Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TROJAN_AGENTT.LQUX


  • This topic is locked This topic is locked
2 replies to this topic

#1 hermanocleas

hermanocleas

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:04:07 PM

Posted 14 December 2009 - 10:13 AM

I have tried fixing this myself but haven't been able to. I have used Maleware Bytes to try and remove this from my computer. Here are my DDS and RootRepeal Logs:


DDS (Ver_09-12-01.01) - NTFSx86
Run by BETTY at 8:59:31.62 on Mon 12/14/2009
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1033.18.447.67 [GMT -6:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Trend Micro\OfficeScan Client\ntrtscan.exe
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
C:\Program Files\Trend Micro\OfficeScan Client\ofcdog.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\VTTimer.exe
C:\Program Files\Trend Micro\OfficeScan Client\pccntmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\SkDaemon.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Download\dds.scr

============== Pseudo HJT Report ===============

uWindow Title = Microsoft Internet Explorer provided by Feldmann Imports
uStart Page = hxxp://www.google.com/
mDefault_Page_URL = hxxp://www.feldmanns.com
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [updateMgr] "c:\program files\adobe\acrobat 7.0\reader\AdobeUpdateManager.exe" AcRdB7_0_8 -reboot 1
uRun: [ttool] c:\windows\essledv.exe
uRun: [av_md] c:\windows\system32\config\systemprofile\av_md.exe
mRun: [VTTimer] VTTimer.exe
mRun: [OfficeScanNT Monitor] "c:\program files\trend micro\officescan client\pccntmon.exe" -HideWindow
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
mRun: [Regedit32] c:\windows\system32\regedit.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\skdaemon.lnk - c:\windows\system32\SkDaemon.exe
uPolicies-explorer: NoRun = 1 (0x1)
uPolicies-explorer: ForceStartMenuLogOff = 1 (0x1)
uPolicies-explorer: NoManageMyComputerVerb = 1 (0x1)
uPolicies-explorer: NoChangeAnimation = 1 (0x1)
uPolicies-explorer: NoWindowsUpdate = 1 (0x1)
uPolicies-explorer: ForceActiveDesktopOn = 1 (0x1)
uPolicies-explorer: NoPropertiesMyComputer = 1 (0x1)
uPolicies-system: SetVisualStyle =
uPolicies-system: DisableRegistryTools = 2 (0x2)
uPolicies-system: Wallpaper = \\zoidberg\users\administrator\feldpaper3.jpg
uPolicies-system: WallpaperStyle = 2
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_01\bin\ssv.dll
Trusted Zone: dealertrack.com
Trusted Zone: IMGSV01
DPF: {05D96F71-87C6-11D3-9BE4-00902742D6E0} - hxxp://156.99.67.76/qp2.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {31175300-AC0E-11D4-A326-00104B37A903} - hxxp://imgsv01/dv/cab/RRE2GSCTSServer.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1192385951671
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
DPF: {AC6E313D-FE79-11D3-BF9F-00105A9D6E6E} - hxxp://imgsv01/dv/cab/RRE2GSCFileDownload.CAB
DPF: {ACB05A74-1939-4142-B780-C48060418D62} - hxxp://imgsv01/dv/cab/rrdvCreateFileOCX.CAB
DPF: {BF891E15-BD3F-11D3-9AA1-444553540000} - hxxp://imgsv01/dv/cab/TVC_ViewerCab.CAB
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab
TCP: {4860221B-1E05-4DF3-A739-559E4F56540E} = 192.168.1.9,192.168.1.8
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
Hosts: 192.168.1.195 imgsv01
============= SERVICES / DRIVERS ===============

R2 TmFilter;Trend Micro Filter;c:\program files\trend micro\officescan client\tmxpflt.sys [2005-7-25 225808]
R2 TmPreFilter;Trend Micro PreFilter;c:\program files\trend micro\officescan client\tmpreflt.sys [2005-7-25 36368]
R2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2009-12-9 38224]
R3 Skkbdf;PS/2 Keyboard Filter Driver for Win2k;c:\windows\system32\drivers\Skps2bf.sys [2004-10-28 8172]

=============== Created Last 30 ================

2009-12-14 14:57:26 0 d-----w- C:\Download
2009-12-09 16:15:46 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-12-09 16:15:36 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-12-09 16:15:36 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-09 15:26:48 0 d-----w- C:\VundoFix Backups
2009-12-08 13:49:25 0 ----a-w- c:\windows\Kgumirikijiraz.bin
2009-12-08 13:49:24 120 ----a-w- c:\windows\Nvotigihagonam.dat
2009-12-08 13:46:27 147616 -c--a-w- c:\windows\system32\dllcache\atapi.sys
2009-12-08 13:45:20 24 ----a-w- c:\docume~1\betty\applic~1\fvgqad.dat
2009-12-08 13:45:04 8 ----a-w- c:\docume~1\betty\applic~1\avdrn.dat

==================== Find3M ====================

2009-12-09 17:06:21 147616 ----a-w- c:\windows\system32\drivers\atapi.sys
2009-11-03 02:42:06 195456 ------w- c:\windows\system32\MpSigStub.exe

============= FINISH: 9:00:29.11 ===============



ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/12/14 09:02
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF59F8000 Size: 151552 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF0F40000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

==EOF==

BC AdBot (Login to Remove)

 


#2 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:06:07 PM

Posted 26 December 2009 - 03:02 PM

Welcome to the BleepingComputer Forums.

Since it has been a few days since you scanned your computer with HijackThis, we will need a new HijackThis log. If you have not already downloaded Random's System Information Tool (RSIT), please download Random's System Information Tool (RSIT) by random/random which includes a HijackThis log and save it to your desktop. If you have RSIT already on your computer, please run it again.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Please post the contents of log.txt.
Thank you for your patience.

Please see Preparation Guide for use before posting about your potential Malware problem.

If you have already posted this log at another forum or if you decide to seek help at another forum, please let us know. There is a shortage of helpers and taking the time of two volunteer helpers means that someone else may not be helped.

Please post your HijackThis log as a reply to this thread and not as an attachment. I am always leery of opening attachments so I always request that HijackThis logs are to be posted as a reply to the thread. I do not think that you are attaching anything scary but others may do so.

While we are working on your HijackThis log, please:
  • Reply to this thread; do not start another!
  • Do not make any changes on your computer during the cleaning process or download/add programs on your computer unless instructed to do so.
  • Do not run any other tool until instructed to do so!
  • Let me know if any of the links do not work or if any of the tools do not work.
  • Tell me about problems or symptoms that occur during the fix.
  • Do not run any other programs or open any other windows while doing a fix.
  • Ask any questions that you have regarding the fix(es), the infection(s), the performance of your computer, etc.
Thanks.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#3 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:06:07 PM

Posted 02 January 2010 - 03:55 PM

This subject is now closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users