Spy Sheriff and Others?

Discussion in 'Malware Help (A Specialist Will Reply)' started by kip1981, Aug 9, 2005.

  1. kip1981

    kip1981 Private E-2

    Hello, last Spy Sheriff suddenly arrived on my laptop and made my day!

    Also: I cannot download (the download dialogue box just disappears), so I have not downloaded Hijack This. I have had a friend send me CleanUp and Ewido over AIM. I could potentially have someone send me Hijack This too. I have used the most update to date version of SpyBot, which no longer finds any Spy Sheriff. Internet explorer still starts at "about:blank", however. And I am not sure that Spy Sheriff is completely removed, or that it's content is completely removed, even it's been disabled.

    I am going to boot again in safe mode and run some online scans so I can post.

    Any help is very appreciated.
     
  2. kip1981

    kip1981 Private E-2

    Quick update: I disabled System Restore, and now in Safe Mode it is letting me download. There is no sign of Spy Sheriff. I have downloaded all of the tools you recommend here:

    http://forums.majorgeeks.com/showthread.php?t=35407

    And I am now running the online scans. After that I will close all programs and browsers and run the other scans. Thanks again.
     
  3. kip1981

    kip1981 Private E-2

    Here is the BitDefender report:

    BitDefender Online Scanner
    Scan report generated at: Tue, Aug 09, 2005 - 12:59:09

    Scan path: C:\;D:\;

    Statistics:

    Time 00:55:14
    Files 249019
    Folders 3159
    Boot Sectors 2
    Archives 1214
    Packed Files 20409


    Results:

    Identified Viruses 9
    Infected Files 12
    Suspect Files 0
    Warnings 0
    Disinfected 0
    Deleted Files 11


    Engines Info:

    Virus Definitions 199025
    Engine build AVCORE v1.0 (build 2292) (i386) (Mar 3 2005 11:57:29)
    Scan plugins 13
    Archive plugins 39
    Unpack plugins 4
    E-mail plugins 6
    System plugins 1


    Scan Settings:

    First Action: Disinfect
    Second Action: Delete
    Heuristics: Yes
    Enable Warnings: Yes
    Scanned Extensions:
    exe;com;dll;ocx;scr;bin;dat;386;vxd;sys;wdm;cla;class;ovl;ole;hlp;doc;dot;xls;ppt;
    wbk;wiz;pot;ppa;xla;xlt;vbs;vbe;mdb;rtf;htm;hta;html;xml;xtp;php;asp;js;shs;chm;
    lnk;pif;prc;url;smm;pfd;msi;ini;csc;cmd;bas;

    Exclude Extensions

    Scan Emails: Yes
    Scan Archives: Yes
    Scan Packed: Yes
    Scan Files: Yes
    Scan Boot: Yes


    Scanned File Status:

    C:\Program Files\AIM\Sysfiles\WxBug.EXE=>wise0008 Detected with: Adware.Wheaterbug.A

    C:\Program Files\AIM\Sysfiles\WxBug.EXE=>wise0008 Disinfection failed

    C:\Program Files\AIM\Sysfiles\WxBug.EXE=>wise0008 Deleted

    C:\Program Files\AIM\Sysfiles\WxBug.EXE Update failed

    C:\WINDOWS\system32\cz.dll Infected with: Backdoor.Haxdoor.CN

    C:\WINDOWS\system32\cz.dll Disinfection failed

    C:\WINDOWS\system32\cz.dll Deleted

    C:\WINDOWS\system32\gbajlfbf.exe Infected with: BehavesLike:Win32.SiteHijack

    C:\WINDOWS\system32\gbajlfbf.exe Disinfection failed

    C:\WINDOWS\system32\gbajlfbf.exe Deleted

    C:\WINDOWS\system32\hz.sys Infected with: Backdoor.Haxdoor.AF

    C:\WINDOWS\system32\hz.sys Deleted

    C:\WINDOWS\system32\msnethlp32.dll Infected with: Trojan.Proxy.Mitglieder.DQ

    C:\WINDOWS\system32\msnethlp32.dll Disinfection failed

    C:\WINDOWS\system32\msnethlp32.dll Delete failed

    C:\WINDOWS\system32\msnethlp32.exe Infected with: Dropped:Trojan.Proxy.Mitglieder.DQ

    C:\WINDOWS\system32\msnethlp32.exe Disinfection failed

    C:\WINDOWS\system32\msnethlp32.exe Deleted

    C:\WINDOWS\system32\vdmt16.sys Infected with: Backdoor.Haxdoor.AF

    C:\WINDOWS\system32\vdmt16.sys Deleted

    C:\WINDOWS\system32\winlow.sys Infected with: Backdoor.Haxdoor.CG

    C:\WINDOWS\system32\winlow.sys Disinfection failed

    C:\WINDOWS\system32\winlow.sys Deleted

    C:\WINDOWS\system32\wz.sys Infected with: Backdoor.Haxdoor.CG

    C:\WINDOWS\system32\wz.sys Disinfection failed

    C:\WINDOWS\system32\wz.sys Deleted

    C:\WINDOWS\tool3.exe Infected with: Dropped:Trojan.Proxy.Mitglieder.DQ

    C:\WINDOWS\tool3.exe Disinfection failed

    C:\WINDOWS\tool3.exe Deleted

    C:\WINDOWS\wmplayer1.exe Infected with: BehavesLike:Win32.ExplorerHijack

    C:\WINDOWS\wmplayer1.exe Disinfection failed

    C:\WINDOWS\wmplayer1.exe Deleted

    C:\winld32.dll Infected with: Trojan.Downloader.Small.ANU

    C:\winld32.dll Disinfection failed

    C:\winld32.dll Deleted
     
    Last edited by a moderator: Aug 9, 2005
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please do not post any logs inline.

    Have you seen the steps in sticky thread for SpySheriff: SpySheriff (aka SpywareNo) Removal

    Have you finished running all of the READ ME FIRST sticky?
     
  5. kip1981

    kip1981 Private E-2

    I have not tried the steps in the Spy Sheriff guide yet (they look pretty complicated), I'm trying the steps in the Basic Guide first. Sorry, I won't post any more logs. If you or anyone needs to see them, just let me know.

    On the Basic Guide, I have:

    1. Turned off System Restore (this let me download again in Safe mode)
    2. Run the rad and bitdefender scands (I have the logs).
    3. The rad and bitdefenders scans (or something else, while they were scanning) did something so that now my computer will not run .exe's directly. Nor will it let me right click and use "open" or "run" for the .exe's. The only way I am able to post this is to open an .htm file in IE, and then use IE normally.
    4. Because of the above problem, I cannot run the MacAfree install.

    At this point I don't know what to do. I am seriously considering buying some memory, backing up my files, and reformatting. I am also considering taking the computer to a shop, where professionals might be able to fix it.

    Any advice is very appreciated, especially how do I get XP to run .exe's again (this wasn't a problem after the spyware, just after the online scans.)
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Goto the following site: http://www.dougknox.com/xp/file_assoc.htm

    And see the line that reads:

    EXE File Association Fix (Restore default association for EXE files)

    You probably need to install this registry patch.

    What OS are you running? You may need to get to a command prompt window to merge the above patch into your registry. We will see! Can you get Windows Explorer to run by right clicking Start and select Explore?

    Do you have HijackThis on this PC and can you get it to run?
     
  7. kip1981

    kip1981 Private E-2

    The .exe fix worked just fine (should I just assume that everything is ok with that now? or is there some more testing I should do?).

    Now that the .exe was fixed, I ran MacAfee, SpyBot, Ad-aware (plus the plug-in), and also the about:buster, cwshredder, hsremove, and kill2me. The latter few may not have been necessary b/c I haven't heard anything about HS or kill2me. My browser does originally point to about:buster but...

    SpyBot found SpySheriff again, so it had not completely wiped it (the fact that it had removed the further, and last listed, SpySheriff parts after a reboot suggested that it had wiped our SpySheriff, but I was too optimistic). It also continues to find three other things, I am guessing that SpySheriff (or whatever causes it) keeps reinstalling them.

    When I try to fix SpySheriff in SpyBot, I get the following error:

    "The Application or DLL C:\WINDOWS\system32\klogini.dll is not a valid Windows image. Please check this against your installation diskette."

    After this error, the fixing continues, and finally SpyBot tells me I have only fixed some of the SpySheriff stuff. The following are fixed:

    Settings
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vdmt16

    Data
    C:\WINDOWS\system32\p2.ini

    and (after listing non-fixed things)

    Settings
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\Notify\drct16

    The following could not be fixed however:

    Executable:
    C:\WINDOWS\system32\mszx23.exe

    Library
    C:\WINDOWS\system32\drct16.dll

    Settings
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\vdmt16

    ALSO, I got this error report during HSRemove (the program had gotten to the last step, and stopped after this error):

    I/O error 33

    FINALLY, I get this random error popping up, every 15 minutes or so.

    16 bit MS-DOS Subsystem
    ______________________
    C:\Documents and Settings\Kip\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
    The NTVDM has encountered an illegal instruction.
    CS:0dbc IP:01d1 OP:63 68 65 2f 31 Choose 'Close' to terminate the application
    [Close] [Ignore]

    I am going to try the SpySheriff removal suggestions now, and hopefully they can eliminate all of these problems. Any advices is, again, very much appreciated.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Some of the problems you are mentioning are not SpySheriff. They are Haxdoor or Horse Server problems.

    Please download: HSFix.zip

    Extract the tool from the ZIP File to a folder you can easily find (preferably in its own folder - like C:\HSFix).

    Now please boot to Safe Mode and DoubleClick hsfix.bat to run the tool.

    Allow it as long as it takes to run, then Reboot to Normal Windows and look for a log at C:\hslog.txt . Please attach that log when you come back.



    Also, if you have completed all the steps of the READ ME FIRST, follow the steps below exactly:

    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your HJT log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).



     
  9. kip1981

    kip1981 Private E-2

    OK I ran both in safe mode (I'm using XP btw) and I'm attaching the logs. XP seems to bluescreen/shutdown every 15 minutes of so.
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Can you get a HijackThis log from normal boot mode?
     
  11. kip1981

    kip1981 Private E-2

    Here you go.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\windows\system32\mdms.exe
    C:\WINDOWS\tool2.exe

    After killing all the above processes, click "Back".
    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = about:blank
    O2 - BHO: (no name) - {78364D99-A640-4ddf-B91A-67EFF8373045} - C:\WINDOWS\system32\appwiz.dll
    O4 - HKLM\..\Run: [SysMemory manager] c:\windows\system32\mdms.exe
    O4 - HKCU\..\Run: [SNInstall] C:\WINDOWS\tool2.exe
    O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} - http://software-dl.real.com/131befd877e9c33bfd01/netzip/RdxIE601.cab
    O20 - Winlogon Notify: NTvsx - NTvsx.dll (file missing)
    O20 - Winlogon Notify: tcpG4T - C:\WINDOWS\SYSTEM32\tcpG4T.dll
    O21 - SSODL: SysTray.Excn - {1722ECFF-4356-4f5b-B534-E67294FE75E9} - C:\WINDOWS\System32\hlmadcmk.dll (file missing)
    O21 - SSODL: Internet Explorer - {F28A40D7-AD0E-034A-C651-5F0ED76232E6} - C:\WINDOWS\System32\Gqaogjaf.dll

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\system32\appwiz.dll
    C:\WINDOWS\SYSTEM32\tcpG4T.dll
    C:\WINDOWS\System32\hlmadcmk.dll
    C:\WINDOWS\System32\Gqaogjaf.dll
    C:\windows\system32\mdms.exe
    C:\WINDOWS\tool2.exe

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST). Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.


    Run the HSFixprogram again now and post the log later.

    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log and the HSfix log. And tell us how things are working.
     
  13. kip1981

    kip1981 Private E-2

    I could not find C:\windows\system32\mdms.exe on the list.

    Here is the list of processes running in normal mode (I'm back in safe mode now):

    Process list saved on 6:39:15 PM, on 8/9/2005
    Platform: Windows XP SP1 (WinNT 5.01.2600)

    [pid] [full path to filename] [file version] [company name]
    1116 C:\WINDOWS\System32\smss.exe 5.1.2600.1106 Microsoft Corporation
    1288 C:\WINDOWS\system32\winlogon.exe 5.1.2600.1557 Microsoft Corporation
    1344 C:\WINDOWS\system32\services.exe 5.1.2600.0 Microsoft Corporation
    1356 C:\WINDOWS\system32\lsass.exe 5.1.2600.1106 Microsoft Corporation
    1544 C:\WINDOWS\System32\ibmpmsvc.exe
    1612 C:\WINDOWS\System32\Ati2evxx.exe 6.14.10.4083
    1648 C:\WINDOWS\system32\svchost.exe 5.1.2600.0 Microsoft Corporation
    1984 C:\WINDOWS\System32\svchost.exe 5.1.2600.0 Microsoft Corporation
    888 C:\WINDOWS\system32\spoolsv.exe 5.1.2600.0 Microsoft Corporation
    1496 C:\WINDOWS\system32\Ati2evxx.exe 6.14.10.4083
    1720 C:\WINDOWS\Explorer.EXE 6.0.2800.1106 Microsoft Corporation
    1820 C:\Program Files\Synaptics\SynTP\SynTPLpr.exe 7.5.17.6 Synaptics, Inc.
    1828 C:\Program Files\Synaptics\SynTP\SynTPEnh.exe 7.5.17.6 Synaptics, Inc.
    1840 C:\WINDOWS\System32\rundll32.exe 5.1.2600.0 Microsoft Corporation
    1872 C:\WINDOWS\System32\TpShocks.exe 1.0.0.1 IBM Corp.
    1892 C:\PROGRA~1\ThinkPad\PkgMgr\HOTKEY\TPHKMGR.exe
    144 C:\PROGRA~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe 1.0.0.0 IBM Corp.
    228 C:\WINDOWS\AGRSMMSG.exe 2.1.31.0 Agere Systems
    292 C:\PROGRAM FILES\ATI TECHNOLOGIES\ATI CONTROL PANEL\ATIPTAXX.EXE 6.14.10.5043 ATI Technologies, Inc.
    304 C:\Program Files\ThinkPad\PkgMgr\HOTKEY\TPONSCR.exe
    312 C:\Program Files\ThinkPad\PkgMgr\HOTKEY_1\TpScrex.exe 1.0.0.1 IBM Corporation
    376 C:\Program Files\IBM\Messages By IBM\ibmmessages.exe 1.1.0.3 IBM
    408 C:\WINDOWS\system32\dla\tfswctrl.exe 1.4.7.0 Sonic Solutions
    436 C:\Program Files\ThinkPad\ConnectUtilities\QCWLICON.EXE 2.7.2.0 IBM Corp.
    456 C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe 2.0.0.42 Viewpoint Corporation
    464 C:\Program Files\Google\Gmail Notifier\G001-1.0.25.0\gnotify.exe 1.0.25.0 Google Inc.
    496 C:\Program Files\ewido\security suite\ewidoctrl.exe 3.0.0.1 ewido networks
    504 C:\WINDOWS\tool2.exe
    540 C:\Program Files\iPodder\iPodder.exe 1.0.0.0
    1176 C:\WINDOWS\System32\QCONSVC.EXE 2.7.2.0 IBM Corp.
    1168 C:\WINDOWS\System32\svchost.exe 5.1.2600.0 Microsoft Corporation
    1812 C:\WINDOWS\system32\TpKmpSVC.exe
    3364 C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE 11.0.5604.0 Microsoft Corporation
    1072 C:\WINDOWS\System32\wuauclt.exe 5.4.3790.2182 Microsoft Corporation
    1160 C:\Program Files\HJT\HijackThis.exe 1.99.0.1 Soeperman Enterprises Ltd.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You may only find it on the process list in normal boot mode which is what the HijackThis log I had you post was from. Just complete all the steps.
     
  15. kip1981

    kip1981 Private E-2

    Just to be clear: the list I posted was from normal mode. So, would like me to skip that step and complete the others? Or would you like me to do something else? Again, your help is greatly appreciated.
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you do not see mdms.exe in the process list just ignore that item and continue with all other steps. I assume the O4 line is still in the HJT log (if not ignore that too and continue).
     
  17. kip1981

    kip1981 Private E-2

    OK I followed all of those steps.

    mdms.exe *was* there after I rebooted in normal mode again, so I killed it. I think tool2.exe was there too, so I killed it.

    I used HJT to fix all of the elements/processes you listed.

    I could not delete all of these files:
    C:\WINDOWS\system32\appwiz.dll CPL
    C:\WINDOWS\SYSTEM32\tcpG4T.dll NO
    C:\WINDOWS\System32\hlmadcmk.dll NONE
    C:\WINDOWS\System32\Gqaogjaf.dll YES
    C:\windows\system32\mdms.exe YES
    C:\WINDOWS\tool2.exe YES

    I could not find the .dll of appwiz. There was a .cpl (or something similar) which I did delete. TcpG4T would not let me delete. It was not read only. I did not know which, if any, process to kill so I could delete it. Mdms would not let me delete it at first, but I killed it in HJT. Whenever I killed it, it would always seem to come back. But by killing it and then deleting it soon afterwards, I got it to delete. I also deleted Tool2.exe.

    hsfix seemed to work, and my browser was not pointed to black when I got back to safe mode. I did a HJT log in normal. Both logs are attached.

    Spy Sheriff and allergies/flu on the same day. :(
     

    Attached Files:

  18. kip1981

    kip1981 Private E-2

    Also, it would help me if I could know about how long I should wait before expecting a reply, and what time tonight you guys stop replying, and what time you start (if any). This would just help me avoid checking every five minutes or so.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You never know! We are here when we can be here. We do this for free in our spare time. So that's when we are here.
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Never delete anything but what we ask you to delete. Always ask first if you see something that is suspect. appwiz.cpl is needed. It is part of your OS for Control Panel. You are going to need to get this back into the folder from either your XP CD or from an i386 folder that may exist on your PC.

    Do you see the below files:
    C:\WINDOWS\system32\drct16.dll
    C:\WINDOWS\system32\mszx23.exe

    The C:\WINDOWS\SYSTEM32\tcpG4T.dll file is part of the Haxdoor Trojan to some files are still on your PC and are loaded and keep this from being deleted. Try running HSfix again in safe mode and then immediately afterwards try deleting C:\WINDOWS\SYSTEM32\tcpG4T.dll

    If you cannot delete the file try renaming it to tcpG4T.ddd

    Then reboot and post a new log. You have other SpySheriff files that are starting to show now (c:\winstall.exe). You need to run the SpySheriff sticky I gave you in message number 4. You can start the procedure at step number 4.

    Also note that the below is back so you did not get it:
    C:\windows\system32\mdms.exe
    O4 - HKLM\..\Run: [SysMemory manager] c:\windows\system32\mdms.exe

    Take a look for the below files too and let me know if you find them.
    C:\windows\system32\mcsmss.exe
    C:\windows\system32\winacpi.dll
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You should also run this registry patch.

    Copy the contents of the below Quote Box to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file fixtroj.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.) Then double-click on the fixtroj.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to Add in to the registry, say yes.
     
  22. kip1981

    kip1981 Private E-2

    Sorry, I won't delete anything anymore unless it's exactly what you say. I don't have an XP disc lying around, is there anywhere I could download appwiz.cpl?

    I've already done all of the steps for removing Spy Sheriff, as you mentioned in post 4.

    I cannot delete the tcp file. I tried hsfix, but hsfix closes all open windows, so that after it runs, I have to find the tcp file again. Changing the file extension doesn't let me delete it.

    I can't believe it, but I actually have a horrible sinus infection the same day this happened. It all seems like too much. If I take this to a shop, like Comp USA, can they help me out? What are my other options?

     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As I said, look for an i386 folder on your hard disk (like c:\i386 or c:\windows\i386 It could be someplace else under c:\windows)

    Unless you did them just now, ou need to do them again.

    I did not say to delete it. I said rename it if the original DLL filename could not be deleted.

    Just follow directions exactly and you will not need to go to CompUSA (which in most cases cannot properly fix many problems like this and they will charge $100 or more).

    Did you look for the other files I asked about? Did you add the patch to the registry?
     
  24. kip1981

    kip1981 Private E-2

    Sorry, I could not find either of those files (in safe mode).

    I'll follow the Spy Sheriff steps again.

    Again, I have a sinus infection, my left eye won't stop crying, and my head feels like it's in a vice, so I may be a little out of it/slow, but I'm trying as best I can. Also, I don't mind dropping 100$ to get my computer fixed once every four years or so. I'm certainly going to download Windows Updates and switch to Firefox from now on.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Work at whatever pace you can work at but avoid un-necessary reboots. Is it still necessary for you to be working in safe mode? I would prefer that you only do exactly what I request and nothing else.

    Do you complete the steps in message # 21?
     
  26. kip1981

    kip1981 Private E-2

    I did the post 21 steps (reg patch).

    I am going to go back to normal mode now, since you seem to prefer that (I thought working in safe mode might prevent/resist re-infection). I haven't redone the Spy Sheriff steps yet. I can't tell you how much I hate that malware.
     
  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! After doing the SpySheriff sticky in normal boot mode (except where indicate otherwise) post the HijackThis log as requested in step 9 (from normal boot mode and stay in normal boot mode).
     
  28. kip1981

    kip1981 Private E-2

    Here is the HJT log.

    There seems to be program, I don't see the sights/sounds of Spy Sheriff anymore. But the address bar is still annoyingly shortened/different. And the most drastic thing I can notice is that the bookmarks have disappeared (I can see them in safe mode).

    UPDATE: I can't get into the select-file dialogue box to attach the HJT log. I press the attach button, but nothing happens. So I am pasting (I get this is the lesser evil between this and rebooting in safe mode).

    Inline log attached!
     

    Attached Files:

    Last edited by a moderator: Aug 10, 2005
  29. kip1981

    kip1981 Private E-2

    I'm going to watch Heathers and go to sleep.

    I'll be back tomorrow. Thx for all of the help and patience.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay the SpySheriff file seems to be gone but you still have problems (one came back).

    Please download Pocket KillBox and extract it to its own folder somewhere.
    Do not run it yet, we will use it later.

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\windows\system32\mdms.exe

    After killing all the above processes, click "Back".
    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {78364D99-A640-4ddf-B91A-67EFF8373045} - C:\WINDOWS\system32\appwiz.dll
    O4 - HKLM\..\Run: [SysMemory manager] c:\windows\system32\mdms.exe
    O20 - Winlogon Notify: tcpG4T - C:\WINDOWS\SYSTEM32\tcpG4T.dll

    After clicking Fix, exit HJT.

    Please run Pocket Killbox. Select the option to Replace on Reboot.
    Now, Copy and Paste C:\WINDOWS\system32\appwiz.dll into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO!

    Now, Copy and Paste C:\WINDOWS\SYSTEM32\tcpG4T.dll into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click NO!

    Now, Copy and Paste c:\windows\system32\mdms.exe into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click Yes!
    Okay so now your PC should be reboot. If you get an error message about Pending Operations, just reboot your PC yourself.


    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  31. kip1981

    kip1981 Private E-2

    OK, sorry for not replying. My ISP cut my service because they noticed virus activity.

    While it was down: I bought a 120$ external hard drive and copied my essential files. It turns out that my IBM thinpad has a neat auto-reformat feature (the factory software is kept on a partition of the hard drive), so that I can reformat my hard drive and reload all of the original software just by running the IBM software before Windows loads and clicking my mouse. So I saved my old files, reformatted, and now Spy Sheriff is gone. Everything seems to be working ok so far. I'm having my dad priority mail me Microsoft Office.

    I also turned on auto-update for Microsoft Updates, downloaded 30+ security related updates, and switched browsers to Firefox.

    I am curious, though: How does one get Spy Sheriff? The ISP thought it was email. But I did not open any suspicious advertisements. I had thought that Spy Sheriff, like so much else, exploited IE vulnerabilities. Am I wrong? Perhaps it exploited a vulnerability in AIM (which I always use?). I would like to know. Anyway, thx for the help.
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I have know idea where everyone is getting SpySheriff problems from but normally it seems to come with other baggage. Which comes first is the question.

    Since you formatted , you should check out the below:

    How to Protect yourself from malware!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds