Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

can't access windows update and hibernate doesn't work anymore


  • Please log in to reply
15 replies to this topic

#1 ALT_EST

ALT_EST

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 25 April 2010 - 08:42 PM

Hello,

I was an idiot and accidentally clicked on an email link of an email I was trying to delete (knew it was a "bad" email). It then tried to open my Adobe Acrobat and I shut off the wireless connection after about 10 seconds, but it was too late, and I can no longer access Windows Update page (it just tells me IE cannot display this webpage). I also noticed that I can no longer hibernate my computer anymore. Windows Defender told me that something was trying to install and I denied permission to it.

I ran Malwarebytes 1.45 with the latest updates and it found a few things which it deleted, but still can't access Windows Update. I also tried the http://safety.live.com (onecare) from microsoft and did the full system scan with that and it found 9 issues, but only fixed 2. It didn't actually tell me what those other issues were, so I couldn't manually do anything about them. Every once in a while, my expired (in Dec2009) Norton Anti-Virus will tell me I have a trojan and denies access to file "overlay.xul". I have also tried several other scanners to little or no effect (trendmicro's online scanner and hitmanpro3.5).

I have hijack this installed, but have not ran it as of yet as I wouldn't be able to make heads or tails of the report anyway. I'm hoping someone here would be able to help me.

Thanks in advance.

BC AdBot (Login to Remove)

 


#2 certifiedgeek

certifiedgeek

  • Members
  • 172 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 25 April 2010 - 11:11 PM

Hi ALT_EST,

Let's first start with clearing out some temp files using TFC by Old Timer which you can find here along with instructions on how to use it. Just make sure you close and save any work before you run it as it probably will require a reboot.

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

Once you have finished with the above steps, please post the MBAM and SAS logs for us to take a look at please.

#3 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 26 April 2010 - 10:57 AM

Hi certifiedgeek,

Thanks for the reply. I ran the SAS scan in safe mode and it found 1 threat, but I think it might be a false positive. The only difference with what I did was I used the ATF cleaner instead of the one in your link. MBAM no longer finds any threats, but I tried the onecare online scan again and it found "1 severe threat" which it can't get rid of and again, doesn't give any information on what that threat is and what file or registry entry it was having an issue with. Anyways, here are the last 2 MBAM logs that showed a hit and the SAS log.

------------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4021

Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5730.13

4/22/2010 1:07:21 PM
mbam-log-2010-04-22 (13-07-21).txt

Scan type: Full scan (C:\|)
Objects scanned: 245326
Time elapsed: 2 hour(s), 55 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 4
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 9

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\kbjipl2.dll (Trojan.Hiloti) -> Delete on reboot.

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ulucoyowuyazami (Trojan.Hiloti) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\uid (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Zbot) -> Data: c:\windows\system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.Zbot) -> Data: system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (Userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\system32\lowsec (Stolen.data) -> Delete on reboot.

Files Infected:
C:\WINDOWS\kbjipl2.dll (Trojan.Hiloti) -> Delete on reboot.
C:\WINDOWS\system32\sdra64.exe (Trojan.Zbot) -> Delete on reboot.
C:\WINDOWS\Temp\2AE.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\2B1.tmp (Malware.Packer.Gen) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\2B3.tmp (Malware.Packer.Gen) -> Delete on reboot.
C:\Documents and Settings\~\Local Settings\Temp\e.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Documents and Settings\~\Local Settings\Temporary Internet Files\Content.IE5\DRO7TCWG\load[1].exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lowsec\local.ds (Stolen.data) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.data) -> Delete on reboot.

---------------------------------------------------------------------------------------------------------

Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 4024

Windows 5.1.2600 Service Pack 2
Internet Explorer 7.0.5730.13

4/23/2010 12:02:45 AM
mbam-log-2010-04-23 (00-02-45).txt

Scan type: Full scan (C:\|)
Objects scanned: 4546
Time elapsed: 1 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

------------------------------------------------------------------------------------------------------

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/26/2010 at 10:17 AM

Application Version : 4.35.1002

Core Rules Database Version : 4849
Trace Rules Database Version: 2661

Scan type : Complete Scan
Total Scan Time : 11:32:21

Memory items scanned : 229
Memory threats detected : 0
Registry items scanned : 8407
Registry threats detected : 0
File items scanned : 126031
File threats detected : 2

Trojan.Agent/Gen-ImageDocFake
C:\DOCUMENTS AND SETTINGS\~\MY DOCUMENTS\SFR\SFR DOCUMENTS\SERVICE\DINS56K\DINS56K\DINS56K.JPG

NotHarmful.Sysinternals Bluescreen Screen Saver
C:\WINDOWS\SYSTEM32\SYSINTERNALS BLUESCREEN.SCR

-----------------------------------------------------------------------------------------------------------

I still can't access Windows Update and along with the "severe threat" that onecare live found, I'm strongly suspecting that I'm still infected. Also, without knowing what the actual threat is, I'm afraid to even start sending emails out for fear of spreading what I got to others through outlook. Hope you can help out.

Thanks.

Edited by ALT_EST, 26 April 2010 - 10:58 AM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:18 PM

Posted 26 April 2010 - 12:03 PM

Hello, i am jumping in for a moment as you need to consider this now.
One or more of the identified infections is a backdoor trojan/Bot.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 26 April 2010 - 12:29 PM

Hi boopme,

Thank you for the reply. I do normally use that laptop for doing online banking, but have not done so since the infection. It is a laptop I use for work and as I will be travelling a lot the next few weeks, I just need it to function without major worries for a few more weeks, then I will do a fresh install - also, I need the data that is on that laptop, so even if I get a new hard drive I will still need to copy data from the infected drive to the new one. So I would like to go ahead and get this virus(es) killed/cleaned now if you are able to help. It would be very much appreciated.

Thanks.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:18 PM

Posted 26 April 2010 - 12:48 PM

Ok,well do the password thing.. Now we'll do an online scan and a rootkit scan.

Please perform a scan with Eset Online Antiivirus Scanner.
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista users need to run Internet Explorer as Administrator. Right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.
  • Click the green ESET Online Scanner button.
  • Read the End User License Agreement and check the box: YES, I accept the Terms of Use.
  • Click on the Start button next to it.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.
  • A new window will appear asking "Do you want to install this software?"".
  • Answer Yes to download and install the ActiveX controls that allows the scan to run.
  • Click Start.
  • Check Remove found threats and Scan potentially unwanted applications.
  • Click Scan to start. (please be patient as the scan could take some time to complete)
  • If offered the option to get information or buy software. Just close the window.
  • When the scan has finished, a log.txt file will be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
  • Click Posted Image > Run..., then copy and paste this command into the open box: C:\Program Files\EsetOnlineScanner\log.txt
  • The scan results will open in Notepad. Copy and paste the contents of log.txt in your next reply.
Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.


Now GMER:
Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning
.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 26 April 2010 - 01:32 PM

Hi boopme,

Thank you for the instructions. I will do that and post results.

One (somewhat naive) question: can this trojan/backdoor bot attack and infect other computers on the same router automatically or will it only be infected by clicking on some infected email link in the other computer?

Thanks.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:18 PM

Posted 26 April 2010 - 01:43 PM

It can walk thru your network. I would run MBAm and SAS on all PC's. If you use a FlashDrive among them that also needs to be cleaned
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 27 April 2010 - 12:25 AM

Hi boopme,

Here's the ESET and GMER reports.

------------------------------------------------------------------------

ESETSmartInstaller@High as CAB hook log:
OnlineScanner.ocx - registred OK
# version=7
# iexplore.exe=7.00.6000.17023 (vista_gdr.100222-0012)
# OnlineScanner.ocx=1.0.0.6211
# api_version=3.0.2
# EOSSerial=53084455feb56a4bbcbf6ea0ddeb8a5e
# end=finished
# remove_checked=true
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2010-04-26 11:21:34
# local_time=2010-04-26 07:21:34 (-0500, Eastern Daylight Time)
# country="United States"
# lang=1033
# osver=5.1.2600 NT Service Pack 2
# compatibility_mode=512 16777215 100 0 108949647 108949647 0 0
# compatibility_mode=3586 16764925 100 82 158224 696611032 0 0
# compatibility_mode=5889 16768381 100 100 58864305 112132978 0 58935832
# compatibility_mode=8192 67108863 100 0 0 0 0 0
# scanned=128378
# found=4
# cleaned=4
# scan_time=15461
C:\Downloads\Nero-6.6.1.15a.exe Win32/Toolbar.AskSBar application (deleted - quarantined) 00000000000000000000000000000000 C
C:\Downloads\Games\Shmup\Dove-Setup v1.10.exe probably a variant of Win32/Agent trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C
C:\Downloads\Utilities\framework3.0.exe JS/TrojanDownloader.Psyme.NCX trojan (deleted - quarantined) 00000000000000000000000000000000 C
C:\Downloads\Utilities\Audio Encoders\freeripmp3.exe a variant of Win32/Adware.ADON application (deleted - quarantined) 00000000000000000000000000000000 C

---------------------------------------------------------------------------------------------------------------------

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-04-27 00:40:49
Windows 5.1.2600 Service Pack 2
Running: 1z0hdkjw(gmer).exe; Driver: C:\DOCUME~1\~\LOCALS~1\Temp\pwdoikob.sys


---- Kernel code sections - GMER 1.0.15 ----

.rsrc C:\WINDOWS\system32\drivers\ACPIEC.sys entry point in ".rsrc" section [0xBACC6194]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\System32\svchost.exe[1308] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 0097000A
.text C:\WINDOWS\System32\svchost.exe[1308] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 0098000A
.text C:\WINDOWS\System32\svchost.exe[1308] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 0096000C
.text C:\WINDOWS\System32\svchost.exe[1308] USER32.dll!GetCursorPos 7E41BD76 5 Bytes JMP 051F000A
.text C:\WINDOWS\System32\svchost.exe[1308] ole32.dll!CoCreateInstance 774FFAC3 5 Bytes JMP 01C6000A
.text C:\WINDOWS\Explorer.EXE[3640] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00B5000A
.text C:\WINDOWS\Explorer.EXE[3640] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00C3000A
.text C:\WINDOWS\Explorer.EXE[3640] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00B4000C

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs SYMEVENT.SYS (Symantec Event Library/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Norton Internet Security Filter/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Norton Internet Security Filter/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Norton Internet Security Filter/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Norton Internet Security Filter/Symantec Corporation)

Device -> \Driver\atapi \Device\Harddisk0\DR0 8A58CAC8

---- Files - GMER 1.0.15 ----

File C:\WINDOWS\system32\drivers\ACPIEC.sys suspicious modification
File C:\WINDOWS\system32\drivers\atapi.sys suspicious modification

---- EOF - GMER 1.0.15 ----

-----------------------------------------------------------------------------------------------------------------------------------------------

Thanks.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,199 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:18 PM

Posted 27 April 2010 - 09:33 AM

Hello, there are some unknown and modified/suspicious .sys filres here. We need a deeper look. Please follow these instructions to post needed logs.

Preparation Guide . proceed to steps 6 through 9.
If you cannot perform a step move on to the next. Post all required logs and the complete log. You can use the GNER log above no need to rerun it from the guide.
Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#11 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 30 April 2010 - 09:55 AM

test

#12 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 30 April 2010 - 09:56 AM

Hi Boopme,

Seems the virus or something is blocking me from posting a reply on this forum everyt time I try to add the logs you requested. Seems I can't even email it to myself to use a different computer to post it. Any suggestions?

Thanks.

#13 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 30 April 2010 - 10:03 AM

Hi boopme,

I'm going to try and see if this will work for the stuff you requested.

http://cid-9c90144c11e2b8d0.skydrive.live....ted.zip?lc=1033

Thanks.

#14 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 30 April 2010 - 10:05 AM

ok, that seemed to work. I zipped the requested logs and put it on skydrive. you can download from the link in the previous message. Please review and let me know what can be done...

Thanks.

#15 ALT_EST

ALT_EST
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:01:18 PM

Posted 30 April 2010 - 12:20 PM

Further to my previous, post(s), I did some more googling and it seems likely that I may have been infected with a variant of the TDSS rootkit (aka atapi.sys virus). I found a post in another section of your forum that has a solution to fix this.

http://www.bleepingcomputer.com/forums/t/279883/google-search-engine-hijacker-atapisys-rootkit/

But based on my GMER log, I may also have an issue with my ACPIEC.sys. Anyone know if I should try the method outlined in the above topic with my ACPIEC.sys also?

My DDS log is in the skydrive link I posted earlier. I guess I'll await your review of that to see if it could be something else altogether.

Thanks.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users