Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

just got virused bad, took some small steps, what now?


  • Please log in to reply
11 replies to this topic

#1 orazner

orazner

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 27 May 2009 - 05:52 AM

Hi, and thanks in advance for any help with this.

just about 30 minutes ago, I clicked a link in firefox (a link redirected from tvduck.com), and my computer and browser froze. I had winpatrol installed and it began bombarding me with new startup alerts, at first a few malware sounding names, and then as fast as I could hit "no" to accepting them a whole barage of nonsensicle virus named startups began popping up in winpatrol. my windows firewall had turned off, iexplorer popups where coming up, and firefox was put on some weird proxy ( I discovered that later). I managed to get some folders open to see what had been put there (alot) but my computer was starting to become completely crashed so I held down the power button and rebooted in safe mode. even then, the cpu was locked, and I used msconfig to reboot again w, networking, and selected my user instead of administrator, which worked.
then I googled some of the weird files that I saw in c: ("kortcale" for example, there still all there as I type this") and found a thread in this forum, which advised to download and run combofix, which I did.

So... I have a combofix log completed, I haven't ran any other antivirus programs though. and a lot of the files flagged in the log are still in my system folders.

what should I do next, should I post the combo fix log?

thanks -ollie

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 27 May 2009 - 09:57 AM

Please note the message text in blue at the top of this forum.

You should not be using Combofix unless instructed to do so by a Malware Removal Expert who can interpret the logs. It is a powerful tool intended by its creator to be "used under the guidance and supervision of an expert", NOT for private use. Combofix was never meant to be used as a general purpose malware scanner like SuperAntispyware or Malwarebytes' Anti-Malware. Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again. Please read Combofix's Disclaimer. That's the decision by the creator and we will abide by that decision.

Further, ComboFix logs are not permitted outside the HijackThis Logs and Malware Removal forum and then only when requested by a HJT Team member.

Please download Malwarebytes Anti-Malware (v1.37) and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 27 May 2009 - 01:55 PM

okay, I ran malwarebytes. it found 9 infected files, one suspicious looking application file (vyknbkp) is still in C: and wasn't found by malware bytes though. but here is the log; thanks btw!

Malwarebytes' Anti-Malware 1.37
Database version: 2185
Windows 5.1.2600 Service Pack 3

5/27/2009 2:44:06 PM
mbam-log-2009-05-27 (14-44-06).txt

Scan type: Quick Scan
Objects scanned: 79048
Time elapsed: 3 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
KHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\prnet (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\rn.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\hcpjmkup.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\jotvxhh.exe (Worm.Koobface) -> Quarantined and deleted successfully.
c:\kortcale.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\kvonprd.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\orrx.exe (Worm.Koobface) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\prnet.tmp-up.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sysloc\sysloc.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\txml.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

#4 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 27 May 2009 - 02:10 PM

also dyae.exe is in c: not sure about other windows folders

Edited by orazner, 27 May 2009 - 02:10 PM.


#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 27 May 2009 - 02:17 PM

Anytime you come across a suspicious file for which you cannot find any information about, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to Jotti's virusscan or VirusTotal. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.

If its confirmed bad, then you can remove it.

Malwarebytes Anti-Malware has a built-in FileAssassin feature for removing stubborn malware or other malicious files that it did not detect.
  • Go to the "More Tools" tab and click on the "Run Tool" button
  • Browse to the location of the file to remove using the drop down box next to "Look in:" at the top.
  • When you find the file, click on it to highlight, then select Open.
  • You will be prompted with a message warning: This file will be permanently deleted. Are you sure you want to continue?. Click Yes.
  • If removal did not require a reboot, you will receive a message indicating the file was deleted successfully.
  • Click Ok and exit MBAM.
  • If prompted to reboot, then do so immediately.
-- If the file returns, then you probably have other malware on your system which is protecting or regenerating it.

