Help! Virus disables anti-malware

June 18, 2009 at 01:02:30
Specs: Vista 32
Hi, I hope someone can help me.

I have a virus on my computer which seems to have disabled my anti-malware programs. I first noticed when I noticed symptoms of the "Google Redirect" virus, and tried to run Spybot S&D, but it just came up with the "Spybot has stopped working" error. I tried reinstalling and running, but I got the same error. I tried the same thing in safe mode, but it wouldn't run (not the same error, this time i double click on the .exe and nothing happens).

I tried downloading a few other programs, such as Hackthis, but the same thing happens to me! The problem seems to be getting worse, as I am now getting "Windows Explorer has stopped working" errors on bootup (both safe more and not).

I'm using a different computer to access this forum, because I don't want to make the problem worse.

Can anyone help me?


See More: Help! Virus disables anti-malware

Report •


#1
June 18, 2009 at 05:48:13
Download and run Kaspersky AVP tool in safe mode: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:
# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Attach Scan log/Summary to your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#2
June 18, 2009 at 06:09:54
I should mention that it has not got to the point that I can't start the computer in normal mode - I just get a popup saying that Windows Explorer is shutting down, and it doesn't start again.

I tried going to the Kaspersky AVP tool site in safe+networking mode, but the page won't load. Most pages like google, wikipedia etc load fine, just not this one. The link should work fine though, because I can see that it works with this computer.


Report •

#3
June 18, 2009 at 06:20:25
Transfer it via usb and leave usb attached to the infected computer while avp tool scans.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

Related Solutions

#4
June 18, 2009 at 23:32:17
Hi, I managed to get it on the computer in safe mode via USB, and ran the scan. It detected a whole lot of problems, which I told it to fix. I saved the report to a txt file, but its 185MB... Is there a certain part you need to see, or is there some other log I was meant to get?
It still won't work in normal mode by the way.

Here is the quick summary:

will be deleted when the computer is restarted: virus P2P-Worm.Win32.Palevo.ghc File: c:\recycler\s-1-5-21-5352160079-8145350143-592394693-1175\rundll32.exe
deleted: Trojan program Trojan.Win32.FraudPack.ovv File: c:\windows\temp\143942.tmp
deleted: Trojan program Trojan.Win32.Monderb.vut File: C:\Users\Admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\Report08cba3cd\Report.cab/xxyyaATK.dll.xor//PE-Crypt.XorPE
deleted: Trojan program Trojan.Win32.Monderb.vut File: C:\Users\Admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\Report08cba9e5\Report.cab/wvUlllIx.dll.xor//PE-Crypt.XorPE
deleted: virus P2P-Worm.Win32.Palevo.ghc File: C:\Users\Admin\AppData\Local\Temp\81729.exe
deleted: virus Virus.Win32.Fontra.c File: C:\Users\Admin\Downloads\_\q7q7q7q7q7q7q7q7xx.zip/Setup.exe
deleted: Trojan program Trojan-Downloader.Win32.Agent.afzg File: C:\Windows\System32\am2\TP6567IV.exe
deleted: Trojan program Trojan-Downloader.Win32.VB.hzp File: C:\Windows\System32\EV02\EV022328.exe
deleted: Trojan program Trojan-Downloader.Win32.VB.hzp File: C:\Windows\System32\EV13\EV131084.exe
deleted: adware not-a-virus:AdWare.Win32.WebHancer.f File: C:\Windows\System32\I2\CL65CON2.exe/whAgent.exe
deleted: adware not-a-virus:AdWare.Win32.WebHancer.390 File: C:\Windows\System32\I2\CL65CON2.exe/webhdll.dll
deleted: Trojan program Trojan-Downloader.Win32.Small.buy File: C:\Windows\System32\pci\PDI5MDi2.exe//UPX
deleted: Trojan program Trojan-Downloader.Win32.Small.jqv File: C:\Windows\Temp\144160.tmp
deleted: Trojan program Trojan.Win32.FraudPack.ovv File: C:\Windows\Temp\257524672.tmp
deleted: Trojan program Trojan-Downloader.Win32.Small.jqv File: C:\Windows\Temp\257524874.tmp
disinfected: virus Virus.Win32.Fontra.c File: C:\_\q7q7q7q7q7q7q7q7xx.zip/Setup.exe
disinfected: virus Virus.Win32.Fontra.c File: C:\_\q7q7q7q7q7q7q7q7xx.zip


Report •

#5
June 19, 2009 at 05:04:43

Report •

#6
June 19, 2009 at 06:37:01
I used the sfc scan function, and the situation seems to have improved. Windows explorer still failed on a normal startup, but I was able to restart it and actually access the desktop. Spybot, windows update etc. still won't work though - same errors as before. What next?

Report •

#7
June 19, 2009 at 06:39:53
Can you boot into normal mode? Open any program or internet works in normal mode?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#8
June 19, 2009 at 06:49:15
Yes, as I said above, windows explorer fails, but it is the standard "Windows Explorer has stopped running, do you want to restart it?" dialogue box. After restarting Windows explorer once, it seems to work fine. Before, Windows explorer wouldn't work at all, and I couldn't reach the desktop.

Report •

#9
June 19, 2009 at 06:51:25
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again. Make sure you have your web browser open in background before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteStdScr(3);
RebootWindows(true);
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#10
June 19, 2009 at 07:12:31
The link wouldn't work, so I used USB to get it on the computer. I ran the script and the computer reboot, but it seems to be stuck booting up. Its stuck on the black screen with the flashing cursor, and there is a small line of random characters there too.
Confusing?

Report •

#11
June 19, 2009 at 07:14:26
Try to perform above steps in safe mode.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#12
June 19, 2009 at 07:41:42
I managed to boot in safe mode, and the logs had been created from the time I ran it in normal mode - I hope they are complete. Again, I had to use USB for DDS, but it worked fine.

http://rapidshare.com/files/2463028...

http://rapidshare.com/files/2463030...

http://rapidshare.com/files/2463031...

Thanks!


Report •

#13
June 19, 2009 at 08:06:52
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 DelBHO('{B4FA75B0-45B6-4E17-AAEE-F25A057E6230}');
 DelBHO('{534634FA-5187-4D0C-BB3B-E3B69E3C4C3C}');
 QuarantineFile('C:\RECYCLER\S-1-5-21-5352160079-8145350143-592394693-1175\rundll32.exe,explorer.exe','');
 QuarantineFile('C:\RECYCLER\S-1-5-21-5352160079-8145350143-592394693-1175\rundll32.exe','');
 QuarantineFile('C:\Windows\temp\143942.tmp','');
 DeleteFile('C:\Windows\temp\143942.tmp');
 DeleteFile('C:\RECYCLER\S-1-5-21-5352160079-8145350143-592394693-1175\rundll32.exe');
 DeleteFile('C:\RECYCLER\S-1-5-21-5352160079-8145350143-592394693-1175\rundll32.exe,explorer.exe');
 DeleteFile('C:\windows\tasks\{5B57CF47-0BFA-43c6-ACF9-3B3653DCADBA}.job');
BC_ImportDeletedList;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

2) After reboot execute following script in AVZ:

begin
CreateQurantineArchive('C:\quarantine1.zip');    
end.


A file called quarantine1.zip should be created in C:\.

3) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

Note: Perfom above steps in normal mode if you can't then perform them in safe mode.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#14
June 19, 2009 at 08:56:25
I was still having that startup problem where it freezes with the flashing cursor and the random characters. I found that if I hold down f8 to go to the 'select drive' dialogue, it bypasses this and starts up normally.

I ran the combofix, log is located here:

http://rapidshare.com/files/2463251...

For the first time, Windows explorer didn't crash on bootup!


Report •

#15
June 19, 2009 at 09:05:56
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) A file called quarantine.zip should be created in C:\. Then please zip up C:\qoobox\quarantine and upload it and C:\quarantine1.zip to a filehost such as http://rapidshare.com/ Then, Private Message me the Download links to the uploaded files.

2) Lastly, uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok. Or Start > run > type 123 /u > ok.

If I'm helping you and I don't reply within 24 hours send me a PM.

PS: you had rootkit on your system that was causing those crashes.


Report •

#16
June 19, 2009 at 10:32:24
Is your normal mode working now without any problems?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#17
June 19, 2009 at 20:13:26
Sorry, I had to go to bed before so I couldn't get back to you before (4am for me)

Yes, everything seems back to normal:

Bootup runs fine without the flashing cursor error.
Windows Explorer doesn't fail straight after bootup.
Spybot S&D and Windows Update work fine.
Google no longer re-directs.

It looks like everything is fixed, as I haven't had an error of any kind all day. Lets hope it stays this way!


Report •

#18
June 19, 2009 at 20:27:18
I suggest you run following aswell in order numbered:

1) Complete scan: http://onecare.live.com/site/en-Us/...

2) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

3) House cleaning. Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#19
June 20, 2009 at 18:14:51
Here are the logs. It looks like they found some stuff, is it serious?

Malwarebytes' Anti-Malware 1.38
Database version: 2314
Windows 6.0.6001 Service Pack 1

6/20/2009 11:37:16 PM
mbam-log-2009-06-20 (23-37-08).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 250374
Time elapsed: 41 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\_ (Backdoor.Bot) -> No action taken.

Files Infected:
c:\Windows\System32\MSINET.oca (Rogue.Trace) -> No action taken.
c:\_\q7q7q7q7q7q7q7q7xx.zip (Backdoor.Bot) -> No action taken.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 06/21/2009 at 00:40 AM

Application Version : 4.26.1004

Core Rules Database Version : 3949
Trace Rules Database Version: 1891

Scan type : Complete Scan
Total Scan Time : 00:53:13

Memory items scanned : 277
Memory threats detected : 0
Registry items scanned : 6984
Registry threats detected : 0
File items scanned : 40576
File threats detected : 4

Trojan.Agent/Gen-MSFake
C:\PROGRAM FILES\COMMON FILES\ADOBE\UPDATER\MSVCRT.DLL

Adware.Tracking Cookie
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@2o7[2].txt
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@msnportal.112.2o7[1].txt
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@msnservices.112.2o7[1].txt


Report •

#20
June 20, 2009 at 18:17:45
Nothing serious. Your malware free :). If you still have your original problem private message me.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#21
June 20, 2009 at 18:27:03
Awesome! Thanks for all your help!

Report •


Ask Question