vstr.dll and explorer.exe 100% cpu usage

Discussion in 'Malware Help (A Specialist Will Reply)' started by Pimped, Aug 16, 2006.

  1. Pimped

    Pimped Private E-2

    Hey Guys

    I really hope someone can help me out here please.

    The computer keeps on freeszing and after downloading process explorer xp, i found that a thread in explorer.exe called vstr.dll is running!

    I also have started to get that winantivirus pro popping up.

    Also i think its populating my trusted sites in my internet explorer automatically with some weird looking sites.

    **I JUST OPENED A NEW INTERNET XPLORER WINDOW AND THE BLOODY POP UP IS BACK EVEN THO I JUST EMPTIED OUT THE TRUSTED ZONES WHILST STILL IN THIS INTERNET SESSION AND NOW MY NORTON PERSONAL FIREWALL IS SAYING THAT "C:\WINDOWS\Downloaded Program Files\UDC6_0001_D18M1108NetInstaller.exe" even though i have looked for it before and it wasnt there.

    I HAVE READ THE READ ME FIRST AND DONE ALL THE SCANS

    Please find attached the logs of all scans. Sorry about zipping bdscan.txt, but it was too big for the forums attachment limit.

    Also, sorry for writing too much, when i restarted in safe mode, explorer.exe kept on dying straight away before i even got to see the desktop, i would open task manager and run explorer.exe but it just kept on dying. but wheni restarted in safe mode with networking, it was ok. so this virus is relying on the internet connection to stay alive i think.

    I thank you all in advance and appreciate any time spent in reading this and would really appreciate it if someone could help me.

    THANKSSSSSSS
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Please attach the other logs that were requested.

    - GetRunKey
    - ShowNew

    See step 6 of the READ ME.

    Note that you cannot see files in C:\WINDOWS\Downloaded Program Files\ by using Windows Explorer. You have to use either the command prompt or you must use another program to see them (another stupid idea of Microsoft's). ExplorerXP is much better at showing ALL files on your system. It does not allow them to be hidden from your view like Windows Explorer does.
     
  3. Pimped

    Pimped Private E-2

    Hey sorry about that, i forgot about that completely!

    Thanks for helpin us out m8
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of vtstr.dll once and then click the kill button. After you have killed all of the vtstr.dllunder winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    winexy32.dll

    Next double click on explorer.exe and again click once on each instance of vtstr.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    winexy32.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:


    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_GB&c=Q404&bd=pavilion&pf=desktop
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
    O2 - BHO: (no name) - {B5188738-04BA-4FBB-A920-A699D37F7422} - C:\WINDOWS\system32\vtstr.dll
    O4 - HKCU\..\Run: [Srro] "C:\PROGRA~1\COMMON~1\STEM~1\chkntfs.exe" -vt yax
    O15 - Trusted Zone: http://www.amaena.com
    O15 - Trusted Zone: http://uss2.city.ac.uk
    O15 - Trusted Zone: http://webct0.city.ac.uk
    O15 - Trusted Zone: http://webct1.city.ac.uk
    O15 - Trusted Zone: http://locator.cdn.imageservr.com
    O15 - Trusted Zone: http://locator1.cdn.imagesrvr.com
    O15 - Trusted Zone: http://scanner.sysprotect.com
    O15 - Trusted Zone: http://*.systemdoctor.com
    O15 - Trusted Zone: http://www.winantivirus.com
    O15 - Trusted Zone: http://www.winantiviruspro.com
    O15 - Trusted Zone: http://download.cdn.winsoftware.com
    O20 - Winlogon Notify: vtstr - C:\WINDOWS\system32\vtstr.dll
    O20 - Winlogon Notify: winexy32 - winexy32.dll (file missing)



    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now click Start, Run, and enter cmd and click OK! This will open a command prompt window. In the command prompt window enter the below commands each followed by the Enter key.
    del %windir%\temp\win*.*
    exit


    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    Now back on Killbox's main window, Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.

    C:\WINDOWS\system32\auscbcjd.exe
    C:\WINDOWS\system32\lslvsygd.exe
    C:\WINDOWS\system32\ofmajkoi.exe
    C:\WINDOWS\system32\rpptimvj.exe
    C:\WINDOWS\system32\vtstr.dll
    C:\WINDOWS\system32\rtstv.tmp
    C:\WINDOWS\system32\rtstv.ini
    C:\WINDOWS\system32\rtstv.ini2


    If Killbox does not reboot or if you get a Pending Operations type error message just click OK to continue and then just reboot your PC yourself.


    Also delete all files in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp\
    C:\Documents and Settings\HP_Owner\Local Settings\Temp\

    Now attach a new HJT log and tell me how the steps went.

    Also attach a new log from ShowNew and a new log from GetRunKey.

    I'm expecting that the HKEY_LOCAL_MACHINE\software\microsoft\mssmgr registry will come back and that we will need a special step to remove it.

    Make sure you tell me how things are working now!
     
  5. Pimped

    Pimped Private E-2

    Hey chaslang

    thanks for that post

    okay before i begin, i deleted something from my registry using one of those programs in the big readme thread which was something like notify about antivirus and notify firewall. so now when i turn the computer on, i get the windows security center alert saying norton antivirus is not switched on but goes away because antivirus and firewall are a little delayed in starting.

    anyways, the problems i had in doing what ou said are outlined below:

    O2 - BHO: (no name) - {B5188738-04BA-4FBB-A920-A699D37F7422} - C:\WINDOWS\system32\vtstr.dll

    This entry existed but with a different set of characters for that key part


    O15 - Trusted Zone: http://uss2.city.ac.uk - wasnt there
    O15 - Trusted Zone: http://webct0.city.ac.uk - wasnt there
    O15 - Trusted Zone: http://webct1.city.ac.uk - wasnt there
    O15 - Trusted Zone: http://locator1.cdn.imagesrvr.com - wasnt there

    Also there were more 015 called trusted ip range, but i didnt delete them

    the del %windir%\temp\win*.* didnt find any files so it didnt do anything, i double checked it by manuallying navigating to the folder using ms dos.

    Thanks once again matey, i really appreciate it

    Peace

    Asif
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't know what you mean. You have to be more specific. What different characters? What key part?

    Everything in the Trusted Zone should be removed.

    Not a problem! It is a backup step just in case the bad files exist and they do not always exist.

    Please complete the rest of the procedure. You were not supposed to go back online until all steps were finished.
     
  7. Pimped

    Pimped Private E-2

    that key part {b51....-....} was different

    im online on another comp so its ok.

    ill remove the rest of the trusted zone. apart frpm that, everything else is done, wot sgould i do now?

    thanx
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Finish doing what I requested in my procedure.
     
  9. Pimped

    Pimped Private E-2

    woohoo, thanks matey. that mssmgr thing isnt too much cause for concern is it?
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes it is! And you still need to finish what I requested in message # 4.
     
  11. Pimped

    Pimped Private E-2

    oh my god, im so sorry, i thought it uploaded the files. heres me sitting all confused! hehe

    here you go matey, still dont know how im gonna get it to stop showing the antivirus is turned off. is it just a simple transfer of the keys or something?
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's not worry about Norton being disabled yet. First you need to get all your malware removed.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now (if anything else is in the Trusted Zone, fix it too):
    O15 - Trusted IP range: http://202.67.220.225
    O15 - Trusted IP range: http://59.148.220.121
    O15 - Trusted IP range: http://62.4.84.53
    O15 - Trusted IP range: http://82.98.235.58
    O15 - Trusted IP range: http://85.12.25.90

    After clicking Fix, exit HJT.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    Now back on Killbox's main window, Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.

    C:\WINDOWS\system32\arfjphmj.exe
    C:\WINDOWS\system32\ayrofhfe.exe
    C:\WINDOWS\system32\buxiamxd.exe
    C:\WINDOWS\system32\cknssaww.exe
    C:\WINDOWS\system32\dyuvnicq.exe
    C:\WINDOWS\system32\ewcbxmrf.exe
    C:\WINDOWS\system32\fiulirtf.exe
    C:\WINDOWS\system32\fjrxfufh.exe
    C:\WINDOWS\system32\fqkojwap.exe
    C:\WINDOWS\system32\joeskqet.exe
    C:\WINDOWS\system32\kffnrlql.exe
    C:\WINDOWS\system32\oapaacbm.exe
    C:\WINDOWS\system32\oaxusqep.exe
    C:\WINDOWS\system32\odjnlufy.exe
    C:\WINDOWS\system32\stdjlctc.exe
    C:\WINDOWS\system32\teoxnkxx.exe
    C:\WINDOWS\system32\tmcltvaj.exe
    C:\WINDOWS\system32\trhltetp.exe
    C:\WINDOWS\system32\twfbuheh.exe
    C:\WINDOWS\system32\ubhhjpbx.exe
    C:\WINDOWS\system32\unvogtju.exe
    C:\WINDOWS\system32\vfkjwgjb.exe
    C:\WINDOWS\system32\xogymbrr.exe
    C:\WINDOWS\system32\xpcasspy.exe
    C:\WINDOWS\system32\ydoifkgh.exe
    C:\WINDOWS\system32\ywksfkdb.exe
    C:\WINDOWS\Downloaded Program Files\UDC6_0001_D18M1108NetInstaller.exe

    If Killbox does not reboot or if you get a Pending Operations type error message just click OK to continue and then just reboot your PC yourself.


