Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rundll32.exe, gasfkymhythqqk.dll and Various .dll files and Rustock


  • This topic is locked This topic is locked
30 replies to this topic

#1 ConfusedChicken

ConfusedChicken

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 25 September 2009 - 06:32 PM

I think I was infected after downloading a torrent file today. First thing I did was delete the file. Initially, I got a message from Windows Defender saying I had Rustock (something with and exclamation mark). I tried to clean the infection, but Windows defender failed to do so. I then tried something called Rustbfix.exe which said it did not find any rustock viruses. All the while AVG Pro v8 was popping up every few seconds saying it found an infection: c:\windows\system32\gasfkymhythqqk.dll (this popped up maybe 50-100 times). Then I tried Multi AV but that wouldn't work because my internet connection was being hijacked.

I then tried AdAware, which seems to have removed some trojan that was on my laptop. Then I removed Java from my PC.

The infection I had was uploading data through my internet connection, so I could hardly open any web pages. After a couple of reboots (once in safe mode) and a few blue screens of death, my PC appears to be back to normal (my internet connection traffic is back to normal), but I'm sure it's still infected . I'm currently doing a full backup.

I've followed all the instructions from the readme and prep guide on this site. I've attached all required logs. I also noticed many many instances of svchost in task manager as well as 2 rundll32.exe processes run by me (user) not system, which apparently is a problem.

Your help is sincerely appreciated.

Attached Files

  • Attached File  Attach.txt   10.95KB   6 downloads
  • Attached File  DDS.txt   16.71KB   16 downloads
  • Attached File  ark.txt   58.96KB   16 downloads


BC AdBot (Login to Remove)

 


#2 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 12 October 2009 - 06:11 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
PW

#3 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:09:49 PM

Posted 18 October 2009 - 05:55 AM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#4 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:09:49 PM

Posted 25 October 2009 - 12:39 PM

Thread reopened at request of topic starter. :(
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?

#5 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 25 October 2009 - 12:53 PM

Hi,

Thank you for your response. I appreciate all your help.

After my first post, I ran CCleaner out of frustration, which attempted to clean my registry. After it ran, I couldn't run any programs. I'd get an error message saying something along the lines of "Internet explorer cannot run because the registry key is marked for deletion", for example. So I did a system restore which I guess fixed that problem. I think CCleaner got rid of the gasfky virus because I didn't get any more pop-ups from AVG.

I think svchost.exe is still infected because I have anything from 16-20 of them running at any one time.

I've attached new DDS and Attach reports.

Attached Files



#6 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 25 October 2009 - 04:02 PM

Hello ConfusedChicken and welcome to Bleeping Computer!! :(

I will be handling your log to help you get cleaned up. I apologize for the delay but the forum is very busy.

As you can see the logs we ask for are very extensive and take a lot of time to investigate. In addition, since I am still in training all of my responses have to be reviewed by our excellent expert staff so there may be a delay in response time. The advantage is that your log will be evaluated by two sets of eyes and two brains.

If you haven't already, you can keep the link to this topic in your Favorites. Alternatively, you can click the Options button at the top bar of this topic and Track this Topic, where you can choose email notifications.

Please make sure Word Wrap in notepad is turned off when copying and pasting logs and only attach logs if asked to. Do not wrap logs in codebox or code tags. It makes it very difficult to read and analyze them. Please paste them directly into the reply box.

Please do not make any changes to your system until we are through. Fixes are based upon information that is current from your system so any changes can affect our strategy. Please refrain from running any tools we may use without specific instructions.

If your operating system is Windows Vista it may be necessary to right click then choose Run as Administrator any programs we use.

Before we begin please check and follow the instructions on How to Show Hidden Files and Folders in Windows Vista and Windows XP

Because the e-mail notification system is not completely reliable, please check your topic once a day for responses.

Again, keep in mind that it may take a couple of days or more before I can reply but once we get started the process should speed up.

Thank you for your patience!!
PW

#7 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 26 October 2009 - 10:13 AM

Hi pwgib,

Thanks for your assistance. I've followed the instructions on showing hidden files. What next?

#8 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 28 October 2009 - 09:44 AM

Hello ConfusedChicken,

Please do not attach any reports or logs unless specifically asked to. Paste them directly into the body of the reply box. :(

I think I was infected after downloading a torrent file today

Your log(s) show that you are using so called peer-to-peer or file-sharing programs (in your case BitTorrent DNA). These programs allow file sharing between users as the name(s) suggest. In today's world cyber crime has become an enormous problem. Different ways are used to infect personal computers to make use of their stored data or machine power for further propagation of malware files. A popular means is the use of file-sharing tools as a huge amount of prospective victims can be reached through it.

It is therefore possible to be infected by downloading infected files via peer-to-peer tools and so these tools must be used with extreme care. Some further reading on this subject, along with included links, are as follows: "File-Sharing, otherwise known as Peer To Peer" and "Risks of File-Sharing Technology."

It is also important to note that sharing entertainment files and proprietary software infringes on copyright laws in many countries over the world and you are putting yourself at risk of of being indicted through organizations watching over the rights of the authors of such files (i.e. the RIAA for music files, or the MPAA for movie files in the USA) or the authors of the files themselves.

Naturally there are also legal ways to use these services, such as downloading Linux distributions or office suites such as "Open Office."

If you decide to keep this program please refrain from using it until we get your computer clean.

Ccleaner is an excellent tool but the registry cleaner function should never be used.

Please be aware that bleepingcomputer staff do not recommend the usage of registry cleaners / tools due to the following facts:
  • Registry tools can cause irreparable damage to your Operating System
  • Registry tools can, as a result of the above, render your pc to be inoperable.
This is done, assuming that the major audience here at this board might be inexperienced users and thus a suggested safeguard from our side.
If you feel you have the need for a registry cleaner, then you are just as welcome to use it. Just be aware of the consequences, which you have already experienced, and take this as a recommendation from my side.
More information about registry cleaners can be found at Miekiemoes Blog

You have poker programs installed, PartyPoker, Piggs Peak Poker and Silver Sands Poker. You may use these games on a regular basis but I think it is important to note that often these kinds of programs are installed with other unwanted software, namely spyware or adware. Due to this I strongly suggest that you uninstall the program if you do not use it anymore or did not install it on purpose.
There are so many online poker games out there these days that it is close to impossible to keep track of whether a program is infected or not. Should you have installed this poker game on purpose and wish to continue using it, you may ignore this. Should you decide to uninstall the programs, then you can do so through Add/Remove Programs.

We need to disable your antimalware programs as they can interfere with some of the tools we need to use. I see you have AdWatch disabled. Please leave it disabled and visit this topic How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs. Scroll down until you find the instructions on How to Temporarily Disable your Anti-malware Scanners.Follow the instructions for Windows Defender and Prevx.

I see your AVG Internet Security program is not running. If you disabled it please leave it disabled. If not, it was probably disabled by malware which we will fix.

Is this your Internet Provider? Vodacom_Internet_APN_NAT_Region1. l. South Africa Johannesburg Afrinic

Step 1.

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
Step 2.

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

How is your computer running?

In your next reply please answer any questions and include:

MBAM log
GMER log


Thanks!!
PW

#9 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 28 October 2009 - 02:54 PM

Thanks for the advice on P2P sharing etc.

I have successfully disabled Windows Defender, but not PrevX. I do no recall ever installing it - I cannot find it in my system tray, start menu-->all programs or control panel-->programs and features.

Should I ignore it and proceed with the rest of your instructions?

By the way, Vodacom South Africa is my ISP.

#10 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 28 October 2009 - 03:53 PM

Yes, please go ahead with all the instructions.
PW

#11 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 29 October 2009 - 02:16 AM

Hi,

I followed the instructions to the end. I've attached the logs.

Attached Files



#12 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 29 October 2009 - 02:24 AM

For all intents and purposes, my computer appears to be normal. However, I still have svchost processes that were never there before, and duplicates of other processes, which I'm also certain were never there before.

#13 ConfusedChicken

ConfusedChicken
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 29 October 2009 - 04:23 PM

I will not have internet access for the next week or two, please, please, please do not lock this thread.

#14 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 30 October 2009 - 07:40 AM

Hello ConfusedChicken,

We will keep your topic open. Please pm me when you are ready to continue.


Thanks!!

Edited by pwgib, 30 October 2009 - 07:40 AM.

PW

#15 pwgib

pwgib

  • Malware Response Team
  • 2,956 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:God's Country
  • Local time:09:49 PM

Posted 17 November 2009 - 09:25 AM

Hi ConfusedChicken,

See my earlier Post #8. "Please do not attach any reports or logs unless specifically asked to. Paste them directly into the body of the reply box". :(

Instructions on how to copy/paste can be found at the following topic. How to Cut, Copy, and Paste

However, I still have svchost processes that were never there before, and duplicates of other processes, which I'm also certain were never there before

.

Can you be more specific about which svchost processes?


Note: Please be aware that one or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

MBAM found the Trojan, quarantined and deleted it, but you need to be aware that it was on your computer.

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.

If you decide to continue with cleaning your computer please perform the following.

Download Combofix from any of the links below, and save it to your desktop.

Link 1
Link 2
  • Close/disable all anti-virus and anti-malware programs so they do not interfere with the running of ComboFix. Refer to this page if you are not sure how.
  • Close any open windows, including this one.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • If you did not have it installed, you will see the prompt below. Choose YES.
  • Posted Image
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Note:The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you
should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.
  • Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

    Posted Image
  • Click on Yes, to continue scanning for malware.
  • When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running.
ComboFix will restart your computer if malware is found; allow it to do so.


Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

In your next reply please copy ComboFix.txt and paste it into the body of the reply box.

Thanks!!
PW




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users