Various Problems, Please Read

Discussion in 'Malware Help (A Specialist Will Reply)' started by Rayor, Nov 21, 2006.

  1. Rayor

    Rayor Private E-2

    AVG will sporaticlly report that my computer is infected with a trojan. I put it in the vault, but it keeps showing up.
    My internet connection is also slowed down, but I presume that's because of the trojan.
    Internet explorer is also hijacked to someplace that "scans" my hard drive for viruses and recommends that I download their software.

    I've followed the directions located here, except for the online scans because I can't stay connected that long.

    So I'm posting the logs.
     

    Attached Files:

  2. Rayor

    Rayor Private E-2

    And here's the almighty HijackThis! log.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Symantec Core LC
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteSymantec Core LC into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 6

    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of vtsqq.dll once and then click the kill button. After you have killed all of the vtsqq.dll under winlogon click ok. (If you do not find the dll, just continue on.)
    Next double click on explorer.exe and again click once on each instance of vtsqq.dll and kill it. (If you do not find the dll, just continue on.)
    Now just exit Process Explorer.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.
    C:\Program Files\Common Files\{2E7AFCAF-063C-1033-0814-060217200001}\Update.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O2 - BHO: (no name) - {8C9E5C84-6D3F-424A-B4F8-9D5F6014E67E} - C:\WINDOWS\system32\vtsqq.dll
    O4 - HKLM\..\Run: [CTDrive] rundll32.exe C:\WINDOWS\system32\drvliz.dll,startup
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O20 - Winlogon Notify: vtsqq - C:\WINDOWS\system32\vtsqq.dll
    O20 - Winlogon Notify: wineak32 - wineak32.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\Common Files\{2E7AFCAF-063C-1033-0814-060217200001}\Update.exe
    C:\WINDOWS\IFinst27.exe
    C:\WINDOWS\system32\drvliz.dll
    C:\WINDOWS\system32\lpfayfri.exe
    C:\WINDOWS\system32\nnnoonl.dll
    C:\WINDOWS\system32\vtsqq.dll"
    C:\WINDOWS\system32\qqstv.ini
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folders and delete if found:
    C:\Documents and Settings\Compaq_Owner\Application Data\Symantec
    C:\Documents and Settings\Compaq_Owner\Application Data\WinAntiVirus Pro 2006
    C:\Documents and Settings\All Users\Application Data\WinAntiVirus Pro 2006
    C:\Program Files\Common Files\WinAntiVirus Pro 2006
    C:\Program Files\Common Files\{2E7AFCAF-063C-1033-0814-060217200001}
    C:\Program Files\VSAdd-in

    What is in the below folder? Is it from WinAntiVirus Pro? If so, delete this folder too!
    C:\WA6P Nov 19 2006 "WA6P"

    What is in the below folder?
    C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  4. Rayor

    Rayor Private E-2

    I don't have a directory like that

    This directory contains MSOSVINT.DLL and NSEXTINT.DLL
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Perhaps you misunderstood the text. The folder name is C:\WA6P The other info was just the date it was created and a repeat of he folder name in quotes. This was how it appeared in your newfiles.txt log. If it is in that log, it exists.
     
  6. Rayor

    Rayor Private E-2

    I didn't, there is no directory with that name.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! Just complete the rest of the instructions!
     
  8. Rayor

    Rayor Private E-2

    I did and everything seems to be working fine.
    Thanks.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You did not attach the follow up logs I requested so I can verify eveything worked. Please attach them.
     
  10. Rayor

    Rayor Private E-2

    Oops!
    Sorry about that.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You got yourself infected with new malware already on 11/23/2006. Next time follow up on all directions so we can get to final steps faster which could possibly help avoid issues like this.

    Make sure viewing of hidden files is enabled (per the tutorial).
    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {013A653B-49A6-4f76-8B68-E4875EA6BA54} - C:\WINDOWS\system32\jkqglsre.dll

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete
    :
    C:\WINDOWS\system32\jkqglsre.dll

    Now run Ccleaner.

    Now reboot in normal mode
    Sun Java has updated just recently to 5.0 update 10 so your 5.0 update 9 package (just installed) is now out of date. Use the same link I gave before to get the new version. Then uninstall the old version.

    Now attach the below new logs and tell me how the above steps went.
    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds