Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with the GPUpd53BF48851.exe PUP/Trojan?


  • This topic is locked This topic is locked
3 replies to this topic

#1 Azr

Azr

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:32 AM

Posted 11 July 2014 - 06:21 PM

Hi, I am Michael, and I believe my computer is infected with something that seemingly can't be removed called GPUpd53BF48851.exe.

 

MalwareBytes AnitMalware has been alerting me every day this past week of its quarantining of the Trojan.Downloader/PUP.Optional.FreeSiftwareToday.A named GPUpd53BF48851.exe located in the AppData\Local\Temp directory. I don't know what this virus does, or if it is just a false positive.

 

I ran FRST per instructions of the pinned post and attached the files FRST.txt and Addition.txt to this message.

 

The scan with aswMBR.exe is only a few lines, so I'll just post the contents in this message:

 

aswMBR version 1.0.1.2041 Copyright© 2014 AVAST Software
Run date: 2014-07-11 14:25:22
-----------------------------
14:25:22.087    OS Version: Windows x64 6.1.7601 Service Pack 1
14:25:22.087    Number of processors: 8 586 0x3A09
14:25:22.088    ComputerName: AZR  UserName: 
14:25:22.278    Initialize success
14:25:22.296    VM: initialized successfully
14:25:22.297    VM: Intel CPU supported 
14:25:41.879    VM: disk I/O iaStorA.sys
14:27:08.041    AVAST engine defs: 14071100
14:29:22.955    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000073
14:29:22.956    Disk 0 Vendor: ATA_____ BB6Q Size: 114473MB BusType: 11
14:29:22.965    Disk 0 MBR read successfully
14:29:22.966    Disk 0 MBR scan
14:29:22.969    Disk 0 Windows 7 default MBR code
14:29:22.971    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS          100 MB offset 2048
14:29:22.973    Disk 0 default boot code
14:29:22.976    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS       102924 MB offset 206848
14:29:22.985    Disk 0 scanning C:\Windows\system32\drivers
14:29:25.100    Service scanning
14:29:30.705    Modules scanning
14:29:30.711    Disk 0 trace - called modules:
14:29:30.745    ntoskrnl.exe CLASSPNP.SYS disk.sys iaStorF.sys SamsungRapidDiskFltr.sys storport.sys 
14:29:30.749    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa800973b790]
14:29:30.751    3 CLASSPNP.SYS[fffff88001d4843f] -> nt!IofCallDriver -> [0xfffffa8007a42c50]
14:29:30.754    5 iaStorF.sys[fffff8800161c168] -> nt!IofCallDriver -> [0xfffffa8007a41a80]
14:29:30.757    7 SamsungRapidDiskFltr.sys[fffff88000dc5b8f] -> nt!IofCallDriver -> \Device\00000073[0xfffffa800763f2e0]
14:29:30.877    AVAST engine scan C:\Windows
14:29:31.279    AVAST engine scan C:\Windows\system32
14:30:24.256    AVAST engine scan C:\Windows\system32\drivers
14:30:27.390    AVAST engine scan C:\Users\Michael
14:30:47.805    File: C:\Users\Michael\Desktop\DNT viewer\oldDNmod\DN Mods Packer\DN Mods Packer.exe  **INFECTED** Win32:Trojan-gen
14:30:51.723    AVAST engine scan C:\ProgramData
14:30:55.313    Scan finished successfully
14:32:40.914    Disk 0 MBR has been saved successfully to "C:\Users\Michael\Desktop\aswMBR\MBR.dat"
14:32:40.917    The log file has been saved successfully to "C:\Users\Michael\Desktop\aswMBR\aswMBR.txt"
 
I bolded the part where it says my system is infected because I've used that tool for a while (months) and was not aware of it being infected; the tool itself is used to extract and compile .pak files. I doubt this is related to the GPUpd53BF48851.exe virus.
 
Thank you for your help - it is greatly appreciated.

Attached Files



BC AdBot (Login to Remove)

 


#2 Azr

Azr
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:32 AM

Posted 12 July 2014 - 01:12 PM

Adding relevant information: MBAM protection log with extraneous information removed. It seems this PUP/Trojan first started appearing on 7/5/2014, but has been persistent each day since then. Strangely enough, the time of detection for the more recent entries were similar.
 
Example of detection today:
gyKnb5a.png
 
Full log:
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Protection, 7/12/2014 11:58:00 AM, SYSTEM, AZR, Protection, Malicious Website Protection, Started, 
Update, 7/12/2014 12:08:03 PM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.11.8, 2014.7.12.5, 
Detection, 7/12/2014 1:51:30 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\GPUpd53C175991.exe, Quarantine, [347307975a2179bde9557754c83ccf31]
Detection, 7/12/2014 1:51:30 PM, SYSTEM, AZR, Protection, Malware Protection, File, Trojan.Downloader, C:\Users\Michael\AppData\Local\Temp\GPUpd53C175A22.exe, Quarantine, [099e316d1b609a9c95e05deca35d22de]
 
Update, 7/11/2014 1:05:45 AM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.11.1, 2014.7.11.2, 
Detection, 7/11/2014 1:51:23 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\GPUpd53C024191.exe, Quarantine, [0f35e6b8d3a8e0568ce29b2ff90b4ab6]
Detection, 7/11/2014 1:51:23 PM, SYSTEM, AZR, Protection, Malware Protection, File, Trojan.Downloader, C:\Users\Michael\AppData\Local\Temp\GPUpd53C0241B2.exe, Quarantine, [0440722c1665e4523839ad9c34ccc63a]
 
Update, 7/10/2014 1:09:25 PM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.9.13, 2014.7.10.5, 
Detection, 7/10/2014 1:51:45 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\GPUpd53BED2991.exe, Quarantine, [5885d5c8fa812e089310d9ef2bd9db25]
Detection, 7/10/2014 1:51:46 PM, SYSTEM, AZR, Protection, Malware Protection, File, Trojan.Downloader, C:\Users\Michael\AppData\Local\Temp\GPUpd53BED2B12.exe, Quarantine, [b02d17863f3cc076501d8bbe16ea4eb2]
 
Update, 7/9/2014 7:12:04 AM, SYSTEM, AZR, Manual, Malware Database, 2014.7.8.12, 2014.7.9.3, 
Detection, 7/9/2014 1:51:23 PM, SYSTEM, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\patchv17.exe, Quarantine, [b7c4f7a65a2181b504ffbe099c6809f7]
Detection, 7/9/2014 1:51:24 PM, SYSTEM, AZR, Protection, Malware Protection, File, Trojan.Downloader, C:\Users\Michael\AppData\Local\Temp\patchv92.exe, Quarantine, [3f3c306d04770c2a412ca4a520e0e818]
 
Update, 7/8/2014 1:01:10 AM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.8.2, 2014.7.8.3, 
Detection, 7/8/2014 1:51:26 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\patchv17.exe, Quarantine, [1300a2fb2952b0864e39b70da95b0ef2]
Detection, 7/8/2014 1:51:27 PM, SYSTEM, AZR, Protection, Malware Protection, File, Trojan.Downloader, C:\Users\Michael\AppData\Local\Temp\patchv92.exe, Quarantine, [37dc316cdaa177bf45232b1e2fd1b14f]
Detection, 7/8/2014 1:54:11 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.SearchProtect.A, C:\Windows\SysWOW64\uniiprct.exe, Quarantine, [090a8e0f077467cf2d54d2b5f30e46ba]
 
Update, 7/7/2014 1:21:15 AM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.6.8, 2014.7.7.1,
Detection, 7/7/2014 5:52:43 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\patchv17.exe, Quarantine, [b6fe7f1d90ebcf677ad2e0e40afab947]
Detection, 7/7/2014 5:55:23 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.SearchProtect.A, C:\Windows\SysWOW64\uniiprct.exe, Quarantine, [575d2f6d2358c86e31448afd52afe917]
 
Update, 7/6/2014 3:52:57 PM, SYSTEM, AZR, Scheduler, Malware Database, 2014.7.6.3, 2014.7.6.7, 
Detection, 7/6/2014 4:04:06 PM, SYSTEM, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\patchv17.exe, Quarantine, [7dd2316b0972f54141945d651ee6649c]
Detection, 7/6/2014 4:06:52 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.SearchProtect.A, C:\Windows\SysWOW64\uniiprct.exe, Quarantine, [440bc1dbf388ad89a0befb8cb44db848]
Detection, 7/6/2014 5:14:26 PM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.OpenCandy, C:\Users\Michael\AppData\Local\Temp\is-H4PIM.tmp\OCSetupHlp.dll, Quarantine, [b49b9309b6c552e4217f7445699b1de3]
 
Detection, 7/5/2014 12:35:44 AM, SYSTEM, AZR, Protection, Malware Protection, File, PUP.Optional.FreeSiftwareToday.A, C:\Users\Michael\AppData\Local\Temp\patchv17.exe, Quarantine, [b8d14754502bbf7747dfe9d8ff05a957]
Update, 7/5/2014 12:36:13 AM, SYSTEM, AZR, Manual, Malware Database, 2014.7.4.9, 2014.7.5.2, 
Detection, 7/5/2014 12:38:31 AM, Michael, AZR, Protection, Malware Protection, File, PUP.Optional.SearchProtect.A, C:\Windows\SysWOW64\uniiprct.exe, Quarantine, [aa3c8d0e1467fa3c0f31ccbbcc35e31d]
 
(end)


#3 nasdaq

nasdaq

  • Malware Response Team
  • 40,736 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:32 AM

Posted 15 July 2014 - 01:50 PM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below.
 
start
HKLM-x32\...\Run: [] => [X]
HKU\S-1-5-21-2501567955-3192839306-1679505818-1000\...\Run: [ASRockXTU] => [X]
HKU\S-1-5-21-2501567955-3192839306-1679505818-1000\...\Run: [zASRockInstantBoot] => [X]
GroupPolicy: Group Policy on Chrome detected <======= ATTENTION
FF DefaultSearchEngine: v9
FF SelectedSearchEngine: v9
FF Plugin: @microsoft.com/GENUINE - disabled No File
FF Plugin-x32: @microsoft.com/GENUINE - disabled No File
FF Plugin-x32: @nhnent.com/npPubPlugin,version=4.0.0.0 - C:\Windows\System32\npPubPlugin.dll No File
FF Plugin-x32: @pmang.com/npPMangFX - C:\Windows\system32\npPMangFX-x86.DLL No File
FF Plugin-x32: @tools.google.com/Google Update;version=3 - C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll No File
FF Plugin-x32: @tools.google.com/Google Update;version=9 - C:\Program Files (x86)\Google\Update\1.3.24.15\npGoogleUpdate3.dll No File
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
S2 be0fb33b; "C:\Windows\system32\rundll32.exe" "c:\progra~2\suppor~1\SupporterSvc.dll",service
S2 gupdate; "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc [X]
S3 gupdatem; "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /medsvc [X]
S3 cpuz137; \??\C:\Windows\TEMP\cpuz137\cpuz137_x64.sys [X]
S3 EagleX64; \??\C:\Windows\system32\drivers\EagleX64.sys [X]
S3 GPUZ; \??\C:\Windows\TEMP\GPUZ.sys [X]
S3 hxsyol; \??\C:\AeriaGames\AuraKingdom\avital\hxsy64.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X]
S3 X6va017; \??\C:\Windows\SysWOW64\Drivers\X6va017 [X]
S3 xhunter1; \??\C:\Windows\xhunter1.sys [X]
2014-07-08 14:51 - 2014-06-18 22:12 - 01366528 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-07-08 14:51 - 2014-06-18 22:11 - 19277312 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-07-08 14:51 - 2014-06-18 20:53 - 14368768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-07-08 14:51 - 2014-06-18 20:53 - 01141760 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-06-14 03:00 - 2014-06-14 03:00 - 00235008 _____ (Microsoft Corporation) C:\Windows\system32\url.dll
2014-06-14 03:00 - 2014-06-14 03:00 - 00232960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\url.dll
2014-06-29 16:09 - 2014-06-01 15:00 - 00000000 ____D () C:\Users\Michael\AppData\Roaming\uTorrent

End
Save the files as fixlist.txt into the same folder as FRST

Run FRST and click Fix only once and wait.

Restart the computer normally to reset the registry.

The tool will create a log (Fixlog.txt) please post it to your reply.


Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

How is the computer running now?

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,736 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:32 AM

Posted 21 July 2014 - 08:09 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users