1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

dirote.exe problem

Discussion in 'Malware and Virus Removal Archive' started by pavehawk, 2004/10/08.

Thread Status:
Not open for further replies.
  1. 2004/10/08
    pavehawk

    pavehawk Inactive Thread Starter

    Joined:
    2004/10/08
    Messages:
    7
    Likes Received:
    0
    Hello all.
    A newbie here.
    I stumbled across this site whilst searching on google
    for information regarding a file called dirote.exe

    I noticed that people before me have posted
    about the same file so I have follwed some steps
    as sugested..Hopefully someone out there can help me!

    My pc on start up tries to connect (twice) to the internet(cable)
    then a error box comes up with the dirote.exe in it..

    I have Nortons Antivirus2004 pro/spybot and adware.

    Nortons detected suspisous files (iexplore.exe/winreg32.exe) but couldn't fix
    them,just suggesting deletion.I didn't do this but ran the spy programs and deleted all entries...

    I have ran the hijackthis program and have the following
    report

    Logfile of HijackThis v1.98.2
    Scan saved at 9:05:58 AM, on 10/9/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton AntiVirus\AdvTools\NPROTECT.EXE
    C:\WINDOWS\System32\nvsvc32.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\Program Files\Norton AntiVirus\SAVScan.exe
    C:\WINDOWS\System32\lkzx\dirote.exe
    C:\Program Files\Logitech\iTouch\iTouch.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Telstra\Cable Login\bpcable.exe
    C:\WINDOWS\System32\Microsoft.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\System32\RUNDLL32.EXE
    C:\Program Files\Logitech\MouseWare\system\em_exec.exe
    C:\Program Files\Internet Explorer\IEXPLORE.EXE
    C:\Program Files\WinRAR\WinRAR.exe
    C:\DOCUME~1\Andrew\LOCALS~1\Temp\Rar$EX00.500\HijackThis.exe
    C:\Program Files\Messenger\msmsgs.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.altavista.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
    O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [PRONoMgrWired] C:\Program Files\Intel\PROSetWired\NCS\PROSet\PRONoMgr.exe
    O4 - HKLM\..\Run: [BigPondCable] "C:\Program Files\Telstra\Cable Login\bpcable.exe" /r
    O4 - HKLM\..\Run: [Microsoft] Microsoft.exe
    O4 - HKLM\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe "
    O4 - HKLM\..\Run: [Advanced Tools Check] C:\PROGRA~1\NORTON~1\AdvTools\ADVCHK.EXE
    O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\RunServices: [Microsoft] Microsoft.exe
    O4 - HKLM\..\RunServices: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\RunServices: [$WindowsRegKey%update] iexplore.exe
    O4 - HKCU\..\Run: [Microsoft] Microsoft.exe
    O4 - HKCU\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKCU\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1096803209328

    I have searched around and from what I can tell the only way to remove safely is via booting up with linux? or dos disk and deleting that way...

    Can someone please help me to safley remove this dirote file/s?

    Thank-you in advance.
    pavehawk..
     
  2. 2004/10/08
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Welcome to WindowsBBS pavehawk :)

    First try scanning with Panda Activescan. Pretty sure their reference files can detect and remove that virus now, if it is indeed the same one. The folder name housing dirote.exe is different than we're used to seeing. Post back with a new HJT log after the scan, along with info on any detections that were uncleanable, if any.
     

  3. to hide this advert.

  4. 2004/10/08
    pavehawk

    pavehawk Inactive Thread Starter

    Joined:
    2004/10/08
    Messages:
    7
    Likes Received:
    0
    Thank-you very very much!

    Hello there Noahdfear.
    Firstly a BIG thanks to your quick reply and solution
    to my problem!

    I installed/scanned with the panda activescan and it removed 6 infected
    files within the system area. Ithen ran the scan again and results showed no infected files whatsover.

    I then ran hijackthis and have inserted the report below.
    Logfile of HijackThis v1.98.2
    Scan saved at 1:47:20 PM, on 10/9/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Logitech\iTouch\iTouch.exe
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Telstra\Cable Login\bpcable.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\System32\RUNDLL32.EXE
    C:\Program Files\Logitech\MouseWare\system\em_exec.exe
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton AntiVirus\AdvTools\NPROTECT.EXE
    C:\WINDOWS\System32\nvsvc32.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\Program Files\Norton AntiVirus\SAVScan.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Documents and Settings\Andrew\My Documents\My Received Files\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.altavista.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
    O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [PRONoMgrWired] C:\Program Files\Intel\PROSetWired\NCS\PROSet\PRONoMgr.exe
    O4 - HKLM\..\Run: [BigPondCable] "C:\Program Files\Telstra\Cable Login\bpcable.exe" /r
    O4 - HKLM\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe "
    O4 - HKLM\..\Run: [Advanced Tools Check] C:\PROGRA~1\NORTON~1\AdvTools\ADVCHK.EXE
    O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\RunServices: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\RunServices: [$WindowsRegKey%update] iexplore.exe
    O4 - HKCU\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKCU\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1096803209328
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab

    So it seems fine do you think?
    I cant thank you enough for all your help!
    It concerns me though that nortons antivirus didn't detect it though.
    The only thing I can put it down to is using winmx for music..
    Apart from that I don't D/L anything else..

    Thanks again.
    pavehawk.
     
  5. 2004/10/09
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Still a few things hanging around.

    Scan again with HijackThis and place a check next to the following entries. Close ALL other windows and click fix.

    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - HKLM\..\RunServices: [Microsoft Update Machine] Winregs32.exe
    O4 - HKLM\..\RunServices: [$WindowsRegKey%update] iexplore.exe
    O4 - HKCU\..\Run: [Microsoft Update Machine] Winregs32.exe
    O4 - HKCU\..\Run: [$WindowsRegKey%update] iexplore.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

    Right click My Computer and choose properties. On system restore tab, check the box to turn off. OK out.

    Go to start>run and type msconfig, hit enter. On the boot.ini tab, check the box next to /safeboot and OK. Yes to restart. This will restart your computer in safe mode. Logon to the Administrator account.

    Now in safe mode, you will need to show hidden files and folders, as well as system files.

    Open C:\WINDOWS\system and delete the files SOUNDMAN.EXE, Winregs32.exe and iexplore.exe if present.
    Open C:\Temp if present, select all and delete.
    Open C:\Windows\Temp, select all and delete.
    Open C:\Documents and settings\username\Local Settings\temp, select all and delete. Do this for all usernames.
    Open C:\Windows\Prefetch, select all and delete.
    Open My Computer, right click Local disk C: and choose properties, then disk cleanup. Check all boxes except compress old files and OK.
    Uncheck the /safeboot box in msconfig and ok to reboot.

    Back in windows, scan your PC with RAV. Check the box to autoclean. If any files are infected and uncleanable, click the report button then copy and paste it here, along with a new HijackThis log.
     
  6. 2004/10/09
    pavehawk

    pavehawk Inactive Thread Starter

    Joined:
    2004/10/08
    Messages:
    7
    Likes Received:
    0
    I did as you mentioned Dave,
    and there are viruses that couldn't be deleted using the ravscan.

    Scan started at 10/9/2004 3:37:12 PM

    Scanning memory...
    Scanning boot sectors...
    Scanning files...
    C:\Loader.exe - TrojanDownloader:Win32/Zdown.1_01 -> Infected
    C:\test.exe->(CABSfx)->f1ght.exe->(UPXW) - Virtool:Win32/HiddenRun.B -> Infected
    C:\test.exe->(CABSfx)->kfolder - IRC/Generic* -> Suspicious
    C:\Documents and Settings\Andrew\Local Settings\Temporary Internet Files\Content.IE5\23Q361AN\Loader[1].exe - TrojanDownloader:Win32/Zdown.1_01 -> Infected
    C:\Documents and Settings\Andrew\Local Settings\Temporary Internet Files\Content.IE5\23Q361AN\test[1].exe->(CABSfx)->f1ght.exe->(UPXW) - Virtool:Win32/HiddenRun.B -> Infected
    C:\Documents and Settings\Andrew\Local Settings\Temporary Internet Files\Content.IE5\23Q361AN\test[1].exe->(CABSfx)->kfolder - IRC/Generic* -> Suspicious
    C:\Documents and Settings\Andrew\Local Settings\Temporary Internet Files\Content.IE5\Q5CJI165\SYSsfitb[1].cab->d_loader.exe - TrojanDownloader:Win32/IstBar.ET -> Infected
    C:\WINDOWS\system32\lkzx\f1ght.exe->(UPXW) - Virtool:Win32/HiddenRun.B -> Infected

    Scanned
    ============================
    Objects: 18877
    Directories: 1218
    Archives: 678
    Size(Kb): -789467
    Infected files: 6

    Found
    ============================
    Viruses found: 3
    Suspicious files: 2
    Disinfected files: 0
    Mail files: 112





    Below is the hijackreport


    Logfile of HijackThis v1.98.2
    Scan saved at 3:50:12 PM, on 10/9/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
    C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Logitech\iTouch\iTouch.exe
    C:\Program Files\Telstra\Cable Login\bpcable.exe
    C:\Program Files\Logitech\MouseWare\system\em_exec.exe
    C:\Program Files\Common Files\Symantec Shared\ccApp.exe
    C:\WINDOWS\System32\RUNDLL32.EXE
    C:\Program Files\Norton AntiVirus\navapsvc.exe
    C:\Program Files\Norton AntiVirus\AdvTools\NPROTECT.EXE
    C:\WINDOWS\System32\nvsvc32.exe
    C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
    C:\Program Files\Norton AntiVirus\SAVScan.exe
    C:\Program Files\Messenger\msmsgs.exe
    C:\Documents and Settings\Andrew\My Documents\My Received Files\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.altavista.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
    O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [BigPondCable] "C:\Program Files\Telstra\Cable Login\bpcable.exe" /r
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe "
    O4 - HKLM\..\Run: [Advanced Tools Check] C:\PROGRA~1\NORTON~1\AdvTools\ADVCHK.EXE
    O4 - HKLM\..\Run: [SSC_UserPrompt] C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1096803209328
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoftware.com/activescan/as5/asinst.cab
    O16 - DPF: {A3009861-330C-4E10-822B-39D16EC8829D} (CRAVOnline Object) - http://www.ravantivirus.com/scan/ravonline.cab


    pavehawk.
     
  7. 2004/10/09
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Download the HOSTS File Reader. Save it to the desktop. Boot to safe mode again. Open Local Disk C: and delete loader.exe and test.exe. Then open C:\Documents and Settings\Andrew\Local Settings\Temporary Internet Files\Content.IE5, select all and delete. Open C:\WINDOWS\system32 and delete the folder lkzx. Empty the recycle bin and reboot back into Windows. Open the HOSTS file reader and click scan for hosts. Highlight what is found and then click use notepad. Copy/paste the contents with your next reply, along with it's location. Do another RAV scan too. Let us know if you have any problems deleting anything.
     
  8. 2004/10/09
    pavehawk

    pavehawk Inactive Thread Starter

    Joined:
    2004/10/08
    Messages:
    7
    Likes Received:
    0
    Hello again Dave.
    I managed to delete both the loader/test.exe files without any
    problems.Also the lkzx folder and contents of IE5.

    The Hosts program only found this below.



    # Copyright (c) 1993-1999 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    127.0.0.1




    Afterwhich I ran RAV and it came up clean.

    So now I think you have solved my problem!

    Once again I can't thank you enough for all your help.I will hope to donate
    to this site once I get organised..
     
  9. 2004/10/10
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Looks great! :) Now a couple recommendations. Do you have Spybot Version 1.3? If not, download it from my signature and install. Allow it to load SD Helper. Open it up and click mode on the toolbar, then advanced mode. Click immunize in the left pane, then immunize again, this time from above with the green + beside it. Click the link below that for SpywareBlaster, download, install and update. Check for updates weekly.
    Then download and install IESpyad.

    That will give you an added layer of protection against unwanted parasites.

    Happy to have helped, and always good to see someone become a contributing member. ;)

    Almost forgot! You can re-enable system restore. Reboot and check to make sure a restore point was set. If not, do a manual one.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.