Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Little Rootkit issue?


  • Please log in to reply
13 replies to this topic

#1 Cerenia

Cerenia

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 09:23 AM

OK, I was infected with the Rouge antivirus last year, and got it cleaned up, purdy, and since then, no viruses (although Avira has quarentined a couple of things from when i've been on photobucket). However, I scanned with MBAM, Avira, kapersky online and SuperAntiSpyware. MBAM, Kapersky and Avira all came back clean, but SAS came back with:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/08/2009 at 09:59 AM

Application Version : 4.21.1004

Core Rules Database Version : 3700
Trace Rules Database Version: 1676

Scan type : Complete Scan
Total Scan Time : 00:40:01

Memory items scanned : 635
Memory threats detected : 0
Registry items scanned : 6182
Registry threats detected : 24
File items scanned : 16111
File threats detected : 224

Adware.Tracking Cookie
<deleted due to the amount XD>

Browser Hijacker.Deskbar
HKCR\Interface\{8F15B157-40D9-4B20-8D3B-B1F8B475B58D}
HKCR\Interface\{8F15B157-40D9-4B20-8D3B-B1F8B475B58D}\ProxyStubClsid
HKCR\Interface\{8F15B157-40D9-4B20-8D3B-B1F8B475B58D}\ProxyStubClsid32
HKCR\Interface\{8F15B157-40D9-4B20-8D3B-B1F8B475B58D}\TypeLib
HKCR\Interface\{8F15B157-40D9-4B20-8D3B-B1F8B475B58D}\TypeLib#Version
HKCR\Interface\{A0881AA1-68BE-41AC-9C0D-4C8A69C6C72C}
HKCR\Interface\{A0881AA1-68BE-41AC-9C0D-4C8A69C6C72C}\ProxyStubClsid
HKCR\Interface\{A0881AA1-68BE-41AC-9C0D-4C8A69C6C72C}\ProxyStubClsid32
HKCR\Interface\{A0881AA1-68BE-41AC-9C0D-4C8A69C6C72C}\TypeLib
HKCR\Interface\{A0881AA1-68BE-41AC-9C0D-4C8A69C6C72C}\TypeLib#Version
HKCR\Interface\{E827FFD9-95D1-4B49-BEB3-5D49E688C108}
HKCR\Interface\{E827FFD9-95D1-4B49-BEB3-5D49E688C108}\ProxyStubClsid
HKCR\Interface\{E827FFD9-95D1-4B49-BEB3-5D49E688C108}\ProxyStubClsid32
HKCR\Interface\{E827FFD9-95D1-4B49-BEB3-5D49E688C108}\TypeLib
HKCR\Interface\{E827FFD9-95D1-4B49-BEB3-5D49E688C108}\TypeLib#Version

Rootkit.Component/Trace
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#DeviceDesc


Sooo... i'm still infected I assume? SAS told me they were deleteed, asked me to restart, but they're still there. Any advice on next step? Thankyou x

BC AdBot (Login to Remove)

 


#2 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:04:27 AM

Posted 08 January 2009 - 12:56 PM

Hi Cerenia,

Yes, you are infected. What version of Windows are you running? Please post a Malwarebytes log using the following instructions.

On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note:
-- If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

-- MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes (like Spybot's Teatimer), they may interfere with the fix or alert you after scanning with MBAM. Please disable such programs until disinfection is complete or permit them to allow the changes.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#3 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 01:02 PM

Malwarebytes' Anti-Malware 1.30
Database version: 1387
Windows 6.0.6001 Service Pack 1

08/01/2009 14:20:03
mbam-log-2009-01-08 (14-20-03).txt

Scan type: Quick Scan
Objects scanned: 43992
Time elapsed: 3 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Just realised not updated as I thought - It was Avira i'd updated, updating and doing a full scan now

Edited by Cerenia, 08 January 2009 - 01:04 PM.


#4 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 01:17 PM

Grrr, it has found something! Oh, and i'm using Vista.

Malwarebytes' Anti-Malware 1.32
Database version: 1632
Windows 6.0.6001 Service Pack 1

08/01/2009 18:15:42
mbam-log-2009-01-08 (18-15-42).txt

Scan type: Quick Scan
Objects scanned: 49830
Time elapsed: 10 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Windows\System32\00installer.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.



Doing a full scan now, its not picked up the rootkit though .

Edited by Cerenia, 08 January 2009 - 01:24 PM.


#5 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:04:27 AM

Posted 08 January 2009 - 02:08 PM

Let's take a look with this online scanner...

Please navigate to the download page of Avira AntiRootkit and click on Download to save it to your Destop.
  • You should now find a file called: antivir_rootkit.zip on your Desktop.
  • Extract the file to your Desktop (you may then delete the zip file).
  • You should now have a folder with Setup.exe and some other files within it on your Desktop.
  • Double-click Setup.exe.
  • Click Next.
  • Highlight the radio button to acceppt the license agreement and then click Next.
  • Then click Next and Install to finalise the installation process.
  • Click Finish (you may now also delete the folder with the extracted files from the zip archive)
You successfully installed Avira AntiRootkit!
  • Please now navigate to Start > All Programs > Avira RootKit Detection. Then select: Avira RootKit Detection
  • Click OK when a message window pops up
  • Click Start scan and let it run
  • Click View report and copy the entire contents into your next reply.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#6 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 02:24 PM

Used this on the last thread, but it doesn't actually scan - as soon as I hit scan, it says its completed immediatly. I'll uninstall and reinstall.

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,758 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:27 AM

Posted 08 January 2009 - 02:25 PM

Were the registry entries found in your first SAS log related to any of the physical files it also found/removed? If not, they could just be remnants left behind from a prior malware disinfection. Hard to tell how long there were on your system without complete logs but SAS should have removed them.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#8 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 02:34 PM

It came up with those first time i scanned today, I asked to remove, it said it had and needed to reboot, which I did, and then rescanned, and they hadn't been removed. They've never been picked up before which is what concerns me, got MBAM on a full scan an hour in so far to double check, I thought i'd check with the popup warnings from Avira (oddly on the pizza hut site and photobucket o.O).

After the last infection, we ensured everything was clean and A-OK :/

F-Secure online scanner came back with some tracking cookies

Edited by Cerenia, 08 January 2009 - 02:36 PM.


#9 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 08 January 2009 - 05:42 PM

Was doing a MBAM full scan, after 3 hours and right near the end, it crashed, all clear up to the last few files. Having to rescan again, but it will have to run while I sleep, any other suggestions? A mate of mine that works with PCs has said looks like a poss Combofix job, and i could do that with his guidance, but wanted to see what else could be done

#10 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:04:27 AM

Posted 08 January 2009 - 07:06 PM

Please remember:

ComboFix is a tool that should only be run under the supervision of someone who has been trained in its use. Using it on your own can cause problems with your computer.


Please download SmitfraudFix

Double-click SmitfraudFix.exe
Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
Please copy/paste the content of that report into your next reply.

Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
http://www.beyondlogic.org/consulting/proc...processutil.htm

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#11 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 09 January 2009 - 01:46 AM

Yep, Avira detected it as a virus, but all done, I'd rather do anything I can before using combofix, he does use it a lot with his PC work, but still edgy about using it without him physically doing it. Thanks for all the help :thumbsup:

SmitFraudFix v2.388

Scan done at 6:43:13.04, 09/01/2009
Run from C:\Users\Ceri\Desktop\SmitfraudFix
OS: Microsoft Windows [Version 6.0.6001] - Windows_NT
The filesystem type is NTFS
Fix run in normal mode

Process

C:\Windows\system32\csrss.exe
C:\Windows\system32\wininit.exe
C:\Windows\system32\csrss.exe
C:\Windows\system32\services.exe
C:\Windows\system32\lsass.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\winlogon.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\WLANExt.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\NVIDIA Corporation\nTune\nTuneService.exe
C:\Windows\system32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Windows\system32\svchost.exe
C:\Program Files\NVIDIA Corporation\System Update\UpdateCenterService.exe
C:\Windows\System32\svchost.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Windows\RtHDVCpl.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Program Files\Windows Live\Messenger\msnmsgr.exe
C:\Program Files\Sony Ericsson\Sony Ericsson PC Suite\SEPCSuite.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Ceri\AppData\Local\Temp\Rar$EX00.895\setup.exe
C:\Users\Ceri\AppData\Local\Temp\Rar$EX00.895\setup.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe
C:\Program Files\Windows Live\Messenger\usnsvc.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\wbem\wmiprvse.exe

hosts


C:\


C:\Windows


C:\Windows\system


C:\Windows\Web


C:\Windows\system32


C:\Windows\system32\LogFiles


C:\Users\Ceri


C:\Users\Ceri\AppData\Local\Temp


C:\Users\Ceri\Application Data


Start Menu


C:\Users\Ceri\FAVORI~1


Desktop


C:\Program Files


Corrupted keys


Desktop Components



o4Patch
!!!Attention, following keys are not inevitably infected!!!

o4Patch
Credits: Malware Analysis & Diagnostic
Code: S!Ri



IEDFix
!!!Attention, following keys are not inevitably infected!!!

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



Agent.OMZ.Fix
!!!Attention, following keys are not inevitably infected!!!

Agent.OMZ.Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


VACFix
!!!Attention, following keys are not inevitably infected!!!

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


404Fix
!!!Attention, following keys are not inevitably infected!!!

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Sharedtaskscheduler
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


AppInit_DLLs
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
"AppInit_DLLs"=""
"LoadAppInit_DLLs"=dword:00000000


Winlogon
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit"="C:\\Windows\\system32\\userinit.exe,"


RK



DNS

Description: Intel® PRO/Wireless 3945ABG Network Connection
DNS Server Search Order: 194.168.4.100
DNS Server Search Order: 192.168.0.1

HKLM\SYSTEM\CCS\Services\Tcpip\..\{9893B99A-3829-4968-A3D6-323B69A37FBA}: DhcpNameServer=194.168.4.100 192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{9893B99A-3829-4968-A3D6-323B69A37FBA}: DhcpNameServer=194.168.4.100 192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\..\{9893B99A-3829-4968-A3D6-323B69A37FBA}: DhcpNameServer=194.168.4.100 192.168.0.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=194.168.4.100 192.168.0.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=194.168.4.100 192.168.0.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=194.168.4.100 192.168.0.1


Scanning for wininet.dll infection


End

#12 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:04:27 AM

Posted 09 January 2009 - 10:47 AM

Please rerun SuperAntiSpyware once more please...

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#13 Cerenia

Cerenia
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:09:27 AM

Posted 09 January 2009 - 06:20 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/09/2009 at 09:21 PM

Application Version : 4.21.1004

Core Rules Database Version : 3703
Trace Rules Database Version: 1679

Scan type : Complete Scan
Total Scan Time : 00:43:52

Memory items scanned : 637
Memory threats detected : 0
Registry items scanned : 6171
Registry threats detected : 9
File items scanned : 23601
File threats detected : 32

Adware.Tracking Cookie
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@tradedoubler[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@adopt.euroclick[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@revsci[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@doubleclick[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@scanner.virus[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@dixonsgroup.112.2o7[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@ad.zanox[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@adrevolver[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@statse.webtrendslive[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@ad.yieldmanager[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@specificclick[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@bluestreak[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@mediaplex[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@adbrite[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@atdmt[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@media.adrevolver[3].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@fastclick[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@casalemedia[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@media.adrevolver[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@content.yieldmanager[3].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@overture[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@serving-sys[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@server.lon.liveperson[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@bs.serving-sys[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@viacom.adbureau[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@statcounter[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@advertising[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@adtech[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@adviva[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@partypoker[1].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@apmebf[2].txt
C:\Users\Ceri\AppData\Roaming\Microsoft\Windows\Cookies\ceri@server.lon.liveperson[3].txt

Rootkit.Component/Trace
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ#NextInstance
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Service
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Legacy
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#ConfigFlags
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#Class
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#ClassGUID
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_VBAGZ\0000#DeviceDesc

#14 rigel

rigel

    FD-BC


  • Members
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:04:27 AM

Posted 09 January 2009 - 06:29 PM

Good evening Cerenia,

You have an infection that the tools we use here cannot cure. It is time to post a log in the HJT forum. Please follow this guide from step (6). Post a HJT log to the HJT forum and a Team member will be along to help you as soon as possible. You may wish to post a link back to this topic to see what was discussed thus far.

If you need any help with the guide, please let me know. Best wishes - you are in good hands...

rigel

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users