Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with "Windows XP Recovery" , followed removal guide, didn't work. HELP!


  • This topic is locked This topic is locked
3 replies to this topic

#1 helpmeohgodhelpme

helpmeohgodhelpme

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:08:05 AM

Posted 21 May 2011 - 08:41 AM

Yesterday, a messagebox popped up on my screen "Windows XP Recovery: Hard Drive Errors found! Click 'OK' to scan now!". Knowing better than to do what it told me, I pressed the "Cancel" button, but it proceded to scan anyway. After a while of quote-unquote "scanning", it told me "Windows cannot find hard disk space. Hard Drive Error!", then "GPU RAM Temperature is critically high! Urgent [sic]RAM Memory (surely the real MS would know that the M in RAM stands for memory, wouldn't it?) optimization is required to prevent system crash". Then I got: "Read time of hard drive clusters less than 500 ms". (I don't even think that is a real error message, just something made up to scare people who aren't in the know technically, surely <500 ms read-time is a good thing!)

So, naturally, I "x"ed it off, then shut down my pc.

The today, when I got up, I booted off an Ubuntu LiveCD to save my files, then tried to start Windows in safe mode.
Which didn't work too well. My computer runs XP Professional, so when I tried to log in, my password wouldn't work, and "Administrator" as the username and nothing as a password didn't work either. So, I decided I had to try it in normal mode.

The virus tries to make your desktop look "scary" by hiding all the files and making the background black. It also attempts to convince the victim that the HDD really is damaged by setting all file attributes to "hidden" and removing all links from the start menu. You can load My Computer, access the C drive, but you "C" nothing. I set folder options to "View hidden files and folders", and alakazam, my files appeared. Anyway, I was still getting popups so I followed BleepingComputer.com's tutorial about Windows XP recovery here. This guide worked fine until about step 8: Run mbam-setup.exe (though I suspect step 5 failed, which caused this: no rootkits were detected, but as you will probably work out there is one at work here.) MBAM gave me an error: "The setup files are corrupted. Please obtain a new copy of the program." So I did, and this time renamed it jjdsjsds.com.exe. Double clicked it- still no luck. Then symantec told me jjdsjsds.com.exe was infected and that it cleaned it, also saying "Access Denied". (Which is the same error I received when I ran RKill, but RKill seemed to work, killing XP Recovery with ease.) Luckily, I have a copy of MBAM installed, so I ran that and tried to update it. I got the update screen up, it downloaded, but then a dialog appeared: "An error has occurred. Please report this error code to our support team. MBAM_ERROR_UPDATING (5, 0, CreateFile). Access is denied.". Wondering what happened, I decided to abort the update and run a scan anyway. It found nothing. So I navigated to the folder that I knew the malware was in (thanks to the RKill log) and scanned that. Still nothing. I was going to delete the files manually, but I decided I'd post here first. I will post a screenshot showing the files in the folder. Anyway, I followed the instructions in the preperation guide and made all the required logs. (I also ran the rootkit detector again, just to be sure, but still nothing.) So, brace yourself, here comes the log (starting with, even though it isn't required, the RKill log):

This log file is located at C:\rkill.log.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 20/05/2011 at 21:54:21.
Operating System: Microsoft Windows XP


Processes terminated by Rkill or while it was running:

C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Documents and Settings\All Users\Application Data\MEXFxpGUVShIHWB.exe
C:\Documents and Settings\All Users\Application Data\18538276.exe


--- ATTENTION ---

Windows was configured to use a proxy! Proxy settings have been removed.

The Proxy Server that was configured is: 127.0.0.1:80

If this was a valid setting, please double-click on the rk-proxy.reg file on your desktop and allow the data to be merged to restore your proxy settings.


Rkill completed on 20/05/2011 at 21:54:33.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 21/05/2011 at 12:36:17.
Operating System: Microsoft Windows XP


Processes terminated by Rkill or while it was running:

C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Documents and Settings\All Users\Application Data\MEXFxpGUVShIHWB.exe
C:\Documents and Settings\All Users\Application Data\18538276.exe
C:\WINDOWS\system32\HPBPRO.EXE


Rkill completed on 21/05/2011 at 12:36:29.
Please post this only if requested to by the person helping you.
Otherwise you can close this log when you wish.

