Hi everyone,
I have the following problem with a virus which I have tried to resolve myself but without any luck so far, and I would very much appreciate your help as I'd hate to format the drive.
Today Kaspersky Internet Security (firewall + anti-virus software) reported some strange Host Process activity which I tried blocking, and than reported numerous *dll files infected with a Win32.Nimnul.e virus. I read on an online forum that a person had had similar issues and so tried scanning my PC with ESET Online Scanner as that had worked for that person. ESET has done a complete scan of my system drive, memory, hidden objects etc. and found 630 infected files, mostly *dll's, which it cleaned/quarantined according to the report. I then restared my PC and did another scan of the critical zones (memory, start-up objects, windows directory, booting sectors) with KIS and Dr Web. Both found no issues. Then KIS started giving new wanrings of infected files. I noted that many infected files came from User/AppData path and so I went there to delete the Temp folder content and noticed a strange folder called "vpvvltjv" in my AppData folder. Inside that folder was a file "evnlvwsm.exe". I tried deleting it but I couldn't, the message said it was being used by Host Process for Windows Services. I had a strong impression that that was the virus in question that somehow got hold of the generic host process and was causing strange behaviour on my PC. I tried deleting it in Safe Mode and it worked but when I reloaded normally, the folder and file were in AppData again! On another restart, KIS reported evnlvwsm.exe as dangerous and quarantined it. On restart, however, the folder and the file were in the same place again. KIS has reported a number of malwares in the Temp folder, even after I manually emptied the folder (for instance, "vblgxyrvorypiofi.exe").
It looks like I got some bad virus that recreates itself even after deletion, and perhaps regenerates itself in a number of files, and has control over some host processes. It looks like it has control over certain things on my PC. For instance, I can no longer start, uninstall or re-install certain applications (like my Opera browser (whenever I try to do it, it only pops up for a split second and shuts down)), I can't start Virtual Windows XP (error message says there is not enough system resources although there's pleny of it). I also couldn't run aswMBR.exe, I got an error message saying I didn't have access rights to run that process. I tried running it from Safe Mode but than some drivers failed to load and scan couldn't be performed.
I thought that the reason I can't run certain exe's may be that ESET damaged those *dll's while disinfecting them. If not, the only explanation I see is that the virus has control over certain processes and prevents me from executing them.
I attach the following files in support of my post:
- Extras.txt (generated by OTL as instructed);
- OTL.txt (generated by OTL as instructed);
- checkup.txt (generated by Security Check as instructed);
- ESET log.txt (generated by ESET which found 630 instances of infection with Win32/Ramnit.R virus and cured them all successfully);
- KIS report (generated by Kaspersky and showing some files that it has blocked/quarantined).
As I mentioned, I couldn't run aswMBR.exe so no log is attached for that one. I am attaching the logs in a single zip file as I didnt manage to upload separate files.
I would appreciate some help with this virus. If it has already screwed up my dll's (for literally all applications as can be seen from the ESET log) and reformat is unavoidable, I'd appreciate confirmation before I proceed with that measure.
***
By way of update, I wanted to add that KIS seems to have finally managed after a couple restarts to quarantine and delete both vblgxyrvorypiofi.exe and evnlvwsm.exe. After that I was able to use Opera and Virtual Windows XP again. I then also ran a complete scan with Dr Web of all files and it only found three issues which it fixed (the log is huge 46 MB so I'm not copying it here). I don't know if that means the issue has been resolved but the symptoms seem to have gone away. I have also been able to run aswMBR.exe, the log follows below as I didn't manage to reattach an updated ZIP.
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-03-28 21:22:16
-----------------------------
21:22:16.052 OS Version: Windows x64 6.1.7600
21:22:16.052 Number of processors: 6 586 0xA00
21:22:16.054 ComputerName: BEAST UserName: KIS
21:22:40.521 Initialize success
21:28:25.012 AVAST engine defs: 12032801
21:29:26.940 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
21:29:26.940 Disk 0 Vendor: Hitachi_HDS721010CLA332 JP4OA3EA Size: 953869MB BusType: 3
21:29:26.950 Disk 0 MBR read successfully
21:29:26.950 Disk 0 MBR scan
21:29:26.953 Disk 0 Windows 7 default MBR code
21:29:26.955 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
21:29:26.963 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 307197 MB offset 206848
21:29:26.965 Disk 0 Partition - 00 0F Extended LBA 646569 MB offset 629346375
21:29:26.980 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 646569 MB offset 629346438
21:29:26.998 Disk 0 scanning C:\Windows\system32\drivers
21:29:32.473 Service scanning
21:29:47.503 Modules scanning
21:29:47.506 Disk 0 trace - called modules:
21:29:47.516 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys >>UNKNOWN [0xfffffa80064952c0]< 21:29:47.518 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa8006d67790]
21:29:47.521 3 CLASSPNP.SYS[fffff8800218143f] -> nt!IofCallDriver -> [0xfffffa800697be40]
21:29:47.523 5 ACPI.sys[fffff8800180b781] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0xfffffa80069e2680]
21:29:47.526 \Driver\atapi[0xfffffa8005b21060] -> IRP_MJ_CREATE -> 0xfffffa80064952c0
21:29:47.528 Scan finished successfully
21:30:05.568 Disk 0 MBR has been saved successfully to "C:\Users\KIS\Desktop\MBR.dat"
21:30:05.573 The log file has been saved successfully to "C:\Users\KIS\Desktop\aswMBR.txt"
I have the following problem with a virus which I have tried to resolve myself but without any luck so far, and I would very much appreciate your help as I'd hate to format the drive.
Today Kaspersky Internet Security (firewall + anti-virus software) reported some strange Host Process activity which I tried blocking, and than reported numerous *dll files infected with a Win32.Nimnul.e virus. I read on an online forum that a person had had similar issues and so tried scanning my PC with ESET Online Scanner as that had worked for that person. ESET has done a complete scan of my system drive, memory, hidden objects etc. and found 630 infected files, mostly *dll's, which it cleaned/quarantined according to the report. I then restared my PC and did another scan of the critical zones (memory, start-up objects, windows directory, booting sectors) with KIS and Dr Web. Both found no issues. Then KIS started giving new wanrings of infected files. I noted that many infected files came from User/AppData path and so I went there to delete the Temp folder content and noticed a strange folder called "vpvvltjv" in my AppData folder. Inside that folder was a file "evnlvwsm.exe". I tried deleting it but I couldn't, the message said it was being used by Host Process for Windows Services. I had a strong impression that that was the virus in question that somehow got hold of the generic host process and was causing strange behaviour on my PC. I tried deleting it in Safe Mode and it worked but when I reloaded normally, the folder and file were in AppData again! On another restart, KIS reported evnlvwsm.exe as dangerous and quarantined it. On restart, however, the folder and the file were in the same place again. KIS has reported a number of malwares in the Temp folder, even after I manually emptied the folder (for instance, "vblgxyrvorypiofi.exe").
It looks like I got some bad virus that recreates itself even after deletion, and perhaps regenerates itself in a number of files, and has control over some host processes. It looks like it has control over certain things on my PC. For instance, I can no longer start, uninstall or re-install certain applications (like my Opera browser (whenever I try to do it, it only pops up for a split second and shuts down)), I can't start Virtual Windows XP (error message says there is not enough system resources although there's pleny of it). I also couldn't run aswMBR.exe, I got an error message saying I didn't have access rights to run that process. I tried running it from Safe Mode but than some drivers failed to load and scan couldn't be performed.
I thought that the reason I can't run certain exe's may be that ESET damaged those *dll's while disinfecting them. If not, the only explanation I see is that the virus has control over certain processes and prevents me from executing them.
I attach the following files in support of my post:
- Extras.txt (generated by OTL as instructed);
- OTL.txt (generated by OTL as instructed);
- checkup.txt (generated by Security Check as instructed);
- ESET log.txt (generated by ESET which found 630 instances of infection with Win32/Ramnit.R virus and cured them all successfully);
- KIS report (generated by Kaspersky and showing some files that it has blocked/quarantined).
As I mentioned, I couldn't run aswMBR.exe so no log is attached for that one. I am attaching the logs in a single zip file as I didnt manage to upload separate files.
I would appreciate some help with this virus. If it has already screwed up my dll's (for literally all applications as can be seen from the ESET log) and reformat is unavoidable, I'd appreciate confirmation before I proceed with that measure.
***
By way of update, I wanted to add that KIS seems to have finally managed after a couple restarts to quarantine and delete both vblgxyrvorypiofi.exe and evnlvwsm.exe. After that I was able to use Opera and Virtual Windows XP again. I then also ran a complete scan with Dr Web of all files and it only found three issues which it fixed (the log is huge 46 MB so I'm not copying it here). I don't know if that means the issue has been resolved but the symptoms seem to have gone away. I have also been able to run aswMBR.exe, the log follows below as I didn't manage to reattach an updated ZIP.
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-03-28 21:22:16
-----------------------------
21:22:16.052 OS Version: Windows x64 6.1.7600
21:22:16.052 Number of processors: 6 586 0xA00
21:22:16.054 ComputerName: BEAST UserName: KIS
21:22:40.521 Initialize success
21:28:25.012 AVAST engine defs: 12032801
21:29:26.940 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
21:29:26.940 Disk 0 Vendor: Hitachi_HDS721010CLA332 JP4OA3EA Size: 953869MB BusType: 3
21:29:26.950 Disk 0 MBR read successfully
21:29:26.950 Disk 0 MBR scan
21:29:26.953 Disk 0 Windows 7 default MBR code
21:29:26.955 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048
21:29:26.963 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 307197 MB offset 206848
21:29:26.965 Disk 0 Partition - 00 0F Extended LBA 646569 MB offset 629346375
21:29:26.980 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 646569 MB offset 629346438
21:29:26.998 Disk 0 scanning C:\Windows\system32\drivers
21:29:32.473 Service scanning
21:29:47.503 Modules scanning
21:29:47.506 Disk 0 trace - called modules:
21:29:47.516 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys >>UNKNOWN [0xfffffa80064952c0]<
21:29:47.521 3 CLASSPNP.SYS[fffff8800218143f] -> nt!IofCallDriver -> [0xfffffa800697be40]
21:29:47.523 5 ACPI.sys[fffff8800180b781] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0xfffffa80069e2680]
21:29:47.526 \Driver\atapi[0xfffffa8005b21060] -> IRP_MJ_CREATE -> 0xfffffa80064952c0
21:29:47.528 Scan finished successfully
21:30:05.568 Disk 0 MBR has been saved successfully to "C:\Users\KIS\Desktop\MBR.dat"
21:30:05.573 The log file has been saved successfully to "C:\Users\KIS\Desktop\aswMBR.txt"