Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Am I still infected? What do I do?


  • This topic is locked This topic is locked
6 replies to this topic

#1 Scuddles

Scuddles

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:43 PM

Posted 06 February 2011 - 12:13 AM

Hello, I had a rootkit infection recently on my computer which was causing a physical memory dump BSOD on Windows startup.
I've since removed it with tools such as GMER, ComboFix (Sorry, it seemed like a great idea at the time), and Hitman Pro 3.5, and although the computer starts fine now, I've run GMER again to make sure and although it does not report any rootkit infections I see some suspicious looking files, aamj1wqg.sys and a3f3ddkf.sys along with HalTranslateBusAddress. I'm afraid my system might still be infected, what should I do?

Here is my GMER log file, my operating system is Windows XP Home Edition if that helps.

GMER 1.0.15.15530 - http://www.gmer.net
Rootkit scan 2011-02-05 15:04:44
Windows 5.1.2600 Service Pack 6
Running: 3s2jzpqn.exe; Driver: C:\DOCUME~1\A1\LOCALS~1\Temp\pxtdrpob.sys


---- System - GMER 1.0.15 ----

SSDT spyt.sys ZwCreateKey [0xB7EA70E0]
SSDT spyt.sys ZwEnumerateKey [0xB7EC5CA4]
SSDT spyt.sys ZwEnumerateValueKey [0xB7EC6032]
SSDT spyt.sys ZwOpenKey [0xB7EA70C0]
SSDT spyt.sys ZwQueryKey [0xB7EC610A]
SSDT spyt.sys ZwQueryValueKey [0xB7EC5F8A]
SSDT spyt.sys ZwSetValueKey [0xB7EC619C]

INT 0x63 ? 8AF09BF8
INT 0x63 ? 8AF09BF8
INT 0x63 ? 8AF09BF8
INT 0x63 ? 8AF09BF8
INT 0x63 ? 8AD0EBF8
INT 0x63 ? 8AD0EBF8
INT 0x63 ? 8AF09BF8
INT 0x73 ? 8AF09BF8
INT 0x84 ? 8AD0EBF8
INT 0xA4 ? 8AD0EBF8
INT 0xB1 ? 8AF0BBF8
INT 0xB1 ? 8AF0BBF8
INT 0xB4 ? 8AD0EBF8

---- Kernel code sections - GMER 1.0.15 ----

? spyt.sys The system cannot find the file specified. !
.text C:\WINDOWS\system32\DRIVERS\nv4_mini.sys section is writeable [0xB652D3A0, 0x5FE082, 0xE8000020]
.text USBPORT.SYS!DllUnload B650D8AC 5 Bytes JMP 8AD0E1D8
.text aamj1wqg.SYS B644D386 35 Bytes [00, 00, 00, 00, 00, 00, 20, ...]
.text aamj1wqg.SYS B644D3AA 24 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
.text aamj1wqg.SYS B644D3C4 3 Bytes [00, 70, 02] {ADD [EAX+0x2], DH}
.text aamj1wqg.SYS B644D3C9 1 Byte [2E]
.text aamj1wqg.SYS B644D3C9 11 Bytes [2E, 00, 00, 00, 5A, 02, 00, ...]
.text ...
.text a3f3ddkf.SYS B6415386 35 Bytes [00, 00, 00, 00, 00, 00, 20, ...]
.text a3f3ddkf.SYS B64153AA 24 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
.text a3f3ddkf.SYS B64153C4 3 Bytes [00, 70, 02] {ADD [EAX+0x2], DH}
.text a3f3ddkf.SYS B64153C9 1 Byte [30]
.text a3f3ddkf.SYS B64153C9 11 Bytes [30, 00, 00, 00, 5C, 02, 00, ...] {XOR [EAX], AL; ADD [EAX], AL; POP ESP; ADD AL, [EAX]; ADD [EAX], AL; ADD [EAX], AL}
.text ...
.text C:\WINDOWS\system32\DRIVERS\atksgt.sys section is writeable [0xB27EE300, 0x3AF78, 0xE8000020]
.text C:\WINDOWS\system32\DRIVERS\lirsgt.sys section is writeable [0xB8340300, 0x1BCE, 0xE8000020]

---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\Explorer.EXE[2032] SHELL32.dll!SHFileOperationW 7CA70924 5 Bytes JMP 018A1102 C:\Program Files\Unlocker\UnlockerHook.dll

---- Kernel IAT/EAT - GMER 1.0.15 ----

IAT atapi.sys[HAL.dll!READ_PORT_UCHAR] [B7EA8042] spyt.sys
IAT atapi.sys[HAL.dll!READ_PORT_BUFFER_USHORT] [B7EA813E] spyt.sys
IAT atapi.sys[HAL.dll!READ_PORT_USHORT] [B7EA80C0] spyt.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_BUFFER_USHORT] [B7EA8800] spyt.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_UCHAR] [B7EA86D6] spyt.sys
IAT \SystemRoot\System32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [B7EB7E9C] spyt.sys
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KfAcquireSpinLock] CCCCCCC3
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!READ_PORT_UCHAR] CCCCCCCC
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KeGetCurrentIrql] CCCCCCCC
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KfRaiseIrql] CCCCCCCC
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KfLowerIrql] 8BEC8B55
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!HalGetInterruptVector] 00C73445
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!HalTranslateBusAddress] 00000000
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KeStallExecutionProcessor] 830C458B
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!KfReleaseSpinLock] C0840CEC
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!READ_PORT_BUFFER_USHORT] 053C0D74
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!READ_PORT_USHORT] 57B80974
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!WRITE_PORT_BUFFER_USHORT] 8B000000
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[HAL.dll!WRITE_PORT_UCHAR] 56C35DE5
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[WMILIB.SYS!WmiSystemControl] 8D51FC4D
IAT \SystemRoot\System32\Drivers\aamj1wqg.SYS[WMILIB.SYS!WmiCompleteRequest] 8D52FD55
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KfAcquireSpinLock] 18C4830E
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!READ_PORT_UCHAR] 1C8D9E88
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KeGetCurrentIrql] 9E880000
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KfRaiseIrql] 00001CA9
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KfLowerIrql] 0E798366
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!HalGetInterruptVector] 74AAB000
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!HalTranslateBusAddress] 8186C636
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KeStallExecutionProcessor] 1A00001C
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!KfReleaseSpinLock] 1C8386C6
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!READ_PORT_BUFFER_USHORT] C6020000
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!READ_PORT_USHORT] 001C8E86
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!WRITE_PORT_BUFFER_USHORT] 86C60200
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[HAL.dll!WRITE_PORT_UCHAR] 00001CAA
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[WMILIB.SYS!WmiSystemControl] 8800001C
IAT \SystemRoot\System32\Drivers\a3f3ddkf.SYS[WMILIB.SYS!WmiCompleteRequest] 001CB19E

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs 8AF081F8
Device \Driver\usbuhci \Device\USBPDO-0 8ACBF1F8
Device \Driver\sptd \Device\1001916820 spyt.sys
Device \Driver\usbuhci \Device\USBPDO-1 8ACBF1F8
Device \Driver\usbuhci \Device\USBPDO-2 8ACBF1F8
Device \Driver\usbehci \Device\USBPDO-3 8AC9A1F8
Device \Driver\usbuhci \Device\USBPDO-4 8ACBF1F8
Device \Driver\usbuhci \Device\USBPDO-5 8ACBF1F8
Device \Driver\usbuhci \Device\USBPDO-6 8ACBF1F8
Device \Driver\Ftdisk \Device\HarddiskVolume1 8AE9A1F8

AttachedDevice \Driver\Ftdisk \Device\HarddiskVolume1 snapman.sys (Acronis Snapshot API/Acronis)

Device \Driver\usbehci \Device\USBPDO-7 8AC9A1F8
Device \Driver\Cdrom \Device\CdRom0 8AC5D1F8
Device \Driver\atapi \Device\Ide\IdeDeviceP3T0L0-12 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort0 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort1 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort2 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdeDeviceP2T0L0-7 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort3 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort4 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\atapi \Device\Ide\IdePort5 [B7E21B40] atapi.sys[unknown section] {MOV EDX, [ESP+0x8]; LEA ECX, [ESP+0x4]; PUSH EAX; MOV EAX, ESP; PUSH EAX}
Device \Driver\Cdrom \Device\CdRom1 8AC5D1F8
Device \Driver\NetBT \Device\NetBT_Tcpip_{6EE96E29-6837-430D-8DFA-5053F8EAB8C9} 8AA381F8
Device \Driver\NetBT \Device\NetBt_Wins_Export 8AA381F8
Device \Driver\PCI_PNP6820 \Device\0000004a spyt.sys
Device \Driver\PCI_PNP6820 \Device\0000004b spyt.sys
Device \Driver\NetBT \Device\NetbiosSmb 8AA381F8
Device \Driver\sptd \Device\1001760570 spyt.sys
Device \Driver\usbuhci \Device\USBFDO-0 8ACBF1F8
Device \Driver\usbuhci \Device\USBFDO-1 8ACBF1F8
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 8AA251F8
Device \Driver\usbuhci \Device\USBFDO-2 8ACBF1F8
Device \FileSystem\MRxSmb \Device\LanmanRedirector 8AA251F8
Device \Driver\usbehci \Device\USBFDO-3 8AC9A1F8
Device \Driver\usbuhci \Device\USBFDO-4 8ACBF1F8
Device \Driver\Ftdisk \Device\FtControl 8AE9A1F8
Device \Driver\usbuhci \Device\USBFDO-5 8ACBF1F8
Device \Driver\usbuhci \Device\USBFDO-6 8ACBF1F8
Device \Driver\usbehci \Device\USBFDO-7 8AC9A1F8
Device \Driver\aamj1wqg \Device\Scsi\aamj1wqg1 8AC571F8
Device \Driver\a3f3ddkf \Device\Scsi\a3f3ddkf1 8AC561F8
Device \Driver\a3f3ddkf \Device\Scsi\a3f3ddkf1Port6Path0Target0Lun0 8AC561F8
Device \FileSystem\Cdfs \Cdfs 8A9B3500

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@h0 3
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@p0 C:\Program Files\Alcohol Soft\Alcohol 120\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@h0 2
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@ujdew 0x61 0xBE 0xCF 0xFA ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xED 0x91 0x7A 0x14 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x2F 0xE5 0xC1 0x48 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0xD6 0x44 0x97 0x9E ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1@hdf12 0x24 0x46 0x39 0xC8 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xC7 0xC7 0x60 0xE8 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0xCD 0xD0 0xCC 0x33 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xA4 0xA9 0x55 0x2A ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@p0 C:\Program Files\Alcohol Soft\Alcohol 120\
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@h0 2
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04@ujdew 0x61 0xBE 0xCF 0xFA ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 1
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xED 0x91 0x7A 0x14 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x2F 0xE5 0xC1 0x48 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0xD6 0x44 0x97 0x9E ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq1@hdf12 0x24 0x46 0x39 0xC8 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xC7 0xC7 0x60 0xE8 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0xCD 0xD0 0xCC 0x33 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xA4 0xA9 0x55 0x2A ...
Reg HKLM\SOFTWARE\Classes\CLSID\{59067bbb-4144-4f3a-8ea2-ba8769c45b1c}@Model 291
Reg HKLM\SOFTWARE\Classes\CLSID\{59067bbb-4144-4f3a-8ea2-ba8769c45b1c}@Therad 17
Reg HKLM\SOFTWARE\Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}@scansk 0x59 0xB8 0x1A 0x0F ...
Reg HKLM\SOFTWARE\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC}@scansk 0xB0 0xBB 0x90 0xAD ...
Reg HKLM\SOFTWARE\Classes\CLSID\{bb1d31e5-0147-47be-8b45-ad7ed7a44253}@Model 243
Reg HKLM\SOFTWARE\Classes\CLSID\{bb1d31e5-0147-47be-8b45-ad7ed7a44253}@Therad 30
Reg HKLM\SOFTWARE\Classes\CLSID\{bb1d31e5-0147-47be-8b45-ad7ed7a44253}@MData 0x2B 0x8F 0x78 0x29 ...

---- EOF - GMER 1.0.15 ----

BC AdBot (Login to Remove)

 


#2 Lusigioma

Lusigioma

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:43 PM

Posted 06 February 2011 - 04:24 AM

Hallo scuddles


Download malwarebytes
Run a full scan (first update it very important)
Delete what 'it finds and post the log

Download TDSSKiller:
● extract the contents of the zipped file on your Desktop
● TDSskiller.exe double click to start the application and then Start Scan

At this point, it starts scanning your system for malicious software:
● If you find an infected file, the default action will Cure, then click on Continue
● If you find a suspicious file, the default action will be Skip, then click on Continue

Once the scan, it will present one of two options:
● do not need to reboot the system: click on Report and save the contents to a text file
● You must restart your system: click on Restart Now
● Once the system reboots, the report of the program to be annexed is located in C: \ in this form:
TDSSKiller. [Version] _ [Date] _ [Time] _log.txt

Thanks :wink:

#3 Scuddles

Scuddles
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:43 PM

Posted 06 February 2011 - 08:13 AM

Okay, I've run a full scan with Malwarebytes' Anti-Malware. It detected and removed 4 items, here is the log.

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5688

Windows 5.1.2600 Service Pack 6
Internet Explorer 6.0.2900.5512

2/6/2011 9:04:03 PM
mbam-log-2011-02-06 (21-04-03).txt

Scan type: Full scan (C:\|)
Objects scanned: 361812
Time elapsed: 2 hour(s), 7 minute(s), 20 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\ere94fe5o32 (Trojan.FakeAV) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Qoobox\quarantine\C\documents and settings\all users\application data\ecafocl15400\ecafocl15400.exe.vir (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\Qoobox\quarantine\C\WINDOWS\system32\_tmpf.vir (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\system volume information\_restore{ba721f7b-2e6b-4a8e-a847-b3f1f471f30d}\RP0\A0001091.exe (Trojan.Downloader) -> Quarantined and deleted successfully.


Unfortunately, according to this sticky, I should not run TDSSkiller unless instructed to by a staff member, so I'll wait to see if I can get further assistance before continuing.

#4 Lusigioma

Lusigioma

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:43 PM

Posted 06 February 2011 - 08:56 AM

Ah ok good! :wink:

According to me you could run tdsskiller, then if you had to act on the log
then they would intervanuti moderators.
But I see that most of the work he did malwarebytes, there would be some other step to do, but right to follow the regulation :lol:

Edited by Lusigioma, 06 February 2011 - 09:02 AM.


#5 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,805 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:10:43 AM

Posted 06 February 2011 - 09:50 AM

Hello Scuddles,

Please follow the instructions in ==>This Guide<== starting at step 6.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Since you have run ComboFix, please include the ComboFix log in the new topic. Please be sure to include a description of your computer issues and what you have done to try to resolve them.

If you cannot produce any of the other logs, then please create the new topic anyway, include the information that you were unable to produce the other logs and why and include the ComboFix log along with a description of your computer issues.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#6 Scuddles

Scuddles
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:10:43 PM

Posted 06 February 2011 - 11:28 AM

I understand, created the new topic here.

#7 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,805 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:10:43 AM

Posted 06 February 2011 - 11:42 AM

Hello,

Now for the hard and frustrating part: waiting.

Now that you have posted a log, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users