WiredWX Christian Hobby Weather Tools
Would you like to react to this message? Create an account in a few clicks or log in to continue.

WiredWX Christian Hobby Weather ToolsLog in

 


description18 Trojans... Empty18 Trojans...

more_horiz
Hello,

So I just got my computer cleaned up from here yesterday, and apparently another trojan/virus has appeared on this computer without me even surfing the net all day yesterday! My desktop background has turned black automatically, and everytime I open Firefox, I'm greeted with a message that says "18 Trojans Found - Run anti-spyware tool". Something is definitely up, please help =)

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:27:24 PM, on 1/12/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\explorer.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\frmwrk32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\ntdll64.exe
C:\Documents and Settings\Rohit\Desktop\hijackgpthis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre6\bin\ssv.dll
O2 - BHO: Catcher Class - {ADECBED6-0366-4377-A739-E69DFBA04663} - C:\Program Files\Moyea\FLV Downloader\MoyeaCth.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [MSKDetectorExe] C:\Program Files\McAfee\SpamKiller\MSKDetct.exe /uninstall
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [Framework Windows] frmwrk32.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - HKCU\..\Run: [Aim6] "C:\Program Files\AIM6\aim6.exe" /d locale=en-US ee://aol/imApp
O4 - HKCU\..\Run: [Simp] C:\Program Files\Secway\SimpLite-MSN 2.2\SimpLite-MSN.exe
O8 - Extra context menu item: Download linked FLV with GetFLV - C:\Program Files\GetFLV\iemenu\DownloadLinkFLV.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O8 - Extra context menu item: Save with Download Manager... - file://C:\Program Files\J River\Media Center 11\DMDownload.htm
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
O10 - Unknown file in Winsock LSP: c:\windows\temp\ntdll64.dll
O16 - DPF: {3EA4FA88-E0BE-419A-A732-9B79B87A6ED0} (CTVUAxCtrl Object) - http://dl.tvunetworks.com/TVUAx.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: Lavasoft Ad-Aware Service (aawservice) - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: Retrospect WD Service (RetroWDSvc) - Dantz Development Corporation - C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe

--
End of file - 5958 bytes

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hello.

Please be careful with this next tool, if used incorrectly, you will lose internet access.

Please download the LSPfix from here: LSPFix
Unzip it to the Desktop (Important!!) and run it. Check the box that says "I know what I'm doing", and then select each instance of "ntdll64.dll" in the left-hand panel and click >> button to move it to the right-hand panel. Then click Finish to allow LSPfix to rebuild the LSP chain.

  • Open HijackThis
  • Choose "Do a system scan only"
  • Check the boxes in front of these lines:


    O4 - HKLM\..\Run: [Framework Windows] frmwrk32.exe


  • Press "Fix Checked"
  • Close Hijack This.

Delete this file in bold if you can find it:
C:\WINDOWS\system32\frmwrk32.exe

  • Please download DDS by sUBs to your Desktop (Important!!) from one of these locations:
    Link 1
    Link 2
    Link 3
  • Double click DDS.scr to run
  • When complete, DDS.txt will open.
  • Click No for Optional Scan.
  • Save the report to your Desktop.
  • Copy and paste DDS.txt back here, I don't need to see attach.txt.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hi,

During the LSPFix process, I followed your directions, however the application unexpectedly ended after i selected finish. I double clicked the program and checked for that .dll and it was gone, so I assume this isn't a problem.

DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 14:38:27.81 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1402 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\explorer.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\WINDOWS\system32\ntdll64.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = www.google.com
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - hxxp://www.gamefaqs.com/
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-12 13:57 4,785 a------- c:\windows\system32\warning.gif
2009-01-12 13:57 111,616 a------- c:\windows\system32\ntdll64.exe
2009-01-12 13:27 1,347 a------- c:\windows\system32\ahtn.htm
2009-01-12 13:27 491 a------- c:\windows\system32\win32hlp.cnf
2009-01-12 13:26 111,616 ac------ c:\windows\system32\dllcache\userinit.exe
2009-01-12 13:26 1 a------- c:\windows\system32\uniq.tll
2009-01-12 13:26 1 a------- c:\windows\system32\test.ttt
2009-01-12 13:26 31,232 a------- c:\windows\system32\frmwrk32.exe
2009-01-12 13:26 31,232 a------- c:\windows\system32\pcload.exe
2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2009-01-12 13:26 111,616 a------- c:\windows\system32\userinit.exe
2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-12-06 00:23 1,140,736 a------- C:\MAJ.zip
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 14:38:57.58 ===============

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hello.
There's something not right here.

I can see from the log that userinit.exe has been patched, but this infection is normally all caused by Goored infection, but I don't see that here. We need to replace the patched file.
  1. Open My Computer.
  2. Go to Tools > Folder Options.
  3. Select the View tab.
  4. Scroll down to Hidden files and folders.
  5. Select Show hidden files and folders.
  6. Uncheck (untick) Hide extensions of known file types.
  7. Uncheck (untick) Hide protected operating system files (Recommended). <== make sure you do this part, otherwise you won't be able to do this next part of the fix
  8. Click Yes when prompted.
  9. Click OK.
  10. Close My Computer.


Now locate these two files in bold:
c:\windows\system32\dllcache\userinit.exe
c:\windows\system32\userinit.exe

Right click them one by one and select > Rename
Add a .bad extension onto them, so they will now be called userinit.exe.bad

Now download this clean copy of userinit.exe from here:
http://www.sendspace.com/file/a6m46e
Download the file to your DESKTOP <==Important
Right click the new userinit.exe you have now > Copy
Now go back to the system32 folder like you did before, and paste the copied userinit file into the system32 folder.

If you have done that successfully, Copy the file from your Desktop again, but copy it to dllcache folder this time.

Now lets remove this malware.

1. Please download The Avenger by Swandog46 to your Desktop
Link: HERE or HERE.

  • Click on Avenger.zip to open the file
  • Extract avenger.exe to your desktop
2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Files to delete:
c:\windows\system32\warning.gif
c:\windows\system32\ntdll64.exe
c:\windows\system32\ahtn.htm
c:\windows\system32\win32hlp.cnf
c:\windows\system32\uniq.tll
c:\windows\system32\test.ttt
c:\windows\system32\frmwrk32.exe
c:\windows\system32\pcload.exe


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.

Hidden driver "seneka" found!
ImagePath: \systemroot\system32\drivers\senekasvptxpgh.sys
Driver disabled successfully.

Rootkit scan completed.

File "c:\windows\system32\warning.gif" deleted successfully.
File "c:\windows\system32\ntdll64.exe" deleted successfully.
File "c:\windows\system32\ahtn.htm" deleted successfully.
File "c:\windows\system32\win32hlp.cnf" deleted successfully.
File "c:\windows\system32\uniq.tll" deleted successfully.
File "c:\windows\system32\test.ttt" deleted successfully.

Error: file "c:\windows\system32\frmwrk32.exe" not found!
Deletion of file "c:\windows\system32\frmwrk32.exe" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

File "c:\windows\system32\pcload.exe" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.



Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Error: Script file not found!
Could not open script file! Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist

Abort!

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hmm, a rootkit this time.
Okay, did you rename the two userinits with .bad and replace it with the good userinit file?
We need to use the avenger again to remove the rootkit.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Drivers to delete:
seneka

Files to delete:
c:\windows\system32\drivers\senekasvptxpgh.sys


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.

Please run DDS again and post a NEW DDS log.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
I did rename the two files that you asked me to.

Here is the new log:

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

Driver "seneka" deleted successfully.
File "c:\windows\system32\drivers\senekasvptxpgh.sys" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Also here is the requested DDS log:

DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 15:16:20.03 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1325 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = www.google.com
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
mPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
mPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - hxxp://www.gamefaqs.com/
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-12 13:26 111,616 ac------ c:\windows\system32\dllcache\userinit.exe.bad
2009-01-11 17:16 3 a------- c:\windows\system32\senekadf.dat
2009-01-11 17:16 59 a------- c:\windows\system32\seneka.dat
2009-01-11 17:05 15,210 a------- c:\windows\system32\senekalog.dat
2009-01-11 01:36 0 a------- c:\windows\system32\drivers\seneka.sys
2009-01-10 23:20 14,336 a------- c:\windows\system32\senekaddchwonp.dll
2009-01-10 23:15 29,613 a------- c:\windows\system32\senekaiupjupuk.dll
2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-12-06 00:23 1,140,736 a------- C:\MAJ.zip
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 15:16:55.79 ===============

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hello.
Good, the good userinit is put back, now one last round with the avenger and I think we can call this a rap.
But first, I see this file sitting in your C Drive.
C:\MAJ.zip

Do you know what that zip file? if you don't know what it is, DO NOT open it.

2. Copy all the text contained in the code box below to your Clipboard by highlighting it and pressing (Ctrl+C):


Files to delete:
c:\windows\system32\dllcache\userinit.exe.bad
c:\windows\system32\senekadf.dat
c:\windows\system32\seneka.dat
c:\windows\system32\senekalog.dat
c:\windows\system32\drivers\seneka.sys
c:\windows\system32\senekaddchwonp.dll
c:\windows\system32\senekaiupjupuk.dll


Note: the above code was created specifically for this user. If you are not this user, do NOT follow these directions as they could damage the workings of your system.


3. Now, start The Avenger program by clicking on its icon on your desktop.

  • Under "Input script here:", paste in the script from the quote box above.
  • Leave the ticked box "Scan for rootkit" ticked.
  • Then tick "Disable any rootkits found"
  • Now click on the Execute to begin execution of the script.
  • Answer "Yes" twice when prompted.

    The Avenger will automatically do the following:

  • It will Restart your computer.
  • On reboot, it will briefly open a black command window on your desktop, this is normal.
  • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
  • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.
4. Please copy/paste the content of c:\avenger.txt into your reply.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
I have no idea what that file is at all...

Here is the log:

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform: Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File "c:\windows\system32\dllcache\userinit.exe.bad" deleted successfully.
File "c:\windows\system32\senekadf.dat" deleted successfully.
File "c:\windows\system32\seneka.dat" deleted successfully.
File "c:\windows\system32\senekalog.dat" deleted successfully.
File "c:\windows\system32\drivers\seneka.sys" deleted successfully.
File "c:\windows\system32\senekaddchwonp.dll" deleted successfully.
File "c:\windows\system32\senekaiupjupuk.dll" deleted successfully.

Completed script processing.

*******************

Finished! Terminate.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hello.
The avenger has taken care of the malware now.
Please delete that .zip file then. Smile...

What problems remain?

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Thanks for the malware removal help. My desktop is still a violet purple color though, and I can't change back to my original background.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Oh yeah, I forgot about them policies.


  • Now open a new notepad file.
  • Input this into the notepad file:

    regedit /e peek1.txt "HKEY_Local_Machine\Software\Microsoft\Windows\CurrentVersion\Policies"
    regedit /e peek2.txt "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies"
    type peek1.txt >> look.txt
    type peek2.txt >> look.txt
    del peek*.txt
    start notepad look.txt


  • Save this as look.bat, save it to your desktop.
  • Double click look.bat to run it.
  • Copy and paste the report back here.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Here is the log:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
"NoChangingWallpaper"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments]
"ScanWithAntiVirus"=dword:00000002

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDrives"=dword:00000000
"NoDriveAutoRun"=dword:03ffffff
"NoDriveTypeAutoRun"=dword:00000143
"NoSetActiveDesktop"=dword:00000001
"NoActiveDesktopChanges"=dword:00000001

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz

  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
    "NoChangingWallpaper"=-
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "NoSetActiveDesktop"=-
    "NoActiveDesktopChanges"=-


  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


You may need to reboot for these policy changes to take effect.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
So there seems to be another issue.

I think the reason I can't change anything is because Task Manager also isn't working. When I Control Alt Delete, I get an error saying Task Manager has been disabled by the Administrator, yet I did nothing of the sort.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Okay.
Delete the old look.bat because we have to do another look.bat to find that policy.

Oh yeah, I forgot about them policies.


  • Now open a new notepad file.
  • Input this into the notepad file:

    regedit /e peek1.txt "HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies"
    type peek1.txt >> look.txt
    del peek1.txt
    start notepad look.txt


  • Save this as look.bat, save it to your desktop.
  • Double click look.bat to run it.
  • Copy and paste the report back here.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Here you go:

Windows Registry Editor Version 5.00

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies]

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
"NoChangingWallpaper"=dword:00000001

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoDriveTypeAutoRun"=dword:00000143
"CDRAutoRun"=dword:00000000
"NoDriveAutoRun"=dword:03ffffff
"NoSetActiveDesktop"=dword:00000001
"NoActiveDesktopChanges"=dword:00000001

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run]

[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\system]
"DisableTaskMgr"=dword:00000001

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz

  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop]
    "NoChangingWallpaper"=-
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "NoSetActiveDesktop"=-
    "NoActiveDesktopChanges"=-
    [HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Policies\system]
    "DisableTaskMgr"=-


  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


Again, may need to reboot for this to change.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Okay, so I did the above fixes, and still cannot use Task Manager or change my desktop's background =/

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Did you reboot after the reg fix?
Please post a new DDS log.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Yep, I did reboot after both reg fixes.

Here is the DDS log:


DDS (Ver_09-01-07.01) - NTFSx86
Run by Rohit at 17:26:43.84 on Mon 01/12/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_11
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1374 [GMT -5:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated)

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\aawservice.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Program Files\AIM6\aim6.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
C:\PROGRA~1\Dantz\RETROS~1\wdsvc.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
svchost.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\dllhost.exe
C:\Program Files\AIM6\aolsoftware.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Documents and Settings\Rohit\Desktop\dds.com

============== Pseudo HJT Report ===============

uStart Page = www.google.com
uInternet Settings,ProxyOverride = *.local
BHO: Java(tm) Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Catcher Class: {adecbed6-0366-4377-a739-e69dfba04663} - c:\program files\moyea\flv downloader\MoyeaCth.dll
BHO: Java(tm) Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: FlashFXP Helper for Internet Explorer: {e5a1691b-d188-4419-ad02-90002030b8ee} - c:\progra~1\flashfxp\IEFlash.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [Aim6] "c:\program files\aim6\aim6.exe" /d locale=en-US ee://aol/imApp
uRun: [Simp] c:\program files\secway\simplite-msn 2.2\SimpLite-MSN.exe
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [MSKDetectorExe] c:\program files\mcafee\spamkiller\MSKDetct.exe /uninstall
mRun: [AVG8_TRAY] c:\progra~1\avg\avg8\avgtray.exe
uPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
uPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
uPolicies-system: DisableTaskMgr = 1 (0x1)
IE: Download linked FLV with GetFLV - c:\program files\getflv\iemenu\DownloadLinkFLV.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Save with Download Manager... - file://c:\program files\j river\media center 11\DMDownload.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg8\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\rohit\applic~1\mozilla\firefox\profiles\7qdh1rpk.default\
FF - prefs.js: browser.search.selectedEngine - Smogon
FF - prefs.js: browser.startup.homepage - hxxp://www.gamefaqs.com/
FF - plugin: c:\program files\mozilla firefox\plugins\npunagi2.dll
FF - plugin: c:\program files\viewpoint\viewpoint experience technology\npViewpoint.dll

---- FIREFOX POLICIES ----
FF - user.js: network.proxy.type - 0
FF - user.js: network.proxy.http -
user_pref(network.proxy.http_port,);
FF - user.js: network.proxy.no_proxies_on -

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2008-12-6 97928]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2008-12-6 26824]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2008-11-17 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2008-11-17 55024]
R3 AmdTools;AMD Special Tools Driver;c:\windows\system32\drivers\AmdTools.sys [2006-7-24 31744]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2008-11-17 7408]
R4 aawservice;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\aawservice.exe [2008-9-10 611664]
R4 avg8wd;AVG Free8 WatchDog;c:\progra~1\avg\avg8\avgwdsvc.exe [2008-12-6 231704]
R4 McrdSvc;Media Center Extender Service;c:\windows\ehome\mcrdsvc.exe [2005-8-5 99328]
R4 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S0 zaxpahop;zaxpahop;c:\windows\system32\drivers\gumi.sys --> c:\windows\system32\drivers\gumi.sys [?]
S3 AlcrFilt;Alcor Micro Corp;c:\windows\system32\drivers\AlcrFilt.sys [2003-2-24 22860]
S3 gbalink;GBA Link Driver (gbalink.sys);c:\windows\system32\drivers\gbalink.sys [2007-1-6 19677]

=============== Created Last 30 ================

2009-01-05 08:26 --d----- c:\program files\Tracker Checker 2
2008-12-22 16:40 --d----- c:\docume~1\rohit\applic~1\Malwarebytes
2008-12-22 16:40 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-22 16:40 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-22 16:40 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-22 16:40 --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2008-12-20 17:10 --d----- c:\windows\system32\scripting
2008-12-20 17:10 --d----- c:\windows\l2schemas
2008-12-20 17:10 --d----- c:\windows\system32\en
2008-12-20 17:10 --d----- c:\windows\system32\bits
2008-12-20 17:07 --d----- c:\windows\ServicePackFiles
2008-12-20 16:08 6,066,176 ac------ c:\windows\system32\dllcache\ieframe.dll
2008-12-20 16:08 2,455,488 ac------ c:\windows\system32\dllcache\ieapfltr.dat
2008-12-20 16:08 991,232 ac------ c:\windows\system32\dllcache\ieframe.dll.mui
2008-12-20 16:08 459,264 ac------ c:\windows\system32\dllcache\msfeeds.dll
2008-12-20 16:08 383,488 ac------ c:\windows\system32\dllcache\ieapfltr.dll
2008-12-20 16:08 267,776 ac------ c:\windows\system32\dllcache\iertutil.dll
2008-12-20 16:08 63,488 ac------ c:\windows\system32\dllcache\icardie.dll
2008-12-20 16:08 52,224 ac------ c:\windows\system32\dllcache\msfeedsbs.dll
2008-12-20 16:08 13,824 ac------ c:\windows\system32\dllcache\ieudinit.exe
2008-12-20 16:04 --d----- c:\windows\network diagnostic
2008-12-20 16:03 33,792 ac------ c:\windows\system32\dllcache\custsat.dll

==================== Find3M ====================

2008-12-20 17:13 86,811 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2008-12-06 19:33 410,984 a------- c:\windows\system32\deploytk.dll
2008-12-06 14:58 10,520 a------- c:\windows\system32\avgrsstx.dll
2008-12-06 14:58 97,928 a------- c:\windows\system32\drivers\avgldx86.sys
2008-12-06 00:46 78,415 a------- c:\windows\system32\drivers\klif.cab
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-08-17 18:52 47,360 a---h--- c:\docume~1\rohit\applic~1\pcouffin.sys
2006-09-10 10:52 81,920 a---h--- c:\docume~1\rohit\applic~1\ezpinst.exe

============= FINISH: 17:27:20.01 ===============

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Okay, lets try this now.

  • Now open a new notepad file.
  • Input this into the notepad file:

    Windows Registry Editor Version 5.00

    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    [-HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]


  • Save this as fix.reg, save it to your desktop.
  • Double click fix.reg to run it.
  • Select yes to the registry merge prompt.


Reboot and see if you can use Task Manager now.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Before I try your fix, I got task manager to work, by going into the Registry, under [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System], and changing a policy from 1 to 0.

However, I still cannot change desktop backgrounds, and it continues to stay this plain violet color. I will wait for your reply before doing anything else.

Edit: When I kill explorer.exe, I see my background. However when I rerun the process, this violet background comes up if that helps.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Ah.
Try my fix anyway, it should remove all policies set by the malware.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Ok, so the task manager issue is solved, but this desktop issue still remains...
I don't really know what to do. If I see my background when I kill explorer.exe but not when its running, is that the issue?

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Hmm.
When you try to change the background picture, is it like the pictures are greyed out/locked?

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Yeah, the pictures are locked out with a grayish color around them.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Okay, try this:

Right click anywhere on the Desktop > Properties.
Click the "Desktop" tab, then hit the "Customize Desktop" button
This will open another windows, then open the "Web" tab.

If "My current homepage" is ticked, then untick it.

Any change now?

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
It was already unchecked.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Ah, okay.
It may not be a registry item, it could be a group policy.
Press Start > Run
Type in:
gpedit.msc
Press enter.

Follow this path:
User Configuration->Administrative Templates->Control Panel->Display->Set "Prevent changing wallpaper" to disabled, or not configured.

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Well, you sir are a genius. It was set by default to not configured, so I set it to disabled, and now I can change between desktop backgrounds. Thanks so much, its greatly appreciated!

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Glad I could help.

We need to make a new restore point.

To turn off System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.
4. Click Yes when you receive the prompt to the turn off System Restore.

Now we need to make a new restore point.
To turn on System Restore, follow these steps:
1. Click Start, right-click My Computer, and then click Properties.
2. Click the System Restore tab.
3. Click the Turn off System Restore check box (To turn on System Restore), and then click OK.

Below I have included a number of recommendations for how to protect your computer in order to prevent future malware infections. Please take these recommendations seriously; these few simple steps can stave off the vast majority of spyware problems. As happy as we are to help you, for your sake we would rather not have repeat customers. Goofy

1) Please navigate to http://windowsupdate.microsoft.com and download all the "critical updates" for Windows. This can patch many of the security holes through which attackers can gain access to your computer.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates , or get into the habit of checking for Windows updates regularly. I cannot stress enough how important this is.

2) In order to protect yourself against spyware, you should consider installing and running the following free programs:

Ad-Aware SE
A tutorial on using Ad-Aware to remove spyware from your computer may be found here.

Spybot-Search & Destroy
A tutorial on using Spybot to remove spyware from your computer may be found here. Please also remember to enable Spybot's "Immunize" and "TeaTimer" features.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent spyware from ever installing on your computer may be found here.

SpywareGuard
A tutorial on using SpywareGuard for realtime protection against spyware and hijackers may be found here.

Make sure to keep these programs up-to-date and to run them regularly, as this can prevent a great deal of spyware hassle.

3) Please consider using an alternate browser. Mozilla's Firefox browser is fantastic; it is much more secure than Internet Explorer, immune to almost all known browser hijackers, and also has the best built-in popup blocker (as an added benefit!) that I have ever seen. If you are interested, Firefox may be downloaded from here:
http://www.mozilla.org/products/firefox/
I also recommand the following add-ons for Firefox, they will help keep you safe from malicious scripts or activeX exploits.
https://addons.mozilla.org/en-US/firefox/addon/722
https://addons.mozilla.org/en-US/firefox/addon/1865
https://addons.mozilla.org/en-US/firefox/addon/433

4) Also make sure to run your antivirus software regularly, and to keep it up-to-date.

To help you keep your software updated, please considering using this free software program that will check for program updates.
Update Checker

5) Finally, consider maintaining a firewall. Some good free firewalls are Kerio, or
Outpost
A tutorial on understanding and using firewalls may be found here.

Please also read Tony Klein's excellent article: How I got Infected in the First Place

Hopefully this should take care of your problems! Good luck. Big Grin

............................................................................................

Site Admin / Security Administrator

Virus Removal ~ OS Support ~ Have we helped you? Help us! ~ GeekChat
- Please PM me if I fail to respond within 24hrs.
18 Trojans... DXwU4
18 Trojans... VvYDg

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
Since this issue is resolved, this topic is closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter.

Everyone else, please open a new topic for your questions.

............................................................................................

Please be a GeekPolice fan on Facebook!

18 Trojans... Lambo-11

Have we helped you? Help us! | Doctor by day, ninja by night.

description18 Trojans... EmptyRe: 18 Trojans...

more_horiz
privacy_tip Permissions in this forum:
You cannot reply to topics in this forum