Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Mebroot.Trojan Virus Problem?


  • This topic is locked This topic is locked
6 replies to this topic

#1 matza2000

matza2000

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 13 December 2009 - 08:19 AM

Basically I was infected by the mebroot virus via the drive by website method. I tried to clear it but to no avail. I have been infected before and decided the last route of action would be a reformat. I performed that and reinstalled Windows XP. Gmre.net' detector does not find it, it says that my kernal and mbr are fine. I have tried malwarebytesd software, that also say thats i am clean. But when i run combofix it says that a .dll called qprm is infected. The problem is, that if i boot into my windows installation my computer freezes so i cannot do anything. But when i boot into safe mode I cannot update virus defintions for norton anti virus checker and the computer just keeps freezing at every given oppurtunity so therefore i cannot complete gmre scans etc. I tried the fix mbr in windows recovery with a safe mode virus check - does not find anything. But the the computer is running choppy which is unusual and the system process keeps spiking up to 2% which it doesnt usually do and svchost sometimes goes to 50%. I would like to post my combofix.log file but it is on the infected computer which has no access to the interenet. If i cannot do anything then I am considering using something such as killdisk to change all entries on harddisk to '0'.

Edit: Moved topic from Am I Infected to the more appropriate forum, with the addition of a ComboFix log. ~ Animal

BC AdBot (Login to Remove)

 


#2 matza2000

matza2000
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 13 December 2009 - 11:08 AM

An update - I have searched the computer now thoroughly with eset nod 32 online scan , kapersky online scan, norton 360 scan, nod 32 program scan, none of which have found anything. MBAM found nothing, spy doctor found nothing, a2 sqaured found nothing, cureit found nothing, MBR.exe from gmer found nothing. Though the Gmer program sends my computer in to Blue screen everytime it reaches a certain system file :S and Combofix repreatedly finds a virus in qmgr.dll, says it has fixed it and then the file reappears the next time i run combofix. Here is the combofix log.

ComboFix 09-12-11.05 - Matt 13/12/2009 16:01:50.5.2 - x86
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.3071.2647 [GMT 0:00]
Running from: c:\documents and settings\Matt\Desktop\ComboFix.exe
.

((((((((((((((((((((((((( Files Created from 2009-11-13 to 2009-12-13 )))))))))))))))))))))))))))))))
.

2009-12-13 15:41 . 2009-12-13 15:41 -------- d-----w- c:\program files\ESET
2009-12-13 14:43 . 2006-09-13 05:01 1084416 -c----w- c:\windows\system32\dllcache\msxml3.dll
2009-12-13 14:43 . 2006-08-14 10:34 332928 -c----w- c:\windows\system32\dllcache\srv.sys
2009-12-13 14:43 . 2006-06-22 05:06 1435648 -c----w- c:\windows\system32\dllcache\query.dll
2009-12-13 14:43 . 2006-06-22 05:06 69120 -c----w- c:\windows\system32\dllcache\ciodm.dll
2009-12-13 14:43 . 2006-09-04 06:08 1494016 -c----w- c:\windows\system32\dllcache\shdocvw.dll
2009-12-13 14:43 . 2006-05-19 12:59 94720 -c----w- c:\windows\system32\dllcache\iphlpapi.dll
2009-12-13 14:43 . 2006-05-19 12:59 111616 -c----w- c:\windows\system32\dllcache\dhcpcsvc.dll
2009-12-13 14:42 . 2009-12-13 15:17 -------- d--h--w- c:\windows\$hf_mig$
2009-12-13 14:40 . 2009-12-13 14:46 -------- d-----w- c:\program files\a-squared Free
2009-12-13 14:17 . 2009-12-13 14:17 -------- d-----w- c:\documents and settings\Matt\DoctorWeb
2009-12-13 12:14 . 2009-12-13 12:14 -------- d-----w- c:\documents and settings\Administrator\Local Settings\Application Data\Symantec
2009-12-13 00:49 . 2009-12-13 14:02 -------- dc----w- c:\windows\system32\DRVSTORE
2009-12-13 00:49 . 2009-12-13 14:02 -------- d-----w- c:\documents and settings\All Users\Application Data\Norton
2009-12-13 00:47 . 2009-12-13 00:47 13104 ----a-w- c:\documents and settings\Matt\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2009-12-13 00:45 . 2009-12-13 12:50 -------- d-----w- c:\windows\system32\wbem\AutoRecover
2009-12-13 00:39 . 2009-12-13 00:39 -------- d-----w- c:\windows\peernet
2009-12-13 00:38 . 2009-12-13 00:38 -------- d-----w- c:\windows\EHome
2009-12-12 23:35 . 2006-08-16 11:58 100352 -c----w- c:\windows\system32\dllcache\6to4svc.dll
2009-12-12 23:35 . 2006-08-16 09:37 225664 -c----w- c:\windows\system32\dllcache\tcpip6.sys
2009-12-12 23:35 . 2006-07-14 15:31 332288 -c----w- c:\windows\system32\dllcache\netapi32.dll
2009-12-12 23:35 . 2006-06-22 10:47 181248 -c----w- c:\windows\system32\dllcache\rasmans.dll
2009-12-12 23:35 . 2006-07-13 13:33 8453632 -c----w- c:\windows\system32\dllcache\shell32.dll
2009-12-12 23:35 . 2006-05-18 05:24 450560 -c----w- c:\windows\system32\dllcache\jscript.dll
2009-12-12 23:35 . 2006-04-20 11:51 359808 -c----w- c:\windows\system32\dllcache\tcpip.sys
2009-12-12 23:35 . 2006-08-25 15:45 617472 -c----w- c:\windows\system32\dllcache\comctl32.dll
2009-12-12 23:35 . 2006-03-17 00:38 28672 ------w- c:\windows\system32\verclsid.exe
2009-12-12 23:06 . 2009-12-13 00:48 -------- d-----w- c:\documents and settings\All Users\Application Data\NortonInstaller
2009-12-12 22:55 . 2009-12-12 22:55 -------- d-----w- c:\documents and settings\Matt\Local Settings\Application Data\Threat Expert
2009-12-12 22:50 . 2009-12-12 23:17 -------- d---a-w- c:\documents and settings\All Users\Application Data\TEMP
2009-12-12 22:45 . 2006-06-26 17:37 8192 -c----w- c:\windows\system32\dllcache\rasadhlp.dll
2009-12-12 22:45 . 2006-06-26 17:37 148480 -c----w- c:\windows\system32\dllcache\dnsapi.dll
2009-12-12 22:44 . 2009-12-12 22:44 -------- d-----w- c:\windows\nview
2009-12-12 22:44 . 2009-03-28 00:03 453152 ----a-w- c:\windows\system32\nvudisp.exe
2009-12-12 22:38 . 2009-12-12 22:38 -------- d-----w- c:\program files\AGEIA Technologies
2009-12-12 22:38 . 2009-12-12 22:38 -------- d-----w- c:\windows\system32\AGEIA
2009-12-12 22:36 . 2009-12-12 22:36 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2009-12-12 22:36 . 2009-12-12 22:36 -------- d-----w- c:\documents and settings\All Users\Application Data\NVIDIA Corporation
2009-12-12 22:36 . 2009-12-12 22:44 -------- d-----w- c:\program files\NVIDIA Corporation
2009-12-12 22:35 . 2009-12-12 22:35 -------- d-----w- C:\NVIDIA
2009-12-12 22:29 . 2009-12-12 22:29 552 ----a-w- c:\windows\system32\d3d8caps.dat
2009-12-12 22:29 . 2009-12-12 22:29 -------- d-----w- c:\program files\SystemRequirementsLab
2009-12-12 21:52 . 2009-12-12 21:52 -------- d-----w- c:\windows\Sun
2009-12-12 21:52 . 2009-12-12 21:52 411368 ----a-w- c:\windows\system32\deploytk.dll
2009-12-12 21:52 . 2009-12-12 21:52 -------- d-----w- c:\program files\Java
2009-12-12 21:51 . 2009-12-12 21:51 152576 ----a-w- c:\documents and settings\Matt\Application Data\Sun\Java\jre1.6.0_17\lzma.dll
2009-12-12 21:51 . 2009-12-12 21:51 79488 ----a-w- c:\documents and settings\Matt\Application Data\Sun\Java\jre1.6.0_17\gtapi.dll
2009-12-12 21:51 . 2009-12-12 21:51 -------- d-s---w- c:\documents and settings\Matt\UserData
2009-12-12 21:47 . 2009-08-06 19:24 327896 ----a-w- c:\windows\system32\wucltui.dll
2009-12-12 21:47 . 2009-08-06 19:24 209632 ----a-w- c:\windows\system32\wuweb.dll
2009-12-12 21:47 . 2009-08-06 19:24 35552 ----a-w- c:\windows\system32\wups.dll
2009-12-12 21:47 . 2009-08-06 19:23 575704 ----a-w- c:\windows\system32\wuapi.dll
2009-12-12 21:47 . 2004-08-03 14:03 186136 ----a-w- c:\windows\system32\wuaueng1.dll
2009-12-12 21:47 . 2004-08-03 14:01 167704 ----a-w- c:\windows\system32\wuauclt1.exe
2009-12-12 21:07 . 2009-12-12 21:07 -------- d-----w- c:\documents and settings\Matt\Application Data\Malwarebytes
2009-12-12 21:07 . 2009-12-12 21:07 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2009-12-12 21:07 . 2009-12-12 21:22 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2009-12-12 15:54 . 2004-08-03 23:15 82944 ----a-w- c:\windows\system32\drivers\wdmaud.sys
2009-12-12 15:54 . 2004-08-03 23:07 52864 ----a-w- c:\windows\system32\drivers\dmusic.sys
2009-12-12 12:44 . 2004-08-03 23:07 6400 ----a-w- c:\windows\system32\drivers\splitter.sys
2009-12-12 12:43 . 2009-12-12 12:43 -------- d-----w- c:\windows\system32\Lang
2009-12-12 12:41 . 2007-01-02 05:32 1191936 ------r- c:\windows\RtlUpd.exe
2009-12-12 12:41 . 2006-05-04 08:35 9709568 ------r- c:\windows\RTLCPL.exe
2009-12-12 12:41 . 2007-01-30 10:57 4474368 ------r- c:\windows\system32\drivers\RtkHDAud.sys
2009-12-12 12:41 . 2007-01-30 10:54 16116224 ------r- c:\windows\RTHDCPL.exe
2009-12-12 12:41 . 2006-10-11 09:42 2157568 ------r- c:\windows\MicCal.exe
2009-12-12 12:41 . 2005-05-03 10:43 69632 ------r- c:\windows\Alcmtr.exe
2009-12-12 12:41 . 2006-05-04 08:26 2808832 ------r- c:\windows\alcwzrd.exe
2009-12-12 12:41 . 2009-12-12 12:41 -------- d-----w- c:\program files\Realtek
2009-12-12 12:41 . 2009-12-12 12:41 315392 ----a-w- c:\windows\HideWin.exe
2009-12-12 12:41 . 2009-12-12 12:41 -------- d--h--w- c:\program files\InstallShield Installation Information
2009-12-12 12:41 . 2007-01-04 10:26 520192 ------r- c:\windows\RtlExUpd.dll
2009-12-12 12:41 . 2009-12-12 12:41 -------- d-----w- c:\program files\Common Files\InstallShield
2009-12-12 12:40 . 2005-06-28 09:21 22752 ----a-w- c:\windows\system32\spupdsvc.exe
2009-12-12 12:39 . 2006-10-05 16:35 356352 ------w- c:\windows\system32\nvuide.exe
2009-12-12 12:38 . 2006-11-07 14:58 356352 ----a-w- c:\windows\system32\nvunrm.exe
2009-12-12 12:38 . 2006-10-24 13:13 1732 ----a-w- c:\windows\system32\drivers\nvphy.bin
2009-12-12 12:38 . 2009-11-19 21:42 592488 ----a-w- c:\windows\system32\NVUNINST.EXE
2009-12-12 12:38 . 2009-12-12 12:38 -------- d-----w- c:\documents and settings\Matt\Application Data\InstallShield
2009-12-12 12:37 . 2009-12-12 12:53 14656 ----a-w- c:\windows\gdrv.sys
2009-12-12 11:57 . 2009-12-12 11:57 -------- d-----w- c:\documents and settings\All Users\Application Data\ESET

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2009-12-13 00:41 . 2009-12-12 00:31 76487 ----a-w- c:\windows\PCHealth\HelpCtr\OfflineCache\index.dat
2009-12-12 00:31 . 2009-12-12 00:31 -------- d-----w- c:\program files\microsoft frontpage
2009-12-12 00:31 . 2009-12-12 00:31 558142 ----a-w- c:\windows\java\Packages\KQN5RDJ7.ZIP
2009-12-12 00:31 . 2009-12-12 00:31 2678 ----a-w- c:\windows\java\Packages\Data\QHNZPB5F.DAT
2009-12-12 00:31 . 2009-12-12 00:31 2678 ----a-w- c:\windows\java\Packages\Data\4X3PBHND.DAT
2009-12-12 00:31 . 2009-12-12 00:31 155995 ----a-w- c:\windows\java\Packages\8MTJZRBV.ZIP
2009-12-12 00:31 . 2009-12-12 00:31 2678 ----a-w- c:\windows\java\Packages\Data\STZJV1ZP.DAT
2009-12-12 00:31 . 2009-12-12 00:31 2678 ----a-w- c:\windows\java\Packages\Data\LNNB5RJD.DAT
2009-12-12 00:31 . 2009-12-12 00:31 2678 ----a-w- c:\windows\java\Packages\Data\CHB79FFR.DAT
2009-12-12 00:28 . 2009-12-12 00:28 21640 ----a-w- c:\windows\system32\emptyregdb.dat
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2007-01-30 16116224]
"SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-12-12 149280]
"NvCplDaemon"="c:\windows\System32\NvCpl.dll" [2009-03-28 13684736]
"nwiz"="nwiz.exe" [2009-03-28 1657376]
"NvMediaCenter"="c:\windows\System32\NvMcTray.dll" [2009-03-28 86016]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2004-08-04 15360]

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SkyTel]
2006-05-16 10:04 2879488 ------r- c:\windows\SkyTel.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"wscsvc"=2 (0x2)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=

R2 a2free;a-squared Free Service;c:\program files\a-squared Free\a2service.exe [13/12/2009 14:40 1858144]
.
------- Supplementary Scan -------
.
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-12-13 16:02
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\iv31]
"FriendlyName"="Intel Indeo® Video R3.2"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"ClassManagerFlags"=dword:00000001

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\iv32]
"FriendlyName"="Intel Indeo® Video R3.2"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\iyuv]
"FriendlyName"="Intel IYUV codec"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="iyuv"
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\m261]
"FriendlyName"="Microsoft H.261 Video Codec"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="m261"
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\m263]
"FriendlyName"="Microsoft H.263 Video Codec"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="m263"
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\mrle]
"FriendlyName"="Microsoft RLE"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="mrle"
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\msvc]
"FriendlyName"="Microsoft Video 1"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="msvc"
"ClassManagerFlags"=dword:00000000

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\uyvy]
"FriendlyName"="Microsoft YUV"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="uyvy"
"ClassManagerFlags"=dword:00000001

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\yuy2]
"FriendlyName"="Microsoft YUV"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="yuy2"
"ClassManagerFlags"=dword:00000001

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\yvu9]
"FriendlyName"="Toshiba YUV Codec"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="yvu9"
"ClassManagerFlags"=dword:00000001

[HKEY_USERS\S-1-5-21-606747145-884357618-839522115-1004\Software\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-1**********************\yvyu]
"FriendlyName"="Microsoft YUV"
"CLSID"="{D76E2820-1563-11CF-AC98-00AA004C0FA9}"
"FilterData"=hex:02,00,00,00,00,00,20,00,02,00,00,00,00,00,00,00,30,70,69,33,
00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,00,30,74,79,33,00,\
"FccHandler"="yvyu"
"ClassManagerFlags"=dword:00000001
.
Completion time: 2009-12-13 16:03:31
ComboFix-quarantined-files.txt 2009-12-13 16:03

Pre-Run: 492,665,028,608 bytes free
Post-Run: 492,643,287,040 bytes free

- - End Of File - - 0CA9EB629DD5E08BBDD399F8CED234C9

#3 matza2000

matza2000
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 17 December 2009 - 10:56 AM

Pasting in content from initial post made Dec. 16, 2009 in other forum referenced below. ~ OB

I reformatted, tried the /fixmbr etc. after i got this virus. I thought that the computer was clear, but my computer persistently crashes and the svchost.exe seems to be taking large amounts of CPU and there is an mbr.sys file in /~1local/temp/. Confused as to what to do. No virus checkers pick it up, mbr.exe says that the system is clear, combofix is the same but there is clear indication that the virus is still here
Thanks in advance for help

End of added content. ~ OB

I was told to post here by 'boopme'
'Hello and welcome. Probably best to run to run HJT/DDS now.

Please follow this guide. Preparation Guide For Use Before Using Hijackthis. Then go here HijackThis Logs and Virus/Trojan/Spyware/Malware Removal ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK. '

Here is the DDS.txt file, do I need to post the attach.txt as it says not to unless instructed.


DDS (Ver_09-12-01.01) - NTFSx86
Run by Matt at 15:51:27.67 on 17/12/2009
Internet Explorer: 6.0.2800.1106
Microsoft Windows XP Home Edition 5.1.2600.1.1252.1.1033.18.3071.2808 [GMT 0:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\System32\ctfmon.exe
C:\Documents and Settings\Matt\Desktop\dds.scr

============== Pseudo HJT Report ===============

EB: Media Band: {32683183-48a0-441b-a342-7c2a440a9478} - %SystemRoot%\System32\browseui.dll
uRun: [CTFMON.EXE] c:\windows\system32\ctfmon.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SkyTel] SkyTel.EXE
mRun: [Alcmtr] ALCMTR.EXE
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
IE: {c95fe080-8f5d-11d2-a20b-00aa003c157a} - %SystemRoot%\web\related.htm
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab

============= SERVICES / DRIVERS ===============

S3 rootrepeal;rootrepeal;\??\c:\windows\system32\drivers\rootrepeal.sys --> c:\windows\system32\drivers\rootrepeal.sys [?]

=============== Created Last 30 ================

2009-12-17 15:51:08 940794 ----a-w- c:\windows\system32\LoopyMusic.wav
2009-12-17 15:51:08 146650 ----a-w- c:\windows\system32\BuzzingBee.wav
2009-12-17 15:51:08 0 d-----w- c:\windows\system32\Lang
2009-12-17 15:33:20 47 ----a-w- c:\windows\wininit.ini
2009-12-17 15:32:36 0 d-s---w- c:\documents and settings\matt\UserData
2009-12-17 15:16:04 117248 ----a-w- c:\windows\system32\SET12.tmp
2009-12-17 15:15:17 0 d-----w- c:\program files\Realtek
2009-12-17 15:15:03 315392 ----a-w- c:\windows\HideWin.exe
2009-12-17 15:15:01 520192 ------r- c:\windows\RtlExUpd.dll
2009-12-17 15:13:04 22752 ----a-w- c:\windows\system32\spupdsvc.exe
2009-12-17 15:11:37 0 d-s---w- c:\windows\system32\Microsoft
2009-12-17 15:11:24 356352 ------w- c:\windows\system32\nvuide.exe
2009-12-17 15:11:24 1570 ------w- c:\windows\system32\nvide.nvu
2009-12-17 15:11:24 0 d-----w- c:\windows\system32\ReinstallBackups
2009-12-17 15:11:23 1732 ----a-w- c:\windows\system32\drivers\nvphy.bin
2009-12-17 15:11:22 3903 ----a-w- c:\windows\system32\nvnrm.nvu
2009-12-17 15:11:22 356352 ----a-w- c:\windows\system32\nvunrm.exe
2009-12-17 15:11:20 356352 ----a-w- c:\windows\system32\NVUNINST.EXE
2009-12-17 15:10:20 14656 ----a-w- c:\windows\gdrv.sys
2009-12-17 14:46:01 0 d-sh--w- c:\documents and settings\all users\DRM
2009-12-17 14:44:24 0 d-----w- c:\program files\common files\MSSoap
2009-12-17 14:43:33 0 d--h--w- c:\program files\WindowsUpdate
2009-12-17 14:43:33 0 d-----w- c:\program files\Online Services
2009-12-17 14:43:29 0 d-----w- c:\program files\Messenger
2009-12-17 14:43:21 0 d-----w- c:\program files\MSN Gaming Zone
2009-12-17 14:42:26 0 d-----w- c:\program files\Windows NT
2009-12-17 14:39:52 0 d-----w- c:\program files\common files\ODBC
2009-12-17 14:39:48 0 d-----w- c:\program files\common files\SpeechEngines
2009-12-17 14:39:17 0 d-----r- c:\documents and settings\all users\Documents

==================== Find3M ====================

2009-12-17 14:43:45 21640 ----a-w- c:\windows\system32\emptyregdb.dat

============= FINISH: 15:51:32.62 ===============

This is a fresh install of windows XP as after i last posted my harddrive failed and i could not boot up, it came up with an error before boot. Something like 'disk failure'.

I will post a rootrepeal log soon. It keeps crashing my computer whenever i run it.

Merged topics. ~ OB

Edited by Orange Blossom, 17 December 2009 - 08:40 PM.


#4 matza2000

matza2000
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 17 December 2009 - 11:08 AM

It seems that rootrepeal crashes everytime it runs. Here is the crash.log

ROOTREPEAL CRASH REPORT
-------------------------
Windows Version: Windows 2000 SP1
Exception Code: 0xc0000005
Exception Address: 0x004bbeda
Attempt to read from address: 0x00000648

#5 matza2000

matza2000
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:07:24 AM

Posted 18 December 2009 - 01:53 PM

Thank you for moving the topic here, sorry for causing confusion, but what do you think the root of my problem is and has mebroot known to physically damage hardware?

#6 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:24 AM

Posted 26 December 2009 - 03:55 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#7 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:08:24 AM

Posted 31 December 2009 - 07:07 AM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users