Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Multiple infections on my XP SP2- not coming clean with many programs

  • Please log in to reply
5 replies to this topic

#1 my2cent


  • Members
  • 3 posts
  • Local time:03:00 AM

Posted 17 May 2009 - 03:31 PM

Sorry this is long. I have XP SP2; my Norton expired several months ago. I have copied everything I care about (pictures and documents) onto an external drive (although I presume it is now infected too?) and am prepared to reformat if necessary. Initial symptoms included IE popups (I use firefox) and warnings from my expired Norton and Windows about attempts to communicate to and from my computer. I am also unable to connect to any antivirus/support webpages. That computer is now disconnected. I have run Spybot, Adaware, Malwarebytes, AVG, and CWSshredder (installing and uninstalling one at a time); they all found things (see below). Currently I can pretty much get a clean report from each of them in either normal or safe mode. I have also deleted many bad things in Hijackthis. (More details below). I have also run the fixvirut program, which came back clean. However there is still an infection (Virut and/or Delf?).

I still have the symptoms of:
1) upon reboot my “host” file is changed to: jl.chura.pl
2)The process Bndmss.exe returns even after I kill it with hijackthis.
3) I have an nvrsk.dll file that AVG complained about for a long time; it has stopped complaining, but it was never fixed.
4) My rdpclip.exe file is too big (I noticed because one program said it was infected but could not be removed). I copied a clean 61kB file over the old 80+kB file and upon reboot the new file was back to 80+kB
5) I often at login get a “The file could not be written” error
6) There is a Win32.Delf.ak infection that comes back on reboot (only detected by spybot in safe mode)

Various antivirus programs have found and removed the following viruses: virut, CWSsvchost32, koobface, MyDoom, sopidkc.exe, c.exe, virtumonde, ribmghp.dll.bak (cryptor object) delf.ak (most in multiple files along with many other problems including lots of generic.trojan, heuristic finds, registry changes to disable firewall, etc)

I’m not sure how to post hijackthis (or other) logs because if I connect the computer it can’t get to the relevant webpages (not to mention that it will be downloading fresh viruses faster than I can do something productive). Also, I am not excited about copying files from that machine onto my good machine to upload from there

Here is a list of things I have removed in Hijack this:
a) in the windows/system32 folder:
satulosu.dll, hofofazo.dll, sys32dll, wulubuvo.dll, jkshfuiehi.dll, pebigamu.dll, ribmghp.dll
(many with associated rundll32.exe)
b) ld08.exe, pp06.exe, bndmss.exe,
c) Several A00F###…exe in ~TEMP
d) Thunmail\testabd.dll
e) In Internet settings (These changes correspond to Sophos’ description of the Masigy-Gen virus):
f) services.exe in a RECYCLER folder

All the other things in Hijackthis are names of actual program files (although I don’t know enough to know if they should be there or not)

So my questions are:
1) Am I safe to put my external harddrive with pictures/documents from the infected computer into a computer with up to date Norton?
2) Should I spend more time trying to repair the infected computer? (if so how? – can I put the harddrive into an external USB case and plug it into a clean computer with up-to-date Norton?) If I clean it will it really be completely trustworthy? If it is faster and/or safer to start from scratch, what is the best procedure to reformat/partition etc to be sure everything is gone?

Thanks for any advice!

BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,530 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:05:00 AM

Posted 17 May 2009 - 05:48 PM

Hello First run a full scan and see if it scans the External also..
Did your A/V find Virut?

Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Full scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Now run part 1 of S!Ri's SmitfraudFix
Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 my2cent

  • Topic Starter

  • Members
  • 3 posts
  • Local time:03:00 AM

Posted 18 May 2009 - 04:20 PM

Sorry it took so long-a couple complications. I did everything described. All viruses are not gone because mu 'hosts' file is still getting overwritten.

To answer your first question, yes Virut was found by one of my scanners (I think AVG) in ~4 files, including rdpclip.exe It "Fixed" the problem in the files but said rdpclip.exe was white-listed. I copied a clean 61kB file over the old 80+kB file and upon reboot the new file was back to 80+kB, so I worry that Virut is still there and not being detected. So again if a reformat seems better, I'll do that.

Here is the mbam log (I thought I had done this before but had apparently not successfully updated the definitions):

mbam-log-2009-05-17 (21-10-21).txt
Malwarebytes' Anti-Malware 1.36
Database version: 2110
Windows 5.1.2600 Service Pack 2

5/17/2009 9:10:21 PM
mbam-log-2009-05-17 (21-10-21).txt

Scan type: Full Scan (C:\|F:\|)
Objects scanned: 222959
Time elapsed: 40 minute(s), 56 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 8
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\6to4v32.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\y537.y537mgr (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\y537.y537mgr.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\{e7f15ac4-e0a9-43f0-921b-70dfea621220} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{c2ba40a1-74f3-42bd-f434-12345a2c8953} (Trojan.Ertfor) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msncache (Trojan.Agent) ->
Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\6to4 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\6to4 (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\6to4 (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\id (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\host (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\ThunMail (Spyware.Onlinegamer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\796525 (Trojan.BHO) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\drivers\99c75149.sys (Rootkit.Rustock) -> Delete on reboot.
C:\WINDOWS\system32\6to4v32.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\dncyool64.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOwS\9g2234wesdf3dfgjf23 (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ferryl.cbv (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\inqby.sr (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fairy.an (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dolman.zt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ashl.nq (Malware.Trace) -> Quarantined and deleted successfully.
C:\wINDOwS\mqcd.dbt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SYS32DLL.exe (Worm.KoobFace) -> Quarantined and deleted successfully.

Here is the smitfraud file:


SmitFraudFix v2.416
Scan done at 21:25:16.23, Sun 05/17/2009
Run from C:\Documents and Settings\Admin\Desktop\SmitfraudFix
OS: Microsoft windows XP [version 5.1.2600] - windows_NT
The filesystem type is NTFS
Fix run in normal mode

»»»»»»»»»»»»»»»»»»»»»»»» Process

C:\Program Files\Adobe\Photoshop Elements 4.0\PhotoshopElementsFileAgent.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Java\jre1.5.0_11\bin\jusched.exe
C:\Program Files\BroadJump\Client Foundation\CFD.exe
C:\Program Files\palmOne\HOTSYNC.EXE

»»»»»»»»»»»»»»»»»»»»»»»» hosts

»»»»»»»»»»»»»»»»»»»»»»»» C:\

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

C:\WINDOWS\Tasks\At?.job FOUND !
C:\WINDOWS\Tasks\At??.job FOUND !

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32

»»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Admin

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Admin\LOCALS~1\Temp

»»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\Admin\Application Data

»»»»»»»»»»»»»»»»»»»»»»»» Start Menu

»»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\Admin\FAVORI~1

»»»»»»»»»»»»»»»»»»»»»»»» Desktop

»»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

»»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys

»»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\1]
"FriendlyName"="My Current Home Page"

»»»»»»»»»»»»»»»»»»»»»»»» o4Patch
!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» IEDFix
!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Agent.OMZ.Fix
!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» VACFix
!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» 404Fix
!!!Attention, following keys are not inevitably infected!!!

Credits: Malware Analysis & Diagnostic
Code: S!Ri

»»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» AppInit_DLLS
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\S0FTWARE\Microsoft\windows NT\CurrentVersion\Windows]

»»»»»»»»»»»»»»»»»»»»»»»» Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\S0FTWARE\Microsoft\windows NT\CurrentVersion\Winlogon]

»»»»»»»»»»»»»»»»»»»»»»»» RK

[HKEY_LOCAL_MACHINE\S0FTWARE\Microsoft\windows NT\CurrentVersion\Winlogon]

»»»»»»»»»»»»»»»»»»»»»»»» DNS

»»»»»»»»»»»»»»»»»»»»»»»» Scanning for wininet.dll infection

»»»»»»»»»»»»»»»»»»»»»»»» End

Thanks for your time!

#4 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,530 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:05:00 AM

Posted 18 May 2009 - 10:54 PM

Ok well I wanted to see if it was active since it is a Format will fix all the problems.

Your system is infected with a nasty variant of Virut, a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. Virux is an even more complex file infector which also infects script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut
This kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 my2cent

  • Topic Starter

  • Members
  • 3 posts
  • Local time:03:00 AM

Posted 18 May 2009 - 11:42 PM

The following should be safe, right?
1)Copy my pictures and documents to an external drive (but no executables on it)
2)Run a full format (any reason to do it more than once or throw a partition on&off for good measure?)
3)Reinstall OS and up to date AV
4)scan the external drive with current AV, then copy the documents back

I love the itching ears quote and, although out of context, its relation to malware distribution.

#6 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,530 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:05:00 AM

Posted 19 May 2009 - 08:39 AM

That looks loike a good plan.

Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

The best proceedure is a low level format. This completely wipes the drive. Then reinstall the OS.
Use the free version of Active@ KillDisk.
Or Darik's Boot And Nuke

The best sources of Information on this are
Reformatting Windows XP
Michael Stevens Tech

Of course also feel free to ask anything on this in the XP forum. They'd be glad to help.
2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe's, .scr, .com, .pif etc... as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users