Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

virus won't let me run MBAM or Super AntiSpyware


  • Please log in to reply
12 replies to this topic

#1 ashleys

ashleys

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 25 March 2009 - 10:48 PM

I think I had this virus a week or so ago and I *thought* I had taken care of it with Malwarebytes. It came back yesterday and this new version won't let me run MBAM or Super AntiSpyware, even in safe mode. They both error out before they start. I think part of the virus is f***3.exe (without the asterisks). I've run my Norton scan (took nearly 3 hours) and my Windows Defender full scan (took nearly 9 hours) but neither found anything malicious.
Help please!!
-Ashley

Edited by ashleys, 25 March 2009 - 10:48 PM.


BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:48 AM

Posted 25 March 2009 - 11:13 PM

Rename this file:

C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

to something else, such as:

abcde.bat

then double click this file and see if Malwarebytes will run.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 26 March 2009 - 01:15 PM

That definitely did not work... When I tried to rename the file it didn't take, then when I doubleclicked the file it told me it couldn't find mbam.exe. Then when I tried to click the malwarebytes shortcut on my desktop it crashed my computer. I'm using another computer to write this now as I wait for the battery to die on the infected one so it will shut down and I can reboot...

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,577 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:48 AM

Posted 26 March 2009 - 06:42 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on drweb-cureit.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 27 March 2009 - 08:56 PM

Making progress, but the virus is definitely still present. Here's the report from DrWeb:

sysguard.exe;c:\windows;Trojan.Packed.154;Deleted.;
aolcinst.exe\core.cab\GTDOWNAO_106.ocx;C:\Documents and Settings\All Users\Application Data\AOL Downloads\lpkw_setupSTUS\comps\coach\aolcinst.exe;Adware.Gdown;;
aolcinst.exe;C:\Documents and Settings\All Users\Application Data\AOL Downloads\lpkw_setupSTUS\comps\coach;Archive contains infected objects;Moved.;
USBVX6100_V9.exe/LG_VX6100_USB_V9.cab\Charger.exe;C:\Documents and Settings\Me\Desktop\LG 6100 Data Suite\USBVX6100_V9.exe/LG_VX6100_USB_V9.cab;BackDoor.LMR.30;;
LG_VX6100_USB_V9.cab;C:\Documents and Settings\Me\Desktop\LG 6100 Data Suite;Archive contains infected objects;;
USBVX6100_V9.exe;C:\Documents and Settings\Me\Desktop\LG 6100 Data Suite;Archive contains infected objects;Moved.;
SDFix.exe\SDFix\apps\Process.exe;C:\Documents and Settings\Me\Desktop\My Stuff\Setup Files\SDFix.exe;Tool.Prockill;;
SDFix.exe;C:\Documents and Settings\Me\Desktop\My Stuff\Setup Files;Archive contains infected objects;Moved.;
172.exe;C:\Documents and Settings\Me\Local Settings\Temp;Trojan.Packed.154;Deleted.;
adv.exe;C:\Documents and Settings\Me\Local Settings\Temp;Trojan.PWS.Panda.114;Deleted.;
wJQs.exe;C:\Documents and Settings\Me\Local Settings\Temp;Trojan.Packed.154;Deleted.;
172[1].exe;C:\Documents and Settings\Me\Local Settings\Temporary Internet Files\Content.IE5\4PUJSHAN;Trojan.Packed.154;Deleted.;
samuraj[1].htm;C:\Documents and Settings\Me\Local Settings\Temporary Internet Files\Content.IE5\J2KFJDOD;Trojan.Packed.154;Deleted.;
adv[1].exe;C:\Documents and Settings\Me\Local Settings\Temporary Internet Files\Content.IE5\U3EZY1YF;Trojan.PWS.Panda.114;Deleted.;
WxBug.EXE;C:\Program Files\AIM\Sysfiles;Adware.Aws;Incurable.Moved.;
aolcinst.exe\core.cab\GTDOWNAO_106.ocx;C:\Program Files\Common Files\aolback\Comps\coach\aolcinst.exe;Adware.Gdown;;
aolcinst.exe;C:\Program Files\Common Files\aolback\Comps\coach;Archive contains infected objects;Moved.;
Charger.exe;C:\Program Files\Mobile Action\LG VX6100 USB-Handset Manager;BackDoor.LMR.30;Deleted.;
Process.exe;C:\SDFix\apps;Tool.Prockill;Incurable.Moved.;

#6 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 27 March 2009 - 09:24 PM

Good news... I tried opening MBAM just for the hell of it and it opened! Bad news... 14 minutes of quick scan and 43 viruses. I rebooted and now I'm going to update the version and run a complete scan (if I can) and will post the results when that is done. These are the results of that quick scan I just did:

Malwarebytes' Anti-Malware 1.34
Database version: 1879
Windows 5.1.2600 Service Pack 3

3/27/2009 10:16:32 PM
mbam-log-2009-03-27 (22-16-32).txt

Scan type: Quick Scan
Objects scanned: 76386
Time elapsed: 14 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 15
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 20

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\SYSTEM32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\uzujhff.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bee1d129-91dd-45d1-a22f-bf40006aeea2} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\tuzzmwjq (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{bee1d129-91dd-45d1-a22f-bf40006aeea2} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{abd42510-9b22-41cd-9dcd-8182a2d07c63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{abd42510-9b22-41cd-9dcd-8182a2d07c63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{abd42510-9b22-41cd-9dcd-8182a2d07c63} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\xkgvuusd (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\xkgvuusd (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xkgvuusd (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{bee1d129-91dd-45d1-a22f-bf40006aeea2} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mglpewgn (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\mglpewgn (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mglpewgn (Trojan.Agent) -> Delete on reboot.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PromoReg (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\system32\lowsec (Spyware.StolenData) -> Delete on reboot.

Files Infected:
c:\WINDOWS\SYSTEM32\uzujhff.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\iehelper.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACcfqxnosp.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UAChxnrvkyp.dll (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACjqoswpjt.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACsrnvdjgn.dll (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\muzyewx.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\DRIVERS\UACqmehwbuw.sys (Rootkit.TDSS) -> Delete on reboot.
C:\Documents and Settings\Me\Local Settings\Temp\UAC4ad4.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\local.ds (Spyware.StolenData) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds (Spyware.StolenData) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds.lll (Spyware.StolenData) -> Quarantined and deleted successfully.
C:\Documents and Settings\Me\Local Settings\Temp\bleep3.exe (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACoewwkfyc.log (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACpaikgulf.log (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACpyrobrqp.dat (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\UACrtrdylqp.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\SYSTEM32\DRIVERS\mglpewgn.sys (Trojan.Agent) -> Delete on reboot.

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:48 PM

Posted 27 March 2009 - 09:29 PM

Yes, version 1.35 has been released so update and perform a Full scan in normal mode.

IMPORTANT NOTE: One or more of the identified infections (UAC[random characters].***) was related to a backdoor Trojan and a nasty variant of the TDSSSERV rootkit. Rootkits, backdoor Trojans, Botnets, and IRCBots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control again. and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:Although the rootkit was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removed the computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 28 March 2009 - 11:46 AM

Well that is really unfortunate. Any recommendations on how to proceed based on the particular infections my computer had?

#9 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:48 PM

Posted 28 March 2009 - 01:31 PM

Your decision as to what action to take should be made by reading and asking yourself the questions presented in the "When should I re-format?" and What Do I Do? links previously provided. As I already said, in some instance the malware may leave so many remnants behind that security tools cannot find them and your system cannot be completely cleaned, repaired or trusted. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore with a vendor-specific Recovery Disk or Recovery Partition removes everything and is the safest action but I cannot make that decision for you.

Should you decide not to reformat, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. Let me know how you wish to proceed.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#10 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 29 March 2009 - 04:43 PM

Well, it sounds like reformatting is really the only way to get my computer back... Is there any way to safely back up what I have on the infected computer? I haven't turned it on since yesterday for fear of whatever malware fragments are left multiplying. I'm pretty sure there are still issues, and I'd like to get whatever I can off of it before I wipe it clean -- but I want to make absolutely sure that I don't "back up" any part of the infection. Thanks for your help...

#11 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:48 PM

Posted 30 March 2009 - 08:12 AM

Reformatting a hard disk deletes all data. Should you decide to reformat, you can back up all your important documents, personal data files, photos to a CD, external hard drive or USB drive. The safest practice is not to backup any executable files (*.exe), screensavers (*.scr), autorun (.ini) or script files (.PHP, .ASP, and .HTML) files because they may be infected by malware. Some types of malware may even disguise itself by adding and hiding its extension to the existing extension of file(s) so be sure you look closely at the full file name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

If you're not sure how to reformat or need help with reformatting, please review:These links include step-by-step instructions with screenshots:Don't forget you will have to go to Microsoft Update and apply all Windows security patches after reformatting.
Also see How to keep your Windows XP activation after clean install.

Note: If you're using an IBM, Sony, HP, Compaq or Dell machine, you may not have an original XP CD Disk. By policy Microsoft no longer allows OEM manufactures to include the original Windows XP CD-ROM on computers sold with Windows preinstalled. Instead, most computers manufactured and sold by OEM vendors come with a vendor-specific Recovery Disk or Recovery Partition for performing a clean "factory restore" that will reformat your hard drive, remove all data and restore the computer to the state it was in when you first purchased it. See Technology Advisory Recovery Media

If you need additional assistance with reformatting or have questions about multiple hard drives, you can start a new topic in the Windows XP Home and Professional forum. If you don't get a reply, please send me a PM and I will get someone to take a look.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#12 ashleys

ashleys
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:09:48 PM

Posted 05 April 2009 - 05:15 PM

Thanks, quietman. I got my recovery disk in the mail yesterday and I'm going to reformat today. I'm sorry this was the outcome, but you guys have been wonderful in the process. Will update this thread (hopefully) soon with results...
-ashley

#13 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,288 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:48 PM

Posted 05 April 2009 - 06:11 PM

You're welcome and good luck.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users