Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

invisible virus/malware on my pc


  • This topic is locked This topic is locked
5 replies to this topic

#1 @home

@home

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:27 AM

Posted 27 October 2008 - 12:26 PM

Hello All!

THis is going to be my first ever post on the internet, and I wish that it were for some joyous occassion! Recently I have encountered a virus on my pc, that destroys all my .doc's, .exe's, .pdf's and .xls's. I can't find a trace of the file that is doing this. Kasperesky and Avast! both catch the virus as a win32.agent.cb and win32.virut virus, but they never catch the actual culprit! When they try to disinfect the infected files all goes down the drain! Nothing works anymore, nothing opens anymore. Please help! How can I recover my files? Or could somebody please tell me what to do?
I have posted my HijackThis log below. Notice all the services at the bottom, which are unusual.

Thanks a lot!!!!!!!!!!!!

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 7:46:13 PM, on 10/27/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\SCardSvr.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~1\VPTray.exe
C:\Program Files\CyberPrinter\cypcli.exe
C:\WINDOWS\system32\CafeAgent.exe
C:\WINDOWS\system32\CafeAgent.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\CyberPrinter\InjServiceP.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\CyberPrinter\InjectService.exe
C:\WINDOWS\system32\YahooMessenger.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\gmer\HiJackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\Program Files\Internet Explorer\iexplore.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://securityresponse.symantec.com/avcenter/fix_homepage/
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\3.1.807.1746\swg.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\VPTray.exe
O4 - HKLM\..\Run: [CyberP] C:\Program Files\CyberPrinter\cypcli.exe
O4 - HKLM\..\Run: [CafeAgent] C:\WINDOWS\system32\CafeAgent.exe /normal
O4 - HKLM\..\RunServices: [CafeAgent] C:\WINDOWS\system32\CafeAgent.exe /normal
O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\reader_sl.exe
O4 - Global Startup: Adobe Reader Synchronizer.lnk = C:\Program Files\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = rightclick
O17 - HKLM\Software\..\Telephony: DomainName = rightclick
O17 - HKLM\System\CCS\Services\Tcpip\..\{7E612F4A-4F5E-40B0-AF14-C307E16853A4}: NameServer = 172.16.0.50
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = rightclick
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = rightclick
O23 - Service: CafeAgent of CafeSuite (CafeAgent) - CafeSuite - C:\WINDOWS\system32\CafeAgent.exe
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Symantec AntiVirus Definition Watcher (DefWatch) - Symantec Corporation - C:\Program Files\Symantec AntiVirus\DefWatch.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: SAVRoam (SavRoam) - symantec - C:\Program Files\Symantec AntiVirus\SavRoam.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
O23 - Service: serpol print service (srpServiceP) - Unknown owner - C:\Program Files\CyberPrinter\InjServiceP.exe
O23 - Service: Symantec AntiVirus - Symantec Corporation - C:\Program Files\Symantec AntiVirus\Rtvscan.exe
O23 - Service: TSERVICECP (TService) - Unknown owner - C:\Program Files\CyberPrinter\InjectService.exe
O23 - Service: ~@eteoo@p~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~@iphi@td~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~agoqr@cw~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~avhkex@u~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~bplskwrd~ - Unknown owner - C:\WINDOWS\system32\GoogleToolbarNotifier.exe
O23 - Service: ~bsfrektf~ - Unknown owner - C:\WINDOWS\system32\GoogleToolbarNotifier.exe
O23 - Service: ~cnj@vsjm~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~dkrqxtjh~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~dqpxkbnj~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~edee^imu~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~ekgc@ce@~ - Unknown owner - C:\WINDOWS\system32\ymsgr_tray.exe
O23 - Service: ~ektuqfxc~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~fitvddqt~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~gt@lll@b~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~jdolqmqq~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~jhdcdglt~ - Unknown owner - C:\WINDOWS\system32\GoogleToolbarNotifier.exe
O23 - Service: ~ljgnlse^~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~lusgtqfs~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~ouavpt^w~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~pi^rbfdq~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~ppmdnrqk~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~qm@leukl~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~qnmdbvcr~ - Unknown owner - C:\WINDOWS\system32\GoogleToolbarNotifier.exe
O23 - Service: ~r^guwdps~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~sfvhlrsb~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~tdnidvlq~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~t^vrdwar~ - Unknown owner - C:\WINDOWS\system32\lusetup.exe
O23 - Service: ~ubnp^obc~ - Unknown owner - C:\WINDOWS\system32\msmsgs.exe
O23 - Service: ~upk^whcm~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~vw@svk@n~ - Unknown owner - C:\WINDOWS\system32\YahooMessenger.exe
O23 - Service: ~wr@cenow~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe
O23 - Service: ~xfjxuhts~ - Unknown owner - C:\WINDOWS\system32\AdobeCollabSync.exe

--
End of file - 8091 bytes

BC AdBot (Login to Remove)

 


#2 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:27 PM

Posted 12 November 2008 - 03:21 PM

Hello. I am PropagandaPanda (Panda or PP for short), and I will be helping you with your log.

I apologize for the delay in response. We get overwhelmed with logs at times, but we are trying our best to keep up. If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following so I can have a look at the current condition of your machine.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the Posted Image button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Finally, please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
Download and Run OTScanIt
Download OTScanIt2 by OldTimer to your Desktop and double-click on it to extract the files. It will create a folder named OTScanIt2 on your desktop.
  • Open the OTScanIt2 folder and double-click on OTScanIt2.exe to start the program. If you are running on Vista then right-click the program and choose Run as Administrator.
  • Check the Scan all users box.
  • Under the Additional Scans bar, click "Extras". Do not change any other settings.
  • Now click the Run Scan button on the toolbar.
  • When the scan is complete Notepad will open with the report file loaded in it.
  • Click the Format menu and make sure that Wordwrap is not checked. If it is then click on it to uncheck it.
  • Close Notepad (saving the change if necessary).
  • Use the Add Reply button in the forum and Attach the scan back here (do not copy/paste it as it will be too big to fit into the post). It will be located in the OTScanIt2 folder and named OTScanIt.txt.
Download and Run Scan with GMER
We will use GMER to scan for rootkits.
  • Download gmer.zip and save to your desktop.
  • Unzip/extract the file to its own folder. (Click here for information on how to do this if not sure. Win 2000 users click here.
  • Close all other running programs. There is a small chance this application may crash your computer so save any work you have open.
  • Double-click on Gmer.exe to start the program.
  • Allow the gmer.sys driver to load if asked.
  • If it gives you a warning at program start about rootkit activity and asks if you want to run a scan...click NO.
  • Click the >>>.
  • Click on Settings, then check the first five settings:
    • System Protection and Tracing
    • Processes
    • Save created processes to the log
    • Drivers
    • Save loaded drivers to the log
  • Click OK.
  • You will be prompted to restart your computer. Please do so.
After the reboot, run Gmer again and click on the Rootkit tab.
  • Look at the right hand side (under Files) and uncheck all drives with the exception of your C drive.
  • Make sure all other boxes on the right of the screen are checked, EXCEPT for Show All.
  • Click on the Scan and wait for the scan to finish.
    Note: Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while this scan completes. Also do not use your computer during the scan. You will know that the scan is done when the Stop buttons turns back to Scan.
  • When completed, click on the Copy button and right-click on your Desktop, choose New>Text document. Once the file is created, open it and right-click again and choose Paste. Save the file as gmer.txt and copy the information in your next reply.
  • Note: If you have any problems, try running GMER in Safe Mode
Important!:Please do not select the Show all checkbox during the scan..

In your next reply include:
-the OTScanIt log (attached)
-the GMER log (pasted directly into your reply)

Please also tell me of any changes you have made to your computer since your topic was started.

If you do not make a reply in 5 days, we will need to close your topic.

With Regards,
The Panda

Important Note to Other Users Reading this Topic: The instructions provided in this topic below this point are for the original topic starter only. Even if you have similar problems or log entries to those given here, please do not follow the directions, especially those involving specific tools and scripts. Doing so can result in serious damage to your computer. Instead, please start your own topic. Feel free to link to any relevant topics as needed.

#3 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:27 PM

Posted 17 November 2008 - 12:01 PM

Hello.

There had been no reply from the topic starter in 5 days. Due to inactivity, this topic is now closed.
If you are the topic starter and need this topic reopened, send me a message.

Everyone else, please begin a new topic.

With Regards,
The Panda

#4 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:27 PM

Posted 09 December 2008 - 05:35 AM

Hallo Panda!

I am very encouraged to read that you will help me if you can. However, the computer that was in question was a friends and I would have probably made some profit out of it. I have already backed up and formatted my personal computer, but I lost all .doc's, .xls', .pdf's and .exe's to the virus. The rate at which it spreads is unbelievable! All of the files where modifed on the same date at the same time! I have been trying to figure out how the virus works and I am beginning to suspect that it is an advanced form of rootkit (a modification of Virus.win32.agent.cb or win32.virut).

If you can tell me what I should read or know in order to repair my Word Documents (like forensics), it would be highly appreciated. If you could point me to some tools that would help me find a trace of this virus (the actual culprit instead of the infected files) I would be so grateful.

Get back to you tomorrow.

Edited by PropagandaPanda, 09 December 2008 - 05:36 AM.


#5 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:27 PM

Posted 11 December 2008 - 12:10 AM

Sorry for the delay. I had lost this topic.

Your best bet to repair infected files would be DrWebCureIt. This tool specifically fixes infected files. It will only work, however, if the files were infected rather than overwritten with a bad file.

As the infection was removed in the format, we cannot find any traces of it anymore.

With Regards,
The Panda

#6 PropagandaPanda

PropagandaPanda


  • Malware Response Team
  • 10,433 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:27 PM

Posted 16 December 2008 - 12:44 AM

Hello.

Since this issue appears to be resolved, this topic is now closed.
If you are the topic starter and need this topic reopened, send me a message.

Everyone else, please begin a new topic.

With Regards,
The Panda




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users