Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need Help Please


  • This topic is locked This topic is locked
5 replies to this topic

#1 Alex Likes Viruses

Alex Likes Viruses

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:51 PM

Posted 06 October 2009 - 11:47 PM

Soooo yea lol, my computer got pretty bleeped... uhhhh.. im a college student and need help really really fast.

Ok so... I tried running HijackThis, but it kill itself after getting like 99% done and then i have no access to use the EXE file because i have no permissions. I am the administrator on this laptop. The same thing happens to my Malwarebytes program. and on AVG it says i have no permission to delete detected files. I tried in Safe Mode and malwarebytes doesnt work there aswell.

More Info:
Laptop, COMPAQ
Windows XP Sp2
AVG, MalwareBytes, Ad-Aware, ESET Scanner

BC AdBot (Login to Remove)

 


#2 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:02:51 PM

Posted 08 October 2009 - 11:32 AM

need help really really fast.

Unfortunately, you are describing the latest rootkit infection. There is no quick solution other than a reformat and reinstall
Let's see if we can produce some logs



We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

----------------------------------

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High

Also try: right-click on rootrepeal.exe and rename it to tatertot.scr


======================================


Please download Win32kDiag.exe by AD and save it to your desktop.
alternate download 1
alternate download 2
  • This tool will create a diagnostic report for me to review.
  • Double-click on Win32kDiag.exe to run and let it finish.
  • When it states Finished! Press any key to exit..., press any key on your keyboard to close the program.
  • A file called Win32kDiag.txt should be created on your Desktop.
  • Open that file in Notepad and copy/paste the entire contents (from Starting up... to Finished! Press any key to exit...) in your next reply.

    --------------------------------------
Go to Posted Image > Run..., then copy and paste this command into the open box: cmd
Click OK.
At the command prompt C:\>, copy and paste the following command and press Enter:
DIR /a/s %windir%\scecli.dll %windir%\netlogon.dll %windir%\eventlog.dll >Log.txt & START notepad Log.txt
A file called log.txt should be created on your Desktop.
Open that file and copy/paste the contents in your next reply.
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#3 Alex Likes Viruses

Alex Likes Viruses
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:51 PM

Posted 08 October 2009 - 01:50 PM

RootRepeal - Ok sooooo i found that it dies when it tries to scan the Files. Soooooo... Yeah here is the log for everything BUT the Files, i tried to set it to high aswell. Also... i got a few errors saying Drive Not Found. So anyway here:

ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time:		2009/10/08 14:43
Program Version:		Version 1.3.5.0
Windows Version:		Windows XP SP2
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF5A5B000	Size: 98304	File Visible: No	Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF8AA5000	Size: 8192	File Visible: No	Signed: -
Status: -

Name: tatertot.scr.sys
Image Path: C:\WINDOWS\system32\drivers\tatertot.scr.sys
Address: 0xF261E000	Size: 49152	File Visible: No	Signed: -
Status: -

Name: win32k.sys:1
Image Path: C:\WINDOWS\win32k.sys:1
Address: 0xF888D000	Size: 20480	File Visible: No	Signed: -
Status: -

Name: win32k.sys:2
Image Path: C:\WINDOWS\win32k.sys:2
Address: 0xF5CAD000	Size: 61440	File Visible: No	Signed: -
Status: -

SSDT
-------------------
#: 031	Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0xe1b783a0

#: 041	Function Name: NtCreateKey
Status: Hooked by "Lbd.sys" at address 0xf855587e

#: 247	Function Name: NtSetValueKey
Status: Hooked by "Lbd.sys" at address 0xf8555bfe

==EOF==

Here is the Win32k Log:
Running from: C:\Documents and Settings\Alex\Desktop\Win32kDiag.exe

Log file at : C:\Documents and Settings\Alex\Desktop\Win32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:\WINDOWS'...



Found mount point	   : C:\WINDOWS\$hf_mig$\KB916281\KB916281

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB918899\KB918899

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB920213\KB920213

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB922760\KB922760

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB924496\KB924496

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB925454\KB925454

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB928090\KB928090

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB931768\KB931768

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB932168\KB932168

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB933566\KB933566

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB937143\KB937143

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB939653\KB939653

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB942615\KB942615

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB943460\KB943460

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB944533\KB944533

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\$hf_mig$\KB947864\KB947864

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\addins\addins

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\assembly\temp\temp

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\assembly\tmp\tmp

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Config\Config

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Connection Wizard\Connection Wizard

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Debug\UserMode\UserMode

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Help\SBSI\Training\WXPPer\Cbz\Cbz

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Help\SBSI\Training\WXPPer\Lib\Lib

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Help\SBSI\Training\WXPPer\Wave\Wave

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\chsime\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\CHTIME\Applets\Applets

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\imejp\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\imejp98\imejp98

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\imjp8_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\imkr6_1\applets\applets

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\imkr6_1\dicts\dicts

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\ime\shared\res\res

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Installer\$PatchCache$\Managed\Managed

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\java\classes\classes

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\java\trustlib\trustlib

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET Files\Bind Logs\Bind Logs

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files\Temporary ASP.NET Files

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\msapps\msinfo\msinfo

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\mui\mui

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\ERRORREP\QHEADLES\QHEADLES

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\ERRORREP\QSIGNOFF\QSIGNOFF

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\helpctr\BATCH\BATCH

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\pchealth\helpctr\binaries\HelpSvc.exe

[1] 2004-08-04 04:00:00 743936 C:\WINDOWS\pchealth\helpctr\binaries\HelpSvc.exe ()

[1] 2008-04-13 20:12:21 744448 C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\helpsvc.exe (Microsoft Corporation)



Found mount point	   : C:\WINDOWS\pchealth\helpctr\Config\CheckPoint\CheckPoint

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\helpctr\HelpFiles\HelpFiles

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\helpctr\InstalledSKUs\InstalledSKUs

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\helpctr\System\DFS\DFS

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\pchealth\helpctr\Temp\Temp

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\PIF\PIF

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Registration\CRMLog\CRMLog

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\AuthCabs\AuthCabs

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\355f788b6de8a3ec79e9aa172e6317f1\backup\backup

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\cdec581e2b0b0e52d904b5282584a069\cdec581e2b0b0e52d904b5282584a069

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\10\policy\policy

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\51\msft\msft

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\51\policy\msft\msft

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\52\msft\msft

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\52\policy\msft\msft

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\60\msft\msft

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\backup\asms\70\70

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\SoftwareDistribution\SelfUpdate\Registered\Registered

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\Sun\Java\Deployment\Deployment

Mount point destination : \Device\__max++>\^

Cannot access: C:\WINDOWS\system32\eventlog.dll

[1] 2008-04-13 20:11:53 56320 C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\eventlog.dll (Microsoft Corporation)

[1] 2004-08-04 04:00:00 61952 C:\WINDOWS\system32\eventlog.dll ()

[2] 2004-08-04 04:00:00 55808 C:\WINDOWS\system32\logevent.dll (Microsoft Corporation)



Found mount point	   : C:\WINDOWS\Temp\AskBarDis\upgrade\upgrade

Mount point destination : \Device\__max++>\^

Found mount point	   : C:\WINDOWS\WinSxS\InstallTemp\InstallTemp

Mount point destination : \Device\__max++>\^



Finished!



and then the last log:
Volume in drive C has no label.
 Volume Serial Number is 46C9-0C46

 Directory of C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e

04/13/2008  20:12		   181,248 scecli.dll

 Directory of C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e

04/13/2008  20:12		   407,040 netlogon.dll

 Directory of C:\WINDOWS\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e

04/13/2008  20:11			56,320 eventlog.dll
			   3 File(s)		644,608 bytes

 Directory of C:\WINDOWS\system32

08/04/2004  04:00		   180,224 scecli.dll

 Directory of C:\WINDOWS\system32

08/04/2004  04:00		   407,040 netlogon.dll

 Directory of C:\WINDOWS\system32

08/04/2004  04:00			61,952 eventlog.dll
			   3 File(s)		649,216 bytes

	 Total Files Listed:
			   6 File(s)	  1,293,824 bytes
			   0 Dir(s)  10,044,551,168 bytes free


#4 Alex Likes Viruses

Alex Likes Viruses
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:02:51 PM

Posted 08 October 2009 - 06:24 PM

Update:

Ran Panda Active Scan:
;***********************************************************************************************************************************************************************************
ANALYSIS: 2009-10-08 19:21:54
PROTECTIONS: 2
MALWARE: 6
SUSPECTS: 1
;***********************************************************************************************************************************************************************************
PROTECTIONS
Description								  Version					   Active	Updated
;===================================================================================================================================================================================
AVG Anti-Virus Free						  8.5						   Yes	   Yes
Symantec AntiVirus Corporate Edition		 9.0.1.1000					Yes	   Yes
;===================================================================================================================================================================================
MALWARE
Id		Description						Type				Active	Severity  Disinfectable  Disinfected Location
;===================================================================================================================================================================================
00040538  adware/zango					   Adware			  No		0		 Yes			No		   c:\windows\downloaded program files\clientax.inf
00168061  Cookie/Apmebf					  TrackingCookie	  No		0		 Yes			No		   C:\Documents and Settings\Alex\Cookies\alex@apmebf[1].txt
00484705  Application/IEDefender			 HackTools		   No		0		 Yes			No		   C:\WINDOWS\system32\IEDFix.C.exe
00921467  Generic Malware					Virus/Trojan		No		0		 Yes			No		   C:\WINDOWS\system32\404Fix.exe
03511537  Generic Trojan					 Virus/Trojan		No		0		 Yes			No		   C:\WINDOWS\system32\eventlog.dll
03675576  Trj/Zlob.KH						Virus/Trojan		Yes	   2		 No			 No		   globalroot\Device\__max++>\BC9F9FAE.x86.dll
;===================================================================================================================================================================================
SUSPECTS
Sent	  Location
;===================================================================================================================================================================================
Yes	   C:\Program Files\Common Files\Symantec Shared\SSC\vpshell2.dll
;===================================================================================================================================================================================
VULNERABILITIES
Id		Severity	   Description
;===================================================================================================================================================================================
212494	HIGH		   MS09-042
212493	HIGH		   MS09-041
212490	HIGH		   MS09-038
212530	HIGH		   MS09-034
211784	HIGH		   MS09-032
211781	HIGH		   MS09-029
210625	HIGH		   MS09-026
210624	HIGH		   MS09-025
210621	HIGH		   MS09-022
210618	HIGH		   MS09-019
208380	HIGH		   MS09-015
208379	HIGH		   MS09-014
208378	HIGH		   MS09-013
208377	HIGH		   MS09-012
;===================================================================================================================================================================================


#5 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:02:51 PM

Posted 08 October 2009 - 07:10 PM

You have a rootkit infection


Now that you were successful in creating those two logs you need to post them [the ones I had you run] in our HJT forum Their they will help you with the removal through some custom scripts and programs that we cannot run here in this forum

First, try to run a DDS / HJT log as outlined in our preparation guide:
http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/

If it won't run, don't worry, just give a brief description and tell them that these logs were all you could get to run successfully

Post them here:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/

The HJT team is extremely busy, so be patient and good luck
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#6 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,993 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:02:51 PM

Posted 09 October 2009 - 10:50 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/263365/hjt-and-combofix-log/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, up to two weeks perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users