win32/asuspect.itdedp

Discussion in 'Malware Help (A Specialist Will Reply)' started by ctclone, Jul 2, 2010.

  1. ctclone

    ctclone Private E-2

    I have a hp pavilion zx5180us laptop running windows xp. A couple of weeks ago my other desktop started having problems, so a friend used this laptop to get my desktop running again by using a usb cable to connect to my desktop. Turns out the desktop had a virus (alureon). After fixing the desktop, I ran my ca spyware removal on this laptop and it reported a win32/asuspect.itdedp infection. I'm not sure if the desktop infected the laptop or if it is a separate infection. I ran the ca spyware again but it didn't turn up again. I also ran my ca antivirus, but it returned no results. I also ran spybot and it returned a few other spyware infections, but no asuspect infection. I've tried to follow all the steps for the malware removal , but I'm not sure if I've done everything correctly. I think the infection has been removed, but I'm not sure. Can you please tell me if I've done everything correctly and if the infection has been removed. Thanks!!
     

    Attached Files:

  2. ctclone

    ctclone Private E-2

    Last log.
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You should not be allowing all users to have Admin. privileges!! Esp. not the kids account. Once malware enters your system in an Admin account, it has free access to all other accounts. You need to run SAS and MBAM on each user account and attach any logs that show infections.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    Now tell me how things are running.
     
  4. ctclone

    ctclone Private E-2

    Thanks for the help. I have ran the SAS and MWB on the other accounts and attached the log for the infections found. I also looked for the entry you quoted and could not find that specfic one. I believe it was deleted when I clicked fix for the MWB infections? Not sure of that, but I did look in the MGtoools for the lines you gave and the lines listed were different than the ones you listed. I believe everything has been removed and there are no more infections on the computer.
    This is my moms old computer and I didn't set up the user accounts. To remove the users, do I go into the setting for windows and remove them or just adjust the settings to restrict access to these users?
    Thanks for the help!!!
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You go to the control panel, click on users. From there you can change the user accounts to limited/restricted.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds