Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with fake Windows Recovery Console, trojan, FakeAlert


  • This topic is locked This topic is locked
3 replies to this topic

#1 rjevans33

rjevans33

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:09 PM

Posted 25 May 2011 - 06:32 PM

Machine: Dell laptop
OS: Win XP SP3 with current updates

A few days ago small popup windows started appearing with warnings that my harddisk had errors, files were missing, etc. The laptop is only a few months old so I suspected a virus. I used Alt-F4 to close the windows. They reappeared. I rebooted. The small window appeared again along with a larger window stating all sorts of problems were found.

My desktop icans and background all disappeared and my Programs menu was empty.

About this time my up-to-date McAfee VirusScan Enterprise v8.7i popped up and said it had found and stopped execution of a trojan and a "FakeAlert" program. From McAfee logs:

5/20/2011 1:43:01 PM Deleted NT AUTHORITY\SYSTEM C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\system32\drivers\1541E.sys Generic Dropper.va.gen.t (Trojan)

5/20/2011 1:54:04 PM Engine version = 5400.1158
5/20/2011 1:54:04 PM AntiVirus DAT version = 6351.0
5/20/2011 1:54:04 PM Number of detection signatures in EXTRA.DAT = None
5/20/2011 1:54:04 PM Names of detection signatures in EXTRA.DAT = None
5/20/2011 1:57:19 PM Deleted NT AUTHORITY\SYSTEM C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe C:\Documents and Settings\All Users\Application Data\15851300.exe FakeAlert-FAB!8295A1C79ED2 (Trojan)


Nice that McAfee was too late and the virus was already running.

Since my desktop icons all disappeared I used Windows Explorer to locate Spybot and ran it. Spybot log:
20.05.2011 14:39:09 - ##### check started #####
20.05.2011 14:39:09 - ### Version: 1.6.2
20.05.2011 14:39:09 - ### Date: 5/20/2011 2:39:09 PM
20.05.2011 14:39:13 - ##### checking bots #####
20.05.2011 14:40:26 - found: Fraud.DefenseCenter Settings
20.05.2011 14:40:26 - found: Fraud.DefenseCenter Settings
20.05.2011 14:42:27 - found: Fraud.WindowsRecovery Settings
20.05.2011 14:42:27 - found: Fraud.WindowsRecovery Settings
20.05.2011 14:43:18 - found: Microsoft.Windows.ActiveDesktop User settings
20.05.2011 14:43:18 - found: Microsoft.Windows.Explorer User settings
20.05.2011 15:02:32 - ##### check finished #####

Spybot fixed these:
--- Report generated: 2011-05-20 15:03 ---

Fraud.DefenseCenter: [SBI $8B9C68F8] Settings (Registry change, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr

Fraud.DefenseCenter: [SBI $400D394B] Settings (Registry change, fixed)
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr

Fraud.WindowsRecovery: [SBI $9C8FE954] Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\75fa38b7-8b94-4995-ad32-52e938867954

Fraud.WindowsRecovery: [SBI $597FC39E] Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\BD

Microsoft.Windows.ActiveDesktop: [SBI $99FAD8A8] User settings (Registry change, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper

Microsoft.Windows.Explorer: [SBI $44FBFD3A] User settings (Registry change, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop

My desktop was still empty so I went to bleeping computer and found others with similar issues so I downloaded MalwareBytes MBAM, Database version: 5214. Full scans at
3:29PM and 4:10PM found nothing.

Later, McAfee reported FakeAlert again:
5/20/2011 5:18:11 PM Engine version = 5400.1158
5/20/2011 5:18:11 PM AntiVirus DAT version = 6351.0
5/20/2011 5:18:11 PM Number of detection signatures in EXTRA.DAT = None
5/20/2011 5:18:11 PM Names of detection signatures in EXTRA.DAT = None
5/20/2011 5:27:41 PM Not scanned (scan timed out) ACTEL\EvansR C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe C:\WINDOWS\system32\GfxUI.exe.config
5/20/2011 5:27:42 PM Not scanned (scan timed out) ACTEL\EvansR C:\Documents and Settings\All Users\Application Data\VcuVoQGfeSxd.exe C:\Documents and Settings\evansr\Recent\Desktop.ini
5/20/2011 5:27:42 PM Deleted ACTEL\EvansR C:\Documents and Settings\All Users\Application Data\VcuVoQGfeSxd.exe C:\Documents and Settings\All Users\Application Data\16899876.exe FakeAlert-FAB!8295A1C79ED2 (Trojan)

I updated MBAM (Database version: 6630) and it found a few items in QuickScan:
Memory Processes Infected:
c:\documents and settings\all users\application data\vcuvoqgfesxd.exe (Trojan.FakeMS.Gen) -> 2064 -> Unloaded process successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VcuVoQGfeSxd (Trojan.FakeMS.Gen) -> Value: VcuVoQGfeSxd -> Quarantined and deleted successfully.

Files Infected:
c:\documents and settings\all users\application data\vcuvoqgfesxd.exe (Trojan.FakeMS.Gen) -> Quarantined and deleted successfully.

20 minutes later another MBAM Quickscan found:
Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper (PUM.Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop (PUM.Hidden.Desktop) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

None of this helped recover my desktop so I tried the Unhide.exe from bleeping computer. This restored my desktop icons and entries in the Programs menu. I had to go find and set my desktop background by hand.

MBAM QuickScans at 6:04PM and 6:22PM found nothing.

I then updated Spybot and ran it again. It found:
20.05.2011 22:04:26 - ##### check started #####
20.05.2011 22:04:26 - ### Version: 1.6.2
20.05.2011 22:04:26 - ### Date: 5/20/2011 10:04:26 PM
20.05.2011 22:04:29 - ##### checking bots #####
20.05.2011 22:08:19 - found: Fraud.WindowsRecovery Settings
20.05.2011 22:08:19 - found: Fraud.WindowsRecovery Settings
20.05.2011 22:27:47 - ##### check finished #####

Spybot then fixed:
--- Report generated: 2011-05-20 22:44 ---

Fraud.WindowsRecovery: [SBI $9C8FE954] Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\75fa38b7-8b94-4995-ad32-52e938867954

Fraud.WindowsRecovery: [SBI $597FC39E] Settings (Registry value, fixed)
HKEY_USERS\S-1-5-21-9395636-991578434-8547516-9325\Software\BD

MBAM FullScan at 11:48PM found nothing.

The laptop was working fine at this point.

This morning (5 days later) I updated MBAM again to Database version: 6670 and it found:
Files Infected:
c:\system volume information\_restore{d5ad735b-371c-40d6-b948-d1f19a515d24}\RP164\A0030446.exe (Rogue.WindowsRecoveryConsole) -> Quarantined and deleted successfully.

McAfee reports nothing found for the past few days.

I also updated Spybot today and scanned. It found nothing.

QUESTION: What else can I do to ensure the virus(es) are gone?

Following the preparation guide instructions at bleepingcomputer I ran Defogger, DDS,
and GMER. Per the Prep Guide I include the DDS and GMER logs here:

DDS log:
.
DDS (Ver_11-05-19.01) - NTFSx86
Internet Explorer: 8.0.6001.18702 BrowserJavaVersion: 1.6.0_24
Run by EvansR at 12:41:29 on 2011-05-25
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.3318.1865 [GMT -7:00]
.
AV: Lavasoft Ad-Watch Live! Anti-Virus *Enabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
AV: McAfee VirusScan Enterprise *Enabled/Updated* {918A2B0B-2C60-4016-A4AB-E868DEABF7F0}
.
============== Running Processes ===============
.
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\Program Files\Intel\WiFi\bin\S24EvMon.exe
svchost.exe
svchost.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
C:\WINDOWS\system32\spoolsv.exe
c:\program files\idt\wdm\stacsv.exe
C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\CV\bin\HostControlService.exe
C:\Program Files\Broadcom Corporation\Broadcom USH Host Components\CV\bin\HostStorageService.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
C:\WINDOWS\SYSTEM32\DWRCS.EXE
C:\Program Files\Intel\WiFi\bin\EvtEng.exe
C:\WINDOWS\system32\svchost.exe -k hpdevmgmt
C:\WINDOWS\system32\svchost.exe -k HPService
C:\Program Files\STMicroelectronics\AccelerometerP11\InstallFilterService.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\Program Files\Intel\Intel® Management Engine Components\LMS\LMS.exe
C:\Program Files\McAfee\VirusScan Enterprise\EngineServer.exe
C:\Program Files\McAfee\Common Framework\FrameworkService.exe
C:\Program Files\DellTPad\Apoint.exe
C:\Program Files\Intel\WiFi\bin\ZCfgSvc.exe
C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\McAfee\Common Framework\udaterui.exe
C:\Program Files\VMware\VMware Player\hqtray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe
C:\WINDOWS\system32\mfevtps.exe
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\WINDOWS\System32\svchost.exe -k HPZ12
C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
C:\Program Files\Secunia\PSI\PSIA.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\WINDOWS\SYSTEM32\DWRCST.exe
C:\Program Files\DellTPad\ApMsgFwd.exe
C:\Program Files\DellTPad\HidFind.exe
C:\Program Files\DellTPad\Apntex.exe
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\Program Files\Intel\Intel® Management Engine Components\UNS\UNS.exe
C:\Program Files\Common Files\VMware\USB\vmware-usbarbitrator.exe
C:\WINDOWS\system32\vmnat.exe
C:\Program Files\Intel\WiFi\bin\WLKeeper.exe
C:\Program Files\McAfee\VirusScan Enterprise\Mcshield.exe
C:\Program Files\VMware\VMware Player\vmware-authd.exe
C:\WINDOWS\system32\vmnetdhcp.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\WINDOWS\system32\wbem\unsecapp.exe
C:\Program Files\Lavasoft\Ad-Aware\AAWTray.exe
C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_clipbook.exe
C:\PROGRA~1\SHOREL~1\SHOREW~1\STCLogin.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\wuauclt.exe
C:\PROGRA~1\TEXTPA~1\TextPad.exe
D:\Applications\spyware\dds.scr
C:\WINDOWS\system32\WSCRIPT.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.theblaze.com/
uInternet Settings,ProxyOverride = *.local
BHO: HP Print Enhancer: {0347c33e-8762-4905-bf09-768834316c61} - c:\program files\hp\digital imaging\smart web printing\hpswp_printenhancer.dll
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: scriptproxy: {7db2d5a0-7241-4e79-b68d-6309f01c5231} - c:\program files\mcafee\virusscan enterprise\scriptsn.dll
BHO: AcroIEToolbarHelper Class: {ae7cd045-e861-484f-8273-0445ee161910} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: HP Smart BHO Class: {ffffffff-cf4e-4f2b-bdc2-0e72e116a856} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
TB: Adobe PDF: {47833539-d0c5-4125-9fa8-0819e2eaac93} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
EB: Adobe PDF: {182ec0be-5110-49c8-a062-beb1d02a220b} - c:\program files\adobe\acrobat 6.0\acrobat\AcroIEFavClient.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [Apoint] c:\program files\delltpad\Apoint.exe
mRun: [IntelZeroConfig] "c:\program files\intel\wifi\bin\ZCfgSvc.exe"
mRun: [IntelWireless] "c:\program files\common files\intel\wirelesscommon\iFrmewrk.exe" /tf Intel Wireless Tray
mRun: [ShStatEXE] "c:\program files\mcafee\virusscan enterprise\SHSTAT.EXE" /STANDALONE
mRun: [IMSS] "c:\program files\intel\intel® management engine components\imss\PIconStartup.exe"
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [NVHotkey] rundll32.exe nvHotkey.dll,Start
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\udaterui.exe" /StartedFromRunKey
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 10.0\reader\Reader_sl.exe"
mRun: [VMware hqtray] "c:\program files\vmware\vmware player\hqtray.exe"
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [DameWare MRC Agent] c:\windows\system32\DWRCST.exe
StartupFolder: c:\documents and settings\all users\start menu\programs\startup\Secunia PSI Tray.lnk.disabled
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Send to &Bluetooth Device... - c:\program files\widcomm\bluetooth software\btsendto_ie_ctx.htm
IE: Send To Bluetooth - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {CCA281CA-C863-46ef-9331-5C8D4460577F} - c:\program files\widcomm\bluetooth software\btsendto_ie.htm
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DDE87865-83C5-48c4-8357-2F5B1AA84522} - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - c:\program files\hp\digital imaging\smart web printing\hpswp_BHO.dll
LSP: c:\program files\vmware\vmware player\vsocklib.dll
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {4871A87A-BFDD-4106-8153-FFDE2BAC2967} - hxxp://dlm.tools.akamai.com/dlmanager/versions/activex/dlm-activex-2.2.5.7.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1305960180705
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} - hxxps://attwm.webex.com/client/T25L10NSP41EP15-attwm/webex/ieatgpc.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: {BF188265-03DF-4224-8839-D0CC482E50CA} = 190.9.12.1,190.9.12.40
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: igfxcui - igfxdev.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\evansr\application data\mozilla\firefox\profiles\9xwx1ehi.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.theblaze.com/
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
.
============= SERVICES / DRIVERS ===============
