Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Virus causing very limited control of PC


  • This topic is locked This topic is locked
17 replies to this topic

#1 sgobin

sgobin

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 15 July 2009 - 09:39 PM

Hi
I'm Running Windows XP SP3


I've recently been infected. Not sure how, I just know my Firefox was open.
Noticed the infection after random IE windows kept opening up (Firefox is my default browser).
Spyware Doctor warned of infection, couldn't stop it. Scans using Mcafee found trojans, root kits, and DNS changers (I'm recalling this from memory).
a file 'services.exe' in my Fonts folder is infected. also found new application running in Task manager 'b.exe'

I also have Malware Bytes Anti-Malware and Super Anti Spyware installed on the workstation, however MBAM wont load, and SuperAnti-Spyware keeps getting an error when trying to startup, causing it to end the task.

Mcafee is finding viruses, however can not clean them. Once it cleans what it can, If I scan again (without restarting) the same files that were cleaned show up infected.

When I was still in control of the computer yesterday, I was able to download A-Squared and tried to scan, it reported much more than Mcafee, after quarantining the files, I tried to start the computer today, but am having a lot of difficulty.

Mostly now, when trying to startup, instead of going to a Windows Log-in screen, I get a black screen with the mouse that can move around... but that's all. After clicking about 10 times, the mouse locks up and I am forced to restart.
Sometimes it will go to the windows log-in screen, where I select my user (the admin) and it gets stuck trying to startup. I can still access the task manager, but the start menu doesnt work, I cant access any of the icons on the desktop. Trying to run applications via task manager gives me a windows prompt asking me what application I'd like to use to run the file. This happens for everything I try to run. This also occurs in safemode.


As you can see, I cant interact much with the applications on the computer.
System restore was also a no-go, there was only one day I was able to select that had a restore point, but it wasnt proceeding.

I was wondering if there were any scanners I might be able to run from flash drive? I feel as though my options are limited.
Any help/guidance will be appreciated.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 15 July 2009 - 10:26 PM

Hello you should be able to run this from a flash.

ROOTREPEAL

Next Please install RootRepeal
Note: Vista users ,, right click on desktop icon and select "Run as Administrator."

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K.
Unzip that,(7-zip tool if needed) and then click RootRepeal.exe to open the scanner.
Next click on the Report tab, now click on Scan. A Window will open asking what to include in the scan. Check all of the below and then click OK.

Drivers
Files
Processes
SSDT
Stealth Objects
Hidden Services


Now you'll be asked which drive to scan. Check C: and click OK again and the scan will start. Please be patient as the scan runs. When the scan has finished, click on Save Report.
Name the log RootRepeal.txt and save it to your Documents folder (it should automatically save it there).
Please copy and paste that into your next reply.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 16 July 2009 - 07:40 PM

Thanks for the reply

I want to note, I've had some issues trying to startup 'Rootrepel'
When I execute the .exe file after unzipping, Windows cant recognize the file type and is asking for me to 'Open With'
Eventually, I'm able to run it by browsing for the same application that I unzipped. I'm getting this problem with every application I try to run.

Once I get the program to run I'm presented with the following error:
Could not read the boot sector. Try adjusting the Disk Access Level in the options dialog.

I get this about 5+ times, clicking ok to acknowledge it and move on.

When the program loads, I get a RootRepeal Warning:
Could not find module file on disk!
the Details show: Warning - could not read Windows Kernal using raw-disk reading!

I continue anyway, and get the 'could not read boot sector' error when the scan begins.
The scan continues, but I get the error again mid-way through.

However, with all these errors, I've managed to get the report.
I'll copy and paste it as you requested.
Also I'll include a copy of the log errors I encountered.

RootRepeal.txt contents

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/07/16 20:30
Program Version: Version 1.3.2.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: 00000103
Image Path: \Driver\00000103
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -

Name: azn4xc2i.SYS
Image Path: C:\WINDOWS\System32\Drivers\azn4xc2i.SYS
Address: 0xB8ECD000 Size: 303104 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA08B4000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA620000 Size: 8192 File Visible: No Signed: -
Status: -

Name: mchInjDrv.sys
Image Path: C:\WINDOWS\system32\Drivers\mchInjDrv.sys
Address: 0xBA7EE000 Size: 2560 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0x9D7B0000 Size: 49152 File Visible: No Signed: -
Status: -

Stealth Objects
-------------------
Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: winlogon.exe (PID: 900) Address: 0x00950000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: winlogon.exe (PID: 900) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: services.exe (PID: 948) Address: 0x00a70000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: services.exe (PID: 948) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: lsass.exe (PID: 960) Address: 0x00b00000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: lsass.exe (PID: 960) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: Ati2evxx.exe (PID: 1148) Address: 0x00e90000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: Ati2evxx.exe (PID: 1148) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1168) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1168) Address: 0x00a40000 Address: 45056

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1168) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1168) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UACbndtntjcjdvmktave.dll]
Process: svchost.exe (PID: 1168) Address: 0x00bb0000 Address: 73728

Object: Hidden Module [Name: UACdkvrdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1168) Address: 0x00f00000 Address: 204800

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1168) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1244) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1244) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1244) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1244) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1348) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1348) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1348) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1348) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1492) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1492) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1492) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1492) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1528) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1528) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1528) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1528) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: Ati2evxx.exe (PID: 1692) Address: 0x00e90000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: Ati2evxx.exe (PID: 1692) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: spoolsv.exe (PID: 1748) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: spoolsv.exe (PID: 1748) Address: 0x00d70000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: a2service.exe (PID: 1888) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: a2service.exe (PID: 1888) Address: 0x00d30000 Address: 49152

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: ACService.exe (PID: 1936) Address: 0x00bc0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: ACService.exe (PID: 1936) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: jqs.exe (PID: 652) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: jqs.exe (PID: 652) Address: 0x00bb0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: FrameworkService.exe (PID: 728) Address: 0x008d0000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: FrameworkService.exe (PID: 728) Address: 0x00df0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: vstskmgr.exe (PID: 792) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: vstskmgr.exe (PID: 792) Address: 0x00ba0000 Address: 49152

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: pctsAuxs.exe (PID: 1080) Address: 0x00c80000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: pctsAuxs.exe (PID: 1080) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: pctsSvc.exe (PID: 1312) Address: 0x00fb0000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: pctsSvc.exe (PID: 1312) Address: 0x01d10000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: naPrdMgr.exe (PID: 1336) Address: 0x008d0000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: naPrdMgr.exe (PID: 1336) Address: 0x00df0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: STacSV.exe (PID: 1508) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: STacSV.exe (PID: 1508) Address: 0x00c30000 Address: 49152

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: svchost.exe (PID: 1712) Address: 0x00770000 Address: 81920

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: svchost.exe (PID: 1712) Address: 0x00a80000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: svchost.exe (PID: 1712) Address: 0x00b10000 Address: 49152

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: svchost.exe (PID: 1712) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: WLService.exe (PID: 576) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: WLService.exe (PID: 576) Address: 0x00e70000 Address: 49152

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: b.exe (PID: 612) Address: 0x00e40000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: b.exe (PID: 612) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: WMP54Gv4.exe (PID: 1184) Address: 0x013b0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: WMP54Gv4.exe (PID: 1184) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: b.exe (PID: 1436) Address: 0x00e40000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: b.exe (PID: 1436) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: SearchIndexer.exe (PID: 1480) Address: 0x003a0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: SearchIndexer.exe (PID: 1480) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: Explorer.EXE (PID: 2064) Address: 0x00df0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: Explorer.EXE (PID: 2064) Address: 0x00d40000 Address: 45056

Object: Hidden Module [Name: UACeccijcmcypppmofjo.dll]
Process: Explorer.EXE (PID: 2064) Address: 0x10000000 Address: 81920

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: ctfmon.exe (PID: 2476) Address: 0x00d80000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: ctfmon.exe (PID: 2476) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: ctfmon.exe (PID: 2876) Address: 0x00d80000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: ctfmon.exe (PID: 2876) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: WinampTbServer.exe (PID: 2916) Address: 0x00e60000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: WinampTbServer.exe (PID: 2916) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: dwwin.exe (PID: 2968) Address: 0x00f00000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: dwwin.exe (PID: 2968) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: GoogleToolbarNotifier.exe (PID: 2640) Address: 0x00e00000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: GoogleToolbarNotifier.exe (PID: 2640) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UAC325d.tmpdldqgbkrelmsu.dll]
Process: firefox.exe (PID: 2832) Address: 0x01080000 Address: 204800

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: firefox.exe (PID: 2832) Address: 0x01270000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: firefox.exe (PID: 2832) Address: 0x016d0000 Address: 49152

Object: Hidden Module [Name: UACdkvrdldqgbkrelmsu.dll]
Process: Iexplore.exe (PID: 2156) Address: 0x10000000 Address: 204800

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: Iexplore.exe (PID: 2156) Address: 0x00fd0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: Iexplore.exe (PID: 2156) Address: 0x00b70000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: NOTEPAD.EXE (PID: 3816) Address: 0x00d70000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: NOTEPAD.EXE (PID: 3816) Address: 0x10000000 Address: 45056

Object: Hidden Module [Name: UACrvdlexylvtgyfrsyc.dll]
Process: RootRepeal.exe (PID: 2564) Address: 0x00fb0000 Address: 49152

Object: Hidden Module [Name: UACwqeukconnmulrumkd.dll]
Process: RootRepeal.exe (PID: 2564) Address: 0x10000000 Address: 45056

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x8ab0c1d8 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_CREATE]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_CLOSE]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_POWER]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: azn4xc2i؅䵆湦؁ః瑎て, IRP_MJ_PNP]
Process: System Address: 0x8a7415c0 Address: 463

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x8a7505d8 Address: 194

Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x8aa971d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x8a7ba1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x8ab0e1d8 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x8a8aa460 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x8a7ae1d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x89bd61d8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_CREATE]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_CLOSE]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_READ]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_CLEANUP]
Process: System Address: 0x8a5c88f8 Address: 463

Object: Hidden Code [Driver: CdfsЀ౤卋畡, IRP_MJ_PNP]
Process: System Address: 0x8a5c88f8 Address: 463

==EOF==

First Log Contents
20:26:10: Warning - could not read Windows kernel using raw-disk reading!
20:26:10: Could not find module file on disk!
20:26:11: Could not find module file on disk!
20:26:11: Could not find module file on disk!

Second Log Contents (presented after scan)
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:30:20: DeviceIoControl Error! Error Code = 0xc0000001
20:31:05: DeviceIoControl Error! Error Code = 0xc0000001
20:31:28: Could not read system registry! Please contact the author!

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 16 July 2009 - 08:49 PM

well you've done well to get that!.. Now I want you to try this with MBAM (Malwarebytes)
Please navigate to the MBAM folder located in the Program Files directory.

Locate MBAM.exe and rename it to winlogon.exe

Once renamed double click on the file to open MBAM and select Quick Scan

At the end of the scan click Remove Selected and then reboot.


Post the scan log. The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 16 July 2009 - 09:58 PM

Awesome quick reply, thanks boopme

Here is the results from the MBAM scan

Malwarebytes' Anti-Malware 1.37
Database version: 2191
Windows 5.1.2600 Service Pack 3

2009-07-16 22:41:42
mbam-log-2009-07-16 (22-41-42).txt

Scan type: Quick Scan
Objects scanned: 87657
Time elapsed: 1 minute(s), 38 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 2
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Cognac (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\net (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cognac (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\net (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\MyPC\Local Settings\temp\b.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 16 July 2009 - 10:07 PM

Thanks and you are welcome!
Rerun MBAM like this: Yours is a bit old.

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Next run ATF and SAS:

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware

, Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you

should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Please ask any needed questions,post 2 logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 16 July 2009 - 11:06 PM

I'm having some issues with updating MBAM.
Once I update it, the program has to shutdown and it seems its loading 'MBAM-Setup.exe'

But I'm getting prompted with that 'open with' thing again, but this time I cant locate where 'MBAM-Setup.exe' is.

Is there another way I can go about updating MBAM?

I wont proceed with the other scans unless you give the go-ahead

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 17 July 2009 - 11:34 AM

Ok, Run the ATF and SAs,that may clear what is stopping MBAM update.. If still no joy try updating it manually with a flash dtive or something..

You will need access to another computer that has a connection.
From there save mbam-setup.exe to a flash,usb,jump drive or CD. Now transfer it to the infected machine, then install and run the program.
If you cannot transfer to or install on the infected machine, try running the setup (installation) file directly from the flash drive or CD by double-clicking on mbam-setup.exe so it will install on the hard drive.
***
Manually Downloading Updates:
Manually download them from HERE and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 17 July 2009 - 09:02 PM

Hmm... couple of problems

I had SAS installed before, but I cant load the appliacation now. As soon as I try to run it, I get an error saying 'the application has encountered an error and needs to be shut down'

I cant uninstall the one I have installed because I cant load the windows 'Add/Remove Programs' application, I get a windows error saying rundll32.dll can not be located. And I cant install the new one over the old one.

I installed MBAM on my laptop and tried copying over the 'rules.ref' file over, but the version of MBAM I have installed isnt compatible with that file.

I was able to run ATF in safe mode, but that's about it... any other suggestions?

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 17 July 2009 - 10:08 PM

I'm sorry I didn't spot this the first time ... you need to read this..
IMPORTANT NOTE: uacinit.dll is related to a nasty variant of the TDSSSERV rootkit component. Rootkits, backdoor Trojans, Botnets, and IRC Bots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:

What danger is presented by rootkits?
Rootkits and how to combat them
r00tkit Analysis: What Is A Rootkit

If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
What Should I Do If I've Become A Victim Of Identity Theft?
Identity Theft Victims Guide - What to do


Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

When should I re-format? How should I reinstall?
Help: I Got Hacked. Now What Do I Do?
Where to draw the line? When to recommend a format and reinstall?


Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. Some infections are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. Sometimes there is another hidden piece of malware which has not been detected by your security tools that protects malicious files and registry keys (which have been detected) so they cannot be permanently deleted. Disinfection will probably require the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a DDS/HijackThis log for further investigation. Let me know how you wish to proceed.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 18 July 2009 - 01:07 AM

Wow...
I certainly wasn't expecting that kind of reply.
Well, at least I'm aware now...

I would prefer to not have to reformat, however, you say there is no gurantee the infection will be gone totally.
Would it be possible to backup data (pictures, movies, music, documents) to an external drive? if so, a reformat looks to be the best solution.

Or possibly clean as much of the virus(es) out to a point where I can backup the data? I have some family/work related documents I have on the computer and no other backup...

#12 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 18 July 2009 - 09:23 AM

Hi, I know and i don't care to post it but ot's important to know.. We have mostly cleaned this already..
Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Reformatting

Not an unwise decision to make. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired. Wiping your drive, reformatting, and performing a clean install of the OS or doing a factory restore removes everything and is the safest action but I cannot make that decision for you.

Reformatting a hard disk deletes all data. If you decide to reformat, you can back up all your important documents, data files and photos. The safest practice is not to backup any autorun.ini or .exe files because they may be infected. Some types of malware may disguise itself by adding and hiding its extension to the existing extension of files so be sure you take a close look at the full name. After reformatting, as a precaution, make sure you scan these files with your anti-virus prior to copying them back to your hard drive.

The best proceedure is a low level format. This completely wipes the drive. Then reinstall the OS.
Use the free version of Active@ KillDisk.
Or Darik's Boot And Nuke

The best sources of Information on this are
Reformatting Windows XP
Michael Stevens Tech

Of course also feel free to ask anything on this in the XP forum. They'd be glad to help.

2 guidelines/rules when backing up

1) Backup all your important data files, pictures, music, work etc... and save it onto an external hard-drive. These files usually include .doc, .txt, .mp3, .jpg etc...
2) Do not backup any executables files or any window files. These include .exe's, .scr, .com, .pif etc... as they may contain traces of malware. Also, .html or .htm files that are webpages should also be avoided.

Download Belarc Advisor - builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser.
Run it and then print out the results, they may be handy.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#13 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 18 July 2009 - 04:16 PM

I'm having trouble updating MBAM as I've said before. Maybe I didnt explain it clearly, but as soon as the update is done downloading, the program prompts me saying MBAM will be shut down in order to install the new version.
After it shuts down, it tries to load mbam-setup.exe (I assume its what was downloaded in the update).
It cant load it automatically though, it opens up the windows 'Open With' dialogue box. I cant continue though, becaus I dont know what application I should select to open with.

I've attached some screen shots to show you what I mean.

Just as the install is done
http://img21.imageshack.us/i/mbamproblem1.jpg

After I click the button to close MBAM and install the update
http://img210.imageshack.us/i/mbamproblem2.jpg

I've tried to scan again anyway, here is the log...

Malwarebytes' Anti-Malware 1.37
Database version: 2353
Windows 5.1.2600 Service Pack 3

2009-07-18 17:13:38
mbam-log-2009-07-18 (17-13-33).txt

Scan type: Quick Scan
Objects scanned: 93881
Time elapsed: 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 11
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\pcmstub (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\pcmstub (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\pcmstub (Rootkit.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mms (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> No action taken.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> No action taken.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\exec (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\.bat\(default) (Hijacked.BatFile) -> Bad: (csfile) Good: (batfile) -> No action taken.
HKEY_CLASSES_ROOT\.com\(default) (Hijacked.ComFile) -> Bad: (csfile) Good: (comfile) -> No action taken.
HKEY_CLASSES_ROOT\.exe\(default) (Hijacked.exeFile) -> Bad: (csfile) Good: (exefile) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\pcmstub.sys (Rootkit.Agent) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\certstore.dat (Trojan.Agent) -> No action taken.

#14 sgobin

sgobin
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Toronto, Ontario
  • Local time:02:16 AM

Posted 18 July 2009 - 04:17 PM

My Mistake, I posted the log before I clicked 'Remove Selected'
Here is the right log
Malwarebytes' Anti-Malware 1.37
Database version: 2353
Windows 5.1.2600 Service Pack 3

2009-07-18 17:16:45
mbam-log-2009-07-18 (17-16-45).txt

Scan type: Quick Scan
Objects scanned: 93881
Time elapsed: 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 11
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\pcmstub (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\pcmstub (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\pcmstub (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mms (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\run (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\exec (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CLASSES_ROOT\.bat\(default) (Hijacked.BatFile) -> Bad: (csfile) Good: (batfile) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.com\(default) (Hijacked.ComFile) -> Bad: (csfile) Good: (comfile) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\.exe\(default) (Hijacked.exeFile) -> Bad: (csfile) Good: (exefile) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
c:\WINDOWS\system32\pcmstub.sys (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\certstore.dat (Trojan.Agent) -> Quarantined and deleted successfully.

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:16 AM

Posted 19 July 2009 - 12:59 PM

Hi, see what our problem is ,is the Rootkit is still protected by a service or driver. I can't get at it without some specialized tools.
You will need to run HJT/DDS.
Please follow this guide. go and do steps 6 and 7 ,, Preparation Guide For Use Before Using Hijackthis. Then go here HijackThis Logs and Virus/Trojan/Spyware/Malware Removal ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users