Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Viruses on Windows Vista Home Premium


  • This topic is locked This topic is locked
6 replies to this topic

#1 Britgirl

Britgirl

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:52 AM

Posted 14 November 2010 - 09:17 AM

Hi,

For the last month I have been battling one virus after another ever since I initially 'caught' the svchost.exe virus. I have had the quick defragmanter virus, fake Security Essentials virus and several others. But I feel my computer is totally compromised and not sure whether all hope is lost.

I have downloaded Mbam and rkill and SuperAntiSpyware so many times. I am running SuperAntiSpyware almost every day and it's removing between 30 - 400 spyware items a time.

Rkill keep stopping rundll or hostdll files but they keep coming back.

I think my computer is totally messed up now.

So at the moment, the last major thing to be removed 2 days ago was Trojan.Hiloti which Malwarebyes removed. But my computer is still slow, crashing and rkill still keeps finding hostdll or rundll. No matter what I do to remove the viruses they are coming back hardcore.

Is there any help for me and my Sony Vaio?

Edited by hamluis, 14 November 2010 - 11:10 AM.
Merged post from Vista, deleted dupe post ~ Hamluis.


BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:08:52 AM

Posted 14 November 2010 - 09:23 AM

Can you post the logs from your scans with Malwarebytes Antimalware, Super Anti-Spyware, and rkill?

#3 Britgirl

Britgirl
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:52 AM

Posted 14 November 2010 - 10:14 AM

Thankyou,

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.
Ran on 14/11/2010 at 13:27:16.


Services Stopped:


Processes terminated by Rkill or while it was running:


C:\Program Files\Google\Update\GoogleUpdate.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
c:\Users\Bemma\Downloads\rkill.com


Rkill completed on 14/11/2010 at 13:28:05.

I just tried to get into malwarebytes but now it says the depandancy service or group failed to start..

Not sure how to get the logs from SAS I went to manage quarantine but unable to copy it

#4 Britgirl

Britgirl
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:52 AM

Posted 14 November 2010 - 10:28 AM

Managed to get MBAM logs from all the multiple scan i've done over the last 2 weeks.



Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5098

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

13/11/2010 21:14:44
mbam-log-2010-11-13 (21-14-44).txt

Scan type: Full scan (C:\|)
Objects scanned: 312692
Time elapsed: 1 hour(s), 58 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Windows\System32\config\systemprofile\AppData\Local\eqoyimax.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5085

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

10/11/2010 02:31:28
mbam-log-2010-11-10 (02-31-28).txt

Scan type: Full scan (C:\|)
Objects scanned: 308739
Time elapsed: 1 hour(s), 32 minute(s), 16 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Users\Bemma\AppData\Local\FDapup.dll (Trojan.Hiloti) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gpapu (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\orulibabude (Trojan.Agent.U) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{0f35237b-edfa-796b-cd5d-a4b3a36c45b8} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Bemma\AppData\Local\FDapup.dll (Trojan.Hiloti) -> Delete on reboot.
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Roaming\Adobe\plugs\KB587655.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\Temp\0.9169232471870449.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\uduguqutoq.dll (Trojan.Agent.U) -> Delete on reboot.
C:\Users\Bemma\AppData\Roaming\Oxmo\uboqe.exe (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5076

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

09/11/2010 22:06:57
mbam-log-2010-11-09 (22-06-57).txt

Scan type: Full scan (C:\|)
Objects scanned: 306089
Time elapsed: 1 hour(s), 30 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Quarantined and deleted successfully.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5076

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

09/11/2010 07:56:10
mbam-log-2010-11-09 (07-56-10).txt

Scan type: Quick scan
Objects scanned: 172344
Time elapsed: 14 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\orulibabude (Trojan.Agent.U) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gpapu (Trojan.Agent.U) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{0f35237b-edfa-796b-cd5d-a4b3a36c45b8} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Delete on reboot.

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5076

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18943

09/11/2010 00:45:23
mbam-log-2010-11-09 (00-45-23).txt


Scan type: Full scan (C:\|)
Objects scanned: 306822
Time elapsed: 2 hour(s), 17 minute(s), 43 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 0
Registry Values Infected: 3
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 12

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Users\Bemma\AppData\Local\FDapup.dll (Trojan.Hiloti) -> Delete on reboot.
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gpapu (Trojan.Hiloti) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\orulibabude (Trojan.Agent.U) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{0f35237b-edfa-796b-cd5d-a4b3a36c45b8} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Bemma\AppData\Local\FDapup.dll (Trojan.Hiloti) -> Delete on reboot.
C:\Users\Bemma\AppData\Local\Temp\TxvEUtKihw.dll (Trojan.FakeMS) -> Delete on reboot.
C:\Users\Bemma\AppData\Roaming\Adobe\plugs\KB889205.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Local\idethM2.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Local\Nltros.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Roaming\Adobe\plugs\KB5694130.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\AppData\Roaming\Adobe\plugs\KB5716157.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\Temp\TMP000000C7AEE22457B6507029 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\Temp\0.1369400630364872.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.6499085029380283.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\uyaluyetofiwup.dll (Trojan.Agent.U) -> Delete on reboot.
C:\Users\Bemma\AppData\Roaming\Xudaty\yzykd.exe (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.


Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 5065

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18975

07/11/2010 12:43:29
mbam-log-2010-11-07 (12-43-29).txt


Scan type: Quick scan
Objects scanned: 171123
Time elapsed: 11 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 16

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Users\Bemma\AppData\Local\Temp\topwesitjh (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\Temp\E6A8.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Windows\Temp\WINDOWS_SECURITY_CENTER.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\D3D3.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Windows\Temp\ludmDjIllQ.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\Temp\rZnQAQdbUs.exe (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.10812726848678567.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.5611475820961314.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.7159990501631477.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.7785698877767286.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.7883838814408848.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.9072314628257931.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\0.5938976221360945.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\Temp\skaioejiesfjoee.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\Users\Public\Documents\Server\admin.txt (Malware.Trace) -> Quarantined and deleted successfully.
C:\Users\Public\Documents\Server\server.dat (Malware.Trace) -> Quarantined and deleted successfully.

#5 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:08:52 AM

Posted 14 November 2010 - 10:28 AM

Files Infected:
C:\Users\Bemma\AppData\Local\Temp\topwesitjh (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Bemma\AppData\Local\Temp\E6A8.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\Windows\Temp\WINDOWS_SECURITY_CENTER.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\D3D3.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
.


Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include the link to this topic in your new topic and a description of your computer issues and what you have done to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Once you have created the new topic, please reply back here with a link to the new topic.

Edited by cryptodan, 14 November 2010 - 10:30 AM.


#6 Britgirl

Britgirl
  • Topic Starter

  • Members
  • 23 posts
  • OFFLINE
  •  
  • Local time:03:52 AM

Posted 14 November 2010 - 12:00 PM

Done, here is the link to the new topic.

http://www.bleepingcomputer.com/forums/topic360489.html

Thanks

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,111 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:03:52 AM

Posted 14 November 2010 - 07:06 PM

Hello,

Now for the hard and frustrating part: waiting.

Now that you have posted a log, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Internet Security, NoScript Firefox ext.


animinionsmalltext.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users