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-12-20 64288]
R0 mfehidk;McAfee Inc. mfehidk;c:\windows\system32\drivers\mfehidk.sys [2010-6-3 344712]
R0 stdflt;Disk Filter Driver for Accelerometer;c:\windows\system32\drivers\stdfltn.sys [2010-6-3 17072]
R1 actelsvc;actelsvc;c:\windows\system32\drivers\actelsvc.sys [2010-10-27 5120]
R1 dwvkbd;DameWare Virtual Keyboard 32 bit Driver;c:\windows\system32\drivers\dwvkbd.sys [2007-2-15 26624]
R2 Credential Vault Host Control Service;Credential Vault Host Control Service;c:\program files\broadcom corporation\broadcom ush host components\cv\bin\HostControlService.exe [2009-12-17 812448]
R2 Credential Vault Host Storage;Credential Vault Host Storage;c:\program files\broadcom corporation\broadcom ush host components\cv\bin\HostStorageService.exe [2009-12-17 27040]
R2 InstallFilterService;FF Install Filter Service;c:\program files\stmicroelectronics\accelerometerp11\InstallFilterService.exe [2010-6-3 60928]
R2 Lavasoft Ad-Aware Service;Lavasoft Ad-Aware Service;c:\program files\lavasoft\ad-aware\AAWService.exe [2010-12-3 2151128]
R2 McAfeeEngineService;McAfee Engine Service;c:\program files\mcafee\virusscan enterprise\EngineServer.exe [2010-8-25 22816]
R2 McAfeeFramework;McAfee Framework Service;c:\program files\mcafee\common framework\FrameworkService.exe [2010-10-15 120128]
R2 McShield;McAfee McShield;c:\program files\mcafee\virusscan enterprise\Mcshield.exe [2010-8-25 147984]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2010-8-25 66880]
R2 mfevtp;McAfee Validation Trust Protection Service;c:\windows\system32\mfevtps.exe [2010-6-3 69192]
R2 risdpcie;risdpcie;c:\windows\system32\drivers\risdpe86.sys [2010-6-3 59904]
R2 Secunia PSI Agent;Secunia PSI Agent;c:\program files\secunia\psi\psia.exe [2011-4-18 993848]
R2 UNS;Intel® Management & Security Application User Notification Service;c:\program files\intel\intel® management engine components\uns\UNS.exe [2010-6-22 2533400]
R2 vmci;VMware vmci;c:\windows\system32\drivers\vmci.sys [2010-1-22 70704]
R2 VMUSBArbService;VMware USB Arbitration Service;c:\program files\common files\vmware\usb\vmware-usbarbitrator.exe [2010-1-22 563760]
R2 vsdatant;vsdatant;c:\windows\system32\vsdatant.sys [2005-1-26 280344]
R3 Acceler;Accelerometer Service;c:\windows\system32\drivers\Accelern.sys [2010-6-3 42672]
R3 AESTAud;AE Audio Service;c:\windows\system32\drivers\AESTAud.sys [2010-6-3 113664]
R3 cvusbdrv;Dell ControlVault;c:\windows\system32\drivers\cvusbdrv.sys [2010-6-3 33832]
R3 DwMirror;DwMirror;c:\windows\system32\drivers\DamewareMini.sys [2007-2-7 3712]
R3 e1kexpress;Intel® PRO/1000 PCI Express Network Connection Driver K;c:\windows\system32\drivers\e1k5132.sys [2010-6-3 166568]
R3 Lavasoft Kernexplorer;Lavasoft helper driver;c:\program files\lavasoft\ad-aware\kernexplorer.sys [2010-12-3 15232]
R3 mfeavfk;McAfee Inc. mfeavfk;c:\windows\system32\drivers\mfeavfk.sys [2010-6-3 91896]
R3 mfebopk;McAfee Inc. mfebopk;c:\windows\system32\drivers\mfebopk.sys [2010-6-3 43192]
R3 NVHDA;Service for NVIDIA High Definition Audio Driver;c:\windows\system32\drivers\nvhda32.sys [2010-6-3 58600]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 ACRUSBTM;ACRUSBTM;c:\windows\system32\drivers\ACRUSBTM.SYS [2010-10-27 28672]
S3 CYUSB;Cypress Generic USB Driver;c:\windows\system32\drivers\cyusb.sys [2010-10-27 38528]
S3 Impcd;Impcd;c:\windows\system32\drivers\Impcd.sys [2010-6-3 132480]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\drivers\IntcDAud.sys [2010-6-22 235520]
S3 mferkdet;McAfee Inc. mferkdet;c:\windows\system32\drivers\mferkdet.sys [2010-6-3 66536]
S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [2010-9-1 15544]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2011-05-21 06:25:49 -------- d-----w- c:\documents and settings\evansr\local settings\application data\Secunia PSI
2011-05-21 06:25:18 -------- d-----w- c:\program files\Secunia
2011-05-21 01:30:04 -------- d-----w- c:\documents and settings\evansr\local settings\application data\Mozilla
2011-05-20 22:20:42 -------- d-----w- c:\documents and settings\evansr\application data\Malwarebytes
2011-05-20 22:20:35 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2011-05-20 22:20:34 -------- d-----w- c:\documents and settings\all users\application data\Malwarebytes
2011-05-20 22:20:16 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-05-20 22:20:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2011-05-20 20:43:01 -------- d-----w- C:\Quarantine
2011-05-16 22:16:47 -------- d-----w- c:\program files\Microsoft SQL Server
2011-05-16 22:16:30 -------- d-----w- c:\program files\Microsoft Synchronization Services
2011-05-16 22:16:29 -------- d-----w- c:\program files\Microsoft SQL Server Compact Edition
2011-05-16 22:16:00 188128 ----a-w- c:\documents and settings\all users\application data\microsoft\vcsexpress\10.0\1033\ResourceCache.dll
2011-05-16 22:13:51 -------- d-----w- c:\program files\Microsoft Help Viewer
2011-05-16 22:13:50 -------- d-----w- c:\program files\Microsoft Visual Studio 10.0
2011-05-13 22:22:03 -------- d-----w- c:\documents and settings\evansr\local settings\application data\Help
2011-05-13 22:19:54 -------- d-----w- c:\program files\OrcadLite
2011-05-13 22:19:06 306688 ----a-w- c:\windows\IsUninst.exe
2011-05-13 16:17:18 404640 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2011-04-26 01:29:24 45328 ----a-w- c:\program files\common files\microsoft shared\replication manager 4.0\mstran40.exe
2011-04-26 01:29:23 74000 ----a-w- c:\program files\common files\microsoft shared\replication manager 4.0\msrpfs40.dll
2011-04-26 01:29:23 37136 ----a-w- c:\program files\common files\microsoft shared\replication manager 4.0\mstrai40.exe
2011-04-26 01:27:24 89360 ----a-w- c:\windows\system32\VB5DB.DLL
2011-04-26 01:27:19 -------- d-----w- C:\TSO
.
==================== Find3M ====================
.
2011-05-21 06:38:42 73728 ----a-w- c:\windows\system32\javacpl.cpl
2011-05-21 06:38:41 472808 ----a-w- c:\windows\system32\deployJava1.dll
2011-04-18 10:23:39 16432 ----a-w- c:\windows\system32\lsdelete.exe
2011-04-11 22:41:53 5120 ----a-w- c:\windows\system32\drivers\actelsvc.sys
.
============= FINISH: 12:42:31.39 ===============


