Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help in removing a vundo trojan


  • Please log in to reply
12 replies to this topic

#1 gamer713

gamer713

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 26 April 2009 - 12:44 PM

Hello,

While using my computer a few days ago I received a group of warnings about a potential virus in my computer, it wanted me to download anti virus software.
I closed the windows without opening the anti virus download and closed the programs I had open as the pop up caused them to crash. I scanned my computer with my McAfee security software and a large number of my systems files were quarantined due to a trojan called vundo.gen.w. This trojan seems to have gotten into my system32 files as a number of them are now quarantined by McAfee at this time. I have also noticed 3 other trojans that are also quarantined but they seem to be only in my java file. McAfee has given me a list of the infected files and by what they are infected with but, I am not sure how to safely remove them. Currently my computer is working but not properly. I have a Compaq Presario with windows xp running and need help.

Thank you

BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 26 April 2009 - 07:46 PM

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 27 April 2009 - 01:54 PM

I have run the MBAM program and the log provided is below;

Malwarebytes' Anti-Malware 1.36
Database version: 2049
Windows 5.1.2600 Service Pack 2

4/27/2009 2:25:21 PM
mbam-log-2009-04-27 (14-25-21).txt

Scan type: Quick Scan
Objects scanned: 90633
Time elapsed: 15 minute(s), 59 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 5
Registry Keys Infected: 13
Registry Values Infected: 8
Registry Data Items Infected: 6
Folders Infected: 3
Files Infected: 16

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\kagevizu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kofemube.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\gahejeyu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hodujifa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\bebeduyi.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7b450416-6c4e-47f1-927c-7b2c7a2d4068} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{7b450416-6c4e-47f1-927c-7b2c7a2d4068} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7b450416-6c4e-47f1-927c-7b2c7a2d4068} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{9034a523-d068-4be8-a284-9df278be776e} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\malwarecore 7.4 (Rogue.MalwareCore) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\malwarecore 7.4.exe 7.4 (Rogue.MalwareCore) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dslcnnct (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\videoPl.chl (Trojan.Zlob) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tikapibote (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4bed8bac (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cpm48deb830 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ssodl (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securewebinfo.com (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.safetyincludes.com (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.securemanaging.com (Trojan.Zlob) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\kagevizu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\kagevizu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\gahejeyu.dll -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\MalwareCore 7.4 (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\Lang (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\Quarantine (Rogue.MalwareCore) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\bebeduyi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kofemube.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\gahejeyu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\hodujifa.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kagevizu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\kezolape.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\merilaro.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hupihola.exe (Trojan.Vundo.V) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bob\Local Settings\Temp\e.exe (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\MalwareCore 7.4.url (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\msvcp71.dll (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\msvcr71.dll (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\mwdb.dat (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\Program Files\MalwareCore 7.4\Lang\English.ini (Rogue.MalwareCore) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dogowuvu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jijivafo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

I am not sure but I think that this may have done the trick, the computer still runs slow but the pop-up's seem to have stoped.
If you have any sugestions that my still be needed please let me know.

Thank you.

#4 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 27 April 2009 - 04:12 PM

Reboot your computer, run the Malwarebytes Full-Scan and post the new log.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#5 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 29 April 2009 - 10:11 PM

Somehow the vundo returned, I think it was from a game site. I ran mbam on a quick scan and it removed the new trojans then, I updated mbam and re-ran the short scan and when it found nothing, I rebooted the computer and I ran the full scan with mbam and below is the report:

Malwarebytes' Anti-Malware 1.36
Database version: 2060
Windows 5.1.2600 Service Pack 2

4/29/2009 9:22:21 PM
mbam-log-2009-04-29 (21-22-21).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 163259
Time elapsed: 1 hour(s), 29 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{BFAA719B-281F-45B6-9E39-9D4BB578C2A4}\RP635\A0076207.exe (Trojan.Vundo.V) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{BFAA719B-281F-45B6-9E39-9D4BB578C2A4}\RP639\A0076465.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{BFAA719B-281F-45B6-9E39-9D4BB578C2A4}\RP639\A0076466.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

I also have the log showing what the short scan discovered and removed if it is needed

So far the only things that are still not completely right is that the computer is still slow, I no longer can turn on my windows security auto updates, and McAfee keeps telling me that it is stoping a Buffer Overload: c:\Windows\ system32\services.exe and I am not sure how to fix that.
Thank you so much for your help so far.

