Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Backdoor.Bot Trojan.Spambot Malware Trace stolendata

  • This topic is locked This topic is locked
2 replies to this topic

#1 cpa491


  • Members
  • 1 posts
  • Local time:07:43 AM

Posted 23 June 2009 - 11:03 PM

A few days ago I received an email, suggesting that it dealt with a UPS overnight package that I was expecting. Because I was in fact expecting an overnight package from UPS, I reflexively clicked to view the email, and instantly the damage was down. I was too late in remembering hat I NEVER BEFORE had UPS sent me an email about a shipment I was expecting, especially one with an email address that wasn't of the official UPS website. (I do get UPS shipments frequently).

Once before on another computer, I had used MBAM to help get rid of a trojan, so I installed it on this computer, and ran it 3 times in Windows safe mode, but it wasn't getting rid of the malware.

Using google, I searched for more sophisticated advice and came across a posting on bleepingcomputer.com by Seiroukou who was helped by boopme back on March 14, 2009.

Earlier in the morning, on my first attempt, I followed the instructions from such March 14 2009 post:
1. downloaded ATF cleaner and SUPERAntiSpyware, plus updated SUPERAntispyware as instructed
2. rebooted into safe mode
3. Ran ATF-Cleaner as instructed
4. Scanned with SUPER as instructed (which detected files to delete, which I did)
5. Reran MBAM, which found evidence of the malware names which I have typed in the above Topic Title

At this point, I had to break away because of the demands of my work.

Later in the evening, I started over, re-running steps 1 through 5 above a second time. This time the re-running of SUPER indicated that there were no files to quarantine. But upon rerunning MBAM, it indicated that it had found evidence of the malware names which I have typed in the above Topic Title: Backdoor.bot, Trojan.Spambot, Malware trace, stolendata, plus also in recent days (Rogue Installer, Trojan Fakealert, Trojan Agent, and Hijack userinit.exe, and System32;sdra65.exe)

Needing more expert advice, I decided to take the next step, and followed the process to create HijackThis logs and submit them for review.

I don't get any error message like Seiroukou did per his post of March 14, 2009.

However, when I reboot my machine, certain processes take over, and tie up 100% of my computer resources until I manually delete them. The names are "grpconv.exe" and "proquota.exe" and sometimes "cmd.exe". After I manually delete these processes, my computer returns to normal processing speed.

Not know what to do next, I am submitting the below DDS.txt log, along with an attachment of attach.txt.

I currently only have Windows XP firewall. I use primarily Firefox 3.0.11 for brousing, but also use Internet explorer 7.0.5730.13 when needed. I use Outlook 2007 12.0.6504.5000 for email.

I will not be at this computer again approximately 7 AM on 6/24/09.

Thanks in advance for your help.


DDS (Ver_09-05-14.01) - NTFSx86
Run by dave at 21:46:05.04 on Tue 06/23/2009
Internet Explorer: 7.0.5730.13 BrowserJavaVersion: 1.6.0_13
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1535.1008 [GMT -5:00]

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Lavasoft\Ad-Aware 2007\aawservice.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Program Files\Pervasive Software\PSQL\bin\w3dbsmgr.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\TOSHIBA\TME3\Tmesrv31.exe
C:\Program Files\Logitech\iTouch\iTouch.exe
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\TOSHIBA\TME3\TMERzCtl.EXE
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\Analog Devices\SoundMAX\SMax4PNP.exe
C:\Program Files\TOSHIBA\TOSHIBA Zooming Utility\SmoothView.exe
C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe
C:\Program Files\TOSHIBA\DualPointUtility\TEDTray.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\TOSHIBA\TOSCDSPD\toscdspd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Downloads\HJT DDS\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.btinet.net/
uSearch Page = hxxp://www.google.com
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program

files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: RealPlayer Download and Record Plugin for Internet Explorer:

{3049c3e9-b461-4bc5-8870-4c09146192ca} - c:\program files\real\realplayer\rpbrowserrecordplugin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program

TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
TB: &Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
TB: {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File
uRun: [TOSCDSPD] c:\program files\toshiba\toscdspd\toscdspd.exe
uRun: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
mRun: [zBrowser Launcher] c:\program files\logitech\itouch\iTouch.exe
mRun: [TPSMain] TPSMain.exe
mRun: [TosHKCW.exe] "c:\program files\toshiba\wireless hotkey\TosHKCW.exe"
mRun: [TMESRV.EXE] c:\program files\toshiba\tme3\TMESRV31.EXE /Logon
mRun: [TMESBS.EXE] c:\program files\toshiba\tme3\TMESBS32.EXE /Client
mRun: [TMERzCtl.EXE] c:\program files\toshiba\tme3\TMERzCtl.EXE /Service
mRun: [TFNF5] TFNF5.exe
mRun: [TFncKy] TFncKy.exe
mRun: [TAudEffect] c:\program files\toshiba\taudeffect\TAudEff.exe /run
mRun: [Synchronization Manager] %SystemRoot%\system32\mobsync.exe /logon
mRun: [SoundMAXPnP] c:\program files\analog devices\soundmax\SMax4PNP.exe
mRun: [SoundMAX] c:\program files\analog devices\soundmax\Smax4.exe /tray
mRun: [SmoothView] c:\program files\toshiba\toshiba zooming utility\SmoothView.exe
mRun: [nwiz] nwiz.exe /installquiet /keeploaded /nodetect
mRun: [NVRotateSysTray] rundll32.exe c:\windows\system32\nvsysrot.dll,Enable
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NDSTray.exe] NDSTray.exe
mRun: [MplSetUp] c:\program files\rmclient\MplSetUp.exe
mRun: [Logitech Utility] Logi_MwX.Exe
mRun: [JobHisInit] c:\program files\rmclient\JobHisInit.exe
mRun: [DpUtil] c:\program files\toshiba\dualpointutility\TEDTray.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [00THotkey] c:\windows\system32\00THotkey.exe
mRun: [000StTHK] 000StTHK.exe
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
uPolicies-explorer: DisablePersonalDirChange = 1 (0x1)
uPolicies-system: EnableProfileQuota = 1 (0x1)
mPolicies-explorer: NoWelcomeScreen = 1 (0x1)
IE: E&xport to Microsoft Excel - c:\progra~1\mi05e6~1\office12\EXCEL.EXE/3000
IE: {CD67F990-D8E9-11d2-98FE-00C0F0318AFE}
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} -

IE: {B4E30F61-16D9-11D3-85D1-005004229569} - {85E0B172-04FA-11D1-B7DA-00A0C90348D6} -

DPF: {17492023-C23A-453E-A040-C7C580BBF700} -

DPF: {5AE58FCF-6F6A-49B2-B064-02492C66E3F4} -


DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} -


DPF: {7584C670-2274-4EFB-B00B-D6AABA6D3850} - hxxps://server/Remote/msrdp.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} -

DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} -



DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} -

Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program

Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} -

SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program


================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\dave\applic~1\mozilla\firefox\profiles\udir4lf9.default\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.btinet.net/
FF - prefs.js: network.proxy.type - 4
FF - plugin: c:\program files\common files\laserfiche\system\nplfplugin.dll
FF - plugin: c:\program files\java\jre6\bin\npdeploytk.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npatgpc.dll
FF - plugin: c:\program files\mozilla firefox\plugins\NPTURNMED.dll

FF - user.js: yahoo.homepage.dontask - true
============= SERVICES / DRIVERS ===============

R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\sasdifsv.sys [2009-5-26 9968]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-5-26 72944]
R1 TMEI3E;TMEI3E;c:\windows\system32\drivers\TMEI3E.sys [2004-8-20 5888]
R2 aawservice;Ad-Aware 2007 Service;c:\program files\lavasoft\ad-aware 2007\aawservice.exe [2008-1-4

R2 CSAPrintService;Creative Solutions Accounting Print Service;c:\windows\csasvc.exe [2008-3-17

R2 psqlWGE;Pervasive PSQL Workgroup Engine;c:\program files\pervasive software\psql\bin\w3dbsmgr.exe

[2007-9-5 455968]
R2 Tmesrv;Tmesrv3;c:\program files\toshiba\tme3\TMESRV31.exe [2004-8-20 126976]
S3 Intuit Fuse Service;Intuit Fuse Service;c:\program files\common files\intuit\fuse\service\Intuit

Fuse Service.exe [2005-2-5 72704]
S3 LCcfltr;Logitech USB Filter Driver;c:\windows\system32\drivers\LCCFLTR.SYS [2005-2-5 14092]
S3 PCX504;Cisco Systems Wireless LAN Adapter Driver;c:\windows\system32\drivers\PCX504.sys

[2004-8-20 96256]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-5-26 7408]
S3 TEchoCan;Toshiba Audio Effect;c:\windows\system32\drivers\TEchoCan.sys [2004-8-26 28416]
S3 Tmesbs;Tmesbs32;c:\program files\toshiba\tme3\tmesbs32.exe [2004-8-20 86016]
S4 Peachtree SmartPosting 2009;Peachtree SmartPosting 2009;c:\program files\sage

software\peachtree2009\SmartPostingService2009.exe [2008-5-3 49152]

=============== Created Last 30 ================

2009-06-23 01:11 <DIR> --d----- c:\docume~1\alluse~1\applic~1\SUPERAntiSpyware.com
2009-06-23 01:11 <DIR> --d----- c:\program files\SUPERAntiSpyware
2009-06-23 01:11 <DIR> --d----- c:\docume~1\dave\applic~1\SUPERAntiSpyware.com
2009-06-19 10:34 <DIR> --d----- c:\docume~1\dave\applic~1\Malwarebytes
2009-06-19 10:34 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-06-19 10:34 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-06-19 10:34 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-06-19 10:34 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-06-17 16:28 1,487 a------- c:\docume~1\dave\applic~1\messanger1.dat
2009-06-17 16:28 0 a------- c:\docume~1\dave\applic~1\messanger2.dat
2009-06-17 16:22 54,156 a---h--- c:\windows\QTFont.qfn
2009-06-17 16:22 1,409 a------- c:\windows\QTFont.for
2009-06-12 13:06 <DIR> --d----- c:\program files\SystemRequirementsLab
2009-06-10 03:37 345,600 -c------ c:\windows\system32\dllcache\localspl.dll
2009-06-10 03:37 585,216 -c------ c:\windows\system32\dllcache\rpcrt4.dll

==================== Find3M ====================

2009-05-07 10:32 345,600 a------- c:\windows\system32\localspl.dll
2009-04-28 23:56 827,392 a------- c:\windows\system32\wininet.dll
2009-04-28 23:55 78,336 a------- c:\windows\system32\ieencode.dll
2009-04-17 07:26 1,847,168 a------- c:\windows\system32\win32k.sys
2009-04-15 09:51 585,216 a------- c:\windows\system32\rpcrt4.dll
2006-11-01 14:07 3,623,736 ac------ c:\program files\procexp.exe
2006-08-16 16:39 72,056 ac------ c:\program files\procexp.chm
2006-07-28 09:32 7,005 ac------ c:\program files\Eula.txt
2005-02-10 00:14 56 -c-shr-- c:\windows\system32\EA55BA55B7.sys
2005-02-10 00:14 1,682 ac-sh--- c:\windows\system32\KGyGaAvL.sys
2008-07-08 11:06 32,768 ac-sh--- c:\windows\system32\config\systemprofile\local


============= FINISH: 21:47:13.93 ===============

Attached Files

BC AdBot (Login to Remove)


#2 thcbytes


  • Malware Response Team
  • 14,790 posts
  • Gender:Male
  • Local time:07:43 AM

Posted 27 June 2009 - 04:28 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
Proud member - Unified Network of Instructors and Trained Eliminators
Posted Image

I do not accept personal donations for assistance provided. I would ask that you instead consider donating the greatest gift - Organ Donation. Your organs are of no use to you when your gone. You will save a life that would otherwise be lost!


#3 teacup61


    Bleepin' Texan!

  • Malware Response Team
  • 17,075 posts
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:07:43 AM

Posted 06 July 2009 - 11:29 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image

Error reading poptart in Drive A: Delete kids y/n?

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users