Infected Dell Inspiron 6000 Laptop

I was given a Dell Inspiron 6000 to check. The user believed it was infected. The system was running Windows XP Home Edition with Service Pack 2. I performed an image backup of the disk drive in the system to an external USB drive using Symantec's Norton Ghost 2003 (see Ghost Backup Info).

I then checked the system. There were two accounts listed at the welcome screen. I logged in under the DMW account. When I tried to bring up the Task Manager, I saw the following window.

Task Manager
Task Manager has been disabled by your administrator.

OK
 

When I tried running tasklist from a command prompt, I saw the following.

C:\Documents and Settings\DMW>tasklist
'tasklist' is not recognized as an internal or external command,
operable program or batch file.

There was a problem with the active desktop display. A "Restore my Active Desktop" button appeared on the desktop, but clicking on it would return me to the Active Desktop Recovery desktop after a short time.

I logged off the DMW account and logged into the DCW account. In the system tray at the lower right-hand corner of the screen, I saw the following warning.

Your computer is infected!

Windows has detected spyware infection!

It is recommended to use special antispyware tools to prevent
data loss. Windows will now download and install the most up-to-date antispyware for you.

Click here to protect your computer from spyware!

This was later replaced with the message below.

Your computer is in Danger!

Windows Security Center has detected spyware/adware
infection! Click here to install the latest protection tools!

The messages were coming from a program represented in the system tray by a red circle with a white "X" within it. It isn't unusual for rogue antispyware software to display such warnings. I've seen SpyAxe do the same thing on another system.

I tried bringing up the Task Manager under this account, but got the same "Task Manager had been disabled by your administrator" message as under the other account.

When I rebooted the system with a network cable connected to it and logged into the DCW account, I saw the background for the desktop, but nothing else. I rebooted again without the network cable connected and, when I logged into the DCW account, I saw the same background, but also the desktop shortcuts, the system tray, etc. I.e. the login completed normally.

When I checked the directories under C:\Program Files\, I saw a BraveSentry directory. BraveSentry is included in the Spyware Warrior list of Rogue/Suspect Anti-Spyware Products. The following information is included on the software at the Spyware Warrior site.

Brave Sentry bravesentry.com aggressive advertising, desktop hijacking (1, 2); false positives work as goad to purchase; inadequate scan reporting; same app as DIARemover, MalwareAlarm, Mr.AntiSpy, PestCapture, PestTrap, PestWiper, SpyDemolisher, SpyMarshal, SpySheriff, SpyTrooper, SpywareNo, & Spyware-Stop [A: 3-9-06 / U: 3-9-06]

The date on the files in the BraveSentry folder was October 23, 2007. All of the files in the directory, except the BraveSentry application, had a time of 5:15 P.M. listed. The BraveSentry application had a time of 7:15 P.M. listed; it was also listed as zero bytes in size.

Looking under Add or Remove Programs, I saw MyWay Search Assistant, Suprisingly, I found someone posting at CastleCops® MyWaySA stating that "Dell seems to be including MyWay in the branded OEM OSs now."

McAfee Security Center software provided by Comcast was installed on the system, but the realtime scanning capability was disabled. The last update check date for it was October 23, 2007 and the last scan date was October 24, 2007.

Spybot Search & Destroy version 1.4 was on the system, but, when I checked its status, I found the last detection update installed was 2006-10-06, i.e. the last update occurred 14 months ago. When I checked to see if any malware had ever been removed with Spybot, I found that WildTangent had been removed on October 11, 2006. I've seen WildTangent on many systems; I don't consider it something to be concerned about.

Since the current version of Spybot is 1.5, I removed the 1.4 version from the system. I downloaded the current version and Detection updates 2007-12-05 from the Spybot Search & Destroy Downloads webpage. I also downloaded FileAlyzer, which is a file analysis tool from the same Spybot developer.

The system was performing sluggishly and when I installed Spybot and scanned the system with it, the scan ran very slowly taking several hours to complete.

Since I couldn't run the TaskManager, I downloaded Windows Sysinternals utilities. I installed PsTools and Process Explorer.

When I ran Process Explorer, I saw five instances of dllh8jkd1q5.exe running. Prevx lists the file as being associated with Malware:SysCovert. The process was running from C:\Windows\system32\dllh8jkd1q5.exe. I also saw a dllh8jkd1q6.exe and a dllh8jkd1q7.exe process running. They were also in C:\Windows\system32. I killed all of them from within Process Explorer.

Process Explorer also showed plite731.exe running. At plite731.exe - Dangerous, Greatis Software lists it as being associated with a "Trojan/Backdoor". Process Explorer shows a description of "SysMon" and a company name of "System Service" for the process. The developer may have given it a description of "SysMon" to make it appear innocuous. It was running from C:\Windows\plite731.exe. Prevx lists it as being associated with Trojan.SysMon. I killed the process through Process Explorer.

I also saw xpupdate.exe running. At file.net, I saw a reference at xpupdate.exe Windows Process - What is it? to a file by that name being associated with the RBQT-QE worm. The process was running from C:\Windows\xpupdate.exe. The timestamp on the file was October 23, 2007 5:14 P.M. I killed that process also with Process Explorer.

I also saw newmaxxsv234.exe running. Prevx indicates that a file with that name is associated with the malware group Trojan.VXGAME and that a file with that name is also associated with Downloader.Obfuskated. Bleeping Computer links the file to the Troj/Tibs-TS Trojan. The process was running from C:\Windows\system32\newmaxxsv234.exe. I killed the running process with Process Explorer. The file had a timestamp of October 23, 2007 7:17 P.M.

I also saw kmdsrngm.exe running. Prevx links it to the malware group Adware.ZenoSearch. It was running from C:\Windows\system32\kmdsrngm.exe. The file had a timestamp on it of October 23, 2007 8:25 P.M. I also killed that process. After I killed it, I noticed dllh8jkd1q5.exe running again. I killed it again, also.

I also noticed that the program represented by a red circle with a white "X" in it, which was putting up the misleading malware warnings was no longer present in the system tray. I don't know exactly when it disappeared, though, so I don't know which process I killed was associated with it.

Spybot found AdSponsor. It reported the registry entry HKEY_CLASSES_ROOT\AppID\AdBand.DLL for the adware.

Spybot found Smitfraud-C. The dllh8jkd1q5.exe, dllh8jkd1q6.exe, and dllh8jkd1q7.exe files were associated with it. Spybot also listed the C:\Program Files\BraveSentry directory as being associated with Smitfraud-C. Spybot also listed C:\Windows\system2\kernelwind32.exe as being found on the system, which it reported as associated with Smitfraud-C. Yet Windows Explorer did not list the file in the directory, even when I turned on the display of hidden and system files. Nor did it appear when I issued a dir k*.exe command from a command prompt. I even tried dir /ah and dir /as, but it did not appear, but then neither did krnl386.exe nor any other exe file beginning with the letter "k", even though several appeared in Windows Explorer. Since, when I used dir k*.exe with or without the /ah or /as options, files Windows Explorer reported didn't appear, it appeared that something was trying to hide files from antimalware software or casual perusal of the directory.

Spybot found CoolWWWSearch. The only entry it listed for it was a file, C:\WINDOWS\system32\vx.tll.

Spybot also found ZenoSearch. It linked C:\Windows\system32\msnav32.ax, C:\Windows\system32\kmdsrngm.exe , and C:\Windows\system32\dwdsrngt.exe as being associated with this malware. It did no link any other objects to the malware.

Spybot found BraveSentry. It listed C:\Windows\xpupdate.exe as being associated with it plus three files in the C:\Program Files\BraveSentry directory.

BraveSentry0.bs
BraveSentry.lic
Uninstall.exe

Spybot also listed a registry key under HKEY_USERS. When I looked under HKEY_CURRENT_USER\SOftware\Microsoft\Windows\CurrentVersion\Run, I found the following.

Value name: Windows update loader
Value data: C:\Windows\xpupdate.exe

Spybot also reported the following.

Microsoft.WindowsSecurityCenter.AntiVirusDisableNotify
Microsoft.WindowsSecurityCenter.FirewallDisableNotify
Microsoft.WindowsSecurityCenter.TaskManager

It isn't unusual for antivirus software to assume control of antivirus and firewall settings, so perhaps those changes were made by the McAfee software, but I've never seen antivirus software disable the TaskManager before.

Spybot also found a lot of advertising-related cookies, but I normally don't worry about those, though I do usually remove them.

I installed Bazooka™ Adware and Spyware Scanner 1.13.03 and the latest database update for it and scanned the system with it. It reported the following.

Exploit ntos.exe
Exploit countbest.net
Exploit traff5all.biz
Exploit searchterror.com
Exploit vxiframe.biz
Exploit Zviframe.biz

I had Spybot remove everything it found. After waiting a long time for Spybot to complete its removal process, I finally gave up, rebooted the system into Safe Mode and logged in as the administrator. I was able to start the Task Manager then using Ctrl-Alt-Del. I had to use the Task Manager to manually start the Explorer before I could run a Spybot scan again. This time it ran much faster, though it still took a while to check for 106,700 objects. It only reported Smitfraud-C and ZenoSearch this time.

For Smitfraud-C, it reported the same files as previously, including C:\Windows\system32\kernelwind32.exe. From a command prompt, I could see the file with a dir command this time. It was dated October 23, 2007 3:08 P.M. I had Spybot remove Smitfraud-C and ZenoSearch, which it did within seconds this time.

I scanned again with Bazooka Scanner. It only reported Exploit ntos.exe. The Bazooka Scanner webpage for Exploit ntos.exe lists the following files, among many others, as being associated with this malware.

%SystemDir%\kernelwind32.exe
%WinDir%\xpupdate.exe

The system is a Windows XP Home system. On this system %SystemDir% and %WinDir% point to C:\Windows\system32 and C:\Windows respectively. That is the default for Windows XP. You can verify that by issuing the set command at a command prompt and looking for the values of SystemRoot and windir. For Bazooka, %systemdir% is %systemroot%\system32, i.e. normally C:\windows\system32 on a Windows XP system.

So Bazooka labels the malware associated with Kernelwind32.exe as Exploit ntos.exe, while Spybot associates kernelwind32.exe with Smitfraud-C. And while Bazooka classifies xpupdate.exe under BraveSentry, Bazooka lists it for Exploit ntos.exe. It isn't uncommon for different antispyware or antivirus programs to use different names for particular malware.

When I had Bazooka generate a log file, I found when I reviewed the log file that it was reporing Exploit ntos.exe, because it found %SystemDir%\kernelw.sys and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\SystemSv12.

When I ran regedit and checked for the registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\SystemSv12, I found the following.

Value name: SystemSv12
Value: C:\WINDOWS\system32\newmaxxsv234.exe

I removed the registry entry. When I checked to make sure that Spybot had already deleted C:\Windows\system32\newmaxxsv234.exe, I found it was still present, so I manually deleted it.

BleepingComputer reports C:\WIndows\System32\kernelw.sys is associated with Trojan.Peed.IIG/Packed.Win32.Tibs.ap malware. A posting on the freefixer site at kernelw.sys shows the results of a scan of the file that someone else submitted to Jotti's Online Malware Scan site. The file submitted had the same MD5 message digest as the one on the systm. I manually deleted the file. Bazooka no longer reported malware on the system, reporting instead "nothing detected".

I rebooted the system into Safe Mode with Networking, downloaded ClamWin and scanned the system with it. I left the scan running overnight along with another scan by Spybot. Unfortunately, the next morning, I found that one of my cats had apparently bumped into the power cord for the laptop dislodging it, so the system was powered down.

I logged into the DCW account. I saw a notice that an update to the operating system was available to be installed. It was the Windows Malicious Software Removal Tool - October 2007 (KB890830). I installed it.

I then started a new ClamWin Scan. It took over 5 hours to complete (319 minutes and 26 seconds). It found 15 infected files.

I installed BitDefender Free Edition v10 to scan the system for malware. Since network connectivity for the system was not working, I manually installed updates to the malware definitions for the antivirus software. After rebooting, I then scanned the system. The results of the scan are shown below (log file).

FileStatus
<System>==>C:\WINDOWS\plite731.exe (disk) Infected: Trojan.Adband.A
<System>==>C:\WINDOWS\plite731.exe (disk) Disinfection failed
<System>==>C:\WINDOWS\plite731.exe (disk) Move failed
<System>==>HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENTVERSION\RUN\plite731.exe==>PLITE731.EXE
Infected: Trojan.Adband.A
<System>==>HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENTVERSION\RUN\plite731.exe==>PLITE731.EXE
Disinfection failed
<System>==>HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENTVERSION\RUN\plite731.exe==>PLITE731.EXE
Move failed
C:\Documents and Settings\DMW\Local Settings\Temp\stany.exe Infected: Trojan.Adband.A
C:\Documents and Settings\DMW\Local Settings\Temp\stany.exe Disinfection failed
C:\Documents and Settings\DMW\Local Settings\Temp\stany.exe Moved
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun6.exe Infected: Generic.Zeno.51DEB277
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun6.exe Disinfection failed
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun6.exe Moved
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun7.exe Infected: Trojan.Peed.Gen
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun7.exe Disinfection failed
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun7.exe Moved
C:\Documents and Settings\DMW\Local Settings\Temp\wr-1-77.exe Infected: Trojan.Retapu.D
C:\Documents and Settings\DMW\Local Settings\Temp\wr-1-77.exe Disinfection failed
C:\Documents and Settings\DMW\Local Settings\Temp\stdrun7.exe Moved
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll Detected: Adware.Mysearch.E
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll Disinfection failed
C:\Program Files\MyWaySA\SrchAsDe\deSrcAs.dll Moved
C:\WINDOWS\plite731.exe Infected: Trojan.Adband.A
C:\WINDOWS\plite731.exe Disinfection failed
C:\WINDOWS\plite731.exe Move failed
C:\WINDOWS\system32\mljjh.dll Adware.Virtumonde.GGZ
C:\WINDOWS\system32\mljjh.dll Disinfection failed
C:\WINDOWS\system32\mljjh.dll Move failed

Time
Scan time:01:41:12
Scan speed (files/sec):14
 
Results
Infected objects:8
Suspect objects:0
Process infected:0
Warnings:0
Disinfected:0
Deleted:0
Moved:6
Identified viruses8

BitDefender identified C:\Windows\plite731.exe twice as Trojan.Adband.A I saw the proess running when I looked at the running process list with Task Manager, which I could do after having Spybot fix problems it found earlier. But Windows explorer didn't show it in C:\Windows, even though the system was configured to show hidden and system files, nor could I see it from a command prompt using the dir command, even with the /as or /ah options. I could see a plite731_uinstall_.bat fiele in the C:\Windows directory, though. It had a timestamp of 10/23/2007 3:08 PM. The commands in the file were as follows.

tskill plite731 /a /v
del plite731.exe

The tskill utility is a Microsoft-supplited utility in \Windows\system32.

I killed the plite731.exe process through the task manager. I then tried deleting it with the del, but got a message indicating that the file could not be found. I used regedit to delete the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WIndows\CurrentVersion\Run\plite731 key, so that the program would not be run when Windows is rebooted.

Value Name: plite731
Value data: C:\WINDOWS\plite731.exe

BitDefender also indicated it couldn't quarantine C:\WINDOWS\system32\mljjh.dll, which it linked to Adware.Virtumonde. That file also didn't show up when I looked for it using Windows Explorer or use the dir command at a command prompt, even when I tried the /as and /ah options. When I checked to see if processes had it open by using Process Explorer's "find" option, I saw the following processes were using it.

ProcessType
explorer.exeDLL
lass.exeDLL
lass.exeHandle
iexploreDLL

During the BitDefender scan, a McAfee warning message popped up (the system had McAfee Security Center installed).

Potentially Unwanted Program Detected

McAfee has automatically blocked a potentially
unwanted program from running on your computer.

Details
Name: Adware-Isearch

More Info

Potentially unwanted programs include spyware,
adware, and other programs that might create
additional security or privacy risks to your
computer data and personal information. They
are often downloaded in conjunction with a
program that you want.

Process: C:\Program Files\Common Files
\Softwin\BitDefender Scan Server\bdss.exe
Process Name:
File Path: C:\Documents and Settings\DMW
\Local Settings\Temp\stdrun4.exe

If you do not recognize this potentially unwanted
program, McAfee recommends that you remove
it. If you recognize this potentially unwanted
program, trust it, and then rerun the program that
triggered this alert.

McAfee is identifying the process as bdss.exe, which is the BitDefender process scanning for malware. It identified the file as C:\Documents and Settings\DMW\Local Settings\Temp\stdrun4.exe, though. BitDefender identified stdrun6.exe and stdrun7.exe in the same directory as stdrun4.exe as containing malware, but did not identify stdrun4.exe as containing malware.

At Threat Profile: Adware-ISearch, McAfee states the program installs a Browser Helper Object (BHO). The summary information provided on the McAfee webpage states the following.

Summary:

Upon execution, this application installs itself as a Browser Helper Object in Internet Explorer and pops advertisements. It redirects search keywords used in google to the site master.mx-targeting.com.

But when I checked for the files and directories McAfee's webpage listed as being associated with the malware, I did not see any of those, nor were they ones removed by Spybot.

When I copied the stdrun4.exe file to another system for analysis, Webroot® Spy Sweepter™ version 5.0.8.1608 (spyware definitions version: 1046) identified it as malware.

Item Details

Name:command
Category:Adware

Description:
Command is an adware program that may display advertisements on your system.

I had the McAfee program remove the std4run.exe file, which it identified as Adware-Isearch. When I removed the malware, the McAfee software popped up another warning.

Potentially Unwanted Program Detected

McAfee has automatically blocked a potentially
unwanted program from running on your computer.

Details
Name: Adware-MediaTickets

More Info

Potentially unwanted programs include spyware,
adware, and other programs that might create
additional security or privacy risks to your
computer data and personal information. They
are often downloaded in conjunction with a
program that you want.

Process: C:\Program Files\Common Files
\Softwin\BitDefender Scan Server\bdss.exe
Process Name:
File Path: C:\Documents and Settings\DMW
\Local Settings\Temp\YazzleBundle-1549.exe

If you do not recognize this potentially unwanted
program, McAfee recommends that you remove
it. If you recognize this potentially unwanted
program, trust it, and then rerun the program that
triggered this alert.

I had McAfee remove that, also. McAfee then reported Adware-Zeno for C:\Documents and Settings\DMW\Local Settings\Temporatzy Internet FIles\Content.IE5\MN0MFDMT\ds[1].xe. That file had a creation timestamp of Tuesday, October 23, 2007 at 7:16:47 PM. I had the McAfee antimalware software remove it.

I then rebooted into Safe Mode with Networking. I was still unable to see C:\WINDOWS|pslite731.exe from the Windows Explorer nor from a command prompt. I was able to see C:\WINDOWS\system32\mljjh.dll. It had a timestamp of 10/23/07 03:11 PM. I tried deleting it, but was notified it was being used by another person or program.

The system has no Internet connectivity. Since I started working on it, it has been displaying the following error message when I issue the ipconfig command.

C:\WINDOWS\system32>ipconfig

Windows IP Configuration

An internal error occurred: The request5 is not supported.

Please contact Microsoft Product Support Services for further help.

Additional information: Unable to query host name.

To be able to remove the plite731.exe file that wasn't showing up even in Safe Mode, I booted the system from a Slax Linux 5.1.8.1 LiveCD. I found the Windows partition under /mnt/sda2. When I looked in the WINDOWS directory, the file wasn't there, so, even though BitDefender indicated that its attempt to move the file failed, it was apparently deleted, perhaps after I rebooted.

I tried to delete mljjh.dll after remounting the /mnt/sda2 in read-write mode using the command mount -o remount rw /mnt/sda2, since it was mounted in read-only mode (you can view the mode with cat /etc/mtab). But even though /dev/sda2 was then listed as being mounted rw, I still got a message saying I couldn't remove the file, because of a "read-only file system". I did note the file permissions on the file were 400, i.e. read-only access for the owner, which I couldn't change.

I rebooted Windows into Safe Mode, logged on as the administrator. I checked the permissions on mljjh.dll by right-clicking on it and choosing Properties and found it wasn't marked as read-only. I still couldn't delete it, so I ran the Sysinternals' Process Explorer program. When I asked it to "Find Handle or DLL" and searched fo mljjh.dll, it showed lsass.exe and explorer.exe were using it, which was why I couldn't delete it.

I ran regedit and looked for any reference to it in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. I didn't see any, but I did see a reference to kmdsrngm.exe, which was malware previously deleted (the file is no longer in C:\WINDOWS\system32. I deleted the registry reference.

