Pretty sure I have a trojan. Followed the readme, here is my logs.

Discussion in 'Malware Help (A Specialist Will Reply)' started by metalmilitia, Mar 26, 2007.

  1. metalmilitia

    metalmilitia Private E-2

    I followed the readme completely, although pandascan would not finish scanning it would just close for no apparaent reason about 25% into the scan. I did have a trojan uploaded on my computer a couple weeks ago but I thought I had it removed. After having my warcraft account hacked last night I think I was wrong.

    Here's the logs please help!
     

    Attached Files:

  2. metalmilitia

    metalmilitia Private E-2

    don't see a button to edit my original post but here's the counterspy.txt log file.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot to attach your BitDefender log and also your HJT log. However before attaching them, please do the below.

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 10
    J2SE Runtime Environment 5.0 Update 6
    J2SE Runtime Environment 5.0 Update 9
    MediaTickets by OIN

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Check whether you know why you have the below two files wasting 4 Gigabyte of diskspace:
    Code:
    "C:\"
    163.tmp       Mar 26 2007  2143289856  "163.tmp"
    24f.tmp       Mar 26 2007  2143289856  "24F.tmp"
    

    I'm going to post two sets of instructions below. Each will be enclosed in separate Quote boxes. Make sure to complete the first one 100% before moving on to the second one.

    ATTACH THE FIRST LOG NOW BEFORE CONTINUING OR YOU WILL OVERWRITE IT!!!! And then immediately continue on to the below steps.

    Now please dowload and installed the new version of ShowNew (just updated an hour ago) and use it from now on.

    Now attach new logs from:
    • BitDefender online scan log never attached
    • GetRunKey
    • ShowNew
    • HJT
     
  4. metalmilitia

    metalmilitia Private E-2

    Here's the HJT and smitfraud logfiles, i ran bit defender again and it didn't find any problems. Oh and i had no idea what those 2 large files were so i deleted them.
    I uninstalled the media tickets, but the 3 J2SE updates I was unable to uninstall, when i try it says "Another installation is already in progress.Complete that installation before continuing with this install".
     

    Attached Files:

  5. metalmilitia

    metalmilitia Private E-2

    Here is the second rapport.txt file after doing step 2.
     

    Attached Files:

  6. metalmilitia

    metalmilitia Private E-2

    Here's the new scans after step 2 was completed.
     

    Attached Files:

  7. metalmilitia

    metalmilitia Private E-2

    and finally, the new HJT scan file.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You did not download the current version of ShowNew as requested. Please do that now and use it from now on when I request a new log.

    Also please indicate what malware problems you are currently having if any.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also run the below utility to see if it can find any failed or unterminated installs or uninstalls:

    Windows Installer CleanUp Utility

    If it does cleanup any problmes then try uninstalling the old Sun Java versions now and get the current version.


    Continue by downloading a tool we will need - Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it later.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
    O9 - Extra button: (no name) - {77E68763-4284-41d6-B7E7-B6E1F053A9E7} - (no file)
    After clicking Fix, exit HJT.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\WINDOWS\system32\cac1s.exe

    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.
    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!
    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  10. metalmilitia

    metalmilitia Private E-2

    I did download it but somehow i must have used the older version. anyways here's the file.

    I am not expieriencing any malware at the moment however, trojan-vlob.media was detected earlier and 2 days ago my warcraft account was hacked into so i'm assuming it's from this trojan.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It was probably zlob not vlob.

    Did you miss message # 9?
     
  12. metalmilitia

    metalmilitia Private E-2

    OK I did what you said in message 9 and here is the new logs.
    Everything is working fine, although as far as i was concerned everything was working fine before this, I "thought" i had managed to remove all of this myself a week ago but apparently I was wrong.

    Oh yea i forgot i tried the windows installer cleanup utility and guess what error i got when i tried to install it?
    "Error 1500.Another Installation is in progress. You must complete that installation before continuing this one."
    I know why it says that, it's because i had this CA personal firewall on my computer and one of the updates for it didn't install properly, so now everytime i reboot my computer it wants to install this update for CA personal firewall but it could never find the file it wanted for the update. So i got tired of it doing that and uninstalled CA personal firewall...BUT it still wants to install the friggin update every time i reboot.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You must not use MSConfig to control startups. This is mentioned in at least two places in the READ ME. Run MSconfig now and select Normal Starup. Please remain in Normal Startup mode.



