Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

CPU Running Very Slow Suspect Virus


  • This topic is locked This topic is locked
2 replies to this topic

#1 dazedandinfused

dazedandinfused

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:20 AM

Posted 02 January 2011 - 04:04 PM

Windows XP
Service Pack 2
Pentium[R] 4 PCU 3.00GHz
512 MB of RAM

CPU has been running very slow. Especially when on internet.

Have Run:
Ad-Aware
Spybot
Malwarebytes Anti-Malware

Uninstalled Internet Explorer, and reinstalled it. Shortcuts did not show up, and it will not open.

Have looked at registry activity with Process Monitor program, discovered the following (Portion of activity):
12:38:04.2105048 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www SUCCESS Desired Access: Read
12:38:04.2105361 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www SUCCESS Query: Cached, SubKeys: 0, Values: 1
12:38:04.2105534 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2105729 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org SUCCESS Index: 2, Name: www.feeds2
12:38:04.2105992 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www SUCCESS
12:38:04.2106162 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www.feeds2 SUCCESS Desired Access: Read
12:38:04.2106464 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www.feeds2 SUCCESS Query: Cached, SubKeys: 0, Values: 1
12:38:04.2106640 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www.feeds2 SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2106919 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org\www.feeds2 SUCCESS
12:38:04.2107093 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2107269 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains SUCCESS Index: 74, Name: 2squared.com
12:38:04.2107528 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2search.org SUCCESS
12:38:04.2107685 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com SUCCESS Desired Access: Read
12:38:04.2108422 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com SUCCESS Query: Cached, SubKeys: 1, Values: 1
12:38:04.2108590 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com SUCCESS Index: 0, Name: www
12:38:04.2108797 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com\www SUCCESS Desired Access: Read
12:38:04.2109073 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com\www SUCCESS Query: Cached, SubKeys: 0, Values: 1
12:38:04.2109244 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com\www SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2109515 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com\www SUCCESS
12:38:04.2109688 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2109867 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains SUCCESS Index: 75, Name: 2vgporn.info
12:38:04.2110124 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2squared.com SUCCESS
12:38:04.2110283 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info SUCCESS Desired Access: Read
12:38:04.2110610 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info SUCCESS Query: Cached, SubKeys: 1, Values: 1
12:38:04.2110775 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info SUCCESS Index: 0, Name: www
12:38:04.2110973 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info\www SUCCESS Desired Access: Read
12:38:04.2111244 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info\www SUCCESS Query: Cached, SubKeys: 0, Values: 1
12:38:04.2111423 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info\www SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2111694 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info\www SUCCESS
12:38:04.2111859 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2112032 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains SUCCESS Index: 76, Name: 3-2005-search.com
12:38:04.2112292 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\2vgporn.info SUCCESS
12:38:04.2112448 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com SUCCESS Desired Access: Read
12:38:04.2112783 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com SUCCESS Query: Cached, SubKeys: 1, Values: 1
12:38:04.2112954 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com SUCCESS Index: 0, Name: www
12:38:04.2113160 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegOpenKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com\www SUCCESS Desired Access: Read
12:38:04.2113434 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegQueryKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com\www SUCCESS Query: Cached, SubKeys: 0, Values: 1
12:38:04.2113605 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegEnumValue HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com\www SUCCESS Index: 0, Name: *, Type: REG_DWORD, Length: 4, Data: 4
12:38:04.2113876 PM jre-6u23-windows-i586-iftw-rv.exe 3148 RegCloseKey HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\3-2005-search.com\www SUCCESS

and much more.

Have run Hijackthis:
O4 - HKUS\S-1-5-20\..\RunOnce: [3DxAssociateFileExts] C:\Program Files\3Dconnexion\3Dconnexion 3DxSoftware\3DxViewer\register.exe "FileExts" (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\RunOnce: [FPVInstaller] C:\DOCUME~1\MOMAND~1\LOCALS~1\Temp\FUJIFILM\InstallRestart.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [FPVInstaller] C:\DOCUME~1\MOMAND~1\LOCALS~1\Temp\FUJIFILM\InstallRestart.exe (User 'Default user')
O4 - Startup: OpenOffice.org 2.4.lnk = C:\Program Files\OpenOffice.org 2.4\program\quickstart.exe
O4 - Global Startup: Exif Launcher S.lnk = ?
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Start 3DxWare.lnk = C:\Program Files\3Dconnexion\3Dconnexion 3DxSoftware\3DxWare\3dxsrv.exe
O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_E11712C84EA7E12B.dll/cmsidewiki.html
O9 - Extra button: HP Smart Select - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} (HP Download Manager) - https://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) - http://javadl.sun.com/webapps/download/AutoDL?BundleId=24931
O16 - DPF: {BEA7310D-06C4-4339-A784-DC3804819809} (Photo Upload Plugin Class) - http://www.cvsphoto.com/upload/activex/v3_0_0_7/PhotoCenter_ActiveX_Control.cab
O16 - DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} (Windows Live Hotmail Photo Upload Tool) - http://gfx2.hotmail.com/mail/w4/pr01/photouploadcontrol/MSNPUpld.cab
O18 - Protocol: gcf - {9875BFAF-B04D-445E-8A69-BE36838CDE3E} - C:\Program Files\Google\Chrome Frame\Application\8.0.552.224\npchrome_frame.dll
O20 - Winlogon Notify: GoToAssist - C:\Program Files\Citrix\GoToAssist\480\G2AWinLogon.dll
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\System32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\System32\browseui.dll
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: Basics Service - Seagate Technology LLC - C:\Program Files\Seagate\Basics\Service\SyncServicesBasics.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Canon Camera Access Library 8 (CCALib8) - Canon Inc. - C:\Program Files\Canon\CAL\CALMAIN.exe
O23 - Service: GoToAssist - Citrix Online, a division of Citrix Systems, Inc. - C:\Program Files\Citrix\GoToAssist\480\g2aservice.exe
O23 - Service: Google Update Service (gupdate1c9859b13d53fdc) (gupdate1c9859b13d53fdc) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Intuit Update Service (IntuitUpdateService) - Intuit Inc. - C:\Program Files\Common Files\Intuit\Update Service\IntuitUpdateService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: Norton Internet Security (NIS) - Symantec Corporation - C:\Program Files\Norton Internet Security\Engine\18.5.0.125\ccSvcHst.exe
O23 - Service: Norton Online (NOF) - Symantec Corporation - C:\Program Files\Norton Online\Engine\2.1.0.21\ccSvcHst.exe
O23 - Service: Seagate Scheduler2 Service (SgtSch2Svc) - Seagate - C:\Program Files\Common Files\Seagate\Schedule2\schedul2.exe
O23 - Service: spkrmon - Unknown owner - C:\Program Files\Analog Devices\SoundMAX\spkrmon.exe
O23 - Service: Symantec RemoteAssist - Symantec, Inc. - C:\Program Files\Common Files\Symantec Shared\Support Controls\ssrc.exe
O23 - Service: TeamViewer 5 (TeamViewer5) - TeamViewer GmbH - C:\Program Files\TeamViewer\Version5\TeamViewer_Service.exe
O23 - Service: TomTomHOMEService - TomTom - C:\Program Files\TomTom HOME 2\TomTomHOMEService.exe

--
End of file - 14092 bytes

any help would be greatly appreciated!!!!!

Edited by boopme, 02 January 2011 - 05:00 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:20 PM

Posted 07 January 2011 - 03:26 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below I will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

Please download DeFogger to your desktop.

Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.


Then

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:02:20 PM

Posted 11 January 2011 - 07:38 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users