Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

--help-- I have a malware infection , possibly due to rootkit


  • This topic is locked This topic is locked
2 replies to this topic

#1 KoolGamer

KoolGamer

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:11:30 AM

Posted 05 September 2009 - 02:33 PM

i recently got rootkit.ODG trojan
My ESETSS4 dectected it and couldnt fix it
today i got Windows security center(wscsvc32)
i tried to scan with mbam but it wouldnt start
so instead i opened hijackthis
right now im using windows xp home edition 2002 sp3

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 2:43:27 PM, on 9/5/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Safe mode

Running processes:
C:WINDOWSSystem32smss.exe
C:WINDOWSsystem32winlogon.exe
C:WINDOWSsystem32services.exe
C:WINDOWSsystem32lsass.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSsystem32svchost.exe
C:WINDOWSExplorer.EXE
C:Program FilesInternet ExplorerIexplore.exe
C:WINDOWSsystem32ctfmon.exe
C:Program FilesInternet ExplorerIexplore.exe
C:Program FilesMalwarebytes' Anti-Malwarembam.exe
C:Program FileshtHijackThis.exe

R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings,ProxyOverride = *.local
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:Program FilesCommon FilesAdobeAcrobatActiveXAcroIEHelperShim.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:Program FilesGoogleGoogleToolbarNotifier5.1.1309.3572swg.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:Program FilesJavajre6binjp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:Program FilesJavajre6libdeployjqsiejqs_plugin.dll
O4 - HKLM..Run: [IMJPMIG8.1] "C:WINDOWSIMEimjp8_1IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM..Run: [PHIME2002ASync] C:WINDOWSsystem32IMETINTLGNTTINTSETP.EXE /SYNC
O4 - HKLM..Run: [PHIME2002A] C:WINDOWSsystem32IMETINTLGNTTINTSETP.EXE /IMEName
O4 - HKLM..Run: [IgfxTray] C:WINDOWSsystem32igfxtray.exe
O4 - HKLM..Run: [HotKeysCmds] C:WINDOWSsystem32hkcmd.exe
O4 - HKLM..Run: [Zune Launcher] "C:Program FilesZuneZuneLauncher.exe"
O4 - HKLM..Run: [SunJavaUpdateSched] "C:Program FilesJavajre6binjusched.exe"
O4 - HKLM..Run: [Adobe Reader Speed Launcher] "C:Program FilesAdobeReader 9.0ReaderReader_sl.exe"
O4 - HKLM..Run: [QuickTime Task] "C:Program FilesQuickTimeqttask.exe" -atboottime
O4 - HKLM..Run: [iTunesHelper] "C:Program FilesiTunesiTunesHelper.exe"
O4 - HKLM..Run: [AdobeCS4ServiceManager] "C:Program FilesCommon FilesAdobeCS4ServiceManagerCS4ServiceManager.exe" -launchedbylogin
O4 - HKLM..Run: [egui] "C:Program FilesESETESET Smart Securityegui.exe" /hide /waitservice
O4 - HKCU..Run: [ctfmon.exe] C:WINDOWSsystem32ctfmon.exe
O4 - HKCU..Run: [swg] C:Program FilesGoogleGoogleToolbarNotifierGoogleToolbarNotifier.exe
O4 - HKCU..Run: [Torrent2Exe[ebf0109dc013ec5febea8f0730f57aa7eb3ec851]] C:Documents and SettingsOwnerDesktopiPod1_1_2.2.1_5H11_Restore.exe
O4 - HKCU..Run: [SUPERAntiSpyware] C:DOCUME~1OwnerLOCALS~1TempSSUPDATE.EXE SoftwareSUPERAntiSpyware.comSUPERAntiSpyware
O4 - HKUSS-1-5-18..Run: [Monopod] C:WINDOWSTEMPa.exe (User 'SYSTEM')
O4 - HKUS.DEFAULT..Run: [Monopod] C:WINDOWSTEMPa.exe (User 'Default user')
O4 - Startup: BYOND.lnk = ?
O4 - Global Startup: Windows Search.lnk = C:Program FilesWindows Desktop SearchWindowsSearch.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:WINDOWSNetwork Diagnosticxpnetdiag.exe
O16 - DPF: {4A116A80-85B6-4299-A018-A717FD7AC66A} (AXIDMDCP Class) - http://m1.cdn.gaiaonline.com/plugins/IDMFlash.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/...b?1247092119234
O16 - DPF: {73ECB3AA-4717-450C-A2AB-D00DAD9EE203} (GMNRev Class) - http://h20270.www2.hp.com/ediags/gmn2/inst...ctDetection.cab
O16 - DPF: {9C23D886-43CB-43DE-B2DB-112A68D7E10A} (MySpace Uploader Control) - http://lads.myspace.com/upload/MySpaceUploader2.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/flas...ent/swflash.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O20 - AppInit_DLLs: wbsys.dll
O22 - SharedTaskScheduler: Deskscapes - {EC654325-1273-C2A9-2B7C-45D29BCE68FB} - C:Program FilesStardockObject DesktopDeskScapesdeskscapes.dll
O22 - SharedTaskScheduler: Stardock Vista ControlPanel Extension - {EC654325-1273-C2A9-2B7C-45D29BCE68FD} - C:Program FilesStardockObject DesktopDeskScapesDesktopControlPanel.dll
O22 - SharedTaskScheduler: StardockDreamController - {EC654325-1273-C2A9-2B7C-45D29BCE68FF} - C:Program FilesStardockObject DesktopDeskScapesDreamControl.dll
O23 - Service: Apple Mobile Device - Apple Inc. - C:Program FilesCommon FilesAppleMobile Device SupportbinAppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:Program FilesBonjourmDNSResponder.exe
O23 - Service: ESET HTTP Server (EhttpSrv) - ESET - C:Program FilesESETESET Smart SecurityEHttpSrv.exe
O23 - Service: ESET Service (ekrn) - ESET - C:Program FilesESETESET Smart Securityekrn.exe
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:Program FilesCommon FilesMacrovision SharedFLEXnet PublisherFNPLicensingService.exe
O23 - Service: Google Update Service (gupdate1ca1fa0781fdb24) (gupdate1ca1fa0781fdb24) - Google Inc. - C:Program FilesGoogleUpdateGoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:Program FilesGoogleCommonGoogle UpdaterGoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:Program FilesiPodbiniPodService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:Program FilesJavajre6binjqs.exe

--
End of file - 6291 bytes
===============
security center malware/ mbam wont start/ believe i have rootkit ODG trojan, no idea how to fix but my firewall is blocking it(esetss4)

I believe i have odg rootkit and windows security center malware






ROOTREPEAL AD, 2007-2009
==================================================
Scan Start Time: 2009/09/05 15:45
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:WINDOWSSystem32Driversdump_atapi.sys
Address: 0xEDEC0000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:WINDOWSSystem32Driversdump_WMILIB.SYS
Address: 0xF7C32000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:WINDOWSsystem32driversrootrepeal.sys
Address: 0xECE2A000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:WINDOWSsystem32kbiwkmkyiyondy.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32kbiwkmpqxdulqj.dat
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32kbiwkmuvfyxdlx.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32kbiwkmwmphbski.dat
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32uacinit.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32UACkioqxfumlt.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32UACmetddaflho.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32UACqskllrxqxy.dat
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32UACrsthomlirn.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32UACxvametmbyc.dll
Status: Invisible to the Windows API!

Path: C:WINDOWSTempUAC128a.tmp
Status: Invisible to the Windows API!

Path: C:WINDOWSTempUAC1299.tmp
Status: Invisible to the Windows API!

Path: C:WINDOWSTempUAC1e41.tmp
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32driversUACdwehqomykm.sys
Status: Invisible to the Windows API!

Path: C:WINDOWSsystem32driverskbiwkmapfmcodj.sys
Status: Invisible to the Windows API!

Path: c:documents and settingsownerlocal settingstemp~df2bf5.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:documents and settingsownerlocal settingstemp~dff7a.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49firewall_closed[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49firewall_icon[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49install_button[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49resources_closed[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49updates_closed[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49disabled_bottom[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49firewall_open[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49resources_open[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5S1JM0V49updates_open[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69antivirus_closed_off[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69enabled_bg[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69main[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69resources_open_bg[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69updates_icon[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69disabled_bg[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69enabled_bottom[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69header_bg[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69internet_icon[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5SG3RIF69resources_open_bottom[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDdisabled_bottom[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDfirewall_open[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDresources_open[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDupdates_open[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDantivirus_closed_off[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDenabled_bg[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDmain[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDresources_open_bg[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5V116W2DDupdates_icon[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIdisabled_bg[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIenabled_bottom[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIheader_bg[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIinternet_icon[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIresources_open_bottom[1]
Status: Invisible to the Windows API!

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIfirewall_closed[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIfirewall_icon[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIinstall_button[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIresources_closed[1]
Status: Visible to the Windows API, but not on disk.

Path: C:WINDOWSTempTemporary Internet FilesContent.IE5WXLCNDSIupdates_closed[1]
Status: Visible to the Windows API, but not on disk.

Path: c:documents and settingsownerlocal settingsapplication datamicrosoftinternet explorerrecoveryactive{54bec6c8-9a6e-11de-a842-000bcd2e830c}.dat
Status: Size mismatch (API: 6144, Raw: 4608)

Path: c:documents and settingsall usersapplication datamicrosoftsearchdataapplicationswindowsprojectssystemindexsystemindex.crwl187.gthr
Status: Size mismatch (API: 6777126, Raw: 5943900)

Stealth Objects
-------------------
Object: Hidden Module [Name: UAC1e41.tmpxfumlt.dll]
Process: svchost.exe (PID: 1268) Address: 0x00ac0000 Size: 217088

Object: Hidden Module [Name: UACrsthomlirn.dll]
Process: svchost.exe (PID: 1268) Address: 0x00d30000 Size: 65536

Object: Hidden Module [Name: kbiwkmkyiyondy.dll]
Process: svchost.exe (PID: 1268) Address: 0x10000000 Size: 53248

Object: Hidden Module [Name: UACmetddaflho.dll]
Process: Explorer.EXE (PID: 540) Address: 0x00dd0000 Size: 49152

Object: Hidden Module [Name: kbiwkmuvfyxdlx.dll]
Process: Explorer.EXE (PID: 540) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: kbiwkmuvfyxdlx.dll]
Process: firefox.exe (PID: 3188) Address: 0x007f0000 Size: 32768

Object: Hidden Module [Name: UACkioqxfumlt.dll]
Process: Iexplore.exe (PID: 3112) Address: 0x08d90000 Size: 217088

Object: Hidden Module [Name: kbiwkmuvfyxdlx.dll]
Process: Iexplore.exe (PID: 3112) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: UACkioqxfumlt.dll]
Process: Iexplore.exe (PID: 3832) Address: 0x08db0000 Size: 217088

Object: Hidden Module [Name: kbiwkmuvfyxdlx.dll]
Process: Iexplore.exe (PID: 3832) Address: 0x10000000 Size: 32768

Object: Hidden Code [ETHREAD: 0x86b32b58]
Process: System Address: 0x8694a790 Size: 1000

Hidden Services
-------------------
Service Name: kbiwkmyxesuhtk
Image Path: C:WINDOWSsystem32driverskbiwkmapfmcodj.sys

Service Name: UACd.sys
Image Path: C:WINDOWSsystem32driversUACdwehqomykm.sys

==EOF==

Merged two topics into one post. ~ OB

Edited by Orange Blossom, 05 September 2009 - 03:19 PM.


BC AdBot (Login to Remove)

 


#2 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:12:30 PM

Posted 21 September 2009 - 12:43 PM

Welcome to the BleepingComputer Forums.

Since it has been a few days since you scanned your computer with HijackThis, we will need a new HijackThis log. If you have not already downloaded Random's System Information Tool (RSIT), please download Random's System Information Tool (RSIT) by random/random which includes a HijackThis log and save it to your desktop. If you have RSIT already on your computer, please run it again.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Please post the contents of log.txt.
Thank you for your patience.

Please see Preparation Guide for use before posting about your potential Malware problem.

If you have already posted this log at another forum or if you decide to seek help at another forum, please let us know. There is a shortage of helpers and taking the time of two volunteer helpers means that someone else may not be helped.

Please post your HijackThis log as a reply to this thread and not as an attachment. I am always leery of opening attachments so I always request that HijackThis logs are to be posted as a reply to the thread. I do not think that you are attaching anything scary but others may do so.

While we are working on your HijackThis log, please:
  • Reply to this thread; do not start another!
  • Do not make any changes on your computer during the cleaning process or download/add programs on your computer unless instructed to do so.
  • Do not run any other tool until instructed to do so!
  • Let me know if any of the links do not work or if any of the tools do not work.
  • Tell me about problems or symptoms that occur during the fix.
  • Do not run any other programs or open any other windows while doing a fix.
  • Ask any questions that you have regarding the fix(es), the infection(s), the performance of your computer, etc.
Thanks.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#3 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:12:30 PM

Posted 28 September 2009 - 05:56 PM

This subject is now closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users