Virus installing Application files?

G

Guest

My operating system has really slowed down so I checked the directory files
and noticed that there are HUNDREDS of application files in my windows
directory, labeled with numbers and letters such as 0fjdocy7sr, 0cbjalgak2,
1hb7x60w3o, etc. After right click on one of these application fields, it
takes almost 5 minutes before the window shows up. It allows me to click on
delete but it gives me a message indicating that it cannot be deleted because
the application is running. If I look at the Task Mgr, I do not see any of
these file names as applications that are currently running. I also
attempted to look in my System directories but am unable to because the OS is
running so very slow. I'm not sure if this is a virus or not, but I didn't
intentionally install these files. Does anyone have a recommendation to get
rid of these? I would GREATLY appreciate any help!!!! Thanks.
 
C

Carey Frisch [MVP]

Unexplained computer behavior may be caused by deceptive software
http://support.microsoft.com/?id=827315

Download Ad-aware SE and scan your PC for the presence of sp­yware:
http://www.download.com/3000-2144-10045910.html?part=69274&subj=dlpage&tag=button

Symantec Security Check
http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym

Microsoft Windows AntiSpyware
http://www.microsoft.com/downloads/...a2-6a57-4c57-a8bd-dbf62eda9671&displaylang=en

3 Simple Steps to Help Ensure the Protection of Your PC
http://www.microsoft.com/athome/security/protect/default.mspx

--
Carey Frisch
Microsoft MVP
Windows XP - Shell/User
Microsoft Newsgroups

Be Smart! Protect Your PC!
http://www.microsoft.com/athome/security/protect/default.mspx

------------------------------------------------------------------------------

:

| My operating system has really slowed down so I checked the directory files
| and noticed that there are HUNDREDS of application files in my windows
| directory, labeled with numbers and letters such as 0fjdocy7sr, 0cbjalgak2,
| 1hb7x60w3o, etc. After right click on one of these application fields, it
| takes almost 5 minutes before the window shows up. It allows me to click on
| delete but it gives me a message indicating that it cannot be deleted because
| the application is running. If I look at the Task Mgr, I do not see any of
| these file names as applications that are currently running. I also
| attempted to look in my System directories but am unable to because the OS is
| running so very slow. I'm not sure if this is a virus or not, but I didn't
| intentionally install these files. Does anyone have a recommendation to get
| rid of these? I would GREATLY appreciate any help!!!! Thanks.
 
D

David H. Lipman

From: "Mpls_Minnesota" <[email protected]>

| My operating system has really slowed down so I checked the directory files
| and noticed that there are HUNDREDS of application files in my windows
| directory, labeled with numbers and letters such as 0fjdocy7sr, 0cbjalgak2,
| 1hb7x60w3o, etc. After right click on one of these application fields, it
| takes almost 5 minutes before the window shows up. It allows me to click on
| delete but it gives me a message indicating that it cannot be deleted because
| the application is running. If I look at the Task Mgr, I do not see any of
| these file names as applications that are currently running. I also
| attempted to look in my System directories but am unable to because the OS is
| running so very slow. I'm not sure if this is a virus or not, but I didn't
| intentionally install these files. Does anyone have a recommendation to get
| rid of these? I would GREATLY appreciate any help!!!! Thanks.



There are anti virus News Groups specifically for this type of discussion.

microsoft.public.scripting.virus.discussion
microsoft.public.security.virus
alt.comp.virus
alt.comp.anti-virus

Dump the contents of the IE Temporary Internet Folder cache (TIF)

start --> settings --> control panel --> internet options --> delete files

1) Download the following four items...

McAfee Stinger
http://vil.nai.com/vil/stinger/

Trend Sysclean Package
http://www.trendmicro.com/download/dcs.asp

Latest Trend Pattern File.
http://www.trendmicro.com/download/pattern.asp

Ad-aware SE (free personal version v1.05)
http://www.lavasoftusa.com/

Create a directory.
On drive "C:\"
(e.g., "c:\New Folder")
or the desktop
(e.g., "C:\Documents and Settings\lipman\Desktop\New Folder")

Download SYSCLEAN.COM and place it in that directory.
Download the Trend Pattern File by obtaining the ZIP file.
For example; lpt486.zip

Extract the contents of the ZIP file and place the contents in the same directory as
SYSCLEAN.COM .

2) Update Ad-aware with the latest definitions.
3) Disable System Restore
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm
4) Reboot your PC into Safe Mode [F8 key during boot]
and shutdown as many applications as possible.
5) Using Trend Sysclean, Stinger and Ad-aware, perform a Full Scan of your
platform and clean/delete any infectors/parasites found.
(a few cycles may be needed)
6) Restart your PC and perform a "final" Full Scan of your platform using the three
utilities; Trend Sysclean, Stinger and Adaware
7) Re-enable System Restore and re-apply any System Restore preferences,
(e.g. HD space to use suggested 400 ~ 600MB),
8) Reboot your PC.
9) Create a new Restore point

* * Please report your results ! * *
 
G

Guest

Thank you so much for your quick advice. I followed all of your
directions...disabled sys restore and opened in safe mode. I ran Sysclean
(3hrs) and Ad-aware (15 min) however I couldn't run Stinger (error stated a
device attached to the system is not functioning). Sysclean did detect 16
infected files and deleted them. AD aware found a bunch of files and
quaranteened them. The text file for Sysclean has the following comments:
Could not set file for reading on c:\documents and settings\.....etc. and
also An error occurred while scanning file.
All of those application files are still in my Windows directory. I could
access them pretty quick in safe mode, however I couldn't delete them because
I'm still getting the message that a program running is using the file....But
I cannot see any program using them. Not sure if you have anymore
suggestions otherwise I can try those anti virus newsgroups, since it sounds
like what I have is a virus? Thanks a million for taking time to help me!!!

David H. Lipman said:
From: "Mpls_Minnesota" <[email protected]>

| My operating system has really slowed down so I checked the directory files
| and noticed that there are HUNDREDS of application files in my windows
| directory, labeled with numbers and letters such as 0fjdocy7sr, 0cbjalgak2,
| 1hb7x60w3o, etc. After right click on one of these application fields, it
| takes almost 5 minutes before the window shows up. It allows me to click on
| delete but it gives me a message indicating that it cannot be deleted because
| the application is running. If I look at the Task Mgr, I do not see any of
| these file names as applications that are currently running. I also
| attempted to look in my System directories but am unable to because the OS is
| running so very slow. I'm not sure if this is a virus or not, but I didn't
| intentionally install these files. Does anyone have a recommendation to get
| rid of these? I would GREATLY appreciate any help!!!! Thanks.



There are anti virus News Groups specifically for this type of discussion.

microsoft.public.scripting.virus.discussion
microsoft.public.security.virus
alt.comp.virus
alt.comp.anti-virus

Dump the contents of the IE Temporary Internet Folder cache (TIF)

start --> settings --> control panel --> internet options --> delete files

1) Download the following four items...

McAfee Stinger
http://vil.nai.com/vil/stinger/

Trend Sysclean Package
http://www.trendmicro.com/download/dcs.asp

Latest Trend Pattern File.
http://www.trendmicro.com/download/pattern.asp

Ad-aware SE (free personal version v1.05)
http://www.lavasoftusa.com/

Create a directory.
On drive "C:\"
(e.g., "c:\New Folder")
or the desktop
(e.g., "C:\Documents and Settings\lipman\Desktop\New Folder")

Download SYSCLEAN.COM and place it in that directory.
Download the Trend Pattern File by obtaining the ZIP file.
For example; lpt486.zip

Extract the contents of the ZIP file and place the contents in the same directory as
SYSCLEAN.COM .

2) Update Ad-aware with the latest definitions.
3) Disable System Restore
http://vil.nai.com/vil/SystemHelpDocs/DisableSysRestore.htm
4) Reboot your PC into Safe Mode [F8 key during boot]
and shutdown as many applications as possible.
5) Using Trend Sysclean, Stinger and Ad-aware, perform a Full Scan of your
platform and clean/delete any infectors/parasites found.
(a few cycles may be needed)
6) Restart your PC and perform a "final" Full Scan of your platform using the three
utilities; Trend Sysclean, Stinger and Adaware
7) Re-enable System Restore and re-apply any System Restore preferences,
(e.g. HD space to use suggested 400 ~ 600MB),
8) Reboot your PC.
9) Create a new Restore point

* * Please report your results ! * *
 
C

cquirke (MVP Windows shell/user)

On Sat, 12 Mar 2005 18:41:03 -0800, "Mpls_Minnesota"
Thank you so much for your quick advice. I followed all of your
directions...disabled sys restore and opened in safe mode.

For malware, "safe mode" is often not safe enough.
I ran Sysclean (3hrs) and Ad-aware (15 min) however I couldn't run
Stinger (error stated a device attached to the system is not functioning).

Where were you running these from? The Stinger error could be fake,
the result of active malware detecting and blocking the cleaner.
Sysclean did detect 16 infected files and deleted them. AD aware
found a bunch of files and quaranteened them. The text file for
Sysclean has the following comments:
Could not set file for reading on c:\documents and settings\.....etc. and
also An error occurred while scanning file.
OK

All of those application files are still in my Windows directory.

Not OK. It seems they aren't known to your tools, or are active and
defeding themselves against them. This is to be expected, from raw
theory; we can't count on malware authors' cluelessness forever.
I could access them pretty quick in safe mode, however I couldn't
delete them because I'm still getting the message that a program
running is using the file....

Sure. The malware just has to run; Windows will protect them as "in
use" without the malware having to do anything further. What the
malware would have to do, is protect its in-memory process(es) from
being terminated by av tools, or by you via Task Manager.

The latter can be done in various ways; running as a service so they
don't show up as applications, running a tweedle-dee/tweedle-dum pair
of threads that relaunch each other (Task Manager can't multi-select,
right?) or doing deeper rootkit stuff to redefine "Task Manager".
But I cannot see any program using them.

As above.
Not sure if you have anymore suggestions

What I'd do is create a Bart PE bootable CDR on another, "known"-clean
PC. Then I'd copy a freshly-downloaded Trend SysClean and related
data, as well as any other tools you want to use, to a USB stick (once
again, doing this from a "known"-clean PC). Then I'd write-protect the
USB stick, stick it into the infected PC, drop the Bart PE CDR in the
CD drive, and switch it on. First, I'd stop off in CMOS to ensure CD
drive is visible and I'd select that as the boot drive.

Then Bart would boot, and because the USB stick is present at boot, it
will see that too. I'd then copy the files from USB to HD and run my
tools. When done, I might use the FC (Filke Compare) command to check
these against those on the write-protected stick to make sure they
were not altered by malware. I'd work from Cmd (command line) mainly,
at least until the scans were done.

Another option is to use Knoppix boot CDR and Linux av scanners, but
that requires knowledge of Linux and faith in Linux's ability to write
safely to NTFS. I have neither.

If FATxx not NTFS, I'd use DOS-based av from DOS diskette boot to scan
for malware. Can't do that if NTFS, though.

Finally, onbe can drop the HD into another XP system and scan it that
way. This is "easy" but carries the risk of infecting the host, as
well as the host infecting the HD of course.

In all of these cases, you may well have to manually clean up
integration references within the registry - because in all cases, the
OS either isn't registry-aware (DOS mode, Linux) or sees the "wrong"
(host) registry (Bart's PE, hosted scanning). In the latter case, you
can bind the HD's registry hives via RegEdit and check them that way;
geeky stuff, but at least it's possible.

Best (safest) practice is not to blindly delete the malware, but to
get a malware name (as opposed to a meaningless file name) and then
read up for caveats first, before cleaning it up.


-------------------- ----- ---- --- -- - - - -
Running Windows-based av to kill active malware is like striking
a match to see if what you are standing in is water or petrol.
 
G

Guest

Thanks again for your help but I'm just a simple user and can hardly even
understand your instructions. I'm going to try a few more suggestions, and
if I still have the infected files, I guess that I will need to hire someone
to fix this for me.
Do you have any idea how we could have received this virus? We never open
unknown emails.
 
M

Malke

Mpls_Minnesota said:
Thanks again for your help but I'm just a simple user and can hardly
even
understand your instructions. I'm going to try a few more
suggestions, and if I still have the infected files, I guess that I
will need to hire someone to fix this for me.
Do you have any idea how we could have received this virus? We never
open unknown emails.

It is a wise person who knows when to take something to the mechanic.
Don't feel bad about this at all. Cleaning up malware can take a lot of
skill. I think you should take the machine to a good local professional
(not a BestBuy or CompUSA type of store) and have them clean it for
you. As for how you got it, who knows? However - and this is important
- you are far more likely to get a virus from someone you know than
from a complete stranger. You see, a lot of viruses send themselves to
everyone in the infected machine's addressbook. So if your Mom's
computer is infected, naturally your email address is going to be in
her addressbook. So the virus sends itself to you in an email that will
look like it's from your Mom. You say - oh, let's click on this picture
Mom sent. And if you don't have a current version (not earlier than
2004) antivirus installed, or if your subscription has lapsed or the
virus definitions aren't updated, you get infected.

Best of luck,

Malke
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top