Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unable to Run Security Software


  • This topic is locked This topic is locked
2 replies to this topic

#1 theel13

theel13

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 18 September 2009 - 07:18 AM

I attempted to run the Prep Guide, but was unable to complete. The infected computer will not run any security software - Malwarebytes, SpyBot, SAS, SRE, etc. I was able to run custom scans with SAS on the startup, memory and a few folders and will post these logs in subsequent posts. However, I was able to run WIN32KDiag.exe and am posting this log below:

Running from: C:\Documents and Settings\marktm6\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\marktm6\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point : C:\WINDOWS\A6W_DATA\A6W_DATA

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP1B7.tmp\ZAP1B7.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP2DA.tmp\ZAP2DA.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP3C1.tmp\ZAP3C1.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\ZAP589.tmp\ZAP589.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\temp\temp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\assembly\tmp\tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Cache\Cache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d1\d1

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d2\d2

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d3\d3

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d4\d4

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d5\d5

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d6\d6

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d7\d7

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\CSC\d8\d8

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\DLL\DLL

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ftpcache\ftpcache

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPRO\Cbz\Cbz

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPRO\Lib\Lib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Help\SBSI\Training\WXPPRO\Wave\Wave

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\chsime\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\CHTIME\Applets\Applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imjp8_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\ime\shared\res\res

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\0DC1503A46F231838AD88BCDDC8E8F7C\3.2.30729\3.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\D7314F9862C648A4DB8BE2A5B47BE100\1.0.0\1.0.0

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Installer\$PatchCache$\Managed\DC3BF90CC0D3D2F398A9A6D1762F70F3\2.2.30729\2.2.30729

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET Files\Bind Logs\Bind Logs

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\msdownld.tmp\msdownld.tmp

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\My Documents\My Documents

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Found mount point : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\pchealth\helpctr\binaries\helpsvc.exe

[1] 2004-08-04 05:00:00 764416 C:\WINDOWS\$NtServicePackUninstall$\helpsvc.exe (Microsoft Corporation)

[1] 2008-04-13 19:12:21 764928 C:\WINDOWS\pchealth\helpctr\binaries\helpsvc.exe ()

[1] 2008-04-13 19:12:21 744448 C:\WINDOWS\ServicePackFiles\i386\helpsvc.exe (Microsoft Corporation)



Below is the partial cookies only SAS scan log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/16/2009 at 02:50 PM

Application Version : 4.28.1010

Core Rules Database Version : 4085
Trace Rules Database Version: 1978

Scan type : Custom Scan
Total Scan Time : 00:00:00

Memory items scanned : 0
Memory threats detected : 0
Registry items scanned : 0
Registry threats detected : 0
File items scanned : 0
File threats detected : 18

Adware.Tracking Cookie
C:\Documents and Settings\marktm6\Cookies\marktm6@at.atwola[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@cp.findsumpin[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@specificclick[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@serving-sys[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@ads.addynamix[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@bs.serving-sys[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@content.yieldmanager[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@tacoda[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@2o7[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@www.icityfind[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@dc.tremormedia[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@content.yieldmanager[3].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@pro-market[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@icityfind[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@overture[2].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@revsci[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@adserver.adtechus[1].txt
C:\Documents and Settings\marktm6\Cookies\marktm6@tribalfusion[2].txt


Below is the partial Memory SAS scan log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/16/2009 at 02:34 PM

Application Version : 4.28.1010

Core Rules Database Version : 4085
Trace Rules Database Version: 1978

Scan type : Custom Scan
Total Scan Time : 00:00:47

Memory items scanned : 550
Memory threats detected : 6
Registry items scanned : 0
Registry threats detected : 0
File items scanned : 0
File threats detected : 6

Trojan.Downloader-Gen
C:\WINDOWS\SYSTEM32\IASEX.DLL
C:\WINDOWS\SYSTEM32\IASEX.DLL

Trojan.Dropper/Sys-NV
C:\WINDOWS\SYSTEM32\MSNCAV32.DLL
C:\WINDOWS\SYSTEM32\MSNCAV32.DLL
C:\WINDOWS\SYSTEM32\IPRIPV32.DLL
C:\WINDOWS\SYSTEM32\IPRIPV32.DLL

Trojan.Agent/Gen-Refpro[New]
C:\WINDOWS\SYSTEM32\EVDOSERVER.DLL
C:\WINDOWS\SYSTEM32\EVDOSERVER.DLL

Trojan.SVCHost/Fake
C:\WINDOWS\SVCHOST.EXE
C:\WINDOWS\SVCHOST.EXE

Trojan.Agent/Gen-SigmaF[SO]
C:\WINDOWS\SYSTEM32\SOFATNET.EXE
C:\WINDOWS\SYSTEM32\SOFATNET.EXE

Below is the My Documents SAS scan log:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 09/16/2009 at 03:07 PM

Application Version : 4.28.1010

Core Rules Database Version : 4085
Trace Rules Database Version: 1978

Scan type : Custom Scan
Total Scan Time : 00:13:39

Memory items scanned : 0
Memory threats detected : 0
Registry items scanned : 0
Registry threats detected : 0
File items scanned : 9022
File threats detected : 1

Adware.Vundo Variant
C:\DOCUMENTS AND SETTINGS\MARKTM6\MY DOCUMENTS\BUSINESS\00 MBA\OTHER CLASSES\FORECASTING 2007\LN TO 101.XLS

Edited by boopme, 18 September 2009 - 10:50 AM.


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:06:00 AM

Posted 05 October 2009 - 11:03 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 teacup61

teacup61

    Bleepin' Texan!


  • Malware Response Team
  • 17,075 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Wills Point, Texas
  • Local time:12:00 AM

Posted 13 October 2009 - 07:57 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic
Please make a donation so I can keep helping people just like you.
Every little bit helps! :)
You can even use your credit card! Thank you!

Posted Image


Error reading poptart in Drive A: Delete kids y/n?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users