Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


2 TrojanDroppers / autorun.inf & yfmqo.cmd files regenerate / loss of msconfig and folder options control

  • This topic is locked This topic is locked
3 replies to this topic

#1 FrankCastleArizona


  • Members
  • 9 posts
  • Local time:07:03 AM

Posted 05 February 2009 - 12:54 AM

I did a fresh install of XP Home on Feb 1st and I believe I was infected from a hidden autoloading trojan dropper from one of my other drives.
I had plugged an external drive in order to copy over my ethernet driver downloaded from another computer so I could continue updating thru the net.
Since then I've yet to find the originating source of the trojan dropper. I've only found where the trojans are dropped.
Finding and getting rid of the source problem files is difficult for me because I have 4 internal drives and 4 external drives (not all hooked up right now of course) not including things categorized as removable media such as a SD card with card reader from my camera and my PSP.

My issues:

Trojan.Dropper/Multi-MBAD (dropping URET463.EXE in system32 - cannot find originating files)
Trojan.Dropper/Sys-NV (dropping GODERT0.DLL in system32 - cannot find originating files)
autorun.inf files (recreating themselves on internal and external drives)
yfmqo.cmd (recreating themselves on internal and external drives)
Loss of Folder Options control with ability to see hidden files/folders (occasionally fixed this problem with a scan or two but would return)
Loss of msconfig control with ability to apply changes (Automatically rechecked on restart despite System Restore turned off)

What I've tried: (Scanning in SafeMode/RegularMode - System Restore On/Off - Installed Individually/WorkingTogether)

SuperAntiSpyware (Scanning in SafeMode/RegularMode - System Restore On/Off - Definations fully updated in Safe Mode)
Spybot (Scanning in SafeMode/RegularMode - System Restore On/Off - Definations fully updated in Safe Mode)
Malware Bytes (Scanning in SafeMode/RegularMode - System Restore On/Off - Definations fully updated in Safe Mode)
Ad-Aware (Scanning in SafeMode/RegularMode - System Restore On/Off - Definations fully updated in Safe Mode)
ComboFix (Mainly to remove autorun.inf and yfmqo.cmd files from drives)

Attached File  fkup.JPG   207.74KB   12 downloads


DDS (Ver_09-02-01.01) - NTFSx86
Run by Frank at 22:41:22.67 on Wed 02/04/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.2047.1693 [GMT -7:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Documents and Settings\Frank\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = google.com
uRun: [SUPERAntiSpyware] c:\program files\superantispyware\SUPERAntiSpyware.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [SoundMan] SOUNDMAN.EXE
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL

============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-1-15 8944]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-1-15 55024]
R3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-1-15 7408]
R3 TarFltr;Razer Tarantula USB Keyboard;c:\windows\system32\drivers\UsbFltr.sys [2007-4-11 45440]

=============== Created Last 30 ================

2009-02-04 20:06 <DIR> --d----- C:\ComboFix
2009-02-03 22:46 <DIR> a-dshr-- C:\cmdcons
2009-02-03 22:45 161,792 a------- c:\windows\SWREG.exe
2009-02-03 22:45 98,816 a------- c:\windows\sed.exe
2009-02-03 21:59 81,408 ---shr-- c:\windows\system32\godert1.dll
2009-02-03 21:58 106,803 ---shr-- C:\9b8kmipy.com
2009-02-03 17:35 <DIR> --d----- c:\windows\pss
2009-02-02 20:31 108,207 ---shr-- c:\windows\system32\kacsde.exe
2009-02-02 20:31 129,536 ---shr-- c:\windows\system32\lhgjyit0.dll
2009-02-02 17:20 <DIR> --d----- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-02-02 17:18 <DIR> --d----- c:\program files\SUPERAntiSpyware
2009-02-02 17:18 <DIR> --d----- c:\docume~1\frank\applic~1\SUPERAntiSpyware.com
2009-02-02 17:18 <DIR> --d----- c:\program files\common files\Wise Installation Wizard
2009-02-02 16:49 <DIR> --d----- c:\docume~1\frank\applic~1\Malwarebytes
2009-02-02 16:49 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-02-02 16:12 <DIR> --d----- c:\program files\Lavasoft
2009-02-02 15:43 <DIR> --d----- C:\Autoruns
2009-02-02 15:05 <DIR> --d----- c:\program files\Spybot - Search & Destroy
2009-02-02 15:05 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-02-02 11:02 <DIR> --d----- c:\windows\system32\XPSViewer
2009-02-02 11:01 1,676,288 -c------ c:\windows\system32\dllcache\xpssvcs.dll
2009-02-02 11:01 597,504 -c------ c:\windows\system32\dllcache\printfilterpipelinesvc.exe
2009-02-02 11:01 575,488 -c------ c:\windows\system32\dllcache\xpsshhdr.dll
2009-02-02 11:01 89,088 -c------ c:\windows\system32\dllcache\filterpipelineprintproc.dll
2009-02-02 11:01 1,676,288 -------- c:\windows\system32\xpssvcs.dll
2009-02-02 11:01 575,488 -------- c:\windows\system32\xpsshhdr.dll
2009-02-02 11:01 117,760 -------- c:\windows\system32\prntvpt.dll
2009-02-02 11:01 <DIR> --d----- C:\7b93c22b16b2da20236c5f95
2009-02-02 10:57 <DIR> --d----- c:\docume~1\frank\applic~1\Windows Desktop Search
2009-02-02 10:56 <DIR> --d----- c:\windows\system32\GroupPolicy
2009-02-02 10:56 <DIR> --d----- c:\program files\Windows Desktop Search
2009-02-02 10:55 <DIR> --d----- c:\program files\Windows Media Connect 2
2009-02-02 10:54 <DIR> --d----- c:\windows\system32\LogFiles
2009-02-02 10:52 <DIR> --d----- c:\windows\system32\URTTemp
2009-02-02 01:11 455,296 -c------ c:\windows\system32\dllcache\mrxsmb.sys
2009-02-02 01:11 2,145,280 -c------ c:\windows\system32\dllcache\ntkrnlmp.exe
2009-02-02 01:11 2,189,184 -c------ c:\windows\system32\dllcache\ntoskrnl.exe
2009-02-02 01:11 2,023,936 -c------ c:\windows\system32\dllcache\ntkrpamp.exe
2009-02-02 01:11 2,066,048 -c------ c:\windows\system32\dllcache\ntkrnlpa.exe
2009-02-02 01:10 272,128 -c------ c:\windows\system32\dllcache\bthport.sys
2009-02-02 01:10 272,128 -------- c:\windows\system32\drivers\bthport.sys
2009-02-02 01:08 26,488 a------- c:\windows\system32\spupdsvc.exe
2009-02-02 01:08 <DIR> --d----- c:\windows\system32\PreInstall
2009-02-02 01:08 <DIR> --d-h--- c:\windows\$hf_mig$
2009-02-02 01:07 <DIR> --dsh--- c:\documents and settings\frank\UserData
2009-02-02 01:07 2,422 a------- c:\windows\system32\wpa.bak
2009-02-02 00:55 <DIR> --d----- c:\windows\system32\SoftwareDistribution
2009-02-02 00:29 0 a------- c:\windows\ativpsrm.bin
2009-02-02 00:24 593,920 -------- c:\windows\system32\ati2sgag.exe
2009-02-02 00:24 <DIR> --d----- c:\program files\ATI Technologies
2009-02-02 00:23 <DIR> --d----- C:\ATI
2009-02-02 00:17 <DIR> --d----- c:\windows\OPTIONS
2009-02-02 00:17 <DIR> --d----- c:\program files\Realtek
2009-02-02 00:11 146,048 ac------ c:\windows\system32\dllcache\portcls.sys
2009-02-02 00:11 <DIR> --d----- c:\program files\Realtek Sound Manager
2009-02-02 00:11 <DIR> --d----- c:\program files\AvRack
2009-02-02 00:11 <DIR> --d----- c:\program files\Realtek AC97
2009-02-01 23:49 <DIR> --d----- c:\windows\system32\ReinstallBackups
2009-02-01 23:49 53,248 a------- c:\windows\system32\CSVer.dll
2009-02-01 23:49 <DIR> --d----- C:\Intel
2009-02-01 23:42 26,368 ac------ c:\windows\system32\dllcache\usbstor.sys
2009-02-01 23:17 <DIR> --d----- c:\documents and settings\Frank
2009-02-01 22:47 <DIR> --ds---- c:\windows\system32\Microsoft
2009-02-01 22:47 8,192 a------- c:\windows\REGLOCS.OLD
2009-02-01 22:45 456,192 ac------ c:\windows\system32\dllcache\smtpsvc.dll
2009-02-01 22:44 186,402 ac------ c:\windows\system32\dllcache\c_20001.nls
2009-02-01 22:43 <DIR> --dsh--- c:\documents and settings\all users\DRM
2009-02-01 22:42 488 a---hr-- c:\windows\system32\WindowsLogon.manifest
2009-02-01 22:42 488 a---hr-- c:\windows\system32\logonui.exe.manifest
2009-02-01 22:42 <DIR> --ds---- c:\windows\Downloaded Program Files
2009-02-01 22:42 <DIR> --d--r-- c:\windows\Offline Web Pages
2009-02-01 22:42 749 a---hr-- c:\windows\WindowsShell.Manifest
2009-02-01 22:42 749 a---hr-- c:\windows\system32\wuaucpl.cpl.manifest
2009-02-01 22:42 749 a---hr-- c:\windows\system32\sapi.cpl.manifest
2009-02-01 22:42 749 a---hr-- c:\windows\system32\nwc.cpl.manifest
2009-02-01 22:42 749 a---hr-- c:\windows\system32\ncpa.cpl.manifest
2009-02-01 22:42 749 a---hr-- c:\windows\system32\cdplayer.exe.manifest
2009-02-01 22:42 <DIR> --d-h--- c:\program files\WindowsUpdate
2009-02-01 22:42 4,399,505 ac------ c:\windows\system32\dllcache\nls302en.lex
2009-02-01 22:42 <DIR> --d----- c:\windows\system32\DirectX
2009-02-01 22:41 <DIR> --d----- c:\program files\common files\MSSoap
2009-02-01 22:39 <DIR> --d----- c:\program files\Online Services
2009-02-01 22:38 <DIR> --d----- c:\program files\Messenger
2009-02-01 22:38 <DIR> --d----- c:\program files\MSN Gaming Zone
2009-02-01 22:37 <DIR> --d----- c:\program files\Windows NT
2009-02-01 15:16 <DIR> --d----- c:\program files\common files\ODBC
2009-02-01 15:16 <DIR> --d----- c:\program files\common files\SpeechEngines
2009-02-01 15:16 <DIR> --d--r-- c:\documents and settings\all users\Documents

==================== Find3M ====================

2009-02-02 22:49 76,487 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2009-02-01 22:40 21,640 a------- c:\windows\system32\emptyregdb.dat
2009-01-14 00:14 3,455,488 a------- c:\windows\system32\drivers\ati2mtag.sys
2009-01-13 22:46 11,591,680 a------- c:\windows\system32\atioglxx.dll
2009-01-13 21:53 286,720 a------- c:\windows\system32\atiok3x2.dll
2009-01-13 21:49 425,984 a------- c:\windows\system32\ATIDEMGX.dll
2009-01-13 21:47 323,584 a------- c:\windows\system32\ati2dvag.dll
2009-01-13 21:36 196,608 a------- c:\windows\system32\atipdlxx.dll
2009-01-13 21:36 151,552 a------- c:\windows\system32\Oemdspif.dll
2009-01-13 21:36 26,112 a------- c:\windows\system32\Ati2mdxx.exe
2009-01-13 21:35 43,520 a------- c:\windows\system32\ati2edxx.dll
2009-01-13 21:35 155,648 a------- c:\windows\system32\ati2evxx.dll
2009-01-13 21:34 598,016 a------- c:\windows\system32\ati2evxx.exe
2009-01-13 21:32 53,248 a------- c:\windows\system32\ATIDDC.DLL
2009-01-13 21:22 4,009,152 a------- c:\windows\system32\ati3duag.dll
2009-01-13 21:05 2,500,224 a------- c:\windows\system32\ativvaxx.dll
2009-01-13 21:05 3,107,788 a------- c:\windows\system32\ativvaxx.dat
2009-01-13 21:05 3,107,788 a------- c:\windows\system32\ativva5x.dat
2009-01-13 21:05 887,724 a------- c:\windows\system32\ativva6x.dat
2009-01-13 20:50 48,640 a------- c:\windows\system32\amdpcom32.dll
2009-01-13 20:45 401,408 a------- c:\windows\system32\atikvmag.dll
2009-01-13 20:44 110,592 a------- c:\windows\system32\atiadlxx.dll
2009-01-13 20:44 17,408 a------- c:\windows\system32\atitvo32.dll
2009-01-13 20:43 53,248 a------- c:\windows\system32\drivers\ati2erec.dll
2009-01-13 20:37 307,200 a------- c:\windows\system32\atiiiexx.dll
2009-01-13 20:37 577,536 a------- c:\windows\system32\ati2cqag.dll
2009-01-13 19:36 45,056 a------- c:\windows\system32\amdcalrt.dll
2009-01-13 19:36 45,056 a------- c:\windows\system32\amdcalcl.dll
2009-01-13 19:34 3,227,648 a------- c:\windows\system32\Amdcaldd.dll
2009-01-12 10:45 73,728 a------- c:\windows\system32\RtNicProp32.dll
2008-12-11 03:57 333,952 a------- c:\windows\system32\drivers\srv.sys

============= FINISH: 22:41:45.60 ===============


Attached File  Attach.txt   7.56KB   27 downloads


Please and Thank You

BC AdBot (Login to Remove)


#2 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:03 AM

Posted 14 February 2009 - 11:15 AM


My name is Extremeboy (or EB for short), and I will be helping you with your log.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine. If you have not done so, include a description of your problem, along with any steps you may have performed so far.

If you do not make a reply in 5 days, we will need to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the Posted Image button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.

Install Recovery Console and Run ComboFix

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
Link 3
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.

Note: Please Do NOT mouseclick combofix's window while its running because it may call it to stall.

Download and Run FlashDisinfector
  • Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as well.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: Flash_Disinfector will create a hidden file named autorun.inf in each partition and every USB drive plugged in when you ran it. Don't delete this folder. It will help protect your drives from future infection.

Download and Run Scan with GMER

We will use GMER to scan for rootkits.
  • Download gmer.zip and save to your desktop.
    Alternate Download Site 1
    Alternate Download Site 2
  • Unzip/extract the file to its own folder. (Click here for information on how to do this if not sure. Win 2000 users click here.
  • When you have done this, disconnect from the Internet and close all running programs.
    There is a small chance this application may crash your computer so save any work you have open.
  • Double-click on Gmer.exe to start the program.
  • Allow the gmer.sys driver to load if asked.
  • If it gives you a warning at program start about rootkit activity and asks if you want to run a scan...click NO.
  • Click the >>>
  • Click on Settings, then check the first five settings:
    • System Protection and Tracing
    • Processes
    • Save created processes to the log
    • Drivers
    • Save loaded drivers to the log
  • You will be prompted to restart your computer. Please do so.
After the reboot, run Gmer again and click on the Rootkit tab.
  • Look at the right hand side (under Files) and uncheck all drives with the exception of your C drive.
  • Make sure all other boxes on the right of the screen are checked, EXCEPT for Show All.
  • Click on the Scan and wait for the scan to finish.
    Note: Before scanning, make sure all other running programs are closed and no other actions like a scheduled antivirus scan will occur while this scan completes. Also do not use your computer during the scan. You will know that the scan is done when the Stop buttons turns back to Scan.
  • When completed, click on the Copy button and right-click on your Desktop, choose New>Text document. Once the file is created, open it and right-click again and choose Paste. Save the file as gmer.txt and copy the information in your next reply.
Important!:Please do not select the Show all checkbox during the scan..

Post back with:
-Combofix log
-GMER log
-New Hijackthis log
-Description of any problem you still have

With Regards,
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#3 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:03 AM

Posted 17 February 2009 - 08:43 PM


Are you still there?

If you are please follow the instructions in my previous post.

If you still need help, follow the instructions I have given in my response. If you have since had your problem solved, we would appreciate you letting us know so we can close the topic.

Please reply back telling us so. If you don't reply within 5-7 days the topic will need to be closed.

Thanks for understanding. :thumbup2:

With Regards,
Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

#4 extremeboy


  • Malware Response Team
  • 12,975 posts
  • Gender:Male
  • Local time:10:03 AM

Posted 19 February 2009 - 05:26 PM


Due to Lack of feedback, this topic is now Closed.

If you need this topic reopened, please Send Me a Message. In your message please include the address of this thread in your request.
This applies only to the original topic starter.

Everyone else please start a new topic in the Hijackthis-Malware Removal forum.

With Regards,

Note: Please do not PM me asking for help, instead please post it in the correct forum requesting for help. Help requests via the PM system will be ignored.

If I'm helping you and I don't reply within 48 hours please feel free to send me a PM.

The help you receive here is always free but if you wish to show your appreciation, you may wish to Posted Image.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users