Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virtumonde Virus Infection


  • Please log in to reply
16 replies to this topic

#1 Laurie249

Laurie249

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 28 April 2008 - 02:51 AM

Hi,
My computer is infected, and I have had a go myself, but now need some help.
Windows XP
Internet Explorer v7

I have NOD32 which is unable to completley delete the virus, and I have tried in Safe Mode.

The alert I get from NOD is: Threat WIN32:/Adware.Virtumonde Application.

I have ran Spybot Search and Destroy, also unable to delete it.
Also installed and ran Windows Defender, this did not even find it.
Finally tried Vundo Fix and VirtomundoBeone, with no success.

Have ran a Kaspersky Scan. Here is the Log

Monday, April 28, 2008 4:54:07 PM
Operating System: Microsoft Windows XP Home Edition, Service Pack 2 (Build 2600)
Kaspersky Online Scanner version: 5.0.98.0
Kaspersky Anti-Virus database last update: 28/04/2008
Kaspersky Anti-Virus database records: 728277

Scan Settings
Scan using the following antivirus database extended
Scan Archives true
Scan Mail Bases true

Scan Target My Computer
A:\
C:\
D:\
E:\

Scan Statistics
Total number of scanned objects 116015
Number of viruses found 13
Number of infected objects 19
Number of suspicious objects 0
Duration of the scan process 02:40:47

Infected Object Name Virus Name Last Action
C:\Documents and Settings\All Users\Application Data\Microsoft\Windows Defender\Support\MPLog-04272008-210149.log Object is locked skipped

C:\Documents and Settings\LocalService\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\LocalService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\LocalService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\NetworkService\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Object is locked skipped
C:\Documents and Settings\rev\Application Data\Microsoft\Outlook\Outlook.srs Object is locked skipped
C:\Documents and Settings\rev\Application Data\Microsoft\Templates\Normal.dot Object is locked skipped
C:\Documents and Settings\rev\Application Data\Microsoft\Word\AutoRecovery save of Document1.asd Object is locked skipped
C:\Documents and Settings\rev\Cookies\index.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Ahead\Nero Home\bl.db Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Ahead\Nero Home\is2.db Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\ApplicationHistory\hpqgalry.exe.cf8dd223.ini.inuse Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\administrativeInfo.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\albumImagesTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\albumImagesTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\albumTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\albumTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\CB_Server_Errors.txt Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\EXIFTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\EXIFTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\imageTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\imageTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\imageTable.fpt Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\keywordImagesTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\keywordImagesTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\keywordTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\keywordTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\managedFolderTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\pathnameTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\pathnameTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\ROFImagesTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\ROFImagesTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\ROFTable.cdx Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\HP\Digital Imaging\db\ROFTable.dbf Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Application Data\Microsoft\Windows Defender\FileTracker\{5393E9E1-2AC4-493B-AE01-DB73A9F77086} Object is locked skipped
C:\Documents and Settings\rev\Local Settings\History\History.IE5\index.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\History\History.IE5\MSHist012008042820080429\index.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\bplteayl.dll Infected: Packed.Win32.Monder.gen skipped
C:\Documents and Settings\rev\Local Settings\Temp\hpodvd09.log Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\huejpujf.dll Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\iggvxtea.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.qre skipped
C:\Documents and Settings\rev\Local Settings\Temp\ikqyghpv.dll Infected: Packed.Win32.Monder.gen skipped
C:\Documents and Settings\rev\Local Settings\Temp\rfbgjdij.dll Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\sdpjienc.dll Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\whrsqdmm.dll Infected: Packed.Win32.Monder.gen skipped
C:\Documents and Settings\rev\Local Settings\Temp\~DF30F4.tmp Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\~DF5AA6.tmp Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temp\~DF776C.tmp Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temporary Internet Files\AntiPhishing\B3BB5BBA-E7D5-40AB-A041-A5B1C0B26C8F.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temporary Internet Files\Content.IE5\3I6OKIB0\c_uz[1] Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temporary Internet Files\Content.IE5\3I6OKIB0\kriv[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.qrj skipped
C:\Documents and Settings\rev\Local Settings\Temporary Internet Files\Content.IE5\index.dat Object is locked skipped
C:\Documents and Settings\rev\Local Settings\Temporary Internet Files\Content.IE5\L513FVTY\idkfa[1] Infected: not-a-virus:AdWare.Win32.Virtumonde.qri skipped
C:\Documents and Settings\rev\My Documents\Michael\Music\Tekkers\bella nation.mp3 Infected: Trojan-Downloader.WMA.Wimad.n skipped
C:\Documents and Settings\rev\NTUSER.DAT Object is locked skipped
C:\Documents and Settings\rev\NTUSER.DAT.LOG Object is locked skipped
C:\Program Files\ESET\cache\CACHE.NDB Object is locked skipped
C:\Program Files\ESET\infected\0ORSOFAA.NQF Infected: Backdoor.Win32.Agent.gzu skipped
C:\Program Files\ESET\infected\54G2X3CA.NQF Infected: Packed.Win32.Monder.gen skipped
C:\Program Files\ESET\infected\DFPMVQDA.NQF Infected: not-a-virus:AdWare.Win32.Virtumonde.qni skipped
C:\Program Files\ESET\logs\virlog.dat Object is locked skipped
C:\Program Files\ESET\logs\warnlog.dat Object is locked skipped
C:\Program Files\HP\hpcoretech\hpcmerr.log Object is locked skipped
C:\System Volume Information\MountPointManagerRemoteDatabase Object is locked skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP154\A0017454.dll Infected: not-a-virus:AdWare.Win32.TrafficSol.ac skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP192\A0022502.exe Infected: Trojan-Downloader.Win32.Agent.nfz skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP204\A0027016.exe Infected: not-a-virus:AdWare.Win32.Insider.c skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP204\A0027017.exe Infected: not-a-virus:AdWare.Win32.Insider.f skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP204\A0027018.exe Infected: Trojan-Downloader.Win32.Agent.jih skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP204\A0027019.dll Infected: not-a-virus:AdWare.Win32.Virtumonde.qpx skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP207\A0027107.exe Infected: not-a-virus:AdWare.Win32.Insider.c skipped
C:\System Volume Information\_restore{305C22AB-D316-4685-87F5-83D57CCCEC7C}\RP207\change.log Object is locked skipped
C:\WINDOWS\b156.exe_old Infected: not-a-virus:AdWare.Win32.Insider.f skipped
C:\WINDOWS\b157.exe_old Infected: Trojan-Downloader.Win32.Agent.jih skipped
C:\WINDOWS\Debug\PASSWD.LOG Object is locked skipped
C:\WINDOWS\SchedLgU.Txt Object is locked skipped
C:\WINDOWS\SoftwareDistribution\EventCache\{36060F39-8E41-4840-8106-F278D34C6549}.bin Object is locked skipped
C:\WINDOWS\SoftwareDistribution\ReportingEvents.log Object is locked skipped
C:\WINDOWS\Sti_Trace.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\edb.log Object is locked skipped
C:\WINDOWS\system32\CatRoot2\tmp.edb Object is locked skipped
C:\WINDOWS\system32\config\AppEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\default Object is locked skipped
C:\WINDOWS\system32\config\default.LOG Object is locked skipped
C:\WINDOWS\system32\config\Internet.evt Object is locked skipped
C:\WINDOWS\system32\config\SAM Object is locked skipped
C:\WINDOWS\system32\config\SAM.LOG Object is locked skipped
C:\WINDOWS\system32\config\SecEvent.Evt Object is locked skipped
C:\WiNDOWS\system32\config\SECURITY Object is locked skipped
C:\WINDOWS\system32\config\SECURITY.LOG Object is locked skipped
C:\WINDOWS\system32\config\software Object is locked skipped
C:\WINDOWS\system32\config\software.LOG Object is locked skipped
C:\WINDOWS\system32\config\SysEvent.Evt Object is locked skipped
C:\WINDOWS\system32\config\system Object is locked skipped
C:\WINDOWS\system32\config\system.LOG Object is locked skipped
C:\WINDOWS\system32\ddcBSiij.dll Object is locked skipped
C:\WINDOWS\system32\h323log.txt Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.BTR Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\INDEX.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING.VER Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING1.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\MAPPING2.MAP Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.DATA Object is locked skipped
C:\WINDOWS\system32\wbem\Repository\FS\OBJECTS.MAP Object is locked skipped
C:\WINDOWS\wiadebug.log Object is locked skipped
C:\WINDOWS\wiaservc.log Object is locked skipped
C:\WINDOWS\WindowsUpdate.log Object is locked skipped
Scan process completed.


Edited by quietman7, 28 April 2008 - 08:08 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 28 April 2008 - 06:43 AM

Welcome to BC Laurie249

Please print out and follow the instructions for using "Vundofix". -- If using Windows Vista be sure to Run As Administrator.
  • Click the Scan for Vundo button.
  • Once it's done scanning, click the 'Fix Vundo' button.
  • After running VundoFix, a text file named vundofix.txt will automatically be saved to the root of the system drive, usually at C:\vundofix.txt.
  • Please copy & paste the contents of that text file into your next reply.
-- If you receive this error: "Run-time error '339': Component 'comdlg32.ocx' or one its dependencies not correctly registered: a file is missing or invalid", a new copy and instructions on where to put it can be found here.

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Acan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Laurie249

Laurie249
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 28 April 2008 - 07:47 AM

G,Day

I have run the "Vundofix" context of the text file:

VundoFix V7.0.3

Scan started at 9:54:48 PM 27/04/2008

Listing files found while scanning....

No infected files were found.


Beginning removal...

VundoFix V7.0.3

Scan started at 9:01:00 PM 28/04/2008

Listing files found while scanning....

No infected files were found.


VundoFix V7.0.3

Scan started at 10:09:14 PM 28/04/2008

Listing files found while scanning....

No infected files were found.


Beginning removal...

Beginning removal...

And Malwarebytes Anti Malware Log:

Malwarebytes' Anti-Malware 1.11
Database version: 692

Scan type: Quick Scan
Objects scanned: 34281
Time elapsed: 7 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\rotator.gizmo3 (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\rotator.gizmo3.1 (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{8e015787-b1e3-404a-95de-3e71e1fa0305} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\AdvRemoteDbg (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\affri (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\546e731e (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BM575d4082 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\b156.exe_old (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\b157.exe_old (Trojan.Dropper) -> Quarantined and deleted successfully.

Thanks for your help

Laurie249

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 28 April 2008 - 08:18 AM

Forgot to mention that I edited your original post to remove the DSS logs. They are not permitted in topics outside the HJT forum. If we cannot resolve this issue, then I will provide further instructions where to post those logs.

Please download ATF Cleaner by Atribune & save it to your desktop. DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 Laurie249

Laurie249
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 29 April 2008 - 07:04 AM

I Have installed and run ATF-Cleaner.exe and SUPERAntiSpyware in Safe Mode, here is the Log of that Scan.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/29/2008 at 05:01 PM

Application Version : 4.0.1154

Core Rules Database Version : 3450
Trace Rules Database Version: 1442

Scan type : Complete Scan
Total Scan Time : 01:39:43

Memory items scanned : 175
Memory threats detected : 0
Registry items scanned : 5801
Registry threats detected : 0
File items scanned : 104002
File threats detected : 1

Trojan.Downloader-Gen/A
C:\PROGRAM FILES\BLENDER FOUNDATION\NEW FOLDER\A.EXE

Regards

Laurie

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 29 April 2008 - 07:48 AM

How is your computer running now? Any more alerts from NOD32?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 Laurie249

Laurie249
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 29 April 2008 - 08:08 AM

GDay,

My computer is running much better, and no alerts from NOD32.

Should I do a System Restore now?

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 29 April 2008 - 08:21 AM

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:05:12 AM

Posted 29 April 2008 - 08:42 AM

C:\Documents and Settings\rev\My Documents\Michael\Music\Tekkers\bella nation.mp3 --> Trojan-Downloader.WMA.Wimad.n

===== Viruses quarantined by other scanners: =====

Number of items = 3
C:\Program Files\ESET\infected
Backdoor.Win32.Agent.gzu
Packed.Win32.Monder.gen
Win32.Virtumonde.qni


Chewy

No. Try not. Do... or do not. There is no try.

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 29 April 2008 - 09:02 AM

Those 3 items from Eset are safety quarantined and not a threat. A Kaspersky scan usually finds files in such locations or in backup folders created by other security programs. They can be deleted anytime.

Overlooked bella nation.mp3. Good catch DaChew.
Laurie249 get a second opinion on that file if its still present.
Go to jotti's virusscan or virustotal.com. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Post back with the results of the file analysis.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:05:12 AM

Posted 29 April 2008 - 09:45 AM

I did the mp3 one last week, it's a minor adware problem at present, if windows media player is defaulted to play mp3's it opens a web page in IE that then tells you to install an mp3 player that then installs adware

these are going around on limewire
Chewy

No. Try not. Do... or do not. There is no try.

#12 Laurie249

Laurie249
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 29 April 2008 - 11:54 PM

Here's the results of the virustotal.com scan.

File bella_nation.mp3 received on 04.29.2008 22:22:04 (CET)
Current status: finished

Result: 8/31 (25.81%)
Compact Print results
Antivirus Version Last Update Result
AhnLab-V3 - - -
AntiVir - - TR/Dldr.WMA.Wimad.N
Authentium - - -
Avast - - -
AVG - - Downloader.Wimad.E
BitDefender - - Trojan.Downloader.WMA.Wimad.N
CAT-QuickHeal - - -
ClamAV - - -
DrWeb - - -
eSafe - - -
eTrust-Vet - - -
Ewido - - Downloader.Wimad.n
F-Prot - - -
F-Secure - - Trojan-Downloader.WMA.Wimad.n
Fortinet - - -
Ikarus - - -
Kaspersky - - Trojan-Downloader.WMA.Wimad.n
McAfee - - -
Microsoft - - -
NOD32v2 - - -
Norman - - -
Panda - - -
Prevx1 - - -
Rising - - -
Sophos - - Troj/Wimad-E
Sunbelt - - -
Symantec - - -
TheHacker - - -
VBA32 - - -
VirusBuster - - -
Webwasher-Gateway - - Trojan.Dldr.WMA.Wimad.N
Additional information
MD5: afa3ae52fde53166f217e95c0a92cfaf
SHA1: 7f767736133978b4595686663ec492bfc767a694
SHA256: d0c044a1e6b38b96ad3a376cbb7a37846ad0f56148211784127ba305de010a6b
SHA512: 0ff9e87786eff1f2fad922e16f7b759a53a73677b9741216d034fe547b894eafda4e8dd10c832c597d0df5d7d2e4481942b95ab3e5f87853610faf4ff95ece93

#13 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 30 April 2008 - 06:59 AM

Delete that file and empty your Recycle Bin.

If you have a problem deleting it, then use MBAM's built in FileASSASSIN. Go to the "More Tools" tab, click on the "Run Tool" button to open FileASSASSIN. Browse with your Windows Explorer through the files and folders until you have found the file you are looking for and click "open". You will get a new message with a warning that the file will be permanently deleted. Click Yes.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#14 Laurie249

Laurie249
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:07:12 PM

Posted 30 April 2008 - 07:40 AM

Gday,

Deleted and gone.
Can you tell me if I need to keep all of the programmes that I have downloaded to clean up this virus, such as,
Combo Fix, dss.exe, Vundo Fix, and ATF cleaner?

Thanks for helping me out, have great day

#15 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:12 AM

Posted 30 April 2008 - 08:25 AM

Download OTMoveIt2 by OldTimer and save to your Desktop.
  • Connect to the Internet and double-click on OTMoveIt2.exe to launch the program
  • Click on the green CleanUp! button.
  • When you do this a text file named cleanup.txt will be downloaded from the Internet.
  • If you get a warning from your firewall or other security programs regarding OTMoveIt attempting to contact the Internet you should allow it to do so.
  • After the text file has been downloaded, you will be asked if you want to Begin cleanup process?
  • Select Yes.
-- Note: Doing this will remove the specialized tools (including this one) we downloaded and used. I would keep ATF Cleaner and MBAM.

Edited by quietman7, 30 April 2008 - 08:25 AM.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users