Persistent Worm, Server 2003 R2

Discussion in 'Malware Help (A Specialist Will Reply)' started by Bowlersaid, Oct 27, 2010.

  1. Bowlersaid

    Bowlersaid Private E-2

    c:\WINDOWS\SYSTEM32\zfyspqu.u
    Identified by MalwareBytes as worm.conficker

    Remains, and I am unable to remove..

    Getting "at least 1 or more services or drivers failed during system startup.."
    Plus flags from AVG periodically, active scanning -

    1) Log attached for SUPER Anti Spyware
    2) Malwarebytes Log Attached
    3) Combofix would not run, stated incompatible OS (No Log)
    4) Root Repeal Blue Screened Windows, reboot (No Log)
    fast fail - something about BAD_POOL_CALLER
    5) Mg tools logs are attached

    Three files attached. Please advise, and thanks-
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Are you saying that when you re-scan with Malware Bytes it returns?

    I am seeing the below installed, what products are you currently using from norton/symantec?

    • LiveReg (Symantec Corporation)
    • LiveUpdate 3.2 (Symantec Corporation)
     
  3. Bowlersaid

    Bowlersaid Private E-2

    Yes, Malware Bytes says it is successful, yet after re-boot on next scan it returns

    This Server has used PC Anywhere, for remote access. Not currently using tho, using Log me in pro2 now...

    Thank you for your time...
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    SystemLook

    Please download SystemLook from one of the links below and save it to your Desktop.
    Download Mirror #1
    Download Mirror #2

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :filefind
      zfyspqu.u
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Are you able to do this?

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.

    Run a full scan with AVG and let me know the results.
     
    Last edited: Oct 28, 2010
  6. Bowlersaid

    Bowlersaid Private E-2

    Thanks for the assistance -

    1) System look run, log attached
    2) OTL scan run** OTL.txt and Extras.Txt attached

    ** During the scan, AVG Resident Shield Alert flagged window
    c:\windows\system32\zfyspqu.dll
    while I was deciding what to do, it flagged again (separate occurrence)
    c:\windows\system32\zfyspqu.dll

    I decided to select "remove all unhealed" and AVG was successful for the first entry, but listed action unsuccessful, does not exist or is unable to access.

    3) Run a full scan with AVG, Result = No infection found


    Appreciate your time-
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The logs were not showing it before. Now let's try again to attack it!

    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the Image textbox. Do not include the word Code
    Code:
    Code:
    :otl
    @Alternate Data Stream - 95 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5C321E34   
       
    :files
    C:\WINDOWS\System32\zfyspqu.dll   
      
    :commands
    [EMPTYTEMP]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  8. Bowlersaid

    Bowlersaid Private E-2

    * Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    * Copy and Paste the following code into the Image textbox. Do not include the word Code

    Then click the Run Fix button at the top.

    Accomplished these steps...

    # Click Image = Unable to comply with this step as it prompted the reboot immediately upon completing the fix

    # OTL may ask to reboot the machine. Please do so if asked.

    # The report should appear in Notepad after the reboot. ATTACH that report in your next reply. Attached below

    Get Logs batched run... and attached..

    Thank you Sensei!
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :filefind
      zfyspqu.dll
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  10. Bowlersaid

    Bowlersaid Private E-2



    • Bowler humbly bows before the Queen of the clouds..

      In his outstretched hands he lifts just two files ...
      He speaks,"I have done as you asked my queen, but I have just these two"

      The Extras.txt file was nowhere to be found, ran search, re-ran OTL
      With the same result, no extras file.

      "Your instruction, m'lady?", he waited with anticipation for her reply...
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Queen of the clouds stands before him and shakes her head. "That file does not exist any longer by the looks, but before we get excited, just navigate to the system32 folder and seek out the be-devilled DLL. Let me know if it exists or not."
     
    Last edited: Oct 28, 2010
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Wait a minute, something else I want to add... still look for that DLL, let me know.
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I see some services that could be connected to it and still running. The file does not appear to exist but we will include it anyway for redundancy into the script.

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    
    :files
    C:\WINDOWS\System32\zfyspqu.dll  
    
    :services
    zdxtjms
    ofjqdedr
    nncrbg
    jiqmcnw
    
    :Commands
    [emptytemp]
    
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  14. Bowlersaid

    Bowlersaid Private E-2

    From his quest for the Queen, our hero returns. A bit short of wind he kneels and speaks," M'lady, I journeyed to the valley of the windows as you instructed searching for the devil of whom you spoke. While he was nowhere to be found, a shadow was there zfyspqu.u - he was large 2,576KB - type U - born 7/5/2006 at 6:57am - with HSA attributes - This spawn was there... I was tempted to smite him there as he stood before me.
    But your instruction to me was clear, search and report. I have your files here". He reached in the bag and handed his Queen the two files.

    "I am at your disposal, M'lady", he spoke and quietly retreated.
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Queen of clouds welcomes you back from your short journey and smiles. "You did well, seeker of shadows... but another return trip awaits you! Take the quickest clearest path towards your destination and slay that evil! Be sure to show no mercy..."

    • C:\WINDOWS\system32\zfyspqu.u

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  16. Bowlersaid

    Bowlersaid Private E-2

    Into the Queen's chambers our hero returned, "It is done My Queen, the demon is dead and for good measure CCleaned my blade and my wastebasket afterward" He reached into his pack and retrieved the map for the Queen, "a record of the journey for you M'Lady"
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ha ha! That's AWESOME! LOL I love the way you write.

    ...Accepts the map that the hero is handing me and holds it tightly in my hand. Drifts off into the kitchen to go boil the kettle for tea and opens my mouth to speak whilst looking over my shoulder, "Reboot the machine and once again navigate through the valley of the system32 and check for the presence of any of those shadow beasts while I engage in refreshments, just to be sure they didn't survive the attacks... Once I have my tea I shall study the latest map and let you know if anything else that shouldn't be there needs dealing with"
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Okay... you rebooted, and navigated back to sys32 to check for those files. Are they gone still?

    Having so many users with admin priviledges is a bad idea.

    C:\GROCERY\SM2EJ.EXE <--- What is this? Something benign?

    WinPcap 4.0.2 <--- Uninstall this double edged sword if you did not install it yourself. If you installed it purposely then that is fine.

    Do you recognise any of these tasks?
    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :filefind
      scspkg.exe
      prcebook.exe
      scsbook.exe
      scspkg25.exe
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  19. Bowlersaid

    Bowlersaid Private E-2

    Our hero bows and retreats to the quest...
    After a time he returns obviously shaken, "What manner of evil is this my Queen? I returned to the valley as you asked and there before the very same tree it once again stood!": Shaking his head clearly agitated,"this unholy terror is going to take more than my humble blade M'Lady, we will need some of your strongest magic, I have the map here as you have asked" Hero lifted it up to her waiting hand. "If it pleases the Queen, I ask for leave for this night.. rest and a warm bath to wash this unholy soil from my person"

    "I will return to quest with the rising of the sun M"lady, I for one am glad you rule over our kingdom - I know with your magic we will be successful on the 'morrow or soon enough"
     

    Attached Files:

  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Dammit. I had a feeling it would resurface. We will continue on, and I have some questions to ask of my colleagues about something I am seeing in one of those logs. Rest and sleep, as will I soon and we'll battle forth when time allows, and once I have found answers. :)
     
  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  22. Bowlersaid

    Bowlersaid Private E-2

    “Having so many users with admin privileges is a bad idea”

    Understood M’Lady, it is the way here in the land of retail merchants. In this part of your kingdom there are some other regional Lords. One is from the land of Retailix He oversees to cash registers of the land and it’s software network, the other main player is from the land of SCS, short for Store Control System and they oversee the store control for the stores of the land. It is a complex interaction this land of the merchants. Many packets of information and business pass back and forth in the day to day operations here.
    We believe that this shape shifter or creature of the shadows might have found its way to the server via a worm traveling in one of the many emails, or other information passing between the lords and the retailer. It replicated itself and has even tried to send itself to other lands, this creature must be stopped.

    “C:\GROCERY\SM2EJ.EXE < ---- What is this? Something Benign?”

    Local magic from the retalix lords, register operations routine, SM denotes Scan Master

    “WinPcap 4.0.2 < --- “ Uninstall this

    I will inquire about destroying this, my fear is that the local lords use this to sniff out and make certain the validity of certain communication packets of information

    “Do you recognize any of these tasks?”

    Yes M’Lady. These are all jobs of the Lords over at SCS, they use a local magic torturing a creature called XCEL to perform all manner of cruel calculations and data manipulation from each days business. They have it trained to respond to many different routines; it is interesting if nothing else.

    “Analyse and Fix as I have directed”

    I have done as you commanded my Queen.

    “Look into the system and bring me what you find”

    These are routines of the SCS lords, the torturers of EXCEL. I have attached the communiqué

    “Bitdefenders, the mercenaries – give them a run at your shapeshifters”

    They indeed did encounter the demons, It was an epic battle with the demons rousing AVG during the battle Resident Shield Alert – I-Worm/Generic.Dam. Here is the record of that fight.

    “Let GMER gaze into the looking glass and bring me a record”

    I sat there as GMER worked her magic and saw the demons in the bowl. I copied it as the instructions said, but it did not appear to my eyes that all transferred, I have that here for you as well.

    I am greatly concerned M’Lady of the Clouds, calm my heart with your words of wisdom
     

    Attached Files:

  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Because this is Windows 2003, I am not able to utilise some of the tools that would better attack this infection, but one way or another we will resolve it I hope.

    Let's do this for now whilst I seek out advice from colleagues.

    Code:
    :services
    zzqncjk
    inifhzbk   
      
    :reg
    [-HKLM\SYSTEM\CurrentControlSet\Services\inifhzbk]                                                     
    [-HKLM\SYSTEM\CurrentControlSet\Services\zzqncjk]                                                    
    [-HKLM\SYSTEM\ControlSet002\Services\zzqncjk]   
    
    :files
    C:\WINDOWS\system32\zfyspqu.dll
    C:\WINDOWS\system32\zfyspqu.u
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Now navigate to the system32 folder again and see if those files exist, and take a look in the registry to see if those keys are present now.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Halooween party tonight where I work so it's going to be a late one. I'll get back to you on Sunday.
     
    Last edited: Nov 1, 2010
  24. Bowlersaid

    Bowlersaid Private E-2

    Our hero returns from his mission of surveillance, the demons remained as they were before both in the land of registry and system32. His heart was heavy as he made his way back under the cover of darkness to the queen’s courtyard. As he approached, he saw lights of many colors and people in masquerade in the ballroom, the din of a festive event was underway. He thought back on the journey thus far, took a seat in the courtyard pulled a parchment from his satchel and began to write.

    The tedium of rule is a relentless burden on my Queen, methinks she is quite deserving of a night of revelry and merry making. May your night in the clouds leave all your troubles behind even if just for a single rotation of the moon. Let the demon think we have lost our resolve; perchance he will drop his guard just long enough for your magic to take hold and send him back to the hell from whence he came. Enjoy this night, sleep long and restfully my Queen!
    For you M’Lady, these two tokens I leave, to show my fealty to you and the kingdom of the clouds
     

    Attached Files:

  25. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there, sorry for the long wait, work was very busy indeed this weekend. Okay we need to continue on, and as much as I love the way we have been creative with our words, we need to stick to being down to earth now, especially since I may need help from my colleagues and I want it to be clear and easy to read.

    Delete this

    C:\WINDOWS\Tasks\At1.job

    Code:
    :services
    jiqmcnw
    zdxtjms
    ofjqdedr
    fepzj
    zzqncjk
    inifhzbk
    dydyet 
      
    :Commands
    [emptytemp]
    
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Do these files still exist?

    C:\WINDOWS\system32\zfyspqu.dll
    C:\WINDOWS\system32zfyspqu.u

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
    Last edited: Nov 1, 2010
  26. Bowlersaid

    Bowlersaid Private E-2

    As you wish, it shall be.

    I was unable to locate this file to delete it.

    Attached Below

    C:\WINDOWS\system32\zfyspqu.dll Yes, it still resides there

    Attached below

    I appreciate your assistance and the fellow team, thank you all!
     

    Attached Files:

  27. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're very welcome!! :)

    Now hang in there again whilst I am away (I return tomorrow night)
     
  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good evening! :) You have a conficker infection.

    Okay let's get back to it, sorry for the delay in a reply.

    I need you to download and install Registrar Lite (Screenshot included of how we want to go about this)

    Now using the program navigate to the following key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost

    In the right pane, if you see any of the following keys you will need to right click and delete them:
    • nncrbg
    • zdxtjms
    • ofjqdedr
    • jiqmcnw
    • fepzj
    • zzqncjk
    • inifhzbk
    • dydyet

    Let me know how you get on. Then:

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     

    Attached Files:

  29. Bowlersaid

    Bowlersaid Private E-2

    Good Evening,
    Sorry for the delay, I was away from my desk for the last week.
    Downloaded and installed Registrar Lite as asked, navigated as instructed-
    Found none of the keys listed. I copied the listing of what was there -

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\HTTPFilter
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\LocalService
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\netsvcs
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\PCHealth
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\swprv
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\termsvcs
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\WinErr
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\(default)
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\DcomLaunch
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\HTTPFilter
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\imgsvc
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\LocalService
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\netsvcs
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\NetworkService
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\regsvc
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\rpcss
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\swprv
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\tapisrv
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\termsvcs
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\\WinErr

    Attaching the MGlogs.zip as instructed -

    Good evening -
     

    Attached Files:

  30. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Repeat the step but with this key:
    If you found anything and successfully deleted it, then run the C:\MGTools\GetLogs.bat and attach the C:\MGlogs.zip Otherwise.. let me know. :)
     
  31. Bowlersaid

    Bowlersaid Private E-2

    Using that as the key none of the listed keys were found under Netsvcs
    Just the following was there -

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\netsvcs\\(default)
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\netsvcs\\AuthenticationCapabilities
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\netsvcs\\CoInitializeSecurityParam

    Nothing was found or deleted so I did not run the batch to get logs
     
  32. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Jeez... Let's try this!

    Open up RegLite and click on the "search" Search Registry as shown in screenshot for each of the following: (and press enter)

    • nncrbg
    • jiqmcnw
    • zdxtjms
    • ofjqdedr
    • zzqncjk
    • inifhzbk
    • vyykoylm
    • gespfbyx

    Let me know the results :)
     

    Attached Files:

    Last edited: Nov 13, 2010
  33. Bowlersaid

    Bowlersaid Private E-2

    The first seven on the list all get 1 hit as being included in AB data file
    Under HKey_Local_Machine\software\Microsoft\windows NT\currentversion\svchost

    gespfbyx - on the other hand, has quite the record-

    It appears in the aforementioned ab data file but much more as well :

    LM(local machine)\system\control set 001\services
    several entries
    then under LM(local machine)\system\control set 001\parameters

    and again under LM(local machine)\system\current control set\services
    then under LM(local machine)\system\current control set\parameters

    Under each parameters (001 and current) DLL it lists
    C:\windows\system 32\zfyspqu.dll

    Got some hits that time ;-{
     
  34. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Then very carefully delete all those bad values.

    Again, very carefully delete any bad values and keys that you see relating to the ones I listed.

    Delete that too afterwards!

    Yes but now we are making some real progress I think ;)

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  35. Bowlersaid

    Bowlersaid Private E-2

    Before I start -
    A question, for the first seven listed
    The search finds the aforementioned AB Data file as the single place it is listed
    When I look however, I do not see it in the listing in registrar ...
    But Registrar says it is found in there.

    How do I delete something I cannot see?
    I guess I might need a little more understanding.
     
  36. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please try this. In the mean time please bear with me whilst I have a think about how to proceed.

    Now download Registry Search (see the link titled RegSearch Download Link)

    • Extract the files from Regsearch.zip into a folder.
    • Doubleclick regsearch.exe to start the program.
    • In the top 3 boxes under the Enter search strings case independen) and click Ok... option, enter the below string (use copy and paste)

    • Then click "OK".
    • Notepad will be opened with text in it (the file named RegSearch.txt will be saved in the program's folder as well).
    • Attach this RegSearch.txt file.
     
  37. Bowlersaid

    Bowlersaid Private E-2

    Here it is, does not look fulfilling however
     

    Attached Files:

  38. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  39. Bowlersaid

    Bowlersaid Private E-2

    Ran the binary file, it said it found conficker in memory
    asks if want to clear.. selected yes
    Then finds the Gesp.... file as well ... selected Yes
    Executes and closes....

    Ran it again (2) time, it finds conficker in memory
    asks if want to clear.. select yes
    Does not find other file...
    executes and closes

    Ran again (3) See (2)

    Ran again (4) See (2)

    Did not execute a reboot -
     
  40. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Click the Start menu and click Run.
    • Type "regedit" and click OK.
    • Navigate to this key HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost
    • Click Registry in the Registry Editor toolbar.
    • Or File > Click Export Registry File.
    • Select the directory for the exported file and type a file name. Use a specific name so that you can identify the file easily
    • Click OK to export the Registry file.

    Zip it up and attach it here for our reviewal.
     
  41. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  42. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thanks Tim, but I have the link to it already. I did not instruct the OP to use this older version because for me, when I installed it and tried to use it, it would not open up this key for me, I clicked on it and nothing....

    Few other keys showed as "restricted" too. This is on my win7 laptop... does it work smoothly for you Tim?
     
  43. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Bowlersmaid... also do this:

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :regfind
      nncrbg*
      jiqmcnw*
      zdxtjms*
      ofjqdedr*
      zzqncjk*
      inifhzbk*
      vyykoylm*
      gespfbyx*
      
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  44. Bowlersaid

    Bowlersaid Private E-2

    I am humble and live to serve, m'lady, but a maiden?:-o
    Such a blow to my delicate psyche.

    I attached both the reg file and system look

    Your humble subject-
     

    Attached Files:

    Last edited: Nov 16, 2010
  45. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Sigh, I feel just rotten that I haven't been able to get to the heart of this infection and solve it for you within good time. :( However, I am going to persevere until I run out of ideas. :) Chaslang is away at the moment for a few days, but rest assured, if I cannot rid you of this infection, Chaslang will.

    Let's rewind back a bit, because SystemLook found nothing and after reviewing the reg key nothing was revealed to help me to help you.

    Open up RegLite and click on the "search" Search Registry for the following: (and press enter)

    • nncrbg

    You said:
    So, once the list has populised after you made your search query for just nncrbg, I want you to screenshot the full results for me. One step at a time, I am so hoping to solve this for you.
     
  46. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    My apologies for my typo! :)
     
  47. Bowlersaid

    Bowlersaid Private E-2

    As you requested, it is done
    Tried to capture the entire field
     

    Attached Files:

  48. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    EDIT: removed post
     
    Last edited: Nov 17, 2010
  49. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Bowlersaid, I am going to leave your thread open and when Chaslang returns I will seek his advice and get back to you ASAP, or he will.
     
  50. Bowlersaid

    Bowlersaid Private E-2

    Thank you-
    I will look forward
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds