Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

computer keeps freezing


  • This topic is locked This topic is locked
14 replies to this topic

#1 saltydogs

saltydogs

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 27 December 2009 - 04:11 PM

In the last few days my PC has decided to freeze at various times for no particular reason. It happens in the middle of whatever I'm doing such as playing games, surfing, writing or reading email. I try to bring up Task Manager to see what is running at the time, but it won't appear and nothing responds. I have to unplug and do a power shutdown, then reboot. Numerous malware/virus/spy scans have produced nothing of concern. I even did an interior clean-out, thinking overheating might be the problem. I hadn't installed any new hardware or software proceeding this problem.
I am using WinXP Professional SP 3

BC AdBot (Login to Remove)

 


#2 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 27 December 2009 - 06:10 PM

Hello saltydogs,

When first reading this, I would have thought overheating or some type of hardware conflict but since you said you have neither installed any new software or hardware, maybe it's not. How old is your system by the way and is a prebuilt computer or did you build it yourself? You also mentioned that you ran several anti-virus, anti-spyware, and anti-malware scans; care to say which ones you ran and provide any logs that you have?

Regards,
swagger

#3 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 27 December 2009 - 06:29 PM

I have a Dell Optiplex 360 I got December 2008.

Malwarebytes' Anti-Malware 1.42
Database version: 3437
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/27/2009 12:55:35 AM
mbam-log-2009-12-27 (00-55-35).txt

Scan type: Full Scan (C:\|)
Objects scanned: 191088
Time elapsed: 23 minute(s), 18 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




Avira AntiVir Personal
Report file date: Sunday, December 27, 2009 15:01

Scanning for 1477444 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Save mode
Username : Administrator
Computer name : NEWMAIN

Version information:
BUILD.DAT : 9.0.0.418 21723 Bytes 12/2/2009 16:28:00
AVSCAN.EXE : 9.0.3.10 466689 Bytes 11/19/2009 15:21:11
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 14:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 15:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 14:58:52
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 15:21:11
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 03:51:22
VBASE002.VDF : 7.10.1.1 2048 Bytes 11/19/2009 03:51:22
VBASE003.VDF : 7.10.1.2 2048 Bytes 11/19/2009 03:51:22
VBASE004.VDF : 7.10.1.3 2048 Bytes 11/19/2009 03:51:22
VBASE005.VDF : 7.10.1.4 2048 Bytes 11/19/2009 03:51:22
VBASE006.VDF : 7.10.1.5 2048 Bytes 11/19/2009 03:51:22
VBASE007.VDF : 7.10.1.6 2048 Bytes 11/19/2009 03:51:22
VBASE008.VDF : 7.10.1.7 2048 Bytes 11/19/2009 03:51:22
VBASE009.VDF : 7.10.1.8 2048 Bytes 11/19/2009 03:51:22
VBASE010.VDF : 7.10.1.9 2048 Bytes 11/19/2009 03:51:22
VBASE011.VDF : 7.10.1.10 2048 Bytes 11/19/2009 03:51:23
VBASE012.VDF : 7.10.1.11 2048 Bytes 11/19/2009 03:51:23
VBASE013.VDF : 7.10.1.79 209920 Bytes 11/25/2009 13:04:42
VBASE014.VDF : 7.10.1.128 197632 Bytes 11/30/2009 13:32:16
VBASE015.VDF : 7.10.1.178 195584 Bytes 12/7/2009 03:46:23
VBASE016.VDF : 7.10.1.224 183296 Bytes 12/14/2009 06:29:54
VBASE017.VDF : 7.10.1.247 182272 Bytes 12/15/2009 06:29:50
VBASE018.VDF : 7.10.2.30 198144 Bytes 12/21/2009 04:33:44
VBASE019.VDF : 7.10.2.63 187392 Bytes 12/24/2009 18:41:32
VBASE020.VDF : 7.10.2.64 2048 Bytes 12/24/2009 18:41:33
VBASE021.VDF : 7.10.2.65 2048 Bytes 12/24/2009 18:41:33
VBASE022.VDF : 7.10.2.66 2048 Bytes 12/24/2009 18:41:33
VBASE023.VDF : 7.10.2.67 2048 Bytes 12/24/2009 18:41:33
VBASE024.VDF : 7.10.2.68 2048 Bytes 12/24/2009 18:41:33
VBASE025.VDF : 7.10.2.69 2048 Bytes 12/24/2009 18:41:33
VBASE026.VDF : 7.10.2.70 2048 Bytes 12/24/2009 18:41:33
VBASE027.VDF : 7.10.2.71 2048 Bytes 12/24/2009 18:41:34
VBASE028.VDF : 7.10.2.72 2048 Bytes 12/24/2009 18:41:34
VBASE029.VDF : 7.10.2.73 2048 Bytes 12/24/2009 18:41:34
VBASE030.VDF : 7.10.2.74 2048 Bytes 12/24/2009 18:41:34
VBASE031.VDF : 7.10.2.75 61440 Bytes 12/26/2009 18:41:34
Engineversion : 8.2.1.122
AEVDF.DLL : 8.1.1.2 106867 Bytes 9/16/2009 03:04:04
AESCRIPT.DLL : 8.1.3.4 586105 Bytes 12/22/2009 04:33:51
AESCN.DLL : 8.1.3.0 127348 Bytes 12/11/2009 03:46:25
AESBX.DLL : 8.1.1.1 246132 Bytes 11/19/2009 15:21:11
AERDL.DLL : 8.1.3.4 479605 Bytes 12/2/2009 13:32:24
AEPACK.DLL : 8.2.0.3 422261 Bytes 11/9/2009 03:51:42
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 6/17/2009 19:14:26
AEHEUR.DLL : 8.1.0.189 2195833 Bytes 12/22/2009 04:33:50
AEHELP.DLL : 8.1.9.0 237943 Bytes 12/18/2009 02:23:42
AEGEN.DLL : 8.1.1.82 369014 Bytes 12/22/2009 04:33:47
AEEMU.DLL : 8.1.1.0 393587 Bytes 10/3/2009 04:05:00
AECORE.DLL : 8.1.9.1 180598 Bytes 12/11/2009 03:46:25
AEBB.DLL : 8.1.0.3 53618 Bytes 10/9/2008 18:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/12/2008 12:47:59
AVPREF.DLL : 9.0.3.0 44289 Bytes 9/15/2009 02:39:51
AVREP.DLL : 8.0.0.3 155905 Bytes 1/20/2009 18:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 14:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 4/27/2009 22:15:35
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 14:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 19:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/2/2009 12:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 14:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 6/9/2009 19:22:51
RCTEXT.DLL : 9.0.73.0 86785 Bytes 11/19/2009 15:21:10

Configuration settings for the scan:
Jobname.............................: Local Hard Disks
Configuration file..................: c:\program files\avira\antivir desktop\alldiscs.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Sunday, December 27, 2009 15:01

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
12 processes with 12 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Master boot sector HD2
[INFO] No virus was found!
Master boot sector HD3
[INFO] No virus was found!
Master boot sector HD4
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '52' files ).


Starting the file scan:

Begin scan in 'C:\' <OS>
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\Documents and Settings\Robert Hoagland\Desktop\RootRepeal.exe
[WARNING] The file could not be opened!


End of the scan: Sunday, December 27, 2009 15:50
Used time: 49:22 Minute(s)

The scan has been done completely.

7744 Scanned directories
229953 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
2 Files cannot be scanned
229951 Files not concerned
7186 Archives were scanned
2 Warnings
1 Notes



scans cont...


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 12/27/2009 at 01:33 AM

Application Version : 4.31.1000

Core Rules Database Version : 4412
Trace Rules Database Version: 2243

Scan type : Complete Scan
Total Scan Time : 00:36:26

Memory items scanned : 395
Memory threats detected : 0
Registry items scanned : 5932
Registry threats detected : 0
File items scanned : 65904
File threats detected : 0






--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) ---


--- Report generated: 2009-12-27 14:06 ---

Fraud.ActiveSecurity: [SBI $D4BA6A8C] Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-88662054-1569768389-1154089107-500\Software\eee0bd2f-ff2e-46ef-83fb-d4fda84462a3

SearchPixieBar: [SBI $B4D617E4] Settings (Registry key, fixed)
HKEY_USERS\S-1-5-21-88662054-1569768389-1154089107-1005\Software\BestToolbars\IEToolbar

Fraud.ActiveSecurity: [SBI $D4BA6A8C] Settings (Registry value, nothing done)
HKEY_USERS\S-1-5-21-88662054-1569768389-1154089107-500\Software\eee0bd2f-ff2e-46ef-83fb-d4fda84462a3

SearchPixieBar: [SBI $B4D617E4] Settings (Registry key, nothing done)
HKEY_USERS\S-1-5-21-88662054-1569768389-1154089107-1005\Software\BestToolbars\IEToolbar

#4 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 27 December 2009 - 08:57 PM

Hello saltydogs,

Thanks for posting those logs. I see Spybot S&D found some traces left over from a rogue called Active Security. Let's try another scanner to see if we find anything.

First,

Let's get rid of your temporary internet files:

* Clean your Cache and Cookies in IE:
  • Close all instances of Outlook Express and Internet Explorer
  • Go to Control Panel > Internet Options > General tab
  • Click the "Delete Cookies" button
  • Next to it, Click the "Delete Files" button
  • When prompted, place a check in: "Delete all offline content", click OK
* Clean your Cache and Cookies in Firefox (In case you also have Firefox installed):
  • Go to Tools > Options.
  • Click Privacy in the menu on the left side of the Options window.
  • Click the Clear button located to the right of each option (History, Cookies, Cache).
  • Click OK to close the Options window
    Alternatively, you can clear all information stored while browsing by clicking Clear All.
    A confirmation dialog box will be shown before clearing the information.
* Clean other Temporary files + Recycle bin
  • Go to start > run and type: cleanmgr and click ok.
  • Let it scan your system for files to remove.
  • Make sure Temporary Files, Temporary Internet Files, and Recycle Bin are the only things checked.
  • Press OK to remove them.
Next,

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.
alternate download link
Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)
In your next reply, please include the following log:
  • DrWebCureit
EDIT: for typos

Regards,
swagger

Edited by swagger, 27 December 2009 - 09:20 PM.


#5 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 27 December 2009 - 10:54 PM

Swagger, I can't get Dr.Web CureIt to work. When I click on the randomly named file, in Safe Mode and regular, my PC reboots. I add/removed and re-installed a few different times, but the reboot problem persists.

#6 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 28 December 2009 - 12:52 PM

Hello saltydogs,

How long does your computer usually stay up before it reboots? Let's try an online scan:

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image
In your next reply, please include the following log:
  • ESET
Regards,
swagger

#7 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 28 December 2009 - 04:00 PM

Hello Swagger. The only times my computer was rebooting was when I tried to run the Dr.Web CureIt scan.

I was able to run the ESET OnlineScan, which found no threats. I was not able to figure out how to save the scan report. The last post you sent with the instructions was not complete, because my PC is not showing all of the characters from within the message.
For example, step 2 in the last post reads: 2. Click the X button. I would attach a screenshot if I knew how.

#8 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 28 December 2009 - 07:55 PM

Hello again saltydogs,

If the online scan came back clean, I'll take your word for it so don't worry about posting the log. That is interesting that you aren't seeing the images in this thread... I noticed in your Antivir scan, it picked up on RootRepeal. Could you please run a scan with that and post the log? Here are the correct instructions for it:

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.
Regards,
swagger

#9 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 29 December 2009 - 12:29 AM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/12/29 00:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA69AF000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA61C000 Size: 8192 File Visible: No Signed: -
Status: -

Name: rootrepeal[1].sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal[1].sys
Address: 0xA5674000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: Volume C:\
Status: MBR Rootkit Detected!

Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: c:\documents and settings\robert hoagland\local settings\temp\~df987c.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "PCTCore.sys" at address 0xb9ece514

#: 047 Function Name: NtCreateProcess
Status: Hooked by "PCTCore.sys" at address 0xb9ebd282

#: 048 Function Name: NtCreateProcessEx
Status: Hooked by "PCTCore.sys" at address 0xb9ebd474

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0xba7a6dac

#: 063 Function Name: NtDeleteKey
Status: Hooked by "PCTCore.sys" at address 0xb9eced00

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "PCTCore.sys" at address 0xb9ecefb8

#: 098 Function Name: NtLoadKey
Status: Hooked by "<unknown>" at address 0xba7a6dca

#: 119 Function Name: NtOpenKey
Status: Hooked by "PCTCore.sys" at address 0xb9ecd3fa

#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0xba7a6d98

#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0xba7a6d9d

#: 192 Function Name: NtRenameKey
Status: Hooked by "PCTCore.sys" at address 0xb9ecf422

#: 193 Function Name: NtReplaceKey
Status: Hooked by "<unknown>" at address 0xba7a6dd4

#: 204 Function Name: NtRestoreKey
Status: Hooked by "<unknown>" at address 0xba7a6dcf

#: 247 Function Name: NtSetValueKey
Status: Hooked by "PCTCore.sys" at address 0xb9ece7d8

#: 257 Function Name: NtTerminateProcess
Status: Hooked by "PCTCore.sys" at address 0xb9ebcf32

Stealth Objects
-------------------
Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8acc7ce0 Size: 222

==EOF==

#10 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 29 December 2009 - 09:13 AM

Hello saltydogs,

Thanks for posting that log. I'm a bit concerned with a couple of items in your RootRepeal log, but unfortunately, I don't have enough evidence to support my concerns right now. Let's try another rootkit scanner:

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

In your next reply, please include the following log:
  • GMER
Regards,
swagger

Edited by swagger, 29 December 2009 - 09:22 AM.


#11 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 30 December 2009 - 10:01 AM

Hello Swagger.

I tried to scan twice with GMER, both times the scan froze after about 3-4 hours. I turned off the firewall and the scan completed. But it wouldn,t save the report. My PC froze and so I powered off. I then did the GMER scan one section at a time, and that worked. The scans which resulted in a report I have attached.


GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-30 08:16:58
Windows 5.1.2600 Service Pack 3
Running: nmw4n1h3.exe; Driver: C:\DOCUME~1\ROBERT~1\LOCALS~1\Temp\uxldqpod.sys

---- System - GMER 1.0.15 ----

SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateKey [0xB9ECE514]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcess [0xB9EBD282]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwCreateProcessEx [0xB9EBD474]
SSDT BA68B4AC ZwCreateThread
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwDeleteKey [0xB9ECED00]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwDeleteValueKey [0xB9ECEFB8]
SSDT BA68B4CA ZwLoadKey
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwOpenKey [0xB9ECD3FA]
SSDT BA68B498 ZwOpenProcess
SSDT BA68B49D ZwOpenThread
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwRenameKey [0xB9ECF422]
SSDT BA68B4D4 ZwReplaceKey
SSDT BA68B4CF ZwRestoreKey
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwSetValueKey [0xB9ECE7D8]
SSDT PCTCore.sys (PC Tools KDS Core Driver/PC Tools) ZwTerminateProcess [0xB9EBCF32]

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-30 08:16:58
Windows 5.1.2600 Service Pack 3
Running: nmw4n1h3.exe; Driver: C:\DOCUME~1\ROBERT~1\LOCALS~1\Temp\uxldqpod.sys


---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\wuauclt.exe[468] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 028B299A
.text C:\WINDOWS\system32\wuauclt.exe[468] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 028B294A
.text C:\WINDOWS\system32\wuauclt.exe[468] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 028B290E
.text C:\WINDOWS\system32\wuauclt.exe[468] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 028B28F2
.text C:\WINDOWS\system32\wuauclt.exe[468] WS2_32.dll!send 71AB4C27 5 Bytes JMP 028B277E
.text C:\WINDOWS\system32\wuauclt.exe[468] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 028B2870
.text C:\WINDOWS\system32\wuauclt.exe[468] WS2_32.dll!recv 71AB676F 5 Bytes JMP 028B27B6
.text C:\WINDOWS\system32\wuauclt.exe[468] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 028B27EE
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 0189299A
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 0189294A
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 0189290E
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 018928F2
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] WS2_32.dll!send 71AB4C27 5 Bytes JMP 0189277E
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 01892870
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] WS2_32.dll!recv 71AB676F 5 Bytes JMP 018927B6
.text C:\Program Files\Avira\AntiVir Desktop\sched.exe[1312] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 018927EE
.text C:\WINDOWS\Explorer.EXE[1580] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 01F2299A
.text C:\WINDOWS\Explorer.EXE[1580] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 01F2294A
.text C:\WINDOWS\Explorer.EXE[1580] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 01F2290E
.text C:\WINDOWS\Explorer.EXE[1580] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 01F228F2
.text C:\WINDOWS\Explorer.EXE[1580] WS2_32.dll!send 71AB4C27 5 Bytes JMP 01F2277E
.text C:\WINDOWS\Explorer.EXE[1580] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 01F22870
.text C:\WINDOWS\Explorer.EXE[1580] WS2_32.dll!recv 71AB676F 5 Bytes JMP 01F227B6
.text C:\WINDOWS\Explorer.EXE[1580] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 01F227EE
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00ED299A
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00ED294A
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00ED290E
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00ED28F2
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00ED277E
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00ED2870
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00ED27B6
.text C:\Program Files\Adobe\Photoshop Elements 3.0\PhotoshopElementsFileAgent.exe[1672] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00ED27EE
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 01A8299A
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 01A8294A
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 01A8290E
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 01A828F2
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] WS2_32.dll!send 71AB4C27 5 Bytes JMP 01A8277E
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 01A82870
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] WS2_32.dll!recv 71AB676F 5 Bytes JMP 01A827B6
.text C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1712] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 01A827EE
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00E0299A
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00E0294A
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00E0290E
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00E028F2
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00E0277E
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00E02870
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00E027B6
.text C:\Program Files\Common Files\Motive\McciCMService.exe[1792] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00E027EE
.text C:\WINDOWS\System32\alg.exe[2468] ADVAPI32.dll!CryptDestroyKey 77DE9EBC 7 Bytes JMP 00B9299A
.text C:\WINDOWS\System32\alg.exe[2468] ADVAPI32.dll!CryptDecrypt 77DEA129 7 Bytes JMP 00B9294A
.text C:\WINDOWS\System32\alg.exe[2468] ADVAPI32.dll!CryptEncrypt 77DEE360 7 Bytes JMP 00B9290E
.text C:\WINDOWS\System32\alg.exe[2468] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 00B928F2
.text C:\WINDOWS\System32\alg.exe[2468] WS2_32.dll!send 71AB4C27 5 Bytes JMP 00B9277E
.text C:\WINDOWS\System32\alg.exe[2468] WS2_32.dll!WSARecv 71AB4CB5 5 Bytes JMP 00B92870
.text C:\WINDOWS\System32\alg.exe[2468] WS2_32.dll!recv 71AB676F 5 Bytes JMP 00B927B6
.text C:\WINDOWS\System32\alg.exe[2468] WS2_32.dll!WSASend 71AB68FA 5 Bytes JMP 00B927EE

---- EOF - GMER 1.0.15 ----

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-30 08:46:14
Windows 5.1.2600 Service Pack 3
Running: nmw4n1h3.exe; Driver: C:\DOCUME~1\ROBERT~1\LOCALS~1\Temp\uxldqpod.sys


---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACd
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@UACc
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacbbr
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacsr
Reg HKLM\SYSTEM\ControlSet001\Services\UACd.sys\modules@uacav
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACd
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACc
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacbbr
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacsr
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacav
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACd
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@UACc
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacbbr
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacsr
Reg HKLM\SYSTEM\ControlSet003\Services\UACd.sys\modules@uacav
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet004\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet005\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet006\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet007\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet008\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet009\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet010\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet011\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet012\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet013\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet014\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet015\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet016\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet017\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\ControlSet018\Services\BTHPORT\Parameters\Keys\00027204a312 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys@imagepath \systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UAClyavymnadx.sys
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACvoybnejkcb.dll
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACyxtlgwwyed.dll
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACovmrvyvmei.dat
Reg HKLM\SYSTEM\ControlSet018\Services\UACd.sys\modules@uacav \\?\globalroot\systemroot\system32\UACpdxcdqloyl.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\00027204a312
Reg HKLM\SYSTEM\ControlSet020\Services\BTHPORT\Parameters\Keys\00027204a312 (not active ControlSet)

---- EOF - GMER 1.0.15 ----

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2009-12-30 09:35:25
Windows 5.1.2600 Service Pack 3
Running: nmw4n1h3.exe; Driver: C:\DOCUME~1\ROBERT~1\LOCALS~1\Temp\uxldqpod.sys


---- Disk sectors - GMER 1.0.15 ----

Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior;

---- EOF - GMER 1.0.15 ----

#12 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 30 December 2009 - 12:44 PM

Hello saltydogs,

With the information you have provided I believe you will need help from the malware removal team. I would like you to start a new thread HERE and include a link to this thread. Please make sure that you read the information about getting started before you start your thread.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient. Help is on the way!

Regards,
swagger

#13 saltydogs

saltydogs
  • Topic Starter

  • Members
  • 74 posts
  • OFFLINE
  •  
  • Local time:12:28 AM

Posted 30 December 2009 - 01:13 PM

Thanks Swagger. How do I create a link to this topic?

#14 swagger

swagger

  • Members
  • 476 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina
  • Local time:12:28 AM

Posted 30 December 2009 - 01:24 PM

You're welcome saltydogs,

Just copy and paste this url into the post:

http://www.bleepingcomputer.com/forums/top...ml#entry1558646

Regards,
swagger

#15 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,946 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:28 AM

Posted 31 December 2009 - 12:25 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/282868/computer-keeps-freezing/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days, up to two weeks perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users