Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Charter Security Suite, Malware, Trojans, Etc.


  • Please log in to reply
8 replies to this topic

#1 dmsharpe

dmsharpe

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:13 AM

Posted 06 February 2009 - 03:13 PM

Windows XP Professional Version 2002 Service Pack 3
HP Workstation xw6200 Intel Xeon CPU 2.80 GHz, 512 MB Ram

Currently use Charter Security Suite for antivirus, adware, malware protection, etc. Recently unable to remove detections and receive messages similar to:

Trojan-Powerloader.JS.Psme.amy has been detected...the object could not be disinfected object was removed.

Have tried numerous online virus scans with no success such including F-Secure, Panda, etc. Recently downloaded Malwarebyte's and will post results below along with SuperAntivirus log. Computer is running extremely slow after these scans and removals.

Malwarebytes' Anti-Malware 1.33
Database version: 1705
Windows 5.1.2600 Service Pack 3

1/29/2009 3:39:17 PM
mbam-log-2009-01-29 (15-39-17).txt

Scan type: Full Scan (C:\|)
Objects scanned: 129400
Time elapsed: 1 hour(s), 18 minute(s), 28 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 6
Registry Keys Infected: 27
Registry Values Infected: 7
Registry Data Items Infected: 5
Folders Infected: 1
Files Infected: 29

Memory Processes Infected:
C:\Documents and Settings\Administrator\Application Data\Twain\Twain.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\system32\wiwirira.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\moruzagi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\jalopeya.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\vodawoja.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\tiwamora.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ufrctx.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b67ee1c3-8147-4ea7-9a63-7c0ed4d19e92} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{b67ee1c3-8147-4ea7-9a63-7c0ed4d19e92} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{84444d0e-eb34-4fc8-b75a-984c081ad5b9} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{84444d0e-eb34-4fc8-b75a-984c081ad5b9} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{84444d0e-eb34-4fc8-b75a-984c081ad5b9} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b67ee1c3-8147-4ea7-9a63-7c0ed4d19e92} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bho_cpv.workhorse (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\bho_cpv.workhorse.1 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea9-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{07b18ea1-a523-4961-b6bb-170de4475cca} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1E0DE227-5CE4-4ea3-AB0C-8B03E1AA76BC} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\507f5f58 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pipepusara (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm534c6cc4 (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twain (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\moruzagi.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\moruzagi.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\moruzagi.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\tiwamora.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\tiwamora.dll -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\Administrator\Application Data\cogad (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\ufrctx.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dagihama.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\amahigad.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tazodavi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ivadozat.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiwirira.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\aririwiw.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vodawoja.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\tiwamora.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\jalopeya.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\moruzagi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP565\A0050330.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP565\A0050351.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP603\A0054658.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP603\A0054662.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP603\A0054663.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061373.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061244.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061372.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0063274.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP621\A0064877.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lefofafi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\libinisu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\weyuneve.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wpv881232809217.cpx (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Application Data\Twain\Twain.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cbXPhghI.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yawikofe.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\RECYCLER\ADAPT_Installer.exe (Heuristics.Malware) -> Quarantined and deleted successfully.


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/29/2009 at 06:31 PM

Application Version : 4.25.1012

Core Rules Database Version : 3735
Trace Rules Database Version: 1704

Scan type : Complete Scan
Total Scan Time : 02:17:51

Memory items scanned : 232
Memory threats detected : 1
Registry items scanned : 6362
Registry threats detected : 7
File items scanned : 75044
File threats detected : 13

Trojan.Downloader-NewJuan/VM
C:\WINDOWS\SYSTEM32\ATDHTK.DLL
C:\WINDOWS\SYSTEM32\ATDHTK.DLL

Rogue.Component/Trace
HKLM\Software\Microsoft\507F4DD6
HKLM\Software\Microsoft\507F4DD6#507f4dd6
HKLM\Software\Microsoft\507F4DD6#Version
HKLM\Software\Microsoft\507F4DD6#507fe056
HKLM\Software\Microsoft\507F4DD6#507f89b3
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\Software\Microsoft\FIAS4018

Trojan.Fake-Alert/Trace
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\SOFTWARE\Microsoft\fias4013
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\fbk.sts

Trojan.Dropper/Gen-SoftDev
C:\WINDOWS\SYSTEM32\AIHVZB.DLL
C:\WINDOWS\SYSTEM32\BDAQTE.DLL
C:\WINDOWS\SYSTEM32\DUWIBUDO.DLL
C:\WINDOWS\SYSTEM32\JJPBFH.DLL
C:\WINDOWS\SYSTEM32\NEYUVENA.DLL
C:\WINDOWS\SYSTEM32\PIVEJEHU.DLL
C:\WINDOWS\SYSTEM32\ROPENOYA.DLL
C:\WINDOWS\SYSTEM32\TESIROLO.DLL
C:\WINDOWS\SYSTEM32\WEVAGOFO.DLL

Adware.Vundo Variant/ACE
C:\WINDOWS\SYSTEM32\PALOZORA.DLL

Adware.Vundo Variant/LVL
C:\WINDOWS\SYSTEM32\SUVEKESA.DLL


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/05/2009 at 09:22 AM

Application Version : 4.25.1012

Core Rules Database Version : 3744
Trace Rules Database Version: 1712

Scan type : Complete Scan
Total Scan Time : 02:23:55

Memory items scanned : 230
Memory threats detected : 1
Registry items scanned : 6405
Registry threats detected : 7
File items scanned : 78488
File threats detected : 47

Trojan.Downloader-NewJuan/VM
C:\WINDOWS\SYSTEM32\ATDHTK.DLL
C:\WINDOWS\SYSTEM32\ATDHTK.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@atdmt[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.adtechus[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advert.runescape[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.ookla[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dmtracker[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstbeacon[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ehg-chartercommunications.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@overture[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dc.tremormedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads2.wissports[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@indextools[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@e-2dj6wgk4ujazklp.stats.esomniture[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@e-2dj6wfmycmczmcq.stats.esomniture[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cache.trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@yoload.presidiomedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstnet[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@counter.marketplaceadvisor.channeladvisor[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.lucidmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@insightexpressai[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\507F4DD6
HKLM\Software\Microsoft\507F4DD6#507f4dd6
HKLM\Software\Microsoft\507F4DD6#Version
HKLM\Software\Microsoft\507F4DD6#507fe056
HKLM\Software\Microsoft\507F4DD6#507f89b3
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\Software\Microsoft\FIAS4018

Trojan.Fake-Alert/Trace
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\SOFTWARE\Microsoft\fias4013
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\fbk.sts

Trojan.Dropper/Gen-SoftDev
C:\WINDOWS\SYSTEM32\AIHVZB.DLL
C:\WINDOWS\SYSTEM32\BDAQTE.DLL
C:\WINDOWS\SYSTEM32\DUWIBUDO.DLL
C:\WINDOWS\SYSTEM32\JJPBFH.DLL
C:\WINDOWS\SYSTEM32\NEYUVENA.DLL
C:\WINDOWS\SYSTEM32\PIVEJEHU.DLL
C:\WINDOWS\SYSTEM32\ROPENOYA.DLL
C:\WINDOWS\SYSTEM32\TESIROLO.DLL
C:\WINDOWS\SYSTEM32\WEVAGOFO.DLL

Adware.Vundo Variant/ACE
C:\WINDOWS\SYSTEM32\PALOZORA.DLL

Adware.Vundo Variant/LVL
C:\WINDOWS\SYSTEM32\SUVEKESA.DLL

BC AdBot (Login to Remove)

 


#2 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:13 AM

Posted 06 February 2009 - 05:02 PM

Hello.

Update Malwarebytes anti-malware and re-run it, this time do a full scan like what you did before.

Post back the MBAM log and any problems you may still have.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#3 dmsharpe

dmsharpe
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:13 AM

Posted 07 February 2009 - 02:33 PM

Computer running extremely sluggish...updated and ran full scan with malwarebytes, results below. Also ran SuperAntiSpyware from Safe Mode which found numerous infections, but seems to re-boot the computer during the cleaning/quarantine process, scan results also below:

Malwarebytes' Anti-Malware 1.33
Database version: 1736
Windows 5.1.2600 Service Pack 3

2/7/2009 10:21:32 AM
mbam-log-2009-02-07 (10-21-32).txt

Scan type: Full Scan (C:\|)
Objects scanned: 134009
Time elapsed: 2 hour(s), 6 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/07/2009 at 12:51 PM

Application Version : 4.25.1012

Core Rules Database Version : 3744
Trace Rules Database Version: 1712

Scan type : Complete Scan
Total Scan Time : 02:29:19

Memory items scanned : 224
Memory threats detected : 1
Registry items scanned : 6405
Registry threats detected : 7
File items scanned : 78345
File threats detected : 40

Trojan.Downloader-NewJuan/VM
C:\WINDOWS\SYSTEM32\ATDHTK.DLL
C:\WINDOWS\SYSTEM32\ATDHTK.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Administrator\Cookies\administrator@apmebf[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@adserver.adtechus[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@advert.runescape[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.ookla[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@specificclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@tribalfusion[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dmtracker[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstbeacon[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ehg-chartercommunications.hitbox[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@overture[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@bs.serving-sys[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@dc.tremormedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads2.wissports[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@indextools[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@serving-sys[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@burstnet[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@fastclick[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@e-2dj6wgk4ujazklp.stats.esomniture[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@e-2dj6wfmycmczmcq.stats.esomniture[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cache.trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@yoload.presidiomedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.googleadservices[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@www.burstnet[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@counter.marketplaceadvisor.channeladvisor[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@ads.lucidmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@247realmedia[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@hitbox[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@insightexpressai[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@realmedia[2].txt
C:\Documents and Settings\Administrator\Cookies\administrator@cms.trafficmp[1].txt
C:\Documents and Settings\Administrator\Cookies\administrator@casalemedia[2].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\507F4DD6
HKLM\Software\Microsoft\507F4DD6#507f4dd6
HKLM\Software\Microsoft\507F4DD6#Version
HKLM\Software\Microsoft\507F4DD6#507fe056
HKLM\Software\Microsoft\507F4DD6#507f89b3
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\Software\Microsoft\FIAS4018

Trojan.Fake-Alert/Trace
HKU\S-1-5-21-1598062124-3699688092-1250645814-500\SOFTWARE\Microsoft\fias4013
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\fbk.sts

Trojan.Dropper/Gen-SoftDev
C:\WINDOWS\SYSTEM32\DUWIBUDO.DLL
C:\WINDOWS\SYSTEM32\TESIROLO.DLL

Adware.Vundo Variant/ACE
C:\WINDOWS\SYSTEM32\PALOZORA.DLL

Adware.Vundo Variant/LVL
C:\WINDOWS\SYSTEM32\SUVEKESA.DLL

#4 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:13 AM

Posted 07 February 2009 - 03:21 PM

Hello.

That looks okay. Most were just cookies and Temporary Files. There were some other infected files that SAS took care of which is good.

Do you have any other problems other than slowness? Is your original problem gone now? Run an online scan to see if there's anything else.

Run Scan with Kaspersky

Please do a scan with Kaspersky Online Scanner.

If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.

  • Please disable your realtime protection software before proceeding. Refer to this page if you are unsure how.
  • Open the Kaspersky Scanner page.
  • Click on Accept and install any components it needs.
  • The program will install and then begin downloading the latest definition files.
  • After the files have been downloaded on the left side of the page in the Scan section select My Computer
  • This will start the program and scan your system.
  • The scan will take a while, so be patient and let it run.
  • Once the scan is complete, click on View scan report
  • Now, click on the Save Report as button.
  • Save the file to your desktop.
  • Copy and paste that information in your next post.
You can refer to this animation by sundavis.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#5 dmsharpe

dmsharpe
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:13 AM

Posted 07 February 2009 - 11:38 PM

It appears the original issue is now gone, however, the performance is now hellishly slow as previously posted. Here is the Kaspersky scan:

--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Saturday, February 7, 2009
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Saturday, February 07, 2009 23:39:17
Records in database: 1766417
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\

Scan statistics:
Files scanned: 77698
Threat name: 0
Infected objects: 0
Suspicious objects: 0
Duration of the scan: 02:16:58

No malware has been detected. The scan area is clean.

