Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit issue on apparantly clean machine


  • This topic is locked This topic is locked
3 replies to this topic

#1 agy

agy

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:21 AM

Posted 25 August 2009 - 05:13 PM

After struggling a few days with all kinds of viruses (PC AntiSpyware, braviax, Total Secure, msword98, ...), I thought to have gotten rid of all infections. My machine operates pretty normal, up to reasonable speed and no heavy loads on my internet connections.

So far so good... until I try to visit common anti-virus/malware sites such as avg.com, norton.com. I get either a redirect to 'ezquestion.com' or similar, or a 'broken link'.
Obviously, there's still something smoking under the hood.
Thanks to help from Blaze from the HJT team it seems I have a rootkit installed.
After his advice I followed the malware-guidelines and herewith post the DDS-log and RootRepeal log files.

Could you help me on this one?

DDS logfile:

DDS (Ver_09-07-30.01) - NTFSx86
Run by bert at 0:53:26.81 on 26/08/2009
Internet Explorer: 7.0.5730.13
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.254.73 [GMT 2:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\sySTEM32\SvchoSt.ExE -k ddnsfilter
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\j2re1.4.2_03\bin\jusched.exe
C:\Program Files\Dell\AccessDirect\dadapp.exe
C:\Program Files\Dell\QuickSet\quickset.exe
C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\system32\dla\tfswctrl.exe
C:\Program Files\Dell\Media Experience\PCMService.exe
C:\Program Files\Dell\AccessDirect\DadTray.exe
C:\Program Files\CyberLink\PowerDVD\DVDLauncher.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\igfxpers.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\WINDOWS\system32\igfxsrvc.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Digital Line Detect\DLG.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
C:\WINDOWS\system32\wscntfy.exe
svchost
C:\WINDOWS\system32\taskmgr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\bert\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com
uSearch Page = hxxp://www.google.com
uDefault_Page_URL = hxxp://www.dell.com
uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
mDefault_Search_URL = hxxp://www.google.com/ie
mSearch Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uSearchAssistant = hxxp://www.google.com
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com
TB: &Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar.dll
TB: {0B53EAC3-8D69-4B9E-9B19-A37C9A5676A7} - No File
uRun: [ecSetupX.exe] D:\ecSetupX.exe D: 3
uRun: [MsnMsgr] "c:\program files\msn messenger\MsnMsgr.Exe" /background
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [RegistryMechanic] c:\program files\registry mechanic\RegMech.exe /H
mRun: [SunJavaUpdateSched] c:\program files\java\j2re1.4.2_03\bin\jusched.exe
mRun: [<NO NAME>]
mRun: [DadApp] c:\program files\dell\accessdirect\dadapp.exe
mRun: [Dell QuickSet] c:\program files\dell\quickset\quickset.exe
mRun: [SynTPLpr] c:\program files\synaptics\syntp\SynTPLpr.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [dla] c:\windows\system32\dla\tfswctrl.exe
mRun: [UpdateManager] "c:\program files\common files\sonic\update manager\sgtray.exe" /r
mRun: [PCMService] "c:\program files\dell\media experience\PCMService.exe"
mRun: [DVDLauncher] "c:\program files\cyberlink\powerdvd\DVDLauncher.exe"
mRun: [URLLSTCK.exe] c:\program files\norton internet security\UrlLstCk.exe
mRun: [gcasServ] "c:\program files\microsoft antispyware\gcasServ.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exe
mRun: [Regedit32] c:\windows\system32\regedit.exe
mRun: [SpyHunter Security Suite] c:\program files\enigma software group\spyhunter\SpyHunter3.exe
StartupFolder: c:\documents and settings\bert\start menu\programs\startup\ikowin32.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\digita~1.lnk - c:\program files\digital line detect\DLG.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
uPolicies-explorer: ForceActiveDesktopOn = 0 (0x0)
dPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
IE: E&xporteren naar Microsoft Excel - c:\progra~1\micros~3\office11\EXCEL.EXE/3000
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {08B0E5C0-4FCB-11CF-AAA5-00401C608501}
IE: {77BF5300-1474-4EC7-9980-D32B190E9B07} - {77BF5300-1474-4EC7-9980-D32B190E9B07} - c:\program files\skype\toolbars\internet explorer\SkypeIEPlugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~3\office11\REFIEBAR.DLL
Trusted Zone: dans.nl\www
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://www.apple.com/qtactivex/qtplugin.cab
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {233C1507-6A77-46A4-9443-F871F945D258} - hxxp://fpdownload.macromedia.com/get/shockwave/cabs/director/sw.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
Filter: x-sdch - {B1759355-3EEC-4C1E-B0F1-B719FE26E377} - c:\program files\google\google toolbar\component\fastsearch_A8904FB862BD9564.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
AppInit_DLLs: cru629.dat
SEH: Microsoft.AntiSpyware.ShellExecuteHook.1: {9ef34ff2-3396-4527-9d27-04c8c1c67806} - c:\program files\microsoft antispyware\shellextension.dll

============= SERVICES / DRIVERS ===============

R?2 ddnsfilter;ddnsfilter;c:\windows\system32\SvchoSt.ExE -k ddnsfilter [2004-8-12 14336]
R0 PCTCore;PCTools KDS;c:\windows\system32\drivers\PCTCore.sys [2009-8-24 130936]
R1 DnsFilter;DnsFilter;c:\windows\system32\drivers\DnsFilter.sys [2009-8-20 38016]
R3 BT4501D;SpeedTouch 120g Wireless USB Adapter Driver;c:\windows\system32\drivers\BT4501D.sys [2009-3-5 346720]
S3 sdAuxService;PC Tools Auxiliary Service;c:\program files\spyware doctor\pctsAuxs.exe [2009-8-24 348752]
S3 sdCoreService;PC Tools Security Service;c:\program files\spyware doctor\pctsSvc.exe [2009-8-24 1097096]

=============== Created Last 30 ================

2009-08-25 23:02 15 a------- c:\documents and settings\bert\settings.dat
2009-08-25 07:48 81,920 a------- c:\windows\system32\drivers\c4945f62.sys
2009-08-25 07:48 0 a------- c:\windows\system32\drivers\beep.sys
2009-08-24 23:45 <DIR> --d----- c:\docume~1\bert\applic~1\Malwarebytes
2009-08-24 23:45 38,160 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-08-24 23:45 19,096 a------- c:\windows\system32\drivers\mbam.sys
2009-08-24 23:45 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-08-24 23:45 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-08-24 23:19 159,600 a------- c:\windows\system32\drivers\pctgntdi.sys
2009-08-24 23:18 130,936 a------- c:\windows\system32\drivers\PCTCore.sys
2009-08-24 23:18 73,840 a------- c:\windows\system32\drivers\PCTAppEvent.sys
2009-08-24 23:18 <DIR> --d----- c:\program files\common files\PC Tools
2009-08-24 23:18 64,392 a------- c:\windows\system32\drivers\pctplsg.sys
2009-08-24 23:17 <DIR> --d----- c:\program files\Spyware Doctor
2009-08-24 23:17 <DIR> --d----- c:\docume~1\bert\applic~1\PC Tools
2009-08-24 23:17 <DIR> --d----- c:\docume~1\alluse~1\applic~1\PC Tools
2009-08-24 22:05 <DIR> --d----- c:\docume~1\alluse~1\applic~1\15390434
2009-08-23 22:00 <DIR> --d----- c:\windows\system32\wbem\Repository
2009-08-22 21:27 <DIR> --d----- c:\program files\Microsoft AntiSpyware
2009-08-22 04:05 <DIR> --d-h--- c:\windows\PIF
2009-08-21 23:01 <DIR> --d----- c:\program files\Enigma Software Group
2009-08-20 12:00 38,016 a------- c:\windows\system32\drivers\DnsFilter.sys
2009-08-20 12:00 <DIR> --d----- c:\program files\DDnsFilter
2009-08-13 03:02 <DIR> --d----- c:\windows\ServicePackFiles

==================== Find3M ====================

2009-08-24 20:59 625,824 a------- c:\windows\system32\drivers\ntfs.sys
2009-08-05 11:11 204,800 a------- c:\windows\system32\mswebdvd.dll
2009-07-17 20:55 58,880 a------- c:\windows\system32\atl.dll
2009-07-13 02:18 233,472 a------- c:\windows\system32\wmpdxm.dll
2009-06-29 18:12 827,392 a------- c:\windows\system32\wininet.dll
2009-06-29 18:12 78,336 a------- c:\windows\system32\ieencode.dll
2009-06-29 18:12 17,408 -------- c:\windows\system32\corpol.dll
2009-06-16 16:55 119,808 a------- c:\windows\system32\t2embed.dll
2009-06-16 16:55 82,432 a------- c:\windows\system32\fontsub.dll
2009-06-12 13:50 76,288 a------- c:\windows\system32\telnet.exe
2009-06-10 16:21 84,992 a------- c:\windows\system32\avifil32.dll
2009-06-10 08:32 132,096 a------- c:\windows\system32\wkssvc.dll
2009-06-05 09:42 655,872 a------- c:\windows\system32\mstscax.dll
2009-06-03 21:27 1,290,752 a------- c:\windows\system32\quartz.dll
2005-01-24 16:39 28,104 a------- c:\docume~1\bert\applic~1\GDIPFONTCACHEV1.DAT

============= FINISH: 0:54:55.80 ===============

RootRepeal logfile ->
ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 23:04
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: c4945f62.sys
Image Path: C:\WINDOWS\System32\drivers\c4945f62.sys
Address: 0xEFF4F000 Size: 81920 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEFEE7000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF979F000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEF1CE000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\SYSTEM32\DRIVERS\c4945f62.sys
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc102.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc103.JPG
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc104.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc106.JPG
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc107.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc105.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc108.JPG
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc110.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc109.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc111.JPG
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc112.jpg
Status: Locked to the Windows API!

Path: C:\Documents and Settings\gea\My Documents\Prive\My Pictures\voorSjang\Dc101.jpg
Status: Locked to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: svchost.exe]
Process: svchost.exe (PID: 2872) Address: 0x01000000 Size: 20480

Hidden Services
-------------------
Service Name: c4945f62
Image Path: C:\WINDOWS\System32\drivers\c4945f62.sys

==EOF==

BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:21 AM

Posted 27 August 2009 - 10:53 AM

Hello! :thumbup2:
My name is Sam and I will be helping you.

In order to see what's going on with your computer I'll ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 agy

agy
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:21 AM

Posted 31 August 2009 - 02:41 AM

Hi Sam,
thanks for picking up my problem!
Sorry for the late reply: I've be away from my desk a few days.
I meanwhile had to let my machine being re-installed, I could not leave the internet (business) and it was damaging others.
I would rather have not and cleaned the machine with the people over here, but I ran out of time (and sleep by the way...).
Keep up the good work! :thumbup2:

#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:02:21 AM

Posted 31 August 2009 - 11:57 AM

Thank you for the follow up response.

This thread will now be closed.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users