Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

possible rootkit in vista\system32 folder


  • This topic is locked This topic is locked
2 replies to this topic

#1 Wzwodór

Wzwodór

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:10:36 PM

Posted 16 September 2009 - 03:12 AM

Hello.

Avira detect suspicious program in windows\system32 folder, program named TR/Alureon/19456U.3. First, the Avira's information windows was showing up, when I was clicking the sound volume icon in system tray. Now, the infection has spread like wildfire, I think, the notifications are constant in their annoyance.

Here is DDS log:
=============================================================
DDS (Ver_09-07-30.01) - NTFSx86
Run by Magda at 9:57:30,89 on 2009-09-16
Internet Explorer: 8.0.6001.18813 BrowserJavaVersion: 1.6.0_13
Microsoft� Windows Vista� Home Premium 6.0.6002.2.1250.48.1045.18.1013.393 [GMT 2:00]

SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\Explorer.EXE
C:\Program Files\Avira\AntiVir Desktop\sched.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
C:\Program Files\TOSHIBA\Utilities\KeNotify.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
C:\Program Files\Avira\AntiVir Desktop\avguard.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\uTorrent\uTorrent.exe
C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
c:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
C:\Program Files\Skype\Phone\Skype.exe
C:\Program Files\FindAndRunRobot\FindAndRunRobot.exe
C:\Program Files\INNE\procexp.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Users\Magda\Downloads\FirefoxPortable\FirefoxPortable.exe
C:\Windows\system32\taskeng.exe
C:\Users\Magda\Downloads\FirefoxPortable\App\firefox\firefox.exe
C:\downloads\dds.scr
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uStart Page = about:blank
uDefault_Search_URL = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [uTorrent] "c:\program files\utorrent\uTorrent.exe"
uRun: [Skype] "c:\program files\skype\phone\Skype.exe" /nosplash /minimized
mRun: [TPwrMain] %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE
mRun: [KeNotify] c:\program files\toshiba\utilities\KeNotify.exe
mRun: [HWSetup] c:\program files\toshiba\utilities\HWSetup.exe hwSetUP
mRun: [SVPWUTIL] c:\program files\toshiba\utilities\SVPWUTIL.exe SVPwUTIL
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [avgnt] "c:\program files\avira\antivir desktop\avgnt.exe" /min
StartupFolder: c:\users\magda\appdata\roaming\micros~1\windows\startm~1\programs\startup\findan~1.lnk - c:\program files\findandrunrobot\FindAndRunRobot.exe
StartupFolder: c:\users\magda\appdata\roaming\micros~1\windows\startm~1\programs\startup\procex~1.lnk - c:\program files\inne\procexp.exe
uPolicies-explorer: NoStartMenuMyMusic = 0 (0x0)
uPolicies-explorer: TaskbarNoThumbnail = 0 (0x0)
uPolicies-explorer: HideSCABattery = 0 (0x0)
uPolicies-explorer: HideSCANetwork = 0 (0x0)
uPolicies-explorer: HideSCAVolume = 0 (0x0)
uPolicies-explorer: NoRecentDocsNetHood = 0 (0x0)
mPolicies-explorer: NoRecentDocsNetHood = 0 (0x0)
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&ksport do programu Microsoft Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office11\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Notify: igfxcui - igfxdev.dll

================= FIREFOX ===================

FF - ProfilePath - c:\users\magda\appdata\roaming\mozilla\firefox\profiles\njcx3kxo.default\
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\dotnetassistantextension\
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0010-ABCDEFFEDCBA}
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\all.js - pref("media.enforce_same_site_origin", false);
c:\program files\mozilla firefox\greprefs\all.js - pref("media.cache_size", 51200);
c:\program files\mozilla firefox\greprefs\all.js - pref("media.ogg.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("media.wave.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("media.autoplay.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("browser.urlbar.autocomplete.enabled", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("capability.policy.mailnews.*.wholeText", "noAccess");
c:\program files\mozilla firefox\greprefs\all.js - pref("dom.storage.default_quota", 5120);
c:\program files\mozilla firefox\greprefs\all.js - pref("content.sink.event_probe_rate", 3);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.http.prompt-temp-redirect", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("layout.css.dpi", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("layout.css.devPixelsPerPx", -1);
c:\program files\mozilla firefox\greprefs\all.js - pref("gestures.enable_single_finger_input", true);
c:\program files\mozilla firefox\greprefs\all.js - pref("dom.max_chrome_script_run_time", 0);
c:\program files\mozilla firefox\greprefs\all.js - pref("network.tcp.sendbuffer", 131072);
c:\program files\mozilla firefox\greprefs\all.js - pref("geo.enabled", true);
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.remember_cert_checkbox_default_setting", true);
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr", "moz35");
c:\program files\mozilla firefox\defaults\pref\firefox-branding.js - pref("browser.search.param.yahoo-fr-cjkt", "moz35");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("extensions.blocklist.level", 2);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.restrict.typed", "~");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.urlbar.default.behavior", 0);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.history", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.formdata", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.passwords", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.downloads", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cookies", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.cache", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.sessions", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.offlineApps", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.clearOnShutdown.siteSettings", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.history", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.formdata", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.passwords", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.downloads", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.cookies", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.cache", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.sessions", true);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.offlineApps", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.cpd.siteSettings", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("privacy.sanitize.migrateFx3Prefs", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.ssl_override_behavior", 2);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("security.alternate_certificate_error_page", "certerror");
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.autostart", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("browser.privatebrowsing.dont_prompt_on_enter", false);
c:\program files\mozilla firefox\defaults\pref\firefox.js - pref("geo.wifi.uri", "https://www.google.com/loc/json");

============= SERVICES / DRIVERS ===============

R2 AntiVirSchedulerService;Avira AntiVir Scheduler;c:\program files\avira\antivir desktop\sched.exe [2009-5-2 108289]
S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [2008-12-10 7808]
S4 Harmonogram automatycznej us�ugi LiveUpdate;Harmonogram automatycznej us�ugi LiveUpdate;"c:\program files\symantec\liveupdate\aluschedulersvc.exe" --> c:\program files\symantec\liveupdate\ALUSchedulerSvc.exe [?]

=============== Created Last 30 ================

2009-09-16 08:25 <DIR> --dsh--- C:\$RECYCLE.BIN
2009-09-16 07:56 161,792 a------- c:\windows\SWREG.exe
2009-09-16 07:56 98,816 a------- c:\windows\sed.exe
2009-09-14 10:04 <DIR> --d----- c:\program files\IrfanView
2009-09-14 09:59 125 a------- C:\ioSpecial.ini
2009-09-14 09:49 <DIR> --d----- c:\programdata\MiK
2009-09-14 09:49 <DIR> --d----- c:\progra~2\MiK
2009-09-14 07:59 <DIR> --d----- c:\program files\Microsoft CAPICOM 2.1.0.2
2009-09-13 12:53 <DIR> --d----- c:\program files\HD Tune Pro
2009-09-11 20:54 <DIR> --d----- c:\program files\Raxco
2009-09-11 19:54 <DIR> --d----- c:\program files\Panda USB Vaccine
2009-09-10 19:20 <DIR> --d----- c:\program files\Total Commander 7.50 PowerPack -direct launch-
2009-09-10 18:26 229,888 a------- c:\windows\PEV.exe
2009-09-10 14:34 <DIR> --d----- c:\program files\Windows Installer Clean Up
2009-09-10 14:34 <DIR> --d----- c:\program files\MSECACHE
2009-09-10 11:31 48 a------- c:\windows\wininit.ini
2009-09-10 08:41 <DIR> --d----- c:\program files\PDFV_Portable
2009-09-06 12:25 <DIR> --d----- c:\program files\BleScreenViewer
2009-09-04 09:57 <DIR> --d----- c:\windows\system32\eu-ES
2009-09-04 09:57 <DIR> --d----- c:\windows\system32\ca-ES
2009-09-04 09:57 <DIR> --d----- c:\windows\system32\vi-VN
2009-09-04 08:25 <DIR> --d----- c:\windows\system32\EventProviders
2009-09-04 08:20 1,589,248 a------- c:\windows\system32\msjet40.dll
2009-09-04 08:19 310,272 a------- c:\windows\system32\mtxclu.dll
2009-09-04 08:18 53,760 a------- c:\windows\system32\fdeploy.dll
2009-09-04 08:17 744,448 a------- c:\windows\system32\wbem\wbemcore.dll
2009-09-04 08:17 265,728 a------- c:\windows\system32\wbem\repdrvfs.dll
2009-09-04 08:17 265,728 a------- c:\windows\system32\wbem\esscli.dll
2009-09-04 08:17 189,440 a------- c:\windows\system32\wbem\mofd.dll
2009-09-04 08:17 83,968 a------- c:\windows\system32\wbem\wmiutils.dll
2009-09-04 08:17 30,208 a------- c:\windows\system32\wbem\wbemprox.dll
2009-09-04 08:17 614,912 a------- c:\windows\system32\wbem\fastprox.dll
2009-09-04 08:17 705,536 a------- c:\windows\system32\SmiEngine.dll
2009-09-04 08:17 218,624 a------- c:\windows\system32\wdscore.dll
2009-09-04 08:17 130,560 a------- c:\windows\system32\PkgMgr.exe
2009-09-04 08:16 247,808 a------- c:\windows\system32\drvstore.dll
2009-09-03 13:40 <DIR> --d----- c:\users\magda\appdata\roaming\Jpeg Resampler
2009-09-03 06:56 28,672 a------- c:\windows\system32\Apphlpdm.dll
2009-09-03 06:56 4,240,384 a------- c:\windows\system32\GameUXLegacyGDFs.dll
2009-09-01 13:17 86,016 a------- c:\windows\unvise32.exe
2009-08-31 16:38 7,552 a------- c:\windows\system32\drivers\enodpl.sys
2009-08-31 16:38 6,659 a------- c:\windows\system32\TANDPL.VXD
2009-08-31 16:38 6,532 a------- c:\windows\system32\ENODPL.VXD
2009-08-31 16:38 4,736 a------- c:\windows\system32\drivers\tandpl.sys
2009-08-26 22:33 2,048 a------- c:\windows\system32\tzres.dll
2009-08-26 07:45 1,696,768 a------- c:\windows\system32\gameux.dll
2009-08-23 14:07 <DIR> --d----- c:\windows\CheckSur
2009-08-21 11:24 <DIR> --d----- c:\users\magda\appdata\roaming\Malwarebytes
2009-08-21 11:24 1,259,008 a------- c:\windows\system32\lsasrv.dll
2009-08-21 11:24 499,712 a------- c:\windows\system32\kerberos.dll
2009-08-21 11:24 218,624 a------- c:\windows\system32\msv1_0.dll
2009-08-21 11:24 175,104 a------- c:\windows\system32\wdigest.dll
2009-08-21 11:24 270,848 a------- c:\windows\system32\schannel.dll
2009-08-21 11:24 439,864 a------- c:\windows\system32\drivers\ksecdd.sys
2009-08-21 11:24 72,704 a------- c:\windows\system32\secur32.dll
2009-08-21 11:24 9,728 a------- c:\windows\system32\lsass.exe
2009-08-21 11:24 <DIR> --d----- c:\programdata\Malwarebytes
2009-08-21 11:24 <DIR> --d----- c:\progra~2\Malwarebytes

==================== Find3M ====================

2009-09-14 14:28 143,360 a------- c:\windows\inf\infstrng.dat
2009-09-14 14:28 51,200 a------- c:\windows\inf\infpub.dat
2009-09-14 09:37 35,100 a---h--- c:\windows\system32\mlfcache.dat
2009-09-14 09:33 662,056 a------- c:\windows\system32\perfh015.dat
2009-09-14 09:33 126,908 a------- c:\windows\system32\perfc015.dat
2009-09-14 07:28 86,016 a------- c:\windows\inf\infstor.dat
2009-09-11 13:56 2,835 a------- c:\windows\system32\SpoonUninstall-dBpoweramp [ID Tag Update] Codec.dat
2009-09-11 13:54 486,576 a------- c:\windows\system32\SpoonUninstall.exe
2009-09-04 09:57 665,600 a------- c:\windows\inf\drvindex.dat
2009-08-29 04:30 173,056 a------- c:\windows\apppatch\AcXtrnal.dll
2009-08-29 04:30 458,752 a------- c:\windows\apppatch\AcSpecfc.dll
2009-08-29 04:30 2,159,616 a------- c:\windows\apppatch\AcGenral.dll
2009-08-29 04:30 542,720 a------- c:\windows\apppatch\AcLayers.dll
2009-08-14 18:27 904,776 a------- c:\windows\system32\drivers\tcpip.sys
2009-08-14 17:53 17,920 a------- c:\windows\system32\netevent.dll
2009-08-14 15:49 9,728 a------- c:\windows\system32\TCPSVCS.EXE
2009-08-14 15:49 17,920 a------- c:\windows\system32\ROUTE.EXE
2009-08-14 15:49 11,264 a------- c:\windows\system32\MRINFO.EXE
2009-08-14 15:49 27,136 a------- c:\windows\system32\NETSTAT.EXE
2009-08-14 15:49 19,968 a------- c:\windows\system32\ARP.EXE
2009-08-14 15:49 8,704 a------- c:\windows\system32\HOSTNAME.EXE
2009-08-14 15:49 10,240 a------- c:\windows\system32\finger.exe
2009-08-14 15:48 30,720 a------- c:\windows\system32\drivers\tcpipreg.sys
2009-08-14 15:48 105,984 a------- c:\windows\system32\netiohlp.dll
2009-08-05 12:17 55,656 a------- c:\windows\system32\drivers\avgntflt.sys
2009-07-21 23:52 915,456 a------- c:\windows\system32\wininet.dll
2009-07-21 23:47 109,056 a------- c:\windows\system32\iesysprep.dll
2009-07-21 23:47 71,680 a------- c:\windows\system32\iesetup.dll
2009-07-21 22:13 133,632 a------- c:\windows\system32\ieUnatt.exe
2009-07-17 15:54 71,680 a------- c:\windows\system32\atl.dll
2009-07-15 14:40 8,147,456 a------- c:\windows\system32\wmploc.DLL
2009-07-15 14:39 313,344 a------- c:\windows\system32\wmpdxm.dll
2009-07-15 14:39 4,096 a------- c:\windows\system32\dxmasf.dll
2009-07-15 14:39 7,680 a------- c:\windows\system32\spwmp.dll
2009-07-11 21:01 513,536 a------- c:\windows\system32\wlansvc.dll
2009-07-11 21:01 302,592 a------- c:\windows\system32\wlansec.dll
2009-07-11 21:01 293,376 a------- c:\windows\system32\wlanmsm.dll
2009-07-11 21:01 65,024 a------- c:\windows\system32\wlanapi.dll
2009-07-11 19:03 127,488 a------- c:\windows\system32\L2SecHC.dll
2009-01-14 08:31 47,360 a------- c:\users\magda\appdata\roaming\pcouffin.sys
2008-10-18 13:13 174 a--sh--- c:\program files\desktop.ini
2006-12-05 07:18 332,832 a------- c:\windows\inf\perflib\0415\perfi.dat
2006-12-05 07:18 332,832 a------- c:\windows\inf\perflib\0415\perfh.dat
2006-12-05 07:18 37,468 a------- c:\windows\inf\perflib\0415\perfd.dat
2006-12-05 07:18 37,468 a------- c:\windows\inf\perflib\0415\perfc.dat
2006-11-02 11:20 287,440 a------- c:\windows\inf\perflib\0000\perfi.dat
2006-11-02 11:20 287,440 a------- c:\windows\inf\perflib\0000\perfh.dat
2006-11-02 11:20 30,674 a------- c:\windows\inf\perflib\0000\perfd.dat
2006-11-02 11:20 30,674 a------- c:\windows\inf\perflib\0000\perfc.dat

============= FINISH: 10:00:50,93 ===============


Attached File  Attach.txt   4.17KB   10 downloads


I wasn't able to perform full Root Reveal scan, because system went BSOD:

The problem seems to be caused by the following file: ntoskrnl.exe

UNEXPECTED_KERNEL_MODE_TRAP

(...)

Technical Information:

*** STOP: 0x1000007f (0x00000008, 0x806cf130, 0x00000000, 0x00000000)

*** ntoskrnl.exe - Address 0x820d3279 base at 0x82036000 DateStamp 0x49e01996


but I have written down files, that Root Reveal marked as "invisible to system", I know that is not enough, but maybe it will be helpful. The files are as follows:

c:\windows\system32\kbiwkmbbxnclmc.dll
c:\windows\system32\kbiwkmbecaersi.dat
c:\windows\system32\kbiwkmjttxiccu.dat
c:\windows\system32\kbiwkmuresfdqp.dll
c:\windows\system32\kbiwkmyucipncx.dll
c:\windows\system32\drivers\kbiwkmioxevrpi.sys
c:\windows\temp\kbiwkmvrxqismiem.tmp
c:\windows\temp\kbiwkm000
c:\windows\temp\nsl79c3.tmp
c:\windows\temp\nsq7993.tmp
c:\windows\temp\npfc338.tmp.

Hope to hear from you soon

[edit]

I scanned system with Malwarebytes Anti-Malware and it was able to remove almost all suspicious files except this ones:

c:\windows\system32\drivers\kbiwkmioxevrpi.sys

here is the log: Attached File  mbam_log_2009_09_16__13_34_12_.txt   1.3KB   3 downloads

But the most important thing is I could have run GMER, which earlier, same as root reveal, was crashing. He identified above mentioned file as rooktit. Here is scan: Attached File  16.09.09.txt   6.72KB   14 downloads

Edited by Wzwodór, 16 September 2009 - 07:48 AM.


BC AdBot (Login to Remove)

 


#2 fireman4it

fireman4it

    Bleepin' Fireman


  • Malware Response Team
  • 13,505 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Greenup, Ill USA
  • Local time:03:36 PM

Posted 30 September 2009 - 06:26 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

" Extinguishing Malware from the world"

The Virus, Trojan, Spyware, and Malware Removal forum is very busy. If I'm helping you and I've not posted back within 24 hrs., send a PM with your topic link. Thank you.

ALL OTHER HELP REQUESTS VIA THE PM SYSTEM WILL BE IGNORED. The Forums are there for a reason!
Thanks-


  userbar_eis_500.gif

If I have helped you, consider making a donation to help me continue the fight against Malware! Just click btn_donate_LG.gif


#3 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:03:36 PM

Posted 07 October 2009 - 11:00 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users