Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Welchia Worm? But Not Sure!


  • Please log in to reply

#1
rknowles22

rknowles22

    New Member

  • Member
  • Pip
  • 3 posts
BTW, My PC is a DELL C840 Laptop running Windows XP Pro SP1

STEP #1 -- Yes I read and followed all HIJACKTHIS pre-requisites.

STEP #2 -- In addition, followed all the cleaning steps at the following link (very good list): http://www.wildersse...ead.php?t=50662

PROBLEM DESCRIPTION
----------------------------
Yesterday during first boot of the day, Process Guard (www.diamondcs.com.au) signaled an alert that SVCHOST was trying to terminate WINLOGON. My hunch was that I had a WELCHIA worm infection.

Here is exact messages from Process Guard Event Log (just an excerpt as it kept trying and trying; PG did a nice intercept job):

Wed 08 - 07:55:28 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\winlogon.exe [1100]
Wed 08 - 07:55:28 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\logonui.exe [1856]
Wed 08 - 07:55:29 [EXECUTION] "c:\windows\system32\logonui.exe" was allowed to run
[EXECUTION] Started by "c:\windows\system32\winlogon.exe" [744]
[EXECUTION] Commandline - [ logonui.exe /status /shutdown ]
Wed 08 - 07:55:29 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\winlogon.exe [1100]
Wed 08 - 07:55:29 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\logonui.exe [1856]
Wed 08 - 07:55:30 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\winlogon.exe [1100]
Wed 08 - 07:55:30 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\logonui.exe [1856]
Wed 08 - 07:55:31 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\winlogon.exe [1100]
Wed 08 - 07:55:31 [TERMINATE] c:\windows\system32\svchost.exe [980] was blocked from terminating c:\windows\system32\logonui.exe [1856]
. . . .
. . . .
. . . .
etc.

RESEARCH & ANALYSIS
----------------------------
As implied above in completing STEPS #1 & #2, I spent many hours yesterday trying to identify, find and eradicate any MALWARE I might have. The weird thing is that none (zero, nada) of the scans found anything.

WHAT DID I FIND?
----------------------
I am curious about two (2) weird things.

1. In my HIJACKTHIS log is an executable - RNFF.exe. No amount of Google investigation (web or groups) found anything about this program. The only thing I can link it to is a tool I downloaded and ran called -- RootkitRevealer (www.sysinternals.com); linked on the bases of -- and this is flimsy -- both RootkitRevealer and RNFF.exe had the same icon.

OK, second weird thing . . . .
2. I downloaded and ran a tool called, Process Explorer (also from, (www.sysinternals.com). Attached is a screen capture of the processes running on my PC with a SVCHOST process highlighted in particular (top pane of screen). In the lower pane of the screen you see a "CLB" file (Office XP Developer Code Librarian?) named, "R00000000002a.clb" listed in among all the DLL's associated with this particular occurence of SVCHOST. What is even weirder is that it is referencing this file from the "C:\WINDOWS\REGISTRATION\" directory.

ATTACHMENTS:
--------------------
HIJACKTHIS LOG -- Text file -- "hijackthis-2005JUN09.log"
PROCESS EXPLORER SCREEN IMAGE -- Bitmap file -- "PC Health Analysis01.bmp"



2
  • 0

Advertisements


#2
rknowles22

rknowles22

    New Member

  • Topic Starter
  • Member
  • Pip
  • 3 posts
NEW UPDATED HIJACKTHIS LOG for VERSION (v1.99.1)

Logfile of HijackThis v1.99.1
Scan saved at 11:28:49 AM, on 6/9/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\ProcessGuard\dcsuserprot.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\WINDOWS\System32\inetsrv\inetinfo.exe
C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\System32\tcpsvcs.exe
C:\WINDOWS\System32\snmp.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\wdfmgr.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Dell\AccessDirect\dadapp.exe
C:\WINDOWS\System32\RUNDLL32.EXE
C:\Program Files\Apoint\Apoint.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\ProcessGuard\pgaccount.exe
C:\Program Files\Apoint\Apntex.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Lavasoft\Ad-Aware SE Plus\Ad-Watch.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
C:\Program Files\interMute\SpySubtract\SpySub.exe
C:\Program Files\LIUtilities\WinTasks\wintasks.exe
C:\Program Files\TrayIt!\trayit!.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\CaptureEze Pro\czepro.exe
C:\Program Files\ProcessGuard\procguard.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Documents and Settings\Rich Knowles\Desktop\ZIP-out\09-nine\HijackThis-v1.99.1-2005jun10.exe

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Acrobat\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: Hotmail Spam Filter - {58A83E4F-477A-4A3F-BF9B-B65BC2BD5598} - C:\Program Files\Sunbelt Software\iHateSpam\siClientUIHotmail.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DadApp] C:\Program Files\Dell\AccessDirect\dadapp.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE NvQTwk,NvCplDaemon initialize
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [Hacker Eliminator] C:\PROGRA~1\HACKER~1\HACKER~1.EXE
O4 - HKLM\..\Run: [Zone Labs Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [!1_pgaccount] "C:\Program Files\ProcessGuard\pgaccount.exe"
O4 - HKLM\..\Run: [THGuard] "C:\Program Files\TrojanHunter 4.2\THGuard.exe"
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKCU\..\Run: [AWMON] "C:\Program Files\Lavasoft\Ad-Aware SE Plus\Ad-Watch.exe"
O4 - Startup: ERUNT AutoBackup.lnk = C:\Program Files\ERUNT\AUTOBACK.EXE
O4 - Startup: TrayIt!.lnk = C:\Program Files\TrayIt!\trayit!.exe
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 5.0\Distillr\AcroTray.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: SpySubtract.lnk = C:\Program Files\interMute\SpySubtract\SpySub.exe
O4 - Global Startup: WinTasks.lnk = C:\Program Files\LIUtilities\WinTasks\wintasks.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: ppctlcab - http://ppupdates.ca....er/ppctlcab.cab
O16 - DPF: {03177121-226B-11D4-B0BE-005004AD3039} (UploaderCtrl Class) - http://members7.club...tl_uploader.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {2FC9A21E-2069-4E47-8235-36318989DB13} (PPSDKActiveXScanner.MainScreen) - http://ppupdates.ca....r/axscanner.cab
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://appldnld.m7z....iTunesSetup.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupd...b?1107916825432
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {9B03C5F1-F5AB-47EE-937D-A8EDA626F876} (Anonymizer Anti-Spyware Scanner) - http://download.zone...ctor/WebAAS.cab
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\System32\NavLogon.dll
O23 - Service: DiamondCS Process Guard Service v3.000 (DCSPGSRV) - DiamondCS - C:\Program Files\ProcessGuard\dcsuserprot.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
O23 - Service: Norton Ghost - Symantec Corporation - C:\Program Files\Symantec\Norton Ghost\Agent\PQV2iSvc.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: RNFF - ??????????????????????????????????? - C:\DOCUME~1\RICHKN~1\LOCALS~1\Temp\RNFF.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe
  • 0

#3
rknowles22

rknowles22

    New Member

  • Topic Starter
  • Member
  • Pip
  • 3 posts
Do you know of a way I can send/post the bitmap screen captured image of the Process Explorer application?

As I mentioned before - tried to add as an attachment but do not see it posted in this thread (maybe I'm not looking in the right place).

Thanks for any thoughts / opinions / suggestions about my PC's health you can provide.

Oh yeah, one other question . . . .

What does this file do -- "VX2-l2mfix.exe" -- and are there any instructions for its use?


--Rich K.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP