Help!!! Virus!!!

Riptorn

Vista Guru
Vista Pro
Hi, I have vista ultimate 32 bit. Recently, everytime I start up vista, my antivirus software BitDefender Internet Security 2009, blocks a virus ... goasi.cn/ex/a.php
Does anyone know what this is??, and how can I remove it, it is very annoying??..Please can you help me??
Regards
Riptorn.:confused:
 

My Computer

System One

  • Manufacturer/Model
    Dell Inspiron 1525
    CPU
    CELERON DUO
    Memory
    4GB
    Hard Drives
    360GB

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB) and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive: Panasonic UJ-220 DL BD-RE (Blu-Ray)

My Computer

System One

  • Manufacturer/Model
    Dell Inspiron 1525
    CPU
    CELERON DUO
    Memory
    4GB
    Hard Drives
    360GB
Source:PE_VIRUT.ASA - Technical details


Arrival, Installation and Autostart Technique
This file infector may be downloaded unknowingly by a user when visiting malicious Web sites.
It creates the following registry entry to bypass the Windows Firewall:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
SharedAccess\Parameters\FirewallPolicy\StandardProfile\
AuthorizedApplications\List
\??\%System%\winlogon.exe = "\??\%System%\winlogon.exe:*:enabled:@shell32.dll,-1"

File Infection

It hooks the following APIs so that when any of these APIs are called, it proceeds to its infection routine:
  • NtCreateFile
  • NtOpenFile
  • NtOpenProcess
  • NtCreateProcessEx
This file infector infects by appending its code to target host files. It infects files of the following types:
  • .EXE
  • .SCR
It does not infect files that contain the following strings in their file names:
  • WC32
  • WCUN
  • WINC
Backdoor Capabilities
It searches for the Winlogon process by enumerating the running processes and injects a thread that is responsible for its backdoor routines.


It connects to the following IRC server irc.zief.pl and waits for a command from a remote user. Using this connection, it downloads TROJ_INJECTOR.AR from the following URL:
 
Last edited:

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB) and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive: Panasonic UJ-220 DL BD-RE (Blu-Ray)
Actually on second thought you may want to do System restore to a point before you picked up the file infector Malware. Apparently It is causing significant registry/Windows corruption that may be difficult to repair. Did you allow it past UAC? That should have contained it in the IE7 sandbox.

Assumming for a moment it is still In the IE temp files, delete all files/cookies, etc.
 

Attachments

  • Capture.GIF
    Capture.GIF
    53.6 KB · Views: 64
  • Capture1.GIF
    Capture1.GIF
    26.9 KB · Views: 48
Last edited:

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB) and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive: Panasonic UJ-220 DL BD-RE (Blu-Ray)
The best Antivirus/Antimalware programs on the market

Avira
NOD32
 

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB) and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive: Panasonic UJ-220 DL BD-RE (Blu-Ray)
Actually on second thought you may want to do System restore to a point before you picked up the file infector Malware. Apparently It is causing significant registry/Windows corruption that may be difficult to repair. Did you allow it past UAC? That should have contained it in the IE7 sandbox.

Assumming for a moment it is still In the IE temp files, delete all files/cookies, etc.
scanning now.. will let you know the outcome. thanks.
 

My Computer

System One

  • Manufacturer/Model
    Dell Inspiron 1525
    CPU
    CELERON DUO
    Memory
    4GB
    Hard Drives
    360GB
Manual removal
posted from:TROJ_INJECTOR.AR - Description and solution
Turn off System restore/Shadow Copy, then:




Step 1: Remove malware files dropped/downloaded by TROJ_INJECTOR.AR
  • TROJ_AGENT.ALHH
  • TROJ_FAKEAV.MCS
  • TROJ_STOPSEC.MCL
  • TSPY_FESTEAL.B
Step 1: Remove malware files dropped/downloaded by TROJ_INJECTOR.AR
  • TROJ_AGENT.ALHH
  • TROJ_FAKEAV.MCS
  • TROJ_STOPSEC.MCL
  • TSPY_FESTEAL.B
[Back]
Step 2: Delete this registry value [learn how] Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\
    Desktop
    • host = "{BLOCKED}.{BLOCKED}.126.195"
    • id = "861628374673"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
    • FirewallDisableNotify = "1"
    • FirewallOverride = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\Run
    • services = "%WINDOWS%\services.exe"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\
    WindowsFirewall\DomainProfile
    • EnableFirewall = "0"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\
    WindowsFirewall\StandardProfile
    • EnableFirewall = "0"
Step 2: Delete this registry value [back]
To delete the registry value this malware/grayware/spyware created:
  1. Open Registry Editor. Click Start>Run, type REGEDIT, then press Enter.
  2. In the left panel, double-click the following:
    HKEY_CURRENT_USER>Software>Microsoft>Internet Explorer>
    Desktop
  3. In the right panel, locate and delete the entry:

    • host = "{BLOCKED}.{BLOCKED}.126.195"
    • id = "861628374673"
  4. In the left panel, double-click the following:
    HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Security Center
  5. In the right panel, locate and delete the entry:

    • FirewallDisableNotify = "1"
    • FirewallOverride = "1"
  6. In the left panel, double-click the following:
    HKEY_LOCAL_MACHINE>SOFTWARE>Microsoft>Windows>
    CurrentVersion>Run
  7. In the right panel, locate and delete the entry:

    • services = "%Windows%\services.exe"
  8. In the left panel, double-click the following:
    HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft>
    WindowsFirewall>DomainProfile
  9. In the right panel, locate and delete the entry:

    • EnableFirewall = "0"
  10. In the left panel, double-click the following:
    HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft>
    WindowsFirewall>StandardProfile
  11. In the right panel, locate and delete the entry:

    • EnableFirewall = "0"
  12. Close Registry Editor.
Perform FULL System Scan with Antivirus/Windows Defender.
 
Last edited:

My Computer

System One

  • CPU
    T7600G Core2Duo 2.66 Ghz
    Motherboard
    Intel 945PM + ICH7 Chipset
    Memory
    4GB DDR2 PC2-5300 667MHz
    Graphics card(s)
    Mobility Radeon x1900 256MB
    Sound Card
    Realtek HD
    Monitor(s) Displays
    WUXGA 17"
    Screen Resolution
    1920X1200
    Hard Drives
    640GB 7200RPM SATA/RAID 0 (2x320GB) and 320GB 7200RPM External
    Mouse
    Wireless Microsoft 3000
    Internet Speed
    10 mbps/2 mbps
    Other Info
    Optical Drive: Panasonic UJ-220 DL BD-RE (Blu-Ray)
Back
Top