Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

SKYNET infection--Need removal help


  • Please log in to reply
11 replies to this topic

#1 ndenezzo

ndenezzo

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 16 August 2009 - 01:31 PM

A couple days ago I seem to have stumbled upon some nasty bugs. I used a few different programs (malwarebytes, spyware doctor, norton) and got rid of most of them. But there is one thing (SKYNETlog.dat) that keeps showing up in my malwarebytes log that I can't get rid of. It says it will be deleted upon reboot, but I will scan again and it's still there every time.
To compound matters, I can't reboot my computer in Safe mode. Every time I try I get a ""blue screen of death" and it tells me to run CHKDSK /F. I tried this, but it gives me an error, saying it can't read the /F drive.
There also seems to be a prolbem with my Norton now, saying it is at risk and needs to be fixed, but I try to fix it and it won't work.
I'm not the most computer savvy person, so any help I can get with this would be great.
I read another SKYNET thread on here, so I scanned with RootRepeal, as well as MalwareBytes and saved the logs.

RootRepeal log:
ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/16 10:58
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB0587000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA64A000 Size: 8192 File Visible: No Signed: -
Status: -

Name: hiber_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\hiber_WMILIB.SYS
Address: 0xBA5BE000 Size: 8192 File Visible: No Signed: -
Status: -

Name: mchInjDrv.sys
Image Path: C:\WINDOWS\system32\Drivers\mchInjDrv.sys
Address: 0xBA7C5000 Size: 2560 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xAC716000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETsjqjnnai.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETsjqjnnai.sys
Address: 0xB08A0000 Size: 151552 File Visible: - Signed: -
Status: Hidden from the Windows API!

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\SKYNETfnkcrqes.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNEThuckqmvv.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETkfgrtfmo.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETlog.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\SKYNETrowanewa.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\imoad44.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETsjqjnnai.sys
Status: Invisible to the Windows API!

Path: c:\documents and settings\nicholas denezzo\local

settings\temp\etilqs_hdsjdtitrpnnbnduohrg
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\nicholas denezzo\local

settings\temp\etilqs_krpylbva7vt0pltszzlx
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\nicholas denezzo\local settings\temp\perflib_perfdata_a40.dat
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\all users\application

data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\qbackup\index.qbs
Status: Allocation size mismatch (API: 4096, Raw: 0)

Stealth Objects
-------------------
Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: winlogon.exe (PID: 716) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: services.exe (PID: 764) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: lsass.exe (PID: 776) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: Ati2evxx.exe (PID: 964) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETfnkcrqes.dll]
Process: svchost.exe (PID: 984) Address: 0x00730000 Size: 53248

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 984) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1060) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1164) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: EvtEng.exe (PID: 1220) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: S24EvMon.exe (PID: 1312) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: WLKeeper.exe (PID: 1356) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1428) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1468) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: aawservice.exe (PID: 1584) Address: 0x00c00000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: spoolsv.exe (PID: 1728) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1860) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: AOLacsd.exe (PID: 1892) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: AppleMobileDeviceService.exe (PID: 1916) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: mDNSResponder.exe (PID: 1964) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: MDM.EXE (PID: 2040) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: NICCONFIGSVC.exe (PID: 236) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: PnkBstrA.exe (PID: 276) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: RegSrvc.exe (PID: 304) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: sprtsvc.exe (PID: 904) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: svchost.exe (PID: 1204) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ViewpointService.exe (PID: 1328) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: alg.exe (PID: 2804) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: wmiprvse.exe (PID: 2880) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: Ati2evxx.exe (PID: 3424) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: Explorer.EXE (PID: 3536) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: SynTPEnh.exe (PID: 3928) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ZCfgSvc.exe (PID: 3976) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ifrmewrk.exe (PID: 3992) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: stsystra.exe (PID: 4012) Address: 0x00980000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: cli.exe (PID: 4032) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: quickset.exe (PID: 4052) Address: 0x00e70000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: DVDLauncher.exe (PID: 2020) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: issch.exe (PID: 492) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: DMXLauncher.exe (PID: 512) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: GoogleDesktop.exe (PID: 516) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: E_FATIADA.EXE (PID: 560) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: tfswctrl.exe (PID: 552) Address: 0x00a10000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: jusched.exe (PID: 640) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: sprtcmd.exe (PID: 2172) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: realsched.exe (PID: 2352) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: GoogleDesktop.exe (PID: 2936) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: iTunesHelper.exe (PID: 2980) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: netWaiting.exe (PID: 1656) Address: 0x00ba0000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: DSAgnt.exe (PID: 3216) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ctfmon.exe (PID: 3268) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: DesktopWeather.exe (PID: 668) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: RegMech.exe (PID: 2152) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: GoogleDesktop.exe (PID: 2164) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: DLG.exe (PID: 2504) Address: 0x00c20000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: iPodService.exe (PID: 3784) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: cli.exe (PID: 2624) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: firefox.exe (PID: 4344) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ccSvcHst.exe (PID: 3908) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: ccSvcHst.exe (PID: 4964) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: E_FAMTADA.EXE (PID: 6124) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: wuauclt.exe (PID: 7080) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: wscntfy.exe (PID: 7844) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETrowanewa.dll]
Process: RootRepeal.exe (PID: 6812) Address: 0x10000000 Size: 32768

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Object: Hidden Code [Driver: FltMgr, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Object: Hidden Code [Driver: sr, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Object: Hidden Code [Driver: Mup, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Object: Hidden Code [Driver: Tcpip, IRP_MJ_CREATE]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_CLOSE]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_READ]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_WRITE]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SET_EA]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_CLEANUP]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_POWER]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: Tcpip, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a8fc740 Size: 1715

Object: Hidden Code [Driver: RAW, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Object: Hidden Code [Driver: PCTCore, IRP_MJ_CREATE]
Process: System Address: 0x8a8f9ad0 Size: 1332

Hidden Services
-------------------
Service Name: SKYNEToxkxwkvu
Image Path: C:\WINDOWS\system32\drivers\SKYNETsjqjnnai.sys

==EOF==


MalwareBytes log:
Malwarebytes' Anti-Malware 1.40
Database version: 2628
Windows 5.1.2600 Service Pack 2

8/16/2009 10:47:48 AM
mbam-log-2009-08-16 (10-47-48).txt

Scan type: Quick Scan
Objects scanned: 113388
Time elapsed: 12 minute(s), 47 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\SKYNETlog.dat (Trojan.Agent) -> Delete on reboot.



Any help would be awesome. Thanks in advance!

BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 16 August 2009 - 05:05 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.


Path: C:\WINDOWS\system32\drivers\imoad44.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\SKYNETsjqjnnai.sys
Status: Invisible to the Windows API!


Please right click on these items in RootRepeal, and select Wipe File. Then reboot, and run a Quick Scan with malwarebytes. Then post a copy of the log back here.
Computer Pro

#3 ndenezzo

ndenezzo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 16 August 2009 - 11:03 PM

Ok, thanks for the help.
I wiped those files with RootRepeal, then rebooted and ran Malwarebytes.
Here's the log generated by MBAM:

Malwarebytes' Anti-Malware 1.40
Database version: 2628
Windows 5.1.2600 Service Pack 2

8/16/2009 9:00:51 PM
mbam-log-2009-08-16 (21-00-51).txt

Scan type: Quick Scan
Objects scanned: 106294
Time elapsed: 16 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\SKYNEThuckqmvv.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SKYNETkfgrtfmo.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\SKYNETlog.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\SKYNETsjqjnnai.sys (Trojan.Agent) -> Quarantined and deleted successfully.

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 17 August 2009 - 06:36 AM

Ok, next:

Please run ATF and SAS:
Credits to Boopme

Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note 2: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware, Free Home Edition

Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
Computer Pro

#5 ndenezzo

ndenezzo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 17 August 2009 - 02:31 PM

This is where I run into problems. I can't open windows in safe mode.
Every time I try it crashes.
It starts listing off the system files, and then a blue screen pops up.
It basically says:

A problem has been detected on the computer.
Check for viruses on the computer. Check the hard drive to make sure it is properly configured and terminated. Run CHKDSK /F to check for hard drive corruption and restart.
Technical Information:
****STOP: 0x0000007B (0xF78A6524, 0xC0000034, 0x00000000, 0x00000000)

As far as I know, this hadn't started happening until the viruses showed up, but I can't really be sure because I never try to open safe mode.

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 17 August 2009 - 02:33 PM

Ok, then try to run in Normal Mode
Computer Pro

#7 ndenezzo

ndenezzo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 18 August 2009 - 02:05 AM

Ok, so I did all of that in normal mode.
Here's the SAS log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/17/2009 at 11:43 PM

Application Version : 4.27.1002

Core Rules Database Version : 4059
Trace Rules Database Version: 1999

Scan type : Complete Scan
Total Scan Time : 02:40:10

Memory items scanned : 790
Memory threats detected : 0
Registry items scanned : 5836
Registry threats detected : 4
File items scanned : 117422
File threats detected : 11

Trojan.Media-Codec
HKU\S-1-5-21-2978538801-2324535351-571155266-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{192C5B4A-3EFD-40C7-9F99-C472DEB8EFC0}
HKU\S-1-5-21-2978538801-2324535351-571155266-1006\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{74A49269-9779-48B4-A0E6-3A5AF2A3ADE6}
HKLM\Software\Microsoft\Internet Explorer\Toolbar#{74a49269-9779-48b4-a0e6-3a5af2a3ade6}
HKU\S-1-5-21-2978538801-2324535351-571155266-1006\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser#{74A49269-9779-48B4-A0E6-3A5AF2A3ADE6}

Malware.Installer-Pkg/Gen
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{26D2C2C3-CF14-4ED7-B1FC-0BE64AFBA3B3}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{3C48F877-A164-45E9-B9DA-26A049FFC207}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{6293BC00-4EB8-4C65-8548-53E2FC3BF937}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{651956B7-1969-42AA-9453-E0B813019D54}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{989E4C3B-B2C9-4486-9A09-D5A8F953837C}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{D1A6F3FD-7B40-443F-8767-BADB25A0D222}.EXE
C:\DOCUMENTS AND SETTINGS\ALL USERS\APPLICATION DATA\WILDTANGENT\DELL GAME CONSOLE\DOWNLOADS\INSTALLERS\{E0814F95-5380-4892-B8C8-7FA4B349EF46}.EXE

Rootkit.Agent/Gen-Rx
C:\DOCUMENTS AND SETTINGS\NICHOLAS DENEZZO\APPLICATION DATA\PNKBSTRK.SYS
C:\PROGRAM FILES\ACTIVISION\CALL OF DUTY 4 - MODERN WARFARE\PB\PNKBSTRK.SYS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP445\A0168750.SYS
C:\SYSTEM VOLUME INFORMATION\_RESTORE{46DE8921-1D39-44D2-A9E9-64119261F211}\RP445\A0168751.SYS

#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 18 August 2009 - 10:26 AM

How are things running now?
Computer Pro

#9 ndenezzo

ndenezzo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 18 August 2009 - 03:12 PM

Seems to be running fine right now.
Thanks for all the help dude!

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 18 August 2009 - 05:15 PM

Ok, if everything is good:

Create a new Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
Go to Start > Programs > Accessories > System Tools and click "System Restore".
Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
Then use Disk Cleanup to remove all but the most recently created Restore Point.
Go to Start > Run and type: Cleanmgr
Click "Ok"
Disk Cleanup will scan your files for several minutes, then open.
Click the "More Options" Tab.
Click the "Clean up" button under System Restore.
Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
Click Yes, then click Ok.
Click Yes again when prompted with "Are you sure you want to perform these actions?"
Disk Cleanup will remove the files and close automatically.
Computer Pro

#11 ndenezzo

ndenezzo
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:07:17 AM

Posted 18 August 2009 - 11:57 PM

Done and done.
Thanks again for all the help!

#12 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:17 AM

Posted 19 August 2009 - 11:38 AM

Your very welcome
Computer Pro




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users