Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

heygafva.exe?


  • This topic is locked This topic is locked
2 replies to this topic

#1 jckincaid

jckincaid

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:10:46 AM

Posted 26 September 2014 - 04:30 AM

Has anyone come across this Trojan before?

 

TDSSKiller finds it and removes it but it's back next session.  HitmanPro finds it and the log is below.  I'm on a domain based machine so can't activate the free hitmanpro amd am not keen to buy it if it just does the same as TDSSKiller.

 

Log below, any thoughts.  Can't run DDS as virus redirects when I try to download:-

 

HitmanPro 3.7.9.225
www.hitmanpro.com
   Computer name . . . . : RECEPTIONHP
   Windows . . . . . . . : 6.1.0.7600.X64/2
   User name . . . . . . : JM\reception
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free
   Scan date . . . . . . : 2014-09-26 10:03:16
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 11m 57s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No
   Threats . . . . . . . : 1
   Traces  . . . . . . . : 42
   Objects scanned . . . : 1,543,474
   Files scanned . . . . : 26,592
   Remnants scanned  . . : 373,206 files / 1,143,676 keys
Malware _____________________________________________________________________
   C:\Users\reception\AppData\Local\ybhtpcmj\heygafva.exe
      Size . . . . . . . : 103,936 bytes
      Age  . . . . . . . : 0.0 days (2014-09-26 09:37:02)
      Entropy  . . . . . : 6.7
      SHA-256  . . . . . : EF9694BB2AE0CF8F81B506CC7E749E5BACD8C44B93E9265FEC380576C0C8FCFF
    > HitmanPro  . . . . : Win32/Backdoor.Behavior
      Fuzzy  . . . . . . : 34.0
         This file's reboot survivability is vigorously protected. This is typical to malware.
         Uses the Windows Registry to run each time the user logs on.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program starts automatically without user intervention.
         Time indicates that the file appeared recently on this computer.
      Startup
         HKU\S-1-5-21-625453721-2662660166-3537885410-1135-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HeyGafva
         HKU\S-1-5-21-625453721-2662660166-3537885410-1135\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HeyGafva
      Forensic Cluster
         -0.0s C:\Users\reception\AppData\Local\cuiwqggy.log
         -0.0s C:\Users\reception\AppData\Local\beejugyy.log
          0.0s C:\Users\reception\AppData\Local\ybhtpcmj\
          0.0s C:\Users\reception\AppData\Local\ybhtpcmj\heygafva.exe
         13.6s C:\Windows\Prefetch\CONSENT.EXE-531BD9EA.pf
         15.7s C:\Users\reception\AppData\Local\GDIPFONTCACHEV1.DAT
         24.7s C:\Users\reception\AppData\Local\bbqnyfln.log
         34.1s C:\Users\reception\AppData\Local\yvmapbau.log
         34.1s C:\Users\reception\AppData\Local\wehijgiv.log
         34.6s C:\Users\reception\AppData\Local\drbmonjp.log
         54.0s C:\Windows\Prefetch\REGSVR32.EXE-8461DBEE.pf
         54.0s C:\Windows\Prefetch\REGSVR32.EXE-D5170E12.pf
         55.7s C:\Windows\Prefetch\MBAM.EXE-2FB6D924.pf
         58.9s C:\Windows\AppPatch\Custom\{f7910f49-cbe2-4066-b3a8-771185a5e955}.sdb
         60.9s C:\Windows\Prefetch\NTPRINT.EXE-2E101757.pf

Potential Unwanted Programs _________________________________________________
   HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2492}\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2492}\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptimizerPro_RASAPI32\ (PCOptimizerPro)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptimizerPro_RASMANCS\ (PCOptimizerPro)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\optprosetup_RASAPI32\ (PCOptimizerPro)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\optprosetup_RASMANCS\ (PCOptimizerPro)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASAPI32\ (PCOptimizerPro)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\OptProStart_RASMANCS\ (FLV Player)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\SettingsManagerMediaBar_RASAPI32\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\SettingsManagerMediaBar_RASMANCS\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\SettingsManagerSetup_RASAPI32\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\SettingsManagerSetup_RASMANCS\ (Linkey)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\wajam_download_RASAPI32\ (Sweetpacks)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\wajam_download_RASMANCS\ (Sweetpacks)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\wajam_install_RASAPI32\ (Sweetpacks)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\wajam_install_RASMANCS\ (Sweetpacks)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancer_RASAPI32\ (Wajam)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancer_RASMANCS\ (Wajam)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancerService_RASAPI32\ (Wajam)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\WajamInternetEnhancerService_RASMANCS\ (Wajam)
   HKLM\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}\ (FLV Player)
   HKLM\SOFTWARE\Wow6432Node\{6791A2F3-FC80-475C-A002-C014AF797E9C}\ (FLV Player)
   HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_F06DEFF2-5B9C-490D-910F-35D3A9119622\ (Linkey)
   HKLM\SYSTEM\ControlSet002\Enum\Root\LEGACY_F06DEFF2-5B9C-490D-910F-35D3A9119622\ (Linkey)
   HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_F06DEFF2-5B9C-490D-910F-35D3A9119622\ (Linkey)
   HKU\.DEFAULT\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}\ (FLV Player)
   HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}\ (FLV Player)
   HKU\S-1-5-18\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}\ (FLV Player)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}\ (FLV Player)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\Software\Microsoft\Internet Explorer\Approved Extensions\{54739D49-AC03-4C57-9264-C5195596B3A1} (Linkey)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{54739D49-AC03-4C57-9264-C5195596B3A1}\ (Linkey)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\Software\Optimizer Pro\ (PCOptimizerPro)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}\ (FLV Player)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135\Software\Microsoft\Internet Explorer\Approved Extensions\{54739D49-AC03-4C57-9264-C5195596B3A1} (Linkey)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{54739D49-AC03-4C57-9264-C5195596B3A1}\ (Linkey)
   HKU\S-1-5-21-625453721-2662660166-3537885410-1135\Software\Optimizer Pro\ (PCOptimizerPro)
Repairs _____________________________________________________________________
   Proxy server on this computer (User)
   127.0.0.1:49623
   Proxy server on this computer (User)
   127.0.0.1:49623
   Proxy server on this computer (User)
   127.0.0.1:49623
 


BC AdBot (Login to Remove)

 


m

#2 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:46 AM

Posted 29 September 2014 - 08:18 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

--RogueKiller--
  • Download & SAVE to your Desktop For 32bit system or For 64bit system
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
=======

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

How is the computer running?
Wait for further instructions.

#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:46 AM

Posted 05 October 2014 - 07:53 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users