Smitfraud and torpig

Did the ATF Cleaner but torpig still comes up in Spybot, when trying to fix it prompts me with a warning saying:

some problems couldn't be fixed; the reason could be that the associated files are still in use (in memeory). This could be fixed after a restart. Mayb Spybot-S&D run on your next startup?

I will reboot and hopefully it will kill it :-)

otherwise i trust that you are right in that they just are imaginary and that the progs are oversensitive......
 
Before reboot i ran XoftSpySE and it found:

2 Torpig files:
C:\programmer\fælles filer\microsoft shared\web folders\ibm00002.dll
C:\programmer\fælles filer\microsoft shared\web folders\ibm00002.dll

5 Torpig (type: Registry Key):
1 in system\currentcontrolset\services\ntmlsvc
1 in system\currentcontrolset\services\ntmlsvc\enum
1 in system\currentcontrolset\services\ntmlsvc\parameters
1 in system\currentcontrolset\services\ntmlsvc\security
1 in system\controlset001\services\ntmlsvc\parameters

3 Win32.Sality.X (type: Registry Value):
1 in system\currentcontrolset\services\ndisfileservices32\enum\0
1 in system\currentcontrolset\services\ndisfileservices32\enum\count
1 in system\currentcontrolset\services\ndisfileservices32\enum\nextinstance

11 Torpig (type Registry Value):
1 in system\currentcontrolset\services\ntmlsvc\imagepath
1 in system\controlset001\services\ntmlsvc\parameters\servicedll
1 in system\currentcontrolset\services\ntmlsvc\parameters\servicedll
1 in system\currentcontrolset\services\ntmlsvc\errorcontrol
1 in system\currentcontrolset\services\ntmlsvc\objectname
1 in system\currentcontrolset\services\ntmlsvc\start
1 in system\currentcontrolset\services\ntmlsvc\type
1 in system\currentcontrolset\services\ntmlsvc\enum\count
1 in system\currentcontrolset\services\ntmlsvc\enum\nextinstance
1 in system\currentcontrolset\services\ntmlsvc\enum\0
1 in system\currentcontrolset\services\ntmlsvc\security\security

This seems like a lot of troubles still left but as i'm not a pro i might fear for nothing?????????

Will see after the reboot (which means that i won't remove the XoftSpySE found files untill after reboot).
By the way Spybot only found the two usual files :-) :
C:\WINDOWS\Temp\$_2341234.TMP
C:\WINDOWS\Temp\$_2341233.TMP but these i can't find so they might be gone as you told me.
 
that being

C:\programmer\fælles filer\microsoft shared\web folders\ibm00001.dll
C:\programmer\fælles filer\microsoft shared\web folders\ibm00002.dll

in the first quote of previous message
sorry :)
 
Hi

Yes it looks like there are torpig files/entries.

I suggest changing all online passwords (torpig is keylogger).

Did XoftSpySE remove those successfully after reboot?
 
XofSpySE removed all but the .dll files...

and didn't find anything other than those two files in the additional scan i made....

Is it possible to remove those two??

C:\programmer\fælles filer\microsoft shared\web folders\ibm00001.dll
C:\programmer\fælles filer\microsoft shared\web folders\ibm00002.dll
 
Hi

Please run Killbox.

Select "Delete on Reboot" and "All files"

Copy the file names below to the clipboard by highlighting them and pressing Control-C:

C:\programmer\fælles filer\microsoft shared\web folders\ibm00001.dll
C:\programmer\fælles filer\microsoft shared\web folders\ibm00002.dll

Go to the File menu, and choose "Paste from Clipboard".

Click the red-and-white "Delete File" button. Click "Yes" at the Delete on Reboot prompt. Click "No" at the Pending Operations prompt.

If you receive a message such as: "Component 'MsComCtl.ocx' or one of its dependencies not correctly registered: a file is missing or invalid." when trying to run TheKillbox, click here to download and run missingfilesetup.exe. Then try TheKillbox again..

If your computer does not restart automatically, please restart it manually.

Empty this folder:

C:\!KillBox

Empty Recycle Bin

Are those gone now?
 
Well i thought that was what i had to do...

It seems as they are gone :eek:

XoftSpySE can't find the torpig and Spybot still only finds these:

C:\WINDOWS\Temp\$_2341233.TMP
C:\WINDOWS\Temp\$_2341234.TMP
+ some tracking coockies.

BUT...XoftSpySE still finds the:

3 Win32.Sality.X (type: Registry Value):
1 in system\currentcontrolset\services\ndisfileservices32\enum\0
1 in system\currentcontrolset\services\ndisfileservices32\enum\count
1 in system\currentcontrolset\services\ndisfileservices32\enum\nextinstance
and some coockies :-)

It calls the Win32.Sality.X for severe risk....

Is it??? :sad:
 
Actually i just had a scan where they (Win32.Sality.X) were not found (before the previous post) but now they are back???

weird
 
Hi

Well, those reg keys aren't very bad if there are no corresponding files.

First we'll need to backup registry:

Start -> Run -> regedit -> ok. Then File -> Export. Give it a name and press Save.

Now, go to Start > Run, and copy/paste the following into the Open box:
sc stop ndisfileservices32, Click: OK
Then type sc delete ndisfileservices32, Click: OK

Go in regedit here (if still exists):

HKEY_LOCAL_MACHINE\system\currentcontrolset\services\ndisfileservices32

Right-click and delete that key.

Run another scan with XoftSpySE and tell if it still finds those?

If it does, we need further research.
 
It can't find it now:D:

BUT...

True Sword 4 tester (trial download)
finds this malicious components: each quote is for a new malicious entry in the test:

Malicious component in file: C:\Windows\system32\hidphone.tsp which is a part of the "Win32.trojandownloader.zlob malware"
this is solved with one of the three free repairs the program allowes but don't know if it will return???

Known DIALER Netvision in startup list
this is solved with one of the three free repairs the program allowes but don't know if it will return???

Malicious Registry Value "quicktime task" at key HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\ which is a part of "CWS" hijacker

Malicious registry value "NextInstance" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "Service" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "Legacy" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "ConfigFlags" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "Class" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "ClassGUID" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan

Malicious registry value "DeviceDesc" at key HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000 which is part of "win32.sality.x" spyware/trojan
this is solved with one of the three free repairs the program allowes but don't know if it will return???

Checked these pages for info on the win32.sality.x but did nothing but downloading the true sword to test my cpu and used the three free repair slots:
http://www.virusbuster.hu/en/viruslab/descriptions/sality.x
http://www.securitystronghold.com/gates/win32.sality.x.html#Manual

Just for the fun of it i ran XoftSpySE again as i have read that it might return after a while.....AND....
It found these:

system\currentcontrolset\enum\root\legacy_ndisfileservices32\0000\services
system\currentcontrolset\enum\root\legacy_ndisfileservices32\0000\legacy
system\currentcontrolset\enum\root\legacy_ndisfileservices32\0000\configflags
system\currentcontrolset\enum\root\legacy_ndisfileservices32\0000\class
system\currentcontrolset\enum\root\legacy_ndisfileservices32\0000\classguid

which pretty much is similar to those found by true sword and not repaired though some is not found....

Believe the problem to be bigger than first thought...but Torpig is gone.....
 
Hi

"Malicious component in file: C:\Windows\system32\hidphone.tsp which is a part of the "Win32.trojandownloader.zlob malware"

False positive, I have that file, too.

"Malicious Registry Value "quicktime task" at key HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\ which is a part of "CWS" hijacker"

As well false positive, related to quicktime.

Rest are real.

  • Download Registrar Lite from here and install it.
  • Start Registrar Lite.
  • Type in to Address field this and click ok: HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32
  • Right-click that key and choose Properties. Click "Take ownership".
  • Right-click that key again and choose Delete.

If you can't do it, perform same steps for subkeys like this:

HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000

Does it still finds those?
 
Hi, i can find both of them and take ownership, but when trying to delete it promtps me with an "acces denied"....

What to do then??
 
Hi

Are there any subkeys in HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_NDISFILESERVICES32\0000?

If so, do that process first to them, please :)
 
Ah why didn't i think about that myself from the last post you wrote about the \0000 folder....stupid me...and thanks...

Well the True Sword tester can't find anything else (on the C:\) but coockies and some SunjavaUpdateSched in the startup list that it calls NON-malicious problemware.

On the D:\ the True sword found also the SunJava (might be the same??) and
the same coockies

XoftSpySE found some coockies but none of the win32.sality.x stuff as before :)

On the F:\ the True Sword found these (but you told before that they were inactive so it might not be a problem right?)

Malicious component in file F:\System Volume Information\_Restore{4D25720C-D913-4297-878B-534CFAB8E819}\RP69\A0011853.exe which is a part of "Adware.P2PNetworking" spyware/trojan

Malicious component in file F:\programmer\fælles filer\CMEII\store\core\appmgrgui.zip which is a part of "gain" data miner

Malicious component in file F:\Windows\System\chktrust.exe which is part of the "ExactSearchBar" browser helper object

Malicious component in file F:\Windows\System\Macromed\shockwave 8\xtras\download\thegroovealliance\3Dgroovextrav18\groove.x32 which is part of "Coulomb Dialer" dialer

So it looks much better now as i'm not getting any problems in my scans....
 
Hi

Yes, they are inactive.

"Malicious component in file F:\System Volume Information\_Restore{4D25720C-D913-4297-878B-534CFAB8E819}\RP69\A0011853.exe which is a part of "Adware.P2PNetworking" spyware/trojan"

In system restore, we'll get rid of it later.

Delete this:

F:\programmer\fælles filer\CMEII

"Malicious component in file F:\Windows\System\chktrust.exe which is part of the "ExactSearchBar" browser helper object"

False positive.

Delete this:

F:\Windows\System\Macromed\shockwave 8\xtras\download\thegroovealliance\3Dgroovextrav18\groove.x32

Any more problems?
 
Well it seems as there are not...

Spybot still detects the good old torpig .tmp files...
and some coockies....

XoftSpySE can't find anything but the coockies.

True Sword finds on the
C:\ - nothing malicious
D:\ - nothing malicious
F:\ -
Malicious component in file F:\System Volume Information\_Restore{4D25720C-D913-4297-878B-534CFAB8E819}\RP69\A0011853.exe which is a part of "Adware.P2PNetworking" spyware/trojan
But that one you said we'll get rid of later. :)

Malicious component in file F:\Windows\System\chktrust.exe which is part of the "ExactSearchBar" browser helper object
but that was a false positive. :)

By the way, i must say i have taken an honour in creating on of the longest thread in here :laugh:
 
Hi

Then you're clean!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) ZoneAlarm
2) Agnitum
3) Sunbelt/Kerio
4) Comodo

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. A malicious site could render Java content under older, vulnerable versions of Sun's software if the user has not removed them. Please follow these steps to remove older version Java components and update:
  • Download the latest version of Java Runtime Environment (JRE) 6 Update 2 and save it to your desktop.
  • Scroll down to where it says "Java Runtime Environment (JRE) 6u2...allows end-users to run Java applications".
  • Click the "Download" button to the right.
  • Read the License Agreement and then check the box that says: "Accept License Agreement".
  • The page will refresh.
  • Click on the link to download Windows Offline Installation and save the file to your desktop.
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Settings > Control Panel, double-click on Add/Remove Programs and remove all older versions of Java.
  • Check (highlight) any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java versions.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on jre-6u2-windows-i586-p.exe to install the newest version.

  • Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:
    Windows XP System Restore Guide

Reenable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

See this link for a listing of some online & their stand-alone antivirus programs:

Virus, Spyware, and Malware Protection and Removal Resources


  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer
  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety

  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
  • Comodo BOCLEAN <= Stop identity thieves from getting personal information. Instantly detects well over 1,000,000 unique, variant and repack malware in total. And it's free.
  • Winpatrol <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
    Using Winpatrol to protect your computer from malicious software

Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

Happy surfing and stay clean!
 
Since this issue appears resolved ... this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team
a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.
 
Back
Top