The selected area was scanned.

#6 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:13 AM

Posted 08 February 2009 - 02:54 PM

Hello.

Slowness... Try defragging your comptuer, clearing some temporairly files etc... Use this checklist.

Next try removing some autostart entries.

Increase System Performance

You may wish to try StartupLite. Simply download this tool to your desktop and run it. It will explain any optional auto-start programs on your system, and offer the option to stop these programs from starting at startup. This will result in fewer programs running when you boot your system, and should improve preformance.
If that does not work, you can try the steps mentioned in Slow Computer/browser? Check Here First; It May Not Be Malware.

See if that helps.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#7 dmsharpe

dmsharpe
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:13 AM

Posted 12 February 2009 - 06:06 PM

Still acting sluggish...tried your recommendations, a little better. AVG still picking up viruses but cannot erase them because they've been moved or renamed...

Scan "Scheduled scan" was finished.
Infections;"14";"14";"0"
Spyware;"1";"1";"0"
Warnings;"3"
Folders selected for scanning:;"Scan whole computer"
Scan started:;"Thursday, February 12, 2009, 12:00:08 PM"
Scan finished:;"Thursday, February 12, 2009, 2:22:51 PM (2 hour(s) 22 minute(s) 43 second(s))"
Total object scanned:;"712103"
User who launched the scan:;"SYSTEM"

Infections
File;"Infection";"Result"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP612\A0057926.dll;"Trojan horse BHO.HGT";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP612\A0059928.exe;"Trojan horse FakeAlert.GO";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061265.exe;"Trojan horse FakeAlert.GO";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061288.dll;"Trojan horse Vundo.EL";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061289.dll;"Trojan horse Vundo.EL";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP613\A0061290.dll;"Trojan horse Vundo.EL";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065968.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065969.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065970.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065971.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065972.dll;"Trojan horse Generic12.BICR";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065973.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP630\A0065974.dll;"Trojan horse Generic12.BIFD";"Moved to Virus Vault"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP636\A0069258.dll;"Trojan horse Vundo.EL";"Moved to Virus Vault"

Spyware
File;"Infection";"Result"
C:\System Volume Information\_restore{D0D4C289-1775-4E84-B8F1-E8133151EDAF}\RP637\A0069269.dll;"Adware Toolbar.FR";"Moved to Virus Vault"

Warnings
File;"Infection";"Result"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\ms1sficy.default\cookies.sqlite;"Found Tracking cookie.Statcounter";"Potentially dangerous object"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\ms1sficy.default\cookies.sqlite:\statcounter.com.2b5c3a98;"Found Tracking cookie.Statcounter";"Potentially dangerous object"
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\ms1sficy.default\cookies.sqlite:\statcounter.com.7b9083c6;"Found Tracking cookie.Statcounter";"Potentially dangerous object"

#8 extremeboy

extremeboy

  • Malware Response Team
  • 12,975 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:13 AM

Posted 12 February 2009 - 06:11 PM

Hello.

Those were just restore points and cookies. They won't do any harm unless you restored back to that date where the infection was present.

Let's create a system restore point and remove the older ones please.

Create a New System Restore Point<- Very Important

Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok"
  • Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" Tab.
  • Click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

With Regards,
Extremeboy
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#9 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:13 AM

Posted 12 February 2009 - 07:22 PM

From your PM you are still having problems? You have created the new Restore Point and removed the old as instructed. because the last post only showed restore point and cookie infections.
Do you have fresh infections?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users