1.

Solve : Have Virus or trojan need help.?

Answer»

I have spent the last several days trying to fix this and have even reinstalled windows but the problem is recurring.  It originally was the windows police pro virus but it seems to be worse.  Can anybody please help.  I will paste my LOGS below.

Also, when I first got the virus there were three porntube and nudetube icons that would appear on the desktop.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 10/06/2009 at 03:16 PM

Application Version : 4.26.1004

Core Rules Database Version : 3910
Trace Rules Database Version: 1854

Scan type       : Custom Scan
Total Scan Time : 02:00:54

Memory items scanned      : 490
Memory threats detected   : 0
Registry items scanned    : 5553
Registry threats detected : 0
File items scanned        : 262144
File threats detected     : 81

Adware.Tracking Cookie
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][2].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim\Cookies\[email protected][1].txt
   C:\Documents and Settings\Tim Brooks\Cookies\tim [email protected][2].txt
   C:\Documents and Settings\Tim Brooks\Cookies\tim [email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][3].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][3].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][4].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][3].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][3].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][4].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][2].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][8].txt
   C:\Program Files\Documents and Settings\Tim Brooks\Cookies\[email protected][9].txt
   C:\Program Files\Tim windows stuff\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Tim windows stuff\Tim Brooks\Cookies\[email protected][1].txt
   C:\Program Files\Tim windows stuff\Tim Brooks\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][3].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][2].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt
   C:\WINDOWS\system32\config\systemprofile\Cookies\[email protected][1].txt

Unclassified.Unknown Origin
   C:\DOCUMENTS AND SETTINGS\TIM\MY DOCUMENTS\TORRENT DOWNLOADS\CUCUSOFT MPEG MOV RM VB DIV XAVI TO DVD VCD SVCD CONVERTER PRO 7.07\KEYGEN.NFO

Trojan.Dropper/Gen
   C:\PROGRAM FILES\DOCUMENTS AND SETTINGS\TIM BROOKS\LOCAL SETTINGS\TEMP\~.EXE

Trojan.Dropper/SVCHost-Fake
   C:\PROGRAM FILES\TIM WINDOWS STUFF\TIM BROOKS\LOCAL SETTINGS\TEMP\SVCHOST.EXE

Trojan.Agent/Gen-NumTemp
   C:\WINDOWS\SYSTEM32\9.TMP


Malwarebytes' Anti-Malware 1.41
Database version: 2910
Windows 5.1.2600 Service Pack 2

10/6/2009 4:19:13 PM
mbam-log-2009-10-06 (16-19-13).txt

Scan type: Quick Scan
Objects scanned: 162852
Time ELAPSED: 4 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 6
Registry Values Infected: 6
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\WINDOWS\system32\BtwSrv32.dll (Backdoor.Bot) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BtwSrv (Trojan.Agent) -> QUARANTINED and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_BTWSRV (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NetLogin (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\isasdk (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\btwsrv (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\btwsrv (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udfa (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mfa (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\scrfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (NOTEPAD.EXE %1) Good: ("%1" /S) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\regfile\shell\open\command\(default) (Broken.OpenCommand) -> Bad: (NOTEPAD.EXE %1) Good: (regedit.exe "%1") -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\9.tmp (Trojan.Banker) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\isasdk.sys (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService.NT AUTHORITY.000\Local Settings\Temporary Internet Files\Content.IE5\BRC50AH0\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService.NT AUTHORITY.000\Local Settings\Temporary Internet Files\Content.IE5\E00BW7U3\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Documents and Settings\Tim\Local Settings\Temporary Internet Files\Content.IE5\772GOXBO\ssv[1].txt (Trojan.Banker) -> Quarantined and deleted successfully.
C:\WINDOWS\sv3.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\isvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\7.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\8.tmp (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\certstore.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\BtwSrv32.dll (Backdoor.Bot) -> Delete on reboot.


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:33:28 PM, on 10/6/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\FastNetSrv.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\Program Files\iolo\common\lib\ioloServiceManager.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\PowerISO\PWRISOVM.EXE
C:\WINDOWS\system32\HPZipm12.exe
C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe
C:\Program Files\iolo\System Mechanic Professional 7\SMSystemAnalyzer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\tcpsvcs.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\SMC\SMCWUSB-G 802.11g Wireless USB 2.0 Adapter\SMCWGUTI.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Trend Micro\HijackThis\Sniper.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Microsoft Office\Office12\WINWORD.EXE
C:\WINDOWS\system32\msiexec.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wpabaln.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\wbem\wmiprvse.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MI1933~1\Office12\GRA8E1~1.DLL
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript
O4 - HKLM\..\Run: [P17Helper] Rundll32 P17.dll,P17Helper
O4 - HKLM\..\Run: [nwiz] C:\Program Files\NVIDIA Corporation\nView\nwiz.exe /install
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [PWRISOVM.EXE] C:\Program Files\PowerISO\PWRISOVM.EXE
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [SMSystemAnalyzer] "C:\Program Files\iolo\System Mechanic Professional 7\SMSystemAnalyzer.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SetDefaultMIDI] MIDIDef.exe
O4 - HKCU\..\Run: [SMSystemAnalyzer] "C:\Program Files\iolo\System Mechanic Professional 7\SMSystemAnalyzer.exe"
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: SMCWUSB-G 802.11g Wireless USB Utility.lnk = C:\Program Files\SMC\SMCWUSB-G 802.11g Wireless USB 2.0 Adapter\SMCWGUTI.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MI1933~1\Office12\EXCEL.EXE/3000
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MI1933~1\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&END to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MI1933~1\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MI1933~1\Office12\REFIEBAR.DLL
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {1E54D648-B804-468d-BC78-4AFFED8E262F} (System Requirements Lab) - http://www.nvidia.com/content/DriverDownload/srl/3.0.0.4/srl_bin/sysreqlab_nvd.cab
O16 - DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} (HP Download Manager) - https://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MI1933~1\Office12\GR99D3~1.DLL
O20 - Winlogon Notify: !SASWinLogon - C:\Program Files\SUPERAntiSpyware\SASWINLO.dll
O23 - Service: fastnetsrv  Service (fastnetsrv) - Sigma Designs In - C:\WINDOWS\system32\FastNetSrv.exe
O23 - Service: HP Port Resolver - Hewlett-Packard Company - C:\WINDOWS\system32\spool\drivers\w32x86\3\HPBPRO.EXE
O23 - Service: HP Status Server - Hewlett-Packard Company - C:\WINDOWS\system32\spool\drivers\w32x86\3\HPBOID.EXE
O23 - Service: iolo FileInfoList Service (ioloFileInfoList) - Unknown owner - C:\Program Files\iolo\common\lib\ioloServiceManager.exe
O23 - Service: iolo System Service (ioloSystemService) - Unknown owner - C:\Program Files\iolo\common\lib\ioloServiceManager.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: Net Login (NetLogin) - Unknown owner - C:\WINDOWS\svchost.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe
O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe
O23 - Service: ThreatFire - PC Tools - C:\Program Files\Spyware Doctor\TFEngine\TFService.exe

--
End of file - 6496 bytes
what anti-virus have you got Super Anti Spyware, malware bytes, Spyware Dr. they are not anti-virus do you have any of the one's below

avast
avira
avg
comodo
mcafee
norton
panda
kasperky


if you do not have , d/load one from below and run


http://www.free-av.com/ , avira is free

http://www.avast.com/ , avast is free


=============================================

also remove spyware dr , you have the best with Super Anti Spyware , you do not need 2






I am afraid you might have a virus called virut, virut is a very bad virus that modifies everything running. you might have to reformat your pc. I am going to contact evil for confirmation. http://www.threatexpert.com/report.aspx?md5=36629ac4a97cf577fb4bb8f7a3c8d8ea Quote from: cat-bomb on October 07, 2009, 02:49:46 PM

I am afraid you might have a virus called virut, virut is a very bad virus that modifies everything running. you might have to reformat your pc. I am going to contact evil for confirmation. http://www.threatexpert.com/report.aspx?md5=36629ac4a97cf577fb4bb8f7a3c8d8ea

please tell me what makes you think thatO23 - Service: Net Login (NetLogin) - Unknown owner - C:\WINDOWS\svchost.exe
http://www.systemlookup.com/O23/2068-svchost_exe_k_NetLogon.htmli have been looking for a site like that , thank you , do you know any more


Discussion

No Comment Found