Bobbyrae
Posts: 25 +0
I looked at other threads here regarding that virus and have followed some of the instructions and have outputs from various scanners...
First, I had to boot into safe mode with a console window, where I could get AVG antivirus to run. That found 8 infections:
Then I got back into Windows in a normal mode and was able to run MalwareBytes to find another infection:
Note that the full log files are attached and I am only dumping in the parts about infections.
Then I ran FSS, which didn't give any problems. And Then I finally ran ESET, which oddly did find 3 infections, but they were all in the same temp directory, so I have deleted the named files.
While the system seems to operating just as it did before, there is ONE NOTABLE exception, and that is that Windows Update does not work. It became clear because the problem started with that red shield down in the system tray telling me that I was "at risk", and I am still in that position, but only because update will not work.
I went into the registry and found that the service for WinUpdate had been removed, found the reg entry online and entered it back in there. I also added in some entries for LEGACY_WUAUSERV, but am still at a point where it will not run. I have improved things to the point where Windows THINKS update is set and will not complain, but the service will not actually start. I get the following message:
By bobbyrae at 2012-01-13
Now, I have checked and doubled-checked, and triple-checked the spelling of the strings in the registery and cannot see any problems, so I think there may be another entry that got messed up or perhaps another DLL is involved and got deleted?
Here's what I added:
First, I had to boot into safe mode with a console window, where I could get AVG antivirus to run. That found 8 infections:
Avira AntiVir Personal
Report file date: Thursday, January 12, 2012 19:52
Scanning for 3019400 virus strains and unwanted programs.
Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Save mode
Starting the file scan:
Begin scan in 'C:\'
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-49426e41
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-24461839
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-6bbb7397
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-74a2f8ff
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-1ad45421
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-6ecff47f
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\59\6b62f07b-6b424f34
[0] Archive type: ZIP
--> morale.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.AJ exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\60\5abff83c-1ebc27be
[0] Archive type: ZIP
--> xmltree/umbro.class
[DETECTION] Contains recognition pattern of the EXP/2010-0840.AW exploit
Begin scan in 'D:\'
Begin scan in 'E:\'
Report file date: Thursday, January 12, 2012 19:52
Scanning for 3019400 virus strains and unwanted programs.
Licensee : Avira AntiVir Personal - Free Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Save mode
Starting the file scan:
Begin scan in 'C:\'
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-49426e41
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-24461839
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-6bbb7397
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-74a2f8ff
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-1ad45421
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\3\2fb8ab03-6ecff47f
[DETECTION] Contains recognition pattern of the EXP/CVE-2010-4452.CE exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\59\6b62f07b-6b424f34
[0] Archive type: ZIP
--> morale.class
[DETECTION] Contains recognition pattern of the EXP/2011-3544.AJ exploit
C:\Documents and Settings\Rion\Application Data\Sun\Java\Deployment\cache\6.0\60\5abff83c-1ebc27be
[0] Archive type: ZIP
--> xmltree/umbro.class
[DETECTION] Contains recognition pattern of the EXP/2010-0840.AW exploit
Begin scan in 'D:\'
Begin scan in 'E:\'
Then I got back into Windows in a normal mode and was able to run MalwareBytes to find another infection:
Registry Values Detected: 1
HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Smad (Trojan.Agent) -> Data: "C:\Documents and Settings\Rion\Local Settings\Application Data\SanctionedMedia\Smad\Smad.exe" -> Quarantined and deleted successfully.
Registry Data Items Detected: 1
HKCR\.exe| (Hijacked.exeFile) -> Bad: (mdaw) Good: (exefile) -> Quarantined and repaired successfully.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Smad (Trojan.Agent) -> Data: "C:\Documents and Settings\Rion\Local Settings\Application Data\SanctionedMedia\Smad\Smad.exe" -> Quarantined and deleted successfully.
Registry Data Items Detected: 1
HKCR\.exe| (Hijacked.exeFile) -> Bad: (mdaw) Good: (exefile) -> Quarantined and repaired successfully.
Note that the full log files are attached and I am only dumping in the parts about infections.
Then I ran FSS, which didn't give any problems. And Then I finally ran ESET, which oddly did find 3 infections, but they were all in the same temp directory, so I have deleted the named files.
While the system seems to operating just as it did before, there is ONE NOTABLE exception, and that is that Windows Update does not work. It became clear because the problem started with that red shield down in the system tray telling me that I was "at risk", and I am still in that position, but only because update will not work.
I went into the registry and found that the service for WinUpdate had been removed, found the reg entry online and entered it back in there. I also added in some entries for LEGACY_WUAUSERV, but am still at a point where it will not run. I have improved things to the point where Windows THINKS update is set and will not complain, but the service will not actually start. I get the following message:

By bobbyrae at 2012-01-13
Now, I have checked and doubled-checked, and triple-checked the spelling of the strings in the registery and cannot see any problems, so I think there may be another entry that got messed up or perhaps another DLL is involved and got deleted?
Here's what I added:
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 11:08 AM
Value 0
Name: DisplayName
Type: REG_SZ
Data: Automatic Update Service
Value 1
Name: ImagePath
Type: REG_EXPAND_SZ
Data: %SystemRoot%\System32\svchost.exe -k netsvcs
Value 2
Name: Description
Type: REG_SZ
Data: Retreives Updates From Microsoft Automatically as needed
Value 3
Name: ObjectName
Type: REG_SZ
Data: LocalSystem
Value 4
Name: ErrorControl
Type: REG_DWORD
Data: 0x1
Value 5
Name: Start
Type: REG_DWORD
Data: 0x2
Value 6
Name: Type
Type: REG_DWORD
Data: 0x20
Value 7
Name: RT_ServiceSidType
Type: REG_DWORD
Data: 0x1
Value 8
Name: PreshutdownTimeout
Type: REG_DWORD
Data: 0x36ee80
Value 9
Name: DelayedAutoStart
Type: REG_DWORD
Data: 0x1
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 8:42 AM
Value 0
Name: ServiceDll
Type: REG_SZ
Data: %SYSTEMROOT%\system32\wuauserv.dll
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 6:21 AM
Value 0
Name: Security
Type: REG_BINARY
Data:
00000000 01 00 14 80 90 00 00 00 - 9c 00 00 00 14 00 00 00 ................
.....
000000a0 00 00 00 05 12 00 00 00 - ........
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Enum
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 11:08 AM
Value 0
Name: 0
Type: REG_SZ
Data: Root\LEGACY_WUAUSERV\0000
Value 1
Name: Count
Type: REG_DWORD
Data: 0x1
Value 2
Name: NextInstance
Type: REG_DWORD
Data: 0x1
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 11:08 AM
Value 0
Name: DisplayName
Type: REG_SZ
Data: Automatic Update Service
Value 1
Name: ImagePath
Type: REG_EXPAND_SZ
Data: %SystemRoot%\System32\svchost.exe -k netsvcs
Value 2
Name: Description
Type: REG_SZ
Data: Retreives Updates From Microsoft Automatically as needed
Value 3
Name: ObjectName
Type: REG_SZ
Data: LocalSystem
Value 4
Name: ErrorControl
Type: REG_DWORD
Data: 0x1
Value 5
Name: Start
Type: REG_DWORD
Data: 0x2
Value 6
Name: Type
Type: REG_DWORD
Data: 0x20
Value 7
Name: RT_ServiceSidType
Type: REG_DWORD
Data: 0x1
Value 8
Name: PreshutdownTimeout
Type: REG_DWORD
Data: 0x36ee80
Value 9
Name: DelayedAutoStart
Type: REG_DWORD
Data: 0x1
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 8:42 AM
Value 0
Name: ServiceDll
Type: REG_SZ
Data: %SYSTEMROOT%\system32\wuauserv.dll
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 6:21 AM
Value 0
Name: Security
Type: REG_BINARY
Data:
00000000 01 00 14 80 90 00 00 00 - 9c 00 00 00 14 00 00 00 ................
.....
000000a0 00 00 00 05 12 00 00 00 - ........
Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Enum
Class Name: <NO CLASS>
Last Write Time: 1/13/2012 - 11:08 AM
Value 0
Name: 0
Type: REG_SZ
Data: Root\LEGACY_WUAUSERV\0000
Value 1
Name: Count
Type: REG_DWORD
Data: 0x1
Value 2
Name: NextInstance
Type: REG_DWORD
Data: 0x1