Another Win32:Trojan-gen.{Other} problem...

Found this on my computer (WinXP Home Ed.) yesterday. My 10 yr old daughter has discovered AIM :frowning: (Another problem, another time), and recently, when I closed AIM, it kept trying to reload every 5 min.

So I ran Avast, and it gave me the Win32:Trojan-gen.{other} warning and an infected file “msdirectx.sys” dated 8//05 in the c:/documents and settings/[my username]/ folder and some z*.exe file in its own folder (can’t remember the name now, sorry). So, I proceed to delete that. Then I performed the following steps in the following order…

  1. Did a thorough scan with Avast. (nothing)
  2. Rebooted. On reboot, file “msdirectx.sys” was found on startup in memory. Sent to chest. Something is still in memory though, that Avast is not picking up. Task Manager is disabled. (Ctl-Alt-Del brings it up and then immediately closes) All administrative tools are disabled.
  3. Disabled Restore and cleaned again. Didn’t work.
  4. Performed a system boot scan. Found nothing. Virus found again after Windows starts.
    Apparrently, this virus generates the file “msdirectx.sys” in the “documents and settings” folder of anyone who logs on at startup. Avast cannot keep part of it from loading into memory even though it reports “msdirectx.sys” is found and prevented from loading.

Looking around the computer, I find an icon for “Spythunder” on the desktop I don’t recognize. It points to a nonexistent program in the Spythunder folder. The only program in the folder is “setup.exe”. Delete that and the folder. Still no effect. A check of the website www.spythunder.com at work (non-infected) gives a message saying “forbidden access to this server”

Now every computer on the net is treating me like I have the plague. :slight_smile: (This is from work, again, non-infected) I think they sense something and won’t let me connect. But I had no problem until I actually discovered this thing.

Any ideas??

Having deleted the file with avast you are unlikely to find the same file again, there may however be a registry entry that is regenerating this - the best tool to find this is hijackthis and the best place for info and tools is below.

Visit Eddy’s Website click the “HiJackThis Section” and also the “Malware removal instructions and applications” section, and follow the directions there and get back to us if you need more help…

I’m back…

Tried running Avast in Safe Mode. It found absolutely nothing. Ad-Aware 6 (free version) found nothing as well. In Safe Mode, the virus apparently does not load. The msdirectx.sys file is not created and I have control over Task Manager again.

However, a reboot back to normal mode leaves me back in the same situation I was in and msdirectx.sys is there again. (Avast still can’t find it in memory.)

Below is a hijack log of my computer in safe mode.

The next reply is one in normal mode. Anything jump out as being strange? (I thought it was strange that the AOL Client was loading even though I hadn’t started it.)

Safe Mode:

Logfile of HijackThis v1.99.1
Scan saved at 1:20:32 PM, on 2/21/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\hijak\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/ycomp_wave/defaults/sb/*http://www.yahoo.com/search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ycomp_wave/defaults/sp/*http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://pollypocket.everythinggirl.com/house/kitchen/kitchen.aspx
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.emachines.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.emachines.com/redirect.html?redirectID=99104
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM..\Run: [PrinTray] C:\WINDOWS\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM..\Run: [ADUserMon] C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
O4 - HKLM..\Run: [Iomega Drive Icons] c:\utilities\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM..\Run: [Deskup] c:\utilities\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM..\Run: [Lydia] C:\Internet\Lydia\lydia.exe
O4 - HKLM..\Run: [avast!] C:\Utilities\Avast\ashDisp.exe
O4 - HKLM..\Run: [S3TRAY2] S3tray2.exe
O4 - HKLM..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM..\Run: [AOL 9.0 Optimized] AOLCLIENT.EXE
O4 - HKLM..\Run: [Windows IPv6 Drivers] wipv6.exe
O4 - HKLM..\RunServices: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\Run: [Microsoft Works Update Detection] C:\Program Files\Microsoft Works\WkDetect.exe
O4 - HKCU..\Run: [tinySpell] C:\Utilities\tinySpell\tinyspell.exe
O4 - HKCU..\Run: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\RunServices: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\RunOnce: [AOL 9.0 Optimized] AOLCLIENT.EXE
O4 - Startup: Stickies.lnk = C:\Utilities\stickies\stickies.exe
O4 - Global Startup: BigFix.lnk = C:\Program Files\BigFix\BigFix.exe
O4 - Global Startup: ButtonBar.lnk = C:\Utilities\BBar\bBar.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll
O9 - Extra ‘Tools’ menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra ‘Tools’ menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.emachines.com
O16 - DPF: {205FF73B-CA67-11D5-99DD-444553540000} (CInstall Class) - http://www.spywarestormer.com/files2/Install.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1101566613156
O16 - DPF: {FA3662C3-B8E8-11D6-A667-0010B556D978} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/_media/dalaillama/ampx.cab
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Utilities\Avast\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Utilities\Avast\ashserv.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Utilities\Avast\ashMaiSv.exe" /service (file missing)
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: Iomega Active Disk (IOMEGA_ACTIVE_DISK_SERVICE) - Iomega Corporation - C:\Program Files\Iomega\AutoDisk\ADService.exe

Here’s the report in Normal Mode.

Normal Mode

Logfile of HijackThis v1.99.1
Scan saved at 1:29:50 PM, on 2/21/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\LEXBCES.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\LEXPPS.EXE
C:\Utilities\Avast\aswUpdSv.exe
C:\Utilities\Avast\ashserv.exe
C:\PROGRA~1\Iomega\System32\AppServices.exe
C:\WINDOWS\system32\slserv.exe
C:\Program Files\Iomega\AutoDisk\ADService.exe
C:\Utilities\Avast\ashMaiSv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
C:\utilities\Iomega\DriveIcons\ImgIcon.exe
C:\Internet\Lydia\lydia.exe
C:\Utilities\Avast\ashDisp.exe
C:\WINDOWS\system32\S3tray2.exe
C:\Program Files\Google\Gmail Notifier\gnotify.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\WINDOWS\system32\AOLCLIENT.EXE
C:\Utilities\tinySpell\tinyspell.exe
C:\Internet\Lydia\lydia.exe
C:\Program Files\BigFix\BigFix.exe
C:\Utilities\BBar\bBar.exe
C:\Utilities\stickies\stickies.exe
C:\hijak\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://red.clientapps.yahoo.com/customize/ycomp_wave/defaults/sb/*http://www.yahoo.com/search/ie.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://red.clientapps.yahoo.com/customize/ycomp_wave/defaults/sp/*http://www.yahoo.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://pollypocket.everythinggirl.com/house/kitchen/kitchen.aspx
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.emachines.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.emachines.com/redirect.html?redirectID=99104
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: (no name) - {549B5CA7-4A86-11D7-A4DF-000874180BB3} - (no file)
O2 - BHO: (no name) - {FDD3B846-8D59-4ffb-8758-209B6AD74ACC} - (no file)
O4 - HKLM..\Run: [PrinTray] C:\WINDOWS\System32\spool\DRIVERS\W32X86\2\printray.exe
O4 - HKLM..\Run: [ADUserMon] C:\Program Files\Iomega\AutoDisk\ADUserMon.exe
O4 - HKLM..\Run: [Iomega Drive Icons] c:\utilities\Iomega\DriveIcons\ImgIcon.exe
O4 - HKLM..\Run: [Deskup] c:\utilities\Iomega\DriveIcons\deskup.exe /IMGSTART
O4 - HKLM..\Run: [Lydia] C:\Internet\Lydia\lydia.exe
O4 - HKLM..\Run: [avast!] C:\Utilities\Avast\ashDisp.exe
O4 - HKLM..\Run: [S3TRAY2] S3tray2.exe
O4 - HKLM..\Run: [{0228e555-4f9c-4e35-a3ec-b109a192b4c2}] C:\Program Files\Google\Gmail Notifier\gnotify.exe
O4 - HKLM..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
O4 - HKLM..\Run: [AOL 9.0 Optimized] AOLCLIENT.EXE
O4 - HKLM..\Run: [Windows IPv6 Drivers] wipv6.exe
O4 - HKLM..\RunServices: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\Run: [Microsoft Works Update Detection] C:\Program Files\Microsoft Works\WkDetect.exe
O4 - HKCU..\Run: [tinySpell] C:\Utilities\tinySpell\tinyspell.exe
O4 - HKCU..\Run: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\RunServices: [Windows IPv6 Drivers] wipv6.exe
O4 - HKCU..\RunOnce: [AOL 9.0 Optimized] AOLCLIENT.EXE

O4 - Startup: Stickies.lnk = C:\Utilities\stickies\stickies.exe
O4 - Global Startup: BigFix.lnk = C:\Program Files\BigFix\BigFix.exe
O4 - Global Startup: ButtonBar.lnk = C:\Utilities\BBar\bBar.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll
O9 - Extra ‘Tools’ menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\msjava.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra ‘Tools’ menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.emachines.com
O16 - DPF: {205FF73B-CA67-11D5-99DD-444553540000} (CInstall Class) - http://www.spywarestormer.com/files2/Install.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.com/v5consumer/V5Controls/en/x86/client/wuweb_site.cab?1101566613156
O16 - DPF: {FA3662C3-B8E8-11D6-A667-0010B556D978} (IWinAmpActiveX Class) - http://cdn.digitalcity.com/_media/dalaillama/ampx.cab
O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Utilities\Avast\aswUpdSv.exe
O23 - Service: avast! Antivirus - Unknown owner - C:\Utilities\Avast\ashserv.exe
O23 - Service: avast! Mail Scanner - Unknown owner - C:\Utilities\Avast\ashMaiSv.exe" /service (file missing)
O23 - Service: Iomega App Services - Iomega Corporation - C:\PROGRA~1\Iomega\System32\AppServices.exe
O23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
O23 - Service: SmartLinkService (SLService) - - C:\WINDOWS\SYSTEM32\slserv.exe
O23 - Service: Iomega Active Disk (IOMEGA_ACTIVE_DISK_SERVICE) - Iomega Corporation - C:\Program Files\Iomega\AutoDisk\ADService.exe

Safe mode log of hijackthis is pointless as what we are likely to be looking for may not be running.

Check out this page with an analysis of your log:
http://hijackthis.de/logfiles/deb1918784bb22d109fa57fd56c0fc98.html

You can also run Eddy’s HJT log file analyser when off-line (download it from his web site).

Just for future reference, in case someone runs a search and finds this thread…

The parts in bold in the log file in the previous post are the problem. (IF I got it all…) Neither Avast nor HijackThis will flag them as a potential problem.

As far as I can tell, this is how it works. AOLCLIENT.EXE loads into memory and is responsible for disabling the task manager and prob. “component services” in the “administrative tools” folder. The best way to kill it is to use the HijackThis task manager to close it. Then your task manager will operate normally.

wipv6.exe in the windows/system folder seems to be responsible for sending information out from your computer. One of these MAY be responsible for dropping msdirectx.sys (which Avast will find) into your “documents and settings” folder. One of these, maybe this one, turns off your Windows firewall, so the others can do their work.

I scanned with “another program” and it found 2 more little pieces in the “document and settings” folder and a “d & s /*/temp” folder, some little .pif file, and another, and it reported the pieces, anyway, as IRC/BackDoor.SdBot.138.BN

That’s all I know. Hopefully someone else can fill in the blanks from there. I would truly love to fully eradicate the filthy worm (the author, as well as the program). Gone are the days when you could just delete a little .com file or format c: /MBR. I’m changing all my passwords from a different computer and hunkering down for the next 2 weeks.

I’m now as paranoid as the rest of you guys… :wink: Let me know if I missed anything.

The parts in bold in the log file in the previous post are the problem. (IF I got it all...) Neither Avast nor Hijak will flag them as a potential problem.

Not correct, the link to the hijackthis analysis page I gave flags up the AOLCLIENT.EXE as an Unknown process, which to me means you should investigate further.

True, but with a green check, same as my email checker. It was a very useful program though, it sure helped track everything down and allowed me to get rid of AOLCLIENT.EXE. Thanks for the help.

just returned from my travels with my trusty laptop. whilst away Avast reported msdirectx as infected and deleted it. But it kept appearing agian on boot up ans every time I went on line my laptop uploaded about 3 Mb of ‘stuff’. Luckily the machine is a bare machine with no personal/financial info on it just lots of photos. Task Manager wouldn’t run, nor msconfig and I couldn’t install ZoneAlarm.

I assume I have a Trojan but Avast couldn’t find anything wrong (nor could McAfee’s Stinger!)

Eventually downloaded Kasparsky AV which identified a set of about 5 Trojans and got rid of them.

Will a future version of Avast be able to sort this if it should reoccur?

cheers