Windows XP cleaning procedure not sorted my problem

Discussion in 'Malware Help (A Specialist Will Reply)' started by dugong, Sep 14, 2008.

  1. dugong

    dugong Private E-2

    Have run the procedures set out in the Windows XP Cleaning Procedure but still have a problem in that internet explorer is redirecting me to a false site when I try to log on to my online banking at www.nwolb.com.

    I attach the logs
    # SAS.log log from SuperAntiSpyware.
    # Malwarebytes Anti-Malware log
    # log.txt from Combofix

    MGlogs.zip to follow
     

    Attached Files:

  2. dugong

    dugong Private E-2

    Here is the MGlogs.zip file
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Based on your logs you are clean. But I do want to check further for rootkits.

    SUPERAntiSpyware incorrectly deleted a DLL file for your "Burn4Free CD and DVD" software. You will have to restore from it's quarantine the C:\WINDOWS\SYSTEM32\B4FM.DLL file that it removed.

    Are you sure the problem is with IE? You appear to be using FireFox based on your logs.

    Where exactly are you being redirected too?

    What happens if you enter the below in your browser?

    http://155.136.72.107


    Please run the below and attach the requested log:

    Running GMER to detect rootkits
     
  4. dugong

    dugong Private E-2

    Thanks - great job you're doing here!

    I attach the GMER log file.

    You are right I am currently using Firefox - I changed because of the problems I was experiencing with IE6.

    If I enter the address you give in my browser I go to the NatWest online banking first login screen which asks for customer number to be entered.

    In IE6 if I enter any false customer number (eg 1234567890) I get taken to what purports to be the next login page asking for PIN and password details - I checked with NatWest when this first happened and they told me that this is not a genuine login screen and that I must have a trojan redirecting me there.

    If I do the same thing in Firefox I get an error message saying the customer number is not correct which is what I would expect.
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay so the problem is not with IE getting to the URL, it is after entering incorrect information that you get redirected???

    Please run this Using Dr.Web CureIt and attach the requested log.
     
  6. dugong

    dugong Private E-2

    Thanks for the help.

    I guess I am not sure if the screen I am entering the info in is genuine and I am getting redirected afterwards or whether the screen itself is a fake.

    I have saved the Dr.Web Cureit exe file to my desktop but when I try and launch it I get an error message "Cannot open dwebllio.dll" (see full log attached) and so am not able to proceed as requested - please let me know how to deal with this - thanks!
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Shutdown all protection software and try to install it again. All the below may be getting in the way.

    Windows Defender
    PC Tools AntiVirus
    ThreatFire
     
  8. dugong

    dugong Private E-2

    Thanks that worked!

    I attach the DrWeb log as requested.
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please download the following & save to your Desktop:
    GMER's MBR.exe

    • Double click on the MBR.exe file to run it.
    • A log will be produced & saved to the desktop, called MBR.log.
    • Attach this log to your next message.
    What is the below folder for? If unknown, what is in it?
    C:\stdtsa

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O3 - Toolbar: (no name) - {BA52B914-B692-46c4-B683-905236F6F655} - (no file)
    O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O9 - Extra button: (no name) - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - (no file)

    After clicking Fix, exit HJT.


    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.
    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\avenger.txt
    • MBR.log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  10. dugong

    dugong Private E-2

    In reposnse to your questions:

    1. "C:\stdtsa" contains Sophos anti-virus software that I am not currently using

    2. As far as I can tell things are working fine now - the specific problem re getting redirected from nwolb.com from IE6 looks like it has been solved.

    I attach the three request logs.

    Many, many thanks!

    Let me know any further actions I should take.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Great but from another PC, I recommend that you change all passwords.

    Just to be sure those file with the $$$ which are from the infection do not come back, please do the below.


    Also delete all files in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\Mike\Local Settings\temp

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  12. dugong

    dugong Private E-2

    Thanks - will follow your advice re passwords.

    Have performed procedures as set out and attach the MGLogs.zip file.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommed you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\combofix folder from combofix (if it exists)
    3. If we had you run Avenger, you can delete all files related to Avenger now.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    9. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds