Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Virus/Malware.


  • Please log in to reply
9 replies to this topic

#1 metalheadz

metalheadz

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:34 AM

Posted 03 May 2009 - 03:31 PM

Hi i am new to this forum, i am hoping someone will be able to help me out here.

I am running XP Profesonal SP3. ESET Nod 32. Malwarebytes. Super antispyware. AFT Cleaner and Hijack This.

About 4 days ago both firefox and explorer started redirecting me to unrelated random web pages after searching on google.

I can no longer burn cd's. No program is able to find the cd drive, but i can play them with out a trouble.

The next thing was being unable to open hard drives, with a error message "" Windows cannot find 'RECYCLER\S-7-4-63-100023377-100018411-100006029-6536.com' Make sure you typed the name correctly. and then try again. To seach for a file, click the Start button, and click Search. ""

Ive had a similar problem before with the drives. Some type of trogan dns changer. fave avalert. which keep respawning and being found as .tmp files. Which i resolved with Malwarebytes and Hijack this

Another thing is i've been unable to open and run Malwarebytes an SUPERAntiSpyware under there original .exe. i have had to renamed them to somthing else in order to get them open and running

I have run a virus scan in ESET Nod 32 to find "win32 olmarik.hh trojan"
which was deleted and quarentined

i then ran AFT Cleaner. SUPERAntiSypware which found and deleted a number of things. also run Malwarebytes which found and deleted a number of trojans.

the problem seemed to be resolved for a while (until next reboot), however it is still persisting . i have now no idea what i can do,

i hope someone out there can help me please!!

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,263 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:34 PM

Posted 04 May 2009 - 07:11 AM

Please post the results of your MBAM scan for review.

To retrieve the Malwarebytes Anti-Malware scan log information, launch MBAM.
  • Click the Logs Tab at the top.
    • The log will be named by the date of scan in the following format: mbam-log-date(time).txt
      -- If you have previously used MBAM, there may be several logs showing in the list.
  • Click on the log name to highlight it.
  • Go to the bottom and click on Open.
  • The log should automatically open in notepad as a text file.
  • Go to Edit and choose Select all.
  • Go back to Edit and choose Copy or right-click on the highlighted text and choose copy from there.
  • Come back to this thread, click Add Reply, then right-click and choose Paste.
  • Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Logs are saved to the following locations:
-- In XP: C:\Documents and Settings\<Username>\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs
-- In Vista: C:\Documents and Settings\Users\All Users\Malwarebytes\Malwarebytes' Anti-Malware\Logs


Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to download the Full version Free Trial, just ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and unheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
If you cannot boot into safe mode, then perform your scan in normal mode..
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 metalheadz

metalheadz
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:34 AM

Posted 05 May 2009 - 07:38 AM

Hi quiteman7,

Thanks for your help. Here is the Malwarebytes log as you requested

Malwarebytes' Anti-Malware 1.36
Database version: 2069
Windows 5.1.2600 Service Pack 3

5/05/2009 6:58:51 PM
mbam-log-2009-05-05 (18-58-06).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 174465
Time elapsed: 55 minute(s), 54 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\gxvxccounter (Trojan.DNSchanger) -> No action taken.





Also here is the DrWeb Report, i will just add that i was unable to move infected or suspicious items, upon closing the program suggested to me to take action, i chose to delete, i hope that wont cause an issue. here is the log

autorun.inf;e:;Probably Win32.HLLW.Autoruner.corrupted;;
gxvxcvewwbwrqpphqlxwkbmwxodplmeuwhkyo.sys;c:\windows\system32\drivers;BackDoor.Tdss.115;;
SDFix.exe\SDFix\apps\Process.exe;C:\Documents and Settings\Administrator\Desktop\SDFix.exe;Tool.Prockill;;
SmitfraudFix.exe\SmitfraudFix\Process.exe;C:\Documents and Settings\User\My Documents\My Downloads\SmitfraudFix.exe;Tool.Prockill;;
SmitfraudFix.exe\SmitfraudFix\restart.exe;C:\Documents and Settings\User\My Documents\My Downloads\SmitfraudFix.exe;Tool.ShutDown.14;;
SmitfraudFix.exe;C:\Documents and Settings\User\My Documents\My Downloads;Archive contains infected objects;;
Process.exe;C:\Program Files\Mozilla Firefox\SmitfraudFix;Tool.Prockill;;
restart.exe;C:\Program Files\Mozilla Firefox\SmitfraudFix;Tool.ShutDown.14;;
Process.exe;C:\SDFix\apps;Tool.Prockill;;
gxvxcakcpcndpcbvxvklbprxmrrdxudpurfux.dll;C:\WINDOWS\system32;Trojan.Click.25750;Deleted.;
Process.exe;C:\WINDOWS\system32;Tool.Prockill;;
gxvxcvewwbwrqpphqlxwkbmwxodplmeuwhkyo.sys;C:\WINDOWS\system32\drivers;BackDoor.Tdss.115;;
05 Systematic Terror.mp3;E:\Hip-Hop\Kold Sweat Compilation no.2 - Right and Exact;Modification of Morgot.223;;

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,263 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:34 PM

Posted 05 May 2009 - 07:50 AM

Rescan again with Malwarebytes Anti-Malware (Quick Scan) in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Your database shows 2069. Last I checked it was 2078.

IMPORTANT NOTE: One or more of the identified infections (gxvxccounter) was related to a backdoor Trojan which is a nasty variant of the TDSSSERV rootkit. Rootkits, backdoor Trojans, Botnets, and IRCBots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control again. and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:Although the rootkit was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removed the computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 metalheadz

metalheadz
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:34 AM

Posted 05 May 2009 - 03:14 PM

it seems this dnschanger keeps popping up
Malwarebytes' Anti-Malware 1.36
Database version: 2079
Windows 5.1.2600 Service Pack 3

6/05/2009 6:11:46 AM
mbam-log-2009-05-06 (06-11-46).txt

Scan type: Quick Scan
Objects scanned: 86187
Time elapsed: 3 minute(s), 44 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\gxvxccounter (Trojan.DNSchanger) -> Quarantined and deleted successfully.


I think i will take on your advice to reformat, how ever i dont have a Copy of windows, would you recommend my buying vista or xp?

also is it safe to copy music, movies and personal files to a back up disc and reload once a reformat has ben done?

Edited by metalheadz, 05 May 2009 - 03:15 PM.


#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,263 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:34 PM

Posted 06 May 2009 - 07:56 AM

If you're using an IBM, Sony, HP, Compaq or Dell machine, you may not have an original XP CD Disk. By policy Microsoft no longer allows OEM manufactures to include the original Windows XP CD-ROM on computers sold with Windows preinstalled. Instead, most computers manufactured and sold by OEM vendors come with a vendor-specific Recovery Disk or Recovery Partition for performing a clean "factory restore" that will reformat your hard drive, remove all data and restore the computer to the state it was in when you first purchased it. See Technology Advisory Recovery Media.

Reformatting a hard disk deletes all data. You can back up all your important documents, personal data files, photos to a CD or DVD drive, not a flash drive or external hard drive as they may become compromised in the process. The safest practice is not to backup any executable files (*.exe), screensavers (*.scr), autorun (.ini) or script files (.php, .asp, and .html) files because they may be infected by malware. Avoid backing up compressed files (.zip, .cab, .rar) that have executable files inside them as some types of malware can penetrate and infect .exe files within compressed files too. Other types of malware may even disguise itself by adding and hiding its extension to the existing extension of file(s) so be sure you look closely at the full file name. After reformatting, as a precaution, scan the backed up data with your anti-virus prior to copying anything back to your hard drive.

If you need additional assistance with reformatting, you can start a new topic in the Windows XP Home and Professional forum.

Edited by quietman7, 06 May 2009 - 07:56 AM.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 metalheadz

metalheadz
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:34 AM

Posted 24 May 2009 - 03:05 PM

Hi quietman7,

Thanks for your advise, i backed up personal data and format both drives
and done a clean install of windows XP.
I Updated all crital updates, SP3 and more.

Before copying personal files from dvd over to the new hard drive i scanned for viruses.

After about copying 5 or 6 dvd's of music and photos , i discovered on my secondary storage drive
a mysterious folder appeared of random letters and numbers with a folder inside named "update"
thinking this was somthing left over from a mircosoft update i tried to delete it, but i am unable to.

I performed a Malewarebytes scan to discover 2 possible threats.Malewarebytes discribed these as "hacktools" These were removed upon reboot.

I then performed a full system scan in Nod 32. No infections found

I ran another Malewarebytes scan in safe mode. No malicious files found

Still the mysterious folder remains. Just curious if you know what this is.
Is it dangerous? and is it safe to delete with FileASSASIN?

Thanks for your help.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,263 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:34 PM

Posted 24 May 2009 - 03:30 PM

What's the date of that mystery folder? That should give you a clue as to when it was created.
Are there any files inside the folder? You may have to Reconfigure Windows XP to show hidden files, folders as a precaution to check for any files hidden from your view.

Without further information, I cannot tell what the folder is for or what it was related to. Legitimate folders can be named with random letters and numbers. For example, when running Microsoft's Malicious Software Removal Tool (MSRT), a temporary folder named with random alpha/numeric characters (i.e 79f142e5e9e574d23954) will be created on your C:\ drive that contains mrt.exe, mrtstub.exe and a file named $shtdwn$.req. Most of the time after performing a scan and you click finish/cancel the folder will automatically be removed right away or after the next restart. If not, the folder can be deleted manually without an adverse effect on the computer.

FileASSASIN is intended to remove stubborn files, not folders. Did you try to remove it in safe mode?

If you have no success in safe mode, then there are several free programs available to help delete stubborn files/folders.
Unlocker
DelinvFile
WinFile
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 metalheadz

metalheadz
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:34 AM

Posted 25 May 2009 - 05:23 AM

Hi quietman7,

The date of the folder was yesterday, the day I reinstalled and updated windows
And downloaded and installed programs such as, Office, winamp. Etc. I also started to load my bad up files,
Music videos pictures etc.

Inside the mysterious folder is nothing but a folder named "update" there are no hidden files in either folders. Total size of both folders is 0 bytes.

I assumed it would be temp folder from the update, like the one you described, this folder is also name of random letters and numbers. What makes me a little suspicious is that it is not on my C: but on my second hard drive which I use for storing music and videos.

I have tried to delete the folder in safe mode with no success. Only the same windows message saying "access denied"

My system appears clean. The folder seems harmless, just rather annoying. Do you think it is safe to remove it with one of the programs you suggested?

If there is anything else I can do to help identify the folder or problem. Please let me know.

Thank you for your help :thumbsup:

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,263 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:34 PM

Posted 25 May 2009 - 07:22 AM

Try some of these suggestions before resorting to any of the tools I mentioned:
"Access is Denied" error message when you try to open a folder.
Error Message: "Access Is Denied" When You Try to Open NTFS File System Folders.
How to take ownership of a file or folder in Windows XP
Windows File and Folder Ownership (includes screenshots)
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users