Computer Hope

Software => Computer viruses and spyware => Topic started by: jmccasland on January 15, 2012, 06:12:28 PM

Title: clean install of XP trojan:DOS/alureon.e showing up?
Post by: jmccasland on January 15, 2012, 06:12:28 PM
I'm a little confused and hope someone can help.

I did a fresh install of XP on a computer that had a virus.  I copied over the pictures, music, documents, etc to my external before I reinstalled and copied them back on after the reinstall.

I installed all of the updates and Microsoft Security Essentials and ran a scan thinking if the virus came from something I had saved it would be good to get rid of it prior to the computer being used again.

MSE found trojan:DOS/alureon.e.  I clicked on remove and rebooted.  MSE immediately found it again.  I downloaded Trend's rootkitbuster which didn't find anything.  Downloaded Super AntiSpyware which didn't find anything.  I turned off system restore and cleaned it again with MSE.  MSE found it again on the next reboot.

I haven't run into this before and wonder if anyone can help me out here.

In trying to find out where the virus is located I saw this:

Items:
boot:\Device\HarddiskVolume3
boot:\Device\HarddiskVolume3\
boot:\\.\PHYSICALDRIVE0\Partition2 (Type 17)

Anyone know what this means?

Thanks,

Jody
Title: Re: clean install of XP trojan:DOS/alureon.e showing up?
Post by: SuperDave on January 15, 2012, 06:27:02 PM
Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*************************************************************************
Please download aswMBR.exe (http://public.avast.com/%7Egmerek/aswMBR.exe) ( 511KB ) to your desktop.

Double click the aswMBR.exe to run it

(http://i424.photobucket.com/albums/pp322/digistar/aswMBR_Scan.jpg)

Click the "Scan" button to start scan

Note: Do not take action against any **Rootkit** entries until I have reviewed the log. Often there are false positives

(http://i424.photobucket.com/albums/pp322/digistar/aswMBR_SaveLog.png)

On completion of the scan click save log, save it to your desktop and post in your next reply
Title: Re: clean install of XP trojan:DOS/alureon.e showing up?
Post by: jmccasland on January 15, 2012, 06:43:37 PM
Thank you so much.

Here is my log file:

aswMBR version 0.9.9.1297 Copyright(c) 2011 AVAST Software
Run date: 2012-01-15 18:34:53
-----------------------------
18:34:53.484    OS Version: Windows 5.1.2600 Service Pack 3
18:34:53.484    Number of processors: 2 586 0x409
18:34:53.484    ComputerName: SNELSONS  UserName: User
18:34:54.093    Initialize success
18:37:49.328    AVAST engine defs: 12011501
18:38:39.906    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-3
18:38:39.906    Disk 0 Vendor: WDC_WD800JD-75MSA3 10.01E04 Size: 76293MB BusType: 3
18:38:39.937    Disk 0 MBR read successfully
18:38:39.937    Disk 0 MBR scan
18:38:39.984    Disk 0 Windows XP default MBR code
18:38:39.984    Disk 0 Partition 1 00     DE Dell Utility Dell 8.0       39 MB offset 63
18:38:40.046    Disk 0 Partition 2 80 (A) 07    HPFS/NTFS NTFS        76245 MB offset 80325
18:38:40.093    Disk 0 Partition 3 00     17 Hidd HPFS/NTFS NTFS            8 MB offset 156232125
18:38:40.265    Disk 0 scanning sectors +156249984
18:38:40.312    Disk 0 scanning C:\WINDOWS\system32\drivers
18:38:58.718    Service scanning
18:38:59.062    Service MpKsl8d7cdca8 c:\Documents and Settings\All Users\Application Data\Microsoft\Microsoft Antimalware\Definition Updates\{F1BBDC1C-661E-4500-9FC8-BED0588C5994}\MpKsl8d7cdca8.sys **LOCKED** 32
18:38:59.687    Modules scanning
18:39:05.046    Disk 0 trace - called modules:
18:39:05.062    ntkrnlpa.exe CLASSPNP.SYS disk.sys atapi.sys hal.dll atiide.sys PCIIDEX.SYS
18:39:05.062    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x85f7bab8]
18:39:05.062    3 CLASSPNP.SYS[f7534fd7] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-3[0x85f76d98]
18:39:05.312    AVAST engine scan C:\WINDOWS
18:39:26.968    AVAST engine scan C:\WINDOWS\system32
18:42:18.859    AVAST engine scan C:\WINDOWS\system32\drivers
18:42:40.046    AVAST engine scan C:\Documents and Settings\User
18:43:08.218    Disk 0 MBR has been saved successfully to "C:\Documents and Settings\User\Desktop\MBR.dat"
18:43:08.234    The log file has been saved successfully to "C:\Documents and Settings\User\Desktop\aswMBR.txt"
Title: Re: clean install of XP trojan:DOS/alureon.e showing up?
Post by: SuperDave on January 15, 2012, 06:50:21 PM
SUPERAntiSpyware

If you already have SUPERAntiSpyware be sure to check for updates before scanning!

Download SuperAntispyware Free Edition (SAS) (http://www.superantispyware.com/download.html)
* Double-click the icon on your desktop to run the installer.
* When asked to Update the program definitions, click Yes
* If you encounter any problems while downloading the updates, manually download and unzip them from here (http://www.softpedia.com/get/Others/Signatures-Updates/SUPERAntiSpyware-Database-Definitions-Updates.shtml)
* Next click the Preferences button.

•Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
* Click the Scanning Control tab.
* Under Scanner Options make sure only the following are checked:

•Close browsers before scanning
•Scan for tracking cookies
•Terminate memory threats before quarantining
Please leave the others unchecked

•Click the Close button to leave the control center screen.

* On the main screen click Scan your computer
* On the left check the box for the drive you are scanning.
* On the right choose Perform Complete Scan
* Click Next to start the scan. Please be patient while it scans your computer.
* After the scan is complete a summary box will appear. Click OK
* Make sure everything in the white box has a check next to it, then click Next
* It will quarantine what it found and if it asks if you want to reboot, click Yes

•To retrieve the removal information please do the following:
•After reboot, double-click the SUPERAntiSpyware icon on your desktop.
•Click Preferences. Click the Statistics/Logs tab.

•Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

•It will open in your default text editor (preferably Notepad).
•Save the notepad file to your desktop by clicking (in notepad) File > Save As...

* Save the log somewhere you can easily find it. (normally the desktop)
* Click close and close again to exit the program.
*Copy and Paste the log in your post.
***********************************************
(http://i424.photobucket.com/albums/pp322/digistar/mbamicontw5.gif) Please download Malwarebytes Anti-Malware from here. (http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe)
Double Click mbam-setup.exe to install the application.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
************************************************
Download DDS from HERE (http://download.bleepingcomputer.com/sUBs/dds.scr) or HERE (http://www.forospyware.com/sUBs/dds) and save it to your desktop.

Vista users right click on dds and select Run as administrator (you will receive a UAC prompt, please allow it)

* XP users Double click on dds to run it.
* If your antivirus or firewall try to block DDS then please allow it to run.
* When finished DDS will open two (2) logs.
* Save both reports to your desktop.
* The instructions here ask you to attach the Attach.txt.

(http://i424.photobucket.com/albums/pp322/digistar/DDS.jpg)

1) DDS.txt
2) Attach.txt
Instead of attaching, please copy/past both logs into your Thread

Note: DDS will instruct you to post the Attach.txt log as an attachment.
Please just post it as you would any other log by copying and pasting it into the reply.

•Close the program window, and delete the program from your desktop.

Please note: You may have to disable any script protection running if the scan fails to run.
After downloading the tool, disconnect from the internet and disable all antivirus protection.
Run the scan, enable your A/V and reconnect to the internet.
Information on A/V control HERE  (http://www.bleepingcomputer.com/forums/topic114351.html).Then post your DDS logs. (DDS.txt and Attach.txt )
Title: Re: clean install of XP trojan:DOS/alureon.e showing up?
Post by: jmccasland on January 15, 2012, 08:08:05 PM
Thank you again.  Here are my log files:

Super AntiSpyware:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/15/2012 at 07:12 PM

Application Version : 5.0.1142

Core Rules Database Version : 8134
Trace Rules Database Version: 5946

Scan type       : Complete Scan
Total Scan Time : 00:19:18

Operating System Information
Windows XP Professional 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 361
Memory threats detected   : 0
Registry items scanned    : 35065
Registry threats detected : 0
File items scanned        : 26324
File threats detected     : 4

Adware.Tracking Cookie
   C:\Documents and Settings\User\Cookies\8NO8QIH5.txt [ /ads.bleepingcomputer.com ]
   C:\Documents and Settings\User\Cookies\QGS0SB1N.txt [ /2o7.net ]
   C:\Documents and Settings\User\Cookies\JBMPEXGB.txt [ /kontera.com ]
   C:\Documents and Settings\User\Cookies\06RGFH3H.txt [ /doubleclick.net ]


Malwarebytes:

Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.15.04

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
User :: SNELSONS [administrator]

1/15/2012 7:16:25 PM
mbam-log-2012-01-15 (19-16-25).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 185060
Time elapsed: 17 minute(s), 30 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)


DSS would not complete even in safe mode.  I made sure my antivirus was not running.
Title: Re: clean install of XP trojan:DOS/alureon.e showing up?
Post by: SuperDave on January 16, 2012, 04:26:37 PM
Please try this.

Please download ComboFix (http://img7.imageshack.us/img7/4930/combofix.gif) from BleepingComputer.com (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)

Alternate link: GeeksToGo.com (http://subs.geekstogo.com/ComboFix.exe)

and save it to your Desktop.
It would be easiest to download using Internet Explorer.
If you want to use Firefox, make sure that your download settings are as follows:

* Tools->Options->Main tab
* Set to "Always ask me where to Save the files".

Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools A guide to do this can be found here (http://www.bleepingcomputer.com/forums/topic114351.html)
Double click ComboFix.exe & follow the prompts.
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console
(http://i424.photobucket.com/albums/pp322/digistar/Query_RC.gif)
Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
(http://i424.photobucket.com/albums/pp322/digistar/RC_successful.gif)

Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you.  Please include the contents of C:\ComboFix.txt in your next reply.

If you have problems with ComboFix usage, see  How to use ComboFix (http://www.bleepingcomputer.com/combofix/how-to-use-combofix)