New Need Help: msdpjpkn.dll

DavidR, thank you for being patient and understanding what my frame of mind is. Although I appreciate that this old bag of a computer was not in great shape - it worked. Had I left well enough alone after doing the MBAM I’d be okay - but of course I wanted to get an Anti-Virus on it.

That, in turn, has revealed the current sorry state of affairs.

Rather than spending a ton of money on this old ratbag of a computer - I’ll just go buy a new one. Doesn’t help me right now though. Plus - there is so much on this computer that is vital (which I can’t use) that this makes it not such an easy endeavor.

So - can I retrieve that file from SAS or not? Has it been deleted from the computer or is it in some vault somewhere?

Java is: Java™ 6 Update 20

XP does have SP 2 on it.

I’m thinking that there is no mention of the nasty file because SAS ripped it.

I don’t know.

So - have you guys got any idea what this is that has done this to me - or has it just been dismissed as “serves you right” for a bad system?

Secunia wouldn’t work. According to their literature, I’d assume it is due to the “illegitimate” condition of the OS.

I can understand if this group is not interested in working on this any further - given the “state” of affairs. But I am hoping that some amongst you will be curious in getting to the bottom of it.

Hopeful,
Jerrold

SAS has a Quarantine section, in the Main window (double click the SAS tray icon), Manage Quarantine. That will allow you to restore the file, but believe me that is restoring an infected file. All you would be doing is treating the symptom (the errors as a result of the removal of the file) and not the disease, the infection itself. The associated registry entry which is calling for the loading of this file and because of the file being in quarantine, the error displayed.

So it will require more powerful tools to get to the bottom of this, which essexboy has in his tool-kit.

Interesting.

Although I kept getting pop-ups that SAS couldn’t open - it did. With some of the other programs, after finally opening they just failed and closed automatically. SAS did not do that.

Upon looking into the Quarantine area (sorry for the stupidity), it lists the items as:

Rogue.Agent/Gen-Nullo[EXE]
-C:\WINDOWS\N1260CP.EXE
-C:\WINDOWS\N1260SM.EXE

Trojan.Agent/Gen-Uphov-C
-C:\WINDOWS\SYSTEM32\MSDPJPKN.DLL
-C:\WINDOWS\SYSTEM32\MSDPJPKN.DLL

(two instances of that one)

I can appreciate your concern. I am thinking that for now - I will restore the nasty files so that my computer works. I have to earn an income…

Then I’ll pull what I can for data (I’ll get someone to help me do this - cause I don’t know how) onto my tower.

Then I’ll wipe the box clean and start from scratch with a legit XP. SP3 it and go from there.

When I pull the data back in, I’ll scan it.

Can you please shoot me a list of the procedure that you would do?

For instance:

  1. Transfer data (how to do it safely for the receiving tower)
  2. Format box
  3. Install which components for safety
  4. Install (current) versions of software(s)
  5. Reload data through scans

Also, I’ve never done the backup thing or the system restore. Any quick advice on that and what to use/when?

Can I throw some software versions at you so that you can tell me if I must upgrade them?

Tired of me yet?
Jerrold

Alright. I restored it - don’t shoot me.

Then I found the file and uploaded it into the scanners you wanted. Here are the URLs for the results.

VirusTotal:

http://www.virustotal.com/analisis/137a88278cd071dd7b8bac7443e4972b29c6abb91ee0b1c44bfd3312ba33f4f2-1276103634

Virscan:

http://virscan.org/report/9f859b05c76d0cd4f46a3cb99e80a7be.html

Well it is pretty conclusive, it is malware, I also suspect that this comes with a rootkit to hid other elements and try to prevent their removal.

For that we are going to need other tools from essexboy.

Sorry I don’t have a list of things to do to start from scratch, it isn’t quite that simple as your list:

  1. Transfer data (how to do it safely for the receiving tower)
  2. Format box
  3. Install which components for safety
  4. Install (current) versions of software(s)
  5. Reload data through scans

Well - I’d be surprised if it were so simple.

I’m sure that I will eventually get a new box, but in the meantime - what are the next steps with essexboy?

First he has to get back to the forum, he like myself doesn’t work for Avast so he works also, so helps in his free time. He is in the same time zone as me so he will possibly only have got back from work.

OK that is definitely hooked within the system, now it is just a matter of determining where it is hooking

http://www.geekstogo.com/misc/guide_icons/gmer.png
GMER Rootkit Scanner - Download - Homepage
[] Download GMER
[
] Extract the contents of the zipped file to desktop.
[*] Double click GMER.exe.

http://img.photobucket.com/albums/v666/sUBs/gmer_zip.gif

[*] If it gives you a warning about rootkit activity and asks if you want to run a full scan…click on NO, then use the following settings for a more complete scan…
[*] In the right panel, you will see several boxes that have been checked. Ensure the following are UNCHECKED
[] IAT/EAT
[
] Drives/Partition other than Systemdrive (typically C:)
[*] Show All (don’t miss this one)

http://www.geekstogo.com/misc/guide_icons/GMER_thumb.jpg

Click the image to enlarge it

[*] Then click the Scan button & wait for it to finish.
[*] Once done click on the [Save…] button, and in the File name area, type in “ark.txt”
[*]Save the log where you can easily find it, such as your desktop.
CautionRootkit scans often produce false positives. Do NOT take any action on any “<— ROOKIT” entries
Please copy and paste the report into your Post.

THEN

Download OTL to your Desktop

[*]Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
[*]Select Scan all users
[*]Under the Custom Scan box paste this in


netsvcs
drivers32
%SYSTEMDRIVE%*.*
%systemroot%*. /mp /s
CREATERESTOREPOINT
%systemroot%\system32*.dll /lockedfiles
%systemroot%\Tasks*.job /lockedfiles
%systemroot%\System32\config*.sav
%systemroot%\system32\drivers*.sys /180
%systemroot%*. /mp /s

[*]Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

[*]When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
[*]Due to forum restrictions please attach the logs to your post

I ran GMER 1.0.15.15281

Upon completion it stated:

“GMER hasn’t found any system modification.”

I haven’t pressed [OK] yet.

I haven’t continued with OTL either. Where is it located? Same website? I didn’t check while I was there.

Thanks,
Jerrold

You can close GMER - to download OTL just click the red link above - or this one Download OTL to your Desktop