    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to each of the following keys (one at a time) and Set Permissions for Everyone(I explained how to do that further down).
    • To set permissions for Everyone for each key, do the following
    • Copy & Paste the registry key from above (one at a time) into the Address bar of Registrar Lite and hit the enter key.
    • This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Edit Permissions so we can change permissions to everyone. Now here is what I expect you to see in the Group or user names area of the form that comes up:
      • Everyone
      • SYSTEM
    • Select Everyone by clicking on it.
    • Now at the bottom in the Permissions box click the check box for Full Control.
    • Then click Apply and then OK to get back to the main Registrar Lite screen.
    • Now right click on the registry key and select Delete.
    • Then click View and Refresh. Check to see if the registry key just deleted truly deleted.
    • If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.
    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\Downloaded Program Files\SAIX.dll
    C:\windows\system32\UmxWnp.Dll
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Mar 27, 2007
  14. metalmilitia

    metalmilitia Private E-2

    Ok i did that and then I was able to uninstall the java things and I no longer have the CA personal firewall thing coming up when i reboot. Would you like me to post 1. GetRunKey again?
    2. ShowNew
    3. HJT
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  16. metalmilitia

    metalmilitia Private E-2

    Here it is, everything appears to be running good now.
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you do the steps I gave you with Registrar Lite? You still have the ADSPY/ISearch.d.2 infection.
     
  18. metalmilitia

    metalmilitia Private E-2

    Yes i did do it, should i try again? I'm sorry i re-read it again and that part is a bit complicated I might not have done it right.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's try a different procedure this time. Make sure to follow steps exactly, they are a little different than last time.


    Run Registrar Lite navigate to each of the following keys (one at a time) and take ownership of them (I explained how to do that further down).

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR

    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Take Ownership
    • Repeat these steps for all of the registry keys given above before continue to the next steps below.
    • Now leave RegistrarLite running and continue
    • Now run the fixME.reg REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages?
    • Now in RegistrarLite click View and then Refresh
    • Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
    • If any of the keys still exist, move on down to PART 2 - Setting Permissions for Everyone below!.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    PART 2 - Setting Permissions for Everyone
    Run the below if some of the registry keys still exist after running the above steps.

    Now I want you to use Registar Lite again to navigate to each of the below keys (one at a time) by pasting them into the Address Bar and hitting return. But this time click the Security menu item and select Edit Permissions so we can change permissions to everyone ( I describe this down below the list of registry keys).
    After click Edit Permissions , here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Nowright click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Then reboot your PC!

    Now run GetRunKey again and attach a new log!
     
  20. metalmilitia

    metalmilitia Private E-2

    OK i did it and then when i checked if any of those lines were still there, they weren't. It just brought me to the root HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\

    So hopefully all is well now.
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  22. metalmilitia

    metalmilitia Private E-2

    thanks for all the help, really appreciate it.
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     
  24. metalmilitia

    metalmilitia Private E-2

    Hello again, I've noticed something strange since yesterday. Whenever I am in a program, like watching a movie or playing a game, for no reason at all it goes back to the desktop. The program i'm in doesn't crash or anything it's just as if i did alt+tab, do you know why? or how to make that stop? it seems to do it about every half hour or so.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No I do not currently have any idea why but it does not sound like malware!


    Are the programs actually still running and can you go back to them by using CTRL-ALT-ESC to select it?
     
  26. metalmilitia

    metalmilitia Private E-2

    yes i am able to go back into the programs. it just for some reason goes to desktop.
     
  27. metalmilitia

    metalmilitia Private E-2

    Is it possible that I still have a trojan or that someone still has access to my computer after everything we did?
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    At the point where we finished, you were clean. You could have picked up something new since March 27th. But I really doubt the problems you are describing are due to malware. Sounds more like a potential hardware issue especially since you say it only happens while doing a couple of particular specific things.

    However, attach new logs from the below so we can check for anything new:

    1. GetRunKey
    2. ShowNew
    3. HJT
    Also download Blacklight Beta
    • Download blbeta.exe and save it to the Desktop.
    • Once saved... double click blbeta.exe to install the program.
    • Click accept agreement and Click scan
      This app too may fire off a warning from antivirus. Let the driver load.
      Wait for it to finish.
    • If it displays any items...don't do anything with them yet. Just hit exit (close)
    • It will drop a log on Desktop that starts with fsbl....big number
    Please attach the BlackLight log.
     
  29. metalmilitia

    metalmilitia Private E-2

    Here's these 3 files i'm doing the blacklight scan right now so it'll be up shortly.

