Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help with virus


  • This topic is locked This topic is locked
23 replies to this topic

#1 mafiosoman

mafiosoman

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 28 November 2009 - 03:12 PM

I am being redirected to different sites in browser, and some access to certain functions in windows have been disabled. I cannot turn off system restore, and regedit doesnt seem to function properly. PLease help. I am running windows 7. all I have done so far is scan with malwarebytes but when it comes to restart after deleting infected files computer freezes. I also lost background control and regedit acces but got that back after first scan with malwarebytes. I also lost internet access but repaired it with lspfix.



Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 3:05:35 PM, on 11/28/2009
Platform: Unknown Windows (WinNT 6.01.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16385)
Boot mode: Normal

Running processes:
C:Windowssystem32Dwm.exe
C:Windowssystem32taskhost.exe
C:WindowsExplorer.EXE
C:WindowsSystem32rundll32.exe
C:Program FilesWindows Sidebarsidebar.exe
C:UsersdavidAppDataLocalGoogleUpdateGoogleUpdate.exe
C:Windowssystem32ctfmon.exe
C:UsersdavidAppDataLocalGoogleChromeApplicationchrome.exe
C:UsersdavidAppDataLocalGoogleChromeApplicationchrome.exe
C:Windowssystem32DllHost.exe
G:HijackThis.exe

R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Bar = Preserve
R1 - HKCUSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCUSoftwareMicrosoftInternet ExplorerMain,Start Page =
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLMSoftwareMicrosoftInternet ExplorerMain,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLMSoftwareMicrosoftInternet ExplorerMain,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,SearchAssistant =
R0 - HKLMSoftwareMicrosoftInternet ExplorerSearch,CustomizeSearch =
R0 - HKCUSoftwareMicrosoftInternet ExplorerToolbar,LinksFolderName =
O4 - HKLM..Run: [calc] rundll32.exe C:Windowssystem32calc.dll,_IWMPEvents@0
O4 - HKLM..Run: [CTxfiHlp] CTXFIHLP.EXE
O4 - HKLM..Run: [CTHelper] CTHELPER.EXE
O4 - HKLM..Run: [Adobe Reader Speed Launcher] "C:Program FilesAdobeReader 9.0ReaderReader_sl.exe"
O4 - HKLM..Run: [Adobe ARM] "C:Program FilesCommon FilesAdobeARM1.0AdobeARM.exe"
O4 - HKLM..Run: [Malwarebytes Anti-Malware (reboot)] "C:Program FilesMalwarebytes' Anti-Malwarembam.exe" /runcleanupscript
O4 - HKCU..Run: [calc] rundll32.exe C:Usersdavidntuser.dll,_IWMPEvents@0
O4 - HKCU..Run: [Sidebar] C:Program FilesWindows Sidebarsidebar.exe /autoRun
O4 - HKCU..Run: [Google Update] "C:UsersdavidAppDataLocalGoogleUpdateGoogleUpdate.exe" /c
O4 - HKUSS-1-5-19..Run: [Sidebar] %ProgramFiles%Windows SidebarSidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUSS-1-5-19..RunOnce: [mctadmin] C:WindowsSystem32mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUSS-1-5-20..Run: [Sidebar] %ProgramFiles%Windows SidebarSidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUSS-1-5-20..RunOnce: [mctadmin] C:WindowsSystem32mctadmin.exe (User 'NETWORK SERVICE')
O4 - HKUSS-1-5-18..Run: [DevconDefaultDB] C:Windowssystem32READREG /SILENT /FAIL=1 (User 'SYSTEM')
O4 - HKUS.DEFAULT..Run: [DevconDefaultDB] C:Windowssystem32READREG /SILENT /FAIL=1 (User 'Default user')
O13 - Gopher Prefix:
O15 - Trusted Zone: http://*.mcafee.com
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:Program FilesCommon FilesInstallShieldDriver11Intel 32IDriverT.exe
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:Program FilesCommon FilesNeroNero BackItUp 4NBService.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:Windowssystem32nvvsvc.exe
O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:Program FilesNVIDIA Corporation3D VisionnvSCPAPISvr.exe

here are my dds logs................I tried to run root repeal but it crashed with errors said tocontact author.

Merged posts. ~ OB

Attached Files


Edited by Orange Blossom, 28 November 2009 - 10:36 PM.


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 06 December 2009 - 12:57 PM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 07 December 2009 - 07:27 AM

Right now I keep being redirected in browser, Lost admin rights, and I think viewing regedit is disabled. All I have done so far was run malware bytes. I was able to get rid of some viruses but not all. I had lost internet access but fixed it with lspfix. Desktop background was locked but was fixed after first malwarebytes scan. Now whenever I do malwarebytes scan it find 9 infected files in quickscan but when computer goes to restart to remove them computer freezes.

Here are my dds scans:



DDS (Ver_09-12-01.01) - NTFSx86
Run by david at 7:12:30.84 on Mon 12/07/2009
Internet Explorer: 8.0.7600.16385 BrowserJavaVersion: 1.6.0_17
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.2302.1705 [GMT -5:00]


============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskhost.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\rundll32.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Windows\system32\sppsvc.exe
C:\Windows\system32\ctfmon.exe
C:\Users\david\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\david\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\david\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\david\Documents\Downloads\dds (1).scr
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe

============== Pseudo HJT Report ===============

uSearch Bar = Preserve
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
uRun: [calc] rundll32.exe c:\users\david\ntuser.dll,_IWMPEvents@0
uRun: [Sidebar] c:\program files\windows sidebar\sidebar.exe /autoRun
uRun: [Google Update] "c:\users\david\appdata\local\google\update\GoogleUpdate.exe" /c
mRun: [calc] rundll32.exe c:\windows\system32\calc.dll,_IWMPEvents@0
mRun: [CTxfiHlp] CTXFIHLP.EXE
mRun: [CTHelper] CTHELPER.EXE
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "c:\program files\java\jre6\bin\jusched.exe"
dRun: [DevconDefaultDB] c:\windows\system32\READREG /SILENT /FAIL=1
dRun: [calc] rundll32.exe c:\windows\system32\config\system~1\ntuser.dll,_IWMPEvents@0
dRun: [jsh87r3huiehf89esiudgd] c:\windows\temp\eb2kdj3f.exe
dRun: [asg984jgkfmgasi8ug98jgkfgfb] c:\windows\temp\debug.exe
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
dPolicies-explorer: NoSetActiveDesktop = 1 (0x1)
dPolicies-explorer: NoActiveDesktopChanges = 1 (0x1)
dPolicies-explorer: NoFolderOptions = 1 (0x1)
dPolicies-system: DisableTaskMgr = 1 (0x1)
dPolicies-system: DisableRegistryTools = 1 (0x1)
Trusted Zone: internet
Trusted Zone: mcafee.com
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab

================= FIREFOX ===================

FF - ProfilePath - c:\users\david\appdata\roaming\mozilla\firefox\profiles\kzxa4858.default\
FF - plugin: c:\program files\mcafee\supportability\mvt\NPMVTPlugin.dll
FF - plugin: c:\users\david\appdata\local\google\update\1.2.183.13\npGoogleOneClick8.dll
FF - HiddenExtension: Java Console: No Registry Reference - c:\program files\mozilla firefox\extensions\{CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA}

---- FIREFOX POLICIES ----
c:\program files\mozilla firefox\greprefs\security-prefs.js - pref("security.ssl3.rsa_seed_sha", true);

============= SERVICES / DRIVERS ===============

R1 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2009-11-4 214664]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\nvidia corporation\3d vision\nvSCPAPISvr.exe [2009-9-27 240232]
R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S3 mferkdk;McAfee Inc. mferkdk;c:\windows\system32\drivers\mferkdk.sys [2009-11-24 34248]

=============== Created Last 30 ================

2009-12-03 23:59:40 54016 ----a-w- c:\windows\system32\drivers\emcasw.sys
2009-11-29 02:57:11 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-11-27 20:04:36 1908 ----a-w- c:\windows\diagwrn.xml
2009-11-27 20:04:36 1908 ----a-w- c:\windows\diagerr.xml
2009-11-27 15:47:10 0 d-----w- c:\users\david\appdata\roaming\Malwarebytes
2009-11-27 15:47:02 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2009-11-27 15:47:00 19160 ----a-w- c:\windows\system32\drivers\mbam.sys
2009-11-27 15:47:00 0 d-----w- c:\programdata\Malwarebytes
2009-11-27 15:47:00 0 d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-11-26 13:44:48 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_09_00.Wdf
2009-11-26 01:14:13 69 ----a-w- c:\windows\NeroDigital.ini
2009-11-25 15:40:44 0 d-----w- c:\windows\pss
2009-11-25 03:45:38 2048 ----a-w- c:\windows\system32\tzres.dll
2009-11-24 14:14:21 0 d-----w- C:\SDFix
2009-11-24 12:09:50 0 d-----w- c:\users\david\appdata\roaming\McAfee
2009-11-24 11:56:53 0 d-----w- c:\programdata\SiteAdvisor
2009-11-24 11:54:11 0 d-----w- c:\program files\McAfee
2009-11-24 11:44:18 34248 ----a-w- c:\windows\system32\drivers\mferkdk.sys
2009-11-24 11:39:47 0 d-----w- c:\programdata\McAfee
2009-11-24 02:15:42 0 d-----w- c:\users\david\appdata\roaming\WinDefender32
2009-11-24 00:31:20 0 d-----w- c:\users\david\appdata\roaming\Tific
2009-11-23 18:43:30 0 d-----w- c:\programdata\Norton
2009-11-23 18:43:24 0 d-----w- c:\programdata\NortonInstaller
2009-11-22 16:26:58 299520 ----a-w- c:\windows\uninst.exe
2009-11-22 16:20:59 0 d-----w- c:\program files\NVIDIA Corporation
2009-11-22 16:20:46 0 d-----w- c:\programdata\NVIDIA
2009-11-22 16:20:07 0 d-----w- c:\windows\system32\AGEIA
2009-11-22 16:19:52 0 d-----w- c:\program files\common files\Wise Installation Wizard
2009-11-22 16:19:48 490088 ----a-w- c:\windows\system32\nvuninst.exe
2009-11-22 12:48:38 0 d-----w- c:\program files\Nero
2009-11-22 12:48:10 0 d-----w- c:\programdata\Nero
2009-11-22 12:32:48 0 d-----w- c:\programdata\WinZip
2009-11-22 12:14:56 0 d-----w- c:\program files\DAMN NFO Viewer
2009-11-21 19:21:51 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2009-11-21 19:20:58 0 d-----w- c:\users\david\appdata\roaming\DAEMON Tools Lite
2009-11-21 19:20:56 0 d-----w- c:\programdata\DAEMON Tools Lite
2009-11-19 13:12:17 0 d-----w- c:\program files\MSXML 4.0
2009-11-19 13:12:14 0 d-----w- c:\program files\common files\Microsoft Games
2009-11-19 13:12:00 2297552 ----a-w- c:\windows\system32\d3dx9_26.dll
2009-11-19 12:40:10 0 d-----w- c:\windows\PCHEALTH
2009-11-18 03:24:34 65536 --sha-w- c:\users\david\ntuser.dat{da0b2cb9-d3ee-11de-8778-001111469778}.TM.blf
2009-11-18 03:24:34 524288 --sha-w- c:\users\david\ntuser.dat{da0b2cb9-d3ee-11de-8778-001111469778}.TMContainer00000000000000000002.regtrans-ms
2009-11-18 03:24:34 524288 --sha-w- c:\users\david\ntuser.dat{da0b2cb9-d3ee-11de-8778-001111469778}.TMContainer00000000000000000001.regtrans-ms
2009-11-18 03:03:24 65536 --sha-w- c:\users\david\ntuser.dat{da0b2c38-d3ee-11de-8778-001111469778}.TM.blf
2009-11-18 03:03:24 524288 --sha-w- c:\users\david\ntuser.dat{da0b2c38-d3ee-11de-8778-001111469778}.TMContainer00000000000000000002.regtrans-ms
2009-11-18 03:03:24 524288 --sha-w- c:\users\david\ntuser.dat{da0b2c38-d3ee-11de-8778-001111469778}.TMContainer00000000000000000001.regtrans-ms
2009-11-17 00:22:09 0 d--h--w- c:\programdata\CanonBJ
2009-11-16 23:13:30 0 d-----w- c:\programdata\Adobe
2009-11-16 22:14:14 4958588 ----a-w- c:\windows\{00000004-00000000-00000002-00001102-00000004-10031102}.BAK
2009-11-16 12:50:04 30912 ----a-w- c:\windows\system32\BMXStateBkp-{00000004-00000000-00000002-00001102-00000004-10031102}.rfx
2009-11-16 12:50:04 30912 ----a-w- c:\windows\system32\BMXState-{00000004-00000000-00000002-00001102-00000004-10031102}.rfx
2009-11-16 12:50:04 30120 ----a-w- c:\windows\system32\BMXCtrlState-{00000004-00000000-00000002-00001102-00000004-10031102}.rfx
2009-11-16 12:50:04 30120 ----a-w- c:\windows\system32\BMXBkpCtrlState-{00000004-00000000-00000002-00001102-00000004-10031102}.rfx
2009-11-16 12:50:04 11564 ----a-w- c:\windows\system32\DVCState-{00000004-00000000-00000002-00001102-00000004-10031102}.rfx
2009-11-16 11:35:22 0 d-sh--w- c:\windows\Installer
2009-11-16 11:20:55 4958588 ----a-w- c:\windows\{00000004-00000000-00000002-00001102-00000004-10031102}.CDF
2009-11-16 11:20:53 86016 ----a-w- c:\windows\system32\cttele.dll
2009-11-16 11:20:53 409600 ----a-w- c:\windows\system32\wrap_oal.dll
2009-11-16 11:20:53 114688 ----a-w- c:\windows\system32\OpenAL32.dll
2009-11-16 11:19:47 0 d-----w- c:\windows\system32\data
2009-11-16 11:19:39 4526 ----a-w- c:\windows\system32\PerfStringBackup.INI
2009-11-16 11:18:37 0 d-----w- c:\windows\system32\wbem\Performance
2009-11-16 03:04:56 0 d-sh--we c:\programdata\Documents
2009-11-16 03:04:56 0 d-sh--w- C:\Recovery
2009-11-16 02:18:40 0 d-----w- C:\Windows.old
2009-11-15 22:12:47 32768 ----a-w- C:\BCD_Backup
2009-11-15 22:12:47 0 --sha-w- C:\BCD_Backup.LOG2
2009-11-15 22:12:47 0 --sha-w- C:\BCD_Backup.LOG1
2009-11-15 18:38:04 204528 --sh--r- C:\GRLDR
2009-11-10 16:41:06 25024 ----a-w- c:\windows\system32\mrtstub.exe
2009-11-10 09:38:36 12625408 ----a-w- c:\windows\system32\wmploc.DLL
2009-11-10 09:38:32 728648 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2009-11-10 09:38:32 71168 ----a-w- c:\windows\system32\fontsub.dll
2009-11-10 09:38:32 507568 ----a-w- c:\windows\system32\winload.exe
2009-11-10 09:38:32 442920 ----a-w- c:\windows\system32\winresume.exe
2009-11-10 09:38:32 293888 ----a-w- c:\windows\system32\atmfd.dll
2009-11-10 09:38:32 2613248 ----a-w- c:\windows\explorer.exe
2009-11-10 09:38:32 1320960 ----a-w- c:\windows\system32\CertEnroll.dll
2009-11-10 09:38:32 108544 ----a-w- c:\windows\system32\t2embed.dll

==================== Find3M ====================

2009-11-04 21:54:12 214664 ----a-w- c:\windows\system32\drivers\mfehidk.sys
2009-11-03 01:42:06 195456 ------w- c:\windows\system32\MpSigStub.exe
2009-09-27 22:47:30 2173544 ----a-w- c:\windows\system32\nvcplui.exe
2009-09-27 22:47:00 92776 ----a-w- c:\windows\system32\nvmctray.dll
2009-09-27 22:47:00 805480 ----a-w- c:\windows\system32\nvsvc.dll
2009-09-27 22:47:00 4033128 ----a-w- c:\windows\system32\nvvitvs.dll
2009-09-27 22:47:00 3553896 ----a-w- c:\windows\system32\nvgames.dll
2009-09-27 22:47:00 3172968 ----a-w- c:\windows\system32\nvwss.dll
2009-09-27 22:47:00 215656 ----a-w- c:\windows\system32\nvvsvc.exe
2009-09-27 22:47:00 195176 ----a-w- c:\windows\system32\nvmccss.dll
2009-09-27 22:47:00 150120 ----a-w- c:\windows\system32\nvshext.dll
2009-09-27 22:47:00 1309288 ----a-w- c:\windows\system32\nvsvs.dll
2009-09-27 22:47:00 1292904 ----a-w- c:\windows\system32\nvmobls.dll
2009-09-27 22:46:00 4942440 ----a-w- c:\windows\system32\nvdisps.dll
2009-09-27 22:46:00 13949544 ----a-w- c:\windows\system32\nvcpl.dll
2009-09-10 05:52:05 257024 ----a-w- c:\windows\system32\msv1_0.dll
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:41:57 174 --sha-w- c:\program files\desktop.ini
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-10 21:26:35 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2009-07-14 01:15:35 24064 --sha-w- c:\windows\system32\config\systemprofile\ntuser.dll
2009-07-14 01:15:35 24064 --sha-w- c:\windows\system32\config\systemprofile\appdata\roaming\microsoft\windows\start menu\programs\startup\scandisk.dll
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 7:13:55.89 ===============

DDS (Ver_09-12-01.01)

Microsoft Windows 7 Ultimate
Boot Device: \Device\HarddiskVolume1
Install Date: 11/15/2009 10:05:53 PM
System Uptime: 12/7/2009 6:53:30 AM (1 hours ago)

Motherboard: Dell Inc. | | 0K3464
Processor: Intel® Pentium® 4 CPU 3.60GHz | Microprocessor | 3591/800mhz

==== Disk Partitions =========================

A: is Removable
C: is FIXED (NTFS) - 149 GiB total, 21.755 GiB free.
D: is FIXED (NTFS) - 279 GiB total, 42.131 GiB free.
E: is CDROM ()
F: is CDROM ()

==== Disabled Device Manager Items =============

==== System Restore Points ===================

No restore point in system.

==== Installed Programs ======================

Adobe Flash Player 10 ActiveX
Adobe Flash Player 10 Plugin
Adobe Reader 9.2
Advertising Center
DolbyFiles
Google Chrome
HijackThis 2.0.2
ImagXpress
Java™ 6 Update 17
Malwarebytes' Anti-Malware
McAfee Virtual Technician
Menu Templates - Starter Kit
Microsoft Flight Simulator X
Microsoft Flight Simulator X Service Pack 1
Microsoft Silverlight
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Movie Templates - Starter Kit
Mozilla Firefox (3.5.5)
MSXML 4.0 SP2 (KB954430)
MSXML 4.0 SP2 (KB973688)
MSXML 4.0 SP2 Parser and SDK
Nero 9 Trial
Nero BurnRights
Nero ControlCenter
Nero CoverDesigner
Nero Disc Copy Gadget
Nero DiscSpeed
Nero DriveSpeed
Nero InfoTool
Nero Installer
Nero PhotoSnap
Nero Recode
Nero Rescue Agent
Nero ShowTime
Nero StartSmart
Nero Vision
Nero WaveEditor
NeroBurningROM
NeroExpress
neroxml
NVIDIA Drivers
NVIDIA PhysX
NVIDIA Stereoscopic 3D Driver
SoundTrax
WinZip 12.1

==== Event Viewer Messages From Past Week ========

12/6/2009 11:24:29 AM, Error: Service Control Manager [7016] - The NVIDIA Display Driver Service service has reported an invalid current state 32.
12/3/2009 6:59:40 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the Windows Error Reporting Service service to connect.
12/3/2009 6:11:52 PM, Error: Microsoft-Windows-Kernel-General [6] - An I/O operation initiated by the Registry failed unrecoverably.The Registry could not flush hive (file): '\SystemRoot\System32\Config\SOFTWARE'.
12/3/2009 6:11:34 PM, Error: atapi [11] - The driver detected a controller error on \Device\Ide\IdePort1.
12/3/2009 6:11:07 PM, Error: Microsoft-Windows-Kernel-General [6] - An I/O operation initiated by the Registry failed unrecoverably.The Registry could not flush hive (file): '\??\C:\Users\david\ntuser.dat'.
12/3/2009 6:09:37 PM, Error: Microsoft-Windows-Kernel-General [6] - An I/O operation initiated by the Registry failed unrecoverably.The Registry could not flush hive (file): ''.
12/1/2009 8:52:50 PM, Error: Microsoft-Windows-WER-SystemErrorReporting [1001] - The computer has rebooted from a bugcheck. The bugcheck was: 0x0000007e (0xc0000005, 0x85b56954, 0x80e47624, 0x80e47200). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 120109-29920-01.
12/1/2009 6:56:11 AM, Error: Microsoft-Windows-WER-SystemErrorReporting [1001] - The computer has rebooted from a bugcheck. The bugcheck was: 0x00000050 (0x9b5cfb98, 0x00000000, 0x85b52e27, 0x00000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 120109-27846-01.
11/30/2009 10:05:55 AM, Error: Microsoft-Windows-WER-SystemErrorReporting [1001] - The computer has rebooted from a bugcheck. The bugcheck was: 0x0000007e (0xc0000005, 0x85b54954, 0x80e4f624, 0x80e4f200). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: 113009-28969-01.

==== End Of File ===========================

#4 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 07 December 2009 - 02:23 PM

Hello, mafiosoman and again
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the Posted Image button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the Posted Image button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.




Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#5 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 07 December 2009 - 07:28 PM

Here is my gmer scan.......


GMER 1.0.15.15252 - http://www.gmer.net
Rootkit scan 2009-12-07 19:20:39
Windows 6.1.7600
Running: gmer.exe; Driver: C:\Users\david\AppData\Local\Temp\pglcapod.sys


---- System - GMER 1.0.15 ----

INT 0x1F \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83026AF8
INT 0x37 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83026104
INT 0xC1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830263F4
INT 0xD1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 8300F2D8
INT 0xD2 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 8300E898
INT 0xDF \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830261DC
INT 0xE1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83026958
INT 0xE3 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830266F8
INT 0xFD \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83026F2C
INT 0xFE \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830271A8

---- Kernel code sections - GMER 1.0.15 ----

.text ntoskrnl.exe!ZwSaveKeyEx + 13B1 82C418E9 1 Byte [06]
.text ntoskrnl.exe!KiDispatchInterrupt + 5A2 82C613B2 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
? System32\Drivers\spie.sys The system cannot find the path specified. !
.text USBPORT.SYS!DllUnload 936A4CA0 5 Bytes JMP 861084E0
.text peauth.sys 9B95DC9D 28 Bytes [0F, F2, CD, 93, 66, CE, 39, ...]
.text peauth.sys 9B95DCC1 28 Bytes [0F, F2, CD, 93, 66, CE, 39, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 4F90 9BAE4000 290 Bytes [8B, FF, 55, 8B, EC, 33, C0, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 50B3 9BAE4123 629 Bytes [F5, AD, 9B, FE, 05, 34, F5, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 5329 9BAE4399 101 Bytes [6A, 28, 59, A5, 5E, C6, 03, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 538F 9BAE43FF 148 Bytes [18, 5D, C2, 14, 00, 8B, FF, ...]
PAGE spsys.sys!?SPRevision@@3PADA + 543B 9BAE44AB 2228 Bytes [8B, FF, 55, 8B, EC, FF, 75, ...]
PAGE ...

---- User code sections - GMER 1.0.15 ----

.text C:\Windows\system32\Dwm.exe[2180] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Windows\system32\Dwm.exe[2180] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Windows\system32\Dwm.exe[2180] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Windows\system32\Dwm.exe[2180] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Windows\system32\Dwm.exe[2180] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Windows\Explorer.EXE[2228] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Windows\Explorer.EXE[2228] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Windows\Explorer.EXE[2228] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Windows\Explorer.EXE[2228] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Windows\Explorer.EXE[2228] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Windows\system32\taskhost.exe[2276] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Windows\system32\taskhost.exe[2276] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Windows\system32\taskhost.exe[2276] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Windows\system32\taskhost.exe[2276] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Windows\system32\taskhost.exe[2276] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Windows\System32\rundll32.exe[2468] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Windows\System32\rundll32.exe[2468] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Windows\System32\rundll32.exe[2468] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Program Files\Windows Sidebar\sidebar.exe[2476] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Program Files\Windows Sidebar\sidebar.exe[2476] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Program Files\Windows Sidebar\sidebar.exe[2476] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Program Files\Windows Sidebar\sidebar.exe[2476] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Program Files\Windows Sidebar\sidebar.exe[2476] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe[2484] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe[2484] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe[2484] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe[2484] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe[2484] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET
.text C:\Users\david\Desktop\gmer.exe[3872] kernel32.dll!TerminateProcess 768D509B 6 Bytes PUSH 10002A5E; RET
.text C:\Users\david\Desktop\gmer.exe[3872] kernel32.dll!FindNextFileW 768DCB2D 6 Bytes PUSH 10001BCE; RET
.text C:\Users\david\Desktop\gmer.exe[3872] kernel32.dll!FindNextFileA 768DD593 6 Bytes PUSH 10001B9A; RET
.text C:\Users\david\Desktop\gmer.exe[3872] ADVAPI32.dll!RegDeleteValueW 76A4D521 6 Bytes PUSH 10001B2B; RET
.text C:\Users\david\Desktop\gmer.exe[3872] ADVAPI32.dll!RegDeleteValueA 76A5194E 6 Bytes PUSH 10001B03; RET

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT \SystemRoot\system32\DRIVERS\pci.sys[ntoskrnl.exe!IoDetachDevice] [89E4ADDC] \SystemRoot\System32\Drivers\spie.sys
IAT \SystemRoot\system32\DRIVERS\pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [89E4AE30] \SystemRoot\System32\Drivers\spie.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortReadPortUchar] [89E20042] \SystemRoot\System32\Drivers\spie.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortWritePortUchar] [89E206D6] \SystemRoot\System32\Drivers\spie.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortWritePortBufferUshort] [89E20800] \SystemRoot\System32\Drivers\spie.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortReadPortBufferUshort] [89E2013E] \SystemRoot\System32\Drivers\spie.sys

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\WININET.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Windows\System32\rundll32.exe[2468] @ C:\Windows\system32\CRYPT32.dll [KERNEL32.dll!GetProcAddress] [754F5D3D] C:\Windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 84E191F8
Device \Driver\volmgr \Device\VolMgrControl 84E141F8
Device \Driver\usbuhci \Device\USBPDO-0 84E51500
Device \Driver\usbuhci \Device\USBPDO-1 84E51500
Device \Driver\usbuhci \Device\USBPDO-2 84E51500
Device \Driver\usbuhci \Device\USBPDO-3 84E51500
Device \Driver\usbehci \Device\USBPDO-4 861D4500
Device \Driver\volmgr \Device\HarddiskVolume1 84E141F8

AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)

Device \Driver\volmgr \Device\HarddiskVolume2 84E141F8

AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)

Device \Driver\cdrom \Device\CdRom0 85FE81F8
Device \Driver\cdrom \Device\CdRom1 85FE81F8
Device \Driver\atapi \Device\Ide\IdeDeviceP0T0L0-0 84E161F8
Device \Driver\atapi \Device\Ide\IdeDeviceP2T0L0-3 84E161F8
Device \Driver\atapi \Device\Ide\IdePort0 84E161F8
Device \Driver\atapi \Device\Ide\IdePort1 84E161F8
Device \Driver\atapi \Device\Ide\IdePort2 84E161F8
Device \Driver\atapi \Device\Ide\IdePort3 84E161F8
Device \Driver\atapi \Device\Ide\IdePort4 84E161F8
Device \Driver\msahci \Device\Ide\PciIde1Channel0 84E171F8
Device \Driver\msahci \Device\Ide\PciIde1Channel1 84E171F8
Device \Driver\msahci \Device\Ide\PciIde1Channel2 84E171F8
Device \Driver\msahci \Device\Ide\PciIde1Channel3 84E171F8
Device \Driver\atapi \Device\Ide\IdeDeviceP0T1L0-1 84E161F8
Device \Driver\NetBT \Device\NetBt_Wins_Export 860F01F8
Device \Driver\ACPI_HAL \Device\0000004f halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)
Device \Driver\NetBT \Device\NetBT_Tcpip_{DE8FE60E-BA1E-4674-AA88-52A6996B4EC1} 860F01F8
Device \Driver\usbuhci \Device\USBFDO-0 84E51500
Device \Driver\usbuhci \Device\USBFDO-1 84E51500
Device \Driver\usbuhci \Device\USBFDO-2 84E51500
Device \Driver\usbuhci \Device\USBFDO-3 84E51500
Device \Driver\usbehci \Device\USBFDO-4 861D4500
Device \Driver\00000715 -> \Driver\atapi \Device\Harddisk0\DR0 85B54170

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xD4 0xC3 0x97 0x02 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x1B 0x87 0xA9 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0xD4 0xC3 0x97 0x02 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x1B 0x87 0xA9 0x00 ...

---- Files - GMER 1.0.15 ----

File C:\Windows\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

#6 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 08 December 2009 - 02:12 PM

Hi,


One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards.





Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2
  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:
    :filefind
    atapi*
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 08 December 2009 - 06:51 PM

Here is my system look scan.....I have 2 hard drives C an D.......Could some thing else be in D also? or do the scans search through both drives?


SystemLook v1.0 by jpshortstuff (29.08.09)
Log created at 18:36 on 08/12/2009 by david (Administrator - Elevation successful)

========== filefind ==========

Searching for "atapi*"
C:\System Volume Information\SystemRestore\FRStaging\Windows\System32\drivers\atapi(69).sys --a--- 21584 bytes [23:11 13/07/2009] [01:26 14/07/2009] 338C86357871C167A96AB976519BF59E
C:\Windows.old\Windows\System32\DriverStore\FileRepository\mshdc.inf_7de13c21\atapi.sys --a--- 21560 bytes [02:16 15/02/2008] [02:16 15/02/2008] B35CFCEF838382AB6490B321C87EDF17
C:\Windows.old\Windows\System32\DriverStore\FileRepository\mshdc.inf_c6c2e699\atapi.sys --a--- 19048 bytes [10:25 02/11/2006] [09:49 02/11/2006] 4F4FCB8B6EA06784FB6D475B7EC7300F
C:\Windows.old\Windows\System32\drivers\atapi.sys --a--- 21560 bytes [02:16 15/02/2008] [02:16 15/02/2008] B35CFCEF838382AB6490B321C87EDF17
C:\Windows.old\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6000.16632_none_db337a442479c42c\atapi.sys --a--- 21560 bytes [02:16 15/02/2008] [02:16 15/02/2008] B35CFCEF838382AB6490B321C87EDF17
C:\Windows.old\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.0.6000.20757_none_dbac78a93da31a8b\atapi.sys --a--- 21560 bytes [02:16 15/02/2008] [02:16 15/02/2008] E03E8C99D15D0381E02743C36AFC7C6F
C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_x86_neutral_f64b9c35a3a5be81\atapi.sys --a--- 21584 bytes [23:11 13/07/2009] [01:26 14/07/2009] 338C86357871C167A96AB976519BF59E
C:\Windows\System32\drivers\atapi.sys --a--- 21584 bytes [23:11 13/07/2009] [01:26 14/07/2009] 338C86357871C167A96AB976519BF59E
C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_dd0e7e3d82dd640d\atapi.sys --a--- 21584 bytes [23:11 13/07/2009] [01:26 14/07/2009] 338C86357871C167A96AB976519BF59E

-=End Of File=-

#8 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 10 December 2009 - 02:35 PM

We now only check for some systemfiles, later we will scan all drives :(.

  • Download The Avenger by Swandog46 from here.
  • Unzip/extract it to a folder on your desktop.
  • Double click on avenger.exe to run The Avenger.
  • Click OK.
  • Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.
  • Copy all of the text in the below code box to the clipboard by highlighting it and then pressing Ctrl+C.
    Files to move:C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_dd0e7e3d82dd640d\atapi.sys | C:\Windows\System32\drivers\atapi.sys
  • In the avenger window, click the Paste Script from Clipboard, Posted Image button.
  • Click the Execute button.
  • You will be asked Are you sure you want to execute the current script?.
  • Click Yes.
  • You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot. Reboot now?.
  • Click Yes.
  • Your PC will now be rebooted.
  • Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.
  • After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).
  • Please post this log, along with a new HijackThis log in your next reply.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#9 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 10 December 2009 - 06:46 PM

Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows Vista

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!


Error: could not move file "C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_dd0e7e3d82dd640d\atapi.sys"
File move operation "C:\Windows\winsxs\x86_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_dd0e7e3d82dd640d\atapi.sys|C:\Windows\System32\drivers\atapi.sys" failed!
Status: 0xc0000022 (STATUS_ACCESS_DENIED)


Completed script processing.

*******************

Finished! Terminate.


Hijack this Log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 6:44:34 PM, on 12/10/2009
Platform: Unknown Windows (WinNT 6.01.3504)
MSIE: Internet Explorer v8.00 (8.00.7600.16385)
Boot mode: Normal

Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskhost.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\NOTEPAD.EXE
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Windows Sidebar\sidebar.exe
C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe
C:\Users\david\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\david\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\SearchFilterHost.exe
G:\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = Preserve
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O4 - HKLM\..\Run: [CTxfiHlp] CTXFIHLP.EXE
O4 - HKLM\..\Run: [CTHelper] CTHELPER.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [Google Update] "C:\Users\david\AppData\Local\Google\Update\GoogleUpdate.exe" /c
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [DevconDefaultDB] C:\Windows\system32\READREG /SILENT /FAIL=1 (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [DevconDefaultDB] C:\Windows\system32\READREG /SILENT /FAIL=1 (User 'Default user')
O13 - Gopher Prefix:
O15 - Trusted Zone: http://*.mcafee.com
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe

--
End of file - 3906 bytes

#10 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 11 December 2009 - 01:13 PM

Please try avenger again, now with this script:

Files to move:
C:\Windows.old\Windows\System32\drivers\atapi.sys | C:\Windows\System32\drivers\atapi.sys

By the way:

I see the folder windows.old. That means you have installed windows over an existing windows on your harddrive. Why did you that in that way?
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#11 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 11 December 2009 - 04:46 PM

I was upgrading from windows Vista to windows 7 and it automatically made a windows old folder. I maybe should have done a clean install. I'm also having some trouble now with my graphics card. it's now saying windows disabled the card because it was having trouble. I tried avenger again but I dont think it was successful. here is the avenger log. thanks for your help and patience.




Logfile of The Avenger Version 2.0, © by Swandog46
http://swandog46.geekstogo.com

Platform: Windows Vista

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!


Error: could not move file "C:\Windows.old\Windows\System32\drivers\atapi.sys"
File move operation "C:\Windows.old\Windows\System32\drivers\atapi.sys|C:\Windows\System32\drivers\atapi.sys" failed!
Status: 0xc0000022 (STATUS_ACCESS_DENIED)


Completed script processing.

*******************

Finished! Terminate.

#12 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 12 December 2009 - 08:59 AM

Make sure you can View Hidden Files. Also uncheck "Hide Extensions for Known File Types". If you need help doing this, please refer to this tutorial for help: How to see hidden files in Windows

Right click My Computer, left click Explore, then make sure that view is reduced (press the "double-square" symbol upper right hand corner) so you can also see the desktop.

Navigate to the following folder:

C:\Windows\System32\Drivers <----

If needed go to View and click List, to make the file view easier to look through.

Then locate the following files, right click them, drag thrm to the desktop, release and select Move Here:

atapi.sys

Then press F5 to refresh the view, and make sure Windows replaced the atapi.sys file in the Drivers folder. If it did not, let me know here and put the desktop copy back in the Drivers folder by reversing the steps just done.

Either way let me know how you did with that before we move to some next steps.

Edited by schrauber, 12 December 2009 - 09:00 AM.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#13 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 12 December 2009 - 01:15 PM

I located the atapi.sys file in windows. When I try to move it I get a pop up saying:


File access denied

You need permission to perform this action

You require permission from TrustedInstaller to make changes to this file

atapi.sys
File description: ATAPI IDE Miniport Driver
Company: Microsoft Corporation
File Version: 6.1.7600.16385
Date created: 7/13/2009 7:11pm
Size: 21.0KB


I dont know if this has anything to do with this but I don't have administrator rights and I'm not sure how to get them back.

#14 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:05:10 PM

Posted 12 December 2009 - 01:40 PM

Is this a business-system?
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#15 mafiosoman

mafiosoman
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:11:10 AM

Posted 12 December 2009 - 01:42 PM

no this is my home PC....




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users