Spyware and popup problems, have followed READ ME FIRST

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Publius, Oct 5, 2004.

  1. Publius

    Publius Sergeant

    I am having trouble with popups, very slow boot up and random links on webpages. I had begin2search toolbar and highlighted links on every page. After following all of the steps on the READ ME FIRST post I am still getting popups and links on pages (i.e. the work "computer" is doulbe underlined and mousover brings up a "This is a Sponsored Link" rectangle. Many words do this). The steps in Read me first got rid of begin2search and the highlighted words though. Below is a list of things that were removed or fixed in each of the steps in the Read me first doc. I didn't include the AdAware log, because it removed 291 items. Any help with this would be greatly appreciated. I have the newest version of Hijack This and can attach the log if that will be of help.

    Thank You in advance.

    Here is the log from the READ ME FIRST steps:

    Trend Micro Online Scan:
    Troj Istbar.X non-cleanable
    Troj Lalus.A non-cleanable
    Troj Agent.EG non-cleanable (4 copies)
    BKDR IROFFER.A non cleanable
    *****All 7 deleted*****

    Symantec Security Scan:
    Security Status:Safe

    McAfee Avert Stinger Log:

    McAfee AVERT Stinger Version 2.4.0.3 built on Sep 28 2004
    Copyright (C) 2004 Networks Associates Technology, Inc. All Rights Reserved.
    Virus data file v1000 created on Sep 28 2004. Ready to scan for 43 viruses, trojans and variants.
    Scan initiated on Tue Oct 05 10:31:56 2004

    C:\WINDOWS\SYSTEM32\wins\SVCHOST.EXE
    Found the W32/Nachi!tftpd virus !!!
    C:\WINDOWS\SYSTEM32\wins\SVCHOST.EXE has been deleted.
    Number of clean files: 200847 Number of infected files: 1
    Number of files deleted: 1

    Spybot Scan Results:

    DSO Exploit: Data source object exploit (Registry change, fixed)

    HKEY_USERS\S-1-5-21-606747145-1957994488-748035971-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1004!=W=3

    DSO Exploit: Data source object exploit (Registry change, fixed)
    HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\1004!=W=3

    GoldenPalace.Casino: Autorun settings (oleaccrc) (Registry value, fixed)
    HKEY_USERS\S-1-5-21-606747145-1957994488-748035971-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oleaccrc
     
  2. Kodo

    Kodo SNATCHSQUATCH

    please attach your log.
     
  3. Publius

    Publius Sergeant

    I think I got most of it by following the guides in the HJT tutorial, but there were several that I was unsure of.

    Thanks for the quick response.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    While I analyze your log, you need to get it off your Desktop and into its own folder as indicated in the tutorial. Examples could be:
    c:\Program File\HJT
    c:\HJT
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you know what these two processes are:
    C:\WINDOWS\SYSTEM32\DNTUS26.EXE
    C:\WINDOWS\SYSTEM32\DWRCS.EXE

    I think that DWRCS is from: DameWare Mini Remote Control Client Agent Service

    Make sure viewing of hidden files is enabled.

    Please bring up Task Manager by hitting CTRL-ALT-DEL and click the Processes tab. Find the below processes and End them:
    d3dim700.exe
    RemindMe.exE


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: CB UrlCatcher Class - {CE188402-6EE7-4022-8868-AB25173A3E14} - C:\WINDOWS\System32\mscb.dll (file missing)
    O2 - BHO: (no name) - {FE103B50-A713-A70B-A32B-6216A55DE887} - C:\WINDOWS\Kfqxnekj.dll
    O3 - Toolbar: Search - {F7AAA336-2262-CC4E-ECBD-9AE94AFBDE13} - C:\WINDOWS\Kfqxnekj.dll
    O4 - HKLM\..\Run: [Configuration Loader] newexplore.exe
    O4 - HKLM\..\Run: [intdctrr] C:\WINDOWS\System32\idctup20.exe
    O4 - HKLM\..\Run: [sais] c:\program files\180solutions\sais.exe
    O4 - HKCU\..\Run: [d3dim700] C:\WINDOWS\System32\d3dim700.exe
    O4 - Startup: Shortcut to RemindMe.lnk = C:\Program Files\RemindMe\RemindMe.exE
    O9 - Extra button: Your PC is infected with Spyware - click here to fix your PC - {FB74C951-ACA1-4e33-A94C-A9261EB2CCB7} - https://www.spydeleter.com/order2.php?KBID=1062 (file missing)
    O9 - Extra 'Tools' menuitem: Your PC is infected with Spyware - click here to fix your PC - {FB74C951-ACA1-4e33-A94C-A9261EB2CCB7} - https://www.spydeleter.com/order2.php?KBID=1062 (file missing)

    Reboot in safe mode and use Windows Explorer to delete:
    C:\WINDOWS\Kfqxnekj.dll
    C:\WINDOWS\System32\d3dim700.exe
    C:\Program Files\RemindMe <---- the whole directory
    c:\program files\180solutions <---- the whole directory
    C:\WINDOWS\System32\idctup20.exe

    Boot normal mode and post a new log and tell us how things are working.
     
  6. Publius

    Publius Sergeant

    Things seem to be better now. I haven't had a popup yet. However, the extra button and extra tools item came back after reboot.

    No, I don't recognize those two processes you asked about.

    There was no file in explorer C:\WINDOWS\Kfqxnekj.dll, there was a C:\WINDOWS\Kfqxnekj.INI. Should this be deleted?

    Also there was no c:\program files\180solutions at all.

    I have attached a new HJT log.

    thanks so much for you help.
     

    Attached Files:

  7. Kodo

    Kodo SNATCHSQUATCH

    I would get rid of these

    O9 - Extra button: Your PC is infected with Spyware - click here to fix your PC - {FB74C951-ACA1-4e33-A94C-A9261EB2CCB7} - https://www.spydeleter.com/order2.php?KBID=1062 (file missing)
    O9 - Extra 'Tools' menuitem: Your PC is infected with Spyware - click here to fix your PC - {FB74C951-ACA1-4e33-A94C-A9261EB2CCB7} - https://www.spydeleter.com/order2.php?KBID=1062 (file missing)


    for chas:

    i'm leary of this too

    O4 - HKLM\..\Run: [SystemTray] SysTray.ExE

    Dunno why it would be listed there. Of all the logs I've seen, I've never seen it listed. Makes me pop a red flag.
    y
     
  8. Publius

    Publius Sergeant

    I have gotten rid of both of these twice and they come back with each restart. Is there a manual method to remove these from IE?

    Thanks
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    For the SpyDeleter problem, do the below:

    Click Start, Run, and enter into the box the following without the quotes "Notepad"
    Now copy and paste the contents the next 3 lines (including the blank line) into the notepad window.
    REGEDIT4

    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{FB74C951-ACA1-4e33-A94C-A9261EB2CCB7}]


    Now save it as file name: "delspy.reg" (without the quotes).
    Use Save as file type: All files (*.*)
    Save it on your Desktop where it is easy to locate.

    Now on your Desktop double-click on delspy.reg.

    At the prompt "Do you wish to merge the information into the registry?"
    Answer 'Yes' and wait for a message to appear similar to "Merged Successfully".
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I have seen it listed before but the letters were not capitalized like that. But yes I wonder if this is a problem or not. Could it be related to http://securityresponse.symantec.com/avcenter/venc/data/w32.ghotex.a.html ?
     
  11. Publius

    Publius Sergeant

    That seems to have my problems wrapped up.

    Thanks to Chas and Kodo for your help today.

    :)
     
  12. Kodo

    Kodo SNATCHSQUATCH

    well, lets see what happens after he merges the reg.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Post another HJT log first. Let's be sure.
     
  14. Publius

    Publius Sergeant

    Here is new log.
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Earlier I asked:

    "Do you know what these two processes are:
    C:\WINDOWS\SYSTEM32\DNTUS26.EXE
    C:\WINDOWS\SYSTEM32\DWRCS.EXE

    I think that DWRCS is from: DameWare Mini Remote Control Client Agent Service"

    Do you know anything about these?

    Also the line Kodo was wondering about is still there:
    O4 - HKLM\..\Run: [SystemTray] SysTray.ExE

    First click Start, Search and enter systray.exe and tell us where you find it. I would expect to only find it in c:\windows\system32 and c:\windows\system32\dllcache. If you find it anywhere else, right click on it and select Properties, select the version tab and get some information about the file.

    Get Properties info on those two other file above also.
     
  16. Publius

    Publius Sergeant

    systray.exe was only found in c:\windows\system32
    Version:5.0.2139.1
    size: 3.76 KB (3,856 bytes)
    size on disk: 8.00 KB (8,192 bytes)

    I don't recognize these files.

    C:\WINDOWS\SYSTEM32\DNTUS26.EXE
    Description: DameWare Development Remote Command Server
    version: 3.69.0.7
    size: 72.0 KB (73,728 bytes)
    size on disk: 72.0 KB (73,728 bytes)

    C:\WINDOWS\SYSTEM32\DWRCS.EXE
    Description: DWRCS
    version: 3.69.0.7
    size: 228 KB (233,472 bytes)
    size on disk: 232 KB (237,568 bytes)
    Company Name: DameWare Development

    Both of these files were created in Jan, 2003, which was before I was using this computer, so it isn't somthing I put on here. I hope this is enough info.
    Thanks.
     
  17. Publius

    Publius Sergeant

    Chaslang or Kodo,

    Am I in the clear now? If so, thanks for all the help.

    Publius
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes you are clean. You're welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds