I seem to have gotten a rather persistent virus. I have tried a number of different tools, but not with a positive outcome. This is beginning to get on my nerves, so any help is very welcome.
Symptoms:
Avast keeps giving me security warnings on 3 or 4 different infections every 4 or 5 minutes, even when not browsing. Below are the warnings from the last hour.
Also, the disc cleanup wizard tells me that there’s only 80 MB left on my system drive, when explorer’s status bar tells me that there’s 1800. I have no idea if this is a symptom of an infection.
My IE recently began trying to redirect me when opening. Spyware Doctor prevented this.
Avast Warning log from today.
7/2/2006 11:07:27 1151831247 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{EFF6DBBA-51B0-4F1C-84F1-A3334E1FC021}.exe” file.
02-07-2006 11:16:17 1151831777 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{7EB70D4A-995C-466E-8516-F74F891A39CC}.exe” file.
02-07-2006 11:16:21 1151831781 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{6C81AD27-D192-4976-A8F7-5BA7CF7E34C0}.exe” file.
02-07-2006 11:22:33 1151832153 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{082396FF-9562-45B2-8DDA-7B9BA1EF6307}.exe” file.
02-07-2006 11:22:58 1151832178 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{23351BFD-8C76-40CC-89C7-59785E28C0BB}.exe” file.
02-07-2006 11:23:07 1151832187 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{743DF37F-B4F0-400A-9D06-418AD4DAD394}.exe” file.
02-07-2006 11:29:43 1151832583 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{CCCFE177-51A1-46D0-BA24-FA4315B5A9DD}.exe” file.
02-07-2006 11:36:49 1151833009 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{128F5FCE-69FF-4221-81E2-BF8A19E164AC}.exe” file.
02-07-2006 11:36:55 1151833015 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{74D8E042-8D95-49AF-AF2A-279A934CB0EA}.exe” file.
02-07-2006 11:42:59 1151833379 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{0AF06AE1-B5F1-4EC4-AADA-226D794D581C}.exe” file.
02-07-2006 11:43:05 1151833385 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{3F2B2576-B90E-433E-9360-BA0E0E1ED4F8}.exe” file.
02-07-2006 11:43:10 1151833390 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{7D3AEAEB-33B6-4FE8-84A6-8B698E9F93CE}.exe” file.
02-07-2006 11:49:16 1151833756 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{CCE72BFC-4ABD-48B0-B3F1-4671C0E0F6BC}.exe” file.
02-07-2006 11:49:22 1151833762 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{E2EDFC0A-4AF6-467F-B377-8D11CA30A82A}.exe” file.
02-07-2006 11:49:26 1151833766 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{23D1C13F-69D6-4E93-AA48-61A25CD905E9}.exe” file.
02-07-2006 11:55:38 1151834138 Administrator 1940 Sign of “Win32:Small-EK [Trj]” has been found in “D:\WINDOWS\system32{66131BE3-33E4-4733-8FF8-3019001FEE78}.exe” file.
02-07-2006 11:55:40 1151834140 Administrator 1940 Sign of “Win32:Adan-094 [Adw]” has been found in “D:\WINDOWS\system32{33CF138D-E935-4906-835A-9C416D3287E5}.exe” file.
02-07-2006 11:55:47 1151834147 Administrator 1940 Sign of “Win32:Adan-078 [Adw]” has been found in “D:\WINDOWS\system32{1FDBE687-CE5F-455A-A564-B1277F2C49A5}.exe” file.
Below are earlier excerpts from the Avast warning log with other infections. The date is the latest occurrence. The nmber of occurrences is written in brackets.
29-06-2006 19:09:41 1151600981 Administrator 1840 Sign of “VBS:Malware [Gen]” has been found in “D:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-7bf78472-5fcb7126.zip\BlackBox.class” file. (7 occurrences)
29-06-2006 19:09:41 1151600981 Administrator 1840 Sign of “VBS:Malware [Gen]” has been found in “D:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-7bf78472-5fcb7126.zip\VerifierBug.class” file. (7 occurrences)
29-06-2006 19:09:41 1151600981 Administrator 1840 Sign of “VBS:Malware [Gen]” has been found in “D:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-7bf78472-5fcb7126.zip\Dummy.class” file. (7 occurrences)
29-06-2006 19:09:41 1151600981 Administrator 1840 Sign of “VBS:Malware [Gen]” has been found in “D:\Documents and Settings\Administrator\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\count.jar-7bf78472-5fcb7126.zip\Beyond.class” file. (7 occurrences)
29-06-2006 19:32:55 1151602375 Administrator 1840 Sign of “VBS:Malware [Gen]” has been found in “D:\Documents and Settings\Administrator\Local Settings\Temp_avast4_\unp9399892.tmp” file. (35 occurrences)
6/29/2006 23:44:55 1151617495 Administrator 1676 Sign of “Win32:Trojan-gen. {Other}” has been found in “D:\WINDOWS\system32{1EE07006-1399-4D99-9C61-25004B89454B}.exe” file. (1 occurrence)
29-06-2006 23:52:23 1151617943 Administrator 1676 Sign of “Win32:Small-TG [Trj]” has been found in “D:\WINDOWS\system32{B2541EC6-2A9C-45EA-A414-6CA4CE48C770}.exe” file. (1 occurrence)
I also tried a search with Spyware Doctor from PCtools. I has given me the most extensive results of a search. Log below.
Infection Name, Location, Risk
Radlight D:\Documents and Settings\Administrator\My Documents\my deliveries\cnet Medium
Radlight D:\Documents and Settings\Administrator\My Documents\my deliveries\cnet\MediaMonkey_Setup.exe Medium
Radlight D:\Documents and Settings\Administrator\My Documents\my deliveries\cnet\tmpcache Medium
Radlight D:\Documents and Settings\Administrator\My Documents\my deliveries\cnet\trillian-v0.74f.exe Medium
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Download Free Spyware Remover.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\NEW VIAGRA at Half Price!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\CHEAPEST VIAGRA ONLINE.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\Cialis at HALF PRICE!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\Fast Way To Loose Your Weight!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\Guaranteed low price at Pills…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\SOMA at Special LOW PRICE.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\Tramadol Special Offer!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Online Pharmacy\Try New VIAGRA! Works Faster and Longer!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Order CIALIS online without leaving home…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\PC protection in under 2 minutes!.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Spyware Uninstall High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Easy Detect and Uninstall Spyware…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Free Spyware Scanner…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Search & Destroy Annoying Adware…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Spyware Uninstall\Stop PopUps on your PC…url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\Stop PopUps On Your Computer.url High
Trojan.Qhosts D:\Documents and Settings\All Users\Favorites\VIAGRA at incredible low price. Bonus Pills!.url High
Trojan.Downloader.Domcom D:\WINDOWS\Downloaded Program Files\ipreg32.inf Medium
Web–Search D:\WINDOWS\Downloaded Program Files\webdlg32.inf Elevated
Trojan.Downloader.Ruins D:\WINDOWS\system32{1BFB5E27-CEEC-49B3-A5D0-C7A6BFA29820}.exe High
Trojan.Qhosts D:\WINDOWS\system32\filesafer23.exe High
Trojan.Downloader.Zlob.GEN HKCR\Media-Codec.Chl High
Trojan.Downloader.Zlob.GEN HKCR\Media-Codec.Chl## High
Trojan.Downloader.Zlob.GEN HKCR\Media-Codec.Chl\CLSID High
Trojan.Downloader.Zlob.GEN HKCR\Media-Codec.Chl\CLSID## High
KillAndClean HKCU\Software\KillAndClean High
KillAndClean HKCU\Software\KillAndClean## High
KillAndClean HKCU\Software\KillAndClean\FirstRun High
KillAndClean HKCU\Software\KillAndClean\FirstRun## High
KillAndClean HKCU\Software\KillAndClean\Options High
KillAndClean HKCU\Software\KillAndClean\Options## High
KillAndClean HKCU\Software\KillAndClean\Options##AutoScanOnStartup High
KillAndClean HKCU\Software\KillAndClean\Options##EnableMonitor High
KillAndClean HKCU\Software\KillAndClean\Options##StartWithWindows High
KillAndClean HKCU\Software\KillAndClean\Registration High
KillAndClean HKCU\Software\KillAndClean\Registration## High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779} High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}## High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}\iexplore High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}\iexplore## High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}\iexplore##Count High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}\iexplore##Time High
WareOut HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats{BF69DF00-2734-477F-8257-27CD04F88779}\iexplore##Type High
KillAndClean HKCU\Software\Microsoft\Windows\CurrentVersion\Run##KillAndClean High
Trojan.PWSteal.Lineage HKLM\Software\Microsoft\Windows\CurrentVersion\Run\BluetoothAuthenticationAgent High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls## High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##23plhps High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##32refaselif High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##eno High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##evif High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##gib_ogol High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##llun High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##mgcppp High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##repiwoh High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##ruof High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##swen High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##tesvaf High
Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Urls##xedocne High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces{2A931023-018B-4519-B266-3C6979202A7B}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces{38F27918-6607-4E4E-ABA3-062CCDF4A614}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces{40315872-64B5-452A-AE33-A8D9089EEAB7}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces{69AB0824-5B59-4AA7-87AC-17EB0E5C2571}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces{2A931023-018B-4519-B266-3C6979202A7B}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces{2DEF5570-D2D5-4174-9DB4-26FB1AE47E98}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces{38F27918-6607-4E4E-ABA3-062CCDF4A614}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces{40315872-64B5-452A-AE33-A8D9089EEAB7}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\ControlSet003\Services\Tcpip\Parameters\Interfaces{69AB0824-5B59-4AA7-87AC-17EB0E5C2571}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{2A931023-018B-4519-B266-3C6979202A7B}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{38F27918-6607-4E4E-ABA3-062CCDF4A614}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{40315872-64B5-452A-AE33-A8D9089EEAB7}##NameServer High
Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{69AB0824-5B59-4AA7-87AC-17EB0E5C2571}##NameServer High
Trojan.PWSteal.Lineage multiple High
Trojan.PWSteal.Lineage rundll32.exe bthprops.cpl,BluetoothAuthenticationAgent High
Logfile of HijackThis v1.99.1
Scan saved at 12:25:21, on 02-07-2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Well, it’s becoming hard…
Do you have a second Windows installation on D:, perhaps Vista?
Did you try disabling system restore, boot, scan again?
I’ll try to think but this one seems difficult…
Actually, it’s a perhaps and a yes. I had trouble updating windows, so I did a new install. Every time I boot my system, I get to choose from two identical windows XP’s. Of course, they are not identical, but the text doesn’t show that.
I did disable system restore at an early point in the process described. Can’t remember exactly where, tho…
If you have 2 windows installs on different partitions you can delete the one you don’t want (just the windows folder initially) then run msconfig - select the boot ini tab - then select check all boot paths. This will remove the second windows from your boot list. On reboot you will see the msconfig editor just check don’t show this again
Save it to your desktop and run it. Click Next, then Install, make sure “Run fixit” is checked and click Finish.
The fix will begin; follow the prompts. You will be asked to reboot your computer; please do so. Your system may take longer than usual to load; this is normal.
Please double-click Killbox.exe to run it.
Select Delete on Reboot
then Click on the All Files button.
Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy
Return to Killbox, go to the File menu, and choose Paste from Clipboard.
Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt. Click OK at any PendingFileRenameOperations prompt (and please let me know if you receive this message!).
Brilliant. It worked. Thank you so much for your help. I got rid of it in just over an hour, most of it being spent waiting for EWIDO to scan.
Killbox showed an PendingFileRenameOperations message: file deleted by external process. Can’t seem to find neither that nor the jcyak.exe using search tool in explorer and manual look-up.
Anyways, it appears that the virus har left the building. Thanx again, I am in your debt.
Looks like it worked. If you haven’t got spywareblaster from Javacool I’d get it, install it and update it it. It will keep most of the nasties off your system