Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit & other malware removal help please!


  • This topic is locked This topic is locked
14 replies to this topic

#1 gid491

gid491

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 28 November 2009 - 11:46 AM

According to Spyware Doctor I am infected by the following things:

Rootkit.TDSS (1 infection)
Trojan-Spy.Zbot.A (8 infections)
Trojan-Spy.Zbot.YETH (12 infections)

my AVG Rootkit scan doesnt come up with anything though

is there anyway i can remove all of this stuff (for free)?

BC AdBot (Login to Remove)

 


#2 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 28 November 2009 - 05:27 PM

Hello and welcome to Bleeping Computer.

Please subscribe to your topic so that you will be notified as soon as I post a reply, instead of you having to check the topic all of the time. This will allow you to get an email notification when I reply.

To subscribe, go to your topic, and at the top right hand corner by your first post, click the Options button and then click Track this topic. The bullet the immediate notification bubble. Then press submit.


Lets take a look with Malwarebytes

Please download Malwarebytes' Anti-Malware from here:
Malwarebytes
Please rename the file BEFORE downloading to zztoy.exe instead of mbam-setup.exe

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

Double Click zztoy.exe to install the application.
* Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select "Perform Full Scan", then click Scan.
* The scan may take some time to finish,so please be patient.
* When the scan is complete, click OK, then Show Results to view the results.
* Make sure that everything is checked, and click Remove Selected.
* When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
* The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
* Copy&Paste the entire MBAM report (even if it does not find anything) in your next reply

Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.


If Malwarebytes won't install or run

Some types of malware will disable MBAM and other security tools. If MBAM will not install, try renaming it. Right-click on the mbam-setup.exe file and change the .exe extension to .bat, .com, .pif, or .scr and then double-click on it to run.

If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files, right-click on mbam.exe and change the .exe as noted above. Then double-click on it to run.
Computer Pro

#3 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 29 November 2009 - 08:38 AM

Malwarebytes' Anti-Malware 1.41
Database version: 3255
Windows 5.1.2600 Service Pack 3

29/11/2009 13:28:27
mbam-log-2009-11-29 (13-28-27).txt

Scan type: Full Scan (C:\|D:\|E:\|)
Objects scanned: 182295
Time elapsed: 1 hour(s), 11 minute(s), 52 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 26

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP264\A0165531.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP267\A0165609.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP268\A0165790.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP268\A0166192.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP268\A0166241.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP269\A0166245.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP269\A0166289.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP270\A0166297.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP271\A0166349.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP272\A0166356.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0166381.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0166403.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0166417.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0167466.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0167467.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP273\A0166484.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167524.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167525.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167542.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167543.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167585.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP274\A0167586.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdlclk.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdlcmd.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\2e55b7fb-2243-404d-96ed-084515797dd2.tmp (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\Temp\4a701f9b-bd04-494e-81df-5206f574c267.tmp (Rootkit.TDSS) -> Delete on reboot.

#4 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 29 November 2009 - 03:47 PM

Ok now SAS:

Please run ATF and SAS:

Note.. SAS doesn't open the registry hives for other user accounts on the system, so scans should be done from each user account.

Note 2: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware, Free Home Edition

Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.



Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.
Computer Pro

#5 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 02 December 2009 - 02:21 PM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 12/02/2009 at 06:40 PM

Application Version : 4.31.1000

Core Rules Database Version : 4327
Trace Rules Database Version: 2182

Scan type : Complete Scan
Total Scan Time : 01:27:32

Memory items scanned : 689
Memory threats detected : 0
Registry items scanned : 5593
Registry threats detected : 0
File items scanned : 56914
File threats detected : 1

Trojan.Dropper/UserInit-Fake
C:\WINDOWS\SYSTEM32\USERINIT.EXE

#6 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 03 December 2009 - 05:01 PM

Are you still experiencing the issue?
Computer Pro

#7 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 04 December 2009 - 03:28 PM

yes i scanned with SUPER again and it came up with this

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 12/04/2009 at 07:51 PM

Application Version : 4.31.1000

Core Rules Database Version : 4327
Trace Rules Database Version: 2182

Scan type : Complete Scan
Total Scan Time : 02:27:25

Memory items scanned : 659
Memory threats detected : 0
Registry items scanned : 5595
Registry threats detected : 0
File items scanned : 55702
File threats detected : 2

Trojan.Dropper/UserInit-Fake
C:\WINDOWS\SYSTEM32\USERINIT.EXE
C:\WINDOWS\Prefetch\USERINIT.EXE-30B18140.pf

as for my AVG 9.0 scanner, i got:

"Object name";"C:\WINDOWS\system32\tdlcmd.dll"
"Detection name";"Trojan horse Vundo.IY"
"Object type";"file"
"SDK Type";"Core"
"Result";"Moved to Virus Vault"
"Action history";"Moved to Virus vault"

"Object name";"C:\WINDOWS\system32\csrss.exe (1260):\memory_00270000"
"Detection name";"Virus identified Packed.Hidden"
"Object type";"file"
"SDK Type";"Core"
"Result";"Moved to Virus Vault"
"Action history";"Moved to Virus vault"

"Object name";"C:\WINDOWS\system32\csrss.exe (1260)"
"Detection name";"Virus identified Packed.Hidden"
"Object type";"process"
"SDK Type";"Core"
"Result";"Reboot is required to finish the action"
"Action history";""

"Object name";"C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP279\A0167820.dll"
"Detection name";"Trojan horse Vundo.IY"
"Object type";"file"
"SDK Type";"Core"
"Result";"Moved to Virus Vault"
"Action history";"Moved to Virus vault"

"Object name";"C:\System Volume Information\_restore{FA76AAE1-0D6B-45E6-A0E5-2E9BB81BE9AD}\RP278\A0167766.dll"
"Detection name";"Trojan horse Vundo.IY"
"Object type";"file"
"SDK Type";"Core"
"Result";"Moved to Virus Vault"
"Action history";"Moved to Virus vault"

i rebooted the laptop and started an AVG scan again, but after about 50 objects scanned it comes up with the first two posted results almmost immediately.

#8 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 04 December 2009 - 07:42 PM

Ok, lets update Malwarebytes since a new version has been released. You can do so by going to the "Update" tab. Then run a Quick scan and post the log.
Computer Pro

#9 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 06 December 2009 - 06:29 AM

Malwarebytes' Anti-Malware 1.42
Database version: 3303
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18241

06/12/2009 11:21:07
mbam-log-2009-12-06 (11-21-07).txt

Scan type: Quick Scan
Objects scanned: 122996
Time elapsed: 9 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\tdlclk.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\tdlcmd.dll (Rogue.Installer) -> Quarantined and deleted successfully.


Also while i was running my Malwarebytes quick scan, my "Resident Shield" just popped up saying "Threat detected".

It says:

File name: C:\WINDOWS\system32\tdlcmd.dll

Threat name: Trojan Horse Vundo.IY
Detected on open.

Process name: C:\Program Files\zztoy.exe\mbam.exe
Process ID: 4224

#10 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 06 December 2009 - 11:05 AM

Ok. Lets scan for rootkits:

Please install RootRepeal

Go HERE, and download RootRepeal.zip to your Desktop.
Tutorial with images ,if needed >> L@@K
Unzip that to your Desktop and then click RootRepeal.exe to open the scanner.

*Open the folder and double-click on RootRepeal.exe to launch it. If using Vista, right-click and Run as Administrator...
* Click on the Report tab, then click the Scan button. Check all seven of the boxes.
* In the Select Drives, dialog Please select drives to scan: select all drives showing, then click OK.
* When the scan has completed, a list of files will be generated in the RootRepeal window.
* Click on the Save Report button and save it as rootrepeal.txt to your desktop or the same location where you ran the tool from.
* Open rootrepeal.txt in Notepad and copy/paste its contents in your next reply.
* Exit RootRepeal and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

Please note: If Rootrepeal fails to run, try this step: Click Settings - Options. Set the Disk Access slider to High


Note 2: If RootRepeal cannot complete a scan and results in a crash report, try repeating the scan in "Safe Mode".
Computer Pro

#11 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 06 December 2009 - 01:04 PM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/12/06 17:53
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xAAC2D000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7DE1000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA92A0000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\windows\temp\93175ffa-05c4-44e6-9bab-e338718c9461.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\934f7277-c8a4-4370-8d0c-792307a61843.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\75117ea5-5976-410d-ae0d-9c991209e92f.tmp
Status: Allocation size mismatch (API: 102400, Raw: 196608)

Path: c:\windows\temp\777f1f42-41c3-42b5-aa7c-e444c9fa17de.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\3e3c7df7-03e3-49d3-8f9d-213c223d3c3f.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\4163d75c-db27-4b29-aec1-1619bdb55359.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\2cc13382-177d-46ad-a4e9-0d7917469060.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\2d71dbef-ecb7-463a-aae7-b42a616510d5.tmp
Status: Allocation size mismatch (API: 73728, Raw: 131072)

Path: c:\windows\temp\2e43e83a-b07e-44a4-8e4d-87a613e2dda2.tmp
Status: Allocation size mismatch (API: 8192, Raw: 16384)

Path: c:\windows\temp\d479bc91-a949-4a46-9812-820b50947cd7.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\d5810ea9-4981-4ece-b75c-404e23159de0.tmp
Status: Allocation size mismatch (API: 4096, Raw: 32768)

Path: c:\windows\temp\d6f0f3e5-4ec6-497a-988c-b462172fed92.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\e7b5acd7-9257-48d6-89dd-0daab791f61d.tmp
Status: Allocation size mismatch (API: 36864, Raw: 81920)

Path: c:\windows\temp\8cd96034-6fc4-4595-bc4d-b793a3b81eaa.tmp
Status: Allocation size mismatch (API: 28672, Raw: 163840)

Path: c:\windows\temp\8d5dd32f-90ff-4ba8-a312-0fe7a588b810.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\8e3cccc0-aa8a-437b-9ffb-7d62257bc863.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\909cc3db-993c-4d80-8045-d7f0ec1186e7.tmp
Status: Allocation size mismatch (API: 94208, Raw: 131072)

Path: c:\windows\temp\c00c2d2c-b868-4def-8ae8-f0621da4190b.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\60b46f47-1559-449e-a436-03c380fe5126.tmp
Status: Allocation size mismatch (API: 12288, Raw: 16384)

Path: c:\windows\temp\62bac55e-984d-43e0-a61e-ca3cb83f67a6.tmp
Status: Allocation size mismatch (API: 32768, Raw: 65536)

Path: c:\windows\temp\63bb6b64-cd47-4c32-af7d-70f5ba1fc19e.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\a2c01534-ec36-4513-989e-3ff18e4950c6.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\a3652aea-f3b0-4e50-bc23-9b176acc88dc.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\a683bf46-ea7f-4f02-8fc6-bb822c638a5b.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\daf898bc-7642-441f-b706-c3bc75ccf4e2.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\ddb3c541-6a04-446b-9257-4cd3b697876c.tmp
Status: Allocation size mismatch (API: 94208, Raw: 131072)

Path: c:\windows\temp\d17d0106-b619-47aa-aa5f-cfc48516d671.tmp
Status: Allocation size mismatch (API: 114688, Raw: 131072)

Path: c:\windows\temp\d257aa01-3a44-41ba-9d29-d60ce656bc5d.tmp
Status: Allocation size mismatch (API: 69632, Raw: 98304)

Path: c:\windows\temp\39cf7e0e-bb0c-4198-9da1-cf431b6aa664.tmp
Status: Allocation size mismatch (API: 12288, Raw: 65536)

Path: c:\windows\temp\26589f63-bb7a-4819-b867-a443d294ef2c.tmp
Status: Allocation size mismatch (API: 20480, Raw: 24576)

Path: c:\windows\temp\26992d97-1dac-4986-839c-139d60613235.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\29965824-f78c-425f-88cf-e846a1de2975.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\2a6c7272-eff0-4289-a4a1-aabfa08f3752.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\4e837619-2caa-4ec9-81c3-b2f5690539b4.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\6a5e7bea-3aa6-4d18-9233-183f32556d4e.tmp
Status: Allocation size mismatch (API: 4096, Raw: 8192)

Path: c:\windows\temp\0a32c22d-07d7-4acb-9d88-504ad870d54c.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\07eba3ff-5253-446f-b747-4d4ffc091023.tmp
Status: Allocation size mismatch (API: 53248, Raw: 65536)

Path: c:\windows\temp\096a4f74-b35b-47a8-a69d-5215575f94fd.tmp
Status: Allocation size mismatch (API: 4096, Raw: 8192)

Path: c:\windows\temp\f7a7bd00-d6e5-424d-a981-e5e1a1b33a62.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\f7dc5eba-b197-4657-a889-14ddf63af3a7.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\675cb574-8943-48bd-9333-e061f1f7f731.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\9f2ac437-4b36-4662-8981-7d4dc2275b87.tmp
Status: Allocation size mismatch (API: 135168, Raw: 196608)

Path: c:\windows\temp\add535bb-a61f-49cc-9a0e-0d2cea0c85ab.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\b7d6d6ec-d54d-4d92-962f-66ef3d473d4d.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\a8239d61-aa7f-4247-998e-627c997404df.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\a9808933-943e-4cb2-83f3-e771560de2e9.tmp
Status: Allocation size mismatch (API: 4096, Raw: 32768)

Path: c:\windows\temp\aa6aa474-b550-45f7-b190-be0008f6cc5c.tmp
Status: Allocation size mismatch (API: 57344, Raw: 131072)

Path: c:\windows\temp\aae8dd21-5f31-47d4-b2b7-fca3ba036f86.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\2534f45a-e9e7-4972-8b03-40cc0c955182.tmp
Status: Allocation size mismatch (API: 69632, Raw: 98304)

Path: c:\windows\temp\254ce561-c8ec-4386-b5d0-73e24403456e.tmp
Status: Allocation size mismatch (API: 57344, Raw: 131072)

Path: c:\windows\temp\5700e607-d8b5-4102-a1f3-e01d0c3bee83.tmp
Status: Allocation size mismatch (API: 57344, Raw: 65536)

Path: c:\windows\temp\57e6e8c4-b9a9-41d5-9144-238b74c75700.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\421286b0-12fc-4cee-b24b-c6af55f453b5.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\4229107c-066c-4b9b-a751-55ec6c93e09f.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\42b4c393-96e8-439e-8914-fc59753c8406.tmp
Status: Allocation size mismatch (API: 16384, Raw: 65536)

Path: c:\windows\temp\45bc9407-acef-44db-84aa-c5009b192421.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\878a1b8c-01ba-4408-b563-e5ac9d6bd028.tmp
Status: Allocation size mismatch (API: 4096, Raw: 8192)

Path: c:\windows\temp\15f3a795-de3a-4c30-8886-6c4f16dfd7eb.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\1ade8664-37a9-4394-b9b0-46033e6db026.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\1ca475f8-fcf8-4ae7-9635-c5807cb37c02.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\00d41edb-01eb-4e30-97ab-c6dd92f5f663.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\0534a681-cffa-48be-8ab1-094e0304945b.tmp
Status: Allocation size mismatch (API: 90112, Raw: 98304)

Path: c:\windows\temp\e51c9403-9fbf-492f-9150-94b5fbdb1120.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\0e53d683-4d2e-4bb6-8e9a-6c01939e29b6.tmp
Status: Allocation size mismatch (API: 102400, Raw: 131072)

Path: c:\windows\temp\0f2886e1-1e69-45b7-abd0-913250e394b1.tmp
Status: Allocation size mismatch (API: 86016, Raw: 131072)

Path: c:\windows\temp\bc6478c9-1b83-47d4-b254-eb246dead695.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\ac1efe2b-eac8-4d11-bd07-ebe5b7ef6bfa.tmp
Status: Allocation size mismatch (API: 102400, Raw: 131072)

Path: c:\windows\temp\cb9e2f8c-b724-470d-9909-3145d0865352.tmp
Status: Allocation size mismatch (API: 4096, Raw: 65536)

Path: c:\windows\temp\ce89a367-1496-442a-b145-43882e4c6f7d.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\f17258d8-6c66-4e43-8bae-43b770f588d5.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\f1d5064a-a708-4fcc-af03-7b69499df94e.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\f4bd18d5-61e3-4e9b-89c2-7ec2b8024ede.tmp
Status: Allocation size mismatch (API: 4096, Raw: 16384)

Path: c:\windows\temp\5b774c7f-3cb3-4530-af12-b71198f302a1.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\windows\temp\5ef221c2-81d1-4882-86b6-e1dda77e072f.tmp
Status: Allocation size mismatch (API: 69632, Raw: 131072)

Path: c:\documents and settings\gideon\application data\mozilla\firefox\profiles\ww90lmqx.default\sessionstore.js
Status: Size mismatch (API: 20003, Raw: 20002)

Path: C:\Documents and Settings\Gideon\Local Settings\Apps\2.0\GQKDH40W.T3D\GDXYQHWC.3RX\manifests\clickonce_bootstrap.exe.cdf-ms
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Gideon\Local Settings\Apps\2.0\GQKDH40W.T3D\GDXYQHWC.3RX\manifests\clickonce_bootstrap.exe.manifest
Status: Locked to the Windows API!

Path: c:\documents and settings\gideon\local settings\application data\mozilla\firefox\profiles\ww90lmqx.default\cache\_cache_001_
Status: Size mismatch (API: 737957, Raw: 709148)

Path: c:\documents and settings\gideon\local settings\application data\mozilla\firefox\profiles\ww90lmqx.default\cache\_cache_002_
Status: Size mismatch (API: 979971, Raw: 964684)

Path: c:\documents and settings\gideon\local settings\application data\mozilla\firefox\profiles\ww90lmqx.default\cache\_cache_003_
Status: Size mismatch (API: 2070185, Raw: 2022014)

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\23A8AD62d01
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\5A2E2091d01
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\6630C605d01
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\76BC471Fd01
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\E0DE5F99d01
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Gideon\Local Settings\Application Data\Mozilla\Firefox\Profiles\ww90lmqx.default\Cache\FB6E3599d01
Status: Visible to the Windows API, but not on disk.

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "PCTCore.sys" at address 0xf7755e52

#: 047 Function Name: NtCreateProcess
Status: Hooked by "PCTCore.sys" at address 0xf7736cde

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "PCTCore.sys" at address 0xf7736ed0

#: 063 Function Name: NtDeleteKey
Status: Hooked by "PCTCore.sys" at address 0xf7756640

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "PCTCore.sys" at address 0xf77568f4

#: 119 Function Name: NtOpenKey
Status: Hooked by "PCTCore.sys" at address 0xf7754b44

#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys" at address 0xaaa88470

#: 192 Function Name: NtRenameKey
Status: Hooked by "PCTCore.sys" at address 0xf7756d60

#: 247 Function Name: NtSetValueKey
Status: Hooked by "PCTCore.sys" at address 0xf7756112

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Program Files\SUPERAntiSpyware\SASKUTIL.sys" at address 0xaad610b0

#: 258 Function Name: NtTerminateThread
Status: Hooked by "C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys" at address 0xaaa885c0

#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "C:\Program Files\AVG\AVG9\Identity Protection\Agent\Driver\Platform_XP\AVGIDSShim.sys" at address 0xaaa88660

==EOF==

#12 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 06 December 2009 - 10:17 PM

Ok, it looks like you need to post in the HJT forum:

It looks like we are going to have to use more powerful tools than what we are allowed to use in the Am I Infected forum. I am going to need for you to post a DDS/HijackThis Log in the HijackThis Log section of the forum.

Please refer to this for your preparation reasons before posting:
http://www.bleepingcomputer.com/forums/t/34773/preparation-guide-for-use-before-using-malware-removal-tools-and-requesting-help/

You can find the forum here:
http://www.bleepingcomputer.com/forums/f/22/virus-trojan-spyware-and-malware-removal-logs/

Once you have created a new topic in the HijackThis section, please post a link to it in this topic.
Please allow time for your topic to be replied to in the HijackThis section as the HJT Team is EXTREMELY busy posting logs before yours.

Good Luck!
Computer Pro

#13 gid491

gid491
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:12:00 AM

Posted 09 December 2009 - 12:37 PM

This is the topic over in HJT: http://www.bleepingcomputer.com/forums/t/277562/sent-here-by-am-i-infected-not-entirely-sure-of-infection-yet/

and thank you very much for all your help so far :thumbsup:

#14 Computer Pro

Computer Pro

  • Members
  • 2,448 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:00 PM

Posted 09 December 2009 - 03:17 PM

Your very welcome, good luck
Computer Pro

#15 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,946 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:08:00 PM

Posted 09 December 2009 - 11:16 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/277562/sent-here-by-am-i-infected-not-entirely-sure-of-infection-yet/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, up to two weeks perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users