Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Multiple viruses(Bearshare spyware, YP.exe...) RKill not opening


  • This topic is locked This topic is locked
15 replies to this topic

#1 Nile

Nile

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 24 April 2011 - 11:07 PM

Hello!
My brother has had a virus for a while. Every time I give him instructions on how to get rid of it, he only follows the instructions until he comes to the point where the virus will let him start gaming again. In attempts to fully get rid of his virus, I'm now removing it. To get rid of the first virus, I tried following these(http://www.bleepingcomputer.com/virus-removal/remove-win-7-antispyware-2011) instructions. When I get to step 4, I can't seem to get RKill.exe to open. I try opening it, and it asks me what program I would like to open it with. I tried running it as an admin and I get the same results. Almost every program on the machine does the same unless I run it as an admin, but with RKill I can't seem to get it. The computer also has Bearshare. Can somebody help to un-dig the rest of the viruses this computer might have and assist me in getting rid of it?

Thanks

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 25 April 2011 - 04:52 AM

Have you tried running Malwarebytes Antimalware in Safe Mode first along with Super Antispyware?

#3 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 25 April 2011 - 12:07 PM

Thanks, Im doing it now. Although, I don't think I got mbam to update fully. I pressed Update and it did it's process, then showed the "what program would you like to open this with?" window... So I'm not sure if its updated. SUPERAntiSpyware updated fine, though. Should I post the logs when it's done?

#4 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 25 April 2011 - 04:21 PM

Yes post the logs when you are done.

#5 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 25 April 2011 - 07:07 PM

mbam

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 6441

Windows 6.0.6002 Service Pack 2 (Safe Mode)
Internet Explorer 8.0.6001.19048

4/25/2011 5:21:04 PM
mbam-log-2011-04-25 (17-21-04).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 482821
Time elapsed: 5 hour(s), 36 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 7
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{fe4c2c37-edc8-4c00-b864-3c38cf3ba834} (Adware.Adshot) -> No action taken.
HKEY_CURRENT_USER\Software\SolutionAV (Rogue.AntivirSolutionPro) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\ineufbr1v (Malware.Trace) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rthdbpl (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\proxyserver (PUM.Bad.Proxy) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell (Worm.Palevo) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jwecoabp (Rogue.AntivirusSuite.Gen) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{571773ec-90e0-3de7-f61f-876c34433e3f} (Trojan.ZbotR.Gen) -> No action taken.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\kmukhikv (Trojan.FakeAlert.Gen) -> No action taken.
HKEY_CLASSES_ROOT\.exe\shell\open\command\(default) (Hijack.ExeFile) -> No action taken.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("C:\Users\Joel\AppData\Local\ypw.exe" -a "%1" %*) Good: ("%1" %*) -> No action taken.

Folders Infected:
C:\Users\Joel\AppData\Roaming\SystemProc (Trojan.Agent) -> No action taken.

Files Infected:
C:\ProgramData\Update\seupd.exe (Trojan.Clicker) -> No action taken.
C:\Users\Joel\AppData\Local\Temp\hrku.exe (Trojan.Clicker) -> No action taken.
C:\Users\Joel\AppData\Local\Temp\ilvu.exe (Adware.BHO) -> No action taken.


SASF

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/25/2011 at 06:52 PM

Application Version : 4.35.1000

Core Rules Database Version : 6915
Trace Rules Database Version: 4727

Scan type : Complete Scan
Total Scan Time : 07:14:24

Memory items scanned : 370
Memory threats detected : 0
Registry items scanned : 6459
Registry threats detected : 1
File items scanned : 315035
File threats detected : 33

Adware.Tracking Cookie
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@media6degrees[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@fastclick[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@adbrite[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@advertising[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@invitemedia[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@imrworldwide[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@collective-media[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@pointroll[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@content.yieldmanager[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@ru4[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@adecn[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@questionmarket[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@oasn04.247realmedia[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@serving-sys[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@realmedia[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@user.lucidmedia[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@pixel.invitemedia[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@247realmedia[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@doubleclick[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@atdmt[1].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@ad.yieldmanager[2].txt
C:\Users\Joel\AppData\Roaming\Microsoft\Windows\Cookies\joel@ads.pointroll[1].txt

Malware.Trace
HKU\S-1-5-21-1397536673-1070165821-878011073-1000\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON#SHELL

BearShare File Sharing Client
C:\PROGRAM FILES\BEARSHARE APPLICATIONS\BEARSHARE\BEARSHARE.EXE

Trojan.Agent/Gen-Exploit
C:\PROGRAMDATA\UPDATE\SEUPD.EXE
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\HRKU.EXE

Trojan.Agent/Gen-RogueLoad
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\ERR.LOG370686954

Trojan.Agent/Gen-IExplorer[Fake]
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX0\NIRD\IEXPLORE.EXE
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX1\NIRD\IEXPLORE.EXE
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX2\NIRD\IEXPLORE.EXE

Trojan.Agent/Gen-PEC
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX0\PROCS\EXPLORER.EXE
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX1\PROCS\EXPLORER.EXE
C:\USERS\JOEL\APPDATA\LOCAL\TEMP\RARSFX2\PROCS\EXPLORER.EXE

Trojan.Agent/Gen-FakeAlert
C:\USERS\JOEL\APPDATA\LOCALLOW\SUN\JAVA\DEPLOYMENT\CACHE\6.0\1\5728EF81-23FA04AF


I removed/quarantined the infected files and restarted.

#6 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 26 April 2011 - 06:53 AM

In your Mbam scan I see you took no action, and so I would like for you to rerun the scan and fix the issues, and repost the log.

#7 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 26 April 2011 - 11:10 AM

I recall me selecting all and removing it with the button. Afterwards it told me to restart my computer, and I did.

[edit]
But I did save the log before I took the action. If I look back in my logs on mbam and re-save the one on 4/25 will it be updated?

Edited by Nile, 26 April 2011 - 11:11 AM.


#8 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 26 April 2011 - 11:49 AM

Nope you must perform a rescan.

#9 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 26 April 2011 - 11:50 AM

Okay. What action must I take when the scan is over? And do I have to do it in safe mode again? I can now open programs without having to run it as an admin, btw.

#10 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 26 April 2011 - 11:53 AM

Run it in normal mode, and you should select fix all and reboot if required. Without taking any action, your computer remains unclean.

#11 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 26 April 2011 - 11:53 AM

Okay thanks. Will post back wit results

#12 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 26 April 2011 - 12:02 PM

Here's yesterdays scan with the new actions that were taken:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 6441

Windows 6.0.6002 Service Pack 2 (Safe Mode)
Internet Explorer 8.0.6001.19048

4/25/2011 6:55:48 PM
mbam-log-2011-04-25 (18-55-48).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 482821
Time elapsed: 5 hour(s), 36 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 3
Registry Values Infected: 7
Registry Data Items Infected: 1
Folders Infected: 1
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{fe4c2c37-edc8-4c00-b864-3c38cf3ba834} (Adware.Adshot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\SolutionAV (Rogue.AntivirSolutionPro) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\ineufbr1v (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rthdbpl (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\proxyserver (PUM.Bad.Proxy) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell (Worm.Palevo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jwecoabp (Rogue.AntivirusSuite.Gen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{571773ec-90e0-3de7-f61f-876c34433e3f} (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\kmukhikv (Trojan.FakeAlert.Gen) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.exe\shell\open\command\(default) (Hijack.ExeFile) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\exefile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("C:\Users\Joel\AppData\Local\ypw.exe" -a "%1" %*) Good: ("%1" %*) -> Quarantined and deleted successfully.

Folders Infected:
C:\Users\Joel\AppData\Roaming\SystemProc (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\ProgramData\Update\seupd.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Users\Joel\AppData\Local\Temp\hrku.exe (Trojan.Clicker) -> Quarantined and deleted successfully.
C:\Users\Joel\AppData\Local\Temp\ilvu.exe (Adware.BHO) -> Quarantined and deleted successfully.


#13 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:03:30 AM

Posted 26 April 2011 - 12:03 PM

Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include the link to this topic in your new topic and a description of your computer issues and what you have done to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Once you have created the new topic, please reply back here with a link to the new topic.

#14 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 27 April 2011 - 08:56 AM

I will, thanks.

#15 Nile

Nile
  • Topic Starter

  • Members
  • 79 posts
  • OFFLINE
  •  
  • Local time:11:30 PM

Posted 27 April 2011 - 04:45 PM

http://www.bleepingcomputer.com/forums/topic394092.html




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users