Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help! Weird things are happening.


  • Please log in to reply
9 replies to this topic

#1 zhoos

zhoos

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 02 October 2009 - 12:34 AM

I'm having some weird things happening to my computer (Windows Vista), can someone please help me with this? Here are the symptoms and steps I took:

2 days ago - Computer running slow and seems to have a bit of Harddisk activity.
- Did a CTRL-ALT-DEL and opened Task Manager, saw a process named <user>.exe running.
- Tried closing but couldn't not unless you run admin rights.
- Ran Windows Defender and looked at Software at Startup, seems like this file has No Publisher and is located in C:\Users\<user>\<user>.exe. Went into the folder, couldn't find the file. Removed the file from startup using Windows Defender.
- Rebooted computer - file is still there in Task Manager! It reactivated itself on Startup!!! Suspected Trojan/Virus.
- Ran AVG Antivirus. No complaints other than cookies and trackers from websites.
- Ran Spybot. Found some trojan/malware but I can't remember the name. Removed it.
- Rebooted computer. Acrobat Distiller crashes on startup. Dr. Watson crashes on startup. Now there isn't any <user>.exe but now it's tzguuf.exe! Same characteristics as <user>.exe. Same location, but can't find the file.

Yesterday ago - Had to go to work.
- Took my Flash-Drive from my USB port and went to work, where I was using a Mac. Opened it up and saw tzguuf.exe in it (and some other files). Panicked, deleted all those files. Now worried if my Mac is infected??? How do you clean macs???
- Went back home. Immediately went for Malwarebyte's anti-malware. Disabled AVG, Windows Defender, Spybot... and Installed MAM, updated, ran it, and got the below log. Please see below log.
- Clicked on fixed the problems. Restarted the computer. Acrobat Distiller Crashes on startup. tzguuf.exe is still there!!!
- Ran MAM again overnight. Woke up, there's no new logs!
- Ran MAM again. Found out that after 1 plus hour running MAM, I get a BSOD with the message IRQL_NOT LESS_OR_EQUAL. MAM cannot get past this and cannot complete another sweep.

PLEASE HELP!!! I don't know what else to do, and I'm panicking!!! And now I'm worried about sticking my flash drive into another computer, and also worried about my Mac at work!

Below is my log from my first MAM sweep.
===============================
Malwarebytes' Anti-Malware 1.41
Database version: 2885
Windows 6.0.6001 Service Pack 1

10/2/2009 2:22:21 AM
mbam-log-2009-10-02 (02-22-21).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 520872
Time elapsed: 2 hour(s), 27 minute(s), 59 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Worm.Allaple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013 (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\ComboFix\Combo-Fix.sys (Worm.Agent) -> Quarantined and deleted successfully.
C:\Users\Marsk\Desktop\My Portfolio\ZIP2\XPKey (1).exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Users\Marsk\Desktop\My Portfolio\ZIP2\XPKey.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Windows\msa.exe (Trojan.Agent) -> Quarantined and deleted successfully.

Edited by zhoos, 02 October 2009 - 12:43 AM.


BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,594 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:13 PM

Posted 02 October 2009 - 07:37 AM

Most of the processes in Task Manager will be legitimate as shown in these links.Determining whether a file is malware or a legitimate process sometimes depends on the location (path) it is running from. One of the ways that malware tries to hide is to give itself the same name as a critical system file. However, it then places itself in a different location (folder) than where the legitimate file resides and runs from there. Another techinique is for the process to alter the registry and add itself as a Startup program so that it can run automatically each time the computer is booted. A file's properties may give a clue to identifying it. Right-click on the file, choose Properties and examine the General and Version tabs.

Tools to investigate running processes and gather additional information to identify them and resolve problems:These tools will provide information about each process, CPU usage, file description and its path location If you right-click on a file and select properties, you will see more details.

Anytime you come across a suspicious file for which you cannot find any information about, the file has a legitimate name but is not located where it is supposed to be, or you want a second opinion, submit it to Jotti's virusscan or VirusTotal. In the "File to upload & scan" box, browse to the location of the suspicious file and submit (upload) it for scanning/analysis.
-- Post back with the results of the file analysis.

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to download the Full version Free Trial, just ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
If you cannot boot into safe mode or complete a scan, then try doing it in normal mode. Be aware, this scan could take a long time to complete..
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 zhoos

zhoos
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 02 October 2009 - 02:30 PM

Hi thanks for coming to my rescue!

I used AnVir and right clicked on the task to check with VirusTotal, since I cannot find the physical file on my comp. Here are the results:

===============
File tgzuuf.exe received on 2009.10.02 19:27:41 (UTC)
Current status: finished
Result: 6/41 (14.64%)

Antivirus Version Last Update Result
a-squared 4.5.0.24 2009.10.02 -
AhnLab-V3 5.0.0.2 2009.10.02 -
AntiVir 7.9.1.27 2009.10.02 -
Antiy-AVL 2.0.3.7 2009.10.02 -
Authentium 5.1.2.4 2009.10.02 -
Avast 4.8.1351.0 2009.10.02 -
AVG 8.5.0.412 2009.10.02 -
BitDefender 7.2 2009.10.02 Gen:Trojan.Chinky.2
CAT-QuickHeal 10.00 2009.10.01 -
ClamAV 0.94.1 2009.10.02 -
Comodo 2493 2009.10.02 -
DrWeb 5.0.0.12182 2009.10.02 -
eSafe 7.0.17.0 2009.10.01 -
eTrust-Vet 31.6.6773 2009.10.02 -
F-Prot 4.5.1.85 2009.10.02 -
F-Secure 8.0.14470.0 2009.10.02 Worm.Win32.VBNA.ixo
Fortinet 3.120.0.0 2009.10.02 -
GData 19 2009.10.02 Gen:Trojan.Chinky.2
Ikarus T3.1.1.72.0 2009.10.02 -
Jiangmin 11.0.800 2009.09.27 -
K7AntiVirus 7.10.858 2009.10.01 -
Kaspersky 7.0.0.125 2009.10.02 Worm.Win32.VBNA.ixo
McAfee 5759 2009.10.02 -
McAfee+Artemis 5759 2009.10.02 Suspect-29!9598D450C795
McAfee-GW-Edition 6.8.5 2009.10.02 -
Microsoft 1.5101 2009.10.02 -
NOD32 4477 2009.10.02 -
Norman 6.01.09 2009.10.02 VBWorm.XPH
nProtect 2009.1.8.0 2009.10.02 -
Panda 10.0.2.2 2009.10.02 -
PCTools 4.4.2.0 2009.10.02 -
Prevx 3.0 2009.10.02 -
Rising 21.49.22.00 2009.09.30 -
Sophos 4.45.0 2009.10.02 -
Sunbelt 3.2.1858.2 2009.10.02 -
Symantec 1.4.4.12 2009.10.02 -
TheHacker 6.5.0.2.026 2009.10.02 -
TrendMicro 8.950.0.1094 2009.10.02 -
VBA32 3.12.10.11 2009.09.30 -
ViRobot 2009.10.2.1968 2009.10.02 -
VirusBuster 4.6.5.0 2009.10.02 -
Additional information
File size: 57344 bytes
MD5...: 9598d450c7953c178e97bd3eec9b6be6
SHA1..: 807a7a0239c1c26d0bd4607ec90796a025007ccd
SHA256: 71373ed4b2d457fc8161d3ddbb6150ca46b010a62a26f91eb9654f97b3278083
ssdeep: 768:CMHJPwbU1tRRpcf0mq/6/Q/9NF0+LEc8af3ts0E91:CJbkpKq2oS+Ljb3ts0
E91
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x1184
timedatestamp.....: 0x386dec40 (Sat Jan 01 12:00:00 2000)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xb988 0xc000 5.22 cc2597d30a70515c9ac2294ca9fda4c1
.data 0xd000 0x23b0 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rsrc 0x10000 0xb4 0x1000 3.93 2fa5cd260ac5cbb9bda3e94bc2f5ae8a

( 1 imports )
> MSVBVM60.DLL: MethCallEngine, -, -, -, -, -, -, -, -, -, -, EVENT_SINK_AddRef, -, -, -, DllFunctionCall, EVENT_SINK_Release, EVENT_SINK_QueryInterface, __vbaExceptHandler, -, -, -, -, -, -, -, ProcCallEngine, -, -, -, -, -, -, -, -, -, -, -

( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned

Edited by zhoos, 02 October 2009 - 02:31 PM.


#4 zhoos

zhoos
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 02 October 2009 - 02:55 PM

Ran TFC, call temp files cleaned.

Currently waiting for Dr. Web to finish complete scanning. Will post the results in this space after it is done.

#5 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,594 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:13 PM

Posted 02 October 2009 - 03:57 PM

Ok.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#6 zhoos

zhoos
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 03 October 2009 - 08:20 AM

Okay this sucks... but after following the instructions for Dr. Web, I've scanned the computer for like half a day.

- They found some trojans like VBS.Psyme, and I was able to complete the scan,
- Pressed Cure > Move Incurable. Done.
- Tried to Save Report List, and i get a BSOD with the error name BAD_POOL_HEADER.
Technical information: STOP: 0x00000019 (0x00000021, 0xBE290000, 0x0004A178, 9x4F900000)
Collecting data for crash dump...
Initializing disk for crash dump...


But nothing happens after that. No disk activity, no nothing.

Er... what steps do I do next? I can't save the log, so I can't paste anything here... :thumbsup:

Edited by zhoos, 03 October 2009 - 08:21 AM.


#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,594 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:13 PM

Posted 03 October 2009 - 09:39 AM

Some infections are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. Sometimes there is hidden piece of malware (i.e. rootkit) which has not been detected by your security tools that protects malicious files and registry keys so they cannot be permanently deleted. Disinfection will probably require the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a DDS/HijackThis log for further investigation.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". If you cannot complete a step, then skip it and continue with the next. In Step 6 there are instructions for downloading and running DDS which will create a Pseudo HJT Report as part of its log.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 zhoos

zhoos
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 03 October 2009 - 10:49 AM

I rebooted my computer, and funny things started happening.

I cannot open text files, I can't do alot of things. I have no idea why this is happening.

I'm gonna take your advice and try a HiJackthis solution. Many thanks for the help!!!

#9 zhoos

zhoos
  • Topic Starter

  • Members
  • 46 posts
  • OFFLINE
  •  
  • Local time:05:13 AM

Posted 08 October 2009 - 01:44 AM

I did the steps as outlined in the guide, but I cannot seem to get past the Root Repeal step. I've left the computer scanning for more than a day, and it doesn't seem to complete. What else can I do?

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,594 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:13 PM

Posted 08 October 2009 - 06:55 AM

Skip that step and continue with the next. Just add a comment when you start your new topic that you could not complete a scan with RR.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users