    Now attach a new HJT log and tell me how the steps went.

    Also attach a new log from ShowNew and a new log from GetRunKey.

    Make sure you tell me how things are working now!
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Ooops! I missed one!

    Have HJT fix the below line too:

    O16 - DPF: {2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6} - http://drivecleaner.com/.freeware/installdrivecleanerstart.cab

    Why did you delete the O16 lines related to Bitdefender and Panda? Now if I requested you to run new scans you will have to redownload all there files again. You should only be deleting what we ask you to delete and only running what we ask you to run and nothing else.
     
  14. Pimped

    Pimped Private E-2

    did i delete them? i didnt do anything other than wot you said apart from that vstr.dll with that weird key sequence.

    sorry mate, ill do that now and post the files.
     
  15. Pimped

    Pimped Private E-2

    ok all done mate.

    by the way, i downloaded installed msn 8.0 before i did the last set of instructions in post #12 , i hope that didnt complicate things.

    How in the hell do you know which files are the infected files? however it is, im glad ur helpin me mate. its looking much better already, and its improved performance also.

    THANKSSSSSS :)
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes you did delete them. In your first message, your HJT log had these lines:
    and now they are gone. The only way they would go away is if you deleted them using HijackThis or my manual registry editing.

    Your log is clean. Is your antivirus program working okay now?

    If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     
  17. Pimped

    Pimped Private E-2

    hmm, thats strange, i didnt touch them at all.

    my antivirus notify key has been deleted by one of those pando or activescan programs, it highlighted them as a threat.

    ill have to try and find the keys on here i guess.

    ill do the system restore now.

    if thats everything, thanks a lot for all your help.

    do i have to keep those programs that i installed? ill read that link u sent me. thanksssssss
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't know what you are referring too. Panda did not delete anything. All it found was a few cookies. I don't know what you mean by antivirus notify key.


    Which programs in particular are you referring too? Things like Spybot, Windows Defender, Ccleaner? Yes you should keep them. No you do not need to keep GetRunKey & ShowNew. They are very small and constantly change anyway. Process Explorer, Pocket Killbox, and HijackThis are good to have around in case they are needed and they don't use any resources on your PC (other then some very small disk space) until you run them.
     
  19. Pimped

    Pimped Private E-2

    i found it:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center

    AntiVirusDisableNotify
    FirewallDisableNotify

    it set em both to 0, i set em back to 1

    oh ok yeah ill keep those programs
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are wasting your time. You should not be touching this. There is nothing wrong with the settings as they are. They merely indicate that you are no longer using the Windows default settings. They were changed when you installed Symantec. Symantec is now your Security Center.
     
  21. Pimped

    Pimped Private E-2

    Actually, this was messed up by spybot search and destroy, just incase anyone else has this problem. i just ran sbybot on a laptop, and its brought it up as a problem.

    Sorry if i sound cocky mate, but mite as well help sum1 out innit

    And ur a star, the computer is running smoothly, just cant run hp's application recovery to reinstall antivirus and firewall. (wanted to run it to fix that notify key thing) but i know that thats not working now.

    Thanks matey :)
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This is not messed up by Spybot and everyone really already knows about it. Spybot is just telling you that the Windows system defaults have been changed. It is sort of a warning to make sure you know about it. It is not a problem and it cannot be fixed (there is nothing to fix) while you have another application running as your security center.
     
  23. Pimped

    Pimped Private E-2

    Aha okay. Thanks for clearing that up

    Just running some scans on my lappy, dunno what caused it, but the whole hosts files needed to be reset, you know the winsock stuff.

    If it comesd back with any problems, what should i post my logs under if i need any help? like what should i cll the post?
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The hosts file should only be what is shown below in the quote box. This is the Windows default file.
     
  25. Pimped

    Pimped Private E-2

    oh kool. so far tha scans are goin good. only one spyware found and spybot found a few things.

    cheers m8
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds