18 Trojans...

View previous topic View next topic Go down

Solved 18 Trojans...

Post by bball1210 on 12th January 2009, 7:30 pm

Hello,

So I just got my computer cleaned up from here yesterday, and apparently another trojan/virus has appeared on this computer without me even surfing the net all day yesterday! My desktop background has turned black automatically, and everytime I open Firefox, I'm greeted with a message that says "18 Trojans Found - Run anti-spyware tool". Something is definitely up, please help =)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:27:24 PM, on 1/12/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\explorer.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\frmwrk32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\ntdll64.exe
C:\Documents and Settings\Rohit\Desktop\hijackgpthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = [You must be registered and logged in to see this link.]
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = [You must be registered and logged in to see this link.]
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = [You must be registered and logged in to see this link.]
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Catcher Class - {ADECBED6-0366-4377-A739-E69DFBA04663} - C:\Program Files\Moyea\FLV Downloader\MoyeaCth.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [Framework Windows] frmwrk32.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US [You must be registered and logged in to see this link.]
O4 - HKCU\..\Run: [Simp] C:\Program Files\Secway\SimpLite-MSN 2.2\SimpLite-MSN.exe
O8 - Extra context menu item: Download linked FLV with GetFLV - C:\Program Files\GetFLV\iemenu\DownloadLinkFLV.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - [You must be registered and logged in to see this link.]
O8 - Extra context menu item: Save with Download Manager... - [You must be registered and logged in to see this link.] Files\J River\Media Center 11\DMDownload.htm
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - [You must be registered and logged in to see this link.]
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe

--
End of file - 5958 bytes

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 7:34 pm

Hello.

Please be careful with this next tool, if used incorrectly, you will lose internet access.

Please download the LSPfix from here: [You must be registered and logged in to see this link.]
Unzip it to the Desktop (Important!!) and run it. Check the box that says "I know what I'm doing", and then select each instance of "ntdll64.dll" in the left-hand panel and click >> button to move it to the right-hand panel. Then click Finish to allow LSPfix to rebuild the LSP chain.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    O4 - HKLM\..\Run: [Framework Windows] frmwrk32.exe


  • Press "Fix Checked"
  • Close Hijack This.

Delete this file in bold if you can find it:
C:\WINDOWS\system32\frmwrk32.exe

  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
    [You must be registered and logged in to see this link.]
  • Double click DDS.scr to run
  • When complete, DDS.txt will open.
  • Click No for Optional Scan.
  • Save the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 7:40 pm

Hi,

During the LSPFix process, I followed your directions, however the application unexpectedly ended after i selected finish. I double clicked the program and checked for that .dll and it was gone, so I assume this isn't a problem.

DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 14:38:27.81 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1402 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\explorer.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\ntdll64.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US [You must be registered and logged in to see this link.]
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - [You must be registered and logged in to see this link.] files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-12 13:57 4,785 a------- c:\windows\system32\warning.gif
2009-01-12 13:57 111,616 a------- c:\windows\system32\ntdll64.exe
2009-01-12 13:27 1,347 a------- c:\windows\system32\ahtn.htm
2009-01-12 13:27 491 a------- c:\windows\system32\win32hlp.cnf
2009-01-12 13:26 111,616 ac------ c:\windows\system32\dllcache\userinit.exe
2009-01-12 13:26 1 a------- c:\windows\system32\uniq.tll
2009-01-12 13:26 1 a------- c:\windows\system32\test.ttt
2009-01-12 13:26 31,232 a------- c:\windows\system32\frmwrk32.exe
2009-01-12 13:26 31,232 a------- c:\windows\system32\pcload.exe
2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2009-01-12 13:26 111,616 a------- c:\windows\system32\userinit.exe
2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-12-06 00:23 1,140,736 a------- C:\MAJ.zip
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 14:38:57.58 ===============

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 7:51 pm

Hello.
There's something not right here.

