Still having problems after I did all of READ THis FIRST

Discussion in 'Malware Help (A Specialist Will Reply)' started by wesburnsco86, Jan 12, 2005.

  1. wesburnsco86

    wesburnsco86 Private E-2

    This E2GIVE plug in re-installs itself,after I go to the control panel and uninstall it.It keeps coming back to haunt me.I have installed everything you told me to.Including turn offsystem restore,run in safe mode,etc,etc.Windows XP SP1 here.
     
  2. PhilliePhan

    PhilliePhan Guest

    Did you look for it in Program Files folder?

    http://www.doxdesk.com/parasite/E2Give.html

    If all else fails, send us a HijackThis Log. Please be sure to follow the instructions below:

    Note that your HijackThis should be up-to-date (v1.99) and MUST be extracted to its own safe folder – C:\Program Files\HijackThis!
    Should you need a Fresh Download of HJT, get it HERE: HijackThis v1.99

    Also note that, before you scan, you MUST close all running programs including your web browser, e-mail and items in the system tray.

    Please save your HJT Log as a .txt File and attach it via the "Manage Attachments" tool in the Additional Options section when you post.

    I’m not around this forum too often these days, but somebody will try to take a look when they get a chance.

    PP :)
     
  3. wesburnsco86

    wesburnsco86 Private E-2

    I did remove it from the program files.But like I said.It does come back.Hopefully I can get help with the attached log file.Looks like there maybe other things to remove also.Thanx for any help given......wes
     

    Attached Files:

  4. PhilliePhan

    PhilliePhan Guest

    Hi Wes,

    Before we start, I need you to extract HijackThis from the ZIP File. You are running it improperly --> C:\unzipped\hijackthis\HijackThis.exe
    Please do this:

    To create a new folder:
    Click START > My Computer > Local Disc C: > Program Files
    Now, RightClick on an Empty Area and select New > Folder & name it HijackThis and ENTER

    To Extract HijackThis:
    Now, RightClick your HijackThis ZIP File and select Extract All > Next > and browse to your newly created HijackThis Folder (C:\Program Files\HijackThis)and click Next.

    ONCE HJT is Safely Situated:

    Please print out these instructions so that you can operate with All Browser Windows CLOSED.

    Please make sure System Restore is OFF and the Viewing of Hidden Files is Enabled as per the tutorial.

    Now scan with HijackThis and Check the Boxes for the following:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

    R3 - URLSearchHook: (no name) - _{CA0E28FA-1AFD-4C21-A8DC-70EB5BE2F076} - (no file)

    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\System32\netdc.exe --> This one may prove to be a real pain to remove, or it could go easy – We’ll hope for easy! ;)

    O2 - BHO: Cls - {CF021F40-3E14-23A5-CBA2-717765721316} - C:\WINDOWS\System32\wer1316.dll
    O2 - BHO: (no name) - {ED103D9F-3070-4580-AB1E-E5C179C1AE41} - (no file)

    O4 - HKLM\..\Run: [Setup experation] C:\WINDOWS\svchost.exe

    O16 - DPF: {33E54F7F-561C-49E6-929B-D7E76D3AFEB1} (Pool Control) - http://mirror.worldwinner.com/games/v45/pool/pool.cab
    O16 - DPF: {88D758A3-D33B-45FD-91E3-67749B4057FA} (Sinstaller Class) - http://dm.screensavers.com/dm/installers/si/1/sinstaller.cab
    O16 - DPF: {BAB3E70B-A847-4A88-ACFC-778FCCC00287} (CActSetupObj Object) - http://www.odysseusmarketing.com/actsetup.cab
    O16 - DPF: {CA797B15-445F-4AA9-9828-8A88502F560F} (Uninstall Control) - http://www.worldwinner.com/games/shared/uninstall.cab

    O21 - SSODL: MSSQLMonitor - {F0E6C0E0-ADC8-45A0-898A-64FA91DB240B} - C:\WINDOWS\System32\senst142.dll

    Again, make sure All Browser Windows are Closed when you Click FIX.

    NOW:
    Please boot into Safe Mode with the Viewing of Hidden Files Enabled and navigate to and DELETE the following if they should remain:

    C:\WINDOWS\System32\wer1316.dll
    C:\WINDOWS\System32\senst142.dll
    C:\WINDOWS\System32\netdc.exe
    C:\WINDOWS\svchost.exe --> This should be removed from ONLY the WINDOWS directory.

    NEXT:
    Run CCleaner and Spybot S&D and have Spybot fix what it finds.

    Then, as an added precaution, Go to Start > Run and type: cleanmgr and then click OK. Make sure the boxes for these are checked:
    Temporary Files
    Temporary Internet Files
    Recycle Bin


    And Click OK.

    Reboot to Normal Windows and Scan with HijackThis and attach that log.
    Let me know of any problems you may have encountered with the above instructions and how your computer is running now. I will try to check back when time permits.

    Best luck :)
    PP
     
  5. wesburnsco86

    wesburnsco86 Private E-2

    Thanks for your help.I did everything you told me to,with no apparent problems.I already had a folder in program files and it was called HJT,but i changed it as you requested.It did send and create alot of backup files to the new folder.So I think i did it right.Unfortunately I think I see some things that are still there.(the RO-HKLM Search Assistant among others).New log is attached for you to see changes.
    I also have another matter,that I will post in a seperate thread if you like. I run the symantec online virus scan 2 days ago .It detected a few viruses.I attempted to delete two of the exe files. but today I noticed they returned.
    Here are 2 of the results..... c:\WINDOWS\d.exe is infected with Download.Trojan
    Now I have deleted this exe file,along with another C:\WINDOWS\st.exe which was infected with Trojan Horse......As of this moment they are not there.Im wondering if they will soon return.Im thinking that maybe deleting the exe file that is infected is not necessarily remove everyting that I should,to keep it from returning.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Make sure that you have system restore disable and keep it disable until all problems are fix.

    Download Pocket KillBox but do not run. Now print or save these instructions locally because you must exist ALL browsers now and stay disconnected until I have you reboot.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\System32\netdc.exe

    After clicking Fix, exit HJT.

    Run Pocket Killbox. Select the following options to Delete on Reboot and End Explorer Shell While Killing File.

    Now, Copy and Paste C:\Documents and Settings/repclient1/Start Menu/Programs/Startup/netdb.exe into the box.Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now Click No


    Now, Copy and Paste C:\windows\system32\netda.exe into the box.Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click No

    Now, Copy and Paste C:\windows\prntsvr.dll into the box.Check the Unregister .dll Before Deleting option. (Note: you may not find this file or have a problem with this dll option not being active, just ignore and continue.) Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click No

    Now, Copy and Paste C:\windows\system32\netdc.exe into the box.Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click Yes and allow your machine to reboot Normally. Tell me if you get any error messages on reboot and tell me the exact messages.

    Now run Internet Explorer and select Tools, Internet Options, and then the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now exit Internet Explorer and get a new HJT log. And then reconnect back here and post your new HJT log.
     
  7. wesburnsco86

    wesburnsco86 Private E-2

    OK heres what it said after I did what you told me to do.
    Pending File Rename Operations Registry Data has been Removed by External Process.And it did not reboot after I clicked on yes to reboot.
    Also there are 3 users on this pc and overnight the homepage,search bar,and search page has been affected by this "Home Search Assistant."
    Its manipulating all of the default settings of internet explorer.----------------H E L P


    Log file of HJT attached
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you have this PC connected to the Internet overnight?

    We have to ignore the HSA problem until we fix the other problems.
    Follow my previous steps again, but this time when you click Yes to reboot, if you get the "Pending File Rename Operations Registry Data....." message again. Just ignore it and then reboot the PC yourself and when it comes back up continue my instructions except getting the HJT log will get a new one after the below steps.

    After reboot see if you can find the below file or not: C:\WINDOWS\System32\netdc.exe

    Then run HJT and put checks on the following lines but do not click Fix until you exit all browsers (including the one you are reading in right now):
    O4 - HKLM\..\Run: [5.tmp] C:\DOCUME~1\Libby\LOCALS~1\Temp\5.tmp.exe 5 10001
    O15 - Trusted IP range: 206.161.125.149 (HKLM)

    After clicking fix, reboot in safe mode and use Windows Explorer to delete:
    C:\Documents and Settings\Libby\Local Settings\Temp <--- delete all files and subfolders in thise folder (some may not be deleteable - tell me which ones)

    Now reboot normal mode, and post a new HJT log and answer all questions.
     
    Last edited: Jan 15, 2005
  9. wesburnsco86

    wesburnsco86 Private E-2

    Well theres good and bad news here.
    Bad news is that the file
    F2-REG:system.ini shell=explorer.exe c:\windows\system 32\netdc.exe WAS NOT sucessfully removed by HJT or the KILLBOX.
    The good news is that Home Search Assistant bug was removed by the CWShredder.And then the Shopping Wizard was removed by HS Remove,which it then restored my homepage settings for me.I have got a little progress here.Because those 2 bugs also affected AIM.

    Log file is attached,that one is gonna be a bugger to get rid of.Thanx for all your help so far........wes
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run Windows Explorer. Can you see this file: C:\WINDOWS\System32\netdc.exe


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hsremove.com/done.htm
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    R3 - Default URLSearchHook is missing
    O16 - DPF: {B4F32846-56DD-4CF5-94FD-17DE1A12E9EB} (CounterX Class) - http://t058.com/cabtest/counter.cab
    O21 - SSODL: MSTskMgr32 - {61DF24BA-7CA9-4A0A-B4EC-82E263AC959F} - C:\WINDOWS\System32\kbduuery.dll

    After clicking Fix, exit HJT.
    Run Internet Explorer and click Tool, Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log.
     
  11. wesburnsco86

    wesburnsco86 Private E-2

    No I cannot see this file: C:\WINDOWS\System32\netdc.exe.
    Its not there.Can it be giving a command,with no file?
    Anyways things are looking back to normal.EXCEPT for one thing.With a little research and an online virius scan by Symatec,I found something that maybe the root of our last troubles......
    c:\WINDOWS\st.exe is infected with Trojan Horse or Backdoor.Nibu.E
    I do rember trying to delete this file in safe mode.HA HA ...NOT.Another file C:\WINDOWS\dltime.dll was detected as a Keylogger trojan. I downloaded a program from this site for that specific virus :Anti-keylogger,but it did not support a multi-user type set up that we have on this pc(currently 3 users) Help me with these 2 viriuses and I maybe clean.thanx 4 your help again.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Boot into safe mode and do the below:

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).


    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\WINDOWS\svchost.exe <--- note: this is not c:\windows\system32\svchost.exe


    After killing all the above processes, click "Back".

    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    F2 - REG:system.ini: Shell=explorer.exe C:\WINDOWS\System32\netdc.exe
    O4 - HKLM\..\Run: [Setup experation] C:\WINDOWS\svchost.exe


    After clicking Fix, exit HJT.

    Use Windows Explorer to delete:
    C:\WINDOWS\svchost.exe
    C:\WINDOWS\dltime.dll
    :\WINDOWS\st.exe

    Open a command prompt Window by clicking Start, Run and enter cmd and click OK.
    In the command prompt window enter the following commands each follow by the enter key (tell me the results):
    cd c:\windows\system32
    attrib -a -r -s -h netd*.exe
    dir netd*.exe
    del netdc.exe

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  13. wesburnsco86

    wesburnsco86 Private E-2

    Looks like c:\WINDOWS\svchost.exe,and dltime.dll are sucessfully deleted.
    In the command prompt, attrib -a -r -s -h netd*.exe it said file not found.When I typed del netdc.exe it said File name,dir name,or volume label is incorrect.I hope I typed this correctly. :rolleyes:

    OK now Im puzzled LOL
     

    Attached Files:

  14. Destructo

    Destructo Corporal

    Did you make sure to type in the first line "cd c:\windows\system32"then hit enter? Then type each of those cammands? Just a double check. Good luck and hope it works out for ou.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please do the following:

    - download Registrar Lite

    - Run it, click on the magnifier glass to do a search and then enter the following string to look for netdc (yes without the .exe) and hit Enter

    Copy back here all the matches you get.
     
  16. wesburnsco86

    wesburnsco86 Private E-2

    there was 2 results of the search.These are long but I will try to put them all down.
    first one is:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
    The value wasShell
    The data wasexplorer.exe C:\WINDOWS\System32\netdc
    The second one is:
    HKEY USERS\S-1-5-21-276092-7193-759139758-765018439-1011\Software\Microsoft\Internet Explorer\Explorer Bars
    The value is 000
    The data is netdc.exe
     
  17. wesburnsco86

    wesburnsco86 Private E-2

    By the way,my firewall has alerted me that my computer was being scanned earlier.It says its a port scan,minor,and gives the hosts address.Im thinking that maybe this netdc is connected with that. Is Sygate a good choice for a firewall?
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes Sygate is good. Did it provide anymore info? Like port # and an application name.

    I need you to run RegistarLite again and when it comes up paste the below into the address bar and hit return:

    HKEY USERS\S-1-5-21-276092-7193-759139758-765018439-1011\Software\Microsoft\Internet Explorer\Explorer Bars
    That should bring you right to the reg key in question. Now right click on the Explorer Bars and then select Export. Save it to a file called exp-bar.reg where you can locate it. By default it will have a .reg extension after saving. You now need to go and chang the filename to exp-bar.txt .

    Now upload the exp-bar.txt file back here as an attachment.
     
  19. wesburnsco86

    wesburnsco86 Private E-2

    upload error
    exp-bar.txt.reg

    Apparently this site wont let me upload it that way.But I did successfully change the name.I dont see how I can let you view this file.I could email it to you,but this site dont allow us to do that right?

    STILL PUZZLED :rolleyes:
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Read what I said again. I said rename it to exp-bar.txt not exp-bar.txt.reg
     
  21. wesburnsco86

    wesburnsco86 Private E-2

    I did what you said,and renamed it.But the name didnt change the type of file that it is. I Changing it to a .reg ,by default it changed the file type.But when I right click and click rename,it didnt change the file type,only the name.
    Maybe I need help from another person,or visit another site because I CAN read
     
  22. wesburnsco86

    wesburnsco86 Private E-2

    When I right click on the file and open it with notepad it says netdc.exe
     
  23. wesburnsco86

    wesburnsco86 Private E-2

    My apologies for that earlier statement.
    I was getting impatient
     
  24. jarcher

    jarcher I can't handle a title

    exp-bar.txt
    rename the .reg to a .txt
    and attatch it

    make sure you do not rename it exp-bar.txt.reg
     
  25. wesburnsco86

    wesburnsco86 Private E-2

    Ive tried it five times.
    I renamed it to exp-bar.txt,and keep in mind the file type remains as registration entries
    When I upload it,thats what THE UPLOAD TOOL identifies it as:
    exp-bar.txt.reg
     
  26. wesburnsco86

    wesburnsco86 Private E-2

    Am I doing this right or is it the mechanics of the upload tool
     
  27. jarcher

    jarcher I can't handle a title

    in any windows window( open a folder or something)
    go to Tools>folder options>view
    and uncheck hide extensions for known file types
    and make sure your file doesn't say :

    exp-bar.txt.reg
     

    Attached Files:

  28. wesburnsco86

    wesburnsco86 Private E-2

    Here it is attached ,thank you.
    Now I dont know why chaslang was wanting to see this.
    Any clues as to what he was looking for?
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That is not what I was looking for! You need to export the registry key. It will have the full registry key path info in it and all the data and parameters under it. Did you not export this properly? I have attached an example of what this could look like. Obviously yours should have something include the netdc.exe stuff.


    If you had to do what jarcher stated in message # 27, then you never did step 3 of the Getting Prepared section in the READ ME. We assume that our directions have been followed while making various procedures up for you to try. If that was why you could not save the file with the proper extension type then you see why following directions is important. If that was not the problem you were having, what was the problem.
     

    Attached Files:

    Last edited: Jan 20, 2005
  30. wesburnsco86

    wesburnsco86 Private E-2

    Maybe I got it this time......LOL
    See attachment.
     

    Attached Files:

  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    OK! That's more like it.

    The first thing I want you to do is download this: Erunt
    Install it, and use it to create a registry backup. After doing that continue with the below:

    Copy the contents of the Quote Box below to Notepad. Then click File and then Save As. Change the Save as Type to All Files. Name the file fixshell.reg and then click save. (make sure you save it somewhere you can find it. Saving it to your Desktop may make that easy.)
    Double-click on the fixshell.reg file on your desktop (or locate it with Windows Explorer and double click on it if not saved to the Desktop) and when it prompts to merge say yes.

    After doing the above, exit browsers, and get a new HJT log. Then come back here and post that log.

    Then reboot your system, and when it comes back up, get another HJT log. Then come back here and post that log.

    Make sure you tell me which of the two logs is which.
     
  32. wesburnsco86

    wesburnsco86 Private E-2

    before reboot HJT log
     

    Attached Files:

  33. wesburnsco86

    wesburnsco86 Private E-2

    After reboot HJT log file
     

    Attached Files:

  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's good so far. At least concerning netdc.exe.

    But where did these come from all of a sudden.

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.makemesearch.com/?said=204
    O3 - Toolbar: Search Toolbar - {9EAC0102-5E61-2312-BC2D-4D54434D5443} - C:\WINDOWS\System32\MTC.dll

    Where have you been surfing? And do you have all the protections mentioned in How to Protect yourself from malware! in place.

    Those two lines need to be fixed (with browsers closed) and the C:\WINDOWS\System32\MTC.dll should be delete in safe mode.
     
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


    It came back! Okay! Here is what I want you to do. Repeat the step where you merged in the registry patches. Take a quick look at your HJT log yourself to verify it is not in the log (like last time).

    Now do not reboot via normal methods. Physically pull the power plug that goes into your PC (yes that's what I said). Now wait a minute and power up in safe mode.

    See if you can locate the netdc.exe file and delete it. (let me know the results).

    EDIT to add this step: click Start, Run and enter notepad c:\windows\system.ini and then click OK. Look for a line that has the netdc.exe stuff on it and delete it. Then save the file and exit notepad.

    Get a HJT log in safe mode (call it hjtsafe.log).

    Now reboot in normal mode and get a new HJT log (call it HJTnormal.log)

    Post your logs and tell me results from the steps.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds