Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected laptop


  • Please log in to reply
4 replies to this topic

#1 hitpro

hitpro

  • Members
  • 119 posts
  • OFFLINE
  •  
  • Local time:05:03 AM

Posted 24 September 2009 - 03:58 AM

After I told a friend of mine that i get help fixing my computers online, she gave me her laptop to try to get it fixed.

She didn't have any antivirus programs on it so i installed avira, super antispyware, and malwarebytes. EACH program detected viruses. she is very infected.

before i made any corrections i decided to ask you guys' opinions.

she has an HP, running windows XP home.

BC AdBot (Login to Remove)

 


#2 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,316 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:03 PM

Posted 24 September 2009 - 05:12 AM

Hi hitpro, you started out fine there with installing those programs. Some things to keep in mind, after cleaning things up there, you should install also a firewall and make sure windows is up to date. However, before succesfully doing so, you will have to make sure the infections are gone.

I would recommend first and for all a rootkit scan. They are very common today.

If you like you can post the logs of MBAM and SAS here so I can have a look on them to see what infections were identified.

ROOTREPEAL
-------------
We need to check for rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive.
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#3 hitpro

hitpro
  • Topic Starter

  • Members
  • 119 posts
  • OFFLINE
  •  
  • Local time:05:03 AM

Posted 25 September 2009 - 09:39 PM

thanks for the reply elise.



ok here is the ROOTREPEAL log:


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/09/24 20:20
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF63E8000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xFB0F9000 Size: 8192 File Visible: No Signed: -
Status: -

Name: e9f6bd10.sys
Image Path: C:\WINDOWS\System32\drivers\e9f6bd10.sys
Address: 0xF6423000 Size: 89088 File Visible: No Signed: -
Status: -

Name: f7e1b116.sys
Image Path: C:\WINDOWS\System32\drivers\f7e1b116.sys
Address: 0xFAE11000 Size: 63616 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF5A49000 Size: 49152 File Visible: No Signed: -
Status: -

Name: win32k.sys:1
Image Path: C:\WINDOWS\win32k.sys:1
Address: 0xFAFA1000 Size: 20480 File Visible: No Signed: -
Status: -

Name: win32k.sys:2
Image Path: C:\WINDOWS\win32k.sys:2
Address: 0xF5726000 Size: 57344 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\$NtUninstallKB926239$\{29F8DDC1-9487-49b8-B27E-3E0C3C1298FF}
Status: Allocation size mismatch (API: 1, Raw: 0)

Path: C:\WINDOWS\Installer\3ac969.msi
Status: Locked to the Windows API!

Path: c:\windows\system32\dllcache\ndis.sys
Status: Size mismatch (API: 182912, Raw: 212480)

Path: C:\WINDOWS\system32\drivers\e9f6bd10.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\f7e1b116.sys
Status: Locked to the Windows API!

Path: c:\windows\system32\drivers\ndis.sys
Status: Size mismatch (API: 182912, Raw: 212480)

Path: C:\Documents and Settings\Owner\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys
Status: Size mismatch (API: 182912, Raw: 0)

Path: C:\Documents and Settings\Owner\Local Settings\Application Data\AOL\UserProfiles\1244777262\owner\metrics\cmls_ms.tlv
Status: Could not get file information (Error 0xc0000008)

Path: C:\WINDOWS\system32\config\systemprofile\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys
Status: Size mismatch (API: 182912, Raw: 0)

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "<unknown>" at address 0xfb291276

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0xfb29126c

#: 063 Function Name: NtDeleteKey
Status: Hooked by "<unknown>" at address 0xfb29127b

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "<unknown>" at address 0xfb291285

#: 098 Function Name: NtLoadKey
Status: Hooked by "<unknown>" at address 0xfb29128a

#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0xfb291258

#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0xfb29125d

#: 193 Function Name: NtReplaceKey
Status: Hooked by "<unknown>" at address 0xfb291294

#: 204 Function Name: NtRestoreKey
Status: Hooked by "<unknown>" at address 0xfb29128f

#: 247 Function Name: NtSetValueKey
Status: Hooked by "<unknown>" at address 0xfb291280

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys" at address 0xf6504f20

Hidden Services
-------------------
Service Name: e9f6bd10
Image Path: C:\WINDOWS\System32\drivers\e9f6bd10.sys

Service Name: f7e1b116
Image Path: C:\WINDOWS\System32\drivers\f7e1b116.sys

==EOF==


____________________________________________________________________



here is the MBAM log:


Malwarebytes' Anti-Malware 1.34
Database version: 1749
Windows 5.1.2600 Service Pack 2

9/24/2009 8:26:25 PM
mbam-log-2009-09-24 (20-26-08).txt

Scan type: Quick Scan
Objects scanned: 55848
Time elapsed: 58 minute(s), 50 second(s)

Memory Processes Infected: 2
Memory Modules Infected: 1
Registry Keys Infected: 6
Registry Values Infected: 4
Registry Data Items Infected: 5
Folders Infected: 0
Files Infected: 27

Memory Processes Infected:
C:\WINDOWS\system32\winIogon.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\drivers\smss.exe (Heuristics.Reserved.Word.Exploit) -> No action taken.

Memory Modules Infected:
C:\WINDOWS\system32\__c00E3FC4.dat (Trojan.Agent) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\__c00e3fc4 (Trojan.Vundo) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\windows update (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\windows update (Backdoor.Bot) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\windows update (Backdoor.Bot) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{e85c18e7-c293-4424-9dd0-b31d8db27013} (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e85c18e7-c293-4424-9dd0-b31d8db27013} (Trojan.FakeAlert) -> No action taken.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool (Trojan.Agent) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdoosoft (Spyware.OnlineGames) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system tool (Trojan.FakeAlert) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cognac (Trojan.FakeAlert) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Heuristics.Reserved.Word.Exploit) -> Data: c:\windows\system32\drivers\smss.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Heuristics.Reserved.Word.Exploit) -> Data: system32\drivers\smss.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (Hijack.Regedit) -> Bad: (1) Good: (0) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\scqrp.exe (Trojan.TinyDownloader705) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\_A00F3AB3E5.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\9129837.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\lsass.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\lsass.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\olhrwef.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\BN1.tmp (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\BN9.tmp (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\csrss.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\csrss.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\svchost.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\svchost.exe (Trojan.Agent) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\winlogon.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\Temp\winlogon.exe (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\WindowsUpdate.exe (Backdoor.Bot) -> No action taken.
C:\WINDOWS\system32\__c00E3FC4.dat (Trojan.Vundo) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\BN26.tmp (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\lich.dat (Stolen.Data) -> No action taken.
C:\WINDOWS\sysguard.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\msxml71.dll (Trojan.FakeAlert) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\b.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\winIogon.exe (Backdoor.Bot) -> No action taken.
C:\Documents and Settings\Owner\Local Settings\Temp\taskmgr.exe (Trojan.Downloader) -> No action taken.
C:\WINDOWS\Temp\taskmgr.exe (Trojan.Downloader) -> No action taken.
C:\WINDOWS\system32\iehelper.dll (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\Explorer.ini (Heuristics.Reserved.Word.Exploit) -> No action taken.
C:\WINDOWS\system32\drivers\smss.exe (Heuristics.Reserved.Word.Exploit) -> No action taken.


__________________________________________________________________


here is the AVIRA log: (i had another log created yesterday, with a lot more viruses, but i think i mistakenly deleted it)





Avira AntiVir Personal
Report file date: Friday, September 25, 2009 21:41

Scanning for 1562564 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 2) [5.1.2600]
Boot mode : Normally booted
Username : Owner
Computer name : OWNER-C552132AE

Version information:
BUILD.DAT : 9.0.0.407 17961 Bytes 7/29/2009 10:34:00
AVSCAN.EXE : 9.0.3.7 466689 Bytes 7/21/2009 18:36:14
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 15:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 16:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 15:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 17:30:36
ANTIVIR1.VDF : 7.1.4.132 5707264 Bytes 6/24/2009 14:21:42
ANTIVIR2.VDF : 7.1.4.253 1779200 Bytes 7/19/2009 03:08:01
ANTIVIR3.VDF : 7.1.5.19 139776 Bytes 7/23/2009 12:36:13
Engineversion : 8.2.0.228
AEVDF.DLL : 8.1.1.1 106868 Bytes 7/28/2009 18:31:50
AESCRIPT.DLL : 8.1.2.18 442746 Bytes 7/23/2009 14:59:39
AESCN.DLL : 8.1.2.4 127348 Bytes 7/23/2009 14:59:39
AERDL.DLL : 8.1.2.4 430452 Bytes 7/23/2009 14:59:39
AEPACK.DLL : 8.1.3.18 401783 Bytes 7/28/2009 18:31:50
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 7/23/2009 14:59:39
AEHEUR.DLL : 8.1.0.143 1864055 Bytes 7/23/2009 14:59:39
AEHELP.DLL : 8.1.5.3 233846 Bytes 7/23/2009 14:59:39
AEGEN.DLL : 8.1.1.50 352629 Bytes 7/23/2009 14:59:39
AEEMU.DLL : 8.1.0.9 393588 Bytes 10/9/2008 19:32:40
AECORE.DLL : 8.1.7.6 184694 Bytes 7/23/2009 14:59:39
AEBB.DLL : 8.1.0.3 53618 Bytes 10/9/2008 19:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 13:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 12/5/2008 15:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 1/20/2009 19:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 15:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/24/2009 20:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 15:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 20:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 13:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 15:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/15/2009 20:39:58
RCTEXT.DLL : 9.0.37.0 86785 Bytes 4/17/2009 15:19:48

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Friday, September 25, 2009 21:41

Starting search for hidden objects.
c:\windows\system32\lich.dat
[INFO] The file is not visible.
[NOTE] A backup was created as '4b2072ba.qua' ( QUARANTINE )
c:\windows\system32\lich.exe
[INFO] The file is not visible.
[DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
[INFO] No SpecVir entry was found!
[NOTE] A backup was created as '4b2072bb.qua' ( QUARANTINE )
[INFO] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\lich\ImagePath
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\lich
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\imagepath
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\type
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\start
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\errorcontrol
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\zpkoymjn
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\e9f6bd10\f96zk6npb
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\imagepath
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\type
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\start
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\errorcontrol
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\extparamd
[INFO] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\f7e1b116\f96zk6npb
[INFO] The registry entry is invisible.
'19646' objects were checked, '16' hidden objects were found.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'b.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\DOCUME~1\Owner\LOCALS~1\Temp\b.exe'
[WARNING] The file could not be opened!
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'shellmon.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'winIogon.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\WINDOWS\system32\winIogon.exe'
[WARNING] The file could not be opened!
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ulgonv4.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\DOCUME~1\Owner\LOCALS~1\Temp\ulgonv4.exe'
[WARNING] The file could not be opened!
Scan process 'waol.exe' - '1' Module(s) have been scanned
Scan process 'SUPERAntiSpyware.exe' - '1' Module(s) have been scanned
Scan process 'ulgonv4.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\DOCUME~1\Owner\LOCALS~1\Temp\ulgonv4.exe'
[WARNING] The file could not be opened!
Scan process '9129837.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\WINDOWS\9129837.exe'
[WARNING] The file could not be opened!
Scan process 'ulgonv4.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\DOCUME~1\Owner\LOCALS~1\Temp\ulgonv4.exe'
[WARNING] The file could not be opened!
Scan process 'iexpIore.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\WINDOWS\system32\iexpIore.exe'
[WARNING] The file could not be opened!
Scan process 'aolsoftware.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'SynTPLpr.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'msa.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\WINDOWS\msa.exe'
[WARNING] The file could not be opened!
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
Module is OK -> 'C:\WINDOWS\system32\drivers\smss.exe'
[WARNING] The file could not be opened!
Scan process 'AOLacsd.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'ati2evxx.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned

36 processes with 36 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).

The registry was scanned ( '52' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK42.tmp
[DETECTION] Is the TR/Dldr.FraudLoad.wh Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK43.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK44.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK45.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK47.tmp
[DETECTION] Is the TR/Agent.ldscc Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3C.tmp
[DETECTION] Is the TR/Koobface.ncf Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3D.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3F.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK40.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK41.tmp
[DETECTION] Is the TR/Renos.OTJ Trojan
C:\WINDOWS\system32\drivers\e9f6bd10.sys
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[WARNING] The file could not be opened!
C:\WINDOWS\system32\drivers\f7e1b116.sys
[WARNING] The file could not be opened!

Beginning disinfection:
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK42.tmp
[DETECTION] Is the TR/Dldr.FraudLoad.wh Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4b087786.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK43.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4abbfb91.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK44.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4aa563f5.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK45.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4ab913b7.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F24332\ARK47.tmp
[DETECTION] Is the TR/Agent.ldscc Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4aabe332.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3C.tmp
[DETECTION] Is the TR/Koobface.ncf Trojan
[NOTE] The file was moved to '4b087793.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3D.tmp
[DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4b087795.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK3F.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '48cfa3ff.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK40.tmp
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[NOTE] The file was moved to '4b08779e.qua'!
C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVSCAN-20090924-220606-39F5EF6A\ARK41.tmp
[DETECTION] Is the TR/Renos.OTJ Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING] The file could not be deleted!
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4b087790.qua'!
C:\WINDOWS\system32\drivers\e9f6bd10.sys
[DETECTION] Is the TR/Crypt.ZPACK.Gen Trojan
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26004
[WARNING] The source file could not be found.
[NOTE] Attempting to perform action using the ARK library.
[NOTE] The file was moved to '4b237788.qua'!


End of the scan: Friday, September 25, 2009 22:07
Used time: 25:19 Minute(s)

The scan has been done completely.

1937 Scanned directories
168832 Files were scanned
12 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
13 Files were moved to quarantine
0 Files were renamed
12 Files cannot be scanned
168808 Files not concerned
799 Archives were scanned
20 Warnings
14 Notes
19646 Objects were scanned with rootkit scan
16 Hidden objects were found

___________________________________________________________________________

and for some reason the computer won't let me run an SAS scan. it gives me a blue screen and then it automatically reboots. i don't know what that could be.

#4 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,316 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:03 PM

Posted 26 September 2009 - 01:31 AM

Well, to be honest, I dont say this computer cannot be cleaned. But I really would recommend a reformat in this case. I will explain you why.

One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall


If you want to go through with the cleaning of this laptop, you will need to start a topic in the HJT malware removal forum, since RootRepeal shows a nasty rootkit. Since that forum is very busy it will likely take some time before you get a response.

I would like you to start a new thread HERE and include a link to this thread. Please make sure that you read the information about getting started before you start your thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. Help is on the way!

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft


#5 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,316 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:03 PM

Posted 26 September 2009 - 12:26 PM

I saw your post in HJT, please include a DDS log there, otherwise that post will get removed. Note, do NOT post a DDS log here!!! If you have trouble creating a DDS log, please let me know.

Please read the information in the link in my last post about getting started to find out how to create a DDS log.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users