    Also my Symantec Anti virus detected "infostealer.wowcraft" today and it said cleaned by deletion. As i said before my warcraft account was hacked last week, so obviously i still have that trojan if it was detected again today. I did not go to any unreputable websites or download anything new (other than what you asked me to). Edit:i reinstalled microsoft .net 2.0 and 2 updates for it.from the ms website.
    Here's the link to what symantec says about it
    http://www.symantec.com/security_response/writeup.jsp?docid=2005-073115-1710-99&tabid=3
     

    Attached Files:

    Last edited: Mar 30, 2007
  30. metalmilitia

    metalmilitia Private E-2

    OK i did the blacklight scan and it didn't detect anything and it didn't leave a log file.
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you toggle System Restore as requested in message # 21?
     
  32. metalmilitia

    metalmilitia Private E-2

    Yes I did, actually I didn't realize but system restore was off the whole time, so i rebooted and turned it back on after you said i looked clear.
    I've been looking at this all night trying to find this, i've found a svchost.exe file in C:/windows/temp and it isn't signed by Microsoft, could this be it? or at least part of it. I read that the svchost.exe file should only be found in windows/system32 dir.
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes I know I already had seen it in your last logs but I needed to know the status of System Restore before posting.

    The one for Microsoft should only be in the system32 folder! The below procedure should wind up removing it when you get to ATF Cleaner.

    Did you create the below policies yourself?
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "LinkResolveIgnoreLinkInfo"=dword:00000000
    "NoResolveSearch"=dword:00000001

    You can read more info about them in the below links:
    LinkResolveIgnoreLinkInfo - http://www.microsoft.com/technet/pro....mspx?mfr=true
    NoResolveSearch - http://www.microsoft.com/technet/pro....mspx?mfr=true


    Uninstall the Sunbelt CounterSpy trial since we are finished with it now! Then delete the below two folders which may be left behind by the uninstall:
    C:\Documents and Settings\All Users\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software

    Please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF Cleaner menu to close the program.

    Now attach a new logs from ShowNew.

    Are you still having problems?
     
  34. metalmilitia

    metalmilitia Private E-2

    I did not set those policies, at least not knowingly. Counterspy uninstalled and ran that program. Here's the new log.
    No problems that I see, i'm still having the problem where it drops me back to desktop when i'm playing warcraft. Could have something to do with this I think.

    And now i'm trying to attach the new logfile but for some reason I can't attach any files.
     
  35. metalmilitia

    metalmilitia Private E-2

    OK here's the file, for some reason I couldn't attach it while using firefox but IE still works.
    Edit:firefox just crashed and when restarted it seems to have fixed itself.
     

    Attached Files:

  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What are you referring too? What is "this"?

    I see no malware? I cannot help you with problems playing games. You will have to work that out in the Game Forum or Software Forum.


    Let's remove those policies you say you did not set!

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
     
  37. metalmilitia

    metalmilitia Private E-2

    AHHH this virus is still here. It seems as though it keeps coming back somehow, imbedded in the registry?

    I downloaded a free trial virus scan called NOD32, it detects

    File C:\WINDOWS\Temp\svchost.exe is infected with probably a variant of Win32/PSW.WOW.JE trojan. The file can be deleted. It is strongly recommended that you back up any crucial data before you proceed

    This is the same file we cleared last week and it keeps coming back. NOD32 deletes it and then it detects it again like 15min later.
    It also detects this which I think is the new ANI exploit
    Alert Details
    File:hxxp://upload.4pu.com/data.exe (should be http)
    Threat:probably a variant of Win32/PSW.WOW.JE trojan
    Comment:this object contains a threat to your computer

    I've never visited that website and I thought the ANI exploit was only for internet explorer and I use firefox.
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please run this Gromozon Rootkit Removal Tool and attach a log!


    Also use Pocket Killbox to delete the below files:
    C:\WINDOWS\system32\drivers\fidbox.dat
    C:\WINDOWS\system32\drivers\fidbox.idx
    C:\WINDOWS\system32\drivers\fidbox2.dat
    C:\WINDOWS\system32\drivers\fidbox2.idx
    C:\WINDOWS\system32\drivers\kmxcfg.u2k4
    C:\WINDOWS\system32\drivers\kmxcfg.u2k5
    C:\WINDOWS\system32\drivers\kmxcfg.u2k6
    C:\WINDOWS\system32\drivers\kmxcfg.u2k7
    C:\WINDOWS\system32\drivers\kmxcfg.u2k0
    C:\WINDOWS\system32\drivers\kmxcfg.u2k1
    C:\WINDOWS\system32\drivers\kmxcfg.u2k2
    C:\WINDOWS\system32\drivers\kmxcfg.u2k3
     
  39. metalmilitia

    metalmilitia Private E-2

    thanks i reformatted and reinstalling windows, my computer was totally screwed up at this point.
     
  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds