Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan Horse BackDoor.Generic16.AEPV - how to get rid of this?


  • Please log in to reply
12 replies to this topic

#1 wish2learn

wish2learn

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 08 March 2013 - 01:41 PM

Hi,

I have Windows XP 32bit, with AVG free edition ( which I update regularly) and Malwarebytes latest edition which I update each time before I do a scan.

2 days ago after a full system scan with AVG I see that 2 items, both named Trojan Horse BackDoor.Generic16.AEPV have been moved into the Virus Vault. On the first day the list showed a sound recording progam I am familiar with - the original exe installer file which has been there for years was infected. I have had this program for years without any problems and I think the Trojan somehow recently invaded the exe.

I deleted the obove mentioned exe to no avail. Then I uninstalled the program itself via Windows Add & Remove Programs... but to no avail.

I ran another full system scan with AVG but this time the above mentioned Trojan's showed up in the Virus Vault in 2 new (but greyed out and inaccessible) folders. AVG stated that it was unable to remove them when I tried to 'remove all unhealed objects'.
I then tried to manually remove the folders but as mentioned, they quite inaccessible greyed-out folders.

Today I ran a full system scan with Malwarebytes (recently updated) and it came up clean!
I'm not sure if this is because the Trojan's are currently locked in AVG's virus vault and no longer in the folders?? Or if Malwarebytes don't see them as a problem??

I don't know what to do or how to get rid of this infection, please can someone knowledgable help me?

Thanks kindly for your input.

BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:08:02 PM

Posted 08 March 2013 - 01:49 PM

  • Please download TDSSKiller from here and save it to your Desktop
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters


    tds2.jpg

  • Check Loaded Modules  and Detect TDLFS file systemDo not check Verify file digital signatures (even though it is checked in the example)
  • If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now


    2012081514h0118.png

  • Click Start Scan and allow the scan process to run

  • If threats are detected select Skip for all of them unless I instruct you otherwise
  • Click Continue


    tds6.jpg

  • Click Reboot computer
  • Please post the contents of  TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)in your reply


===================================================


aswMBR

--------------------

  • Download aswMBR and save it to your desktop.
  • Please disable your real time protection of any Antivirus, Antispyware or Antimalware programs temporarily. They will interfere and may cause unexpected results.
  • If you need help to disable your protection programs see here and here.
  • Double click the aswMBR.exe file to run it. Please allow when you are asked to download AVAST antivirus engine defs.
  • Wait until the AV update is done, then click on the Scan button to start. The program will launch a scan.


    aswMBR1.png
  • When done, you will see Scan finished successfully. Please click on Save log and save the file to your desktop.


    aswMBR2.png
  • Please post the contents of the log in your next reply.

NOTE:  aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.


===================================================


ESET Online Scanner

--------------------

I'd like us to scan your machine with ESET OnlineScan  This process may may take several hours, that is normal

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png  button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.

    esetsmartinstaller_enu.png

  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:

    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Copy and paste the information in your next reply.   Note:  If no malware was found you will not get a log.
  • Click the Back button.
  • Click the Finish button.


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • TDSSKiller log
  • aswMBR log
  • ESET results

 



#3 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 09 March 2013 - 05:52 AM

Firstly, thank you for your detailed response.
I however, have a few questions along the way:
 
1) How do I get the TDSSKiller  to scan my 2nd hard drive which I have on this computer?
 TDSSKiller stops after scanning the smaller C:drive and I cannot see how to get it to scan the other drive. I always scan both with all antivirus programs. 
 
2) The TDSSKiller comes up clean after a remarkably quick scan of 17 seconds!.. on the C:drive, but for some unknown reason the selected text results will not enable me a right click for copy/paste. This function is working with all other programs - I double checked
 
I made screen grabs to show you but see there is no way of posting them here.
The main thing is that TDSSKiller comes up clean on my C: drive and as mentioned above I'm unable to copy/paste the results here for you. But the results clearly confirm that no problems were detected on this drive.
 
I carefully followed all your instructions up to this point but am now unsure as to how to proceed. Feeling certain that I must first somehow scan the other hard drive before I can proceed to next step?

P.S: The AVG virus vault clearly shows the Trojans as located in my 2nd hard drive and not on the C drive.
 
Thanks kindly
 
  
 

Edited by wish2learn, 09 March 2013 - 05:58 AM.


#4 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:08:02 PM

Posted 09 March 2013 - 09:03 AM

Move to other scans and post the log.



#5 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 11 March 2013 - 11:56 AM

The aswMBR log:

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2013-03-11 13:16:03
-----------------------------
13:16:03.328    OS Version: Windows 5.1.2600 Service Pack 3
13:16:03.328    Number of processors: 2 586 0x403
13:16:03.328    ComputerName: SPRINGFIELD  UserName: Rowena
13:16:03.671    Initialize success
13:16:17.968    AVAST engine defs: 13031100
13:16:25.875    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-17
13:16:25.875    Disk 0 Vendor: ST3120813AS 3.AAD Size: 114472MB BusType: 3
13:16:25.875    Disk 1  \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP3T0L0-22
13:16:25.875    Disk 1 Vendor: ST3500320AS SD15 Size: 476940MB BusType: 3
13:16:25.890    Disk 0 MBR read successfully
13:16:25.890    Disk 0 MBR scan
13:16:25.921    Disk 0 Windows XP default MBR code
13:16:25.921    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS       114470 MB offset 63
13:16:25.937    Disk 0 scanning sectors +234436545
13:16:25.984    Disk 0 scanning C:\WINDOWS\system32\drivers
13:16:37.906    Service scanning
13:16:58.343    Modules scanning
13:17:03.765    Disk 0 trace - called modules:
13:17:03.765    ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
13:17:03.781    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8aa3eab8]
13:17:03.781    3 CLASSPNP.SYS[b80e8fd7] -> nt!IofCallDriver -> \Device\0000007d[0x8aa469e8]
13:17:03.781    5 ACPI.sys[b7f7f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-17[0x8a9d4d98]
13:17:04.187    AVAST engine scan C:\
16:45:27.859    Scan finished successfully
16:51:21.781    Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Rowena\Desktop\MBR.dat"
16:51:21.781    The log file has been saved successfully to "C:\Documents and Settings\Rowena\Desktop\aswMBR.txt"
 
 
aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software
Run date: 2013-03-11 16:51:52
-----------------------------
16:51:52.093    OS Version: Windows 5.1.2600 Service Pack 3
16:51:52.093    Number of processors: 2 586 0x403
16:51:52.093    ComputerName: SPRINGFIELD  UserName: Rowena
16:51:54.359    Initialize success
16:52:14.593    AVAST engine defs: 13031100
16:52:25.609    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-17
16:52:25.609    Disk 0 Vendor: ST3120813AS 3.AAD Size: 114472MB BusType: 3
16:52:25.609    Disk 1  \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP3T0L0-22
16:52:25.609    Disk 1 Vendor: ST3500320AS SD15 Size: 476940MB BusType: 3
16:52:25.656    Disk 0 MBR read successfully
16:52:25.656    Disk 0 MBR scan
16:52:25.687    Disk 0 Windows XP default MBR code
16:52:25.703    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS       114470 MB offset 63
16:52:25.734    Disk 0 scanning sectors +234436545
16:52:25.984    Disk 0 scanning C:\WINDOWS\system32\drivers
16:53:09.281    Service scanning
16:53:29.890    Modules scanning
16:54:42.187    Disk 0 trace - called modules:
16:54:42.218    ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
16:54:42.234    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8aa3eab8]
16:54:42.234    3 CLASSPNP.SYS[b80e8fd7] -> nt!IofCallDriver -> \Device\0000007d[0x8aa469e8]
16:54:42.234    5 ACPI.sys[b7f7f620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-17[0x8a9d4d98]
16:54:42.875    AVAST engine scan F:\
18:45:14.890    Scan finished successfully
18:45:36.234    Disk 0 MBR has been saved successfully to "C:\Documents and Settings\Rowena\Desktop\MBR.dat"
18:45:36.281    The log file has been saved successfully to "C:\Documents and Settings\Rowena\Desktop\aswMBR.txt"
 
Not as yet able to complete ESET scan as I do not have ADSL and my Internet connection has been sticky recently...
Can you see anything amiss in the above results?


#6 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:08:02 PM

Posted 11 March 2013 - 01:31 PM

Try to run it safemode with networking



#7 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 13 March 2013 - 04:10 AM

ESET does not allow me to select which hard drive for scanning.

And when the Internet connection drops (which it does periodically over the space of many hours needed for scanning) then the scan must be restarted from scratch each time.

 

Is there a way to ESET scan without being online?



#8 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:08:02 PM

Posted 13 March 2013 - 11:04 AM

P.S: The AVG virus vault clearly shows the Trojans as located in my 2nd hard drive and not on the C drive.

 

What is the location?

 

 

Malwarebytes

--------------------

Please download Malwarebytes Anti-Malware and save it to your desktop.  If you already have it installed launch the program and update the database.

  • Make sure you are connected to the Internet and double-click on the it to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings except to uncheck any offer for a free Pro trial version
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.

Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


===================================================


Farbar's MiniToolBox

--------------------

  • Please download MiniToolBox, save it to your desktop
  • Please close any Firefox browsers you may have open
  • Double click the MiniToolBox.jpg icon to launch the program
  • Make sure the following options are checked:

    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List content of Hosts
    • List IP configuration
    • List Winsock Entries
    • List last 10 Event Viewer log
    • List Installed Programs
    • List Devices
    • List Users, Partitions and Memory size.
  • Click Go and once the scan is completed a Result.txt Notepad document will open on your desktop
  • Please copy and paste the contents in your reply


===================================================


Farbar's Service Scanner

--------------------

Please download Farbar Service Scanner, save it to your desktop, and run it.

  • Make sure the following options are checked:

    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


===================================================


AdwCleaner by Xplode - Search for Adware

-------------------

  • Please download AdwCleaner by Xplode onto your desktop.
  • Double click on AdwCleaner.exe, select OK, then Run
  • Click on DELETE
  • A logfile will automatically open after the scan has finished
  • Copy and paste the contents in your reply
  • You can find the logfile at C:\AdwCleaner[R1].txt as well


===================================================


Junkware Removal Tooll by thisisu

-------------------

  • Please download Junkware Removal Tool and save it to your desktop.
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Right-mouse click JRT.exe and select Run as administrator (Windows XP double click the icon)
  • Please allow the program time to run
  • Once completed a Notepad document will open on your desktop
  • Copy and paste the contents in your reply


===================================================


Rkill

-------------------

Please download Rkill by Grinler from one of the 4 links below (if one of them does not work try another...) and save it to your desktop:


  • In order for Rkill to run properly you must disable your anti-malware software.  Please refer to this page if you are not sure how.
  • Double-click on Rkill. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
    • Note:  You may have to run Rkill a few times before it is successful.  You may also have to download Rkill from a different link which will save it as a different file name.
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • An Rkill.log will appear.  Please copy and paste the contents in your reply (file also located at c:\rkill.log)
  • Do not reboot your computer after running Rkill as the malware programs will start again.  If your computer reboots, run Rkill again before continuing on to the next step.
  • If nothing happens or if the tool does not run, please let me know in your next reply.


===================================================


Autoruns

--------------------

  • Please download AutoRuns and save it to your desktop
  • Double click the AutoRuns.zip folder
  • Double click autoruns.exe (not autorunsc.exe), select Run, then Run again and allow the information to populate
  • Select File, Save, Desktop (in the left hand pane), then Save filename as Autoruns.txt and change Save as type to  Text(*.txt).
  • Double click on the text file,copy and paste the contents in your reply


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • Malwarebytes log
  • MiniToolBox log
  • Farbar's Service Scanner log
  • AdwCleaner log
  • Junkware Removal Tool log
  • Rkill log
  • Autoruns log

 



#9 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 14 March 2013 - 07:08 AM

What is the location? 


Something very strange has occurred since my first post. The Trojan Horse Backdoor (as named in title) seems to have disappeared. Also, my P.C starts up much faster now so seeming to suggest that something has been removed.

Even more strange is that AVG no longer lists the infection in its virus vault - an infection which AVG first stated was 'too large' to remove. After I followed the path to manually remove the infected files myself, then ran another scan to check if the problem had been fixed - and after this AVG stated that the folders where the Trojan's were located we're inaccessible. I followed the path to find these folders greyed out and inaccessible.

But I took a screen grab of the AVG virus vault after the second scan which read as follows:
f:/Program Files/Recording Device/Free Sound Recorder
f:/System Volume Information/Restore(DC7842DF-

I have had experience with both AVG and Zone Alarm whereby a problem is found which cannot be removed and then I receive several prompts to upgrade and purchase. I thought this was an unlikely coincidence but this experience seems similar.
Perhaps it's time to try another program.

A big problem in the meantime is that something has caused my keyboard to stop functioning... which renders my PC useless for the meantime (even though the mouse/cursor still works)

#10 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 14 March 2013 - 08:39 AM

I have re installed the Keyboard



#11 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:08:02 PM

Posted 14 March 2013 - 10:59 AM

Please post the logs.



#12 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 14 March 2013 - 11:07 AM

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org
 
Database version: v2013.03.14.06
 
Windows XP Service Pack 3 x86 NTFS
Internet Explorer 7.0.5730.13
Rowena :: SPRINGFIELD [administrator]
 
3/14/2013 3:43:01 PM
mbam-log-2013-03-14 (15-43-01).txt
 
Scan type: Full scan (C:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled: 
Objects scanned: 571576
Time elapsed: 1 hour(s), 55 minute(s), 57 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
(end)


#13 wish2learn

wish2learn
  • Topic Starter

  • Members
  • 72 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 14 March 2013 - 11:25 AM

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.03.14.06

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 7.0.5730.13
Rowena :: SPRINGFIELD [administrator]

3/14/2013 3:43:01 PM
mbam-log-2013-03-14 (15-43-01).txt

Scan type: Full scan (C:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P
Scan options disabled:
Objects scanned: 571576
Time elapsed: 1 hour(s), 55 minute(s), 57 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
..................................................................................................

Edited by wish2learn, 14 March 2013 - 11:35 AM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users