Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Random DLLs + unknown EXEs in system 32

  • This topic is locked This topic is locked
2 replies to this topic

#1 Michael Gemin

Michael Gemin

  • Members
  • 1 posts
  • Local time:07:20 AM

Posted 09 April 2009 - 11:38 PM

Hey Guys,

A couple of days ago, I came across some sort of infection on my XP Home. Not sure how I received it though, it was probably from a website that i'd been on. There are randomly-names dll files in system 32 and also certain 'exe' files also in system 32 which I have never seen before which appear in the task manager (processes), which, when I kill the respective process, can be deleted, but then reappear when I reboot. There are also exe files in the windows TEMP directory, some of which have a random string of numbers for a name. The names of these exes include:


Various dll files:

(other random dll's)

Just a few hours ago, I saved all My Documents and other necessary files onto an external HD and completely recovered my PC to its factory state. I put all my documents etc back in place and after a few reboots from windows updates, the files reappeared again. Leaving me to think that maybe the files stem from those that I trasferred from my external HD?

Before this issue I used Spybot - Search & Destroy, Spyware Blaster, Windows Defender. Even after I deleted the relevant dll and exe entries in HijackThis, they reappeared. Prior to when I recovered/reinstalled my OS, I believe a file, 'VRT1A.tmp', in the windows temp directory, was causing all sorts of trouble with my Services. Also, 'regedit' was disabled through this infection, and using HijackThis to enable it, I found that the filepath of most of the services were redirected to this .tmp file. Using regedit, I changed some of the crucial services back to their original state, eg svchost etc. This seemed to fix things up a tiny bit. But there were still many void services. This, plus other stupid things on my computer, led me to reinstall my OS. Now, the problem is back again. By the way, there is barely any software installed on my computer due to the fact that I just reinstalled.

Any prompt help would be greatly appreciated.



DDS (Ver_09-03-16.01) - NTFSx86
Run by Michael Gemin at 13:47:55.95 on Fri 10/04/2009
Internet Explorer: 6.0.2800.1106
Microsoft Windows XP Home Edition 5.1.2600.1.1252.61.1033.18.1279.924 [GMT 10:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe C:\WINDOWS\TEMP\VRT1A.tmp
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\3361\SVCHOST.exe -sysrun
C:\Documents and Settings\Michael Gxxxx\Desktop\Anti-Virus Software\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com.au/
uWindow Title = Packard Bell
BHO: c:\windows\system32\ds43g4nfjkn93.dll: {d5bf49a0-94f3-42bd-f434-3604812c8955} - c:\windows\system32\ds43g4nfjkn93.dll
EB: Media Band: {32683183-48a0-441b-a342-7c2a440a9478} - %SystemRoot%\System32\browseui.dll
uRun: [Sonic RecordNow!]
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Diagnostic Manager] c:\docume~1\michae~1\locals~1\temp\2441637504.exe
mRun: [ATIPTA] c:\ati technologies\ati control panel\atiptaxx.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [ACTIVBOARD] c:\apps\aboard\ABoard.exe
mRun: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe"
mRunOnce: [svchost.exe] "c:\windows\system32\3361\SVCHOST.exe"
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
dRun: [<NO NAME>] c:\windows\temp\esh3twml.exe
dRun: [Windows Resurections] c:\windows\temp\esh3twml.exe
dRun: [Diagnostic Manager] c:\windows\temp\2980856254.exe
uPolicies-explorer: NoFolderOptions = 1 (0x1)
dPolicies-explorer: NoFolderOptions = 1 (0x1)
dPolicies-system: DisableRegistryTools = 1 (0x1)
IE: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1239331127484
Notify: AtiExtEvent - Ati2evxx.dll
STS: c:\windows\system32\ds43g4nfjkn93.dll: {d5bf49a0-94f3-42bd-f434-3604812c8955} - c:\windows\system32\ds43g4nfjkn93.dll

============= SERVICES / DRIVERS ===============

R1 Asapi;Asapi;c:\windows\system32\drivers\asapi.sys [2004-5-5 11264]
R2 afisicx;afisicx Service;c:\windows\system32\afisicx.exe [2002-8-29 192000]
R2 DhcpSrv;Dhcp server;c:\windows\dhcp\svchost.exe [2009-4-10 253952]
R3 STAC97NA;SigmaTel 3D Environmental Audio;c:\windows\system32\drivers\stac97na.sys [1980-1-1 296179]
R3 STAC97NH;STAC97NH;c:\windows\system32\drivers\stac97nh.sys [1980-1-1 231983]
S2 sopidkc;sopidkc Service;c:\windows\system32\sopidkc.exe [2002-8-29 193024]
S2 tdctxte;tdctxte Service;c:\windows\system32\tdctxte.exe [2002-8-29 193024]
S3 at1394;at1394;c:\windows\system32\at1394.sys [2003-6-21 2304]

=============== Created Last 30 ================

2009-04-10 13:36 <DIR> --d----- C:\VundoFix Backups
2009-04-10 13:21 <DIR> --d----- c:\windows\system32\3361
2009-04-10 13:21 108,336 a------- c:\windows\system32\MSWINSCK.OCX
2009-04-10 13:21 <DIR> --d----- c:\windows\dhcp
2009-04-10 13:21 231,936 a------- c:\windows\system32\w.exe
2009-04-10 13:21 8 a------- c:\windows\system32\comsa32.sys
2009-04-10 13:21 15,000 a------- c:\windows\system32\ds43g4nfjkn93.dll
2009-04-10 13:21 40,960 a------- c:\windows\system32\stu2.exe
2009-04-10 13:21 1 a------- c:\windows\system32\1F.tmp
2009-04-10 13:20 84 a------- c:\windows\system32\1B.tmp
2009-04-10 12:55 <DIR> --d----- c:\windows\Logs
2009-04-10 12:55 <DIR> --d-h--- c:\windows\msdownld.tmp
2009-04-10 12:46 <DIR> --d----- c:\windows\system32\PreInstall
2009-04-10 12:46 22,752 a------- c:\windows\system32\spupdsvc.exe
2009-04-10 12:46 <DIR> --d-h--- c:\windows\$hf_mig$
2009-04-10 12:44 <DIR> --d----- C:\OEMCUST
2009-04-10 12:43 <DIR> --d----- c:\program files\ATI Technologies
2009-04-10 12:43 <DIR> --d----- c:\windows\system32\bits
2009-04-10 12:42 331,776 a------- c:\windows\system32\winhttp.dll
2009-04-10 12:42 17,408 a------- c:\windows\system32\qmgrprxy.dll
2009-04-10 12:42 158,720 -------- c:\windows\system32\xpob2res.dll
2009-04-10 12:42 7,680 -------- c:\windows\system32\dllcache\bitsprx2.dll
2009-04-10 12:42 7,680 -------- c:\windows\system32\bitsprx2.dll
2009-04-10 12:42 7,168 -------- c:\windows\system32\dllcache\bitsprx3.dll
2009-04-10 12:42 7,168 -------- c:\windows\system32\bitsprx3.dll
2009-04-10 12:41 <DIR> --d----- C:\ATI
2009-04-10 12:38 <DIR> --ds---- c:\documents and settings\michael gxxxx\UserData
2009-04-10 12:37 <DIR> --d----- c:\windows\system32\SoftwareDistribution
2009-04-10 12:35 213,528 a------- c:\windows\system32\wuaucpl.cpl
2009-04-10 12:35 186,136 a------- c:\windows\system32\wuaueng1.dll
2009-04-10 12:35 167,704 a------- c:\windows\system32\wuauclt1.exe
2009-04-10 12:28 21,760 a------- c:\windows\system32\dllcache\usbstor.sys
2009-04-10 12:24 <DIR> --d----- c:\documents and settings\michael gemin\WINDOWS
2009-04-10 12:24 <DIR> --d----- c:\documents and settings\Michael Gemin
2009-04-10 12:18 8,192 a------- c:\windows\REGLOCS.OLD
2009-04-10 12:18 12,160 a------- c:\windows\system32\drivers\mouhid.sys

==================== Find3M ====================

2009-04-10 13:21 125,849 a------- c:\windows\system32\userinit.exe
2009-02-06 12:35 1,486,208 a------- c:\windows\system32\SET10.tmp

============= FINISH: 13:48:04.34 ===============

Attached Files

BC AdBot (Login to Remove)


#2 Buckeye_Sam


    Malware Expert

  • Members
  • 17,382 posts
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:04:20 PM

Posted 11 April 2009 - 09:46 AM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I may ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.

Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.

Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


#3 Buckeye_Sam


    Malware Expert

  • Members
  • 17,382 posts
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:04:20 PM

Posted 28 April 2009 - 04:53 PM

As there has been no response, this thread will now be closed.

If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.

Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users