Computer infected with malware, can't follow 8 steps

Status
Not open for further replies.
Hi,

My computer has been infected with malware for a couple days now. It seems to be getting worse after every reboot, so I don't know how much time I have left before I can't access Windows or my files anymore. I scoured the net for solutions and stumbled onto this site. Followed the 8-step guide, or tried to rather, to the letter. If anyone can help me out, it'd be greatly appreciated cause I'm clueless as to what to do now and this is my last resort (I really don't like bothering others with my problems). Thanks in advance for any help you can give.

My system (from what I remember, can't access info):
Intel P4, 2.0 gHz, 512mb RAM
Windows XP Pro (2002 Version), SP3 installed
Sharing internet access with another computer through a router

Initial problem: I was surfing the web a couple nights ago when some malware was downloaded to my computer without my permission, something called AVCare? Firefox windows would open randomly sending me to random pay sites. Google searches would send me to random sites as well. Scrollbars on browser windows would extend way right and down for no apparent reason. Spybot wouldn't load when double-clicked, Ad-aware or AVG Free didn't find anything. I deleted AVCare from the add/remove programs in the control pannel, but my system was still screwed up.

Followed Step 1: Ran Trend Micro HouseCall, found a few things, trojans among others, removed them. Deleted AVG, downloaded and installed Avira Free, found near 200 items, quarantined them. Can't attach log, or include it in this post (too long). Here's what was found:

TR/FraudPack.qax.30 Trojan
HTML/Infected.WebPage.Gen HTML script virus
HTML/IFrame.13197 HTML script virus
HEUR/HTML.Malware suspicious code
EXP/ASF.GetCodec.Gen exploit
TR/Click.VBiframe.XI Trojan
TR/Crypt.PEPM.Gen Trojan
TR/Dldr.FraudLoad.fbs.2 Trojan
HTML/Malicious.PDF.Gen HTML script virus
TR/FraudPack.qav Trojan
TR/Dropper.Gen Trojan
TR/Crypt.ASPM.Gen Trojan

And the summary:

15891 Scanned directories
538352 Files were scanned
181 Viruses and/or unwanted programs were found
3 Files were classified as suspicious
1 files were deleted
0 Viruses and unwanted programs were repaired
182 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
538166 Files not concerned
3371 Archives were scanned
25 Warnings
184 Notes
31783 Objects were scanned with rootkit scan
11 Hidden objects were found

Can get more info on request.

Followed Step 2: Downloaded and ran CCleaner twice with all boxes ticked except that 1. After a reboot, this is where Windows started getting really weird. System tray had no icons except volume icon, desktop background was gone (even though default "Bliss" was selected), size of title and scroll bars in windows smaller than usual, etc.

Followed Steps 3 and 4: No problem.

Step 5: Downloaded Malwarebytes' app, couldn't install it. Followed the guide on this forum to get around it (can't link it, need 5 posts) and was able to install in safe mode, but couldn't run it after. Still can't run it in normal mode. I double-click the icon and nothing happens.

I can't go any further because Firefox or IE won't load anymore when their icons are double-clicked. Maybe I can get them to work in safe mode. Colors in Windows are off now as well. Did a reboot at one point and the logon screen asked me for a password (never had one). Entered admin password and got this message: "The system cannot find message text for message number 0x%1 in the message file for %2." Did another reboot and luckily got into Windows. Running another scan with Avira now. A few more trojans showing up.

If I can do anything to remedy this, please let me know. Thanks again.

Glandith

UPDATE: Downloaded SAS and HJT on an older computer and transferred it using my USB drive. When I try to run SAS, I get an error message with an option to report. Double-clicking on HJT doesn't do anything.

UPDATE: I was able to run Malwarebytes' app by renaming the executable file to bob.exe. When I click 'remove selected', the following comes up:
Run-time error '48':

File not found: wininet
Followed by:
Run-time error '0'
Followed by:
The exception Floating-point inexact result.
(0xc000008f) occured in the application at location 0x7c812afb.

Click on OK to terminate the program.
Anyway, here's the log from the results page:
Malwarebytes' Anti-Malware 1.40
Database version: 2548
Windows 5.1.2600 Service Pack 3

8/10/2009 8:44:40 PM
Malwarebytes-log1

Scan type: Full Scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 273764
Time elapsed: 34 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 10
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\Typelib\{e24211b3-a78a-c6a9-d317-70979ace5058} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Monopod (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\NordBull (Malware.Trace) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\msa.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\msb.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job (Trojan.Downloader) -> No action taken.
C:\WINDOWS\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job (Trojan.Downloader) -> No action taken.
 
Managed to get SAS installed by renaming the setup file and running the 'Alternate Start' executable. Here's the log:
SUPERAntiSpyware Scan Log

Generated 08/10/2009 at 10:05 PM

Application Version : 4.27.1002

Core Rules Database Version : 4040
Trace Rules Database Version: 1980

Scan type : Complete Scan
Total Scan Time : 01:10:09

Memory items scanned : 336
Memory threats detected : 0
Registry items scanned : 6859
Registry threats detected : 185
File items scanned : 27501
File threats detected : 3

Rootkit.Agent/Gen
HKLM\SOFTWARE\UAC
HKLM\SOFTWARE\UAC#EPROCESS_LEOffset
HKLM\SOFTWARE\UAC#EPROCESS_NameOffset
HKLM\SOFTWARE\UAC#affid
HKLM\SOFTWARE\UAC#type
HKLM\SOFTWARE\UAC#build
HKLM\SOFTWARE\UAC#subid
HKLM\SOFTWARE\UAC#cmddelay
HKLM\SOFTWARE\UAC#ecaab67d-7d92-4ec1-ac32-3087345120a3
HKLM\SOFTWARE\UAC#val
HKLM\SOFTWARE\UAC#sval
HKLM\SOFTWARE\UAC#pval
HKLM\SOFTWARE\UAC\connections
HKLM\SOFTWARE\UAC\connections#905b3008
HKLM\SOFTWARE\UAC\connections#20d04c0a
HKLM\SOFTWARE\UAC\connections#f2065612
HKLM\SOFTWARE\UAC\connections#7d72e91c
HKLM\SOFTWARE\UAC\disallowed
HKLM\SOFTWARE\UAC\disallowed#trsetup.exe
HKLM\SOFTWARE\UAC\disallowed#ViewpointService.exe
HKLM\SOFTWARE\UAC\disallowed#ViewMgr.exe
HKLM\SOFTWARE\UAC\disallowed#SpySweeper.exe
HKLM\SOFTWARE\UAC\disallowed#SUPERAntiSpyware.exe
HKLM\SOFTWARE\UAC\disallowed#SpySub.exe
HKLM\SOFTWARE\UAC\disallowed#SpywareTerminatorShield.exe
HKLM\SOFTWARE\UAC\disallowed#SpyHunter3.exe
HKLM\SOFTWARE\UAC\disallowed#XoftSpy.exe
HKLM\SOFTWARE\UAC\disallowed#SpyEraser.exe
HKLM\SOFTWARE\UAC\disallowed#combofix.exe
HKLM\SOFTWARE\UAC\disallowed#otscanit.exe
HKLM\SOFTWARE\UAC\disallowed#mbam.exe
HKLM\SOFTWARE\UAC\disallowed#mbam-setup.exe
HKLM\SOFTWARE\UAC\disallowed#flash_disinfector.exe
HKLM\SOFTWARE\UAC\disallowed#otmoveit2.exe
HKLM\SOFTWARE\UAC\disallowed#smitfraudfix.exe
HKLM\SOFTWARE\UAC\disallowed#prevxcsifree.exe
HKLM\SOFTWARE\UAC\disallowed#download_mbam-setup.exe
HKLM\SOFTWARE\UAC\disallowed#cbo_setup.exe
HKLM\SOFTWARE\UAC\disallowed#spywareblastersetup.exe
HKLM\SOFTWARE\UAC\disallowed#rminstall.exe
HKLM\SOFTWARE\UAC\disallowed#sdsetup.exe
HKLM\SOFTWARE\UAC\disallowed#vundofixsvc.exe
HKLM\SOFTWARE\UAC\disallowed#daft.exe
HKLM\SOFTWARE\UAC\disallowed#gmer.exe
HKLM\SOFTWARE\UAC\disallowed#catchme.exe
HKLM\SOFTWARE\UAC\disallowed#mcpr.exe
HKLM\SOFTWARE\UAC\disallowed#sdfix.exe
HKLM\SOFTWARE\UAC\disallowed#hjtinstall.exe
HKLM\SOFTWARE\UAC\disallowed#fixpolicies.exe
HKLM\SOFTWARE\UAC\disallowed#emergencyutil.exe
HKLM\SOFTWARE\UAC\disallowed#techweb.exe
HKLM\SOFTWARE\UAC\disallowed#GoogleUpdate.exe
HKLM\SOFTWARE\UAC\disallowed#windowsdefender.exe
HKLM\SOFTWARE\UAC\disallowed#spybotsd.exe
HKLM\SOFTWARE\UAC\disallowed#winlognn.exe
HKLM\SOFTWARE\UAC\disallowed#csrssc.exe
HKLM\SOFTWARE\UAC\disallowed#klif.sys
HKLM\SOFTWARE\UAC\disallowed#pctssvc.sys
HKLM\SOFTWARE\UAC\disallowed#pctcore.sys
HKLM\SOFTWARE\UAC\disallowed#mchinjdrv.sys
HKLM\SOFTWARE\UAC\disallowed#szkg.sys
HKLM\SOFTWARE\UAC\disallowed#sasdifsv.sys
HKLM\SOFTWARE\UAC\disallowed#saskutil.sys
HKLM\SOFTWARE\UAC\disallowed#sasenum.sys
HKLM\SOFTWARE\UAC\disallowed#ccHPx86.sys
HKLM\SOFTWARE\UAC\injector
HKLM\SOFTWARE\UAC\injector#*
HKLM\SOFTWARE\UAC\mask
HKLM\SOFTWARE\UAC\mask#49772768
HKLM\SOFTWARE\UAC\mask#d3036adf
HKLM\SOFTWARE\UAC\mask#dd118673
HKLM\SOFTWARE\UAC\versions
HKLM\SOFTWARE\UAC\versions#/banner/crcmds/init

Trojan.Agent/Gen
HKU\.DEFAULT\SOFTWARE\XML
HKU\.DEFAULT\SOFTWARE\XML#str132
HKU\.DEFAULT\SOFTWARE\XML#dig15
HKU\.DEFAULT\SOFTWARE\XML#dig4
HKU\.DEFAULT\SOFTWARE\XML#dig5
HKU\.DEFAULT\SOFTWARE\XML#dig20
HKU\.DEFAULT\SOFTWARE\XML#dig25
HKU\.DEFAULT\SOFTWARE\XML#dig30
HKU\.DEFAULT\SOFTWARE\XML#dig31
HKU\.DEFAULT\SOFTWARE\XML#dig36
HKU\.DEFAULT\SOFTWARE\XML#dig10
HKU\.DEFAULT\SOFTWARE\XML#str6
HKU\.DEFAULT\SOFTWARE\XML#str7
HKU\.DEFAULT\SOFTWARE\XML#str8
HKU\.DEFAULT\SOFTWARE\XML#str9
HKU\.DEFAULT\SOFTWARE\XML#str10
HKU\.DEFAULT\SOFTWARE\XML#str13
HKU\.DEFAULT\SOFTWARE\XML#str1
HKU\.DEFAULT\SOFTWARE\XML#str2
HKU\.DEFAULT\SOFTWARE\XML#str5
HKU\.DEFAULT\SOFTWARE\XML#dig7
HKU\.DEFAULT\SOFTWARE\XML#dig8
HKU\.DEFAULT\SOFTWARE\XML#dig6
HKU\.DEFAULT\SOFTWARE\XML#str16
HKU\.DEFAULT\SOFTWARE\XML#str17
HKU\.DEFAULT\SOFTWARE\XML#str19
HKU\.DEFAULT\SOFTWARE\XML#dig18
HKU\.DEFAULT\SOFTWARE\XML#dig17
HKU\.DEFAULT\SOFTWARE\XML#str22
HKU\.DEFAULT\SOFTWARE\XML#str23
HKU\.DEFAULT\SOFTWARE\XML#str25
HKU\.DEFAULT\SOFTWARE\XML#str26
HKU\.DEFAULT\SOFTWARE\XML#dig24
HKU\.DEFAULT\SOFTWARE\XML#dig23
HKU\.DEFAULT\SOFTWARE\XML#str130
HKU\.DEFAULT\SOFTWARE\XML#str28
HKU\.DEFAULT\SOFTWARE\XML#str29
HKU\.DEFAULT\SOFTWARE\XML#str31
HKU\.DEFAULT\SOFTWARE\XML#dig29
HKU\.DEFAULT\SOFTWARE\XML#dig27
HKU\.DEFAULT\SOFTWARE\XML#str131
HKU\.DEFAULT\SOFTWARE\XML#dig35
HKU\.DEFAULT\SOFTWARE\XML#dig37
HKU\.DEFAULT\SOFTWARE\XML#str35
HKU\.DEFAULT\SOFTWARE\XML#str36
HKU\.DEFAULT\SOFTWARE\XML#str38
HKU\.DEFAULT\SOFTWARE\XML#str34
HKU\.DEFAULT\SOFTWARE\XML#str15
HKU\.DEFAULT\SOFTWARE\XML#str128
HKU\.DEFAULT\SOFTWARE\XML#str129
HKU\.DEFAULT\SOFTWARE\XML#dig3
HKU\.DEFAULT\SOFTWARE\XML#str0
HKU\.DEFAULT\SOFTWARE\XML#str14
HKU\.DEFAULT\SOFTWARE\XML#dig21
HKU\.DEFAULT\SOFTWARE\XML#dig19
HKU\.DEFAULT\SOFTWARE\XML#dig13
HKU\S-1-5-18\SOFTWARE\XML
HKU\S-1-5-18\SOFTWARE\XML#str132
HKU\S-1-5-18\SOFTWARE\XML#dig15
HKU\S-1-5-18\SOFTWARE\XML#dig4
HKU\S-1-5-18\SOFTWARE\XML#dig5
HKU\S-1-5-18\SOFTWARE\XML#dig20
HKU\S-1-5-18\SOFTWARE\XML#dig25
HKU\S-1-5-18\SOFTWARE\XML#dig30
HKU\S-1-5-18\SOFTWARE\XML#dig31
HKU\S-1-5-18\SOFTWARE\XML#dig36
HKU\S-1-5-18\SOFTWARE\XML#dig10
HKU\S-1-5-18\SOFTWARE\XML#str6
HKU\S-1-5-18\SOFTWARE\XML#str7
HKU\S-1-5-18\SOFTWARE\XML#str8
HKU\S-1-5-18\SOFTWARE\XML#str9
HKU\S-1-5-18\SOFTWARE\XML#str10
HKU\S-1-5-18\SOFTWARE\XML#str13
HKU\S-1-5-18\SOFTWARE\XML#str1
HKU\S-1-5-18\SOFTWARE\XML#str2
HKU\S-1-5-18\SOFTWARE\XML#str5
HKU\S-1-5-18\SOFTWARE\XML#dig7
HKU\S-1-5-18\SOFTWARE\XML#dig8
HKU\S-1-5-18\SOFTWARE\XML#dig6
HKU\S-1-5-18\SOFTWARE\XML#str16
HKU\S-1-5-18\SOFTWARE\XML#str17
HKU\S-1-5-18\SOFTWARE\XML#str19
HKU\S-1-5-18\SOFTWARE\XML#dig18
HKU\S-1-5-18\SOFTWARE\XML#dig17
HKU\S-1-5-18\SOFTWARE\XML#str22
HKU\S-1-5-18\SOFTWARE\XML#str23
HKU\S-1-5-18\SOFTWARE\XML#str25
HKU\S-1-5-18\SOFTWARE\XML#str26
HKU\S-1-5-18\SOFTWARE\XML#dig24
HKU\S-1-5-18\SOFTWARE\XML#dig23
HKU\S-1-5-18\SOFTWARE\XML#str130
HKU\S-1-5-18\SOFTWARE\XML#str28
HKU\S-1-5-18\SOFTWARE\XML#str29
HKU\S-1-5-18\SOFTWARE\XML#str31
HKU\S-1-5-18\SOFTWARE\XML#dig29
HKU\S-1-5-18\SOFTWARE\XML#dig27
HKU\S-1-5-18\SOFTWARE\XML#str131
HKU\S-1-5-18\SOFTWARE\XML#dig35
HKU\S-1-5-18\SOFTWARE\XML#dig37
HKU\S-1-5-18\SOFTWARE\XML#str35
HKU\S-1-5-18\SOFTWARE\XML#str36
HKU\S-1-5-18\SOFTWARE\XML#str38
HKU\S-1-5-18\SOFTWARE\XML#str34
HKU\S-1-5-18\SOFTWARE\XML#str15
HKU\S-1-5-18\SOFTWARE\XML#str128
HKU\S-1-5-18\SOFTWARE\XML#str129
HKU\S-1-5-18\SOFTWARE\XML#dig3
HKU\S-1-5-18\SOFTWARE\XML#str0
HKU\S-1-5-18\SOFTWARE\XML#str14
HKU\S-1-5-18\SOFTWARE\XML#dig21
HKU\S-1-5-18\SOFTWARE\XML#dig19
HKU\S-1-5-18\SOFTWARE\XML#dig13
C:\WINDOWS\SYSTEM32\DRIVERS\UTQZNDI4.SYS

Trojan.Dropper/Win-NV
C:\WINDOWS\MSA.EXE
C:\WINDOWS\MSB.EXE
Then decided to run Malwarebytes' app again for the hell of it. It generated a log this time.
Malwarebytes' Anti-Malware 1.40
Database version: 2548
Windows 5.1.2600 Service Pack 3

8/10/2009 11:19:04 PM
mbam-log-2009-08-10 (23-18-55).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|G:\|)
Objects scanned: 273975
Time elapsed: 33 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 8
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_CLASSES_ROOT\Typelib\{e24211b3-a78a-c6a9-d317-70979ace5058} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Monopod (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\NordBull (Malware.Trace) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: ("regedit.exe" "%1") Good: (regedit.exe "%1") -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job (Trojan.Downloader) -> No action taken.
C:\WINDOWS\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job (Trojan.Downloader) -> No action taken.
 
Hi Glandith, I suggestion to try and make Malwarebytes to run is try editing the name of the EXE at which it runs from(in the root folder you installed too, default "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe") Rename the mbam.exe to anything, just name it TEST or something.

As there was probably a registry key added somewhere that stops certain programs (like malwarebytes) from running. I had this problem awhile back and you can either dig for the registry or change the .exe Only bonus to deleting the registry key instead of just renaming the EXE, is that it will stop future programs from not running if malwarebytes can not fix this issue.

Hope this helps, and any other programs that will not run, just rename the file... Just renaming the shortcut on the desktop will not do anything as it runs off the root file, renaming your downloaded file works as it is the only file it is running from. Keep me posted.
 
"AVCare" is a spyware which typically should have been removed by Super AntiSyware. I guess this is why 3 anti-spware programs are recommended to run on a PC. Try running another spware program available from the downloads section,https://www.techspot.com/downloadid25by4.html .
MalwareBytes could also remove it, the only problem is that your logs show "no action taken" on every line. You should try running the MalwareBytes scan again (before downloading another program) and select to automatically fix issues. ;)
 
Status
Not open for further replies.
Back