Request help with spyware removal

Discussion in 'Malware Help (A Specialist Will Reply)' started by ramzez, Jul 5, 2006.

  1. ramzez

    ramzez Private E-2

    I have done the READ & RUN THIS sticky. Bitdefender and Panda ActiveScan found multiple infections but they didn't fix them. Only other problem was that Windows Defender didn't work on Safe Mode so I had to run it in Normal Mode.

    Attached are the reports.

    All help greatly appreciated
     

    Attached Files:

  2. ramzez

    ramzez Private E-2

    Additional information, I ran ewido anti-spyware in Safe Mode and it found and fixed several threats. Attached is the report from ewido.
     

    Attached Files:

  3. ramzez

    ramzez Private E-2

    Problems I'm having at the moment (indicated by Norton Internet Security):

    1) win??.tmp.exe attempting to connect to a DNS server
    C:\WINDOWS\TEMP\ (?? is a changing letter and number)

    2) Trojan Horse:
    C:\Documents and Settings\Juha\Local Settings\Temporary Internet Files\Content.IE5\P0L6U3FW\srvegi[1].exe
    from NIS log viewer: Repair failed, Access denied

    3) Trojan Horse:
    C:\WINDOWS\TEMP\win89.tmp
    from NIS log viewer: Repair failed, Access denied
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    You are a member of about 50 users that have already had this newest form of multiple infections. I need some additional info, that the below very fast scans will provide, before I continue to give you a fix.

    Run the below procedure and attach the runkeys.txt log.
    Now run the below procedure and attach the newfiles.txt log.
     
  5. ramzez

    ramzez Private E-2

    Thanks for taking to help me out. Here are the attachments.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After completing the SpywareQuake Removal Procedure, continue with the below.


    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of winvfw32.dll once and then click the kill button. After you have killed all of the winvfw32.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below two DLLs:
    khfffda.dll
    fcyvv.dll

    Next double click on explorer.exe and again click once on each instance of winvfw32.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below two DLLs:
    khfffda.dll
    fcyvv.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:


    O4 - HKLM\..\Run: [244bb463.exe] C:\WINDOWS\system32\244bb463.exe
    O4 - HKCU\..\Run: [244bb463.exe] C:\Documents and Settings\Juha\Local Settings\Application Data\244bb463.exe
    O15 - Trusted Zone: *.sony-europe.com
    O15 - Trusted Zone: *.sonystyle-europe.com
    O15 - Trusted Zone: *.vaio-link.com
    O16 - DPF: {97B79133-88F0-45F0-8D57-0F2EF27D9C66} - http://85.255.114.166/1/rdgFI2404.exe


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now click Start, Run, and enter cmd and click OK! This will open a command prompt window. In the command prompt window enter the below commands each followed by the Enter key.
    del %windir%\temp\win*.*
    del %windir%\temp\h91746.exe
    del %windir%\g*.dll
    exit



    Now run Pocket Killbox:
    Choose Tools > Delete Temp Files and click OK.

    Run Killbox.exe. Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.
    C:\Documents and Settings\Juha\Local Settings\Application Data\244bb463.exe
    C:\Documents and Settings\Juha\Local Settings\Temporary Internet Files\Content.IE5\8G7B8WMN\srvvfu[1].exe
    C:\Documents and Settings\Juha\Local Settings\Temporary Internet Files\Content.IE5\IK24H3DJ\bgates[1].exe
    C:\Documents and Settings\Juha\Local Settings\Temporary Internet Files\Content.IE5\X6KP1NZG\srvohm[1].exe
    C:\WINDOWS\TEMP\h91746.exe
    C:\WINDOWS\g271240.dll
    C:\WINDOWS\g4119573.dll
    C:\WINDOWS\g512366.dll
    C:\WINDOWS\g5321822.dll
    C:\WINDOWS\g6523970.dll
    c:\windows\system32\244bb463.exe
    C:\WINDOWS\system32\khfffda.dll
    c:\windows\system32\regperf.exe
    C:\WINDOWS\system32\winvfw32.dll
    C:\WINDOWS\SYSTEM32\fcyvv.dll
    C:\WINDOWS\SYSTEM32\vvycf.ini


    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    After reboot continue with the below.

    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Now attach a new HJT log and tell me how the steps went.

    Also attach a new log from ShowNew!

    Make sure you tell me how things are working now!
     
  8. ramzez

    ramzez Private E-2

    I completed the SpywareQuake procedure, attached is the logfile. Attached is also a printscreen of the only file I was unable to delete in Normal Mode (it doesn't seem to exist in Safe Mode). Otherwise there wasn't any problems.

    I will now continue with the above procedure.
     

    Attached Files:

  9. ramzez

    ramzez Private E-2

    I completed the above instructions and two logs are attached.

    Problems during the process:
    In the last step I could not find "Internet Options, Programs tab, Reset Web Settings". The closest reminding of this was "Internet Options, Advanced tab, Reset Internet Explorer Settings" so I clicked on that.

    Otherwise there were no problems.

    At the moment the computer seems to start-up and shut down alot faster and there hasn't been any indications of infections so far.

    Edit: there was an error with the attachments and they are "In progress". Hopefully they show up.
     
    Last edited: Jul 6, 2006
  10. ramzez

    ramzez Private E-2

    Another try with the attachments. Everything seems to be working allright, no infection alerts so far.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The file you could not delete is part of the Windows OS and normal.

    One problem file I had you trying to fix is still there: fcyvv.dll

    We need to repeat the procedure again with some changes.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of fcyvv.dll once and then click the kill button. After you have killed all of the fcyvv.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of fcyvv.dll and kill it. (If you do not find the dll, just continue on.)


    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {7B234435-8951-4BAC-96D6-4DB17B5E4CD1} - C:\WINDOWS\system32\fcyvv.dll
    O20 - Winlogon Notify: cfgmngr32 - C:\WINDOWS\g271240.dll (file missing)
    O20 - Winlogon Notify: fcyvv - C:\WINDOWS\system32\fcyvv.dll
    O20 - Winlogon Notify: jkklmjj - jkklmjj.dll (file missing)
    O20 - Winlogon Notify: winvfw32 - winvfw32.dll (file missing)
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.


    Now run Pocket Killbox:
    Choose Tools > Delete Temp Files and click OK.

    Run Killbox.exe. Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.
    C:\WINDOWS\SYSTEM32\fcyvv.dll
    C:\WINDOWS\SYSTEM32\vvycf.ini
    C:\WINDOWS\SYSTEM32\vvycf.ini2
    C:\WINDOWS\SYSTEM32\vvycf.tmp
    C:\WINDOWS\SYSTEM32\vvycf.tmp2
    C:\WINDOWS\SYSTEM32\vvycf.dat


    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    After reboot continue with the below.
    Now attach a new HJT log and tell me how the steps went.

    Also attach a new log from ShowNew!

    Make sure you tell me how things are working now!
     
  12. ramzez

    ramzez Private E-2

    I followed tha above instructions and attached are the log files taken after the last reboot.

    Description of the process:
    - I couldn't find any traces of the .dll file with Process Explorer
    - The following two were not to be found in HJT:
    1) O20 - Winlogon Notify: fcyvv - C:\WINDOWS\system32\fcyvv.dll
    2) O20 - Winlogon Notify: winvfw32 - winvfw32.dll (file missing)
    - no problems with fixme.reg procedure
    - This part I couldn't follow to the letter:
    "Now run Pocket Killbox: Choose Tools > Delete Temp Files and click OK"
    There is no "OK" that can be selected. Attached is a print screen of what can be selected. I selected "Delete Selected Temp Files".

    I haven't received any warnings since the last procedure. I did a full system scan with Ad-aware and it didn't find anything.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! I know about that. I need to update a load of boiler plate type messages that I have. When applications change (like Killbox did) this often happens. My newer message reads something like:

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.

    I see you are logged in. I'm looking at your new logs now.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    After clicking Fix, exit HJT.

    Other than the above, your logs are clean. If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     
  15. ramzez

    ramzez Private E-2

    I did the procedure with HJT and also the restore point procedure. After reboot and enabling restore again I scanned with HJT but the above two R0's are still there. Is that a problem?

    Attached is the HJT log.

    I have already followed the "How to protect..." sticky and hopefully my computer stays clean from now on.
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to disable all active protection and have all browsers closed before fixing. You have Windows Defender, SpySweeper, Ewido, SpywareGuard, Symantec, (anything else that has active protection running????). This is too many!!!

    Is Spy Sweeper a paid or free version?
    Is Ewido a paid or free version?


    Disable Windows Defender's realtime protection:

    Disable Windows Defender:
    • Open Windows Defender
    • Click Tools
    • Click General Settings
    • Scroll down to Real Time Protection Options
    • Uncheck Turn on Real Time Protection (recommended)
    • Close Windows Defender
    Once your log is clean you can re-enable Windows Defender Real Time Protection.
     
  17. ramzez

    ramzez Private E-2

    I had a free version of SpySweeper but I uninstalled it two days ago.
    I uninstalled Ewido (free) and Spybot.

    I tried to do the HJT fix but the R0's are still there (log attached).
    This was my setup while using HJT last time:
    Norton Security - all options disabled
    Norton Anti-Virus - all options disabled
    Windows Defender - disabled with your instructions and exit
    SpywareBlaster - disabled all protection
    SpywareGuard - disabled and exit
    Ad-Aware SE - this doesn't have an active protection as far as I know
    Only window open was HJT.

    Is this still too many programs to use in the future?

    I have no idea what else to try to remove those R0's. When I check them and click "Fix" on HJT, the scan list just disappears from the HJT window and I have to click "scan" if I want to see the list again. Is this how it is supposed to work, I don't remember?
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You did not need to and should not uninstall Spybot. It only has active blocking if Teatimer is running which was not. Reinstall Spybot and re-use the Immunize feature too. Make sure you get updates. It just updated today.

    Not necessary as it it not doing realtime blocking for registry changes.

    You should uninstall SpywareGuard. You don't need it since you have Windows Defender. Only one realtime blocker should be used.

    That is how it works!

    After uninstalling SpywareGuard, do the below.

    Boot into safe mode.

    Disable Windows Defender per previous instructions.

    Disable Symantec's protection (it can cause problems like this).

    Reset Web Settings - follow these steps exactly, that is MAKE SURE you use www.majorgeeks.com for your startpage. You can change it when we finish. I need to see the effect.
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!

    Now get a HijackThis log in safe mode and save it.

    Now reboot into normal mode and get a second HJT log.

    Attach both HJT logs.
     
    Last edited: Jul 7, 2006
  19. ramzez

    ramzez Private E-2

    I uninstalled SpywareGuard and reinstalled Spybot.
    My setup now:
    Norton antivirus and firewall
    Windows Defender
    Ad-aware SE Personal (with VX2 plug-in)
    SpywareBlaster
    Spybot


    Windows Defender and Norton were not operating at all in Safe Mode.

    attached are the two logs.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download the below attachment to your c:\windows\inf folder

    Now look in the C:\windows\inf folder using Windows Explorer and locate the iereset.inf file that is there. Right click on it and select Rename. Change the name to ierest.old

    Now unzip the file your just downloaded into the c:\windows\inf folder. You should now have a new iereset.inf file.

    Now run HJT and select the below lines and EXIT all browsers then click Fix checked.
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=54729
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=55245&clcid={SUB_CLCID}
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

    Now attach a new HijackThis log and continue on to the below. I don't expect the above to work but I want to see what happens. I'm suspecting you may have certain registry keys locked. I still suspect it is Symantec locking these. To put your mind at ease, these are not malware problems but it would be good to know why you cannot change them.


    Also Run the below procedure and attach the runkeys.txt log.
     

    Attached Files:

    Last edited: Jul 8, 2006
  21. ramzez

    ramzez Private E-2

    Here are the attachments and thank you very much for helping. You are a lifesaver.
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    No check to see if you can fix those two lines. I don't expect the above to fix it but it is worth a try. If it does not fix it, continue on to the below.

    download the Registry Search Tool

    Unzip to your Desktop and double click on regsrch.vbs
    (if you have script protection, please allow this to run)

    In the dialog that opens enter the following:

    SearchAssistant

    Press 'OK'

    The search will run for a while then alert you when it is finished. Press 'OK' and copy the contents of the WordPad window and post in this thread.

    Then repeat the above search sequence on the below string:
    CustomizeSearch


    Attach both logs!



    Question: Do you know how to use MSconfig to stop Startups and also Services?
     
  23. ramzez

    ramzez Private E-2

    To answer your question: No, I don't know how to do that.

    The regedit procedure didn't fix the lines.

    Attachment is from using "SearchAssistant". With the second word "CustomizeSearch" no instances were found.
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Can't be! It shows in your HJT log which means the keys do exist but they are blank. Are you sure you entered the CustomizeSearch correctly with no spaces?

    It should normally give something like the below:

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search]
    "CustomizeSearch"="http://ie.search.msn.com/{sub_rfc1766}/srchasst/srchcust.htm"
    [HKEY_USERS\S-1-5-21-3804909484-125725482-3536007706-1005\Software\Microsoft\Internet Explorer\Search]
    "CustomizeSearch"=http://ie.search.msn.com/{sub_rfc1766}/srchasst/srchcust.htm

    Also it's strange that the search for SearchAssistant did not also give the below.

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Search]
    "SearchAssistant"="http://ie.search.msn.com/{sub_rfc1766}/srchasst/srchasst.htm"
    [HKEY_USERS\S-1-5-21-3804909484-125725482-3536007706-1005\Software\Microsoft\Internet Explorer\Search]
    "SearchAssistant"=http://ie.search.msn.com/{sub_rfc1766}/srchasst/srchasst.htm

    Perhaps the problem is that your registry keys are completely missing.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Use RegSrch to search for Explorer Bars

    There is a space between Explorer and Bars

    Attach this log.
     
  26. ramzez

    ramzez Private E-2

    Yes I'm sure I spelled it correctly. Attached is a printscreen and the new log.
     

    Attached Files:

  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download and Install Registrar Lite (Make sure you select a download link from Majorgeeks and not the Author's)

    Run RegistrarLite

    Copy and paste the below into the bar of Registrar Lite and hit return.

    HKEY_USERS

    Now look in the right window pane. You will probably see the below:
    .DEFAULT
    S-1-5-18
    S-1-5-19
    S-1-5-19_Classes
    S-1-5-20
    S-1-5-20_Classes

    But whatelse is there?
    Is there a S-1-5-21-38049009484-125725482-3536007706-1005

    Make sure you give me the EXACT value of the key! Double check before posting.
     
  28. ramzez

    ramzez Private E-2

    attached is a printscreen of the values
     

    Attached Files:

    • pic.jpg
      pic.jpg
      File size:
      19.2 KB
      Views:
      16
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.


    Now attach a new HJT log.
     
  30. ramzez

    ramzez Private E-2

    Here's HJT log after fixme.reg
     

    Attached Files:

  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    My idea in message #24 was correct. Your registry keys were just totally missing and that is why we could not fix them. The last registry patch has taken care of this.

    We are all done now, unless you are having any other problems.
     
  32. ramzez

    ramzez Private E-2

    No other problems, everything is running smoothly. Thank you again for all your patience and help.
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds