Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Persistent trojan infection


  • This topic is locked This topic is locked
2 replies to this topic

#1 Bataille

Bataille

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:28 AM

Posted 15 June 2009 - 07:28 PM

Initial symptoms were the redirection of google searches to sites including Britannia search, and USB pen drives not being detected. Since then performance of computer has decreased, and occasionally it reboots of its own accord. Tried numerous antimalware programs- Spybot, Ad-aware, AVG, Malwarebytes, DrWeb all of which found some Trojans, including TDSS and Virtuamonde, but did not fix the problem. Ran Rootkit Repeal last night and located:

C:\WINDOWS\system32\drivers\ovfsthcpdcbqfqbafdxubvxtfwuyvmtahforik.sys

Which I removed. Also ran combofix on spec which removed a desktop.ini file. Help with the log would be appreciated. This has since solved the USB problem but computer is still slow and being redirected.

DDS (Ver_09-05-14.01) - FAT32x86
Run by User at 1:07:07.78 on 16/06/2009
Internet Explorer: 6.0.2900.5512
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.383.156 [GMT 1:00]

AV: AVG Anti-Virus Free *On-access scanning enabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
SVCHOST.EXE
C:\WINDOWS\System32\svchost.exe -k netsvcs
SVCHOST.EXE
SVCHOST.EXE
C:\WINDOWS\system32\spoolsv.exe
SVCHOST.EXE
C:\WINDOWS\Explorer.EXE
D:\Program Files\PeerGuardian2\pg2.exe
C:\WINDOWS\system32\devldr32.exe
D:\Program Files\SBSD\TeaTimer.exe
D:\Program Files\AVG\AVG8\avgcsrvx.exe
D:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Program Files\Mozilla Firefox\firefox.exe
D:\PROGRA~1\AVG\AVG8\avgrsx.exe
D:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\Documents and Settings\User\Desktop\dds.scr

============== Pseudo HJT Report ===============

uLocal Page = hxxp://www.google.com/
uStart Page = hxxp://www.google.co.uk/
mLocal Page = hxxp://www.google.com/
mStart Page = hxxp://www.google.com/
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 6.0\reader\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - d:\program files\avg\avg8\avgssie.dll
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - d:\progra~1\sbsd\SDHelper.dll
uRun: [PeerGuardian] d:\program files\peerguardian2\pg2.exe
uRun: [SpybotSD TeaTimer] d:\program files\sbsd\TeaTimer.exe
mRun: [AVG8_TRAY] d:\progra~1\avg\avg8\avgtray.exe
mRunOnce: [Malwarebytes' Anti-Malware] d:\program files\mbam\mbamgui.exe /install /silent
mRunOnce: [Malwarebytes Anti-Malware (reboot)] "d:\program files\mbam\mbam1.exe" /runcleanupscript
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - d:\progra~1\sbsd\SDHelper.dll
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1152709304125
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - d:\program files\avg\avg8\avgpp.dll
Notify: avgrsstarter - avgrsstx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\user\applic~1\mozilla\firefox\profiles\oyeezw0q.default\
FF - prefs.js: browser.startup.homepage - www.bbc.co.uk/news
FF - plugin: c:\program files\unity\webplayer\loader\npUnity3D32.dll
FF - plugin: d:\program filles\netscape6\nppl3260.dll
FF - plugin: d:\program filles\netscape6\nprjplug.dll
FF - plugin: d:\program filles\netscape6\nprpjplug.dll

============= SERVICES / DRIVERS ===============

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [2009-6-15 327688]
R1 AvgMfx86;AVG Free On-access Scanner Minifilter Driver x86;c:\windows\system32\drivers\avgmfx86.sys [2009-6-15 27784]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [2009-6-15 108552]
R2 avg8wd;AVG Free8 WatchDog;d:\progra~1\avg\avg8\avgwdsvc.exe [2009-6-15 298776]
S3 DLKRTS;D-Link DFE-538TX 10/100 Adapter;c:\windows\system32\drivers\DLKRTS.SYS [2006-7-20 45568]

=============== Created Last 30 ================

2009-06-15 22:23 <DIR> --d----- c:\documents and settings\user\DoctorWeb
2009-06-15 22:19 327,688 a------- c:\windows\system32\drivers\avgldx86.sys
2009-06-15 22:19 108,552 a------- c:\windows\system32\drivers\avgtdix.sys
2009-06-15 22:19 11,952 a------- c:\windows\system32\avgrsstx.dll
2009-06-15 22:19 <DIR> --d----- c:\windows\system32\drivers\Avg
2009-06-15 22:19 <DIR> --d----- c:\program files\AVG
2009-06-15 21:11 40,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-15 21:11 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-06-15 20:18 <DIR> a-dshr-- C:\cmdcons
2009-06-15 20:17 161,792 a------- c:\windows\SWREG.exe
2009-06-15 20:17 155,136 a------- c:\windows\PEV.exe
2009-06-15 20:17 98,816 a------- c:\windows\sed.exe
2009-06-15 20:17 389,120 a------- c:\windows\system32\CF32305.exe
2009-06-15 16:31 <DIR> --dsh--- C:\FOUND.000
2009-06-11 03:03 118 a------- c:\windows\system32\MRT.INI
2009-06-10 02:53 <DIR> --d----- c:\docume~1\user\applic~1\Malwarebytes
2009-06-10 02:53 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-05-26 21:29 <DIR> --d----- c:\program files\common files\xing shared
2009-05-26 21:29 <DIR> --d----- c:\program files\common files\Real
2009-05-21 14:44 <DIR> --d----- C:\VundoFix Backups
2009-05-21 13:47 <DIR> --d----- c:\program files\Lavasoft
2009-05-19 21:50 <DIR> --d----- c:\docume~1\alluse~1\applic~1\avg8
2009-05-19 21:47 <DIR> --d----- c:\windows\system32\appmgmt
2009-05-19 18:08 <DIR> --d----- c:\windows\system32\NtmsData
2009-05-19 09:17 882 a------- c:\windows\wininit.ini
2009-05-18 23:14 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Spybot - Search & Destroy
2009-05-18 21:40 <DIR> --d----- c:\windows\pss
2009-05-18 21:35 21,504 a------- c:\windows\system32\hidserv.dll
2009-05-18 21:35 21,504 a------- c:\windows\system32\dllcache\hidserv.dll
2009-05-18 21:35 14,592 a---h--- c:\windows\system32\drivers\kbdhid.sys
2009-05-18 21:35 14,592 a------- c:\windows\system32\dllcache\kbdhid.sys
2009-05-18 21:35 32,128 a---h--- c:\windows\system32\drivers\usbccgp.sys
2009-05-18 21:35 32,128 a------- c:\windows\system32\dllcache\usbccgp.sys

==================== Find3M ====================

2009-05-08 19:18 86,327 a------- c:\windows\pchealth\helpctr\offlinecache\index.dat
2009-05-07 16:32 345,600 a------- c:\windows\system32\localspl.dll
2009-05-07 16:32 345,600 -------- c:\windows\system32\dllcache\localspl.dll
2009-04-29 05:46 3,068,928 -------- c:\windows\system32\dllcache\mshtml.dll
2009-04-29 05:46 666,624 a------- c:\windows\system32\wininet.dll
2009-04-29 05:46 666,624 -------- c:\windows\system32\dllcache\wininet.dll
2009-04-29 05:46 620,032 -------- c:\windows\system32\dllcache\urlmon.dll
2009-04-29 05:46 81,920 a------- c:\windows\system32\ieencode.dll
2009-04-29 05:46 1,499,136 -------- c:\windows\system32\dllcache\shdocvw.dll
2009-04-29 05:46 81,920 -------- c:\windows\system32\dllcache\ieencode.dll
2009-04-17 13:26 1,847,168 a------- c:\windows\system32\win32k.sys
2009-04-17 13:26 1,847,168 -------- c:\windows\system32\dllcache\win32k.sys
2009-04-15 15:51 585,216 a------- c:\windows\system32\rpcrt4.dll
2009-04-15 15:51 585,216 -------- c:\windows\system32\dllcache\rpcrt4.dll
2009-03-21 15:06 989,696 -------- c:\windows\system32\dllcache\kernel32.dll

============= FINISH: 1:08:10.92 ===============

Attached Files

  • Attached File  DDS.txt   6.76KB   0 downloads


BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:28 AM

Posted 16 June 2009 - 09:59 AM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.


We need to create an OTL Report
  • Please download OTL from here
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the "Run Scan" button.
  • The scan should take just a few minutes.
  • Copy the log that opens up and paste it back here in your next reply.



=============


The next log will show us any hidden files that are present.

Download GMER from here:
  • Unzip it to the desktop.
  • Open the program and click on the Rootkit tab.
  • Make sure all the boxes on the right of the screen are checked, EXCEPT for ‘Show All’.
  • Click on Scan.
  • When the scan has run click Copy and paste the results (if any) into this thread.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:05:28 AM

Posted 23 June 2009 - 02:13 PM

As there has been no response, this thread will now be closed.

If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you.
Include the address of this thread in your request.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users