Whew! You guys weren't kidding about the WAREZ sites. Third one I tried wanted to load a special "downloader" tool.
![[smile] [smile] [smile]](/data/assets/smilies/smile.gif)
I ran it and my processes shot through the roof. Continued running for a few minutes and the machine prompted me to reboot. Rebooted and checked the system and there were my old buddies Wintools, DyFuCa, BlazeFind, and several others.
Let me point out that Pest Patrol's Active Protection was already enabled on the machine. This seems to indicate that a user's actions can override the Active Protection agent. Anyone else had any experience with this?
Went to the Management Console and forced a scan with the delete option selected. This cleaned all but one of the hijackers (ISTBar).
Repeated scans yield the same results. ISTBar is buried in the registry & Pest Patrol evidently cannot clean it. I don’t really understand this, as it tells me exactly where it is in the report. Anyone have any insight into this?
Ran HJT.
Logfile of HijackThis v1.97.7
Scan saved at 1:47:49 PM, on 9/20/2004
Platform: Unknown Windows (WinNT 5.02.3790)
MSIE: Internet Explorer v6.00 (6.00.3790.0000)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\WINDOWS\system32\ppRemoteService.exe
C:\Program Files\UltraVNC\WinVNC.exe
C:\WINDOWS\system32\Dfssvc.exe
C:\Program Files\Common Files\PestPatrol\PPMCActiveDetection.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\Windows SyncroAd\SyncroAd.exe
C:\Program Files\Windows SyncroAd\WinSync.exe
C:\WINDOWS\System32\svchost.exe
C:\Documents and Settings\Administrator\Desktop\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://shdoclc.dll/hardAdmin.htm
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext =
R3 - URLSearchHook: (no name) - _{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
O2 - BHO: (no name) - {00320615-B6C2-40A6-8F99-F1C52D674FAD} - (no file)
O2 - BHO: (no name) - {AEECBFDA-12FA-4881-BDCE-8C3E1CE4B344} - C:\WINDOWS\system32\nvms.dll
O2 - BHO: (no name) - {CE188402-6EE7-4022-8868-AB25173A3E14} - C:\WINDOWS\system32\mscb.dll
O2 - BHO: (no name) - {F4E04583-354E-4076-BE7D-ED6A80FD66DA} - C:\WINDOWS\system32\msbe.dll
O3 - Toolbar: @msdxmLC.dll,-1@1033,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O4 - HKLM\..\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - HKLM\..\Run: [McAfeeUpdaterUI] "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey
O4 - HKLM\..\Run: [WinVNC] "C:\Program Files\UltraVNC\WinVNC.exe" -servicehelper
O4 - HKLM\..\Run: [Windows SyncroAd] C:\Program Files\Windows SyncroAd\SyncroAd.exe
O4 - HKLM\..\Run: [rodarab] C:\WINDOWS\rodarab.exe
O8 - Extra context menu item: Web Rebates - file://C:\Program Files\Web_Rebates\Sy1150\Tp1150\scri1150a.htm
O9 - Extra button: Related (HKLM)
O9 - Extra 'Tools' menuitem: Show &Related Links (HKLM)
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} -
O16 - DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} (Update Class) -
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) -
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = edited.com
O17 - HKLM\Software\..\Telephony: DomainName = edited.com
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = edited.com
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: Domain = edited.com
As you can see there are still a few problems, especially the line:
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} -
From what I can see, this appears to be an actual Downloader Trojan. Am going to force VScan next. Will let you know what happens.
ITMT, anyone know what "rodarab.exe" or "syncroad.exe" are? I find business references to a company called SyncroAd, but that's about it. Any help there would be greatly appreciated.
"The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not."
"Trent the Uncatchable" in The Long Run by Daniel Keys Moran