Tough malware to crack!

Discussion in 'Malware Help (A Specialist Will Reply)' started by no_joke, Jun 28, 2006.

  1. no_joke

    no_joke Private E-2

    I really would appreciate if someone could help. Ive been trying for about a week now to solve this myself...but with no luck. My browser is definitely hijacked by something...I continuously get fake "internet explorer messages" asking me to install various anti-spyware programs such as ErrorSafe, WinAntiVirusPro2006, etc. Luckily I've at least been smart enough to avoid having those progs installed on my system by closing the messages properly. Additionally, this whatever malware I have is feeding me random advertisements...for instance concierge.com seems to come up among other things. Its not as obvious as other malware I've seen, the targetted ads and windows messages only come up a few times a day...but my browsing is definitely slower than normal and crashes frequently.

    I have gone through the preliminary steps and here are my results:

    - Symantec - nothing found
    - AdAware SE - found some tracking cookies which were cleaned
    - Spybot - nothing found
    - Microsoft Windows Malicious Software Removal Tool - nothing found
    - CWShredder - nothing found
    - Kill2Me - no effect
    - BitDefender - came up with some results (see attachment)
    - Activescan - had problems running this program

    Thanks in advance!
     
    Last edited by a moderator: Feb 27, 2011
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Actually this is a pretty easy one to fix! ;)

    But first please follow the directions in step 7 of the READ ME and install HijackThis as is requested. You are running it from here:

    C:\Documents and Settings\name removed\Desktop\HijackThis\HijackThis.exe

    That is exactly where we specify not to install it.

    After fixing the above, continue to below.

    Is the below ProxyServer something you configured?
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=63.241.242.72:80


    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of lprdep.dll once and then click the kill button. After you have killed all of the lprdep.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of lprdep.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {a5fae281-346b-4f93-9442-3ccb070a8873} - C:\WINDOWS\system32\lprdep.dll
    O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://thomsonelite.webex.com/client/v_mywebex/webex/ieatgpc.cab
    O20 - Winlogon Notify: lprdep - C:\WINDOWS\SYSTEM32\lprdep.dll


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox:
    Choose Tools > Delete Temp Files and click OK.

    Run Killbox.exe. Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.
    C:\WINDOWS\SYSTEM32\lprdep.dll

    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.


    Now attach a new HJT log and tell me how the steps went.
    Make sure you tell me how things are working now!
     
    Last edited by a moderator: Feb 27, 2011
  3. no_joke

    no_joke Private E-2

    I haven't had any random messages or ads pop-up....so I think I finally got the little sucker cleaned from my computer (as far as I know)! Thank you so much!!

    Just a couple of things in response to your post:

    1. <quote> Is the below ProxyServer something you configured? " R1 - KCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = http=63.241.242.72:80 </quote>

    No, I don't recall setting up this proxy...I used hijack this to "fix" that as well...was there another step I should have (or still should) take to make sure its completely gone? I specifically looked in my Internet Explorer >> Options >> Connections >> LAN Settings to verify that I was set to "automatically detect settings" before I deleted it. Do you think it was malicious?

    2. Your instructions to remove the following:

    O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://thomsonelite.webex.com/clien...ex/ieatgpc.cab

    thomsonelite is a website/service I use frequently that I trust (where you can look up stock reports)...so I didn't remove it for that reason. Is there a reason you told me to remove it, or just because it was an unfamiliar name?

    Here is my latest log...I hope the rest of it looks alright. Again, thank you so much...it was really nice of you to take the time to help me out. Very cool.

    :)
     

    Attached Files:

  4. no_joke

    no_joke Private E-2

    The above log is a few hours old....here is the new one AFTER I deleted the above-mentioned "proxy-server"...the only difference is that that entry is no longer there.
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The IP address belongs to the below. Do you recognize it?
    No it is fine. It was a case of mistaken identity the first time I looked at it. It seem to match a similarly named malware line like this.


    Your log is clean. If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link (you need better and more protection):

    How to Protect yourself from malware!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds