Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware causing many problems [Moved from XP]


  • Please log in to reply
44 replies to this topic

#1 ClonedCow

ClonedCow

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 03:12 PM

Yesterday malware infected my computer, although I don't remember going to any untrusted websites.
The symptoms are:
  • disabled task manager (I enabled it again)
  • error message saying "*** - Bad Image" in the heading where *** is the executable I'm trying to run and "The application or DLL globalroot\systemroot\system32\SKYNETtsspuyqx.dll is not a valid Windows image. Please check this against your installation diskette." in the description, even though sometimes the executable still runs (like firefox)
  • unable to run computer in safe mode (gives me blue screen)
  • unable to use system restore (can't press the last "next" button)
  • causing the computer to restart (most likely from crashing) when I'm in the middle of doing a malware scan (using PC Tools Spyware Doctor)


BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,011 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:10:39 AM

Posted 09 August 2009 - 03:21 PM

I am moving this topic from the Windows XP forum to the Am I Infected forum for you.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:39 AM

Posted 09 August 2009 - 04:09 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



Lets take a look with Malwarebytes

Please download Malwarebytes' Anti-Malware from here:
Malwarebytes
Please rename the file BEFORE downloading to zztoy.exe instead of mbam-setup.exe

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

Double Click zztoy.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


If Malwarebytes won't install or run

Some types of malware will disable MBAM and other security tools. If MBAM will not install, try renaming it. Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run.
Computer Pro

#4 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 06:02 PM

I did everything you told me to do. Things were going fine until I restarted the computer. Now I don't have internet connection on that computer. I am currently using another computer at my house.

#5 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:39 AM

Posted 09 August 2009 - 07:07 PM

Please try to do a system restore to yesterday or to the next availiable date, and we will take a different approach.

But, first, save a copy of the Malwarebytes log to your desktop. You can find the log under the Logs Tab in Malwarebytes. That way we will be able to see what happened, then do the system restore

Edited by Computer Pro, 09 August 2009 - 07:08 PM.

Computer Pro

#6 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 07:43 PM

It seems like the problem's only getting worse. I still can't use system restore.

#7 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:39 AM

Posted 09 August 2009 - 07:47 PM

Are you able to connect to the internet in Safe Mode with Networking?
Computer Pro

#8 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 08:33 PM

I am not able to run my computer in safe mode at all. I get a blue screen saying "A problem has been detected and windows has been shut down to prevent damage to your computer. ..." At the bottom it says "*** STOP: 0x0000007B (0xF789E528,0xc0000034,0x00000000,0x00000000) ."

#9 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:10:39 AM

Posted 09 August 2009 - 09:04 PM

Hello ClonedCow.

Loss of internet during the malware removal procedure is something that happens from time to time. It can be repaired though.

I need to see that log in order to know exactly what kind of infection we're dealing with, as well as what exactly has caused your internet connection to cut out. Could you please use a CD or flash drive to move the Malwarebytes log to a clean computer, and then post the log from there?

Once we see that we ought to know what to do next.

~Blade


In your next reply, please include the following:
Malwarebytes log

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#10 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 09:13 PM

Malwarebytes' Anti-Malware 1.40
Database version: 2551
Windows 5.1.2600 Service Pack 3

8/9/2009 3:35:45 PM
mbam-log-2009-08-09 (15-35-45).txt

Scan type: Full Scan (A:\|C:\|D:\|)
Objects scanned: 210509
Time elapsed: 1 hour(s), 0 minute(s), 5 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 1
Registry Values Infected: 3
Registry Data Items Infected: 7
Folders Infected: 3
Files Infected: 83

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\winhelper.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\The Weather Channel (Adware.Hotbar) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls\wxfw.dll (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msupdate (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\All Users\Application Data\SpywareRemover2009 (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SpywareRemover2009\Data (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Start Menu\Programs\SpywareRemover2009 (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\agsqtsns.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\snstqsga.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uxbyyswc.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cwsyybxu.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\azton.mt.vir (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\madudori.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\nvrsk.dll.vir (Worm.Pinit) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\tehayela.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\drivers\ndis.sys.vir (Rootkit.Protector) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1044365184.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1068002532.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1180575276.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\123656656.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1257166856.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1290266290.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1334630396.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1358634758.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\140102814.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1434165556.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1588060670.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1800506244.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1818482132.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\1909263382.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2010677012.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\208910952.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2188965554.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2540458868.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2555426318.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2578514990.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2845437190.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2897166878.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2968958174.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\2973275036.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3010451730.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3098536646.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3185825882.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3190099146.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\327690098.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3515538926.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3530659068.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3699637688.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3745709716.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3832257698.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3842017810.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\3963787648.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\4031450948.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\4040717008.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\409372410.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\4257548300.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\4287366572.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\449576036.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\449732286.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\536240118.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\539521368.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\605713296.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\639365118.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\71411040.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\806033022.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\83656656.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\849143614.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\86312906.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\961505726.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\977323084.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\Temp\992366726.exe.vir (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\8EAa4VsE.exe_ (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\avurlwrv.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hgylwtxe.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jsegxo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\khcmkr.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mxdjyehm.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\oxgopaky.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\panjqu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pqewqjdj.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SpywareRemover2009\Data\Abbr (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SpywareRemover2009\Data\ActivationCode (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\SpywareRemover2009\Data\ProductCode (Rogue.SpywareRemover2009) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.sys) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jaditibi.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jowuhese.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\critical_warning.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winhelper.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\Temp\rdlBB.tmp.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\rdlBE.tmp.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

#11 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:10:39 AM

Posted 09 August 2009 - 09:19 PM

Alright. . . we need to make sure that the infection is completely gone before we try to restore Internet access. Please use a flash drive or CD to move programs and logs to and from the infected computer for the time being.

Let's run RootRepeal next.

Please install RootRepeal
Note: Vista users ,, right click on desktop icon and select "Run as Administrator."
  • Go HERE, HERE, or HERE and download RootRepeal.zip to your Desktop.
Disconnect from the Internet or physically unplug your Internet cable connection.
Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
Temporarily disable your anti-virus and real-time anti-spyware protection.
After starting the scan, do not use the computer until the scan has completed.
When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
  • Extract RootRepeal.exe from the zip archive.
  • Open Posted Image on your desktop.
  • At the top of the window, click Settings, then Options.
  • Click the Ssdt & Shadow Ssdt Tab.
  • Make sure the box next to "Only display hooked functions." is checked.
  • Click the "X" in the top right corner of the Settings window to close it.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.
~Blade


In your next reply, please include the following:
RootRepeal log

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#12 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 09 August 2009 - 11:28 PM

When I try running RootRepeal, the computer crashes and I get a blue screen stating "A driver has corrupted the memory management system PTEs." At the bottom it says "Beginning dmp of physical memory; Physical memory dump complete."

#13 Blade

Blade

    Strong in the Bleepforce


  • Site Admin
  • 12,704 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:US
  • Local time:10:39 AM

Posted 10 August 2009 - 12:23 AM

This machine is heavily infected. I strongly recommend that you back up any important data files to CD, flash drive, or external hard drive.

Let's try one other ARK tool.

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now". Click Yes.
  • Make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Start > Run and type or copy/paste: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Before performing an ARK scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
~Blade

In your next reply, please include the following:
sarscan.log

Posted Image

If I am helping you, it has been 48 hours since your last post, and I have yet to reply to your topic, please send me a PM
Become a BleepingComputer fan: Facebook
Follow us on Twitter!
Circle us on Google+


#14 ClonedCow

ClonedCow
  • Topic Starter

  • Members
  • 21 posts
  • OFFLINE
  •  
  • Local time:07:39 AM

Posted 10 August 2009 - 01:34 PM

I was not recommended to clean anything.






Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/10/2009 at 10:00:39 AM
User "Administrator" on computer "FAMILY-737B4A0F"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SKYNETcnlotqlx
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\SKYNETcnlotqlx
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\SKYNETcnlotqlx
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\WINDOWS\system32\SKYNETtsspuyqx.dll
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\NN018NBU\BuqslX41bP2O.Q%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249617844
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\TZL75TN8\660512267%2FK%3D9vLFKJ5TpQVmj8_IsU5AxQ%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1250841023360
Hidden: file C:\WINDOWS\system32\SKYNETysuwqdfl.dat
Hidden: file C:\User\Fang Wang\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare\bin\Release\ReelStripCompare.publish\ReelStripCompare_1_4_4_0\ReelStripCompare.exe.deploy
Hidden: file C:\User\Fang Wang\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare\bin\Release\ReelStripCompare.publish\ReelStripCompare_1_4_4_0\ReelStripCompare.exe.manife
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\F7M39WS2\eyboard,mod_traffic_app,mod_lyrsctrl,mod_lyrs,mod_quadtree,mod_transitlyr,mod_cb_launchpad,mod_truffle,mod_query_on_pan,mod_attr,mod_app_infowindow%7D[1].js
Hidden: file C:\WINDOWS\system32\SKYNETrdoevpab.dat
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\NN018NBU\791006733%2FK%3DbVbsQtQMXU3OEzc0t9b_6Q%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1253855734501
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9EKGNITK\527668778499%2FK%3DAz.GvgQQIBkLpL1V8ahxsA%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1249527671
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\3Q544X23\ahJdJvXPMWRsqA%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249527750
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\F7M39WS2\%2FB%3DSobTB9j8a4E-%2FJ%3D1249527754901087%2FK%3D6S8SI1aV2XVjyVcGDxmJ5A%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].htm
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\SWVJ9FC7\XQLgZ9QDb5jaSg%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249617789
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9EKGNITK\V.Pp3buoWLTo0A%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249618029
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\ZEB92VZS\.NO_bxh.9TM2MA%2FA%3D5761138%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249618037
Hidden: file C:\WINDOWS\system32\drivers\SKYNETnimfynsg.sys
Hidden: file C:\WINDOWS\system32\SKYNETylkvvkao.dll
Stopped logging on 8/10/2009 at 10:30:46 AM


Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 8/10/2009 at 11:00:33 AM
User "Administrator" on computer "FAMILY-737B4A0F"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SKYNETcnlotqlx
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\SKYNETcnlotqlx
Hidden: registry item \HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\SKYNETcnlotqlx
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\WINDOWS\system32\SKYNETtsspuyqx.dll
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\NN018NBU\BuqslX41bP2O.Q%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249617844
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\TZL75TN8\660512267%2FK%3D9vLFKJ5TpQVmj8_IsU5AxQ%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1250841023360
Hidden: file C:\WINDOWS\system32\SKYNETysuwqdfl.dat
Hidden: file C:\User\Fang Wang\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare\bin\Release\ReelStripCompare.publish\ReelStripCompare_1_4_4_0\ReelStripCompare.exe.deploy
Hidden: file C:\User\Fang Wang\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare_9reel_add_Stepper_Ver_1_5_2\ReelStripCompare\bin\Release\ReelStripCompare.publish\ReelStripCompare_1_4_4_0\ReelStripCompare.exe.manife
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\F7M39WS2\eyboard,mod_traffic_app,mod_lyrsctrl,mod_lyrs,mod_quadtree,mod_transitlyr,mod_cb_launchpad,mod_truffle,mod_query_on_pan,mod_attr,mod_app_infowindow%7D[1].js
Hidden: file C:\WINDOWS\system32\SKYNETrdoevpab.dat
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\NN018NBU\791006733%2FK%3DbVbsQtQMXU3OEzc0t9b_6Q%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1253855734501
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9EKGNITK\527668778499%2FK%3DAz.GvgQQIBkLpL1V8ahxsA%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;ord=1249527671
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\3Q544X23\ahJdJvXPMWRsqA%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249527750
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\F7M39WS2\%2FB%3DSobTB9j8a4E-%2FJ%3D1249527754901087%2FK%3D6S8SI1aV2XVjyVcGDxmJ5A%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].htm
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\SWVJ9FC7\XQLgZ9QDb5jaSg%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249617789
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\9EKGNITK\V.Pp3buoWLTo0A%2FA%3D5761137%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249618029
Hidden: file C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\ZEB92VZS\.NO_bxh.9TM2MA%2FA%3D5761138%2FR%3D0%2F%2A%24,http%3A%2F%2Fus.mc531.mail.yahoo.com%2Fmc%2Fmd[1].php%3Fen%3Dcp1252,;dcopt=rcl;mtfIFPath=nofile;ord=1249618037
Hidden: file C:\WINDOWS\system32\drivers\SKYNETnimfynsg.sys
Hidden: file C:\WINDOWS\system32\SKYNETylkvvkao.dll
Stopped logging on 8/10/2009 at 11:27:37 AM

#15 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:39 AM

Posted 10 August 2009 - 01:57 PM

Hidden: file C:\WINDOWS\system32\drivers\SKYNETnimfynsg.sys


Please select this file for removal and then let it remove. Then Reboot, and run a Malwarebytes quick scan.
Computer Pro




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users