Caution: Be careful what you delete. FileAssassin is a powerful program, designed to move highly persistent files. Using it incorrectly could lead to serious problems with your operating system.


Now rescan again with Malwarebytes Anti-Malware but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 27 May 2009 - 06:57 PM

okay... I deleted the 3 files w/ file assassin before scanning them @ jotti's virusscan, (system32/bekbn.dll was the third incase this is useful)
and I did a full scan with malwarebytes in normal mode, it found 31 other infections.
here is the log:
Malwarebytes' Anti-Malware 1.37
Database version: 2186
Windows 5.1.2600 Service Pack 3

5/27/2009 7:15:07 PM
mbam-log-2009-05-27 (19-15-07).txt

Scan type: Full Scan (C:\|)
Objects scanned: 128579
Time elapsed: 22 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 31

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\program files\aquarius soft\pc shutdown\rkinstall.ex_ (Adware.RelevantKnowledge) -> Quarantined and deleted successfully.
c:\program files\aquarius soft\pc shutdown\rkverify.ex_ (Adware.RelevantKnowledge) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\17194534\17194534.exe.vir (Rogue.Systemsecurity) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\all users\application data\97204526\97204526.exe.vir (Rogue.Systemsecurity) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\documents and settings\orazdow\reader_s.exe.vir (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\ld08.exe.vir (Worm.Koobface) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\reader_s.exe.vir (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\SYSDLL.exe.vir (Trojan.Proxy) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\userinit.exe.vir (Trojan.Waledac) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\yhafd78auhd.dll.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\__c002B7B6.dat.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\__c00C3512.dat.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\drivers\svchost.exe.vir (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\drivers\win32x.sys.vir (Malware.Tool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134242.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134234.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134235.sys (Malware.Tool) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134236.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134237.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134240.exe (Rogue.Systemsecurity) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134241.exe (Rogue.Systemsecurity) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134243.exe (Worm.Koobface) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134245.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134250.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0134251.exe (Trojan.Waledac) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135359.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135360.exe (Worm.Koobface) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135361.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135362.exe (Trojan.Backdoor) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135363.exe (Worm.Koobface) -> Quarantined and deleted successfully.
c:\system volume information\_restore{3503778c-b03d-4906-af45-912ddcc4bbb3}\RP115\A0135364.dll (Trojan.BHO) -> Quarantined and deleted successfully.

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 27 May 2009 - 09:08 PM

Your log shows evidence that your system is infected with a nasty variant of the virut virus. Please see ThreatExpert's awareness of the file "reader_s.exe"

Virut is a polymorphic file infector with IRCBot functionality which infects .exe, .scr files, downloads more malicious files to your system, and opens a back door that compromises your computer. Virux is an even more complex file infector which can embed an iframe into the body of web-related files and infect script files (.php, .asp, and .html). When Virut creates infected files, it also creates non-functional files that are corrupted beyond repair. In many cases the infected files cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files become corrupted and the system may become irreparable.

The virus has a number of bugs in its code, and as a result it may misinfect a proportion of executable files....some W32/Virut.h infections are corrupted beyond repair.

McAfee Risk Assessment and Overview of W32/Virut

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus...Due to the damaged caused to files by virut it's possible to find repaired but corrupted files. They became corrupted by the incorrect writing of the viral code during the process of infection. undetected, corrupted files (possibly still containing part of the viral code) can also be found. this is caused by incorrectly written and non-function viral code present in these files.

AVG Overview of W32/VirutThis kind of infection is contracted and spread by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and an increasing source of system infection. However, the CA Security Advisor Research Blog says they have found MySpace user pages carrying the malicious Virut URL. Either way you can end up with a computer system so badly damaged that recovery is not possible and it cannot be repaired. When that happens there is nothing you can do besides reformatting and reinstalling the OS.

...warez and crack web pages are being used by cybercriminals as download sites for malware related to VIRUT and VIRUX. Searches for serial numbers, cracks, and even antivirus products like Trend Micro yield malcodes that come in the form of executables or self-extracting files...quick links in these sites also lead to malicious files. Ads and banners are also infection vectors...

Keygen and Crack Sites Distribute VIRUX and FakeAV

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. You should change each password using a clean computer and not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:There is no guarantee this infection can be completely removed. In some instances it may have caused so much damage to your system that it cannot be completely cleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Reinstalling Windows without first wiping the entire hard drive with a repartition and/or format will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Please read:
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 28 May 2009 - 01:23 AM

thank you very much :thumbsup: one more question:
I could tell it was pretty bad right away, but now after doing everything in the previous posts, my computer seems fine...
could it be that because I acted quickly and operated a lot of the scanning with the wireless shut off, the virus is actually cleaned off?
I guess it is a safe bet to change my paypal password, etc. but my computer appears to be fine. should I download AVG and do another scan to verify? because reformatting seems like a bit much.
thanks again

#9 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 28 May 2009 - 02:07 AM

btw, I was running a system scan with avira as I wrote that last post and it just reported 14 infections :thumbsup:
they where: -I edited this out of avira's log because it was formatted strangely-

TR/Crypt.XPACK.Gen Trojan
TR/Trash.Gen Trojan
TR/Trash.Gen Trojan
TR/Dropper.Gen Trojan
Contains recognition pattern of the RKIT/Protector.BC root kit
TR/Crypt.XPACK.Gen Trojan
Contains recognition pattern of the WORM/Agent.lz.7 worm
Contains recognition pattern of the RKIT/Protector.BC root kit
Contains recognition pattern of the RKIT/Protector.BC root kit
TR/Trash.Gen Trojan
TR/Trash.Gen Trojan
TR/Drop.Softomat.AN Trojan
TR/Dropper.Gen Trojan
TR/Dropper.Gen Trojan

so I guess my comp might be downloading new stuff since malwarebytes would probably have detected those earlier.
do really need to reformat?

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 28 May 2009 - 07:13 AM

Your decision as to what action to take should be made by reading and asking yourself the questions presented in the "When should I re-format?" and What Do I Do? links previously provided. As I already said, in some instance the malware may leave so many remnants behind that security tools cannot find them and your system cannot be completely cleaned, repaired or trusted. Reinstalling Windows without first wiping the entire hard drive with a repartition/reformat will not remove the infection. The reinstall will only overwrite the Windows files. Any malware on the system will still be there afterwards. Starting over by reformatting, and performing a clean install of the OS or doing a factory restore with a vendor-specific Recovery Disk or Recovery Partition removes everything and is the safest action but I cannot make that decision for you.

If you insist on trying to fix this infection instead of following our advice to reformat and reinstall your operating system, there are various rescue disks available from major anti-virus vendors which you can try. Keep in mind, even the vendors like Kaspersky say there is no quarantee that some files will not get corrupted during the disinfection process. In the end most folks end up reformatting out of frustration after spending hours attempting to repair and remove infected files. IMO the safest and easiest thing to do is just reformat and reinstall Windows.

Bleeping Computer DOES NOT assume any responsibility for your attempt to repair this infection using any of the following tools. You do this at your own risk and against our advice.

These are links to Anti-virus vendors that offer free LiveCD or Rescue CD files that are used to boot from for repair of unbootable and damaged systems, rescue data, scan the system for virus infections. Burn it as an image to a disk to get a bootable CD. All (except Avira) are in the ISO Image file format. Avira uses an EXE that has built-in CD burning capability.If you are not sure how to burn an image, please read How to write a CD/DVD image or ISO. If you need a FREE utility to burn the ISO image, download and use ImgBurn.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 orazner

orazner
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:05:05 PM

Posted 28 May 2009 - 02:26 PM

okay, thanks again.

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,474 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 28 May 2009 - 04:20 PM

You're welcome and good luck.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users