Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Application error after trojan removal with XP Pro


  • Please log in to reply
16 replies to this topic

#1 yamasmack

yamasmack

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 22 July 2009 - 08:41 AM

I'm new here so bear with me.

I posted this in the XP forum and it was suggested that I move it to here so it's in both places.

I tried to defrag my hard drive and the defragmenter would not start so I tried to do a system restore but there weren't any restore points and I couldn't create any restore points. The etrust anti-virus was not picking anything up so I disabled it and installed pctools spyware doctor w/ anti-virus and it picked up "trojan.fakealert". I proceeded to fix the infected files and spyware doctor said something about some programs may be affected by removing some files. I wanted to get rid of the trojan so I continued with the fix. Now I'm getting error message after error message. One of them is "application error", "agent.exe", "memory could not be read", followed by "exception eaccess violation", "pctgmhk.dll", followed by "runtime error". Another application error is "wuauclt.exe" with "memory could not be read". There have been many others but I haven't taken note. I get "the program encountered a problem and could not continue" errors allot and they are mostly related to internet explorer. Now my speaker stopped working except for a beep whenever an error message occurs. I checked "sounds and audio devices" in the control panel and it says "an audio device is not installed". I don't know what to do other than using the "drivers and windows utilities" disk that came with the computer to restore the whole thing which I would rather not do. My computer is a Dell Vostro 1710 with Windows XP Pro.

Thanks in advance,

JT

P.S. I scanned with SUPERAnti-spyware as suggested in the other forum and it came back with two other trojans, "trojan.backdoor" and "trojan.spy", these names are not exact but hopefully you know what they are. I removed them and SUPERAnti-spyware required a system reboot, I did that but I'm still getting the same problems.

BC AdBot (Login to Remove)

 


m

#2 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 22 July 2009 - 01:55 PM

One other thing it is doing that probably should be mentioned is google search redirecting. By that I mean when i do a google search and click on a link in the results it does not take me to that site. Instead it redirects to any number of weird search sights and it takes 4 to 8 tries clicking back and then clicking the link again before it actually goes to the right place.

JT

#3 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 22 July 2009 - 02:16 PM

Please download and run Processexplorer


http://technet.microsoft.com/en-us/sysinte...s/bb896653.aspx

Under file and save as, create a log and post here

copy and paste into a reply

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download Malwarebytes Anti-Malware (v1.39) and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

http://www.bleepingcomputer.com/forums/t/114351/how-to-temporarily-disable-your-anti-virus-firewall-and-anti-malware-programs/
Chewy

No. Try not. Do... or do not. There is no try.

#4 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 22 July 2009 - 03:29 PM

I loaded and ran the process explorer and this is the log:

Process PID CPU Description Company Name
System Idle Process 0 96.86
Interrupts n/a Hardware Interrupts
DPCs n/a Deferred Procedure Calls
System 4
smss.exe 864 Windows NT Session Manager Microsoft Corporation
csrss.exe 932 Client Server Runtime Process Microsoft Corporation
winlogon.exe 960 Windows NT Logon Application Microsoft Corporation
services.exe 1008 Services and Controller app Microsoft Corporation
svchost.exe 1236 Generic Host Process for Win32 Services Microsoft Corporation
wmiprvse.exe 2232 WMI Microsoft Corporation
LicenseManager.exe 3492 SprinkKEY Client License Manager Tyco Fire and Building Products
WSCommCntr1.exe 760 Autodesk Communication Center Autodesk, Inc.
AcHelp.exe 3800 AcHelp Module Autodesk Inc.
svchost.exe 1320 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1376 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1424 Generic Host Process for Win32 Services Microsoft Corporation
svchost.exe 1532 Generic Host Process for Win32 Services Microsoft Corporation
WLTRYSVC.EXE 1668
BCMWLTRY.EXE 1704 Dell Wireless WLAN Card Wireless Network Controller Dell Inc.
spoolsv.exe 1752 Spooler SubSystem App Microsoft Corporation
igateway.exe 1936 iTechnology Application Server CA, Inc.
InoRPC.exe 1972 CA
InoRT.exe 196 CA
InoTask.exe 288 CA
jqs.exe 464 Java™ Quick Starter Service Sun Microsystems, Inc.
nvsvc32.exe 504 NVIDIA Driver Helper Service, Version 174.31 NVIDIA Corporation
searchindexer.exe 1412 Microsoft Windows Search Indexer Microsoft Corporation
AdskScSrv.exe 3932 System Level Service Utility Autodesk
PresentationFontCache.exe 2376 Windows Presentation Foundation Font Cache Service Microsoft Corporation
infocard.exe 5384 Windows CardSpace Microsoft Corporation
lsass.exe 1020 LSA Shell (Export Version) Microsoft Corporation
explorer.exe 212 Windows Explorer Microsoft Corporation
Apoint.exe 392 Alps Pointing-device Driver Alps Electric Co., Ltd.
ApMsgFwd.exe 3228 ApMsgFwd Alps Electric Co., Ltd.
hidfind.exe 3472 Alps Pointing-device Driver Alps Electric Co., Ltd.
rundll32.exe 3132 Run a DLL as an App Microsoft Corporation
rundll32.exe 3140 Run a DLL as an App Microsoft Corporation
quickset.exe 3184 QuickSet Dell Inc.
dsca.exe 3308
PDVDDXSrv.exe 3296 CyberLink PowerDVD Resident Program CyberLink Corp.
RTHDCPL.EXE 3592 Realtek HD Audio Control Panel Realtek Semiconductor Corp.
ISUSPM.exe 3860 Macrovision Software Manager Macrovision Corporation
ctfmon.exe 2608 CTF Loader Microsoft Corporation
SetPoint.exe 1652 Logitech SetPoint Event Manager (UNICODE) Logitech, Inc.
KHALMNPR.exe 792 Logitech KHAL Main Process Logitech, Inc.
OUTLOOK.EXE 1500 Microsoft Office Outlook Microsoft Corporation
iexplore.exe 2844 Internet Explorer Microsoft Corporation
procexp.exe 4808 0.78 Sysinternals Process Explorer Sysinternals - www.sysinternals.com
ApntEx.exe 2628 Alps Pointing-device Driver for Windows NT/2000/XP/Vista Alps Electric Co., Ltd.
acad.exe 1892 0.78 AutoCAD Application Autodesk, Inc.
AdskCleanup.0001 3732 Cleanup Macrovision Europe Ltd.
acad.exe 4748 1.56 AutoCAD Application Autodesk, Inc.
AdskCleanup.0001 5396 Cleanup Macrovision Europe Ltd.

I then loaded and ran ATF Cleaner.

I had malwarebytes already installed and had run a full scan earlier today, here is the log:


Malwarebytes' Anti-Malware 1.39
Database version: 2478
Windows 5.1.2600 Service Pack 2

7/22/2009 10:51:19 AM
mbam-log-2009-07-22 (10-51-19).txt

Scan type: Full Scan (C:\|)
Objects scanned: 173963
Time elapsed: 19 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\vhosts.exe (Rootkit.Agent) -> Quarantined and deleted successfully.

I uninstalled the malwarebytes as suggested and reloaded it and ran a quick scan, here is the log:

Malwarebytes' Anti-Malware 1.39
Database version: 2481
Windows 5.1.2600 Service Pack 2

7/22/2009 4:11:38 PM
mbam-log-2009-07-22 (16-11-38).txt

Scan type: Quick Scan
Objects scanned: 110311
Time elapsed: 3 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


So please let me know what you think. Thanks in advance.

JT

#5 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 22 July 2009 - 03:45 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Chewy

No. Try not. Do... or do not. There is no try.

#6 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 22 July 2009 - 11:40 PM

Loaded and ran DrWeb in safe mode and here is the log, two of the infections could not be cured or moved so I told it to delete them. I hope that was the right thing to do.

skynetcrmdcxej.sys;c:\windows\system32\drivers;Trojan.Packed.2479;Incurable.Moved.;
SKYNETjaoykrxw.dll;C:\WINDOWS\system32;Trojan.Packed.2479;Incurable.Will be deleted after restart.;
SKYNETveyfdagl.dll;C:\WINDOWS\system32;Trojan.Packed.2479;Incurable.Will be deleted after restart.;
SKYNETcrmdcxej.sys;C:\WINDOWS\system32\drivers;Trojan.Packed.2479;Incurable.Moved.;
SKYNETagjpsgbwsi.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETalapiooiog.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETaqycoaopru.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETbciibtrrjk.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETbkpiberqqo.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETbmbdwfrldd.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETbotxppbpba.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETbtwqyrityp.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETcnxdcsbdie.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETcqdcgburac.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETcueoieqxpo.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETcwipjuxtob.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETcyxbvpjfxt.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETdhiowyrnym.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETdqvccrkhex.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETdqyxcghyep.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETdrikloismb.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETdrtqpquoip.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETehiympdxur.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETekvfyisrpe.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETenmnwosexd.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETeurpkfvevg.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETfncfjyrrvc.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETfolhcvxbuq.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETfppxvlqlqc.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETfqjwmdcwiv.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETfqmuvuaqih.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETfspuxdmxtr.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETftnxbwtbcj.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETfvpqjdiycw.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETfwfqqexspt.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETfyclkvnlbd.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNEThetxolkosa.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNEThpfvtpecyn.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNEThqhsjfmxpd.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETienwkkmikm.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETiivmpxnvxf.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETimqitvsgba.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETimqrxueobu.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETincjntuqie.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETineqxyrien.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETiqqoblhdim.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETisnhyxgclj.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETivshhnwoyn.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETiylycbrnyd.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETjrcvdjtddc.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETjtncaekiba.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETjxtevnnorx.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETkcycxkhojr.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETkdrisymdhv.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETkdtprmjowr.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETkeuvrrjgdj.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.304;Deleted.;
SKYNETklbvrprxvn.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETkltkepaqxg.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETkrpvlqlfcf.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETlenhukkufi.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETlgvoibvfxh.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETlqbwqwevsp.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETmdibabdrbr.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETmkbftabvfv.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETmlrmqollfv.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETmnvwidcatd.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETmpsrjxicxg.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETmrjfgikbka.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETmuspthqpcr.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETmxxlnymwas.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETnqqoteevmx.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETnsiuohhxha.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNEToftednpaxv.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETokcopkseum.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETompdqcgwnq.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNEToqmmbuwipb.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETovyadsidut.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNEToxmdexylfm.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETpaqqynsvnn.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETpfwkbyqoms.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETpgxxyexbyp.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETpornpcvnme.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETppokviuxtk.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETpportbapeu.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETqcskqfstis.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETqqsxvqlriy.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETqvmkpmosim.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETraevxnyieg.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrbggobsjgu.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrchtseqvre.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrhfreegxnp.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrmxkarrplu.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrnsvclxxsu.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETrokntsspuc.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETrtkdvrcvaf.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETrubxfiiuyt.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETsieejfaqqp.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETsiqobbhxvr.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETsirtqecqbf.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETsmymxtxqow.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETsttbophust.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETtamrwvkpta.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETtcxtevsapq.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETteaoicxdmf.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETtexxgtiehw.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETtikedgpkqw.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETtokqkjexcs.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETtuspvhnkin.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETtxtormfnxb.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETuefrsmvsar.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETuginhwlmfr.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETuyhpwvcxwj.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETuyifcoaips.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvbcqfpxrnn.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETvccakhiyxb.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvcciqdmxgo.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETvdvyetkqmf.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETviuwitnrpx.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvlwvsxmpyl.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvqirrpfovi.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvspylpcfxh.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETvstipmwujw.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.310;Deleted.;
SKYNETwmndtedofh.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxcyvxyriev.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxidwqjenbv.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxilelfowhp.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxkumegbslq.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETxqudmccutr.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxrcvbgdttf.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETxtueobdwom.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETxvnjfsdnwy.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxxopulxeqv.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxxvcxnlqru.tmp;C:\WINDOWS\Temp;Trojan.DownLoad.38278;Deleted.;
SKYNETxyrwxcimev.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;
SKYNETyurlcomtbs.tmp;C:\WINDOWS\Temp;BackDoor.Tdss.265;Deleted.;

What next?

JT

#7 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 22 July 2009 - 11:51 PM

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
One or more of the identified infections is a rootkit/backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

Someone may still be able to clean this machine but we can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.
Chewy

No. Try not. Do... or do not. There is no try.

#8 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 23 July 2009 - 10:18 AM

I ran SUPERAntispyware in safe mode and here is the log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/23/2009 at 09:54 AM

Application Version : 4.26.1006

Core Rules Database Version : 3952
Trace Rules Database Version: 1894

Scan type : Complete Scan
Total Scan Time : 00:41:17

Memory items scanned : 322
Memory threats detected : 0
Registry items scanned : 6910
Registry threats detected : 0
File items scanned : 65301
File threats detected : 4

Adware.Tracking Cookie
C:\Documents and Settings\thomasj25\Cookies\thomasj25@a1.interclick[1].txt
C:\Documents and Settings\thomasj25\Cookies\thomasj25@collective-media[1].txt
C:\Documents and Settings\thomasj25\Cookies\thomasj25@interclick[1].txt

Uncategorized.Unknown Origin
C:\WINDOWS\TEMP\IZOHORE.BMP


The operations that I have performed on your advice have definitely helped because System Restore allows me to create a restore point now, I haven't gotten an error message in a while and the Disc Defragmenter works again. I defragmented my C drive and here is the log FWI:


Volume (C:)
Volume size = 146 GB
Cluster size = 4 KB
Used space = 31.05 GB
Free space = 115 GB
Percent free space = 78 %

Volume fragmentation
Total fragmentation = 0 %
File fragmentation = 0 %
Free space fragmentation = 0 %

File fragmentation
Total files = 66,012
Average file size = 591 KB
Total fragmented files = 2
Total excess fragments = 67
Average fragments per file = 1.00

Pagefile fragmentation
Pagefile size = 3.00 GB
Total fragments = 1

Folder fragmentation
Total folders = 6,707
Fragmented folders = 1
Excess folder fragments = 0

Master File Table (MFT) fragmentation
Total MFT size = 85 MB
MFT record count = 72,832
Percent MFT in use = 83 %
Total MFT fragments = 3

--------------------------------------------------------------------------------
Fragments File Size Files that cannot be defragmented
None


The only thing that in not working still is my audio. I probably just have to reinstall something but I'm not sure what. As far as re-formatting and re-installing windows, I don't think I'll do that yet. I don't have confidential files on my computer other than my own online banking and I don't save the passwords, I may still start over at some point just not yet.

Please let me know if there is anything else that I should do and maybe how to get my audio back.

Thanks.

JT

#9 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 23 July 2009 - 10:25 AM

Let's look for rootkits

http://rootrepeal.googlepages.com/

http://rootrepeal.googlepages.com/RootRepeal.zip

Just use the file tab at the bottom, scan and paste the report into a reply here please

Posted Image
Chewy

No. Try not. Do... or do not. There is no try.

#10 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 23 July 2009 - 10:43 AM

I scanned with RootRepeal and here is the report:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/07/23 11:40
Program Version: Version 1.3.2.0
Windows Version: Windows XP SP2
==================================================

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\windows\temp\perflib_perfdata_110.dat
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\windows\softwaredistribution\eventcache\{110ae14a-6c2d-4710-8722-9b7f1655c489}.bin
Status: Allocation size mismatch (API: 8, Raw: 0)

Path: c:\documents and settings\all users\application data\pc tools\threatfire\orig.db
Status: Allocation size mismatch (API: 917504, Raw: 651264)

Path: c:\documents and settings\thomasj25\local settings\temporary internet files\content.word\~wrs{63cf16f1-3cd0-4d51-ba52-7273e1bf1162}.tmp
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: C:\Documents and Settings\thomasj25\Local Settings\Temp\Temporary Internet Files\Content.IE5\WXEZ0DEF\dref=http%253A%252F%252Fbl137w[1].aspx%253FFolderID%253D00000000-0000-0000-0000-000000000001%2526InboxSortAscending%253DFalse%2526InboxSortBy%253DDate%2526n%253D374202408
Status: Locked to the Windows API!

#11 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 23 July 2009 - 11:32 AM

That looks good, would you purge your old restore points if any, if there were many you might want to defrag again.

Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.

Check device manager and see what's listed for audio and status?

Make and model of your computer in case we need to reload a driver?
Chewy

No. Try not. Do... or do not. There is no try.

#12 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 23 July 2009 - 01:08 PM

Ok, I took care of the restore points and defragmented again.

Now on to the audio.
In device manager under "Sound, video and game controllers" there is:

Audio Codecs
Legacy Audio Drivers
Legacy Video Capture Devices
Media Control Devices
Realtek High Definition Audio
Video Codecs

All of these say they are working properly.

In the control panel under "Sounds and Audio Devices" on the Volume tab it says "No Audio Device", on the Audio tab it says "No Playback Device" and "No Recording Device".

My computer is a Dell Vostro 1710.

#13 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 23 July 2009 - 03:08 PM

http://support.dell.com/support/downloads/...p;fileid=244268

this should be the driver for the sound for xp and your laptop
Chewy

No. Try not. Do... or do not. There is no try.

#14 yamasmack

yamasmack
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:10:18 AM

Posted 23 July 2009 - 03:38 PM

Well I downloaded the driver using the Dell downloader (Dell recommended it) and ran the .exe file, everything extracted and the installer started automatically. The welcome screen came up and I clicked next to continue and the install shield gave me an error, "No driver was supported in this driver package". Is this a glitch on Dell's end or mine?

JT

#15 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:18 AM

Posted 23 July 2009 - 03:53 PM

Use your service tag number to find the right driver

http://support.dell.com/support/downloads/...&~ck=anavml

Also try removing Realtek High Definition Audio from device manager and letting windows detect again after rebooting?

Edited by DaChew, 23 July 2009 - 03:54 PM.

Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users