GMER log: I have generated a GMER log but when added to this post the site says the post is too long. Please let me know if you need the GMER log and I'll include it in another post.

BTW: Many thanks for all the helpful info I've been able to use from your site: Malware removal Guides, programs like unhide.exe, recommendations for tools like MBAM, SpyBot, etc!!!

Edited by rjevans33, 25 May 2011 - 06:45 PM.


BC AdBot (Login to Remove)

 


#2 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:10:09 PM

Posted 02 June 2011 - 11:27 AM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Please do not PM me directly for help. If you have any questions, post them in this topic.
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.

____________________________________________________

Rootkit UnHooker (RkU)
Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth Code, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".



NEXT:


Running OTL

We need to create a FULL OTL Report
  • Please download OTL from here:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extras.txt <-- Will be minimized

NEXT:


Please provide an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.


#3 rjevans33

rjevans33
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:07:09 PM

Posted 03 June 2011 - 01:27 AM

Thanks SweetTech for looking at this.

In looking at the time I spent already and what it seemed like it would take in the future to clean up my system, I decided to backup my needed data and wipe the drive completely then rebuild it. The self-help section of this site helped me get my PC stable enough to make the backups. Otherwise, I'd be patiently working with you.

Please close this thread and thanks again to bleepingcomputer for the great resources! :thumbsup:

#4 SweetTech

SweetTech

    Agent ST


  • Members
  • 13,421 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Antarctica
  • Local time:10:09 PM

Posted 03 June 2011 - 10:36 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image


The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users