1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Another virus -.-

Discussion in 'Entertainment and Technology' started by Tokarov, Apr 17, 2008.

  1. Tokarov

    Tokarov Guest

    Joined:
    Dec 30, 2007
    Messages:
    600
    Likes Received:
    1
    Location:
    Southern California
    Gender:
    Male
    Sexual Orientation:
    Bisexual
    Out Status:
    Some people
    Some of you might remember me. I had the Mal_Vundo Virus? You guys helped me get rid of that one, so I'm asking for your help again. :slight_smile:

    I got another one. It's called: "Trojan-Downloader.win32.Agent variant"

    Yeah, I ran spysweeper and then quarintiend it and then deleted it, but it keeps coming up.

    I play World of Warcraft, and everytime I open the game, it warns me of the virus AFTER I have deleted it, it won't go away!!!!

    I even ran vundofix, and nothing came up, so its not another Mal_Vundo.

    Any help? Thanks guys!!! :thumbsup:
     
  2. spazz33

    spazz33 Guest

    I got a wierd one that kept comming back after quarintiending it and such and I found this free program called SUPERAntiSpyware, the free edition, and it got the virus thing right off. Look it up on google.

    Good luck!
     
  3. SkyTears

    Full Member

    Joined:
    Dec 12, 2006
    Messages:
    193
    Likes Received:
    0
    Location:
    Renton, WA
    If that doesn't work you can try to trace the file and delete it from there. I've had to do this before for viruses that kept reloading themselves.
     
  4. sephuu

    sephuu Guest

    Joined:
    Apr 19, 2008
    Messages:
    19
    Likes Received:
    0
    Gender:
    Male
    Sexual Orientation:
    Gay
    Out Status:
    Out to everyone
    Trojan-Downloader.Win32.Agent.zf
    Other versions: .ac, .bl, .bq, .fk, .pj, .rs, .td, .uj

    Detection added Nov 23 2005
    Update released Nov 23 2005 18:13 GMT
    Description added Jun 07 2006
    Behavior TrojanDownloader

    * Technical details
    * Payload
    * Removal instructions

    Technical details

    This memory resident malicious program is a Windows PE EXE file written in Microsoft Visual C++. The file is 7013 bytes in size. However, file size varies significantly from variant to variant.
    Payload

    Once launched, the Trojan copies itself to the Windows root directory as SERVICES.EXE and then launches this file for execution.
    %Windir%\SERVICES.EXE

    The original file will then be deleted.

    The Trojan also creates the following keys in the system registry:
    [HKLM\Software\Microsoft\Serenta]
    [HKLM\Software\Microsoft\Serenta\Run]

    The SERVICES.EXE which is launched in a separate stream constantly creates the following values in the system registry:

    [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
    "SERVICES.EXE"="%Windir%\SERVICES.EXE"

    [HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "Shell"="Explorer.exe %Windir%\SERVICES.EXE"
    "Userinit"="C:\WINDOWS\system32\userinit.exe,,%Windir%\SERVICES.EXE"

    This ensures that the Trojan file will be launched automatically each time Windows is rebooted on the victim machine.

    It is impossible to terminate the Trojan process as Windows believes it to be a system process (%system%\services.exe — this is due to the fact that the name of the Trojan process is identical to that launched on the system.).

    The Trojan is also capable of downloading files from the Internet and launching them on the victim machine.
    Removal instructions

    Manual removal:

    1. Create a c:\rescue.bat file which contains the following strings:
    @echo off
    :try
    del C:\WINDOWS\SERVICES.EXE
    if exist C:\WINDOWS\SERVICES.EXE goto try
    2. Modify the following system registry entry: from
    [HKLM\System\CurrentControlSet\Services\Eventlog]
    "ImagePath"="%SystemRoot%\system32\services.exe"
    to
    "ImagePath"="C:\rescue.bat"

    Doing this ensures that rescue.bat will be launched instead of the Event Log system servcie.
    3. Reboot the computer. The Trojan will be deleted once the system has been rebooted.
    4. Restore the original ImagePath value:
    [HKLM\System\CurrentControlSet\Services\Eventlog]
    "ImagePath"="%SystemRoot%\system32\services.exe"
    5. Delete the following keys from the system registry:

    [HKLM\Software\Microsoft\Serenta]

    [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
    "SERVICES.EXE"="%Windir%\SERVICES.EXE"
    6. Modify the following parameters:
    [HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "Shell"="Explorer.exe %Windir%\SERVICES.EXE"
    to:
    "Shell"="Explorer.exe"
    "Userinit"="C:\WINDOWS\system32\userinit.exe,,%Windir%\SERVICES.EXE"
    to:
    "Userinit"="C:\WINDOWS\system32\userinit.exe"
    7. Update your antivirus databases and perform a full scan of your computer
     
  5. sephuu

    sephuu Guest

    Joined:
    Apr 19, 2008
    Messages:
    19
    Likes Received:
    0
    Gender:
    Male
    Sexual Orientation:
    Gay
    Out Status:
    Out to everyone
    Google is your friend :wink:

    So just follow the instructions to remove it, and do it quickly. Anything that interferes with system32 is extremely dangerous.