I can see from the log that userinit.exe has been patched, but this infection is normally all caused by Goored infection, but I don't see that here. We need to replace the patched file.
  1. Open My Computer.
  2. Go to Tools > Folder Options.
  3. Select the View tab.
  4. Scroll down to Hidden files and folders.
  5. Select Show hidden files and folders.
  6. Uncheck (untick) Hide extensions of known file types.
  7. Uncheck (untick) Hide protected operating system files (Recommended). <== make sure you do this part, otherwise you won't be able to do this next part of the fix
  8. Click Yes when prompted.
  9. Click OK.
  10. Close My Computer.


Now locate these two files in bold:
c:\windows\system32\dllcache\userinit.exe
c:\windows\system32\userinit.exe

Right click them one by one and select > Rename
Add a .bad extension onto them, so they will now be called userinit.exe.bad

Now download this clean copy of userinit.exe from here:
[You must be registered and logged in to see this link.]
Download the file to your DESKTOP <==Important
Right click the new userinit.exe you have now > Copy
Now go back to the system32 folder like you did before, and paste the copied userinit file into the system32 folder.

If you have done that successfully, Copy the file from your Desktop again, but copy it to dllcache folder this time.

Now lets remove this malware.

1. Please download The Avenger by Swandog46 to your Desktop
Link: [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.].

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Files to delete:
c:\windows\system32\warning.gif
c:\windows\system32\ntdll64.exe
c:\windows\system32\ahtn.htm
c:\windows\system32\win32hlp.cnf
c:\windows\system32\uniq.tll
c:\windows\system32\test.ttt
c:\windows\system32\frmwrk32.exe
c:\windows\system32\pcload.exe

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 8:05 pm

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "seneka" found!
ImagePath: \systemroot\system32\drivers\senekasvptxpgh.sys
Driver disabled successfully.

Rootkit scan completed.

File "c:\windows\system32\warning.gif" deleted successfully.
File "c:\windows\system32\ntdll64.exe" deleted successfully.
File "c:\windows\system32\ahtn.htm" deleted successfully.
File "c:\windows\system32\win32hlp.cnf" deleted successfully.
File "c:\windows\system32\uniq.tll" deleted successfully.
File "c:\windows\system32\test.ttt" deleted successfully.

Error: file "c:\windows\system32\frmwrk32.exe" not found!
Deletion of file "c:\windows\system32\frmwrk32.exe" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "c:\windows\system32\pcload.exe" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.



Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Error: Script file not found!
Could not open script file! Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

Abort!

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 8:08 pm

Hmm, a rootkit this time.
Okay, did you rename the two userinits with .bad and replace it with the good userinit file?
We need to use the avenger again to remove the rootkit.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Drivers to delete:
seneka

Files to delete:
c:\windows\system32\drivers\senekasvptxpgh.sys

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.

Please run DDS again and post a NEW DDS log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 8:17 pm

I did rename the two files that you asked me to.

Here is the new log:

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "seneka" deleted successfully.
File "c:\windows\system32\drivers\senekasvptxpgh.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 8:17 pm

Also here is the requested DDS log:

DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 15:16:20.03 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1325 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US [You must be registered and logged in to see this link.]
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - [You must be registered and logged in to see this link.] files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-12 13:26 111,616 ac------ c:\windows\system32\dllcache\userinit.exe.bad
2009-01-11 17:16 3 a------- c:\windows\system32\senekadf.dat
2009-01-11 17:16 59 a------- c:\windows\system32\seneka.dat
2009-01-11 17:05 15,210 a------- c:\windows\system32\senekalog.dat
2009-01-11 01:36 0 a------- c:\windows\system32\drivers\seneka.sys
2009-01-10 23:20 14,336 a------- c:\windows\system32\senekaddchwonp.dll
2009-01-10 23:15 29,613 a------- c:\windows\system32\senekaiupjupuk.dll
2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-12-06 00:23 1,140,736 a------- C:\MAJ.zip
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 15:16:55.79 ===============

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 8:21 pm

Hello.
Good, the good userinit is put back, now one last round with the avenger and I think we can call this a rap.
But first, I see this file sitting in your C Drive.
C:\MAJ.zip

Do you know what that zip file? if you don't know what it is, DO NOT open it.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+CCrying


Files to delete:
c:\windows\system32\dllcache\userinit.exe.bad
c:\windows\system32\senekadf.dat
c:\windows\system32\seneka.dat
c:\windows\system32\senekalog.dat
c:\windows\system32\drivers\seneka.sys
c:\windows\system32\senekaddchwonp.dll
c:\windows\system32\senekaiupjupuk.dll

Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avengerís actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 8:43 pm

I have no idea what that file is at all...

Here is the log:

Logfile of The Avenger Version 2.0, (c) by Swandog46
[You must be registered and logged in to see this link.]

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File "c:\windows\system32\dllcache\userinit.exe.bad" deleted successfully.
File "c:\windows\system32\senekadf.dat" deleted successfully.
File "c:\windows\system32\seneka.dat" deleted successfully.
File "c:\windows\system32\senekalog.dat" deleted successfully.
File "c:\windows\system32\drivers\seneka.sys" deleted successfully.
File "c:\windows\system32\senekaddchwonp.dll" deleted successfully.
File "c:\windows\system32\senekaiupjupuk.dll" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 8:57 pm

Hello.
The avenger has taken care of the malware now.
Please delete that .zip file then. Smile

What problems remain?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 9:16 pm

Thanks for the malware removal help. My desktop is still a violet purple color though, and I can't change back to my original background.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 9:20 pm

Oh yeah, I forgot about them policies.


  • Now open a new notepad file.
  • Input this into the notepad file:

    regedit /e peek1.txt "HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Policies"
    regedit /e peek2.txt "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies"
    type peek1.txt >> look.txt
    type peek2.txt >> look.txt
    del peek*.txt
    start notepad look.txt

  • Save this as look.bat, save it to your desktop.
  • Double click look.bat to run it.
  • Copy and paste the report back here.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 9:35 pm

Here is the log:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
"NoChangingWallpaper"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:00000002

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDrives"=dword:00000000
"NoDriveAutoRun"=dword:03ffffff
"NoDriveTypeAutoRun"=dword:00000143
"NoSetActiveDesktop"=dword:00000001
"NoActiveDesktopChanges"=dword:00000001

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 9:40 pm


  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
    "NoChangingWallpaper"=-
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "NoSetActiveDesktop"=-
    "NoActiveDesktopChanges"=-

  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


You may need to reboot for these policy changes to take effect.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 9:53 pm

So there seems to be another issue.

I think the reason I can't change anything is because Task Manager also isn't working. When I Control Alt Delete, I get an error saying Task Manager has been disabled by the Administrator, yet I did nothing of the sort.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 10:01 pm

Okay.
Delete the old look.bat because we have to do another look.bat to find that policy.

Oh yeah, I forgot about them policies.


  • Now open a new notepad file.
  • Input this into the notepad file:

    regedit /e peek1.txt "HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies"
    type peek1.txt >> look.txt
    del peek1.txt
    start notepad look.txt

  • Save this as look.bat, save it to your desktop.
  • Double click look.bat to run it.
  • Copy and paste the report back here.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 10:05 pm

Here you go:

Windows Registry Editor Version 5.00

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies]

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
"NoChangingWallpaper"=dword:00000001

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:00000143
"CDRAutoRun"=dword:00000000
"NoDriveAutoRun"=dword:03ffffff
"NoSetActiveDesktop"=dword:00000001
"NoActiveDesktopChanges"=dword:00000001

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run]

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\system]
"DisableTaskMgr"=dword:00000001

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 10:08 pm


  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
    "NoChangingWallpaper"=-
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "NoSetActiveDesktop"=-
    "NoActiveDesktopChanges"=-
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\system]
    "DisableTaskMgr"=-

  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


Again, may need to reboot for this to change.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 10:19 pm

Okay, so I did the above fixes, and still cannot use Task Manager or change my desktop's background =/

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 10:21 pm

Did you reboot after the reg fix?
Please post a new DDS log.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 10:27 pm

Yep, I did reboot after both reg fixes.

Here is the DDS log:


DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 17:26:43.84 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1374 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US [You must be registered and logged in to see this link.]
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - [You must be registered and logged in to see this link.] files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - [You must be registered and logged in to see this link.]
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 17:27:20.01 ===============

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 10:33 pm

Okay, lets try this now.

  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]

  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


Reboot and see if you can use Task Manager now.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 10:37 pm

Before I try your fix, I got task manager to work, by going into the Registry, under [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System], and changing a policy from 1 to 0.

However, I still cannot change desktop backgrounds, and it continues to stay this plain violet color. I will wait for your reply before doing anything else.

Edit: When I kill explorer.exe, I see my background. However when I rerun the process, this violet background comes up if that helps.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 10:39 pm

Ah.
Try my fix anyway, it should remove all policies set by the malware.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 10:47 pm

Ok, so the task manager issue is solved, but this desktop issue still remains...
I don't really know what to do. If I see my background when I kill explorer.exe but not when its running, is that the issue?

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 11:00 pm

Hmm.
When you try to change the background picture, is it like the pictures are greyed out/locked?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 11:01 pm

Yeah, the pictures are locked out with a grayish color around them.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 11:06 pm

Okay, try this:

Right click anywhere on the Desktop > Properties.
Click the "Desktop" tab, then hit the "Customize Desktop" button
This will open another windows, then open the "Web" tab.

If "My current homepage" is ticked, then untick it.

Any change now?


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 11:16 pm

It was already unchecked.

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 11:17 pm

Ah, okay.
It may not be a registry item, it could be a group policy.
Press Start > Run
Type in:
gpedit.msc
Press enter.

Follow this path:
User Configuration->Administrative Templates->Control Panel->Display->Set "Prevent changing wallpaper" to disabled, or not configured.


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by bball1210 on 12th January 2009, 11:19 pm

Well, you sir are a genius. It was set by default to not configured, so I set it to disabled, and now I can change between desktop backgrounds. Thanks so much, its greatly appreciated!

bball1210
Intermediate
Intermediate

Posts Posts : 59
Joined Joined : 2008-12-06
OS OS : Windows XP
Points Points : 29311
# Likes # Likes : 0

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Belahzur on 12th January 2009, 11:27 pm

Glad I could help.

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to [You must be registered and logged in to see this link.] and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

[You must be registered and logged in to see this link.]
A tutorial on using Ad-Aware to remove spyware from your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using Spybot to remove spyware from your computer may be found [You must be registered and logged in to see this link.]. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

[You must be registered and logged in to see this link.]
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found [You must be registered and logged in to see this link.].

[You must be registered and logged in to see this link.]
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found [You must be registered and logged in to see this link.].

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
[You must be registered and logged in to see this link.]
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]
[You must be registered and logged in to see this link.]

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
[You must be registered and logged in to see this link.]

5) Finally, consider maintaining a firewall. Some good free firewalls are [You must be registered and logged in to see this link.], or
[You must be registered and logged in to see this link.]
A tutorial on understanding and using firewalls may be found [You must be registered and logged in to see this link.].

Please also read Tony Klein's excellent article: [You must be registered and logged in to see this link.]

Hopefully this should take care of your problems! Good luck. Big Grin


[You must be registered and logged in to see this link.] - [You must be registered and logged in to see this link.] - Please PM me if I fail to respond within 24hrs.


Belahzur
Administrator
Administrator

Posts Posts : 34918
Joined Joined : 2008-08-03
Gender Gender : Male
OS OS : 7 Home Premium x64
Points Points : 245111
# Likes # Likes : 1

View user profile

Back to top Go down

Solved Re: 18 Trojans...

Post by Doctor Inferno on 28th March 2009, 8:57 am

Since this issue is resolved, this topic is closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter.

Everyone else, please open a new topic for your questions.


Please be a GeekPolice fan on [You must be registered and logged in to see this link.]



Have we helped you? [You must be registered and logged in to see this link.] | Doctor by day, ninja by night.

Doctor Inferno
Administrator
Administrator

Posts Posts : 11976
Joined Joined : 2007-12-26
Gender Gender : Male
OS OS : Windows 7 Home Premium and Ultimate X64
Protection Protection : Kaspersky PURE and Malwarebytes' Anti-Malware
Points Points : 104640
# Likes # Likes : 0

View user profile

Back to top Go down

View previous topic View next topic Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum