Requesting Help MALAWARE

Discussion in 'Malware Help (A Specialist Will Reply)' started by tcc1, Jun 2, 2007.

  1. tcc1

    tcc1 Private E-2

    I have followed the Malaware removal guide.

    I started in safe mode and log as administrator
    used CCcleaner. I could not find the default, but everything was checked and run it that way, including in the application.
    run spybot and immunized it.
    then run counterspy, but could not find the view during safe mode. I figured it out that I have to be in normal mode then I copied the file I needed.
    when reboot the computer, it took literally ten minutes to be able to boot up the computer.

    Then I run bitdefender and panda and getrunkey and shownew

    See files

    I really need help and thank you for helping
     

    Attached Files:

  2. tcc1

    tcc1 Private E-2

    attached are the other files
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You should have used the account that you are trying to clean! That is the user account named Papi!

    That's what default means (i.e., don't change the default settings).

    Okay there' s a lot to do so let's get started!


    First let's uninstall a couple of malware services.

    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Service Configurator
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now repeat the above to Stop and Disable the below two Services (if you do not find them or get any errors, just continue):
      • Windows Copy Installer
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste Service_v1 into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now repeat the above to delete the below two Services (if you do not find them or get any errors, just continue):
      • WCPSVC
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.

    Now Uninstall the below old versions of software:
    J2SE Development Kit 5.0 Update 6
    Viewpoint Manager (Remove Only) <-- should have been uninstalled in step 0 of the READ ME
    Viewpoint Media Player <-- should have been uninstalled in step 0 of the READ ME

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Uninstall the Sunbelt CounterSpy trial since we are finished with it now! Then delete the below two folders which may be left behind by the uninstall:
    C:\Documents and Settings\All Users\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software


    Continue by downloading two tools we will need

    - Process Explorer

    Extract it to its own folder somewhere that you will be able to locate it later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of any of the below DLL files (if found) and then click the kill button.
    ddcya.dll
    jkkjhfd.dll
    nnnkiii.dll
    pxciokyd.dll
    gebxvsp.dll
    nnnkiii.dll
    pmnligh.dll
    qfofhgie.dll
    ubaqappb.dll
    vtutspn.dll
    xxyywvs.dll


    After you have killed all instances of any of the above DLLs under winlogon click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on explorer.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    ddcya.dll
    jkkjhfd.dll
    nnnkiii.dll
    pxciokyd.dll
    gebxvsp.dll
    nnnkiii.dll
    pmnligh.dll
    qfofhgie.dll
    ubaqappb.dll
    vtutspn.dll
    xxyywvs.dll


    After you have killed all instances of any of the above DLLs under Explorer click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on iexplore.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    ddcya.dll
    jkkjhfd.dll
    nnnkiii.dll
    pxciokyd.dll
    gebxvsp.dll
    nnnkiii.dll
    pmnligh.dll
    qfofhgie.dll
    ubaqappb.dll
    vtutspn.dll
    xxyywvs.dll


    After you have killed all instances of any of the above DLLs under iexplore click ok.
    (If you do not find these DLLS, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {383260CD-F6C2-4D3A-B623-0ADABF67FCDE} - C:\WINDOWS\system32\jkkjhfd.dll
    O2 - BHO: (no name) - {CD3447D4-CA39-4377-8084-30E86331D74C} - C:\WINDOWS\system32\pxciokyd.dll
    O2 - BHO: (no name) - {F696FDE7-11A4-4639-9404-FCFADD6C7486} - C:\WINDOWS\system32\ddcya.dll
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [Genuine] rundll32.exe "C:\WINDOWS\system32\qfofhgie.dll",realset
    O4 - HKCU\..\Run: [RealPlayer] "C:\Program Files\Real\RealPlayer\realplay.exe" /RunUPGToolCommandReBoot
    O20 - Winlogon Notify: ddcya - C:\WINDOWS\system32\ddcya.dll
    O20 - Winlogon Notify: jkkjhfd - C:\WINDOWS\SYSTEM32\jkkjhfd.dll
    O20 - Winlogon Notify: nnnkiii - C:\WINDOWS\SYSTEM32\nnnkiii.dll
    O20 - Winlogon Notify: pmnnm - C:\WINDOWS\system32\pmnnm.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it
    double click it and allow it to merge with the registry.
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now please download ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    NOTE: This program is for Windows XP and Windows 2000 only. ATF Cleaner will remove all files from the items that are checked so if you have some cookies you'd like to save. Please move them to a different directory first.
    • Double-click ATF-Cleaner.exe to run the program.
    • Under Main choose: Select All
    • Click the Empty Selected button.
    If you use Firefox browser
    • Click Firefox at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    • Click Opera at the top and choose: Select All
    • Click the Empty Selected button.
      • NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main ATF Cleaner menu to close the program.

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  4. tcc1

    tcc1 Private E-2

    Every time I reboot my computer I got the following message from my Viruscan Enterprise: "Floppy disk infected with ! Remove Disk before rebooting" But then it continue with the shutdown process.

    Also, I could only download the jre-6ui-windows-i586.exe using IE. It did not work when I was using Firefox.

    Everything else went according to the instructions.

    Now How do I get to the section to disable System Restore?

    I cannot attached the files here so I will attached them with a new thread
    call Requesting Help MALAWARE Continue
     
  5. tcc1

    tcc1 Private E-2

    Sorry, I have to use a different computer to attached the files. Somehow I have done something that will not allow to attached my files to that computer.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot a key log that I need to continue. Please attach the requested new log from HijackThis. Make sure it is a new log!!

    Also Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Please tell me whether you receive a success message from adding the above to the registry.

    Attach a new log from GetRunKey!


    Are you saying you are still getting this now? Do you have McAfee set to scan floppies at shutdown? Is there a floppy inserted?
     
  7. tcc1

    tcc1 Private E-2

    I want to apologize for my mistake. And thank you again for having patience with me.

    First I had a memory stick connected to the USB port. That is why the message I suppose. I will check those files too.
     

    Attached Files:

  8. tcc1

    tcc1 Private E-2

    And I did got a successful message when adding the register requested.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  10. tcc1

    tcc1 Private E-2

    Chaslang:

    I want to thank you for all your help you have provided me. It seems that it is working now.

    What I want to know if the trojan, virus, spyware took any of my passwords or any other information that I had in my computer?

    How can I verify this?
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    This is not something that can be answered unless you observed obviously illegal activities associated with things that you login into. And to truly be safe you should change all of your passwords especially for anything financial related. You should also check with all banks and credit card companies for any illegal activities just to be on the safe side.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds