Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected, can't fix


  • This topic is locked This topic is locked
18 replies to this topic

#1 JoshMac

JoshMac

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 23 August 2009 - 09:46 AM

OK, last night, I was browsing, came across a bad site, and now am infected with the PC Antispyware 2010 virus. It seems mostly harmless, but of course I want to get rid of it all the same. A Bitdefender search returned 4 infected files, but couldn't do anything about them. I tried using Malwarebytes, but it won't open. No matter how many times I click it, nothing. I've even tried reinstalling it. The other recommended program was Spyware Doctor, but that requires you pay for it and I can't, being a minor without any form of payment. So what should I do now? Thanks in advance.

BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:13 AM

Posted 23 August 2009 - 05:48 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.



let's try Fatdcuk's fix to get Malwarebytes to run.

Please navigate to the MBAM folder located in the Program Files directory.

Locate MBAM.exe and rename it to winlogon.exe

Once renamed double click on the file to open MBAM and select Quick Scan

At the end of the scan click Remove Selected and then reboot.


Post the scan log. The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
Computer Pro

#3 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 23 August 2009 - 08:27 PM

I tried, and it almost worked. Mbam loaded the first time after renaming, but closed after literally two seconds of scanning. After that, it wouldn't even open again.

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:13 AM

Posted 23 August 2009 - 08:41 PM

Ok, lets try Dr. Web:

Please download Dr. Web the free version & save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr. Web Cureit as follows:
Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
The Express scan will automatically begin.
(This is a short scan of files currently running in memory, boot sectors, and targeted folders).
If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
When complete, click Select All, then choose Cure > Move incurable.
(This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
Now put a check next to Complete scan to scan all local disks and removable media.
In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
In the top menu, click file and choose save report list.
Save the DrWeb.csv report to your desktop.
Exit Dr.Web Cureit when done.
Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
Computer Pro

#5 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 25 August 2009 - 06:48 PM

Well, something worked, sorta... I think. I ran the express scan on Dr.Web, this is what I got.

b.exe;c:\documents and settings\joshua\local settings\temp;Trojan.Packed.458;Deleted.;
braviax.exe;c:\windows\system32;Trojan.Fakealert.4876;Deleted.;
beep.sys;c:\windows\system32\drivers;Trojan.NtRootKit.3206;Deleted.;

I also ran Avira antivirus, this is what it found.



Avira AntiVir Personal
Report file date: Monday, August 24, 2009 19:26

Scanning for 1562564 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Save mode with network
Username : Joshua
Computer name : JOSH

Version information:
BUILD.DAT : 9.0.0.407 17961 Bytes 7/29/2009 10:34:00
AVSCAN.EXE : 9.0.3.7 466689 Bytes 7/21/2009 20:36:14
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 17:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 18:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 17:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 19:30:36
ANTIVIR1.VDF : 7.1.4.132 5707264 Bytes 6/24/2009 16:21:42
ANTIVIR2.VDF : 7.1.4.253 1779200 Bytes 7/19/2009 05:08:01
ANTIVIR3.VDF : 7.1.5.19 139776 Bytes 7/23/2009 14:36:13
Engineversion : 8.2.0.228
AEVDF.DLL : 8.1.1.1 106868 Bytes 7/28/2009 20:31:50
AESCRIPT.DLL : 8.1.2.18 442746 Bytes 7/23/2009 16:59:39
AESCN.DLL : 8.1.2.4 127348 Bytes 7/23/2009 16:59:39
AERDL.DLL : 8.1.2.4 430452 Bytes 7/23/2009 16:59:39
AEPACK.DLL : 8.1.3.18 401783 Bytes 7/28/2009 20:31:50
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 7/23/2009 16:59:39
AEHEUR.DLL : 8.1.0.143 1864055 Bytes 7/23/2009 16:59:39
AEHELP.DLL : 8.1.5.3 233846 Bytes 7/23/2009 16:59:39
AEGEN.DLL : 8.1.1.50 352629 Bytes 7/23/2009 16:59:39
AEEMU.DLL : 8.1.0.9 393588 Bytes 10/9/2008 21:32:40
AECORE.DLL : 8.1.7.6 184694 Bytes 7/23/2009 16:59:39
AEBB.DLL : 8.1.0.3 53618 Bytes 10/9/2008 21:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 15:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 12/5/2008 17:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 1/20/2009 21:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 17:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/24/2009 22:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 17:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 22:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 15:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 17:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/15/2009 22:39:58
RCTEXT.DLL : 9.0.37.0 86785 Bytes 4/17/2009 17:19:48

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Monday, August 24, 2009 19:26

Starting search for hidden objects.
The driver could not be initialized.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'pctsAuxs.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
16 processes with 16 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
C:\WINDOWS\system32\dumprep.EXE
[WARNING] The file could not be opened!
C:\WINDOWS\system32\dumprep.EXE
[WARNING] The file could not be opened!
The registry was scanned ( '74' files ).


Starting the file scan:

Begin scan in 'C:\' <HP_PAVILION>
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Joshua\Local Settings\Temp\RarSFX3\pdfka.exe
[WARNING] The file could not be opened!
C:\Program Files\BitDefender\BitDefender 2009\vsserv.exe
[WARNING] The file could not be opened!
C:\Program Files\Malwarebytes' Anti-Malware\winlogon.exe.exe
[WARNING] The file could not be opened!
C:\Program Files\Mozilla Firefox\chrome\amba.jar
[0] Archive type: ZIP
--> amba.js
[DETECTION] Is the TR/Hanambot Trojan
C:\Program Files\Spyware Doctor\pctsSvc.exe
[WARNING] The file could not be opened!
C:\WINDOWS\cru629.dat
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\WINDOWS\pchealth\helpctr\binaries\helpsvc.exe
[WARNING] The file could not be opened!
C:\WINDOWS\system32\cru629.dat
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\WINDOWS\system32\dumprep.exe
[WARNING] The file could not be opened!
C:\WINDOWS\system32\eventlog.dll
[WARNING] The file could not be opened!
C:\WINDOWS\system32\wisdstr.exe
[DETECTION] Is the TR/Dldr.FraudLo.sxm Trojan
C:\WINDOWS\system32\drivers\sptd.sys
[WARNING] The file could not be opened!
Begin scan in 'D:\'
Search path D:\ could not be opened!
System error [1005]: The volume does not contain a recognized file system.

Beginning disinfection:
C:\Program Files\Mozilla Firefox\chrome\amba.jar
[NOTE] The file was moved to '4af558e7.qua'!
C:\WINDOWS\cru629.dat
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '4b0858ed.qua'!
C:\WINDOWS\system32\cru629.dat
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[NOTE] The file was moved to '48d4d28e.qua'!
C:\WINDOWS\system32\wisdstr.exe
[DETECTION] Is the TR/Dldr.FraudLo.sxm Trojan
[NOTE] The file was moved to '4b0658e4.qua'!


End of the scan: Monday, August 24, 2009 21:20
Used time: 1:53:11 Hour(s)

The scan has been done completely.

19368 Scanned directories
584136 Files were scanned
4 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
4 Files were moved to quarantine
0 Files were renamed
11 Files cannot be scanned
584121 Files not concerned
9206 Archives were scanned
11 Warnings
5 Notes

I tried using Dr.Web, but for some reason, any time I tried to run a complete scan, it would die during the "Preparing to Scan" phase. Same goes for Malwarebytes. However, luckily, Avira worked, or so it seemed. Earlier today, in my WINDOWS folder in my C: drive, I saw a file called braviax.exe. It's identical to the one it said Dr.Web fixed. However, when I tried to delete it, it said:

"Cannot delete Braviax, access is denied. Make sure that the disk is not full or write-protected and that the file is not currently in use."

Also, after I tried running MBAM again, after renaming it, it immediately lost it's MBAM icon and instead got the generic, .exe icon. This also happened to programs like iTunes, Microsoft Word, and even the virus' program, "PC Antispyware 2010." I get the same messages when I try to delete them, about access being denied.

Lastly, I tried to run a program that's always worked fine when I got that message once again, and it stayed that way after reinstallation. All the virus programs that I've run that worked say my computer's now clean. Any other suggestions?

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:13 AM

Posted 25 August 2009 - 07:06 PM

Ok, lets try an Anti-Rootkit:

Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the FILES tab, then click the Scan button.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
Computer Pro

#7 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 25 August 2009 - 09:01 PM

Hm, not sure this is gonna work. I downloaded RootRepeal, and set disk access to high, however, after starting to scan files, it told me to try raising it again. Newest message is "Could not enumerate files in dir \"\\?\D:\*\' with the Windows API! Error code 0x000003ed." It does say MBR rootkits detected in both C:\ and D:\ drives, but all the sectors below them say sector mismatch. However, the scan seems to have been completed. What do I do now? Here's the report.

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 19:59
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP3
==================================================

Hidden/Locked Files
-------------------
Path: Volume C:\
Status: MBR Rootkit Detected!

Path: Volume C:\, Sector 1
Status: Sector mismatch

Path: Volume C:\, Sector 8
Status: Sector mismatch

Path: Volume C:\, Sector 53
Status: Sector mismatch

Path: Volume C:\, Sector 61
Status: Sector mismatch

Path: Volume C:\, Sector 62
Status: Sector mismatch

Path: Volume D:\
Status: MBR Rootkit Detected!

Path: Volume D:\, Sector 1
Status: Sector mismatch

Path: Volume D:\, Sector 8
Status: Sector mismatch

Path: Volume D:\, Sector 53
Status: Sector mismatch

Path: Volume D:\, Sector 61
Status: Sector mismatch

Path: Volume D:\, Sector 62
Status: Sector mismatch

When I right-click on either C: or D: drives, it gives me the options of restore, restore and reboot, or dump. Which should I choose?

#8 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 25 August 2009 - 09:16 PM

When I try to scan, it also says it "Can't read the boot sector," which is when it suggests changing disk access settings

#9 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 26 August 2009 - 08:08 AM

I tried scanning in Safe Mode, and got the same error messages. However, on a whim, I tried scanning everything else. Only thing that returned anything was Stealth objects. Here's the log.

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/26 07:03
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP3
==================================================

Stealth Objects
-------------------
Object: Hidden Module [Name: UAConwlmbjauc.dll]
Process: svchost.exe (PID: 456) Address: 0x00720000 Size: 77824

Object: Hidden Module [Name: UACelsixxcibt.dll]
Process: svchost.exe (PID: 456) Address: 0x00ad0000 Size: 73728

Object: Hidden Module [Name: UACelbksoaold.dll]
Process: svchost.exe (PID: 456) Address: 0x10000000 Size: 217088

Object: Hidden Module [Name: UAConwlmbjauc.dll]
Process: Explorer.exe (PID: 1232) Address: 0x10000000 Size: 77824

Object: Hidden Module [Name: UACelbksoaold.dll]
Process: Iexplore.exe (PID: 1260) Address: 0x10000000 Size: 217088

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x8636b1f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x85fd41f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x8636d1f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_CREATE]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_CLOSE]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_POWER]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: usbohci, IRP_MJ_PNP]
Process: System Address: 0x85ff91f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x863d81f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x85ff71f8 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_CREATE]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_CLOSE]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_READ]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_SHUTDOWN]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_CLEANUP]
Process: System Address: 0x85f31500 Size: 121

Object: Hidden Code [Driver: CdfsЅఐ瑎獆, IRP_MJ_PNP]
Process: System Address: 0x85f31500 Size: 121

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:13 AM

Posted 26 August 2009 - 04:35 PM

Hello, I am going to go ahead and send you to the HijackThis forum because you have a rootkit and there are some ones on the loose right now that require special tools which are allowed to be used in the HJT forum, but not here. Please follow these instructions:

It looks like we are going to have to use more powerful tools than what we are allowed to use in the Am I Infected forum. I am going to need for you to post a DDS/HijackThis Log in the HijackThis Log section of the forum.

Please refer to this for your preparation reasons before posting:
http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/

You can find the forum here:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/

Once you have created a new topic in the HijackThis section, please post a link to it in this topic.
Please allow time for your topic to be replied to in the HijackThis section as the HJT Team is EXTREMELY busy posting logs before yours.
Computer Pro

#11 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 26 August 2009 - 06:14 PM

hmm.... I dowloaded dds, and ran it. However, it doesn't do anything besides giving me the black box informing of it's function. This includes in safe mode

#12 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:01:13 AM

Posted 26 August 2009 - 06:16 PM

What about a HijackThis scan?
Computer Pro

#13 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 26 August 2009 - 08:19 PM

My bad, I thought the dds was HijackThis; it came from that page. But now I realize it only posts a pseudo HJT log and have the actual program now, thanks.

#14 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 26 August 2009 - 08:21 PM

Ugh, this is getting really irritating. I downloaded HijackThis, ran it, and it died mid-scan. To complicate things, I now get the error message saying Windows can't access the specified file, and that I may not have permission.

#15 JoshMac

JoshMac
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:11:13 PM

Posted 26 August 2009 - 08:24 PM

Oh, one other note. After getting the error message, it then asks what application I want to use to open HJT. I can reinstall HJT each time and get it to work again, but it always dies and then refuses to open.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users