Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Advanced AntiVirus infection


  • Please log in to reply
9 replies to this topic

#1 seminolegirl850

seminolegirl850

  • Members
  • 70 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 10 August 2009 - 11:26 AM

Got a pop up and Advanced AntiVirus tried to install. I stopped it, but kept getting popups and attempts to install. After 3 unsuccessful attempts was able to run MBAM and SuperAntiSpyware scans, but only as quick scans. Freezes when I try to run complete scans. Would not even let me do a preliminary scan with McAfee. Will not let me run my computer in Safe Mode. I get a 'blue screen of death' every time I try and the computer stops. Here are the MBAM and SuperAnti logs:

Malwarebytes' Anti-Malware 1.40
Database version: 2575
Windows 5.1.2600 Service Pack 3

8/10/2009 10:07:50 AM
mbam-log-2009-08-10 (10-07-50).txt

Scan type: Quick Scan
Objects scanned: 97844
Time elapsed: 8 minute(s), 7 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 3
Registry Data Items Infected: 8
Folders Infected: 2
Files Infected: 15

Memory Processes Infected:
C:\WINDOWS\system32\winupdate.exe (Trojan.Downloader) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\AVR (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advanced virus remover (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe logon.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\AdvancedVirusRemover (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec (Stolen.data) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\AdvancedVirusRemover\PAVRM.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winhelper.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ms.Miko\Local Settings\Temporary Internet Files\Content.IE5\1HLPP17Q\SetupAdvancedVirusRemover[1].exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ms.Miko\Local Settings\Temporary Internet Files\Content.IE5\TY19TP0Z\firewall[1].dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\local.ds (Stolen.data) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.data) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ms.Miko\Application Data\Microsoft\Internet Explorer\Quick Launch\Advanced Virus Remover.lnk (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\Documents and Settings\Ms.Miko\Start Menu\Advanced Virus Remover.lnk (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\critical_warning.html (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\logon.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winupdate.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\rdl65.tmp.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\rdl66.tmp.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\rdl67.tmp.exe (Trojan.Dropper) -> Quarantined and deleted successfully.

AND:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/10/2009 at 11:39 AM

Application Version : 4.27.1002

Core Rules Database Version : 4046
Trace Rules Database Version: 1981

Scan type : Quick Scan
Total Scan Time : 00:43:04

Memory items scanned : 472
Memory threats detected : 0
Registry items scanned : 548
Registry threats detected : 2
File items scanned : 20337
File threats detected : 15

Rootkit.Agent/Gen-Rustock
HKLM\System\ControlSet001\Services\ghs5980
C:\WINDOWS\SYSTEM32\DRIVERS\GHS5980.SYS
HKLM\System\ControlSet001\Enum\Root\LEGACY_ghs5980

Adware.Tracking Cookie
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@advertising[1].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@specificclick[2].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@a1.interclick[2].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@specificmedia[2].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@ads.pointroll[1].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@atdmt[2].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@interclick[1].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@questionmarket[2].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@doubleclick[1].txt
C:\Documents and Settings\Ms.Miko\Cookies\ms.miko@ad.yieldmanager[2].txt

Trojan.Agent/Gen
C:\WINDOWS\SYSTEM32\CRITICAL_WARNING.HTML

Trojan.Dropper/Sys-NV
C:\WINDOWS\SYSTEM32\WINHELPER.DLL

Trojan.WinUpdate
C:\WINDOWS\SYSTEM32\WINUPDATE.EXE
C:\WINDOWS\Prefetch\WINUPDATE.EXE-041E597C.pf

I am still experiencing difficulties even after both scans. Clearly, whatever security programs that I have are not good enough as this is my 3rd time on this forum in less than a year. Appreciate whatever assistance you can give me and suggestions on beefing up my security.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:49 AM

Posted 10 August 2009 - 12:52 PM

Hello I see a rootkit possibility here. so...
Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive.
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 seminolegirl850

seminolegirl850
  • Topic Starter

  • Members
  • 70 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 10 August 2009 - 01:29 PM

Here is the MBAM scan log:

Malwarebytes' Anti-Malware 1.40
Database version: 2592
Windows 5.1.2600 Service Pack 3

8/10/2009 2:07:29 PM
mbam-log-2009-08-10 (14-07-29).txt

Scan type: Quick Scan
Objects scanned: 97096
Time elapsed: 5 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\advanced virus remover (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate.exe (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\activedesktop\NoChangingWallpaper (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\AdvancedVirusRemover (Rogue.AdvancedVirusRemover) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\AdvancedVirusRemover\PAVRM.exe (Rogue.Installer) -> Quarantined and deleted successfully.

And here is the Root Repeal log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/10 14:15
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB1707000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79DF000 Size: 8192 File Visible: No Signed: -
Status: -

Name: ocabrd.sys
Image Path: C:\WINDOWS\system32\drivers\ocabrd.sys
Address: 0xBA59B000 Size: 61440 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB035E000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETlexvasrn.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys
Address: 0xB19D7000 Size: 155648 File Visible: - Signed: -
Status: Hidden from the Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\SKYNETncbjgobw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETswrqrdkt.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETuwwegxyv.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETwkmextbi.dat
Status: Invisible to the Windows API!

Path: c:\windows\temp\mcafee_kfanja53fnyn9ol
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys
Status: Invisible to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: winlogon.exe (PID: 672) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: services.exe (PID: 720) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: lsass.exe (PID: 732) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETswrqrdkt.dll]
Process: svchost.exe (PID: 896) Address: 0x008e0000 Size: 53248

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 896) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 996) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1100) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1224) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1424) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: Explorer.EXE (PID: 1488) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: spoolsv.exe (PID: 1616) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcagent.exe (PID: 1908) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: sprtcmd.exe (PID: 1916) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: HPWuSchd2.exe (PID: 1924) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: ctfmon.exe (PID: 1952) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqtra08.exe (PID: 1976) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 328) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: AppleMobileDeviceService.exe (PID: 412) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mDNSResponder.exe (PID: 436) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 508) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcmscsvc.exe (PID: 608) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcnasvc.exe (PID: 856) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcproxy.exe (PID: 1212) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: McShield.exe (PID: 1336) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: MPFSrv.exe (PID: 1480) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: sprtsvc.exe (PID: 1548) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 2100) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: ViewpointService.exe (PID: 2184) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: CALMAIN.exe (PID: 2452) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: alg.exe (PID: 3924) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcsysmon.exe (PID: 776) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqSTE08.exe (PID: 2128) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqbam08.exe (PID: 2232) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqgpc01.exe (PID: 2436) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: RootRepeal.exe (PID: 876) Address: 0x10000000 Size: 32768

Hidden Services
-------------------
Service Name: SKYNETpyvbqiem
Image Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys

Service Name: vsfocevpyfrbnb
Image Path: C:\WINDOWS\system32\drivers\vsfocesemdxvnt.sys

==EOF==

I was able to run both scans without freezing.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:49 AM

Posted 10 August 2009 - 02:17 PM

Ok, this was productive...
Now the next step...

Rerun Rootrepeal. After the scan completes, go to the files tab and find these files:

C:\WINDOWS\system32\SKYNETncbjgobw.dll
C:\WINDOWS\system32\SKYNETswrqrdkt.dll
C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys



Then use your mouse to highlight it in the Rootrepeal window.
Next right mouse click on it and select *wipe file* option only.
Then immediately reboot the computer.



Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

How is it running now?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 seminolegirl850

seminolegirl850
  • Topic Starter

  • Members
  • 70 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 10 August 2009 - 03:57 PM

It is running much better now. No popups and I've been able to do the scans without anything happening. Here are the RootRepeal and MBAM scans:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/10 16:15
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB1707000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79DF000 Size: 8192 File Visible: No Signed: -
Status: -

Name: ocabrd.sys
Image Path: C:\WINDOWS\system32\drivers\ocabrd.sys
Address: 0xBA59B000 Size: 61440 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB04D6000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETlexvasrn.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys
Address: 0xB19D7000 Size: 155648 File Visible: - Signed: -
Status: Hidden from the Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\SKYNETncbjgobw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETswrqrdkt.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETuwwegxyv.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETwkmextbi.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys
Status: Invisible to the Windows API!

Stealth Objects
-------------------
Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: winlogon.exe (PID: 672) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: services.exe (PID: 720) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: lsass.exe (PID: 732) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETswrqrdkt.dll]
Process: svchost.exe (PID: 896) Address: 0x008e0000 Size: 53248

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 896) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 996) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1100) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1224) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 1424) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: Explorer.EXE (PID: 1488) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: spoolsv.exe (PID: 1616) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcagent.exe (PID: 1908) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: sprtcmd.exe (PID: 1916) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: HPWuSchd2.exe (PID: 1924) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: ctfmon.exe (PID: 1952) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqtra08.exe (PID: 1976) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 328) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: AppleMobileDeviceService.exe (PID: 412) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mDNSResponder.exe (PID: 436) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 508) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcmscsvc.exe (PID: 608) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcnasvc.exe (PID: 856) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcproxy.exe (PID: 1212) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: McShield.exe (PID: 1336) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: MPFSrv.exe (PID: 1480) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: sprtsvc.exe (PID: 1548) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: svchost.exe (PID: 2100) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: ViewpointService.exe (PID: 2184) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: CALMAIN.exe (PID: 2452) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: alg.exe (PID: 3924) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: mcsysmon.exe (PID: 776) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqSTE08.exe (PID: 2128) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqbam08.exe (PID: 2232) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: hpqgpc01.exe (PID: 2436) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETncbjgobw.dll]
Process: RootRepeal.exe (PID: 2548) Address: 0x10000000 Size: 32768

Hidden Services
-------------------
Service Name: SKYNETpyvbqiem
Image Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys

Service Name: vsfocevpyfrbnb
Image Path: C:\WINDOWS\system32\drivers\vsfocesemdxvnt.sys

==EOF==

I deleted the ones that you told me to delete and ran MBAM:

Malwarebytes' Anti-Malware 1.40
Database version: 2593
Windows 5.1.2600 Service Pack 3

8/10/2009 4:44:00 PM
mbam-log-2009-08-10 (16-44-00).txt

Scan type: Quick Scan
Objects scanned: 96876
Time elapsed: 7 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\SKYNETuwwegxyv.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SKYNETwkmextbi.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SKYNETncbjgobw.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SKYNETswrqrdkt.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys (Trojan.Agent) -> Quarantined and deleted successfully.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:49 AM

Posted 10 August 2009 - 07:37 PM

Hi,I need you to do this this way..Open MBAM in normal mode and click Update tab, select Check for Updates,when done close MBAM.
Next disconnect from the internet.


Rerun Rootrepeal. After the scan completes, go to the files tab and find these files:

C:\WINDOWS\system32\SKYNETncbjgobw.dll
C:\WINDOWS\system32\SKYNETswrqrdkt.dll
C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys

Then use your mouse to highlight it in the Rootrepeal window.
Next right mouse click on it and select *wipe file* option only.
Then immediately reboot the computer.



Rerun MBAM like this:

Open MBAM in normal mode and click Scanner tab,select Quick scan and scan.
After scan click Remove Selected,
Reconnect to the internet.
Post new scan log
and Reboot into normal mode.


How is it running now?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 seminolegirl850

seminolegirl850
  • Topic Starter

  • Members
  • 70 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 11 August 2009 - 08:24 AM

I ran the Root Repeal scan, but I did find those files on the file tab. Here is the log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/11 08:48
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB178B000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79DF000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB1593000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\windows\temp\mcafee_cadaeva2t7ptfdb
Status: Allocation size mismatch (API: 4096, Raw: 0)

Hidden Services
-------------------
Service Name: SKYNETpyvbqiem
Image Path: C:\WINDOWS\system32\drivers\SKYNETlexvasrn.sys

Service Name: vsfocevpyfrbnb
Image Path: C:\WINDOWS\system32\drivers\vsfocesemdxvnt.sys

==EOF==

The MBAM scan did not find anything. Here is the log:

Malwarebytes' Anti-Malware 1.40
Database version: 2601
Windows 5.1.2600 Service Pack 3

8/11/2009 9:11:00 AM
mbam-log-2009-08-11 (09-11-00).txt

Scan type: Quick Scan
Objects scanned: 96961
Time elapsed: 7 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Everything appears to be back to normal, it is running the way it was before the virus installed.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:49 AM

Posted 11 August 2009 - 11:28 AM

Hello, this looks good now.. seminolegirl850
Now you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista Users can refer to these links: Create a New Restore Point and Disk Cleanup.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 seminolegirl850

seminolegirl850
  • Topic Starter

  • Members
  • 70 posts
  • OFFLINE
  •  
  • Local time:04:49 AM

Posted 11 August 2009 - 01:58 PM

Done! :thumbsup: Thanks for your help! Where should I look for suggestions to make my computer more secure?

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:49 AM

Posted 11 August 2009 - 03:27 PM

You're most welcome, please take a moment to read quietman7's excellent prevention tips in post 17 here
Click>>Tips to protect yourself against malware and reduce the potential for re-infection:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users