Sending out an SOS.

Discussion in 'Malware Help (A Specialist Will Reply)' started by Blac_Slayer, Feb 2, 2005.

  1. Blac_Slayer

    Blac_Slayer Private E-2

    Okay, move.reg is done.

    I did not delete winspool.exe; I knew that was an important file.

    Anything else?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Is everything working OK now?

    Are those lines gone from your HJT log?
     
  3. Blac_Slayer

    Blac_Slayer Private E-2

    The lines are (Finally!) gone from the HJT log.

    The only other problem is disabling my Window's Firewall, as I have said in an earlier post. I fixed my desktop problem by looking at someone else's problem (So that's another problem fixed), and I think I'm finally ready to do a final (Major) scan after that.

    I'm still confused as to how explorer.exe is able to request a send to contact admin2cash.biz. Would another program be doing this?
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Last edited: Feb 4, 2005
  5. Blac_Slayer

    Blac_Slayer Private E-2

    It was explorer.exe.

    The Windows firewall is hard to disable, since Group Policy cannot be installed on XP Home SP2. I'm trying to work through the command line, and I'm making fair headway.

    Just a question: Is it okay to reboot my computer?
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! You can reboot. Just double check your HJT log after reboot and make sure you are still clean.
     
  7. Blac_Slayer

    Blac_Slayer Private E-2

    Now I am thouroughly pissed.

    HJT log posted.

    EDIT: I still can't figure out how to manually disable Windows Firewall; Its still up, and it refuses to budge.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Since yesterday when you were clean, what sites have you been going too? Have you been playing any games? Have you been downloading anything?
     
  9. Blac_Slayer

    Blac_Slayer Private E-2

    My older brother used Yahoo, my Younger brother used Gamefaqs, no games were played (besides the one in your arcade, which my little brother played), and nothing was downloaded besides what you asked.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! What version of Norton Antivirus do you have and are the virus definitions up to date (like within the week) or has your subscription expired and you no longer get updates?

    Is System Restore disabled?
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to run all the cleanup procedures we have been performing again (while you have no internet access possible) and you need to do them on each user account on the PC. I assume there is an account for you and your brothers. Anyone else.

    Even the READ ME FIRST should be run for each user. Any user can cause the others to get reinfected.
     
  12. Blac_Slayer

    Blac_Slayer Private E-2

    We all use one account. System restore is diabled, and Norton (is as of now) uninstalled due to how outdated it was. Instead, we now have Avast, but it does nothing at all against this conflict.
     
  13. Blac_Slayer

    Blac_Slayer Private E-2

    Alright, I've done it. Er, for now.

    Well, after several hours of fiddling and working on my own for the time being (and constantly re-following advice), I think I've finally worked around things, if only temporary.

    None of the trusted zones show up on HJT, but I can't re-enable the protection on Spyware Blaster or re-immunize on Spybot, or risk getting all the zones back. Thankfully, that is clear, and I KNOW I won't be seeing any pop-ups from the net for now.

    I have discovered something very peculiar with certain groups of programs that are spyware. There is a group of programs running around (I think it has recently been causing many problems), and the head program is dddd.exe (Which was orginally called video.exe). With this program, several other programs usually fall behind to back it up:

    htt.exe
    eree.exe
    op.exe
    sfee.exe
    dfe.exe

    There are more, but I did not record them. These programs seem to actually cooperate with the isvrs folder. At least, on my computer. See, if you delete one or the other, they will bring each other back. If you try to delete them both, there is a fall-back program they have (or something of the sort) which will bring back BOTH of them at the same time. I have recieved the desktop.exe and the iffsearch.exe programs back many times due to how I deleted it. However, I was able to by-pass some of it by only deleting a portion of the folder (Which chas told me to do).

    There is some connection between the two... and I need to figure out what it is.

    For now, this temp fix I created will do just fine, although I haven't tested any games or AIM yet. It still manages the basic programs just fine now; At least I can now get to work on my english essay due tomorrow. XD

    I can't thank you enough chas, for actually dealing with me! Even though I still have problems (Including disabling the Windows Firewall without the Group Policy program [Friggin' requirements!]), I believe I'm fixed... at the moment. However, this thread will continue, as I will be coming back VERY frequently and checking on how the dddd.exe program can be removed without troubles. My patience was worn just a little too thin for me at the moment, and I really need to find something else to do besides toil over this every day.

    Once again, I can't thank you enough, chaslang.

    (A little confused? I am still, too. Also, here is a most recent HJT log.)
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! But at least you have an up to date application now. I was worried about that.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Alright, I've done it. Er, for now.

    You're welcome.

    What do you mean "or risk getting all the zones back"? I know you are referring to the O15 lines but are you implying that using SpywareBlaster or Spybot's Immunize will bring them back?

    Are you also saying the dddd.exe file or any of the other ones are still on your hard disk? If so, where are they located?

    Is the isvrs folder still there.

    What happens after reboot?

    Make sure you're firewall is not allowing any programs you do not recognize to have access to the internet. Look at the list of programs and their access rights to make sure none of the bad stuff is allowed in or out.
     
  16. Blac_Slayer

    Blac_Slayer Private E-2

    The dddd.exe program (And its affiliates) are located in C:\Documents and Settings\Owner folder. They did infect the l2fix folder, and I was forced to delete that.

    The isvrs folder is still there, but desktop.exe and iffsearch.exe are removed. edmond.exe is still present, with its respective dll files.

    As for the risk part, whenever I do immunize or enable protection and restart, the registry gets re-edited and I have all the programs stuck back on, along with the trusted sites. However, when left alone, none of the sites are placed back in, and the registry is left alone.

    Reboot is very normal. Nothing is being affected at start-up from what I can see.

    ...Go Eagles. :p
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall SpywareBlaster and Spybot S&D completely and reboot. I'm wondering if something infected them.

    So are you saying you cannot delete the "dddd.exe program (And its affiliates)" even from safe mode. Try using Pocket Killbox to delete them similar to how we used it earlier but select Delete on Reboot and do not say yes to reboot until the last filename is entered.
     
  18. Blac_Slayer

    Blac_Slayer Private E-2

    No, no, no! I'm not saying that I can't delete them! I'm saying that IF I delete them, they come back and re-edit my registry, just like the isvrs folder does.

    I'm nervous about getting rid of Spyware Blaster AND Spybot at the same time... I would be very vulnerable, wouldn't I?

    I don't think that they would be infected, but something IS editing the protection to both of them.
     
  19. Blac_Slayer

    Blac_Slayer Private E-2

    Sorry for the double post, but the temp protection that I originally thought worked was just destroyed. I'm very confused as to how these programs are working together to keep me from having an actual clean computer.

    Egh... back to the drawing board. I'm going ahead and doing what you said.
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have to delete all those files and folders and you have to do them all. You have to do it while no browsers are running and you MUST not have an internet connection possible at all (unplug the cable), you must also do all of them from safe mode. I would use Killbox and select Delete on Reboot.

    Make sure none of those bad programs have access thru your firewall.

    After doing all of the above, do not reconnect you internet connection. Just boot to normal mode. And see if anything came back yet. Check for all files and folders we have been deleting and delete them again if they came back (tell me if the were gone or came back - let's call this point 1).

    Then with no Internet Connection possible, open and the close Internet Explorer at least two times. Now check if they are back. (tell me if the were gone or came back - let's call this point 2).

    Now reconnect you Internet Connection and open and the close Internet Explorer at least two times. Now check if they are back. (tell me if the were gone or came back - let's call this point 3).

    If still having a problem download the below two tools from SysInternals and run them while repairing these items. They may help you track which program is being run on your hard disk that is bringing these back.

    FileMon and here is a page with info about this program:
    http://www.sysinternals.com/ntw2k/source/filemon.shtml

    RegMon and here is a page with info about this program:
    http://www.sysinternals.com/ntw2k/source/regmon.shtml
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  22. Blac_Slayer

    Blac_Slayer Private E-2

    Actually, I just did a variation of it last night. However, it went more like this:

    1. I began by cleaning out my computer again like last time, and rebooted in safe mode to finish it off, and disconnected the cable to the internet.

    Note: I happen to have a very wierd HSRemove problem where 8 files is constantly removed, even right after the scan is finished. I believe you've seen this problem before on one of these threads; I really need a link to it.

    2. Reboot in safe mode: Everything was normal. That was more or less expected.

    3. Reboot in normal mode: Everything was still normal. The cable was still disconnected.

    4. Second Reboot in normal mode: This time, I plugged in the cable, but did not turn on the Internet. The boot was normal.

    5. Third Reboot in normal mode: Finally, I turned on the Internet (Cable modem box), and lo and behold, I'm attacked at start up. Avast was disabled for a short while, every program came back, and I was struck once more.

    Evidently, something seems to check to see if these programs are still on my computer, and only when I'm connected to the internet at start-up. To keep myself safe for the moment, I disconnect the cable before I turn on the computer now. I've tested this out twice already, and the ad-ware only struck me when I was connected to the internet at startup.

    ...You know what? I would love to be a guinea pig. I'll try that removal software out right now.
     
  23. Blac_Slayer

    Blac_Slayer Private E-2

    HJT log posted (I just want you to look at what is in it.)

    I ran the removal tool, but I stayed physically disconnected to see what would happen. So far, it doesn't look like anything happened. I'm about to reboot completely normally.

    ...Wish me luck.
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well in that log just this line needs to be fixed:


    R3 - URLSearchHook: (no name) - {1C78AB3F-A857-482e-80C0-3A1E5238A565} - (no file)

    It is a left over from Isearch.

    Edit: I take that back! Did these come from the removal tool:
    O4 - HKLM\..\RunOnce: [Desktop Search Removal Tool] "C:\WINDOWS\inst\kill.exe" /VERYSILENT /NOCANCEL /NORESTART /SP-
    O4 - HKLM\..\RunOnce: [Bonus Sites Removal Tool] "C:\WINDOWS\inst\kill.exe" /VERYSILENT /NOCANCEL /NORESTART /SP-
    O4 - HKLM\..\RunOnce: [iSearch Toolbar Removal Tool] "C:\WINDOWS\inst\kill.exe" /VERYSILENT /NOCANCEL /NORESTART /SP-


    If so, it may not be a removal but rather a hack! What happens if we remove those lines?
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First there is no reason for you to be running HSremove. You do not have an HSA hijack problem. Second this is a known problem with HSremove. It almost always says 8 files were remove, even if you run it back to back times.


    I did not want you to reboot at these points. I wanted the system to be already running with all protection programs already up and running before the cable was plugged in.
     
  26. Blac_Slayer

    Blac_Slayer Private E-2

    Thanks for the info. At least now I don't have to worry about that.

    That, I have done, too. In fact, that's what I do now.

    Yes, they came from the removal tool, but they do absolutely nothing. In fact, when I checked out what file it was, it was merely the same removal tool they offered me; It was just renamed.

    Upon rebooting with the internet at startup, it (Sadly) did nothing to stop all the programs from being re-installed back on.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    So I guess they lied about it being an uninstaller.

    Try this:
    - click Start, Run, and enter notepad C:\Documents and Settings\Owner\dddd.exe and click OK.

    That should bring up this crap file in a notepad editor window. Hit CTRL-A to select all lines. Then hit the Delete key to delete all lines. Then Click File and Save. (yes we want to try to save it as an empty file.)

    Let's see if you can do that and what impact it has. Perhaps you can do the same for other related files that you have found.

    Also load those tools I mentioned (Filemon and Regmon)
     
  28. Blac_Slayer

    Blac_Slayer Private E-2

    Well, before I go and get re-infected to do what you say (Since right now its, clean... just gotta reboot!), I do have a small question. I recently have been seeing a new system process labeled wmiprvse.exe running. Is this supposed to be here? What exactly is that process?
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  30. Blac_Slayer

    Blac_Slayer Private E-2

    Alright, I just did what you said (In safe mode... got hit VERY hard when I rebooted, and it froze the computer... >_>), and rebooted while connected to the Internet. Did not use HJT. The reboot came out... Normal.

    This is rather abnormal, and I don't think this is to last. I did try to look at some processes that were running, and I think I have the regboot.log from Regmon the last time I booted (When I got hit very hard). If you want to look at it, I can upload it; I think its a little big, though.

    I'm gonna go check to see if the programs were re-installed (Or basically filled back up again). I did find a certain program labeled build2.exe in my C:\Documents and Settings\Owner\Local Settings\Temp\B197691134 folder. This seems to work in conjunction with all the problems I've been having as well.

    EDIT: Just checked the files I edited with notepad; Seems as though they are all still 0 bytes. Should I try rebooting again to see if they will re-create themselves? Or should I try cleaning out my registry again?
     
  31. Blac_Slayer

    Blac_Slayer Private E-2

    Blargh, can't edit after five minutes, so I'll just get the edit through a double post.

    EDIT AGAIN: Scratch that. The Commands.ini file was written back in. This is located in C:\Documents and Settings\Owner folder. How to counter this?
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well if there are more related bad files, you should zero them out too.
    Which files (give full path names) did you edit thus far?

    Why do you think build2.exe is related?
    No file in C:\Documents and Settings\Owner\Local Settings\Temp\B197691134 should be needed. Try deleting all files and folder in C:\Documents and Settings\Owner\Local Settings\Temp and let's see what happens after a reboot. Check to see what gets put back in the Temp folder.

    What does your HJT log currently look like? Do the problems show?
     
  33. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What is in the Commands.ini file?

    Read it into notepad to look at it. Do not double click on it.
     
  34. Blac_Slayer

    Blac_Slayer Private E-2

    The commands.ini file has very confusing characters; Japanese/chinese, along with a sad face in it. Very wierd. Its probably what languages that are installed in my computer are what's showing... But that's what it shows.

    Should I attach it to show you?
     
  35. Blac_Slayer

    Blac_Slayer Private E-2

    Files I have edited using Notepad:
    C:\Windows\isrvs\delprot.sys
    C:\Windows\isrvs\desktop.exe
    C:\Windows\isrvs\edmond.exe
    C:\Windows\isrvs\ffisearch.exe
    C:\Windows\isrvs\isearch.xpi
    C:\Windows\isrvs\mfiltis.dll
    C:\Windows\isrvs\msdhbk.dll
    C:\Windows\isrvs\sysupd.dll
    C:\Windows\delprot.ini
    C:\Documents and Settings\Owner\dfe.exe
    C:\Documents and Settings\Owner\eree.exe
    C:\Documents and Settings\Owner\htt.exe
    C:\Documents and Settings\Owner\commands.ini
    C:\Documents and Settings\Owner\Local Settings\Temp\~DF6D68.tmp
    C:\Documents and Settings\Owner\Local Settings\Temp\2c96_appcompat.txt
    C:\Documents and Settings\Owner\Local Settings\Temp\52ec_appcompat.txt
    C:\Documents and Settings\Owner\Local Settings\Temp\8885_appcompat.txt
    C:\Documents and Settings\Owner\Local Settings\Temp\fc66_appcompat.txt
    C:\Documents and Settings\Owner\Local Settings\Temp\jusched.log
    C:\Documents and Settings\Owner\Local Settings\Temp\B197691134\build2.exe
    C:\Documents and Settings\Owner\Local Settings\Temp\B197691134\ping2.exe
    C:\Documents and Settings\Administrator\Local Settings\Temp\50a3_appcompat.txt
    C:\Documents and Settings\Administrator\Local Settings\Temp\b061_appcompat.txt
    C:\Documents and Settings\Administrator\Local Settings\Temp\b71d_appcompat.txt
    C:\Documents and Settings\Administrator\Local Settings\Temp\d33d_appcompat.txt
    C:\Documents and Settings\Administrator\Local Settings\Temp\kb.log

    I think Build2.exe is bad because of two real reasons:

    1. It loads up as one of the starting processes, and constantly opens iexplore behind my back and starts sucking up my CPU usage and Commit charge. It also is opened up by a different program on start-up, and not begin on startup. Its effectively hidden.

    2. When editing these files with notepad, all the exe files had a very familiar heading to them all. This also had the same header.

    As for deleting, I already tried it. It, as well as the isrvs folder and the programs in the Documents and Settings\Owner folder were re-installed. However, dddd.exe is missing for some odd reason.

    Here is my most recent HJT log; Its infested again.
     

    Attached Files:

  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! You edited all the files and saved them with no info. Are they still 0 byte files? Or did some change back?

    If still 0 bytes in length, have HJT fix the below (with browsers closed) and let's see what happens.
    O2 - BHO: IE Update Class - {5B4AB8E2-6DC5-477A-B637-BF3C1A2E5993} - C:\WINDOWS\isrvs\sysupd.dll
    O4 - HKLM\..\Run: [Desktop Search] C:\WINDOWS\isrvs\desktop.exe
    O4 - HKLM\..\Run: [ffis] C:\WINDOWS\isrvs\ffisearch.exe
    O15 - Trusted Zone: *.addictivetechnologies.com
    O15 - Trusted Zone: *.addictivetechnologies.net
    O15 - Trusted Zone: *.admin2cash.biz
    O15 - Trusted Zone: *.awmdabest.com
    O15 - Trusted Zone: *.bettersearch.biz
    O15 - Trusted Zone: *.c4tdownload.com
    O15 - Trusted Zone: *.clickspring.net
    O15 - Trusted Zone: *.crazywinnings.com
    O15 - Trusted Zone: *.f1organizer.com
    O15 - Trusted Zone: *.finefind.nettraffic2cash.biz
    O15 - Trusted Zone: *.iframe.biz
    O15 - Trusted Zone: *.megapornix.com
    O15 - Trusted Zone: *.mt-download.com
    O15 - Trusted Zone: *.newiframe.biz
    O15 - Trusted Zone: *.overpro.com
    O15 - Trusted Zone: *.pizdato.biz
    O15 - Trusted Zone: *.private-dialer.biz
    O15 - Trusted Zone: *.private-iframe.biz
    O15 - Trusted Zone: *.slotch.com
    O15 - Trusted Zone: *.sp2admin.biz
    O15 - Trusted Zone: *.sp2****ed.biz
    O15 - Trusted Zone: *.topconverting.com
    O15 - Trusted Zone: *.vse-moe.biz
    O15 - Trusted Zone: *.windupdates.com
    O15 - Trusted Zone: *.xxxtoolbar.com
    O15 - Trusted Zone: *.ysbweb.com
    O15 - Trusted Zone: *.addictivetechnologies.com (HKLM)
    O15 - Trusted Zone: *.addictivetechnologies.net (HKLM)
    O15 - Trusted Zone: *.admin2cash.biz (HKLM)
    O15 - Trusted Zone: *.awmdabest.com (HKLM)
    O15 - Trusted Zone: *.bettersearch.biz (HKLM)
    O15 - Trusted Zone: *.c4tdownload.com (HKLM)
    O15 - Trusted Zone: *.finefind.nettraffic2cash.biz (HKLM)
    O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - C:\WINDOWS\isrvs\mfiltis.dll
     
  37. Blac_Slayer

    Blac_Slayer Private E-2

    Okay, I went in and used HJT; .finefind is still being persistant, again.

    Commands.ini changes back to what it had, and all of the appcompat.txt files keep getting info off my computer.

    I hate to say it, but perhaps there is an ADS on my computer that is working as spyware? It sounds stupid, I know... but could it?

    I'm going to sleep, I'll be back on at around 4 or 5 in the morn. Then at 3 in the afternoon after school.
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You could run this: - ADSspy

    Be careful though! It does not tell you bad from good. It only shows you what it finds. (Much like HijackThis).
     
  39. Blac_Slayer

    Blac_Slayer Private E-2

    ADS log posted.

    I would look this stuff myself, but I'm just plainly lost about ADS. They are just too confusing for me to try to understand. Can you look at these?
     

    Attached Files:

  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  41. Blac_Slayer

    Blac_Slayer Private E-2

    Here are the infected files:

    C:\WINDOWS\winra32.exe: infected with Backdoor.Small.DC
    C:\WINDOWS\ServicePackFiles\i386\explorer.exe: infected with Win32.Bube.B
    C:\WINDOWS\explorer.exe: infected with Win32.Bube.B

    None of these files can be replaced, since I cannot find a new replacement, and they cannot be fixed. I used BitDefender to find this.

    Is there any site I can find which helps me learn how to replace the explorer and important system files? I've checked Microsoft, but with no luck.
     
  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    winra32.exe is more than likely another file from your original HSA hijack problem. It should be deleted in safe mode.

    As far as your explorer.exe shell being infected. This is a tough one. Do you have another XP SP2 PC that you can get the explorer.exe file from? Or do you have a WinXP SP2 bootable CD-ROM (it must be SP2 not SP1 or older). This is a little surprising that no one else detects this. There is not much written on the Bube.B virus and what is there is in none english files. Where did you download your SP2 upgrade from?

    You could try killing the explorer.exe shell using Task Manager after you have already opened up an Internet Explorer session to start a scan with Bit Defender. That way maybe they can clean it. If you do terminate the explorer shell, your Desktop will go blank and all icons will disappear. They will come back when you restart the explorer shell (can be done in Task Manager) or when you reboot.
     
  43. Blac_Slayer

    Blac_Slayer Private E-2

    I'll try your suggestion of killing the explorer when BitDefender scans. I don't have a bootable CD-ROM of SP2, though I wish I did.
     
  44. Blac_Slayer

    Blac_Slayer Private E-2

    The scan failed, and could not remove it, despite unloading it from memory. I am going to have to search for some bootable WinXP with SP2 now.

    I got SP2 through Windows Update. I'm rather surpised I have such a different virus on my computer.
     
  45. Blac_Slayer

    Blac_Slayer Private E-2

    On another minor note, all the software came back. It still refuses to be removed from my computer, even though I cleaned out the commands.ini file using notepad.
     
  46. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download the below files:

    deldomains.zip from
    http://www.dslreports.com/r0/download/769805~f190593382728258fbfe749d35872eef/deldomains.zip

    getservice.zip from
    http://www.dslreports.com/r0/download/769832~e94dd355cd5e357b9692f967e70b7435/getservice.zip

    Print these instructions or save locally so you can run them while offline.

    Physically unplug from the Internet and do not open or run anything unless directed to do so.

    First:
    Boot into safe mode!

    Hit CTRL-ALT-DEL to bring up Task Manager and select Processes.
    Look for any of the below and if found, end them:
    desktop.exe
    edmond.exe
    ffisearch.exe


    Second:

    Launch Notepad. Copy/paste the text in the box below into a new text file.
    Save it as fixme.reg on your Desktop

    Locate fixme.reg on your Desktop and double-click on it.

    You will receive a prompt similar to: "Do you wish to add the information into the registry?".

    Answer 'Yes' and wait for a message to appear similar to "Merged Successfully".


    Reboot your computer in normal mode and do not run anything but what is given.

    Third:
    Execute the following commands:
    Start -> Run -> regsvr32 /u C:\Windows\isrvs\msfiltis.dll
    Start -> Run -> regsvr32 /u C:\Windows\isrvs\msdbhk.dll
    Start -> Run -> regsvr32 /u C:\Windows\isrvs\sysupd.dll

    If you get any error messages, just continue.

    Fourth:
    Delete the following files/folders (if present) in C:\Windows\ and/or C:\Windows\Systme32\ (Look in both folders for all of them)
    C:\Windows\isrvs\delprot.ini
    C:\Windows\isrvs\delprot.sys
    C:\Windows\isrvs\delprot.log
    C:\Windows\isrvs\desktop.exe
    C:\Windows\isrvs\edmond.exe
    C:\Windows\isrvs\ffisearch.exe
    C:\Windows\isrvs\isearch.xpi
    C:\Windows\isrvs\mfiltis.dll
    C:\Windows\isrvs\msdhbk.dll
    C:\Windows\isrvs\sysupd.dll
    C:\Windows\isrvs (delete the entire folder)

    C:\Windows\delprot.ini


    Fifth:
    Delete the following files if found:
    C:\windows\system32\drivers\delprot.sys
    C:\Documents and Settings\Owner\dfe.exe
    C:\Documents and Settings\Owner\eree.exe
    C:\Documents and Settings\Owner\dddd.exe
    C:\Documents and Settings\Owner\htt.exe
    C:\Documents and Settings\Owner\commands.ini
    C:\Documents and Settings\Owner\Local Settings\Temp <-- delete everything you can in this folder
    C:\Documents and Settings\Administrator\Local Settings\Temp <-- delete everything you can in this folder

    Sixth:
    Delete the following files/folder (if present) in C:\Documents and Settings\owner\Desktop\
    (also look in the Administrator account)
    anal exploits.url
    big dick school for 2.95.url
    evidence eraser.lnk
    popup blocker stops popups.lnk
    spyware avenger.lnk
    virus hunter security.lnk
    your platinum visa.lnk


    Seventh:
    Run HiJackThis and clean up all entries related to problems.
    Close all windows except HijackThis and click Fix checked.

    While still in Safe Mode*, delete the following:
    (Files specified without a full path will be lcoated in C:\Windows\ or C:\Windows\System32\)

    C:\WINDOWS\System32\boln.dll <--- this name may vary. It is in an HJT line like: O4 - HKLM\..\Run: [Systems Restart] Rundll32.exe boln.dll, DllRegisterServer


    Last:
    If the O15 entries are still present in your HJT log, unzip deldomains.zip (downloaded earlier) to your desktop, and Right-click on the deldomains.inf file and select 'Install'

    When its finished your IE Zones will be reset. That will make it necessary to re-install protection using SpywareBlaster and Spybot S&D.


    Reboot in normal mode.
    Run HiJackThis again and post a new log in this thread.


    Then do the following

    Extract the files from getservice.zip to your Desktop. It will create its own folder on your Desktop.

    Open the getservice folder and double click on the getservices.bat file.

    A Notepad document will open list all service on your system.
    Please attach the contents of that document into this thread (call it services.txt).


    Download SilentRunners from:
    http://www.silentrunners.org/Silent%20Runners.zip

    Unzip the archive to your desktop and double click on the VBS file.
    (If your AntiVirus alerts, allow the script to run.

    Once finished, the script will save a Notepad document to your Desktop.
    Please attach the contents of that document into this thread (call it runners.txt).
     
  47. Blac_Slayer

    Blac_Slayer Private E-2

    Services and Runner log loaded.

    I have a couple of notes to say:

    I re-connected my cable after reading download Silent Runners, and that was after I rebooted into normal mode. Should I go back and reboot the computer with the cable in and Internet on as to re-create my previous situations?

    Also, I'll post up HJT log next.
     

    Attached Files:

  48. Blac_Slayer

    Blac_Slayer Private E-2

    HJT log posted.

    I cannot remove the boln.dll registry entry (The file itself is gone!). It came back after the reboot.
     

    Attached Files:

  49. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


    What came back after the reboot? boln.dll? Or all the other problems?
     
  50. Blac_Slayer

    Blac_Slayer Private E-2

    Remember, I rebooted with the cable dis-connected. I plugged it back in after reboot.

    The registry entry for the boln.dll file came back, not the file itself.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds