Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Ave.exe virus & multiple Svchost.exe problem.


  • This topic is locked This topic is locked
18 replies to this topic

#1 WingedAura

WingedAura

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 02:32 AM

Initial note: I'm new to this forum (I have read the rules).

------------------

Ave.exe problem:

It all started when I rebooted my computer. I tried getting on aim.com, but a fake scan popped up from a rogue scanner named "XP Security Center." After noticing that it's a rogue software and that it has disabled my firewall, I noticed that it has closed ALL the programs I had open.
It runs with the process ave.exe. Everytime I try to run MalwareBytes Anti-Malware, ave.exe will run (if it isn't already) and MalwareBytes will not open. I would end the process to prevent it from closing any other programs.

I have tried going to safemode, but even without networking- ave.exe would run. And the only thing in the taskbar, besides the digital clock in the corner is the image of XP Security Center.
I've tried using Google, but it would block the webpage. I used Bing (worked, surprisingly) and found this site.

And now I need your help.

~ ~ ~ ~ ~ ~ ~ ~

Svchost.exe problem:

There isn't much to explain because I don't know when it started. But I noticed that there is always more than one svchost.exe running in my processes list. I'm too scared to end the processes because it states that it's run by the System and Local Service.
It is not much of a concern for me, because it has not stopped any program from running, but there are so many running at once that it unnecessarily takes up extra mem. usage.

If there is a solution for this, I would appreciate some help with this also.


Any help will be appreciated.
Please and thanks,
Coco.


-Thanks for moving this post to another category. I'm sorry it was in the wrong section.

Edited by WingedAura, 25 April 2010 - 11:59 AM.


BC AdBot (Login to Remove)

 


#2 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 04:17 AM

Hi,


Please do not terminate any svchost.exe process.It is one legit process.


I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
Elle

Edited by Blind Faith, 25 April 2010 - 04:18 AM.

Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#3 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 11:14 AM

Results of ESET scan:

C:\Documents and Settings\Helen Tsoi\Local Settings\Temp\BlKHDFFefc.txt Win32/Inject.NDH trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\drivers\down\479750.exe a variant of Win32/Packed.Themida application cleaned by deleting - quarantined

//End of Text File


Oh yes, this reminds me. I have run BitDefender Online Scanner and it has removed 11 files that had been infected with either Trojan.Generic XXXXXX (I forgot the numbers/letters) or some other virus (sorry, I forgot).
I haven't rebooted my computer since ending the ave.exe process, because it tends to come back. It might be something in the startup list, but I am not able to access it.

Edited by WingedAura, 25 April 2010 - 12:03 PM.


#4 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 12:05 PM

Hi,


Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.




Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#5 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 12:33 PM

Excuse me,

But do you mean to reboot my computer in:
Safe Mode w/o networking,
Safe Mode with networking,
or
Safe Mode with Command Prompt?

Coco

#6 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 12:35 PM

Hi,


Please choose Safe Mode without Networking.



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#7 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 02:23 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/25/2010 at 12:08 PM

Application Version : 4.35.1002

Core Rules Database Version : 4849
Trace Rules Database Version: 2661

Scan type : Complete Scan
Total Scan Time : 01:23:23

Memory items scanned : 215
Memory threats detected : 0
Registry items scanned : 4623
Registry threats detected : 0
File items scanned : 10677
File threats detected : 109

Adware.Tracking Cookie
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@in.getclicky[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@azjmp[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@fastclick[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@questionmarket[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@overture[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@bluestreak[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@adcentriconline[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@foxmobile.directtrack[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@doubleclick[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@serving-sys[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@a.websponsors[3].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@liveperson[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@rts.pgmediaserve[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@tribalfusion[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@media6degrees[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@mediaplex[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ads.bleepingcomputer[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@msnportal.112.2o7[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ads.pointroll[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@intermundomedia[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@adecn[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@www.mediafire[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@content.yieldmanager[3].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@videoegg.adbureau[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@advertising[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@pointroll[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@gr.burstnet[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@server.iad.liveperson[3].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@a.websponsors[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@yieldmanager[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@imrworldwide[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@revsci[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@content.yieldmanager[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@bs.serving-sys[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ads.ad4game[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@invitemedia[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@zedo[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@data.coremetrics[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@www.googleadservices[3].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@bravenet[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@adbrite[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@atdmt[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@www.googleadservices[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@burstnet[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ads.networldmedia[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@mediafire[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@googleads.g.doubleclick[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@chitika[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@server.iad.liveperson[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@at.atwola[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@cgm.adbureau[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ad.jmg[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@bellcan.adbureau[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@metroleap.rotator.hadj7.adjuggler[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@www.partypoker[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@statse.webtrendslive[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ads.nexon[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@casalemedia[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@apmebf[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@www.googleadservices[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@tacoda[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@partypoker[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@game-advertising-online[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@247realmedia[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ad3.clickhype[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@adlegend[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@adxpose[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@collective-media[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ad.yieldmanager[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@statcounter[1].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@ehg-eset.hitbox[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@server.iad.liveperson[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@hitbox[2].txt
C:\Documents and Settings\Helen Tsoi\Cookies\helen_tsoi@cgm.adbureau[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@ad.yieldmanager[5].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.gossipcenter[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@ads.networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@advertise[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@adx.bidsystem[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@apmebf[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz7.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@clickpayz8.91462.blueseek[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@content.yieldmanager[6].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@doubleclick[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@invitemedia[4].txt
C:\Documents and Settings\NetworkService\Cookies\system@mediaplex[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@networldmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@revsci[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@videoegg.adbureau[2].txt
C:\Documents and Settings\NetworkService\Cookies\system@videoegg.adbureau[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[1].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[3].txt
C:\Documents and Settings\NetworkService\Cookies\system@vitamine.networldmedia[5].txt

Trojan.Agent/Gen-RogueAV
C:\DOCUMENTS AND SETTINGS\HELEN TSOI\LOCAL SETTINGS\APPLICATION DATA\AVE.EXE
C:\DOCUMENTS AND SETTINGS\HELEN TSOI\LOCAL SETTINGS\TEMPORARY INTERNET FILES\CONTENT.IE5\E5RVIEUT\DATA[1].HTML


//End of Text Log.

#8 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 02:28 PM

Hi,


Try running Malwarebytes now.


Update it if it works, and run a FULL scan.



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#9 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 02:36 PM

Would you like me to post the log here also?

The ave.exe virus doesn't seem to run as a process anymore. No symptoms from it that were produced before is noticeable. But I'm still suspicious.

Winged Aura
(WA)

#10 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 02:37 PM

Yes, please after you've run the scan, post the log.


And also, Superantispyware reports the file as being deleted. :thumbsup:
Lets see how Malwarebytes does.



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#11 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 03:45 PM

This log was saved BEFORE the quarantine.


Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4033

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

25/04/2010 1:22:41 PM
mbam-log-2010-04-25 (13-22-41).txt

Scan type: Full scan (C:\|)
Objects scanned: 153381
Time elapsed: 40 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 4
Folders Infected: 1
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\PotDll.PotGo (Trojan.Agent) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Helen Tsoi\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
C:\WINDOWS\system32\drivers\down (Trojan.Downloader) -> No action taken.

Files Infected:
C:\Documents and Settings\Helen Tsoi\Desktop\Setup\Keygen.exe (Trojan.Agent.CK) -> No action taken.
C:\Program Files\Cheat Engine\Systemcallretriever.exe (Trojan.Downloader) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001461.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001462.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001463.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001464.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001465.exe (Trojan.Agent) -> No action taken.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP19\A0001556.exe (Trojan.Agent.CK) -> No action taken.

#12 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 03:47 PM

The log AFTER the reboot:


Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4033

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

25/04/2010 1:23:15 PM
mbam-log-2010-04-25 (13-23-15).txt

Scan type: Full scan (C:\|)
Objects scanned: 153381
Time elapsed: 40 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 4
Folders Infected: 1
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\PotDll.PotGo (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\command\(default) (Hijack.StartMenuInternet) -> Bad: ("C:\Documents and Settings\Helen Tsoi\Local Settings\Application Data\ave.exe" /START "C:\Program Files\Internet Explorer\iexplore.exe") Good: (iexplore.exe) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\system32\drivers\down (Trojan.Downloader) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Helen Tsoi\Desktop\Setup\Keygen.exe (Trojan.Agent.CK) -> Quarantined and deleted successfully.
C:\Program Files\Cheat Engine\Systemcallretriever.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001461.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001462.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001463.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001464.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP17\A0001465.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{065E2FD8-25CB-4416-BD5C-AC5CC2C7C7A9}\RP19\A0001556.exe (Trojan.Agent.CK) -> Quarantined and deleted successfully.

#13 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 04:08 PM

Hi,


Looks very good.


How is the system working?




Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#14 WingedAura

WingedAura
  • Topic Starter

  • Members
  • 36 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Canada
  • Local time:09:55 PM

Posted 25 April 2010 - 04:16 PM

The system doesn't seem to be affect by the virus anymore (if it is still there).

Although, the system runs faster than it did before (when ave.exe was present), the numerous svchost.exe's still cause my computer is run slower than it did when I had reformated it.

Any suggestions?

Winged Aura
(WA)

Edited by WingedAura, 25 April 2010 - 04:18 PM.


#15 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:08:55 AM

Posted 25 April 2010 - 04:18 PM

Hi,


The system will never be capable to have the same performance as when freshly reformated due to the activity of the other programs.


But to make sure you're clean:


Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.


Click on Kaspersky Online Scanner

You will be prompted to install an ActiveX component from Kaspersky, Click Yes.
  • The program will launch and then begin downloading the latest definition files:
  • Once the files have been downloaded click on NEXT
  • Now click on Scan Settings
  • In the scan settings make sure that the following are selected:
    • Scan using the following Anti-Virus database:
    Extended (if available otherwise Standard)
    • Scan Options:
    Scan Archives
    Scan Mail Bases
  • Click OK
  • Now under select a target to scan:Select My Computer
  • This will program will start and scan your system.
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
    • Now click on the Save as Text button:
  • Save the file to your desktop.
  • Copy and paste that information in your next post.


Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users