Value name: {51-10-05-52-ZN}
Type: REG_SZ Value data: C:\WINDOWS\system32\kmdsrngm.exe CHD001

I also deleted a TA_Start shortcut I found in the Startup group on the system. The target for the shortcut was C:\WINDOWS\system32\kmdsrngm.exe CHD001. The file was in C:\Documents and Settings\TEMP\Start Menu\Programs\Startup and had a timestamp of 12/05/2007 7:11 PM.

I downloaded and installed CWShredder, which is now provided by Trend Micro. CWShredder searches for and removes CoolWebSearch malware. CoolWebSearch is a name given to a variety of browser hijackers, which redirect users to coolwebsearch.com and other sites associated with the malware developer.

Symptoms of a CoolWebSearch infection may include the following:

When I ran CWShredder v2.19 while booted into Safe Mode, it did not find any evidence of CoolWebSearch malware on the system.

When I had CWShredder generate a system report, I saw it listed BHO:[BndDrive2 BHO Class]C:\WINDOWS\system32\mljjh.dll under "Browser Helper Objects". It also lists RUN:[winshow]C:\WINDOWS\winshow.exe under "Run Keys". Winshow.exe is malware, also. The key is still in the registry, but the file is no longer on the system. According to CastleCops it is added to a system by Troj/VB-DXP. I manually removed the registry entry with regedit.

Since BitDefender identified mljjhh.dll as being associated with Adware.Virtumonde.GGZ, I downloaded VundoFix V6.7.0 by Attribune from www.atribune.org and scanned the system with it. VundoFix.exe is a removal tool developed to remove Virtumonde infections. It listed the following files:

C:\windows\system32\hjjlm.bak1
C:\windows\system32\hjjlm.ini
c:\windows\system32\mljjh.dll
c:\WINDOWS\system32\urqqonn.dll

The last file c:\WINDOWS\system32\urqqonn.dll wasn't showing up in the Windows Explorer or when I issued a dir command at a command prompt, even though I was in Safe Mode.

Note: VundoFix also stores this list of files in \WundoFix Backups\addmorefiles.txt.

As had been happening since I started working on the system, the Windows Explorer crashed periodically while I scanned and afterwards, though it was restarting automatically, which had not happened on some prior crashes. Sometimes there was less than a minute between the Explorer crashing and restarting.

I had VundoFix remove the files and then rebooted the system. I still got the same error when I issued the ipconfig command afterwards, but I wasn't expecting that to change.

I saw the message below regarding the McAfee Personal Firewall when I logged into the system.

Your computer might be at risk

McAfee Personal FIrewall is turned off

Click this balloon to fix this problem.

Shortly thereafter, I saw the message below:

Your computer is not fully protected.

Click here to check your protection status in McAfee
SecurityCenter and fix any problems.

The Windows SecurityCenter is showing the firewall is turned off, but Automatic Updates and Virus Protection is on. I clicked on the McAfee warning balloon, which opened the McAfee SecurityCenter. I clicked on the Fix button within it, but got the message "One or more problems cannot be fixed because of an error."

I opened Spybot Search & Destroy again and looked ta the ActiveX, BHOs, and Winsock LSPs. All of the ActiveX applications looked legitimate and all of the Winsock LSP entries had a checkmark in a green circle next to them indicating that Spybot regards them as innocous. But when I checked the BHOs, I saw two unclassified entries that appeared to be illegitimate (see Spybot BHOs).

Note: you must switch to Advanced mode and click on Tools in Spybot to see the ActiveX applications, BHOs, and Winsock LSPs.

One BHO, which was in bold black, indicating it isn't in Spybot's database, was for mljjh.dll - the file was removed by VundoFix, but the registry entry remained. I selected the mljjh.dll BHO in Spybot and clicked on the Remove button to remove the registry reference to it.

The other BHO I wasn't confident was innocuous had a name of BndDrive2 BHO class. The file associated with it was C:\Program Files\ISM\BndDrive5.dll. When I checked the ISM folder, I found the following files within it.

NameDate Modified
BndDrive5.dll9/27/2007 12:49 PM
bndloader.exe9/15/2007 12:59 PM
ism.exe9/15/2007 12:59 PM
Uninstall.exe10/23/2007 3:08 PM

The fact that the uninstall.exe file has a timestmp of October 23, 2007 3:08 PM makes me inclined to view the files in the directory with suspcicion, since it seems to have arrived at the same time as a load of malware.

When I analyzed ism.exe with FileAlyzer and listed strings within the file, I saw the following:

ISM will now connect to the internet and detect a speed of your connection.
This will take several seconds. Are you sure you want to proceed?
You have ran the test already. Please wait for results.
Internet Speed Monitor

The grammatical errors incline me to suspect the developer may not be a native English speaker.

Slightly below that text in the file, I saw http://zredirector.com/ism/speed.php

Checking on the URLs listed in the file with FileAlyzer, I saw two.

http://zredirector.com/ism/datafile.dat
http://zredirector.com/ism/speed.php

CastleCops labels this BHO as BHO/CLSID/Toolbar Deep Dive and classifies it as "Certified spyware/foistware, or other malware"

BHO/CLSID/Toolbar Deep Dive

Certified spyware/foistware, or other malware Certified spyware/foistware, or other malware

FieldValue
GUID{8C6D5A56-791E-4fe8-9D64-81781FA15D68}
FilenameBndDrive6.dll
Object NameBndDrive2 BHO Class
StatusX BHO
Description"Hyperlinks Rotator" aka ISMonitor adware hailing from zredirector.com - installs a "Internet Speed Monitor" sidebar - file detected by Kaspersky antivirus as AdWare.Win32.AdBand.b
Viewed 64 times since 23 May 2005, 1840 Hours UTC-4.
STATUS KEY:

KEY:
  • "X" - Certified spyware/foistware, or other malware
  • "L" - Legitimate items
  • "O" - Open to debate
  • "?" - Unknown Status
  • "BHO" - Browser Helper Object
  • "TB" - Toolbar
  • "SH" - R3 URL SearchHook

    For expert assistance, please post here. Return To Full CLSID List
  • The CastleCops entry on this malware references BndDrive6.dll, whereas BndDrive5.dll is the file present on this system, but that appears just to be an indication of a different version of the same malware.

    The zredirector.com domain is listed in the Malware Domain List

    In addition to the C:\Program Files\ISM directory there was also a C:\Program Files\ISM2 directory. Both had a "Date Modified" date of 10/23/2007 3:08 PM. The only file in the ISM2 directory was ISMPack6.exe. Analyzing that file with FileAlyzer, when I checked for URLs within it, I saw many referencing srvclsubringstf.net and one referencing srv.clsubring.net (see ISMPack6_exe-URLs). Neither clsubring.net nor the domain srvclsubringstf.net are listed in the Malware Domain ListThe registrant for the domain clsubring.net is Domain Park Limited in Germany.

    I also checked the DNS-BH List. for any entries regarding the domains. The DNS-BH project creates and maintains a listing of domains that are known to be used to propagate malware and spyware. This project creates the Bind and Windows zone files required to serve fake replies to localhost for any requests to these, thus preventing many spyware installs and reporting. When I checked the domains list provided at that site, I did not find those two domains listed, though I did find zredirector.com listed.

    Since the software was listed under "Add or Remove Programs" (Click on Start, Control Panel, then Add or Remove Programs), I removed it by that method. It had a "last used" date of October 23, 2007 under "Add or Remove Programs". When I started the uninstall I saw a waring that "You are now about to uninstall Internet Speed Monitor. Please close all the Internet Explorer windows to ensure complete uninstallation." I didn't have any open at the time. I saw the uninstall executed the C:\Program Files\ISM2\ISMPack6.exe -uninstall. At the end of the uninstall, I was prompted to reboot the system. Prior to rebooting, I checked the BHO list in Spybot. It no longer showed the BndDrive2 BHO class BHO.

    Before rebooting, I checked the System Startup list in Spybot to see if it listed anything there that might be dangerous. I saw some entries in yellow, but none in red (see Spybot System Startup Report). When I checked all of those entries, they all appeared to be innocous. You can check on whether processes may be dangerous at Neuber Software's Windows process and task list or by using their Security Task Manager software.

    I noticed a log entry in the McAfee Security Center pertaining to the BndDrive5.dll BHO. The entry referenced process C:\Documents and Settings\TEMP\Local Settings\Temp\~nsu.tmp\Au_.exe (See Mcafee - BndDrive5 BHO). At au_.exe on Spyware-Net, I see the file listed as being associated with the Spyfalcon Trojan.

    Description of au_.exe This is a component of SpyFalcon. SpyFalcon is a Trojan disguised as an anti-spyware application. It installs with other Trojans through various security exploits. It typically hijacks the user's desktop, and makes unwanted changes to various user settings.

    It is also listed at Spyware Data as possibly being associated with SpyFalcon, though there it is rated as "safe". The file size on the system is 33KB, which doesn't match the filesizes listed on that webpage, but it could just be a different version of one of those. For the SpyFalcon entries on that webpage, I see the location as [%temp%]\~nsu.tmp\. On this system %temp% is C:\Documents and Settings\TEMP\Local Settings\Temp (you can issue the set command to see the value of the temp variable).

    The Spyware Warrior list of Rogue/Suspect Anti-Spyware Products & Web Sites lists SpyFalcon, so I would definitely not consider the presence of any applications associated with SpyFalcon to be safe. The SpyFalcon software is marketed under many different names according to the Spyware Warrior site; I had to fix problems on another system related to this supposed antispyware software in April (see Charlene Infection on April 30, 2007).

    SpyFalcon spyfalcon.com desktop hijacking, aggressive/deceptive advertising (1); uses inadequate scan/detection scheme; same app as AdwareDelete, AntiVirus Gold, MalwareWiped, SpyAxe, SpyLocked, Spyware Sheriff, SpywareStrike, TitanShield AntiSpyware, & VirusBlast [A: 2-14-06 / U: 2-14-06]

    I scanned the au_.exe file with BitDefender Free Edition 10 (Updated Fri Dec 7 1:25:15 2007 Signature number: 958438) and with ClamWin Free AntiVirus 0.91.2 (Updated: 01:28 06 Dec 2007). Both reported it as ok. I tried deleting the file anyway, though. I was unable to, though, since the Internet Speed Monitor Uninstall window was still open. That window was created by the Au_.exe process when I chose to uninstall the software through "Add or Remove Programs".

    A complete scan of the system with the McAfee SecurityCenter 7.2 software on it detected 3 items. That virus definitions for that software were last updated on October 23, 2007, so were about a month and a half out-of-date. The last scan of the system with the McAfee software was done on October 24, 2007.

    Version: 11.2
    Build: 11.2.124
    Language: en-us
    Last Update: 10/23/2007
    DAT Version: 5147.0000
    DAT Creationg Date: 10/23/2007
    Engine Version: 5100.0194

    When the scan completed, I saw the following:

    Details
    Number of items scanned: 159854
    Number of items detected: 3
    Number of items repaired: 0
    Number of items quarantined: 0
    Number of items removed

    Scan Details
    Total Detctions:3 Registry Keys Scanned:82937
    Processes Scanned65 Registry Keys Detected0
    Processes Detected:0 Cookies Scanned:1560
    Files Scanned:75290 Cookies Detected:0
    Files Detected:3   

    But the only malware detected was Adware-Isearch, which it found in 2 zip files I had stored on a USB thumb drive, which I had left attached to the system, but which I had write protected. I had placed the some malware files within zip files, which I copied to the USB thumb drive prior to removing them from the system, so I might use the files for later analysis of the malware.

    I clicked on OK in the Internet Speed Monitor Uninstall window to reboot the system. When I did that, the CPU utilization shot up to 100% with services.exe consuming most of the CPU time. After waiting a couple of minutes for the system to reboot, I clicked on Start, Turn off computer and slected Restart to reboot the system.

    When I logged into the DCW account after rebooting, I still got the " An internal error has occurred: the request is not supported" error message when I issued the ipconfig command. The additional information listed indicated the problem was "Unable to query host name".

    Even though Spybot had not reported any LSP anomalies, I decided to run LSP-Fix, which is a Winsock2 repair utility. LSP-Fix attempts to correct Internet connection problems which have resulted from buggy or improperly removed LSP software, which some malware will install on a system. I placed LSP-Fix 1.1 on the system, but, when I ran it, it reported "no problems found".

    At networking and internet connection problem, I found someone reporting the same error message when he issued the ipconfig command. One person who responded stated that the problem could be due to a missing or altered tcpip.sys file, which could be removed by an antivirus program if the program determined the file was infected. I searched the Windows directory and its subdirectories for tcpip.sys, but could not find it. The system, which is running Windows XP Home, has Service Pack (SP) 2 on it, so it should have the tcpip.sys file, which was modified to limit the maximum of TCP attempts to 10 per second [Note: that number can be changed by manually editing tcpip.sys as outlined in Windows XP SP2 additional tweaking information or by following the instructions at Patching TCPIP.SYS and how it affects P2P performance].

    So I then checked the McAfee Quarantined and Tracking Cookikes information to see if, perhaps, that software had quarantined it. But it did not appear to have done so. When I checkd on what had been quarantined in October, I saw only cookies listed up until October 23. On that day, McAfee quarantined the following:

    Detection Name: Dialer-257
    Removed Date: 10/23/2007 8:16:50 PM
    Items:

    The above file was listed 3 times. The first two entries had the same timestamp while the third entry had a timestamp of 30 minutes - perhaps the file was resuscitated by the malware with which it was associated.

    I also found the following entry for October 23:

    Detection Name: Adware-Zeno
    Removed Date: 10/23/2007 8:18:41 PM
    Items:

    There was also an entry for October 24.

    Detection Name: Winfixer
    Removed Date: 10/24/2007 2:49:11 PM
    Items:

    There were no other entries until I had McAfee remove Adware-Isearch on December 9.

    Ad-Aware SE was on the system, so I started it. At startup, I was informed that its malware definitions were 431 days old. The definitions file was listed as SE1R125 06.10.2006. I found the last system scan with Ad-Aware was performed on October 11, 2006, i.e. more than a year prior to the current infections. When I checked the Ad-Aware quarantine items, I found only cookies listed.

    While I was simply viewing the list of quarantined items for Ad-Aware, a window popped up informing me that "'C:\WINDOWS|system32\services.exe' terminated unexpectedly with status code -1073740972" and the system rebooted.

    After logging back in, I went to System Information (click on Start, select Accessories, then System Tools, and then System Information. I looked under Problem Devices, but didn't see anything listed. When I clicked on Network and then select Adapter, nothing was listed, i.e. the network adapter for the system was not listed. Yet the Device Manager shows a Broadcom 440x 10/100 Integrated Controller in the system and there is a network port on the back of the laptop. The Device Manager doesn't show any problems for the Broadcom network adapter.

    I checked the Recycle Bin for the missing tcpip.sys, but it wasn't there either. I had searched for the file by clicking on Start then Search. When I tried looking for it from a command prompt, I fid find prior versions, which had been backed up to uninstall directories during the installation of patches, e.g. C:\WINDOWS\$hf_mig$\KB913446\SP2QFE. But there was no instance of it in \Windows\System32\drivers, where it should be located.

    At Signs of a corrupt tcpip.sys, I found someone reporting encountering the same problem with several systems having a corrupted or missing tcpip.sys file. As suggested there, I copied a tcpip.sys file from a Windows XP Professional Service Pack 2 system (a tcipip.sys file from XP Professional should work on an XP Home system and vice versa) and used a USB thumb drive to transfer it to the laptop I was working on. The file was dated April 20, 2006 and was 359,808 bytes in size.

    When I rebooted, McAfee reported "New Network Detected". It then showed the IP configuration for the wireless network connection. After I answered the prompt regarding trusting that network, I also saw a similar "New Network Detected" message for the wired connection I had between the laptop and my router. And when I ran ipconfig, I saw the IP information for both the "Ethernet adapter Local Area Connection" and Ethernet adapter Wireless Network Connection". Yeah!

    I ran BitDefender and ClamWin and had both update their malware defintitions. I then installed the following Microsoft patches using Automatic Update.

    1. Cumulative Scurity Update for Internet Explorer 7 for Windows (KB942615)
    2. Security Update for Windows XP (KB941568)
    3. Security Update for Windows XP (KB941569)
    4. Security Update for Windows XP (KB943460)
    5. Security Update for Windows XP (KB944653)
    6. Update for Windows XP (KB942763)
    7. Windows Malicious Software Removal Tool - December 2007 (KB890830)

    I configured Spybot to "download updated include files if available online." I then downloaded and installed the latest updates for Spybot.

    I also checked for updates for Bazooka Scanner, but there was no later update available for it. I scanned the system again with it. It reported "nothing detected".

    I also checked the McAfee security software. It now showed the last update check to be December 12, 2007.

    Since I started working on the system, Sonic Update Manager runs when I login to the DCW account, but it can't complete, since it can't find files it needs. The message "The feature you are trying to use is on a CD-ROM or other disk that is not available" appears. When I cancel the installation, the message "An installation package for the product Sonic Update Manager cannot be found. Try the installation again using a valid copy of the intallation package 'UM.MSI'."

    Checking the process associated with the application using the Task Manager, I see it is agent.exe. The file is located at C:\Program FIles\Common Files\InstallShield\UpdateService. It may be started by isuspm or issch, which are both in the same directory and which I see listed in the Startup secton of the System Configuration Utility (run msconfig).

    I found others reporting the same problem at New Dell laptop error: Insert the Sonic Update Manager disk and click OK and the fix and at Sonic update manager. Since I had to also work on a Gateway laptop that wouldn't boot into Windows, I simply went into Add or Reomove Programs and removed Sonic Update Manager. I rebooted the system and logged in again to verify that the problem no longer occurs.

    When I checked the Services section under the System Configuration Utility, I found DSBrokerService listed with a value of "unknown" for the manufacturer. CastleCops has a description of "Related to Dell_Support Offer additional support. Note: Located in C:\Program Files\DellSupport\" for it. The command associated with the service is brkrsvc.exe.

    After verifying that no further problems seemed to be effecting the DCW account on the system, I logged into the DMW account. I saw the Active Desktop Recovery desktop display. When I clicked on Restore my Active Desktop, I received the message "An error has occurred in the script on this page" with an error of "Object doesn't support this action" listed. I chose to continue running scripts on the page. The desktop display did not change. So I just right-clicked on the desktop, chose Properties, clicked on the Desktop, then clicked on Customize Desktop, and then clicked on the Web tab. For Web pages, I saw "My current Home Page", but it was already unchecked, so I clicked on it to check it and then clicked on OK and then OK again. I then saw an AOL page displayed. I logged off and then logged on again just to make sure the page would display correctly for subsequent logins.

    I performed an image backup of the disk drive in the system to an external USB drive using Symantec's Norton Ghost 2003 (see Ghost Backup Info 2).

    References:

    1. Rogue/Suspect Anti-Spyware Products & Web Sites
      Spyware Warrior
    2. dllh8jkd1q5.exe
      Prevx
    3. Malware:SysCovert
      Prevx
    4. plite731.exe - Dangerous
      Greatis Software
    5. PLITE731.EXE
      Prevx
    6. xpupdate.exe Windows process - What is it?
      file.net - Windows XP file forum
    7. NEWMAXXSV234.exe
      Prevx
    8. newmaxxsv234.exe
      Bleeping Computer, LLC.
    9. KMDSRNGM.EXE
      Prevx
    10. kernelw.sys - Program Information
      Bleeping Computer, LLC.
    11. kernelw.sys
      freefixer
    12. Browser Helper Object
      Wikipedia, the free encyclopedia
    13. winshow.exe - Dangerous
      Greatis Software
    14. CastleCops® winshow winshow.exe Startup and file information
      CastleCops
    15. VundoFix.exe
      By Attribune
      February 3, 2006
      www.attribune.org
    16. BHO/CLSID/Toolbar Deep Dive
      Date: May 23, 2005
      CastleCops
    17. Malware Domain List - zredirector.com
      Malware Domain List
    18. DNS-BH Malware List
      By David Glosser
    19. Windows process and task list
      Neuber Software
    20. au_.exe on Spyware-Net
      FBM Software, Inc.
    21. AU_.EXE File Information
      Spyware Data
    22. LSP-Fix
      Counterexploitation [cexx.org]
    23. networking and internet connection problem
      Last posting: September 25, 2007
      PC Review - Computer News and Reviews
    24. Windows XP SP2 additional tweaking information
      By Philip
      Speed Guide, Inc.
    25. Signs of a corrupt tcpip.sys
      By Tarik Sabbagh
      Published: November 1, 2007
      Tech Enigma