Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with remaining effects of Trojan Vundo H


  • This topic is locked This topic is locked
2 replies to this topic

#1 ICYUNVLUCKIEME

ICYUNVLUCKIEME

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:38 AM

Posted 15 January 2010 - 02:42 PM

I am trying to repair my boyfriends computer. I did a few different scans and ended up using malwarebytes anti-malware to remove the trojan.vundo.h and a few other things that were with it. (I do still have the log that was generated after the removal if needed). I got everything looking back normal except when I go online and do a google search and click to go to a particular site it redirects me to random virus protection sites usually. If I am going to a site like yahoo from google or if I type in a direct website address I do not have a problem. Please help i have been working on this for a few hours and my brain is fried. I am a starter level computer nerd and I have gotten most of my information by searching online.

I have pasted below the dds.txt file and also attached the attach.txt file after running hijackthis. I was not able to save rootrepeal.exe on the machine. Thanks in advance for any assistance.


DDS (Ver_09-12-01.01) - NTFSx86
Run by Boyd at 13:03:57.68 on Fri 01/15/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1918.1037 [GMT -6:00]

AV: Norton AntiVirus *On-access scanning enabled* (Updated) {E10A9785-9598-4754-B552-92431C1C35F8}

============== Running Processes ===============

C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\Ati2evxx.exe
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\WINDOWS\system32\agrsmsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\bmwebcfg.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\Program Files\Norton AntiVirus\Engine\17.1.0.19\ccSvcHst.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Roxio\Easy CD Creator 6\DragToDisc\DrgToDsc.exe
C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\RxMon.exe
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\TOSHIBA\IVP\ISM\pinger.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Common Files\Intuit\QuickBooks\QBCFMonitorService.exe
C:\WINDOWS\system32\spool\drivers\w32x86\3\hpztsb04.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Norton AntiVirus\Engine\17.1.0.19\ccSvcHst.exe
C:\PROGRA~1\Ahead\Ahead\data\Xtras\mssysmgr.exe
C:\Program Files\Roxio\Easy CD Creator 6\AudioCentral\Playlist.exe
C:\Program Files\Messenger\msmsgs.exe
C:\Program Files\Yahoo!\Search Protection\SearchProtection.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
c:\TOSHIBA\IVP\swupdate\swupdtmr.exe
C:\WINDOWS\system32\TODDSrv.exe
C:\WINDOWS\system32\MsPMSPSv.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\PROGRA~1\Yahoo!\MESSEN~1\ymsgr_tray.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\TrendMicro\HiJackThis\HiJackThis.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Boyd\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/
uSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
uSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
mDefault_Page_URL = hxxp://www.yahoo.com/
mDefault_Search_URL = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
mSearch Page = hxxp://us.rd.yahoo.com/customize/ie/defaults/sp/msgr9/*http://www.yahoo.com
mStart Page = hxxp://www.yahoo.com/
mSearch Bar = hxxp://us.rd.yahoo.com/customize/ie/defaults/sb/msgr9/*http://www.yahoo.com/ext/search/search.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://us.rd.yahoo.com/customize/ie/defaults/su/msgr9/*http://www.yahoo.com
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
mURLSearchHooks: H - No File
BHO: &Yahoo! Toolbar Helper: {02478d38-c3f9-4efb-9b51-7695eca05670} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg8\avgssie.dll
BHO: {9e27127c-9a0d-43c8-a2d6-0070e8bf6e2a} - tawekole.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.4.4525.1752\swg.dll
BHO: SingleInstance Class: {fdad4da1-61a2-4fd8-9c17-86f7ac245081} - c:\program files\yahoo!\companion\installs\cpn1\YTSingleInstance.dll
TB: {A057A204-BACC-4D26-9990-79A187E2698E} - No File
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} - c:\program files\yahoo!\companion\installs\cpn1\yt.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [PhotoShow Deluxe Media Manager] c:\progra~1\ahead\ahead\data\xtras\mssysmgr.exe
uRun: [MSMSGS] "c:\program files\messenger\msmsgs.exe" /background
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messen~1\YahooMessenger.exe" -quiet
uRun: [Search Protection] c:\program files\yahoo!\search protection\SearchProtection.exe
uRun: [swg] c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 8.0\reader\Reader_sl.exe"
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [RoxioEngineUtility] "c:\program files\common files\roxio shared\system\EngUtil.exe"
mRun: [RoxioDragToDisc] "c:\program files\roxio\easy cd creator 6\dragtodisc\DrgToDsc.exe"
mRun: [RoxioAudioCentral] "c:\program files\roxio\easy cd creator 6\audiocentral\RxMon.exe"
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SoundMan] SOUNDMAN.EXE
mRun: [AlcWzrd] ALCWZRD.EXE
mRun: [Alcmtr] ALCMTR.EXE
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [AT&T Communication Manager] "c:\program files\at&t\communication manager\ATTCM.exe" -a
mRun: [HPDJ Taskbar Utility] c:\windows\system32\spool\drivers\w32x86\3\hpztsb04.exe
mRun: [MSConfig] c:\windows\pchealth\helpctr\binaries\MSConfig.exe /auto
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adobeg~1.lnk - c:\program files\common files\adobe\calibration\Adobe Gamma Loader.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\quickb~1.lnk - c:\program files\common files\intuit\quickbooks\qbupdate\qbupdate.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_60D6097707281E79.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
LSP: bmnet.dll
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Handler: intu-help-qb2 - {84D77A00-41B5-4b8b-8ADF-86486D72E749} - c:\program files\intuit\quickbooks 2009\HelpAsyncPluggableProtocol.dll
Handler: qbwc - {FC598A64-626C-4447-85B8-53150405FD57} - c:\windows\system32\mscoree.dll
Notify: AtiExtEvent - Ati2evxx.dll
AppInit_DLLs: c:\progra~1\google\google~1\goec62~1.dll c:\windows\system32\ c:\windows\system32\jozuwitu.dll sehajiwi.dll c:\windows\system32\layepezo.dll c:\windows\system32\judopuje.dll c:\windows\system32\gehuseda.dll c:\windows\system32\dopowihi.dll c:\windows\system32\zehekilo.dll c:\windows\system32\kavunize.dll c:\windows\system32\yederoda.dll c:\windows\system32\venaluwe.dll c:\windows\system32\jugusaja.dll c:\windows\system32\lanefiki.dll
SSODL: galonalul - {95e33e27-8a16-4c67-96f3-57a189b6deda} - c:\windows\system32\jozuwitu.dll
SSODL: punuturad - {2fd6ae45-7b8e-4c23-a58a-e487a33803f4} - No File
SSODL: jehovagut - {fbd40657-fd7a-4a3c-a037-4e40976e5a90} - No File
SSODL: tukakilig - {4ecd83fb-dade-4aaa-b8b2-9dd266b4bd1c} - No File
SSODL: wozatotug - {6e96f377-62d3-4c81-838d-7a72fbfb6238} - No File
SSODL: nayasidiw - {cfbfbfa9-61e3-40fe-8276-44ff96496577} - No File
STS: tokatiluy: {95e33e27-8a16-4c67-96f3-57a189b6deda} - c:\windows\system32\jozuwitu.dll
STS: mujuzedij: {0759ba6f-06e1-4ef9-88c1-7b7c401c9250} - c:\windows\system32\womojozo.dll
STS: tokatiluy: {0236e752-5d22-4839-94c2-1344b6238517} - c:\windows\system32\womojozo.dll
STS: tokatiluy: {48c63611-adfd-4f80-a958-3453956fa170} - c:\windows\system32\layepezo.dll
STS: mujuzedij: {ddc55fc1-d595-4dc0-913d-f3821f2c7409} - c:\windows\system32\fugudipi.dll
STS: kupuhivus: {650f3cf0-af5d-4d07-af69-11c3d5ac51aa} - c:\windows\system32\zehekilo.dll
STS: jugezatag: {48d1894b-c9b3-49d5-887f-e1993bba74d9} - c:\windows\system32\zehekilo.dll
STS: jugezatag: {afffb957-5283-45d7-aa96-d36bdf52b0e4} - c:\windows\system32\kavunize.dll
STS: tokatiluy: {dcee3e1d-53d6-4d3a-a143-9851855486dc} - c:\windows\system32\judopuje.dll
STS: gahurihor: {9dfcb95d-de8f-460b-b392-0bcfbae5af5b} - c:\windows\system32\layepezo.dll
STS: {4ed55098-20c3-4a1b-87ea-e7bde7a163ce} - No File
STS: kupuhivus: {23b9f361-e879-4cb0-ab79-3bdb7629d2d4} - c:\windows\system32\yederoda.dll
STS: jugezatag: {632785a1-6dee-47e2-b15e-6412854f5de8} - c:\windows\system32\jugusaja.dll
STS: mujuzedij: {0dd859d0-7ea0-4949-86c4-108941734dc7} - c:\windows\system32\venaluwe.dll
STS: tokatiluy: {51cb1e52-608a-4135-a244-a4dba8356dea} - c:\windows\system32\lanefiki.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\window~4\MpShHook.dll
LSA: Notification Packages = scecli sehajiwi.dll kozafuli.dll

============= SERVICES / DRIVERS ===============

R0 SymDS;Symantec Data Store;c:\windows\system32\drivers\nav\1101000.013\SymDS.sys [2010-1-9 328752]
R0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\nav\1101000.013\SymEFA.sys [2010-1-9 171056]
R1 BHDrvx86;BHDrvx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\bashdefs\20091205.001\BHDrvx86.sys [2009-12-4 529456]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nav\1101000.013\cchpx86.sys [2010-1-9 501888]
R1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\nav\1101000.013\Ironx86.sys [2010-1-9 114736]
R2 NAV;Norton AntiVirus;c:\program files\norton antivirus\engine\17.1.0.19\ccSvcHst.exe [2010-1-9 126392]
R2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2010-1-9 102448]
R3 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\ipsdefs\20100112.001\IDSXpx86.sys [2010-1-14 329592]
R3 NAVENG;NAVENG;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\virusdefs\20100114.048\NAVENG.SYS [2010-1-15 84912]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\nav_17.0.0.136\definitions\virusdefs\20100114.048\NAVEX15.SYS [2010-1-15 1323568]
R3 QuickBooksDB19;QuickBooksDB19;c:\progra~1\intuit\quickb~1\qbdbmgrn.exe -hvquickbooksdb19 --> c:\progra~1\intuit\quickb~1\QBDBMgrN.exe -hvQuickBooksDB19 [?]
S3 ATTRcAppSvc;AT&T RcAppSvc;c:\program files\at&t\communication manager\RcAppSvc.exe [2008-5-23 106496]
S3 EraserUtilDrvI9;EraserUtilDrvI9;\??\c:\program files\common files\symantec shared\eengine\eraserutildrvi9.sys --> c:\program files\common files\symantec shared\eengine\EraserUtilDrvI9.sys [?]
S3 SWNC8U80;Sierra Wireless MUX NDIS Driver (UMTS80);c:\windows\system32\drivers\swnc8u80.sys [2008-1-10 165248]
S3 SWUMX80;Sierra Wireless USB MUX Driver (UMTS80);c:\windows\system32\drivers\swumx80.sys [2008-1-10 142976]

=============== Created Last 30 ================

2010-01-15 18:01:05 0 d-----w- c:\program files\TrendMicro
2010-01-15 14:42:47 0 d-----w- c:\docume~1\boyd\applic~1\Tific
2010-01-15 14:41:44 0 d-----w- c:\docume~1\boyd\applic~1\Malwarebytes
2010-01-15 14:41:32 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-01-15 14:41:30 0 d-----w- c:\docume~1\alluse~1\applic~1\Malwarebytes
2010-01-15 14:41:29 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-01-15 14:41:29 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2010-01-15 06:00:22 664 ----a-w- c:\windows\system32\d3d9caps.dat
2010-01-15 06:00:22 552 ----a-w- c:\windows\system32\d3d8caps.dat
2010-01-15 02:12:13 471552 -c----w- c:\windows\system32\dllcache\aclayers.dll
2010-01-14 23:11:50 0 d-----w- c:\docume~1\boyd\applic~1\Symantec
2010-01-10 04:53:38 805 ----a-w- c:\windows\system32\drivers\SYMEVENT.INF
2010-01-10 04:53:38 7443 ----a-w- c:\windows\system32\drivers\SYMEVENT.CAT
2010-01-10 04:53:38 60808 ----a-w- c:\windows\system32\S32EVNT1.DLL
2010-01-10 04:53:38 124976 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2010-01-10 04:53:34 0 d-----w- c:\program files\Symantec
2010-01-10 04:53:34 0 d-----w- c:\program files\common files\Symantec Shared
2010-01-10 04:52:08 0 d-----w- c:\windows\system32\drivers\NAV
2010-01-10 04:52:04 0 d-----w- c:\program files\Norton AntiVirus
2010-01-10 00:36:06 0 d-----w- c:\docume~1\alluse~1\applic~1\Norton
2010-01-10 00:33:13 0 d-----w- c:\program files\NortonInstaller
2010-01-10 00:33:13 0 d-----w- c:\docume~1\alluse~1\applic~1\NortonInstaller
2009-12-25 21:12:22 0 d-----w- c:\windows\pss
2009-12-25 21:01:14 0 d-----w- c:\docume~1\alluse~1\applic~1\Sprint
2009-12-25 18:49:27 2127 ----a-w- c:\windows\wininit.ini
2009-12-24 20:04:16 0 ----a-w- c:\windows\system32\15724.exe
2009-12-24 18:44:15 0 ----a-w- c:\windows\system32\18467.exe

==================== Find3M ====================

2009-11-03 02:42:06 195456 ------w- c:\windows\system32\MpSigStub.exe
2009-10-29 07:45:38 916480 ----a-w- c:\windows\system32\wininet.dll
2009-10-21 05:38:36 75776 ----a-w- c:\windows\system32\strmfilt.dll
2009-10-21 05:38:36 25088 ----a-w- c:\windows\system32\httpapi.dll

============= FINISH: 13:05:36.34 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:38 AM

Posted 21 January 2010 - 08:37 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

----------------------------------------------

As RootRepeal is having understandable problems can you try Gmer please. It is a similar rotkit scanner.

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:09:38 AM

Posted 27 January 2010 - 03:13 PM

Since this issue appears to be resolved ... this topic has been closed. Glad we could help. smile.gif

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users