Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus: backdoor:win32/agent can't remove


  • Please log in to reply
4 replies to this topic

#1 Jawsome

Jawsome

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:34 AM

Posted 25 July 2009 - 10:49 PM

I'm running Windows Vista, and I keep getting notices from Windows Defender that I've been infected with backdoor:win32/agent. It offers to remove, which I select, and with a subsequent scan it detects nothing. After I've asked it to be removed, adaware, windows defender, and malwarebytes cannot detect it. However, upon restarting the computer, Windows defender pops up again and tells me I'm infected. I've searched for this and found only help for specific backdoor Trojans (e.g. backdoor:win32/agent.ce) but I'm not sure what kind of "agent" I have. The windows defender log is not helpful, and the malwarebytes log is somewhat incomprehensible to me (sorry!). I'll post the log.

So far I've disabled by system restore which (I think) was supposed to clean the cache. This did nothing. I've run disk cleanup, which was also unhelpful. I've run scans with adaware, malwarebytes and windows defender. All state that they find the virus (upon reboot) and successfully delete it. However, each time the computer is restarted Windows defender pops up again stating there is a problem.

My computer actually doesn't have any operational problems I can detect, everything appears to be working normally. I'm just worried because Windows defender looks so ominous. Any help removing this would be greatly appreciated!!

Malwarebytes log:

Malwarebytes' Anti-Malware 1.39
Database version: 2501
Windows 6.0.6001 Service Pack 1

7/25/2009 5:13:20 PM
mbam-log-2009-07-25 (17-13-20).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 283661
Time elapsed: 1 hour(s), 14 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 48

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{d6258ca6-2028-4cdd-b496-cacc18721a60} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{d6258ca6-2028-4cdd-b496-cacc18721a60} (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\kb456456[4] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\kb456456[5] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\kb456456[6] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\upd105320[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\upd105320[4] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\nd82m0[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\nd82m0[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\JZJAKNZ0\nd82m0[4] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\MAYH4GB9\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\MAYH4GB9\nd82m0[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\MAYH4GB9\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\MAYH4GB9\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb767887[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb767887[6] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb767887[8] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\upd105320[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb456456[5] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\kb456456[7] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\nd82m0[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\OSDF3UBN\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\nd82m0[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\nd82m0[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\nd82m0[4] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb456456[4] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb456456[5] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb456456[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\upd105320[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb456456[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb767887[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\Joselyne\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\U1JIA5ML\kb767887[3] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\matt\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\585694CW\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\matt\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\585694CW\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\matt\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\UEC8U53F\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\matt\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\UEC8U53F\upd105320[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Users\matt\AppData\Local\microsoft\Windows\temporary internet files\Content.IE5\UEC8U53F\upd105320[2] (Trojan.Vundo) -> Quarantined and deleted successfully.
c:\Windows\System32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
c:\Windows\System32\clkcnt.txt (Trojan.Vundo) -> Quarantined and deleted successfully.

BC AdBot (Login to Remove)

 


#2 Guest_The weatherman_*

Guest_The weatherman_*

  • Guests
  • OFFLINE
  •  

Posted 26 July 2009 - 04:22 AM

Moved from Vista to a more appropriate forum. Tw

#3 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop

Posted 26 July 2009 - 07:31 AM

Please download TFC by Old Timer and save it to your desktop.

http://oldtimer.geekstogo.com/TFC.exe
http://www.geekstogo.com/forum/TFC-Temp-Fi...er-file187.html

Save any unsaved work. TFC will close ALL open programs including your browser!
Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.


Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Chewy

No. Try not. Do... or do not. There is no try.

#4 Jawsome

Jawsome
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:34 AM

Posted 26 July 2009 - 11:57 AM

Thanks!! It appears to have worked - at least I haven't gotten the windows defender notice. I'm going to run another scan to be sure. In the meantime, here's the log from superantispyware.

Thanks again!

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/26/2009 at 10:30 AM

Application Version : 4.26.1006

Core Rules Database Version : 4020
Trace Rules Database Version: 1960

Scan type : Complete Scan
Total Scan Time : 01:26:14

Memory items scanned : 305
Memory threats detected : 0
Registry items scanned : 8818
Registry threats detected : 8
File items scanned : 170827
File threats detected : 32

Trojan.Dropper/Gen-NV
[waults] C:\PROGRAMDATA\WAULTS.EXE
C:\PROGRAMDATA\WAULTS.EXE
C:\USERS\ALL USERS\WAULTS.EXE

Adware.Tracking Cookie
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@ads.active[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@atdmt[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@ad.yieldmanager[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@fastclick[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@atwola[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@reversemortgagemedia[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@microsoftwindows.112.2o7[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@ar.atwola[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@www.clickertraining[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@interclick[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@ads.tnt[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@at.atwola[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@azjmp[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@directtrack[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@incentreward.directtrack[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@www.mynortonaccount[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\joselyne@www.ticketsnow2[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@adtrafficdriver[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@angleinteractive.directtrack[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@atlas.entrepreneur[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@atwola[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@azjmp[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@directtrack[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@interclick[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@login.tracking101[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@pcvirusremover2008[1].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@scanner.anvi-scanner[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@scanner.vav-x-scanner[2].txt
C:\Users\Joselyne\AppData\Roaming\Microsoft\Windows\Cookies\Low\joselyne@tracking.gajmp[1].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\75F31D0F
HKLM\Software\Microsoft\75F31D0F#75f31d0f
HKLM\Software\Microsoft\75F31D0F#Version
HKLM\Software\Microsoft\75F31D0F#red_srv
HKLM\Software\Microsoft\75F31D0F#red_srv_bckp
HKLM\Software\Microsoft\75F31D0F#75f3b08f
HKLM\Software\Microsoft\75F31D0F#75f3d96a

Adware.Vundo/Variant-Trace
C:\WINDOWS\SYSTEM32\LQSKRBFG.INI

#5 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:08:34 AM

Posted 26 July 2009 - 12:16 PM

Run a quick scan with MBAM to check

Edited by DaChew, 26 July 2009 - 12:17 PM.

Chewy

No. Try not. Do... or do not. There is no try.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users