Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Black/Red Infected Virus wallpaper


  • This topic is locked This topic is locked
5 replies to this topic

#1 unknowingly

unknowingly

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:21 PM

Posted 07 November 2009 - 02:26 PM

Help please, I have a virus that changed my wallpaper similar to other people here with the message "Your System is Infected..." but their solutions are not helping me. I would really need your help on this:

1. I cannot surf the web
2. My google searches are redirected to this google-uk ... site
3. My wallpaper automatically changes to red and black with this infected message... every time I reboot.
4. I'm only able to post this message on safemode with networking.

I used malwarebytes to remove the viruses but they automatically reappear on reboot.

Here's my dds diagnosis

DDS (Ver_09-10-26.01) - NTFSx86 NETWORK
Run by Administrator at 12:27:31.53 on Sat 11/07/2009
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_17
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.512.173 [GMT -5:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
svchost.exe C:\WINDOWS\TEMP\VRT1.tmp
C:\WINDOWS\System32\reader_s.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe
C:\WINDOWS\regedit.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\rundll32.exe
C:\Documents and Settings\Administrator.USER-37FD9E1A6E\Desktop\dds.scr

============== Pseudo HJT Report ===============

mWinlogon: Userinit=c:\windows\system32\userinit.exe,c:\windows\system32\drivers\smss.exe,
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: PC Tools Browser Guard BHO: {2a0f3d1b-0909-4ff4-b272-609cce6054e7} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
BHO: {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - No File
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: PC Tools Browser Guard: {472734ea-242a-422b-adf8-83d1e48cc825} - c:\program files\spyware doctor\bdt\PCTBrowserDefender.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRunOnce: [NeroHomeFirstStart] "c:\program files\common files\ahead\lib\NMFirstStart.exe"
mRun: [15585] c:\windows\system32\4.tmp.exe
mRun: [reader_s] c:\windows\system32\reader_s.exe
mRunOnce: [Malwarebytes Anti-Malware (reboot)] "c:\program files\malwarebytes' anti-malware\mbam.exe" /runcleanupscript
dRun: [reader_s] c:\documents and settings\administrator.user-37fd9e1a6e\reader_s.exe
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL
Notify: 4085e9e9573 - c:\windows\system32\dnsrslvr32.dll
AppInit_DLLs: ,c:\windows\system32\dnsrslvr32.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
mASetup: {28ABC5C0-4FCB-33CF-AAX5-35GX1C642122} - c:\restore\s-1-5-21-1482476501-1644491937-682003330-1013\Taquito.exe

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\admini~1.use\applic~1\mozilla\firefox\profiles\0jg6xjkk.default\
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npbittorrent.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npFoxitReaderPlugin.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0012-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0014-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

S0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-11-7 207280]
S2 Browser Defender Update Service;Browser Defender Update Service;c:\program files\spyware doctor\bdt\BDTUpdateService.exe [2009-11-7 112592]
S2 BtwSrv;BtwSrv;c:\windows\system32\svchost.exe -k netsvcs [2004-8-4 14336]
S2 fastnetsrv;fastnetsrv Service;c:\windows\system32\fastnetsrv.exe --> c:\windows\system32\FastNetSrv.exe [?]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2009-10-31 133104]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2009-4-6 38496]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-11-7 358600]
UnknownUnknown tcpsr;tcpsr; [x]

=============== Created Last 30 ================

2009-11-07 15:55:25 882 ----a-w- c:\windows\RegSDImport.xml
2009-11-07 15:55:25 880 ----a-w- c:\windows\RegISSImport.xml
2009-11-07 15:55:25 767952 ----a-w- c:\windows\BDTSupport.dll
2009-11-07 15:55:24 165840 ----a-w- c:\windows\PCTBDRes.dll
2009-11-07 15:55:24 1636304 ----a-w- c:\windows\PCTBDCore.dll
2009-11-07 15:55:24 149456 ----a-w- c:\windows\SGDetectionTool.dll
2009-11-07 15:55:24 131 ----a-w- c:\windows\IDB.zip
2009-11-07 15:55:24 1152470 ----a-w- c:\windows\UDB.zip
2009-11-07 15:54:02 7387 ----a-w- c:\windows\system32\drivers\pctgntdi.cat
2009-11-07 15:54:02 229304 ----a-w- c:\windows\system32\drivers\pctgntdi.sys
2009-11-07 15:53:57 87784 ----a-w- c:\windows\system32\drivers\PCTAppEvent.sys
2009-11-07 15:53:57 7412 ----a-w- c:\windows\system32\drivers\PCTAppEvent.cat
2009-11-07 15:53:57 7383 ----a-w- c:\windows\system32\drivers\pctcore.cat
2009-11-07 15:53:57 207280 ----a-w- c:\windows\system32\drivers\PCTCore.sys
2009-11-07 15:53:50 7383 ----a-w- c:\windows\system32\drivers\pctplsg.cat
2009-11-07 15:53:50 70408 ----a-w- c:\windows\system32\drivers\pctplsg.sys
2009-11-07 15:53:44 0 d-----w- c:\program files\Spyware Doctor
2009-11-07 15:53:44 0 d-----w- c:\program files\common files\PC Tools
2009-11-07 15:53:44 0 d-----w- c:\docume~1\alluse~1\applic~1\PC Tools
2009-11-07 15:53:44 0 d-----w- c:\docume~1\admini~1.use\applic~1\PC Tools
2009-11-07 15:35:12 0 d-----w- c:\program files\Trend Micro
2009-11-07 15:05:55 440 --sha-r- c:\documents and settings\administrator.user-37fd9e1a6e\ntuser.pol
2009-11-07 15:01:30 0 d--h--w- c:\windows\system32\GroupPolicy
2009-11-07 14:59:30 71168 ------w- c:\windows\system32\reader_s.exe
2009-11-07 14:57:05 0 d-----w- c:\windows\pss
2009-11-07 14:36:33 182656 -c--a-w- c:\windows\system32\dllcache\ndis.sys
2009-11-07 14:36:02 868 ----a-w- c:\windows\system32\2838404.exe
2009-11-07 14:35:52 0 d-----w- c:\program files\Protection System
2009-11-07 14:35:52 0 ----a-w- c:\windows\SC.INS
2009-11-07 14:35:52 0 ----a-w- c:\windows\sc.exe
2009-11-07 14:35:51 94 ----a-w- C:\Clone Cash System.url
2009-11-07 14:35:31 361600 -c--a-w- c:\windows\system32\dllcache\TCPIP.SYS
2009-11-07 14:35:31 361600 ----a-w- c:\windows\system32\drivers\TCPIP.SYS.ORIGINAL
2009-11-07 09:49:33 0 d-----w- c:\docume~1\admini~1.use\applic~1\Malwarebytes
2009-11-07 08:48:00 61440 ----a-w- c:\windows\system32\drivers\msrmpin.sys
2009-11-07 08:33:23 46 ----a-w- C:\p2hhr.bat
2009-11-07 08:33:12 15000 ----a-w- c:\windows\system32\hr8ox5ft91.dll
2009-11-07 08:33:05 0 ----a-w- c:\windows\system32\41.exe
2009-11-07 08:33:00 0 ----a-w- c:\windows\system32\AVR09.exe
2009-11-07 08:32:57 0 ----a-w- c:\windows\system32\winhelper.dll
2009-11-07 08:32:18 74240 ----a-w- C:\ijonf.exe
2009-11-07 08:32:18 49664 ----a-w- C:\rwsjs.exe
2009-11-07 08:32:16 41984 ----a-w- C:\wjvvuyh.exe
2009-11-07 08:32:15 41984 ----a-w- C:\rnylgwv.exe
2009-11-03 03:33:55 0 d-----w- c:\program files\VS Revo Group
2009-10-30 22:36:17 7537 ----a-w- c:\windows\system32\dopdf6.ctm
2009-10-30 22:36:17 21192 ----a-w- c:\windows\system32\dopdfmn6.dll
2009-10-30 22:36:17 18632 ----a-w- c:\windows\system32\dopdfmi6.dll
2009-10-30 22:36:10 0 d-----w- c:\program files\Softland
2009-10-22 14:30:06 0 ----a-w- c:\windows\system32\FOXIT_PDF
2009-10-16 22:39:45 2145280 -c----w- c:\windows\system32\dllcache\ntkrnlmp.exe
2009-10-16 22:39:44 2023936 -c----w- c:\windows\system32\dllcache\ntkrpamp.exe
2009-10-16 22:39:43 2066048 -c----w- c:\windows\system32\dllcache\ntkrnlpa.exe
2009-10-08 22:49:43 0 d-----w- c:\program files\FrostWire

