Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Win32:Monder-GB[Trj], Win32:Trojan-gen{Other}, Adware.PopCap, Trojan.Vundo, Trojan.Agent and more


  • This topic is locked This topic is locked
6 replies to this topic

#1 Lex H

Lex H

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:10:24 AM

Posted 05 January 2009 - 01:45 AM

Hi, I’m a newbie and this is my first post. Thanks ahead of time for existing and for helping me!

My computer is an HP,AMD Athlon 64x2, 1.0GB RAM, WIN XPsp2 desktop with lots of virus/Trojan/adware/malware


Not sure where they all came from but the surfing the web for fantasy football stuff yesterday morning and landing on www.athlonsports.[com] or www.grogansports.[com] was the final virus that started me crashing and generating the wonderful “Error Message: Stop c000021a {Fatal System Error} The Session Manager Initialization System Process…’

After failing to reboot multiple times and not being able to use my XP recovery disks, the computer loaded up somehow in Normal Mode. I disconnected from the Internet and I ran Avast! Antivirus before it crashed again and it found the following virus/etc.

Found by Avast! Antivirus
JS:Redirector-B[Trj] in a temporary internet file
WMA:Wimad[Drp] in a temporary internet file
Win32:Monder-GB[Trj]” in “c:windows\system32\opnmlccs.dll” file
“Win32:Trojan-gen{Other}” in “c:\Windows\system32\prunnet.exe” file
“Win32:adware-gen[Adw]” in a program that came with computer that I’ve never used: C:\program files\online services\peoplepc\isp5900\branding\ppal3ppc.exe\$instdir\ppcttoolbar.dll

I deleted/quarantined those viruses and tried to do a system restore to a couple days before and it wouldn't let me do it although I had just saved a system restore on 12/31. And the computer was clearly still not functioning completely normal.

I also ran CCleaner (I had just downloaded and installed 2 days ago) a couple times and deleted the registry junk and temporary files on my computer....

Using a separate laptop I found your website and this link in particular and started following the initial stages of this posting:
http://www.bleepingcomputer.com/forums/lof...hp/t191898.html

I ran quick scan of Malwarebytes' Anti-Malware 1.31 (updated the definitions by downloading the update file separately and running it) and found some more virus/etc (see log pasted below) and deleted those, one of which needed a reboot.

Then I ran quick scan of SUPERAntiSpyware in Normal Mode and found 2 more virus (see log pasted below) and told it to delete them and now I’m in the midst of running a complete scan of SUPERAntiSpyware in Safe Mode while I’m posting this message. I will post the log of the complete scan when its finished in the morning. (EST).

I used a separate laptop to post this message and to download all the software used in the post above and some but not all of the software recommended in this posting: http://www.bleepingcomputer.com/forums/topic3616.html I used a memory stick to transfer them to the infected compute which is still disconnected from the Internet.

Given that a few of the viruses affected system files, i'm worried that even after I run all these virus/malware/trojan/etc cleaners/removers/etc that my computer still won't run well. Also, the data on my harddrive is not backed-up in awhile including lots of digital photos for which my wife will castrate me if I lose them....I have an external HD for backup but I haven't copied over files since the crashing began as I was afraid i would transfer a virus to my backup HD.

Thanks again for any help that's coming. much, much, much appreciated..


Malwarebytes' Anti-Malware 1.31
Database version: 1571
Windows 5.1.2600 Service Pack 2

1/4/2009 11:34:04 PM
mbam-log-2009-01-04 (23-34-04).txt

Scan type: Quick Scan
Objects scanned: 58118
Time elapsed: 3 minute(s), 15 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 13
Registry Values Infected: 2
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\c:/windows/downloaded program files/popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c9c5deaf-0a1f-4660-8279-9edfad6fefe1} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e4e3e0f8-cd30-4380-8ce9-b96904bdefca} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{fe8a736f-4124-4d9c-b4b1-3b12381efabe} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{df780f87-ff2b-4df8-92d0-73db16a1543a} (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\popcaploader.popcaploaderctrl2.1 (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpreapp (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\Downloaded Program Files\popcaploader.dll (Adware.PopCap) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\senekaswwxvrow.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\senekalog.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\seneka.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\senekabpjewueq.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rqRHyVmN.dll (Trojan.Vundo) -> Quarantined and deleted successfully.



****************************************


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/05/2009 at 00:32 AM

Application Version : 4.24.1004

Core Rules Database Version : 3688
Trace Rules Database Version: 1664

Scan type : Quick Scan
Total Scan Time : 00:10:43

Memory items scanned : 443
Memory threats detected : 0
Registry items scanned : 537
Registry threats detected : 2
File items scanned : 12211
File threats detected : 0

Unclassified.Unknown Origin
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}

BC AdBot (Login to Remove)

 


#2 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:24 AM

Posted 05 January 2009 - 08:43 AM

Seneka Rootkit

Please read this post by Quietman7

http://www.bleepingcomputer.com/forums/ind...t&p=1074915

and tell us how you want to procede

You might want to procede with a partial cleanup so you can finish backing up those pictures
Chewy

No. Try not. Do... or do not. There is no try.

#3 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:24 AM

Posted 05 January 2009 - 08:58 AM

Well it's finally here, it took me 3 reboots to finally get it updated, I betatest a little

Malwarebytes' Anti-Malware 1.32
Database version: 1617
Windows 5.1.2600 Service Pack 3

1/5/2009 9:02:20 AM
mbam-log-2009-01-05 (09-02-20).txt

Scan type: Quick Scan
Objects scanned: 49883
Time elapsed: 4 minute(s), 35 second(s)


Chewy

No. Try not. Do... or do not. There is no try.

#4 Lex H

Lex H
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:10:24 AM

Posted 05 January 2009 - 11:45 PM

i didn't have a chance to post before work this morning, so sorry for delay.

ok, you officially scared the crap out of me.
DaChew, just to confirm. you are saying I got a Seneka Rootkit virus / backdoor trojan and my computer is pretty much compromised with little hope?

This is my family's only home computer with our entire digitial life on it. I'm connected directly to WebSTAR cable modem with no router using Cablevision 10Mbps cable internet service. I have 1 hard drive with 2 partitions factory installed. C: Drive is main partition. D: drive i think is just a system backup partition. Avast! was running the whole time all this was happening.


a couple other quick questions before going forward

1st, i didn't understand post #3. Was that supposed to be to a differnet thread?

2nd, i'm temporarily using a laptop from work to post here and surf internet and download necessary programs, then using USB memory stick to transfer to infected home computer. Is there anyway for the virus/malware to transfer onto the memory stick and back to my work laptop? the only file i don't delete each time from memory stick is an "autorun.inf" file.

3rd. I have an external HD for backup, connected by USB. I haven't turned it on or backed anything up for a couple months (I know lazy). If i turn it on while its still connected to infected computer what is chance the virus/trojan will transfer to external hard drive. and along the same concept, if i start copying over photos and other personal files to the external hard drive how do I know i'm not copying over the virus/trojan with it?

4th. I disconnected the infected computer from internet after it crashed a couple times in a row, giving me the error:
“Error Message: Stop c000021a {Fatal System Error} The Session Manager Initialization System Process…...." Before it crashed the first time, i was only logged into a fantasy football and couple of other sports websites that have some personal data but no financial data. I'm not sure if there was a chance or not for the trojan to send back any other personal data from HD files before i removed the internet connection. Is there anway for me to check to find out if any data was sent? Does it only capture data as you login to website or open files on HD or can it grab data from an unopened file on HD and send it hackers?

5th. I had 2 files in particular (and lots of previous versions of those files). 1 password protected excel file and 1 Quicken file that had substantial amounts of personal data. Just to be clear, do I have to assume those are compromised?

Reading through your suggested links, i'm pretty sure i'm going to flatten and reinstall XP, but I have to safeily transfer off lots of files first.

Thanks again for your help.
-Lex

#5 DaChew

DaChew

    Visiting Alien


  • Members
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:11:24 AM

Posted 06 January 2009 - 12:44 AM

http://www.bleepingcomputer.com/forums/ind...t&p=1074588

See if you can download the new 1.32 MBAM w/ manual updates

Download and Run FlashDisinfector

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
The utility may ask you to insert your flash drive and/or other removable drives


http://www.bleepingcomputer.com/forums/ind...st&p=913677

this will immunize the usb drive and the clean computer

Edited by DaChew, 06 January 2009 - 12:48 AM.

Chewy

No. Try not. Do... or do not. There is no try.

#6 Lex H

Lex H
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:10:24 AM

Posted 06 January 2009 - 07:30 AM

ok, i'm late for work so here are some updates and i'll be back tonight to proceed

first here is the complete superspybaster scan results (took over 7 hours and found 2 infected files)
and a new quick scan with updated MBAM (no infected files!)

then, I ran flash disenfector from "good" laptop on flash drive - NO ISSUES
finally, i ran MBAM quick scan on "good" laptop and unfortunately it found 1 problem file. log copied at bottom after other 2. does that mean this computer is compromised also?


thanks again, be back late EST. in the meantime, could you answer some of my other question from post #3.
a million thanks.
-lex


**********************************
FROM "INFECTED" HOME COMPUTER

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/06/2009 at 04:00 AM

Application Version : 4.24.1004

Core Rules Database Version : 3688
Trace Rules Database Version: 1664

Scan type : Complete Scan
Total Scan Time : 07:28:23

Memory items scanned : 160
Memory threats detected : 0
Registry items scanned : 7514
Registry threats detected : 2
File items scanned : 107885
File threats detected : 0

Unclassified.Unknown Origin
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}



*****************************************
FROM "INFECTED" HOME COMPUTER

Malwarebytes' Anti-Malware 1.32
Database version: 1616
Windows 5.1.2600 Service Pack 2

1/6/2009 6:47:27 AM
mbam-log-2009-01-06 (06-47-27).txt

Scan type: Quick Scan
Objects scanned: 58766
Time elapsed: 3 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



*************************************
FINALLY HERE's MBAM from "GOOD" WORK LAPTOP (X61 from lenovo, running symantec antivirus, this laptop has had other users and their random temp files and TIE files are still on computer)


1/6/2009 7:10:46 AM
mbam-log-2009-01-06 (07-10-46).txt

Scan type: Quick Scan
Objects scanned: 135178
Time elapsed: 15 minute(s), 27 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMHelp (Hijack.Help) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,995 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:11:24 AM

Posted 11 January 2009 - 12:56 PM

Hello Lex H,

I see that you now have a HiJack This log posted here: http://www.bleepingcomputer.com/forums/t/194290/seneka-rootkit-monder-gb-trojanvundo-adwarepopcap-trojanagent-malwaretrace/ Because you have this log posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

If after 5 days you still have received no response, then post a link to your HJT log in the thread titled "Haven't Had A Reply In Five Days?".

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users