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 29 April 2009 - 10:16 PM

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 30 April 2009 - 04:23 PM

Ok, I ran the ATF Cleaner and it freeded up alot. also I ran the SuperAntiSpyware for the C:\Fixed drive as instucted and the log is posted below:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/30/2009 at 04:30 PM

Application Version : 4.26.1002

Core Rules Database Version : 3872
Trace Rules Database Version: 1820

Scan type : Complete Scan
Total Scan Time : 04:29:03

Memory items scanned : 276
Memory threats detected : 0
Registry items scanned : 6373
Registry threats detected : 22
File items scanned : 69711
File threats detected : 8

Trojan.Smitfraud Variant
HKLM\Software\Classes\CLSID\{d4c51fa4-9192-4a9a-8d2a-a0690c92f171}
HKCR\CLSID\{D4C51FA4-9192-4A9A-8D2A-A0690C92F171}
HKCR\CLSID\{D4C51FA4-9192-4A9A-8D2A-A0690C92F171}\InProcServer32
HKCR\CLSID\{D4C51FA4-9192-4A9A-8D2A-A0690C92F171}\InProcServer32#ThreadingModel
C:\WINDOWS\SYSTEM32\LRUVQVW.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{d4c51fa4-9192-4a9a-8d2a-a0690c92f171}

Adware.ShopAtHomeSelect
HKU\S-1-5-21-2194728553-449323585-2600817423-1005\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{E8DAAA30-6CAA-4B58-9603-8E54238219E2}

Rootkit.Mailer/Gen
HKLM\System\ControlSet001\Services\6b804da3
C:\WINDOWS\SYSTEM32\DRIVERS\6B804DA3.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_6b804da3
HKLM\System\ControlSet002\Services\6b804da3
HKLM\System\ControlSet002\Enum\Root\LEGACY_6b804da3
HKLM\System\CurrentControlSet\Services\6b804da3
HKLM\System\CurrentControlSet\Enum\Root\LEGACY_6b804da3

Trojan.DNSChanger-Codec
HKLM\Software\6
HKLM\Software\6#31AC70412E939D72A9234CDEBB1AF5867B
HKLM\Software\6#31897356954C2CD3D41B221E3F24F99BBA
HKLM\Software\6#31C2E1E4D78E6A11B88DFA803456A1FFA5
HKLM\Software\8
HKLM\Software\8#31AC70412E939D72A9234CDEBB1AF5867B
HKLM\Software\8#31897356954C2CD3D41B221E3F24F99BBA
HKLM\Software\8#31C2E1E4D78E6A11B88DFA803456A1FFA5

Rogue.MalwareCore
HKLM\Software\Microsoft\Windows\CurrentVersion\Run#MalwareCore 7.4 [ "C:\Program Files\MalwareCore 7.4\MalwareCore 7.4.exe" /h ]

Rogue.Component/Trace
HKU\S-1-5-21-2194728553-449323585-2600817423-1005\Software\Microsoft\FIAS4057

Adware.Vundo/Variant-EmpiaA
C:\WINDOWS\SYSTEM32\DIFUMAHE.DLL
C:\WINDOWS\SYSTEM32\MIMEGEPA.DLL
C:\WINDOWS\SYSTEM32\SOYADUJA.DLL
C:\WINDOWS\SYSTEM32\WUKAPOKI.DLL
C:\WINDOWS\SYSTEM32\YOKOWEFU.DLL

Trojan.Agent/Gen-FakeAlert
C:\WWMEOBLK.EXE

I have not been getting the Buffer Overload warning from McAFee so far but, I still can't turn on the windows security automatic updates and my McAFee is now not being reconized by windows security although McAFee is showing that the computer is protected. The computer has however; gotten a bit faster.
Thank you so much for your help thus far.

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 30 April 2009 - 04:43 PM

The log shows a rootkit infection. Some of these can be very nasty and your online passwords may have been compromised.

Please print out and follow these instructions: "How to use SDFix". This program is for Windows 2000/XP ONLY.
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Disconnect from the Internet and temporarily disable your anti-virus, script blocking and any real time protection programs before performing a scan.
  • When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt.
  • If SDFix is unable to run after rebooting from Safe Mode, run SDFix in either Mode, and type F, then press Enter for it to finish the final stage and produce the report.
  • Please copy and paste the contents of Report.txt in your next reply.
  • Be sure to renable you anti-virus and and other security programs before connecting to the Internet.
-- If the computer has been infected with the VirusAlert! malware warning from the clock and the Start Menu icons or drives are not visible, open the SDFix folder, right-click on either the XP_VirusAlert_Repair.inf or W2K VirusAlert_Repair.inf (depending on your version of Windows) and select Install from the Context menu. Then reboot to apply the changes.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#9 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 01 May 2009 - 07:00 PM

Ok ran th SDFix and the report is below:

SDFix: Version 1.240
Run by Bob on Fri 05/01/2009 at 07:26 PM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Infected user32.dll Found!

user32.dll File Locations:

"C:\WINDOWS\$hf_mig$\KB890859\SP2QFE\user32.dll" 577024 03/02/2005 02:19 PM
"C:\WINDOWS\$hf_mig$\KB925902\SP2QFE\user32.dll" 578048 03/08/2007 11:48 AM
"C:\WINDOWS\$NtUninstallKB890859$\user32.dll" 577024 08/10/2004 11:00 AM
"C:\WINDOWS\$NtUninstallKB925902$\user32.dll" 577024 03/02/2005 02:09 PM
"C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\user32.dll" 578560 04/13/2008 08:12 PM
"C:\WINDOWS\system32\user32.DLL" 577536 04/29/2009 06:12 PM
"C:\WINDOWS\system32\dllcache\user32.dll" 577536 04/29/2009 06:12 PM

[C:\WINDOWS\$hf_mig$\KB890859\SP2QFE\user32.dll] 1800F293BCCC8EDE8A70E12B88D80036
[C:\WINDOWS\$hf_mig$\KB925902\SP2QFE\user32.dll] 7AA4F6C00405DFC4B70ED4214E7D687B
[C:\WINDOWS\$NtUninstallKB890859$\user32.dll] C72661F8552ACE7C5C85E16A3CF505C4
[C:\WINDOWS\$NtUninstallKB925902$\user32.dll] DE2DB164BBB35DB061AF0997E4499054
[C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\user32.dll] B26B135FF1B9F60C9388B4A7D16F600B
[C:\WINDOWS\system32\user32.DLL] C82D4A8F8FFE977B504CE2F31E8CD426
[C:\WINDOWS\system32\dllcache\user32.dll] C82D4A8F8FFE977B504CE2F31E8CD426


[C:\WINDOWS\System32\ftapjgue] B409909F6E2E8A7067076ED748ABF1E7
[C:\WINDOWS\System32\kymvvdwn] C82D4A8F8FFE977B504CE2F31E8CD426


Note: SDFix does not repair this file!



Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

Trojan Files Found:

C:\127385~1 - Deleted

This dose not look good and my Windows security still won't let me turn updates on or ackowledge my McAFee security software.
Not sure how to proceed.
Thank you for your help to this point.

#10 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 02 May 2009 - 02:00 AM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on drweb-cureit.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and unheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#11 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 02 May 2009 - 11:20 AM

Tryed to download Dr.Web cure it from the link given and the website direct. Everytime I tryed to do the down load internet exployer displayed a message that; to log on to this ftp server (ftp drweb.com) that a user name and pasword would be needed, no matter what I tryed to establish a user name and password it always came back page cannot be displayed i'm not sure how to proceed now.

I now have Dr.Web cure it, I was reading another post and the software was recomended to use so just on a chance, I tryed the link and it allowed me to download it without the ftp message. I will be runing the program later today and posting the results when it is completed.

Thank you for your help so far.

Edited by gamer713, 02 May 2009 - 01:13 PM.


#12 gamer713

gamer713
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:02:46 AM

Posted 04 May 2009 - 04:47 PM

Been trying to run Dr.Web Cure it Anti-virus for 2 days now with no success. I have done 12 scans and only the express scan that has found nothing works the complete scans get knocked out by eigther a setup.exe error or a blue screen that pops up so fast I cant read it but, in eigther case the scan is stoped about half way and the system automaticly reboots into normal mode. I am not sure what to do now but so, and help in this matter would be fantastic.

Thank you for all of your help so far.

Edited by gamer713, 04 May 2009 - 04:48 PM.


#13 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:46 PM

Posted 04 May 2009 - 10:27 PM

In Windows XP, the default setting is for the computer to reboot automatically when a fatal error occurs. An alternative is to turn off the automatic reboot feature so you can actually see the error code/STOP Message (which is also known as the Blue Screen Of Death (BSOD)).

To change the recovery settings and Disable Automatic Rebooting, right-click on My Computer and select Properties > Advanced tab. Under "Startup and Recovery", click on the "Settings" button and go to "System failure". Make sure that "Write an event to the system log" is checked and that "Automatically restart" is unchecked. Click "OK" and reboot for the changes to take effect.

This will not cure your problem but instead of crashing and restarting you will get a blue diagnostic screen with information displayed that will allow you to better trace your problem. Next time your computer crashes copy down the entire error message (including all the numbers) and post it back here.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users