLOR=red]<-- may look like Adobe but it is not the real Adobe folder[/COLOR][/B]
     
    "C:\WINDOWS\"
    o6Ž       Jun 18 2007    37    O6Ž  [B][COLOR=red]<-- This is a file 37 bytes in size. Not sure what this will look like[/COLOR][/B]
    Attach a new log from ShowNew after doing the above.


    How are things working now?
     
  10. darco

    darco Private E-2

    Here is the latest ShowNew file...pc seems to be more responsive. Let me know if ok to do step 8..thanks for all your help!!!!!!

    darco
     

    Attached Files:

  11. darco

    darco Private E-2

    Hmmm, I ran Spybot and it still reports that I have Smitfraud and Win32 virus?
    AVG Anti Spyware does not find this...

    darco
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger.txt
    2. Spybot
    3. ShowNew


    Make sure you tell me how things are working now!
     
  13. darco

    darco Private E-2

    Ok, I think we are cool now....
    thxs again

    darco
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, C:\WINDOWS\nircmd.exe, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    5. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    6. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    7. If we had you run Avenger, you can delete all files related to Avenger now.
    8. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    9. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    10. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    11. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds