Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Virus


  • This topic is locked This topic is locked
2 replies to this topic

#1 smani68

smani68

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:56 PM

Posted 13 January 2010 - 03:51 AM

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/01/13 00:24
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xBADAE000 Size: 98304 File Visible: No Signed: -
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B79000 Size: 8192 File Visible: No Signed: -
Status: -

Name: H8SRToxwcxsgbyi.sys
Image Path: C:\WINDOWS\system32\drivers\H8SRToxwcxsgbyi.sys
Address: 0xBAFC3000 Size: 118784 File Visible: - Signed: -
Status: Hidden from the Windows API!

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xF7751000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\H8SRTbfesdtwotw.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\H8SRTisjviqvoui.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\h8srtkrl32mainweq.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\H8SRTvoanyuvhvc.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\H8SRTwxlpvbvddc.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\H8SRT3f8.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\H8SRTe58d.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\H8SRTfff0.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Cookies\448583562[1].js
Status: Locked to the Windows API!

Path: C:\Documents and Settings\Admin\Cookies\3001-8022_4-10523889[1].html
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\drivers\H8SRToxwcxsgbyi.sys
Status: Invisible to the Windows API!

Path: c:\windows\temp\chrome_1822\chrome_patch.diff
Status: Allocation size mismatch (API: 36519936, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df9f38.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df119f.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dfdfd.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df3440.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dff7b4.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df6971.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df1dd6.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df1df0.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\Documents and Settings\Admin\Local Settings\Temp\H8SRTd189.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\h8srtmainqt.dll
Status: Invisible to the Windows API!

Path: c:\documents and settings\admin\local settings\temp\~dfa312.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dffe23.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df2dbc.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dffe71.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df9472.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFB690.tmp
Status: Invisible to the Windows API!

Path: c:\documents and settings\admin\local settings\temp\~dfe6e4.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFADA.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFADF.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFB25.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFB2A.tmp
Status: Invisible to the Windows API!

Path: c:\documents and settings\admin\local settings\temp\~df18c6.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df1ad9.tmp
Status: Allocation size mismatch (API: 49152, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df906c.tmp
Status: Allocation size mismatch (API: 262144, Raw: 16384)

Path: c:\documents and settings\admin\local settings\temp\~df4f81.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df6ef9.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dfb5d5.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df39c4.tmp
Status: Allocation size mismatch (API: 327680, Raw: 16384)

Path: c:\documents and settings\admin\local settings\temp\~df86cd.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df877a.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df4558.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df8094.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df27b7.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~df5af0.tmp
Status: Allocation size mismatch (API: 131072, Raw: 16384)

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFD058.tmp
Status: Invisible to the Windows API!

Path: c:\documents and settings\admin\local settings\temp\~dfd17e.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\admin\local settings\temp\~dfd2d2.tmp
Status: Allocation size mismatch (API: 65536, Raw: 16384)

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFB52.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DFFB57.tmp
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DF7F4F.tmp
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temp\~DF8DCA.tmp
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\4VDKK9GE\762247371_TgdQk-M[1].jpg
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\4VDKK9GE\762249209_THqa6-L[1].jpg
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\4VDKK9GE\thumbsCA4CA02U.png
Status: Visible to the Windows API, but not on disk.

Path: c:\documents and settings\admin\local settings\temporary internet files\content.ie5\el674q02\ac[7].htm
Status: Allocation size mismatch (API: 12288, Raw: 16384)

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\EL674Q02\thumbsCA3B5VTO.png
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\EL674Q02\thumbsCAFCZGSE.png
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\KS23EBMQ\b[3].gif
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\KS23EBMQ\1494[1].js
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\KS23EBMQ\778253060[1].js
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\KS23EBMQ\search[7].htm
Status: Visible to the Windows API, but not on disk.

Path: C:\Documents and Settings\Admin\Local Settings\Temporary Internet Files\Content.IE5\KS23EBMQ\thumbs[11].png
Status: Visible to the Windows API, but not on disk.

Path: c:\documents and settings\admin\local settings\application data\microsoft\internet explorer\recovery\active\{efcea966-001e-11df-8f2f-000cf1649150}.dat
Status: Size mismatch (API: 12800, Raw: 9728)

Stealth Objects
-------------------
Object: Hidden Module [Name: H8SRTvoanyuvhvc.dll]
Process: svchost.exe (PID: 980) Address: 0x008a0000 Size: 65536

Object: Hidden Module [Name: H8SRTwxlpvbvddc.dll]
Process: svchost.exe (PID: 980) Address: 0x00c70000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 980) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1108) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1148) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1328) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1540) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: Explorer.EXE (PID: 1556) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1816) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1320) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1688) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 1584) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTfff0.tmpvbvddc.dll]
Process: svchost.exe (PID: 240) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTbfesdtwotw.dll]
Process: iexplore.exe (PID: 2700) Address: 0x00ce0000 Size: 151552

Object: Hidden Module [Name: H8SRTwxlpvbvddc.dll]
Process: iexplore.exe (PID: 2700) Address: 0x10000000 Size: 69632

Object: Hidden Module [Name: H8SRTbfesdtwotw.dll]
Process: Iexplore.exe (PID: 4920) Address: 0x00ce0000 Size: 151552

Object: Hidden Module [Name: H8SRTwxlpvbvddc.dll]
Process: Iexplore.exe (PID: 4920) Address: 0x10000000 Size: 69632

Hidden Services
-------------------
Service Name: H8SRTd.sys
Image Path: C:\WINDOWS\system32\drivers\H8SRToxwcxsgbyi.sys

==EOF==

Help, my computer has a virus. All these popups come up and I can't download malwarebytes or any other anti virus protection. It won't let me download anything.

Attached Files

  • Attached File  ark.txt   22.46KB   8 downloads


BC AdBot (Login to Remove)

 


#2 Dakeyras

Dakeyras

    Anti-Malware Mammoth


  • Malware Response Team
  • 368 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Tundra
  • Local time:08:56 AM

Posted 19 January 2010 - 10:14 AM

QUOTE
Please note that all instructions given are customised for this computer only, the tools used may cause damage if used on a computer with different infections.

If you think you have similar problems, please post the requested logs in the HijackThis Logs and Virus/Trojan/Spyware/Malware Removal forum and wait for help.

Hi smani68 and welcome to BleepingComputer. smile.gif

I'm Dakeyras and I am going to try to assist you with your problem. Please take note of the below:
  • I will start working on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The fixes are specific to your problem and should only be used for this issue on this machine!.
  • The process is not instant. Please continue to review my answers until I tell you your machine is clear. Absence of symptoms does not mean that everything is clear.
  • If you don't know, stop and ask! Don't keep going on.
  • Please reply to this thread. Do not start a new topic.
  • Refrain from running self fixes as this will hinder the malware removal process.
  • It may prove beneficial if you print of the following instructions or save them to notepad as I post them.
  • Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
Before we start:

Please be aware that removing Malware is a potentially hazardous undertaking. I will take care not to knowingly suggest courses of action that might damage your computer. However it is impossible for me to foresee all interactions that may happen between the software on your computer and those we'll use to clear you of infection, and I cannot guarantee the safety of your system. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system, or to necessitate you taking your computer to a repair shop.

Because of this, I advise you to backup any personal files and folders before you start.

Download/run Rkill:

Please download Rkill from one of the following links and save to your Desktop:

One, Two,Three or Four
  • Double click on Rkill.
  • A command window will open then disappear upon completion, this is normal.
  • Please leave Rkill on the Desktop until otherwise advised.
Note: If your security software warns about Rkill, please ignore and allow the download to continue.

Scan with GMER:

Please download GMER Rootkit Scanner from here.
  • Double click the .exe file. If asked to allow gmer.sys driver to load, please consent
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO


    Click the image to enlarge it

  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show All (don't miss this one)
  • Then click the Scan button & wait for it to finish
  • Once done click on the [Save..] button, and in the File name area, type in "Gmer.txt" or it will save as a .log file
  • Save it where you can easily find it, such as your desktop, and post it in reply
**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

Note: Do not run any programs while Gmer is running.

Scan with RSIT:
  • Please download Random's System Information Tool by random/random from here and save it to your desktop.
Make sure that RSIT.exe is on the your Desktop before running the application!
  • Right-click on RSIT.exe and select Run as Administrator. to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open:
    • log.txt will be opened maximized.
    • info.txt will be opened minimized.
  • Please post the contents of both log.txt and info.txt.
Note: Both logs can also be located within this folder rsit at the root of your installed Hard-Drive. EG: C:\rsit

When completed the above, please post back the following in the order asked for:
  • How is your computer performing now, any further symptoms and or problems encountered?
  • GMER Log.
  • Both RSIT logs. <-- Post them individually please, IE: one Log per post/reply.


#3 Dakeyras

Dakeyras

    Anti-Malware Mammoth


  • Malware Response Team
  • 368 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Tundra
  • Local time:08:56 AM

Posted 23 January 2010 - 04:13 PM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending either myself or a member of the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users