Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hour and Date Issues


  • This topic is locked This topic is locked
20 replies to this topic

#1 Ocnain

Ocnain

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 05 February 2011 - 06:40 AM

Hi folks,

I'm having some issues with my computer. Sometimes (almost times to be fair), when I power up the computer, the date and hour of the system mess up. The interesting, and the thing that let me think that the problem is not the battery is because almost times only the hour is changed and AVIRA shows an infection in system files everytime (TR/Rootkit.Gen Trojan). Generally when the date/hour is changed at same, its battery, but when only one is changed, its not logical to be the that.

Sorry if my post is not well done, but its my first one.

I will send the Hijackthis logfile in attachment.
Firewall is deactivated in computer. I dont know why. The true is I am not the one who uses the computer, so the other users may have deactivated it.

Thanks for cooperation.

Attached Files



BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 07 February 2011 - 07:45 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below I will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE


And

Please download DeFogger to your desktop.

Double click DeFogger to run the tool.
  • The application window will appear
  • Click the Disable button to disable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK
IMPORTANT! If you receive an error message while running DeFogger, please post the log defogger_disable which will appear on your desktop.


Then

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
Posted Image
m0le is a proud member of UNITE

#3 Ocnain

Ocnain
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 09 February 2011 - 07:08 AM

Thanks, M0le, I will do what you are saying and will post here the logs as soon as possible.

#4 Ocnain

Ocnain
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 10 February 2011 - 07:38 AM

Ok, folks, posting the logs:

1. DDS log file:


DDS (Ver_10-12-12.02) - NTFSx86
Run by Administrador at 10:16:46,84 on qui 10/02/2011
Internet Explorer: 6.0.2900.2180
Microsoft Windows XP Professional 5.1.2600.2.1252.55.1046.18.479.262 [GMT -2:00]

AV: Avira AntiVir PersonalEdition *Disabled/Updated* {AD166499-45F9-482A-A743-FDD3350758C7}

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Arquivos de programas\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Arquivos de programas\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Arquivos de programas\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Documents and Settings\Administrador\Desktop\dds.scr
C:\WINDOWS\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.detran.rj.gov.br/
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\arquivos de programas\adobe\acrobat 5.0\reader\activex\AcroIEHelper.ocx
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
mRun: [avgnt] "c:\arquivos de programas\avira\antivir personaledition classic\avgnt.exe" /min
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
IE: E&xportar para o Microsoft Excel - c:\arquiv~1\micros~2\office11\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\arquivos de programas\messenger\msmsgs.exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\arquiv~1\micros~2\office11\REFIEBAR.DLL
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1243454269531
TCP: {2E33416F-40D8-4163-BCD1-35CD2CC96641} = 192.168.1.2
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll

============= SERVICES / DRIVERS ===============

R1 avgio;avgio;c:\arquivos de programas\avira\antivir personaledition classic\avgio.sys [2009-5-27 11608]
R2 AntiVirScheduler;Avira AntiVir Personal - Free Antivirus Scheduler;c:\arquivos de programas\avira\antivir personaledition classic\sched.exe [2009-5-27 68865]
R2 AntiVirService;Avira AntiVir Personal - Free Antivirus Guard;c:\arquivos de programas\avira\antivir personaledition classic\avguard.exe [2009-5-27 151297]
R3 avgntflt;avgntflt;c:\arquivos de programas\avira\antivir personaledition classic\avgntflt.sys [2009-5-27 52056]
S3 FXDrv32;FXDrv32;\??\d:\fxdrv32.sys --> d:\FXDrv32.sys [?]
S3 GT680xNT;ColorPage-Vivid 1200X;c:\windows\system32\drivers\Gt680x.sys [2009-4-16 17376]

=============== Created Last 30 ================


==================== Find3M ====================


============= FINISH: 10:16:59,78 ===============

The attach file is attached.

2. Deffoger did not restarted my computer, but I think it was well, having no problems... anyway, I'm posting the defogger_disable.log file right here:


defogger_disable by jpshortstuff (23.02.10.1)
Log created at 10:19 on 10/02/2011 (Administrador)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-

3. Now, posting the GMER clipboarded copy:

GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-02-10 10:26:40
Windows 5.1.2600 Service Pack 2
Running: 0e2w9q5o.exe


---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\system32\DRIVERS\nvmini.sys (*** hidden *** ) [AUTO] nvmini <-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@Type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@Start 2
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@ErrorControl 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@ImagePath system32\DRIVERS\nvmini.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@DisplayName NVIDIA Compatible Windows Miniport Driver
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@Tag 7
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini@Group Pointer Port
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini\Security
Reg HKLM\SYSTEM\CurrentControlSet\Services\nvmini\Security@Security 0x01 0x00 0x14 0x80 ...
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@Type 1
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@Start 2
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@ErrorControl 0
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@ImagePath system32\DRIVERS\nvmini.sys
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@DisplayName NVIDIA Compatible Windows Miniport Driver
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@Tag 7
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini@Group Pointer Port
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini\Security (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\nvmini\Security@Security 0x01 0x00 0x14 0x80 ...

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\dllcache\linkinfo.dll 18944 bytes executable
File C:\WINDOWS\system32\drivers\nvmini.sys 17152 bytes executable <-- ROOTKIT !!!
File C:\WINDOWS\system32\linkinfo.dll 18944 bytes executable
File C:\WINDOWS\linkinfo.dll 46592 bytes executable

---- EOF - GMER 1.0.15 ----

4. And, to be sure, I have zipped the saved gmer.log and attached as well.

M0le, I did all you said to do, step by step. Found no problems. Here is the logs and files. Thanks for cooperation.
I make bold the steps I did, to help your visualization. Hope it was usefull.

Attached Files



#5 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 10 February 2011 - 07:16 PM

You do have a parasitic worm in the Gmer log. Please run Combofix at this stage

Please download ComboFix from one of these locations:* IMPORTANT !!! Save ComboFix.exe to your Desktop making sure you rename it comfix.exe
  • Disable your AntiVirus and AntiSpyware applications including Firewalls, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Comfix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image
m0le is a proud member of UNITE

#6 Ocnain

Ocnain
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 11 February 2011 - 12:19 PM

Thanks, M0le. I've downloaded and ran Combofix, but I wanna say something. I've used a pendrive to copy combofix to the infected computer, and when I returned the pendrive to the original computer I saw an virus in it. It was an autorun.inf file that runs a boot.exe infected and hidden file. I've returned the pendrive once on the infected computer after running combofix. May have it reinfected the computer?

All combofix logs I found (including the c:\combofix.txt) are attached.

Attached Files


Edited by Ocnain, 11 February 2011 - 12:33 PM.


#7 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 11 February 2011 - 05:12 PM

Plug the pendrive into the infected computer and rerun Combofix. We can clean it without it infecting a clean machine.
Posted Image
m0le is a proud member of UNITE

#8 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 13 February 2011 - 07:18 PM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#9 Ocnain

Ocnain
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 14 February 2011 - 08:49 AM

Hello, M0le.

I did it. Ran Combofix with the pendrive plugged and saw no viruses on it after. Now, here is the combofix log again. If tomorrow the hour change again, I will tell you.

Sorry, I delayed the answer because it was weekend.

Please, read the logs and see if it seems still have maware, and tomorrow I will answer you if the computer is fine.

Attached Files


Edited by Ocnain, 14 February 2011 - 08:50 AM.


#10 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 14 February 2011 - 05:26 PM

Your pendrive has a malicious process (though it has been stopped). Plug it in and then rerun Combofix as below.

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Open notepad and copy/paste the text in the box below into it:

File::
d:\FXDrv32.sys

Driver::
FXDrv32


Save this as CFScript.txt, in the same location as Comfix.exe (called ComboFix.exe in the below graphic)


Posted Image

Refering to the picture above, drag CFScript into ComboFix.exe

If the program requests for you to update Combofix then click Yes.

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.
Posted Image
m0le is a proud member of UNITE

#11 Ocnain

Ocnain
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brasil
  • Local time:10:52 PM

Posted 15 February 2011 - 11:11 AM

Ok, M0le, Did it.

Here is the logs.

Attached Files



#12 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 15 February 2011 - 05:15 PM

Let's see an online scanner next

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Leave the top box checked and then check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
NOTE: If no malware is found then no log will be produced. Let me know if this is the case.
Posted Image
m0le is a proud member of UNITE

#13 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 17 February 2011 - 08:39 PM

Hi,

I have not had a reply from you for 3 days. Can you please tell me if you still need help with your computer as I am unable to help other members with their problems while I have your topic still open. The time taken between posts can also change the situation with your PC making it more difficult to help you.

If you like you can PM me.

Thanks,


m0le
Posted Image
m0le is a proud member of UNITE

#14 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 18 February 2011 - 09:14 PM

This topic has been closed.

If you're the topic starter, and need this topic reopened, please contact me via pm with the address of the thread.

Everyone else please begin a New Topic.
Posted Image
m0le is a proud member of UNITE

#15 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:12:52 AM

Posted 21 February 2011 - 05:29 PM

Reopened at user's request

-----------------------------------------

Away you go, Ocnain. Glad you're feeling better :)
Posted Image
m0le is a proud member of UNITE




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users