Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Worm won't go away even after scan and reboot.


  • Please log in to reply
5 replies to this topic

#1 norris123

norris123

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:19 AM

Posted 10 September 2009 - 02:13 PM

Me and my laptop have been very busy doing school works. When we have group projects, it can't be avoided that my classmates should have a copy of our work so the tendency is they insert their flash drives in my computer. Most of the time they had viruses in their drives but I was confident enough with my antivirus software because I've been using it for a long time. I'm using avast. But then there was something wrong happened.

My computer starting to act crazy. When I start the computer, I had to manually open explorer.exe just to get things started. I also had this problem that file extensions won't hide even if I change the settings. I tried to tell my classmates about what happened because of them but the only thing that they could advice is that I have to reformat my drive. I still have the hopes because I've been here before (before) and the people here helped me a lot. Thanks to them. Now I'm thanking them again in advance. :thumbsup:)

I got bothered because I tried to scan my computer but there are no problems found. I also tried scanning using spybot but still, the problems can't be found. I tried to download different and malware removal tools trying my luck to get rid of this problem. But only malwarebytes anti-malware did find the viruses. This is a part of the log that I guess can help identify what I am talking about.

Memory Processes Infected:
C:\Windows\System32\keyboard\services.exe (Worm.AutoRun) -> Unloaded process successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\taskman (Trojan.Agent) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keyboard (Worm.AutoRun) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\usb2.0 (Worm.AutoRun) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Data: c:\windows\system32\keyboard\services.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Data: system32\keyboard\services.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe C:\Windows\System32\keyboard\services.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Files Infected:
C:\ProgramData\Fearghus\lsass.exe (Worm.AutoRun) -> Delete on reboot.
C:\ProgramData\Microsoft\USB2.0\usb-hi.exe (Worm.AutoRun) -> Delete on reboot.
C:\Windows\System32\keyboard\services.exe (Worm.AutoRun) -> Delete on reboot.
C:\Windows\System32\traymgr.exe (Backdoor.Bot) -> Delete on reboot.
C:\ProgramData\Application Data\Fearghus\lsass.exe (Worm.AutoRun) -> Delete on reboot.
C:\ProgramData\Application Data\Microsoft\USB2.0\usb-hi.exe (Worm.AutoRun) -> Delete on reboot.

Even if it says it was removed, it really isn't. At first I thought it was already okay but I will experience the same problem again. That after I scan and rebooted I always get the same results that my computer still infected.

Another thing, when I sometimes surf the web, I get a bluescreen telling me about this aspi32.sys(?). I still don't understand how can I fix this. Microsoft sent a link to me about this problem but it would just let me bring to the driver's manufacturers site (if that is what you call that) and search stuff and get results that I don't know. Do you know something about this?

. . .

I know that I couldn't get solutions right away but I hope to hear from you guys. Thank you very much and more power. :flowers:

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,176 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:19 PM

Posted 10 September 2009 - 03:28 PM

Hello and welcome. I am movung this from Vista to the Am I Infected forum.
Let's try it this way.

Next run ATF and SAS:
Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post 2 logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 norris123

norris123
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:19 AM

Posted 11 September 2009 - 09:14 AM

Hi! I did everything you said but unfortunately after the last reboot it's still the same.

Anyways, here is the log of my scans.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/11/2009 at 09:06 PM

Application Version : 4.28.1010

Core Rules Database Version : 4094
Trace Rules Database Version: 2034

Scan type : Complete Scan
Total Scan Time : 02:33:22

Memory items scanned : 299
Memory threats detected : 0
Registry items scanned : 6452
Registry threats detected : 0
File items scanned : 209858
File threats detected : 1

Trojan.Agent/Gen-IRCBot
C:\RECYCLER\S-1-5-21-8467618618-2847708089-474853547-0036\MWAU.EXE


- - - - - - - - - -



Malwarebytes' Anti-Malware 1.41
Database version: 2777
Windows 6.0.6000

9/11/2009 9:23:23 PM
mbam-log-2009-09-11 (21-23-23).txt

Scan type: Quick Scan
Objects scanned: 90872
Time elapsed: 9 minute(s), 46 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
C:\Windows\System32\keyboard\services.exe (Worm.AutoRun) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keyboard (Worm.AutoRun) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\usb2.0 (Worm.AutoRun) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Data: c:\windows\system32\keyboard\services.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Worm.AutoRun) -> Data: system32\keyboard\services.exe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe C:\Windows\system32\keyboard\services.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\ProgramData\Fearghus\lsass.exe (Worm.AutoRun) -> Delete on reboot.
C:\ProgramData\Microsoft\USB2.0\usb-hi.exe (Worm.AutoRun) -> Delete on reboot.
C:\Windows\System32\keyboard\services.exe (Worm.AutoRun) -> Delete on reboot.
C:\ProgramData\Application Data\Fearghus\lsass.exe (Worm.AutoRun) -> Delete on reboot.
C:\ProgramData\Application Data\Microsoft\USB2.0\usb-hi.exe (Worm.AutoRun) -> Delete on reboot.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,176 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:19 PM

Posted 11 September 2009 - 02:38 PM

Ok. You did reboot after the scan?

Download and Run FlashDisinfector

You have a flash drive infection. These worms travel through your portable drives. If they have been connected to other machines, they may now be infected.
Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as well.
Wait until it has finished scanning and then exit the program.
Reboot your computer when done.

Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive plugged in when you ran it. Don't delete this folder. It will help protect your drives from future infection.


A Note on IRCBOTS... Rootkits, backdoor Trojans, Botnets, and IRC Bots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker.

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
What Should I Do If I've Become A Victim Of Identity Theft?
Identity Theft Victims Guide - What to do


Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

When should I re-format? How should I reinstall?
Help: I Got Hacked. Now What Do I Do?
Where to draw the line? When to recommend a format and reinstall?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 norris123

norris123
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:19 AM

Posted 13 September 2009 - 11:24 AM

Yes, I did reboot after the scan.

I never thought that it is really serious and dangerous to my computer. Anyway, (I don't know whether it's a good news or not) before I was able read your reply, my friend told me to remove avast and change it to avira antivir. He did a scan and removed all of the trojans except for the explorer.exe's problem. He also installed a program called advance system care.

I did reboot again but I had to manually start explorer.exe. Before I started explorer.exe I noticed that my documents window is open. It is different from I've experienced the past few days.

So I performed a scan using mbam and again detected the infected explorer.exe. I restarted the computer again and everything's seems to work fine now. But I haven't yet scanned the system fully. All I know so far is that the trojans has been removed. But I'm still bothered with your reply so I would like to ask what should I do. And what's your opinion to the actions that have taken place. Should I still consider reformatting? Just like what you've said, it's hard to assume that my computer is secure.

I downloaded and ran flash_disinfector but avira is detecting some nircmd.exe as a virus. I tried to ignore it but there is nothing happening. I tried to delete it but still, there is nothing happening.

Thank you.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,176 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:19 PM

Posted 13 September 2009 - 07:56 PM

Reformatting

Your decision as to what action to take should be made by reading and asking yourself the questions presented in the "When should I re-format?" and What Do I Do? links I previously provided. As I already said, in some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.


Of course also feel free to ask anything on this in the Vista forum. They'd be glad to help.

==============================

2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe/.scr/.htm/.html/.xml/.zip/.rar files as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.

Download Belarc Advisor - builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser.
Run it and then print out the results, they may be handy.


Reinstall Windows Vista
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users