Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Winvirus Pro, Rootkits, Skynet, and more. Would appreciate expert help.


  • Please log in to reply
6 replies to this topic

#1 Blankobl

Blankobl

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Location:Clinton, CT
  • Local time:07:57 PM

Posted 25 September 2009 - 11:56 AM

Good Afternoon,
I need expert help to help a friend.
Mandy's Computer was infected with WinVirusPro. Using advice from sites like this, OTM, and malwarebytes, I thought I was able to remove it.
The computer seemed to function well. However, the worst was yet to come. The first time I got online, feeling protected by AVG, and searching for antispyware programs, I was hit with another more tenacious problem. My desktop blazed with a WARNING message, that I was infected and my family and friends were at risk. Only a shutdown would be rid of it. I was able to return to a working state after return to last good configuration. But something dark still lurks in this computer.

I believe I have a rootkit, and something called Skynet and more. I believe it is the same problem that another member, Thomas Lovie described on August 27th, 2009. Farbar was helping him, and I believe the same advice would do me good. He described my problem when he said, I've tried running HiJackThis, MalwareBytes anti-malware, ad-aware, Spybot S&D, RootRepeal. The results are pretty much the same for all of these programs. The scan/analysis starts, sometimes it gets partway through scanning, and then the application window gets closed. After this happens, in the case of .exe files, the resulting program is rendered useless, in that further attempts to launch it result in a "Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item." and you also cannot rename, or delete the file.

I do appreciate the opportunity to ask for help here. I have taken advice from your experts from the sidelines so many times and I have benefited from their knowlege and willingness to share it freely. I have learned. More importantly, I have learned when I am in over my head.

Any help would be appreciated.

BC AdBot (Login to Remove)

 


#2 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:07:57 PM

Posted 25 September 2009 - 01:31 PM

Welcome to BC
Let's see what we can find


We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

----------------------------------

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High

Also try: right-click on rootrepeal.exe and rename it to tatertot.scr
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#3 Blankobl

Blankobl
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Location:Clinton, CT
  • Local time:07:57 PM

Posted 25 September 2009 - 11:27 PM

Hello Mark,
Thank you so much for noticing my post and helping me. I am delighted.
Rootrepeal would not run from the desktop. From there I got the error "Windows cannot access the specified device, path, or file. You may not have the appropriate premissions to access the item." I was able to run it from a flash drive. I have been transferring programs to the infected computer with the flash drive, running them, and staying off line as much as possible. Here is the report of the test.


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/09/25 23:45
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF715D000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79BF000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF7657000 Size: 49152 File Visible: No Signed: -
Status: -

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "Lbd.sys" at address 0xf74e787e

#: 247 Function Name: NtSetValueKey
Status: Hooked by "Lbd.sys" at address 0xf74e7bfe

==EOF==

#4 Blankobl

Blankobl
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Location:Clinton, CT
  • Local time:07:57 PM

Posted 25 September 2009 - 11:59 PM

Hello again, Mark,
The report I sent you may not have been complete. I am not off to a good start. Because I couldn't run the scan from the desktop, I went to safe mode and tried it from there. It didn't work either and so I used the program from the flash drive....but I was still in safe mode. This report, now, is still the program run from the flash drive but from a normal boot up. Sorry about that.

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/09/26 00:34
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xEE950000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79C1000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEDC0F000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\documents and settings\all users\application data\spybot - search & destroy\proccache.sbc
Status: Size mismatch (API: 17168, Raw: 17134)

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "Lbd.sys" at address 0xf74e787e

#: 247 Function Name: NtSetValueKey
Status: Hooked by "Lbd.sys" at address 0xf74e7bfe

==EOF==

#5 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:07:57 PM

Posted 26 September 2009 - 06:05 PM

If you use Spybot's Teatimer function, it needs to be disabled


Please download Win32kDiag.exe by AD and save it to your desktop.
alternate download 1
alternate download 2
  • This tool will create a diagnostic report for me to review.
  • Double-click on Win32kDiag.exe to run and let it finish.
  • When it states Finished! Press any key to exit..., press any key on your keyboard to close the program.
  • A file called Win32kDiag.txt should be created on your Desktop.
  • Open that file in Notepad and copy/paste the entire contents (from Starting up... to Finished! Press any key to exit...) in your next reply.

    --------------------------------------
Go to Posted Image > Run..., then copy and paste this command into the open box: cmd
Click OK.
At the command prompt C:\>, copy and paste the following command and press Enter:
DIR /a/s %windir%\scecli.dll %windir%\netlogon.dll %windir%\eventlog.dll >Log.txt & START notepad Log.txt
A file called log.txt should be created on your Desktop.
Open that file and copy/paste the contents in your next reply.
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#6 Blankobl

Blankobl
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Location:Clinton, CT
  • Local time:07:57 PM

Posted 26 September 2009 - 08:30 PM

Good Evening, Mark,
Thank you again.
I disabled the Spybot S&D teatimer feature.
Here are results of the two log files.
I'm looking forward to your interpretation.
Sincerely,
Barb


Running from: E:\Win32kDiag.exe

Log file at : C:\Documents and Settings\Mandy\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Cannot access: C:\WINDOWS\system32\MRT.exe

[1] 2009-08-28 14:38:22 24689600 C:\WINDOWS\system32\MRT.exe ()





Finished!

Volume in drive C has no label.
Volume Serial Number is 1489-BCA6

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 06:00 AM 180,224 scecli.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 06:00 AM 407,040 netlogon.dll

Directory of C:\WINDOWS\$NtServicePackUninstall$

08/04/2004 06:00 AM 55,808 eventlog.dll
3 File(s) 643,072 bytes

Directory of C:\WINDOWS\ERDNT\cache

04/13/2008 08:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\ERDNT\cache

04/13/2008 08:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\ERDNT\cache

04/13/2008 08:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 08:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 08:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\ServicePackFiles\i386

04/13/2008 08:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Directory of C:\WINDOWS\system32

04/13/2008 08:12 PM 181,248 scecli.dll

Directory of C:\WINDOWS\system32

04/13/2008 08:12 PM 407,040 netlogon.dll

Directory of C:\WINDOWS\system32

04/13/2008 08:11 PM 56,320 eventlog.dll
3 File(s) 644,608 bytes

Total Files Listed:
12 File(s) 2,576,896 bytes
0 Dir(s) 23,022,333,952 bytes free

#7 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:07:57 PM

Posted 27 September 2009 - 11:43 AM

I believe the last log will show the HJT team what they want

Now that you were successful in creating a log you need to post it in our HJT forum:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/
Give a brief description and tell them that this log was all you could get to run successfully
The HJT team is extremely busy, so be patient and good luck
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users