Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trouble with Mal/TDSSConf-A


  • This topic is locked This topic is locked
5 replies to this topic

#1 blargoyle

blargoyle

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 01 May 2010 - 02:08 PM

Was browsing websites and some sort of program started auto-installing on my computer. I could not kill it or stop the installation--even turned the power off on the computer before it completed, but the damage was already done. Webroot Spy Sweeper was running at the time but it got past that. After the boot, I could not start Task Manager, and Google searches for a fix for *that* problem were being redirected to other sites. The browser homepage has not been changed, but searches for topics related to the virus or the symptoms I was seeing are redirected. I was able to access the Internet from a different computer in the house and find out how to fix the problem with Task Manager (reset some keys in the Registry), but the browser redirect problem is still occurring.

First time I scanned my computer after that initial boot after infection, Spy Sweeper found 2 virus and also indicated 'rogue adware detected'. I quarantined and then deleted these files and rebooted. Scanned again, and one of the viruses, Mal/TDSSConf-A was back, as was the separate 'rogue adware detected' line. Quarantined, deleted, booted, same behavior. Came on here, ran DDS and GMER. I have the DDS output, which I will post below, but could not get GMER to run to completion. It crashed twice (blue screen of death--didn't think those existed in WinXP?), and the third time it ran for > 2 hours (on just the C:\ drive!) until my computer eventually seemed to freeze up and I couldn't switch between tasks or anything. I am, however, able to use HijackThis, and the log file from the HijackThis run is also posted below.

On the GMER output, before the crashes, I saw several "PRAGMA" lines listed in red... looked ominous but not familiar with that program and not sure how to interpret it. I hope you can help with the data that I'm able to provide.

DDS Output:


DDS (Ver_10-03-17.01) - NTFSx86
Run by Josh at 11:51:00.38 on Sat 05/01/2010
Internet Explorer: 8.0.6001.18702
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2029.1335 [GMT -4:00]

AV: Webroot AntiVirus with Spy Sweeper *On-access scanning enabled* (Updated) {77E10C7F-2CCA-4187-9394-BDBC267AD597}
FW: Webroot AntiVirus with Spy Sweeper *disabled* {63671000-11A2-46DD-BADD-A084CABCDEAE}

============== Running Processes ===============

C:\Program Files\Webroot\Spy Sweeper\WRConsumerService.exe
C:\WINDOWS\system32\nvsvc32.exe
c:\windows\system32\svchost -k dcomlaunch
svchost.exe
c:\windows\system32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
svchost.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Java\jre6\bin\jqs.exe
c:\windows\system32\svchost.exe -k imgsvc
C:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Logitech\Video\LogiTray.exe
C:\Program Files\Winamp\winampa.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Webroot\Spy Sweeper\SpySweeperUI.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Steam\Steam.exe
C:\WINDOWS\system32\LVComS.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpobnz08.exe
C:\Program Files\Logitech\Video\LowLight.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\SearchProtocolHost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\Josh\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = about:blank
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [ctfmon.exe] "c:\windows\system32\ctfmon.exe"
uRun: [Messenger (Yahoo!)] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [Steam] "c:\program files\steam\Steam.exe" -silent
uRun: [Google Update] "c:\documents and settings\josh\local settings\application data\google\update\GoogleUpdate.exe" /c
mRun: [RTHDCPL] "RTHDCPL.EXE"
mRun: [Alcmtr] "ALCMTR.EXE"
mRun: [REGSHAVE] "c:\program files\regshave\REGSHAVE.EXE" /AUTORUN
mRun: [LogitechVideoRepair] "c:\program files\logitech\video\ISStart.exe"
mRun: [LogitechVideoTray] "c:\program files\logitech\video\LogiTray.exe"
mRun: [WinampAgent] "c:\program files\winamp\winampa.exe"
mRun: [RemoteControl] "c:\program files\cyberlink\powerdvd\PDVDServ.exe"
mRun: [nwiz] nwiz.exe /installquiet
mRun: [NvCplDaemon] "RUNDLL32.EXE" c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NvMediaCenter] "RUNDLL32.EXE" c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [SpySweeper] "c:\program files\webroot\spy sweeper\SpySweeperUI.exe" /startintray
StartupFolder: c:\docume~1\josh\startm~1\programs\startup\drempe~1.lnk - c:\windows\drempels.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\hppsc2~1.lnk - c:\program files\hewlett-packard\digital imaging\bin\hpobnz08.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\desktop messenger\8876480\program\LDMConf.exe
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {1E54D648-B804-468d-BC78-4AFFED8E262F} - hxxp://www.nvidia.com/content/DriverDownload/srl/3.0.0.4/srl_bin/sysreqlab_nvd.cab
DPF: {5ED80217-570B-4DA9-BF44-BE107C0EC166} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/wlscbase5483.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1234316229656
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {8D9563A9-8D5F-459B-87F2-BA842255CB9A} - hxxps://owa.eastman.com/InternalSite/WhlCompMgr.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0019-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_19-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Windows Desktop Search Namespace Manager: {56f9679e-7826-4c84-81f3-532071a8bcc5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
LSA: Notification Packages = scecli scecli scecli scecli scecli scecli scecli scecli

============= SERVICES / DRIVERS ===============

R0 ssfs0bbc;ssfs0bbc;c:\windows\system32\drivers\ssfs0bbc.sys [2009-4-21 29808]
R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\spy sweeper\SpySweeper.exe [2009-11-6 4048240]
R2 WRConsumerService;Webroot Client Service;c:\program files\webroot\spy sweeper\WRConsumerService.exe [2009-5-23 1201640]
S2 gupdate1c98eb16375ab02;Google Update Service (gupdate1c98eb16375ab02);c:\program files\google\update\GoogleUpdate.exe [2009-2-14 133104]
S3 DMService;Whale Component Manager;c:\windows\downloaded program files\dm.0\DMService.exe [2009-11-11 428184]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]

=============== Created Last 30 ================

2010-05-01 14:32:54 0 d-----w- c:\program files\Trend Micro
2010-05-01 00:54:32 0 d-----w- c:\program files\iTunes
2010-05-01 00:48:33 0 d-----w- c:\program files\Bonjour
2010-04-27 23:55:06 0 d-----w- c:\docume~1\josh\applic~1\Desktop Apps
2010-04-27 23:55:02 0 d-----w- c:\program files\Mioplanet
2010-04-27 23:10:15 2048 ----a-w- c:\windows\system32\Tr_sttool.dat
2010-04-27 23:10:13 81920 ----a-w- c:\windows\system32\bsrgvas.dll
2010-04-27 23:10:10 692224 ----a-w- c:\windows\system32\bsrmgcv.dll
2010-04-27 23:10:09 192512 ----a-w- c:\windows\system32\bsrmgps.dll
2010-04-27 23:09:47 147456 ----a-w- c:\windows\system32\bsratwmv.dll
2010-04-27 23:09:46 585728 ----a-w- c:\windows\system32\bsratswf.dll
2010-04-27 23:09:42 0 d-----w- c:\program files\BSR Screen Recorder 4
2010-04-27 22:54:12 0 d-----w- C:\Fraps
2010-04-25 17:46:36 0 d-----w- c:\windows\Performance
2010-04-25 17:46:11 0 d-----w- c:\program files\Microsoft Windows 7 Upgrade Advisor
2010-04-13 22:35:16 1892184 ----a-w- c:\windows\system32\D3DX9_42.dll
2010-04-13 22:35:14 2414360 ----a-w- c:\windows\system32\d3dx9_31.dll
2010-04-13 22:35:05 0 d-----w- c:\windows\Logs
2010-04-13 22:34:27 0 d-----w- c:\program files\Winamp Detect
2010-04-10 14:39:22 73728 ----a-w- c:\windows\system32\javacpl.cpl
2010-04-08 17:20:02 91424 ----a-w- c:\windows\system32\dnssd.dll
2010-04-08 17:20:02 107808 ----a-w- c:\windows\system32\dns-sd.exe
2010-04-02 22:56:02 0 d-----w- c:\docume~1\alluse~1\applic~1\{429CAD59-35B1-4DBC-BB6D-1DB246563521}

==================== Find3M ====================

2010-04-10 14:39:58 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-03-31 06:00:46 86016 ----a-w- c:\windows\system32\frapsvid.dll
2010-03-10 06:15:52 420352 ----a-w- c:\windows\system32\vbscript.dll
2010-02-25 06:24:37 916480 ----a-w- c:\windows\system32\wininet.dll
2010-02-16 14:08:49 2146304 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-02-16 13:25:04 2024448 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-02-12 04:33:11 100864 ----a-w- c:\windows\system32\6to4svc.dll
2009-10-15 07:24:05 245760 --sha-w- c:\windows\system32\config\systemprofile\ietldcache\index.dat
2009-06-24 23:10:34 32768 --sha-w- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012009062420090625\index.dat

============= FINISH: 11:51:27.60 ===============

The HijackThis log and the Attach.txt from DDS are attached. THANKS IN ADVANCE to anyone who can help...

Attached Files



BC AdBot (Login to Remove)

 


#2 blargoyle

blargoyle
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 01 May 2010 - 11:31 PM

Bit of an update: I was finally able to get GMER to run to completion. Log file is attached. Any help at all would be greatly appreciated!

#3 blargoyle

blargoyle
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 01 May 2010 - 11:34 PM

Hmm. Well it doesn't look like it will take attachments to replies, so I'll copy and paste the contents of the ark.txt...

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-05-02 00:17:23
Windows 5.1.2600 Service Pack 3
Running: gmer.exe; Driver: C:\DOCUME~1\Josh\LOCALS~1\Temp\aflirfow.sys


---- System - GMER 1.0.15 ----

Code 8A10C738 ZwEnumerateKey
Code 8A10D558 ZwFlushInstructionCache
Code 89DF29DE IofCallDriver
Code 8A11B6FE IofCompleteRequest

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!IofCallDriver 804EF1A6 5 Bytes JMP 89DF29E3
.text ntkrnlpa.exe!IofCompleteRequest 804EF236 5 Bytes JMP 8A11B703
PAGE ntkrnlpa.exe!ZwFlushInstructionCache 805B67F6 5 Bytes JMP 8A10D55C
PAGE ntkrnlpa.exe!ZwEnumerateKey 80624014 5 Bytes JMP 8A10C73C
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB6CDE380, 0x5414D5, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\system32\SearchIndexer.exe[2272] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] kernel32.dll!LoadLibraryA 7C801D7B 5 Bytes JMP 00DD000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] kernel32.dll!LoadLibraryW 7C80AEEB 5 Bytes JMP 00DC000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E215505 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!CreateWindowExW 7E42D0A3 5 Bytes JMP 3E2EDAC4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3E473F C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E3E4671 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3E46DC C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E3E4542 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E3E45A4 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E3E47A2 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E3E4606 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] ole32.dll!OleLoadFromStream 77529C85 5 Bytes JMP 3E3E4AA7 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!HttpAddRequestHeadersA 3D94CF46 5 Bytes JMP 00C8000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!HttpOpenRequestA 3D94D508 5 Bytes JMP 00D9000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!InternetConnectA 3D94DEAE 5 Bytes JMP 00DB000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!InternetConnectW 3D94F862 5 Bytes JMP 00DA000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!HttpOpenRequestW 3D94FBFB 5 Bytes JMP 00D8000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WININET.dll!HttpAddRequestHeadersW 3D94FE49 5 Bytes JMP 00D7000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WS2_32.dll!closesocket 71AB3E2B 5 Bytes JMP 0457000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WS2_32.dll!connect 71AB4A07 5 Bytes JMP 0456000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WS2_32.dll!send 71AB4C27 5 Bytes JMP 0458000A
.text C:\Program Files\Internet Explorer\iexplore.exe[4036] WS2_32.dll!recv 71AB676F 5 Bytes JMP 0455000A

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))

Device \Driver\Tcpip \Device\Ip 8A0FAE90
Device \Driver\Tcpip \Device\Ip 8A10CC10
Device \Driver\Tcpip \Device\Ip 89D8F710
Device \Driver\Tcpip \Device\Tcp 8A0FAE90
Device \Driver\Tcpip \Device\Tcp 8A10CC10
Device \Driver\Tcpip \Device\Tcp 89D8F710
Device \Driver\Tcpip \Device\Udp 8A0FAE90
Device \Driver\Tcpip \Device\Udp 8A10CC10
Device \Driver\Tcpip \Device\Udp 89D8F710
Device \Driver\Tcpip \Device\RawIp 8A0FAE90
Device \Driver\Tcpip \Device\RawIp 8A10CC10
Device \Driver\Tcpip \Device\RawIp 89D8F710
Device \Driver\Tcpip \Device\IPMULTICAST 8A0FAE90
Device \Driver\Tcpip \Device\IPMULTICAST 8A10CC10
Device \Driver\Tcpip \Device\IPMULTICAST 89D8F710

AttachedDevice \FileSystem\Fastfat \Fat ssfs0bbc.sys (Spy Sweeper FileSystem Filter Driver/Webroot Software, Inc. (www.webroot.com))

---- Modules - GMER 1.0.15 ----

Module \systemroot\PRAGMAxtqevsiuxn\PRAGMAd.sys (*** hidden *** ) B3704000-B3726000 (139264 bytes)

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\PRAGMAxtqevsiuxn\PRAGMAd.sys (*** hidden *** ) [SYSTEM] PRAGMAxtqevsiuxn <-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn@imagepath \systemroot\PRAGMAxtqevsiuxn\PRAGMAd.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules@PRAGMAd \systemroot\PRAGMAxtqevsiuxn\PRAGMAd.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules@PRAGMAc \systemroot\PRAGMAxtqevsiuxn\PRAGMAc.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules@PRAGMAsrcr \\?\globalroot\systemroot\system32\PRAGMAsrcr.dat
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules@pragmaserf \\?\globalroot\systemroot\system32\pragmaserf.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\PRAGMAxtqevsiuxn\modules@pragmabbr \\?\globalroot\systemroot\system32\pragmabbr.dll
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn@imagepath \systemroot\PRAGMAxtqevsiuxn\PRAGMAd.sys
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules@PRAGMAd \systemroot\PRAGMAxtqevsiuxn\PRAGMAd.sys
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules@PRAGMAc \systemroot\PRAGMAxtqevsiuxn\PRAGMAc.dll
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules@PRAGMAsrcr \\?\globalroot\systemroot\system32\PRAGMAsrcr.dat
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules@pragmaserf \\?\globalroot\systemroot\system32\pragmaserf.dll
Reg HKLM\SYSTEM\ControlSet002\Services\PRAGMAxtqevsiuxn\modules@pragmabbr \\?\globalroot\systemroot\system32\pragmabbr.dll

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\All Users\Application Data\pragmamfeklnmal.dll 1161 bytes
File C:\Documents and Settings\Josh\Local Settings\Temp\pragmamainqt.dll 10368 bytes
File C:\Documents and Settings\Josh\Local Settings\Temp\~DFB42B.tmp 0 bytes
File C:\Documents and Settings\Josh\Local Settings\Temp\~DFB7A1.tmp 0 bytes
File C:\WINDOWS\PRAGMAxtqevsiuxn 0 bytes
File C:\WINDOWS\PRAGMAxtqevsiuxn\PRAGMAc.dll 31232 bytes executable
File C:\WINDOWS\PRAGMAxtqevsiuxn\PRAGMAcfg.ini 92 bytes
File C:\WINDOWS\PRAGMAxtqevsiuxn\PRAGMAd.sys 45056 bytes executable <-- ROOTKIT !!!
File C:\WINDOWS\system32\pragmabbr.dll 57344 bytes executable
File C:\WINDOWS\system32\pragmaserf.dll 57344 bytes executable
File C:\WINDOWS\system32\PRAGMAsrcr.dat 147 bytes
File C:\WINDOWS\Temp\PRAGMA3ce5.tmp 147 bytes

---- EOF - GMER 1.0.15 ----


#4 blargoyle

blargoyle
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:00 AM

Posted 03 May 2010 - 07:45 PM

Nevermind... I got with a friend, used these log files, and cleaned up the bad stuff ourselves.

#5 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,654 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:00 PM

Posted 04 May 2010 - 12:03 PM

Hello ,
And welcome.gif to the Bleeping Computer Malware Removal Forum
. My name is Elise and I'll be glad to help you with your computer problems.


I will be working on your malware issues, this may or may not solve other issues you may have with your machine.

Please note that whatever repairs we make, are for fixing your computer problems only and by no means should be used on another computer.
  • The cleaning process is not instant. Logs can take some time to research, so please be patient with me. I know that you need your computer working as quickly as possible, and I will work hard to help see that happen.
  • Please reply using the Add/Reply button in the lower right hand corner of your screen. Do not start a new topic.
  • The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Unfortunately, if I do not hear back from you within 5 days, I will be forced to close your topic. If you still need help after I have closed your topic, send me or a moderator a personal message with the address of the thread or feel free to create a new one.
You may want to keep the link to this topic in your favorites. Alternatively, you can click the button at the top bar of this topic and Track this Topic, where you can choose email notifications. The topics you are tracking are shown here.
-----------------------------------------------------------

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

If you have already posted a log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Please download OTL from one of the following mirrors:
  • Save it to your desktop.
  • Double click on the icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Push the button.
  • Two reports will open, copy and paste them in a reply here:
    • OTListIt.txt <-- Will be opened
    • Extra.txt <-- Will be minimized

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.

-------------------------------------------------------------
In the meantime please, do NOT install any new programs or update anything unless told to do so while we are fixing your problem

If you still need help, please include the following in your next reply
  • A detailed description of your problems
  • A new OTL log (don't forget extra.txt)
  • GMER log

Thanks and again sorry for the delay.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft

 

animinionsmalltext.gif


#6 Elise

Elise

    Bleepin' Blonde


  • Malware Study Hall Admin
  • 61,654 posts
  • ONLINE
  •  
  • Gender:Female
  • Location:Romania
  • Local time:01:00 PM

Posted 12 May 2010 - 09:19 AM

Due to lack of feedback, this topic will now be closed.

If you are the original topic starter and you need this topic reopened, please send me a PM.

Everyone else, please start a new topic.

regards, Elise


"Now faith is the substance of things hoped for, the evidence of things not seen."

 

Follow BleepingComputer on: Facebook | Twitter | Google+ | lockerdome

 

Malware analyst @ Emsisoft

 

animinionsmalltext.gif





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users