Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Police Pro and desote.exe


  • This topic is locked This topic is locked
6 replies to this topic

#1 smithbro

smithbro

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:14 AM

Posted 07 September 2009 - 07:58 PM

Been perusing the forums and it looks like the best info out there. I have Police pro and desote.exe in my laptop. I notice most of the repairs start with a download..... what if I can't even get online? I can start up in safe mode, but no programs will run. Have AVG, Spybot SD, Malwarebytes and naturally nothin runs. Where do I start??

BC AdBot (Login to Remove)

 


#2 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:02:14 AM

Posted 08 September 2009 - 09:33 PM

How about safe mode w/networking?

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#3 smithbro

smithbro
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:14 AM

Posted 09 September 2009 - 01:17 PM

My laptop is the computer that is infected (sorry for the lack of info!). I am contacting you through my desktop. Tried safe mode w/networking and no go with online. Can do pretty much anything you like on my dtop, have a flashdrive and can burn whatever too......
Thanks for getting back to me!

#4 smithbro

smithbro
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:14 AM

Posted 09 September 2009 - 02:17 PM

Followup! Got Spybot SD running in safe mode. Seems to be vaulting all infected files. However most files it's scanning are "locked" and "untested". Thanks

#5 smithbro

smithbro
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:14 AM

Posted 09 September 2009 - 06:11 PM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/09/09 18:46
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: aujasnkj.sys
Image Path: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aujasnkj.sys
Address: 0xF625B000 Size: 84352 File Visible: No Signed: -
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF6E42000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7AE4000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF67C2000 Size: 49152 File Visible: No Signed: -
Status: -

Name: SKYNETqaqgkvrn.sys
Image Path: C:\WINDOWS\system32\drivers\SKYNETqaqgkvrn.sys
Address: 0xF705E000 Size: 163840 File Visible: - Signed: -
Status: Hidden from the Windows API!

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\SYSTEM32\SKYNETbwnlghon.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\SKYNETfpfvkloo.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\SKYNETipgvitud.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\SKYNETirrfuirw.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\SKYNETlog.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\SKYNETpetymoto.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\UACavkhfiurrl.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\UACcmhqkmiteo.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\UAClidqiqmkto.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\UACossfodjeuo.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\UACwqvpoamkwb.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UAC57e7.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UAC57f1.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UACc3ff.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\DRIVERS\UACbqwbrnkvdu.sys
Status: Invisible to the Windows API!

Path: C:\WINDOWS\SYSTEM32\DRIVERS\SKYNETqaqgkvrn.sys
Status: Invisible to the Windows API!

Path: c:\documents and settings\administrator\local settings\temp\etilqs_4r2jro6cqy8fxiipdbfp
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\administrator\local settings\temp\etilqs_uewpagsidwa6exwplwh0
Status: Allocation size mismatch (API: 4096, Raw: 0)

Path: c:\documents and settings\administrator\local settings\temp\~df6c77.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\administrator\local settings\temp\~df6c81.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Stealth Objects
-------------------
Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: winlogon.exe (PID: 604) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: services.exe (PID: 660) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: lsass.exe (PID: 672) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETpetymoto.dll]
Process: svchost.exe (PID: 828) Address: 0x00920000 Size: 57344

Object: Hidden Module [Name: UACc3ff.tmpiqmkto.dll]
Process: svchost.exe (PID: 828) Address: 0x009b0000 Size: 217088

Object: Hidden Module [Name: UACossfodjeuo.dll]
Process: svchost.exe (PID: 828) Address: 0x00c10000 Size: 65536

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: svchost.exe (PID: 828) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: svchost.exe (PID: 940) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: svchost.exe (PID: 1128) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: svchost.exe (PID: 1228) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: svchost.exe (PID: 1324) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: UACcmhqkmiteo.dll]
Process: Explorer.EXE (PID: 1472) Address: 0x00ba0000 Size: 49152

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: Explorer.EXE (PID: 1472) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: ctfmon.exe (PID: 1412) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: avgui.exe (PID: 1852) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: SKYNETbwnlghon.dll]
Process: firefox.exe (PID: 1332) Address: 0x10000000 Size: 32768

Object: Hidden Module [Name: UAClidqiqmkto.dll]
Process: Iexplore.exe (PID: 2132) Address: 0x00d40000 Size: 217088

Object: Hidden Module [Name: UAClidqiqmkto.dll]
Process: Iexplore.exe (PID: 2208) Address: 0x00d40000 Size: 217088

Hidden Services
-------------------
Service Name: SKYNETwruwpuhr
Image Path: C:\WINDOWS\system32\drivers\SKYNETqaqgkvrn.sys

Service Name: UACd.sys
Image Path: C:\WINDOWS\system32\drivers\UACbqwbrnkvdu.sys

==EOF==

ALSO, I GOT AVG TO RUN IN C: WITH THIS RESULT,



AVG 8.5 Anti-Virus command line scanner
Copyright © 1992 - 2009 AVG Technologies
Program version 8.0.401, engine 8.0.408
Virus Database: Version 270.13.82/2351 2009-09-07

\\?\globalroot\systemroot\system32\UAClidqiqmkto.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\WINDOWS\SYSTEM32\svchost.exe (1128) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACcmhqkmiteo.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1372) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UACcmhqkmiteo.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Internet Explorer\iexplore.exe (1332) Virus found Win32/Cryptor Object was moved to Virus Vault.
\\?\globalroot\systemroot\system32\UAClidqiqmkto.dll Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\Program Files\Mozilla Firefox\firefox.exe (564) Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\WINDOWS\system32\desote.exe Adware Generic4.LPF Object was moved to Virus Vault.
HKCR\exefile\shell\open\command\\ Found registry key with reference to file C:\WINDOWS\system32\desote.exe Object was healed.
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\ei2u9tij.default\parent.lock Locked file. Not tested.
C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\ei2u9tij.default\places.sqlite-journal Locked file. Not tested.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{37C083A2-9D6D-11DE-92EC-001CDFA04829}.dat Locked file. Not tested.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{37C083A3-9D6D-11DE-92EC-001CDFA04829}.dat Locked file. Not tested.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\Administrator\Local Settings\Temp\etilqs_bITnZHdJcn5blfFU2dcV Locked file. Not tested.
C:\Documents and Settings\Administrator\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\Administrator\ntuser.dat.LOG Locked file. Not tested.
C:\Documents and Settings\All Users\Application Data\AVG Security Toolbar\IEToolbar.dll Locked file. Not tested.
C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\user.dmp Locked file. Not tested.
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\LocalService\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\LocalService\ntuser.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat Locked file. Not tested.
C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat.LOG Locked file. Not tested.
C:\Documents and Settings\NetworkService\NTUSER.DAT Locked file. Not tested.
C:\Documents and Settings\NetworkService\ntuser.dat.LOG Locked file. Not tested.
C:\pagefile.sys Locked file. Not tested.
C:\Program Files\AVG\AVG8\Toolbar\IEToolbar.dll.dmp Locked file. Not tested.
C:\System Volume Information\ Locked file. Not tested.
C:\WINDOWS\Prefetch\layout.ini Locked file. Not tested.
C:\WINDOWS\svchasts.exe Potentially harmful program Fake_AntiSpyware.DFZ Object was moved to Virus Vault.
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\DEFAULT.LOG Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SAM Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SAM.LOG Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SECURITY.LOG Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SOFTWARE.LOG Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM Locked file. Not tested.
C:\WINDOWS\SYSTEM32\CONFIG\SYSTEM.LOG Locked file. Not tested.
C:\WINDOWS\SYSTEM32\dddesot.dll Trojan horse BHO.JOM Object was moved to Virus Vault.
C:\WINDOWS\SYSTEM32\wscsvc32.exe Virus found Win32/Cryptor Object was moved to Virus Vault.
C:\WINDOWS\Temp\Installer.exe Virus found Win32/Cryptor Object was moved to Virus Vault.

------------------------------------------------------------
Objects scanned : 186349
Found infections : 11
Found PUPs : 2
Healed infections : 11
Healed PUPs : 2
Warnings : 0
------------------------------------------------------------

#6 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:02:14 AM

Posted 09 September 2009 - 06:47 PM

Now that you were able to produce a log you need to post it in our HJT forum:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/
Give a brief description and tell them that this log was all you could get
The HJT team is extremely busy, so be patient and good luck
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,111 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:14 AM

Posted 09 September 2009 - 07:29 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/256520/police-pro-virus-but-i-got-a-log-to-post/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, up to two weeks perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Internet Security, NoScript Firefox ext.


animinionsmalltext.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users