Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Am I infected?


  • Please log in to reply
23 replies to this topic

#1 wfd31

wfd31

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 25 March 2009 - 04:26 PM

Hi, running XP Media edition, SP3.

On startup following error msg. EHtray.exe cannot load due to powrprof.dll not found.

I attempted to start Hijack This, no can do.

I attempted to start spbot no can do.

i attemted to start malwarebytes no can do.

Cannot use system restore.

Can anyone help? PLEASE?

BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 25 March 2009 - 06:18 PM

Try this scan. You can copy it over from another computer on a CD or pen drive if you need to.

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on drweb-cureit.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 27 March 2009 - 08:51 AM

I have run DrWeb as requested, and saved and printed out the following .csv report.

On startup, still have the pop up msg. Ehtray.exe The application has failed to start because Powrprof.dll was not found"

Thanks for your advice.

I feel confident you can help solve this problem

What next?

WFD31


KillWind.exe;C:\hp\bin;Tool.ProcessKill;Incurable.Moved.;
inetchk.exe;C:\Program Files\music_now;Trojan.Click.2093;Deleted.;
npCouponPrinter.dll;C:\Program Files\Netscape\Navigator 9\plugins;Adware.Coupons.34;Incurable.Moved.;
AOLCINST.EXE\core.cab\GTDOWNAO_106.ocx;C:\Program Files\Online Services\Aol\United States\AOL90\COMPS\COACH\AOLCINST.EXE;Adware.Gdown;;
AOLCINST.EXE;C:\Program Files\Online Services\Aol\United States\AOL90\COMPS\COACH;Archive contains infected objects;Moved.;
CouponPrinter.ocx;C:\WINDOWS;Adware.Coupons.34;Incurable.Moved.;

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 29 March 2009 - 05:18 PM

Sorry for the late response.

Can you get Malwarebytes to run now? If so, please run a Quick-Scan in Normal Mode and post the log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 29 March 2009 - 07:05 PM

Hi, sorry I cannot load any type of Malware/spybot/etc. program.

Other program load ok
Thanks again for working on this.

WFD31

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 29 March 2009 - 07:17 PM

Is Malwarebytes already installed on your computer?
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 31 March 2009 - 03:25 PM

Hi, no malwarebytes is not installed.

I did a search for mbam-setup, and other files, no hits.

I attempted to load a fresh copy of malware, but cannot get it to set up.

Also, I cannot run system restore. The following error msg. pops up:

"System Restore is not able to protect your computer. Please restart your computer and then run system restore again."

After the reboot, the same msg. appears.

Thanks for all your help.

WFD31

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 31 March 2009 - 05:19 PM

Download this file:

http://malwarebytes.gt500.org/mbam-setup.exe

Then rename the file to something else such as:

abcde.bat

Double-click the file and see if Malwarebytes will install.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#9 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 03 April 2009 - 07:46 PM

Hi, sorry for the delay. Busy working.

No luck, I attempted to download malwarebytes from your link.
Download ok. Renamed file.
Ran file, would not completely load.

Now cannot delete the file using add/remove and or search and manual remove.

Similar occurance with hijack this. renamed file. would not load.

HELP! HELP!! HELP!!!

wfd31

#10 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 05 April 2009 - 05:16 PM

Try installing Malwarebytes in Safe Mode.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#11 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 08 April 2009 - 01:23 PM

Hi, really sorry this takes so long.

Only so many hours in the days, etc.

I have loaded Malwarebytes, but cannot open it in safe mode.

Now, I have lost the use of all usb ports. It seems everytime I use the machine, something else drops off, or cannot open.

Really in trouble.

Hope you can help further.

wfd31

#12 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 08 April 2009 - 04:46 PM

Try to run this scan:

http://vil.nai.com/vil/stinger/
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#13 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 12 April 2009 - 06:31 PM

Hello again.

Sorry, I could not install and run standalone program you suggested.

I did manage to run the microsoft malware program, which allowed me access to my usb ports and drives.

Also, I managed to run malwarebytes in standard mode. It cleaned up a lot, but it's still not 100%. Microsoft will shut down Outlook Express occasionally. I still receive the popup message on startup. "EHTRAY.EXE. This application has failed to start because powrprof.dll was not found. Re-installing the appication may
fix this problem". Question is, what application!!!

I have attached the malware bytes log file for info.

Really appreciate your help.

WFD 31

Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 3

4/10/2009 9:51:01 PM
mbam-log-2009-04-10 (21-50-51).txt

Scan type: Full Scan (C:\|)
Objects scanned: 161171
Time elapsed: 1 hour(s), 11 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 10
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 7
Files Infected: 17

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{0ef464bb-a75c-4075-b7a6-6d48d05e7644} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{524b9634-8729-48a5-b451-e5bb7154f6e3} (Trojan.BHO) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{91f524ea-cd52-4437-a9e4-6a3552dc44d3} (Trojan.BHO) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b782ede4-ccb3-4e3e-981f-96c68116f38c} (Spyware.BHO) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b782ede4-ccb3-4e3e-981f-96c68116f38c} (Spyware.BHO) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\CrucialSoft Ltd (Rogue.MSantispyware2009) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Spyware Guard 2008 (Rogue.SpywareGuard) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ms antispyware 2009 5.7 (Rogue.MSAntiSpyware) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\eeekp (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Backdoor.Bot) -> Data: c:\windows\system32\twex.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twex.exe,) Good: (userinit.exe) -> No action taken.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009 (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\BASE (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\DELETED (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\SAVED (Rogue.Multiple) -> No action taken.
C:\WINDOWS\system32\twain32 (Backdoor.Bot) -> No action taken.

Files Infected:
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\UAC10fe.tmp (Rootkit.TDSS) -> No action taken.
C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP155\A0152194.dll (Trojan.TDSS) -> No action taken.
C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP155\A0152193.dll (Trojan.TDSS) -> No action taken.
C:\WINDOWS\system32\cpnprt2.cid (Adware.Agent) -> No action taken.
C:\WINDOWS\system32\rn.tmp (Trojan.Downloader) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304153648040.log (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304194857578.log (Rogue.Multiple) -> No action taken.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304203309687.log (Rogue.Multiple) -> No action taken.
C:\WINDOWS\system32\twain32\local.ds (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\twain32\user.ds (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\twex.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\UACamrfvsiw.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACfvkypuwc.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACklgoexgf.log (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACpxmqshov.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\drivers\UACawvjntir.sys (Trojan.Agent) -> No action taken.

#14 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:17 AM

Posted 12 April 2009 - 07:36 PM

Your log shows "No action taken" for the items found. Did you remove them?

Also, your log shows a rootkit infection. Some of these can be very nasty and your online passwords may have been compromised. You might want to consider completely reinstalling Windows.

Reboot your computer, run the Malwarebytes Full-Scan again and post the new log.

Edited by Budapest, 12 April 2009 - 07:37 PM.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#15 wfd31

wfd31
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:17 PM

Posted 14 April 2009 - 09:27 AM

Budapest, I removed all that malwarebytes allowed to be removed.

Not sure how to remove the rest.

I ran malware in safe mode again. The log is attached. This time nothing came up, but still have issues.

If there is some way to remove the offending items, I know you will find it.

Thanks again.

WFD31


Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 3

4/10/2009 9:51:40 PM
mbam-log-2009-04-10 (21-51-40).txt

Scan type: Full Scan (C:\|)
Objects scanned: 161171
Time elapsed: 1 hour(s), 11 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 10
Registry Values Infected: 1
Registry Data Items Infected: 2
Folders Infected: 7
Files Infected: 17

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\Interface\{0ef464bb-a75c-4075-b7a6-6d48d05e7644} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{524b9634-8729-48a5-b451-e5bb7154f6e3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{91f524ea-cd52-4437-a9e4-6a3552dc44d3} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{b782ede4-ccb3-4e3e-981f-96c68116f38c} (Spyware.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b782ede4-ccb3-4e3e-981f-96c68116f38c} (Spyware.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\CrucialSoft Ltd (Rogue.MSantispyware2009) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Spyware Guard 2008 (Rogue.SpywareGuard) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ms antispyware 2009 5.7 (Rogue.MSAntiSpyware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\eeekp (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Backdoor.Bot) -> Data: c:\windows\system32\twex.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twex.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009 (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\BASE (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\DELETED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\SAVED (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32 (Backdoor.Bot) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\HP_Administrator\Local Settings\Temp\UAC10fe.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP155\A0152194.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{106CF321-99A3-4E3A-9103-1BD027606A99}\RP155\A0152193.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cpnprt2.cid (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rn.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304153648040.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304194857578.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\CrucialSoft Ltd\MS AntiSpyware 2009\LOG\20090304203309687.log (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32\local.ds (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twain32\user.ds (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\twex.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACamrfvsiw.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACfvkypuwc.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACklgoexgf.log (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACpxmqshov.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\UACawvjntir.sys (Trojan.Agent) -> Quarantined and deleted successfully.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users