Rkill was run on 21/05/2011 at 12:37:59.
Operating System: Microsoft Windows XP


Processes terminated by Rkill or while it was running:



Rkill completed on 21/05/2011 at 12:38:10.

Next the DDS log:

.
DDS (Ver_11-05-19.01) - NTFSx86
Internet Explorer: 7.0.5730.13
Run by stevie.hynes at 13:21:51 on 2011-05-21
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2000.1047 [GMT 1:00]
.
AV: Symantec AntiVirus Corporate Edition *Enabled/Updated* {FB06448E-52B8-493A-90F3-E43226D3305C}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
svchost.exe
svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
c:\program files\idt\dellxpm09b_6017v022\wdm\stacsv.exe
C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\CV\bin\HostControlService.exe
C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\CV\bin\HostStorageService.exe
svchost.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\Program Files\iPass\iPassConnect\iPassPeriodicUpdateService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\RealVNC\VNC4\WinVNC4.exe
C:\Program Files\Intel\WiFi\bin\WLKeeper.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\Program Files\iPass\iPassConnect\iPassPeriodicUpdateApp.exe
C:\WINDOWS\system32\igfxpers.exe
C:\WINDOWS\system32\AESTFltr.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\IDT\WDM\sttray.exe
C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\Program Files\iPass\iPassConnect\iPassConnectGUI.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe
C:\Program Files\iPass\iPassConnect\iPassConnectEngine.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe
C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\Program Files\iPass\iPassConnect\downloader\iPCCheck.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\system32\notepad.exe
C:\WINDOWS\system32\taskmgr.exe
C:\WINDOWS\explorer.exe
C:\Documents and Settings\stevie.hynes\Desktop\dds.scr
C:\WINDOWS\system32\WSCRIPT.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.inspectorate.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [ISUSPM] "c:\program files\common files\installshield\updateservice\ISUSPM.exe" -scheduler
uRun: [{E407E207-731C-6C68-8B19-3495A687B805}] "c:\documents and settings\stevie.hynes\application data\ommeyh\ihsod.exe"
uRun: [MEXFxpGUVShIHWB] c:\documents and settings\all users\application data\MEXFxpGUVShIHWB.exe
uRunOnce: [Shockwave Updater] c:\windows\system32\adobe\shockwave 11\SwHelper_1151601.exe -Update -1151601 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; GTB6.4; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)" -"http://www.urban75.com/Action/jiang.html"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [AESTFltr] %SystemRoot%\system32\AESTFltr.exe /NoDlg
mRun: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray.exe
mRun: [IntelZeroConfig] "c:\program files\intel\wifi\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\common files\intel\wirelesscommon\iFrmewrk.exe" /tf Intel Wireless Tray
mRun: [iPassConnect] "c:\program files\ipass\ipassconnect\iPassConnectGUI.exe" /S
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [ccApp] "c:\program files\common files\symantec shared\ccApp.exe"
mRun: [vptray] c:\progra~1\symant~1\VPTray.exe
mRun: [StatusClient] c:\program files\hewlett-packard\toolbox2.0\apache tomcat 4.0\webapps\toolbox\statusclient\StatusClient.exe /auto
mRun: [TomcatStartup] c:\program files\hewlett-packard\toolbox2.0\hpbpsttp.exe
mRun: [QuickTime Task] "E:\QTTask.exe" -atboottime
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
Trusted Zone: adp.com
Trusted Zone: gbazuri-exf01p
Trusted Zone: inspectorate.com\gbwithm-shp01p
Trusted Zone: inspectorate.com\mail
Trusted Zone: inspectorate.com\webmail
Trusted Zone: inspectorate.com\www
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {54F3CD46-5ADA-11D2-81EB-006008A2E49D} - hxxp://opsmart.innovene.com/cabs//proesn3.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1248776006406
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1248775998578
DPF: {6E84D662-9599-11D2-9367-20CC03C10627} - hxxp://opsmart.innovene.com/cabs/vsview6.cab
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_15-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Notify: igfxcui - igfxdev.dll
Notify: NavLogon - c:\windows\system32\NavLogon.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 12.163.191.76 www.inspectorate.com
.
============= SERVICES / DRIVERS ===============
.
R1 SAVRT;SAVRT;c:\program files\symantec antivirus\savrt.sys [2005-2-4 324232]
R1 SAVRTPEL;SAVRTPEL;c:\program files\symantec antivirus\Savrtpel.sys [2005-2-4 53896]
R2 ccEvtMgr;Symantec Event Manager;c:\program files\common files\symantec shared\ccEvtMgr.exe [2005-4-8 185968]
R2 ccSetMgr;Symantec Settings Manager;c:\program files\common files\symantec shared\ccSetMgr.exe [2005-4-8 161392]
R2 Credential Vault Host Control Service;Credential Vault Host Control Service;c:\program files\broadcom corporation\broadcom ush host components\cv\bin\HostControlService.exe [2008-7-31 808296]
R2 Credential Vault Host Storage;Credential Vault Host Storage;c:\program files\broadcom corporation\broadcom ush host components\cv\bin\HostStorageService.exe [2008-7-31 21352]
R2 SavRoam;SAVRoam;c:\program files\symantec antivirus\SavRoam.exe [2005-4-17 124608]
R2 Symantec AntiVirus;Symantec AntiVirus;c:\program files\symantec antivirus\Rtvscan.exe [2005-4-17 1706176]
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2009-7-28 108160]
R3 cvusbdrv;Broadcom USH CV;c:\windows\system32\drivers\cvusbdrv.sys [2009-7-28 32808]
R3 e1yexpress;Intel® Gigabit Network Connections Driver;c:\windows\system32\drivers\e1y5132.sys [2009-7-28 244368]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI Service;c:\windows\system32\drivers\IntcHdmi.sys [2009-7-28 110080]
R3 NAVENG;NAVENG;c:\progra~1\common~1\symant~1\virusd~1\20110519.002\naveng.sys [2011-5-20 86008]
R3 NAVEX15;NAVEX15;c:\progra~1\common~1\symant~1\virusd~1\20110519.002\navex15.sys [2011-5-20 1542392]
S0 cerc6;cerc6; [x]
S3 ccPwdSvc;Symantec Password Validation;c:\program files\common files\symantec shared\ccPwdSvc.exe [2005-4-8 83568]
S3 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2007-11-14 394952]
.
=============== Created Last 30 ================
.
2011-05-20 20:24:23 527894 ---ha-w- c:\windows\system32\PerfStringBackup.TMP
2011-05-20 17:01:58 344576 ---ha-w- c:\documents and settings\all users\application data\18538276.exe
2011-05-20 16:52:52 422400 ---ha-w- c:\documents and settings\all users\application data\MEXFxpGUVShIHWB.exe
2011-05-20 16:49:43 -------- d--h--w- c:\documents and settings\stevie.hynes\application data\Ommeyh
2011-05-20 16:49:43 -------- d--h--w- c:\documents and settings\stevie.hynes\application data\Faipe
.
==================== Find3M ====================
.
2011-03-11 11:54:56 256 ---ha-w- c:\windows\system32\pool.bin
2011-03-07 05:33:50 692736 ---ha-w- c:\windows\system32\inetcomm.dll
2011-03-04 06:45:07 434176 ---ha-w- c:\windows\system32\vbscript.dll
2011-03-03 13:21:11 1857920 ---ha-w- c:\windows\system32\win32k.sys
.
============= FINISH: 13:22:56.14 ===============

The other two logs will be attached, along with a screenshot. Thank you ever so much for your help in fixing this problem!

Sorry for the long post, I wanted to include as much information as I could in it.

Best Regards and Many Thanks,

Steven

Attached File  ark.txt   257.53KB   6 downloads

Attached File  attach.txt   16.11KB   1 downloads

Attached File  screenshot.jpg   61.55KB   4 downloads

BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:05 AM

Posted 29 May 2011 - 03:12 AM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. Click the Watch This Topic button at the top on the right.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks :thumbup2:
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:05 AM

Posted 29 May 2011 - 03:27 AM

Double Post

Edited by m0le, 29 May 2011 - 03:28 AM.

Posted Image
m0le is a proud member of UNITE

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:07:05 AM

Posted 02 June 2011 - 06:57 PM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users