Trojans etc. that steal passwords (Resolved)

A few more things that I want to mention:

Before my computer restarted, I think there about were 4 named threats (or whatever it is called) and 8 infections detected.

Also, I ran spybot and there is no more "Win32.TDSS.rtk" but there is still “Microsoft.WindowsSecurityCenter_disabled” (but everything in the windows security center is disabled, like the firewall etc.). Also, there was something called "doubleclick," which I might have gotten because I was browsing the internet (it was a cookie entry).

Do you think it's safe to log into email accounts and other accounts now? Or is there still a chance that something will steal my passwords?
 
Sorry, just one more thing. When my computer restarted, the virus scan was scanning a drive other than the C drive (I think it was D). It actually detected an infection on my D drive. I've never had any viruses detected on my D and E drive in the past and I deleted all cracks etc. from those drives.
 
The computer rebooting could be caused by many things, I doubt it was spyware though.

The security center disabled isn't automatically a bad thing,
if you know about it, and/or disabled it yourself, then there is no problem.

Kaspersky lets you choose which drive to scan, so scan the drives separately and post each log individually.

There is no sign of active infection now, I am just checking for leftovers.
You should be safe to use the computer normally.
 
I attached the html file (it is zipped) for the scan on my C drive. My D and E drive had no infections. I ran Kaspersky with my norton antivirus on, though. What problems could this have caused?
 
I ran Kaspersky with my norton antivirus on, though. What problems could this have caused?

No problems as such, it can slow the scan down though.



OTMoveIt
Please download OTM by OldTimer and save it to your desktop
  • Double-click OTM.exe to run it.
  • Copy the lines in the codebox below. ( Make sure you include :Processes )
Code:
:Processes
:Files
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\*.* /s
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-51fad18-57cc5087.zip
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\K5IN8TEN\Macromedia_Flash[1].exe
:Commands
[Purity]
[EmptyTemp]
  • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
  • - Close ALL open windows (especially Internet Explorer!)-
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar), and paste it in your next reply.
  • Close OTM

If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes.
 
All processes killed
========== PROCESSES ==========
========== FILES ==========
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-2f60fe3d moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-2f60fe3d.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-481992ff moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-481992ff.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-67d61c14 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-67d61c14.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-781cfae0 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\1500b6ac-781cfae0.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-44175c49 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-44175c49.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-64e88299 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-64e88299.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-6718f3bf moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-6718f3bf.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-7d1fb929 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\232f2a6c-7d1fb929.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\34935bac-2a055d10 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\34935bac-2a055d10.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\34935bac-4013a67b moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\34935bac-4013a67b.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\50f3f12c-1696c731 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\50f3f12c-1696c731.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\56a96bec-2bf0186d moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\56a96bec-2bf0186d.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\56a96bec-39e2cbf3 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\56a96bec-39e2cbf3.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\64d2ecec-6bf29abd moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\64d2ecec-6bf29abd.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\64d2ecec-6d4e685e moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\64d2ecec-6d4e685e.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\6a59012c-3ba0ffcc moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\6a59012c-3ba0ffcc.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\6a59012c-4851f9a8 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\6a59012c-4851f9a8.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-317ef9c2 moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-317ef9c2.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-33ba802c.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-374ec35b moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-374ec35b.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-48f860ed moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\6.0\44\772676c-48f860ed.idx moved successfully.
C:\Documents and Settings\Alex\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\jvmimpro.jar-51fad18-57cc5087.zip moved successfully.
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\K5IN8TEN\Macromedia_Flash[1].exe moved successfully.
========== COMMANDS ==========

[EMPTYTEMP]

User: Alex
->Temp folder emptied: 74700225 bytes
->Temporary Internet Files folder emptied: 3610341 bytes
->Java cache emptied: 93163437 bytes
->FireFox cache emptied: 97236614 bytes

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 67 bytes

User: LocalService
->Temp folder emptied: 0 bytes
File delete failed. C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat scheduled to be deleted on reboot.
->Temporary Internet Files folder emptied: 81647 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

%systemdrive% .tmp files removed: 0 bytes
C:\WINDOWS\85EBB28365AF4C539EBE7C0A232762F7.TMP folder deleted successfully.
C:\WINDOWS\msdownld.tmp folder deleted successfully.
%systemroot% .tmp files removed: 1420036 bytes
%systemroot%\System32 .tmp files removed: 688657 bytes
Windows Temp folder emptied: 32167 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 258.41 mb


OTM by OldTimer - Version 3.0.0.5 log created on 07282009_133046

Files moved on Reboot...

Registry entries deleted on Reboot...
 
Can you recommend me a good free antivirus program? I'm looking for features such as autoprotect/live protection, email protection, live updates etc.

I read about avast, and it seems to be better than AVG and avira. What do you think of it?
 
I read about avast, and it seems to be better than AVG and avira. What do you think of it?

I use Avast, ..... that should tell you enough about it :)


Congratulations your logs look clean :)

Let's see if I can help you keep it that way

First lets tidy up



Uninstall Combofix
  • This will clear your System Volume Information restore points and remove all the infected files that were quarantined
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK. Note the space between the X and the /U, it needs to be there.
    • CF_Cleanup.png



Uninstall OTMoveIt (OTM.exe)
  • Open OTMoveIt Click Cleanup,
  • When a box pops up click YES.


You can also delete any logs we have produced, and empty your Recycle bin.

----------------------------------------------------------- -----------------------------------------------------------

The following is some info to help you stay safe and clean.


You may already have some of the following programs, but I include the full list for the benefit of all the other people who will be reading this thread in the future.
( Vista users must ensure that any programs are Vista compatible BEFORE installing )

Online Scanners
I would recommend a scan at one or more of the following sites at least once a month.

http://www.pandasecurity.com/activescan
http://www.kaspersky.com/kos/eng/partner/71706/kavwebscan.html

!!! Make sure that all your programs are updated !!!
Secunia Software Inspector does all the work for you, .... see HERE for details

AntiSpyware

  • AntiSpyware is not the same thing as Antivirus.
    Different AntiSpyware programs detect different things, so in this case it is recommended that you have more than one.
    You should only have one running all the time, the other/s should be used "on demand" on a regular basis.
    Most of the programs in this list have a free (for Home Users ) and paid versions,
    it is worth paying for one and having "realtime" protection, unless you intend to do a manual scan often.
  • Spybot - Search & Destroy <<< A must have program
    • It includes host protection and registry protection
    • A hosts file is a bit like a phone book, it points to the actual numeric address (i.e. the IP address) from the human friendly name of a website. This feature can be used to block malicious websites
  • MalwareBytes Anti-malware <<< A New and effective program
  • a-squared Free <<< A good "realtime" or "on demand" scanner
  • superantispyware <<< A good "realtime" or "on demand" scanner

Prevention

  • These programs don't detect malware, they help stop it getting on your machine in the first place.
    Each does a different job, so you can have more than one
  • Winpatrol
    • An excellent startup manager and then some !!
    • Notifies you if programs are added to startup
    • Allows delayed startup
    • A must have addition
  • SpywareBlaster 4.0
    • SpywareBlaster sets killbits in the registry to prevent known malicious activex controls from installing themselves on your computer.
  • SpywareGuard 2.2
    • SpywareGuard provides real-time protection against spyware.
    • Not required if you have other "realtime" antispyware or Winpatrol
  • ZonedOut
    • Formerly known as IE-SPYAD, adds a long list of sites and domains associated with known advertisers and marketers to the Restricted sites zone of Internet Explorer.
  • MVPS HOSTS
    • This little program packs a powerful punch as it blocks ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.
    • For information on how to download and install, please read this tutorial by WinHelp2002.
    • Not required if you are using other host file protections

Internet Browsers

  • Microsoft has worked hard to make IE.7 a more secure browser, unfortunately whilst it is still the leading browser of choice it will always be under attack from the bad guys.
    Using a different web browser can help stop malware getting on your machine.
    • Make your Internet Explorer more secure - This can be done by following these simple instructions:
      1. From within Internet Explorer click on the Tools menu and then click on Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        • Change the Download signed ActiveX controls to Prompt
        • Change the Download unsigned ActiveX controls to Disable
        • Change the Initialise and script ActiveX controls not marked as safe to Disable
        • Change the Installation of desktop items to Prompt
        • Change the Launching programs and files in an IFRAME to Prompt
        • Change the Navigate sub-frames across different domains to Prompt
        • When all these settings have been made, click on the OK button.
        • If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.
    If you are still using IE6 then either update, or get one of the following.
    • FireFox
      • With many addons available that make customization easy this is a very popular choice
      • NoScript and AdBlockPlus addons are essential
    • Opera
      • Another popular alternative
    • Netscape
      • Another popular alternative
      • Also has Addons available

Cleaning Temporary Internet Files and Tracking Cookies

  • Temporary Internet Files are mainly the files that are downloaded when you open a web page.
    Unfortunately, if the site you visit is of a dubious nature or has been hacked, they can also be an entry point for malware.
    It is a good idea to empty the Temporary Internet Files folder on a regular basis.

    Tracking Cookies are files that websites use to monitor which sites you visit and how often.
    A lot of Antispyware scanners pick up these tracking cookies and flag them as unwanted.
    CAUTION :- If you delete all your cookies you will lose any autologin information for sites that you visit, and will need your passwords

    Both of these can be cleaned manually, but a quicker option is to use a program
  • ATF Cleaner
    • Free and very simple to use
  • CCleaner
    • Free and very flexible, you can chose which cookies to keep

Also PLEASE read this article.....So How Did I Get Infected In The First Place

The last and most important thing I can tell you is UPDATE.
If you don't update your security programs (Antivirus, Antispyware even Windows) then you are at risk.
Malware changes on a day to day basis. You should update every week at the very least.

If you follow this advice then (with a bit of luck) you will never have to hear from me again :D


If you could post back one more time to let me know everything is OK, then I can have this thread archived.

Happy surfing K'
 
As far as I can tell, there are no more problems.

Thank you so much for your help!

I have some questions, though.

Do you recommend that I turn windows firewall on? Does it actually matter?

Should I use spybot’s teatimer as my realtime spyware scanner (I have spyware blaster, but I’m guessing that works differently)? Is it actually good (it’s extremely resource intensive)? What would be better for realtime scanning? If I use teatimer, should I put a check next to “use source whitelists” and “use entry black and white lists”?

One more thing- for avast, should I put he sensitivity for everything (resident protection, instant messenging etc.) on the highest setting? What problems could this cause?

Thanks again for all the help.
 
1) Do you recommend that I turn windows firewall on? Does it actually matter?
~
It depends, if you have a router then it won't make much difference.
A third party firewall is better than Windows firewall

2) Should I use spybot’s teatimer as my realtime spyware scanner (I have spyware blaster, but I’m guessing that works differently)? Is it actually good (it’s extremely resource intensive)? If I use teatimer, should I put a check next to “use source whitelists” and “use entry black and white lists”?
~
Teatimer isn't a spyware scanner as such, it just monitors the registry for changes.
It is good yes.
I don't know of any free realtime scanners.
Yes, you should use those lists.

3) One more thing- for avast, should I put he sensitivity for everything (resident protection, instant messenging etc.) on the highest setting? What problems could this cause?
~
the highest setting should be "High", you should leave it set at that.
 
I have a router, and I think it has a firewall (do most routers have firewalls?). Does that mean I don't need to use the windows firewall? Would it do anything if I turned it on?
 
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note:If it has been four days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than four days since your last response and you need the thread re-opened, please send me or MOD a private message (pm). A valid, working link to the closed topic is required.
 
Back
Top