1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Leaking Passwords?

Discussion in 'Malware and Virus Removal Archive' started by mannclann, 2011/01/22.

  1. 2011/01/23
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    Extras are last entry on page 1
     
  2. 2011/01/23
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I see :)
    Sorry for that....
    Give me a few moments....
     

  3. to hide this advert.

  4. 2011/01/23
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.

    =================================================================

    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      DRV:64bit: - [2010/12/27 12:01:13 | 000,049,752 | ---- | M] (Sunbelt Software) [Kernel | System | Running] -- C:\Windows\SysNative\drivers\SBREDrv.sys -- (SBRE)
      O9 - Extra 'Tools' menuitem : iMacros Web Automation - {0483894E-2422-45E0-8384-021AFF1AF3CD} - Reg Error: Value error. File not found
      O28:64bit: - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
      O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
      [2010/12/27 11:59:28 | 000,000,000 | ---D | C] -- C:\ProgramData\Lavasoft
      [2010/12/27 12:01:13 | 000,049,752 | ---- | M] (Sunbelt Software) -- C:\Windows\SysNative\drivers\SBREDrv.sys
      @Alternate Data Stream - 911 bytes -> C:\Users\mannclann\AppData\Local\Temp:BYD7bQW2h5TeHObuTM88II
      @Alternate Data Stream - 268 bytes -> C:\ProgramData\Temp:2B11E0DF
      @Alternate Data Stream - 208 bytes -> C:\ProgramData\Temp:F35A93AD
      @Alternate Data Stream - 1099 bytes -> C:\Users\mannclann\AppData\Local\VgNEW2o1:FlRed6dJytdf8DX7sgm8pdGm0AaY
      @Alternate Data Stream - 1073 bytes -> C:\ProgramData\Microsoft:28AwOJDhF4UwRL4pzozm
      @Alternate Data Stream - 1044 bytes -> C:\ProgramData\Microsoft:hOhLvuURQ0mquu7HPpLdI0J
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    =================================================================

    Last scans....

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

      NOTE SecurityCheck may produce some false warning(s), so leave the results reading to me.


    2. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.


    3. Please run a free online scan with the ESET Online Scanner

    • Disable your antivirus program
    • Tick the box next to YES, I accept the Terms of Use
    • Click Start
    • IMPORTANT! UN-check Remove found threats
    • Accept any security warnings from your browser.
    • Check Scan archives
    • Click Start
    • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    • When the scan completes, push List of found threats
    • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    • NOTE. If Eset won't find any threats, it won't produce any log.
     
  5. 2011/01/24
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    The following files from the ESET scan (farther down) are files that I downloaded off of our server (linux) that were put there by hackers so I could see what they were.

    These files from the ESET scan (farther down) are on a removable drive that was from another computer
    OTL Fix

    All processes killed
    ========== OTL ==========
    Service SBRE stopped successfully!
    Service SBRE deleted successfully!
    C:\Windows\SysNative\drivers\SBREDrv.sys moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{0483894E-2422-45E0-8384-021AFF1AF3CD}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0483894E-2422-45E0-8384-021AFF1AF3CD}\ deleted successfully.
    64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\\{AEB6717E-7E19-11d0-97EE-00C04FD91972} deleted successfully.
    64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AEB6717E-7E19-11d0-97EE-00C04FD91972}\ not found.
    Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\\{AEB6717E-7E19-11d0-97EE-00C04FD91972} deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AEB6717E-7E19-11d0-97EE-00C04FD91972}\ not found.
    C:\ProgramData\Lavasoft\License folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\ToolBox\LT folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\ToolBox\AutoStart Manager folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\ToolBox folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\Resources folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\Languages folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update\Drivers folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Update folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\ThreatWork Alliance\Submit folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\ThreatWork Alliance folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Statistics folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Quarantine folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\MiniMessage folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Logs folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Defs\Extended folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Defs folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Crashdumps folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware\Backup folder moved successfully.
    C:\ProgramData\Lavasoft\Ad-Aware folder moved successfully.
    C:\ProgramData\Lavasoft folder moved successfully.
    File C:\Windows\SysNative\drivers\SBREDrv.sys not found.
    ADS C:\Users\mannclann\AppData\Local\Temp:BYD7bQW2h5TeHObuTM88II deleted successfully.
    ADS C:\ProgramData\Temp:2B11E0DF deleted successfully.
    ADS C:\ProgramData\Temp:F35A93AD deleted successfully.
    ADS C:\Users\mannclann\AppData\Local\VgNEW2o1:FlRed6dJytdf8DX7sgm8pdGm0AaY deleted successfully.
    ADS C:\ProgramData\Microsoft:28AwOJDhF4UwRL4pzozm deleted successfully.
    ADS C:\ProgramData\Microsoft:hOhLvuURQ0mquu7HPpLdI0J deleted successfully.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Temp folder emptied: 859792 bytes
    ->Temporary Internet Files folder emptied: 506722 bytes
    ->Java cache emptied: 236100 bytes
    ->FireFox cache emptied: 49115689 bytes
    ->Flash cache emptied: 1086 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 0 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 32902 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 48.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb

    OTL
    OTL by OldTimer - Version 3.2.20.5 log created on 01232011_222057

    Files\Folders moved on Reboot...
    C:\Users\mannclann\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

    Registry entries deleted on Reboot...


    Security Check - Checkup


    Results of screen317's Security Check version 0.99.7
    Windows 7 (UAC is enabled)
    Internet Explorer 8
    ``````````````````````````````
    Antivirus/Firewall Check:

    Windows Firewall Enabled!
    Norton Internet Security
    McAfee Security Scan Plus
    WMI entry may not exist for antivirus; attempting automatic update.
    ```````````````````````````````
    Anti-malware/Other Utilities Check:

    Malwarebytes' Anti-Malware
    AVS Registry Cleaner version 1.1
    Java(TM) 6 Update 23
    Out of date Java installed!
    Adobe Flash Player 10.1.102.64
    Adobe Reader 9.4.1
    Out of date Adobe Reader installed!
    Mozilla Firefox (3.6.13)
    Mozilla Thunderbird (3.1.7)
    ````````````````````````````````
    Process Check:
    objlist.exe by Laurent

    Norton ccSvcHst.exe
    ``````````End of Log````````````


    ESETScan

    C:\Marketing\MRR\Graphics-Templates\MRR_BIG_Shiny_Buttons_glassyMRR0923.zip probably a variant of Win32/PSW.LdPinch.GZQRKJP trojan
    C:\Rick\shellz.php PHP/Rst.AK trojan
    C:\Rick\FilesFound\404.php PHP/Agent.IK trojan
    C:\Websites\FIXIT\wellsfargo.com\Coco.php PHP/Rst.AK trojan
    K:\Documents and Settings\All Users\Application Data\AOL Downloads\SUD4131\setup.exe probably a variant of Win32/Agent.HZHBURL trojan
    K:\Documents and Settings\Richard Mann\Local Settings\Temporary Internet Files\Content.IE5\M6OPJMIQ\sexy-and-hot[1].htm HTML/ScrInject.B.Gen virus
     
  6. 2011/01/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Update Adobe Reader

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

    Alternatively, you can uninstall Adobe Reader (33.5 MB), download and install Foxit PDF Reader(3.5MB) from HERE.
    It's a much smaller file to download and uses a lot less resources than Adobe Reader.
    Note: When installing FoxitReader, make sure to UN-check any pre-checked toolbar, or other garbage.

    ============================================================

    Run OTL
    • Under the [color= "#0000FF"]Custom Scans/Fixes[/color] box at the bottom, paste in the following

      Code:
      :OTL
      
      :Services
      
      :Reg
      
      :Files
      C:\Marketing\MRR\Graphics-Templates\MRR_BIG_Shiny_Buttons_glassyMRR0923.zip 
      C:\Rick\shellz.php PHP/Rst.AK trojan
      C:\Rick\FilesFound\404.php 
      C:\Websites\FIXIT\wellsfargo.com\Coco.php 
      K:\Documents and Settings\All Users\Application Data\AOL Downloads\SUD4131\setup.exe 
      K:\Documents and Settings\Richard Mann\Local Settings\Temporary Internet Files\Content.IE5\M6OPJMIQ\sexy-and-hot[1].htm
      
      :Commands
      [purity]
      [emptytemp]
      [emptyflash]
      [Reboot]
      
    • Then click the [color= "#FF0000"]Run Fix[/color] button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.

    -=============================================================

    Your computer is clean :)

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure, Windows Updates are current.

    4. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    7. Run Temporary File Cleaner (TFC) weekly.

    8. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    10. Run defrag at your convenience.

    11. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

    12. Please, let me know, how your computer is doing.
     
  7. 2011/01/24
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    Hi,

    Thanks so much for all your help. I will be sending donation to help keep you guys up and running.

    The OTL I just ran did not move the:

    Can I just delete that manually before completing the rest of the process?

    Thanks

    Rick
     
  8. 2011/01/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please, post OTL fix log and I'll see what happened.
     
  9. 2011/01/24
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    All processes killed
    ========== OTL ==========
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    C:\Marketing\MRR\Graphics-Templates\MRR_BIG_Shiny_Buttons_glassyMRR0923.zip moved successfully.
    Invalid Switch: Rst.AK trojan
    C:\Rick\FilesFound\404.php moved successfully.
    C:\Websites\FIXIT\wellsfargo.com\Coco.php moved successfully.
    K:\Documents and Settings\All Users\Application Data\AOL Downloads\SUD4131\setup.exe moved successfully.
    K:\Documents and Settings\Richard Mann\Local Settings\Temporary Internet Files\Content.IE5\M6OPJMIQ\sexy-and-hot[1].htm moved successfully.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Temp folder emptied: 15071325 bytes
    ->Temporary Internet Files folder emptied: 5998130 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 46902933 bytes
    ->Flash cache emptied: 456 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 1507958 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 32902 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 66.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb


    OTL by OldTimer - Version 3.2.20.5 log created on 01242011_185138

    Files\Folders moved on Reboot...
    C:\Users\mannclann\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

    Registry entries deleted on Reboot...
     
  10. 2011/01/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Oh, my script mistake.
    Sorry for that :)
    You can delete the file manually and empty recycle bin aftwrwards.
     
  11. 2011/01/24
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    All processes killed
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Temp folder emptied: 15067200 bytes
    ->Temporary Internet Files folder emptied: 90990 bytes
    ->Java cache emptied: 0 bytes
    ->FireFox cache emptied: 29227776 bytes
    ->Flash cache emptied: 456 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 420932 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 32902 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 43.00 mb


    [EMPTYFLASH]

    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: mannclann
    ->Flash cache emptied: 0 bytes

    User: Public

    Total Flash Files Cleaned = 0.00 mb

    Restore point Set: OTL Restore Point

    OTL by OldTimer - Version 3.2.20.5 log created on 01242011_193646

    Files\Folders moved on Reboot...
    C:\Users\mannclann\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

    Registry entries deleted on Reboot...
     
  12. 2011/01/24
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Whenever ready....
     
  13. 2011/01/25
    mannclann

    mannclann Inactive Thread Starter

    Joined:
    2011/01/22
    Messages:
    45
    Likes Received:
    0
    As far as I can tell everything is fine. Once I have all three computers checked and ensure they are all clean then I will be able to better tell that is was or wasn't our desktops causing our problems.

    Thanks again

    Rick
     
  14. 2011/01/25
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    You're very welcome :)

    Good luck and stay safe :)
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.