==================== Find3M ====================

2009-11-07 14:36:33 182656 ----a-w- c:\windows\system32\drivers\ndis.sys
2009-11-07 14:35:31 361600 ----a-w- c:\windows\system32\drivers\TCPIP.SYS
2009-11-07 08:48:00 176 ----a-w- c:\program files\httkjm.txt
2009-10-11 09:17:27 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-09-25 05:37:11 667136 ----a-w- c:\windows\system32\wininet.dll
2009-09-25 05:37:09 81920 ----a-w- c:\windows\system32\ieencode.dll
2009-09-12 22:00:58 59340 ----a-w- c:\windows\fonts\LHF Boston Truckstyle.ttf
2009-09-11 14:18:39 136192 ----a-w- c:\windows\system32\msv1_0.dll
2009-09-04 21:03:36 58880 ----a-w- c:\windows\system32\msasn1.dll
2009-09-03 21:32:34 500660 ----a-w- c:\windows\fonts\Street Blues Trial.ttf
2009-08-30 15:48:20 168312 ----a-w- c:\windows\fonts\Capture it 2.ttf
2009-08-26 08:00:21 247326 ----a-w- c:\windows\system32\strmdll.dll
2009-08-18 05:24:35 85396 ---ha-w- c:\windows\system32\mlfcache.dat
2004-10-01 20:00:16 61440 ----a-w- c:\program files\Uninstall_CDS.exe
2009-03-21 14:06:58 24064 --sha-w- c:\windows\system32\calc.dll
2009-04-05 08:12:22 1440 --sha-w- c:\windows\system32\GroupPolicy000.dat

============= FINISH: 12:27:55.65 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 unknowingly

unknowingly
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:21 PM

Posted 08 November 2009 - 08:41 PM

this is the latest info from malwarebytes. The wallpaper is gone but the computer is non-compliant. I cannot open any documents or browse the internet as it redirects me to other sites. Everything is super slow...

Malwarebytes' Anti-Malware 1.36
Database version: 1945
Windows 5.1.2600 Service Pack 3

11/8/2009 8:27:24 PM
mbam-log-2009-11-08 (20-27-24).txt

Scan type: Full Scan (C:\|)
Objects scanned: 159309
Time elapsed: 21 minute(s), 52 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 14

Memory Processes Infected:
C:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcpsr (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Protect (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcpsr (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\WINDOWS\system32\wsnpoem (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\drivers\protect.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wsnpoem\audio.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wsnpoem\video.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mscert.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\4.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\B.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\C.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\D.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\E.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\F.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator.USER-37FD9E1A6E\reader_s.exe (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\user\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\tcpsr.sys (Rootkit.Agent) -> Quarantined and deleted successfully.

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:21 AM

Posted 11 November 2009 - 04:53 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :(
Posted Image
m0le is a proud member of UNITE

#4 unknowingly

unknowingly
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:21 PM

Posted 11 November 2009 - 09:56 PM

HI I can't wait until you help me because I can only run my computer by using control-alt-del and browsing for firefox to open.

#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:21 AM

Posted 12 November 2009 - 08:55 AM

Hi unknowingly,

This MBAM log entry is very bad news.

C:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> Unloaded process successfully.

That file is a Virut file.


Your System is infected with Virut!!
Virut is a file infecting virus which is able to modify itself each and every time it runs. In addition, when it infects, sometimes it will destroy the file it tries to latch onto.
For these reasons, you really can't truly fix Virut. You will need to format/reinstall the operating system on this machine.

More information:
http://free.avg.com/66558

There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus.


http://home.mcafee.com/VirusInfo/VirusProf...aspx?key=143034

W32/Virut.h is a polymorphic, entry point obscuring (EPO) file infector with IRC bot functionality. It can accept commands to download other malware on the compromised machine.
It appends to the end of the last section of executable (PE) files an encrypted copy of its code. The decryptor is polymorphic and can be located either:
Immediately before the encrypted code at the end of the last section
At the end of the code section of the infected host in 'slack-space' (assuming there is any)
At the original entry point of the host (overwriting the original host code)


Miekiemoes, one of our team members here and an MS-MVP, additionally has a blog post about Virut.

Sorry, mate, there's nothing anyone can do for this infection at the moment.

Do you have any questions?
Posted Image
m0le is a proud member of UNITE

#6 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:04:21 AM

Posted 17 November 2009 - 08:44 PM

Since this issue appears to be resolved ... this topic has been closed.

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users