can't remove identified virus with any tools

June 13, 2009 at 19:16:05
Specs: Windows XP
My McAfee first found some viruses but couldn't remove them, it would fix some but the others it said i needed to reboot for them to be removed. That never worked with McAfee. I've since done the same thing with Malwarebytes with the same result. It identifies as fixes some of them but also cannot fix these same 5 items until reboot.

With both scanners i've run them and rebooted them in Safe Mode as well as regular to no avail.

I've used ATF Cleaner with no change in the number of threats.

I'm currently running Kaspersky to see if it can find any other culprits other than these five i can't get rid of.

I have many many logs to show all my lack of success.

p.s. McAfee said they'de fix my problem for $95...not sure why i paid to buy their stuff in the first place...i wonder who really puts these viruses out (to be cleaned for fees or purchase of virus software)...just thinking out loud

please help

See More: cant remove identified virus with any tools

Report •

June 13, 2009 at 19:20:59
Post your malwarebytes, mcafee and kaspersky logs which show detected objects.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

June 13, 2009 at 20:00:58
Here's the last log from Malwarebyte's...i have five of these in the last 24 horus...i can't seem to copy the McAfee logs

Malwarebytes' Anti-Malware 1.37
Database version: 2270
Windows 5.1.2600 Service Pack 3

6/13/2009 6:37:38 PM
mbam-log-2009-06-13 (18-37-38).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 209057
Time elapsed: 38 minute(s), 19 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 7
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\rsocrdkj.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\lyaghtu.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7b85d184-1e4a-43f7-96a9-83a5a5ba7f85} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\vuwefohs (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{7b85d184-1e4a-43f7-96a9-83a5a5ba7f85} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{01dc3890-1eb7-4f6e-94be-fd9fe75a791c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{01dc3890-1eb7-4f6e-94be-fd9fe75a791c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\xacdtclk (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xacdtclk (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\lyaghtu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\rsocrdkj.dll (Trojan.Vundo.H) -> Delete on reboot.
c:\WINDOWS\system32\hfcsakk.dll (Trojan.Vundo.H) -> Delete on reboot.

Report •

June 13, 2009 at 20:33:21
Post kaspersky log. Do you want to remove it manually?

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

Related Solutions

June 13, 2009 at 22:01:50
this was just a QUICK SCAN...that took two the results are slightly skewd as not all files were reviewed...i'm running ESET right now and can post the results of that full scan


Saturday, June 13, 2009
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version:
Program database last update: Sunday, June 14, 2009 01:50:05
Records in database: 2340883

Scan settings
Scan using the following database extended
Scan archives yes
Scan mail databases yes

Scan area Critical Areas
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
C:\Documents and Settings\Laura\Start Menu\Programs\Startup
C:\Program Files

Scan statistics
Files scanned 67006
Threat name 1
Infected objects 3
Suspicious objects 0
Duration of the scan 02:10:58

File name Threat name Threats count
C:\WINDOWS\system32\rsocrdkj.dll/C:\WINDOWS\system32\rsocrdkj.dll Infected: Trojan-Clicker.Win32.Delf.cbe 2

C:\WINDOWS\system32\rsocrdkj.dll Infected: Trojan-Clicker.Win32.Delf.cbe 1

The selected area was scanned.

Report •

June 13, 2009 at 22:03:50
RE: "do you want to remove it manually"...i don't care

i've tried deleting the files manually, in safe mode at command prompt with no sucess as it always comes back access denied

i'll take them out any way i can

Report •

June 14, 2009 at 06:29:02
Note: I can help you remove virus manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the logfile, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called inside. Upload that file to and paste the link here.

Image Tutorial

2) Can you also make a new HijackThis log and upload it to HijackThis: Here

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

June 14, 2009 at 09:42:12
Here is the AVZ link for the log
MD5: 072F0E97C244136FE6BB6B5078FF2DE5

Report •

June 14, 2009 at 09:47:43
Here is the Hijack This log file
MD5: 4E4EA17F5095FA7C764C857E42B7C7D7

Report •

June 14, 2009 at 10:11:26
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

SearchRootkit(true, true);

2) After reboot execute following script in AVZ:


A file called should be created in C:\.

3) Attach a Combofix log, please review and follow these instructions carefully.

Download it here ->

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs ( Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to and paste the link here.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

June 14, 2009 at 11:57:25
Here is the Complex log
MD5: 3552D91565D3CCF41F097E3A13F27613

Report •

June 14, 2009 at 12:02:25
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Run this script in AVZ:


2) A file called should be created in C:\. Then please zip up C:\qoobox\quarantine and upload it, C:\ and C:\ to a filehost such as Then, Private Message me the Download links to the uploaded files.

3) Lastly, uninstall Combofix by: pause Antivirus/Sypware programs ( Programs to disable) > Start > run > type combofix /u > ok. Or Start > run > type 123 /u > ok.

If I'm helping you and I don't reply within 24 hours send me a PM.

Report •

Ask Question