Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"virus Alert!" In Strange Areas


  • This topic is locked This topic is locked
5 replies to this topic

#1 teedubbya

teedubbya

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 08 August 2008 - 10:36 AM

I have "VIRUS ALERT!" showing up in strange areas (icon tray, system properties). I also have warnings of Windows not being genuine with offers to address the issue during system startup. Additional issues are inability to open task manager, install programs, view drives in windows explorer, and others.

After reading several threads here I managed to download SDFix and Malwarebytes.
SDFix did its job and gave me control of the PC again. However repeated runs of Malwarebytes' MBAM turns up the same VUNDO trojans.
I have turned off system restore and re-run MBAM a few times.
My assumption is the next step will be to follow-up with HJT in that forum, but this is a good start.

Below are the logs from SDFix and MBAM. I have posted the first and last results from MBAM:


SDFix: Version 1.214
Run by Administrator on Thu 08/07/2008 at 11:39 PM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :

Name :
clbdriver

Path :
\??\globalroot\systemroot\system32\drivers\clbdriver.sys

clbdriver - Deleted



Restoring Default Security Values
Restoring Default Hosts File
Restoring Default HomePage Value
Restoring Default Desktop Components Value
Restoring Windows ProductId To Remove Fake Virus Alert

Rebooting


Checking Files :

Trojan Files Found:

C:\WINDOWS\system32\ljJDSljh.dll - Deleted
C:\WINDOWS\ESWA.EXE - Deleted
C:\WINDOWS\SYSTEM32\CTPP7.DLL - Deleted
C:\Documents and Settings\default\Favorites\Error Cleaner.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Favorites\Error Cleaner.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Desktop\Error Cleaner.url - Deleted
C:\Documents and Settings\default\Favorites\Privacy Protector.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Favorites\Privacy Protector.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Desktop\Privacy Protector.url - Deleted
C:\Documents and Settings\default\Favorites\Spyware&Malware Protection.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Favorites\Spyware&Malware Protection.url - Deleted
C:\Documents and Settings\Ernestine Lopez\Desktop\Spyware&Malware Protection.url - Deleted
C:\Program Files\Antivirus 2008 PRO\antivirus-2008pro.exe - Deleted
C:\Program Files\Antivirus 2008 PRO\zlib.dll - Deleted
C:\Program Files\Antivirus 2008 PRO\vscan.tsi - Deleted
C:\WINDOWS\system32\O.BAT - Deleted
C:\WINDOWS\wbxdpgfefse.dll - Deleted
C:\WINDOWS\fdxbameg.dll - Deleted
C:\WINDOWS\fsrpknov.dll - Deleted
C:\WINDOWS\gpefaowr.exe - Deleted
C:\WINDOWS\hosts - Deleted
C:\WINDOWS\sqvgnrpx.dll - Deleted
C:\WINDOWS\system32\clbdll.dll - Deleted
C:\WINDOWS\system32\drivers\clbdriver.sys - Deleted



Folder C:\Program Files\Antivirus 2008 PRO - Removed


Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-08 00:02:27
Windows 5.1.2600 Service Pack 2 FAT NTAPI

scanning hidden processes ...

scanning hidden services ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Disabled:Messenger"
"C:\\Program Files\\America Online 9.0\\waol.exe"="C:\\Program Files\\America Online 9.0\\waol.exe:*:Enabled:America Online 9.0"
"C:\\PROGRA~1\\YAHOO!\\MESSEN~1\\YPAGER.EXE"="C:\\PROGRA~1\\YAHOO!\\MESSEN~1\\YPAGER.EXE:*:Enabled:Yahoo! Messenger"
"C:\\PROGRA~1\\YAHOO!\\MESSEN~1\\yserver.exe"="C:\\PROGRA~1\\YAHOO!\\MESSEN~1\\yserver.exe:*:Enabled:Yahoo! FT Server"
"C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe"="C:\\Program Files\\Yahoo!\\Messenger\\YahooMessenger.exe:*:Enabled:Yahoo! Messenger"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Internet Explorer\\iexplore.exe"="C:\\Program Files\\Internet Explorer\\iexplore.exe:*:Enabled:Internet Explorer"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\America Online 9.0\\waol.exe"="C:\\Program Files\\America Online 9.0\\waol.exe:*:Enabled:America Online 9.0"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Wed 9 Aug 2000 129,078 ..SH. --- "C:\LOGO.SYS"
Mon 12 Nov 2001 241 ..SH. --- "C:\AUTOEXEC.BAK"
Thu 30 Aug 2001 174,195 ...H. --- "C:\ZZ.EXE"
Thu 30 Sep 1993 1,754 ...H. --- "C:\CHOICE.COM"
Tue 16 Oct 2001 4,709 ...H. --- "C:\DELL\run.BAK"
Tue 26 Sep 2006 4,348 ..SH. --- "C:\WINDOWS\DRM\DRMv1.bak"
Wed 13 Oct 2004 1,694,208 ..SH. --- "C:\Program Files\Messenger\msmsgs.exe"
Tue 29 Aug 2000 557,056 A..H. --- "C:\Program Files\Dell\Backup\DellBckp.exe"
Thu 31 Jan 2002 37,888 ...H. --- "C:\Documents and Settings\Ernestine Lopez\My Documents\~WRL2950.tmp"
Sun 10 Mar 2002 41,984 ...H. --- "C:\Documents and Settings\Ernestine Lopez\My Documents\~WRL2341.tmp"
Fri 11 Jul 2008 250,083 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\c36c7f4b6082ffbd96a80985adcf3ca0\BIT1.tmp"
Sun 23 Jun 2002 8,758 A..H. --- "C:\Documents and Settings\default\Local Settings\Temp\Off26.tmp"
Thu 3 Jul 2008 9,312 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\ZTR4B.tmp"
Thu 3 Jul 2008 1,409 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\FOR4C.tmp"
Thu 3 Jul 2008 11,700 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\ZTR4C.tmp"
Thu 3 Jul 2008 1,409 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\FOR4D.tmp"
Thu 3 Jul 2008 7,788 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\ZTR4D.tmp"
Thu 3 Jul 2008 1,409 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\FOR4E.tmp"
Thu 3 Jul 2008 54,412 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\ZTR4E.tmp"
Thu 3 Jul 2008 1,409 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\FOR4F.tmp"
Thu 3 Jul 2008 9,248 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\ZTR4F.tmp"
Thu 3 Jul 2008 1,409 ...H. --- "C:\Documents and Settings\default\Local Settings\Temp\FOR50.tmp"
Mon 24 Jun 2002 173,056 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0565.tmp"
Tue 2 Mar 2004 410,112 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3647.tmp"
Tue 20 Apr 2004 424,960 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0238.tmp"
Tue 4 May 2004 428,544 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0021.tmp"
Wed 18 Aug 2004 443,392 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3876.tmp"
Mon 6 Sep 2004 445,952 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL2850.tmp"
Mon 20 Sep 2004 453,632 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3775.tmp"
Mon 27 Jun 2005 476,160 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1735.tmp"
Wed 6 Jul 2005 476,160 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0708.tmp"
Wed 6 Jul 2005 479,744 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1001.tmp"
Mon 17 Sep 2001 490,496 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3645.tmp"
Thu 25 Aug 2005 493,056 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL2110.tmp"
Fri 26 Aug 2005 498,176 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3551.tmp"
Wed 14 Sep 2005 499,712 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0492.tmp"
Sun 9 Oct 2005 503,808 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1371.tmp"
Thu 13 Oct 2005 506,880 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1008.tmp"
Mon 17 Oct 2005 507,904 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0954.tmp"
Mon 7 Nov 2005 512,512 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1629.tmp"
Tue 22 Nov 2005 516,096 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3659.tmp"
Sat 24 Jun 2006 534,016 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3280.tmp"
Tue 30 Jan 2007 553,472 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL2027.tmp"
Sun 22 Jul 2007 581,120 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL0205.tmp"
Mon 8 Apr 2002 68,608 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3218.tmp"
Thu 16 May 2002 81,920 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL3892.tmp"
Tue 21 May 2002 82,432 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Templates\~WRL1223.tmp"
Tue 21 May 2002 37,888 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2711.tmp"
Mon 10 May 2004 34,304 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0853.tmp"
Mon 10 May 2004 33,280 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3604.tmp"
Mon 17 Jun 2002 27,136 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0476.tmp"
Mon 17 Jun 2002 30,208 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3649.tmp"
Thu 4 Apr 2002 19,456 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1934.tmp"
Thu 4 Apr 2002 19,456 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0878.tmp"
Thu 4 Apr 2002 19,968 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3836.tmp"
Mon 17 Jun 2002 151,552 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2634.tmp"
Wed 10 Jul 2002 36,352 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2805.tmp"
Wed 10 Jul 2002 46,080 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1835.tmp"
Mon 17 Jun 2002 30,720 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2683.tmp"
Mon 17 Jun 2002 31,232 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1634.tmp"
Mon 17 Jun 2002 32,256 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3499.tmp"
Fri 26 Aug 2005 19,456 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3470.tmp"
Sat 13 Sep 2003 20,992 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2210.tmp"
Wed 10 Jul 2002 46,592 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1119.tmp"
Thu 22 Aug 2002 35,328 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1404.tmp"
Mon 29 Sep 2003 19,968 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2903.tmp"
Mon 29 Sep 2003 354,816 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2313.tmp"
Mon 29 Sep 2003 20,480 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0685.tmp"
Mon 20 Sep 2004 37,376 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2498.tmp"
Mon 20 Sep 2004 38,400 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1073.tmp"
Mon 20 Sep 2004 40,448 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0419.tmp"
Mon 6 Sep 2004 20,992 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2455.tmp"
Fri 5 Aug 2005 484,864 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3188.tmp"
Fri 26 Aug 2005 19,968 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1526.tmp"
Mon 20 Sep 2004 44,032 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2422.tmp"
Mon 20 Sep 2004 43,520 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1530.tmp"
Mon 20 Sep 2004 45,056 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0213.tmp"
Mon 20 Sep 2004 45,568 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2184.tmp"
Mon 20 Sep 2004 46,592 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0769.tmp"
Tue 30 Jan 2007 19,456 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1032.tmp"
Tue 30 Jan 2007 20,480 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3515.tmp"
Mon 29 Aug 2005 24,064 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0736.tmp"
Mon 17 Oct 2005 20,992 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1672.tmp"
Sun 8 Oct 2006 95,232 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2760.tmp"
Sun 8 Oct 2006 96,256 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1361.tmp"
Sun 8 Oct 2006 96,768 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3944.tmp"
Sun 8 Oct 2006 95,744 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2841.tmp"
Sun 8 Oct 2006 95,232 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3712.tmp"
Sun 8 Oct 2006 96,256 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2220.tmp"
Sun 8 Oct 2006 104,448 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0477.tmp"
Sun 8 Oct 2006 103,424 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3976.tmp"
Tue 30 Jan 2007 22,016 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2553.tmp"
Tue 30 Jan 2007 22,528 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL1505.tmp"
Tue 30 Jan 2007 23,552 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0699.tmp"
Tue 30 Jan 2007 24,064 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL2824.tmp"
Tue 30 Jan 2007 26,624 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0369.tmp"
Tue 30 Jan 2007 27,136 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL3421.tmp"
Tue 30 Jan 2007 28,672 ...H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Word\~WRL0012.tmp"
Tue 7 Sep 2004 50,688 ...H. --- "C:\Documents and Settings\Ernestine Lopez\Application Data\Microsoft\Templates\~WRL2099.tmp"
Mon 1 Dec 2003 19,456 ...H. --- "C:\Documents and Settings\Ernestine Lopez\Application Data\Microsoft\Word\~WRL3848.tmp"
Mon 1 Dec 2003 21,504 ...H. --- "C:\Documents and Settings\Ernestine Lopez\Application Data\Microsoft\Word\~WRL2449.tmp"
Sun 23 Jun 2002 9,238 A..H. --- "C:\Documents and Settings\default\Application Data\Microsoft\Office\Shortcut Bar\Off26.tmp"
Sat 13 Nov 2004 8 A..H. --- "C:\Documents and Settings\All Users\Application Data\GTek\GTUpdate\AUpdate\Channels\ch1\lock.tmp"

Finished!


Malwarebytes' Initial Scan:

Malwarebytes' Anti-Malware 1.24
Database version: 1032
Windows 5.1.2600 Service Pack 2

12:24:01 AM 8/8/2008
mbam-log-8-8-2008 (00-24-00).txt

Scan type: Quick Scan
Objects scanned: 59157
Time elapsed: 8 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 19
Registry Values Infected: 2
Registry Data Items Infected: 11
Folders Infected: 1
Files Infected: 19

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\oxhsrbrq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\jkkJbxUn.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\jvabiv.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{759511af-6cfe-47eb-ae48-36abbcb32e22} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{759511af-6cfe-47eb-ae48-36abbcb32e22} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{fe9b4062-17dd-454b-b137-8b2084a8ef78} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{fe9b4062-17dd-454b-b137-8b2084a8ef78} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{43fcd2cf-5569-4208-97d2-52748e0ef6a0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{43fcd2cf-5569-4208-97d2-52748e0ef6a0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\toolbar.htmlmenuui.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\instie.hbinstobj (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\instie.hbinstobj.1 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sqvgnrpx.bpfv (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sqvgnrpx.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\07d00aa2 (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{43fcd2cf-5569-4208-97d2-52748e0ef6a0} (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkkjbxun -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkkjbxun -> Delete on reboot.
HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (h:mm:ss tt) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\default\Start Menu\Programs\Antivirus 2008 PRO (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\SYSTEM32\jkkJbxUn.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\nUxbJkkj.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\nUxbJkkj.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\jvabiv.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\oxhsrbrq.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\qrbrshxo.ini (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\nyqfnufm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\rqRKCsrp.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ernestine Lopez\Local Settings\Temp\GLKEE.tmp (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temp\GLK6.tmp (Rogue.EvidenceEliminator) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temp\dssc32.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temporary Internet Files\Content.IE5\CTR1JQEG\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temporary Internet Files\Content.IE5\G3GYCOC8\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Local Settings\Temporary Internet Files\Content.IE5\8JJ0ZOUT\css4[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Start Menu\Programs\Antivirus 2008 PRO\antivirus-2008pro.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\SYSTEM32\clbinit.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Application Data\TmpRecentIcons\antivirus-2008pro.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\default\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus-2008pro.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.

Malwarebytes' Subsequent Scans:

Malwarebytes' Anti-Malware 1.24
Database version: 1032
Windows 5.1.2600 Service Pack 2

1:34:09 AM 8/8/2008
mbam-log-8-8-2008 (01-34-09).txt

Scan type: Quick Scan
Objects scanned: 52957
Time elapsed: 7 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\jkkJbxUn.dll (Trojan.Vundo) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{698eb9a1-e612-48fb-a6ac-2311fdea71bf} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{698eb9a1-e612-48fb-a6ac-2311fdea71bf} (Trojan.Vundo) -> Delete on reboot.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkkjbxun -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\jkkjbxun -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\SYSTEM32\jkkJbxUn.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\nUxbJkkj.ini (Trojan.Vundo) -> Quarantined and deleted successfully.


Thanks in advance for your help!

Tee Dubbya

Edited by teedubbya, 08 August 2008 - 10:46 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:06 AM

Posted 08 August 2008 - 02:54 PM

Sometimes another piece of malware which has not been detected protects other files (which have been detected) so they cannot be permanently deleted. Others are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. This infection will require further investigation and probably the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a hijackthis log.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log" and complete all the steps. There are instructions for downloading and running Deckard's System Scanner (DSS) which will create a hijackthis log for you, or automatically download and install the most current version of HijackThis if it's not already installed on your computer.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 crossloop

crossloop

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:06 AM

Posted 08 August 2008 - 03:05 PM

u need to get a program called super antispyware free version then use then delete


if that spyware is in its most advanced stages u need to system restore or reinstal windows

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:06 AM

Posted 08 August 2008 - 03:10 PM

SUPERAntispyware is not enough to remove this infection.

teedubbya, I forgot to advise you that One or more of the identified infections (Clbdriver.sys) is related to a rootkit component. Rootkits are very dangerous because they use advanced techniques (backdoors) as a means of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoor Trojans and rootkits as part of an exploit to gain unauthorized access to a computer and take control of it without your knowledge.

If your computer was used for online banking, has credit card information or other sensitive data on it, you should immediately disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the rootkit has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the rootkit has been removed the computer is now secure. Further, in some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

"When should I re-format? How should I reinstall?"
"Help: I Got Hacked. Now What Do I Do?"
"Where to draw the line? When to recommend a format and reinstall?"
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 teedubbya

teedubbya
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:06 AM

Posted 09 August 2008 - 01:52 AM

I have done as instructed. HJT post is here http://www.bleepingcomputer.com/forums/t/162310/clbdriversys/

Thank you for your assistance!

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:06 AM

Posted 09 August 2008 - 07:02 AM

You're welcome.

Now that your log is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

To avoid confusion, I am closing this topic until you are cleared by the HJT Team. If you still need assistance after your log has been reviewed and you have been cleared, please PM me or another moderator and we will re-open this topic.

Thanks for your cooperation and good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users