Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

need help with unremovable virus 1st time forum user


  • Please log in to reply
7 replies to this topic

#1 2tyte2paye

2tyte2paye

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 07 December 2011 - 12:06 PM

dont know were it came from but i found a short cut in my user startup folder,a folder in app data local weith a file in it that seemed to get called by svchost32,a .exe called smfncgkuelpqtabn.exe 111kbytes all the .exe files this thing creates have a laptops touchpad and two buttons for its icon.if deleted it just returns.i had to delete svchost32 or the system was just unusable.i did once very quickly open app data local temp upon boot to quickly see what looked like a script appear and then vanish called somethimg like ?????? hidden but it vanished too quick to see the first word.also at the same time this happens a file called mekxjnhn.sys appears and dissapears i managed to quickly drag a copy onto the desktop. whenever a 32bit program is run it creates a file in the programs folder called (program name)mgr.exe then another file called (program name)mgrmgr.exe that can happen ive known up to 30/40 times each time adding mgr to the end so in the end i may end up with a file called for example notepad mgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgrmgr.exe.im realy lost with this thing if i put a usb un i end up with shortcut to/1 shortcut to/2 shortcut to/3 shortcut to /4 and a RECYCLER folder with 4 or 5 folders in it which are hidden and in each folder a lot of these .exe file with names like smtrlvcghfj.exe (made up) but since i deleted svchost32 this seems to have stopped.please if someone could advise i have a copy of the two files i managed to drag to desktop mekxjnhn.sys and smfncgkuelpqtabn.exe if anyone wishes to analyse them and also logs and screen grabs i will say i opened one of the 111kb files in hxd and at the bottom said something about nulsoft so i wondered if it was a modified program .exe anyway i hope someone can help i know pcs well just not how to remove this its got me truly baffeled.thanks and sorry if ive side stepped any rules or broke any i dont want to upset or offend anyone im really new to asking for help online.

ps sorry i forgot to add dont know if its required but ive noticed forums seem to require specs. windows 7 64 asrock n68cs ucc athlon 2x4 640 4gig pc3-10700h 1333 cl9 amd hd 5670 ddr5 1gig 775/1000

Edited by 2tyte2paye, 07 December 2011 - 12:21 PM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:09 AM

Posted 07 December 2011 - 12:32 PM

Hello, these are malware..mekxjnhn.sys and smfncgkuelpqtabn.exe
delete and empty the recycle bin.
What is your oprating system and are you running Symantec ..

Lets see if we can run these.


Please download MiniToolBox, save it to your desktop and run it.

Checkmark the following checkboxes:
  • Flush DNS
  • Report IE Proxy Settings
  • Reset IE Proxy Settings
  • Report FF Proxy Settings
  • Reset FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size.
  • List Minidump Files
Click Go and post the result (Result.txt). A copy of Result.txt will be saved in the same directory the tool is run.

Note: When using "Reset FF Proxy Settings" option Firefox should be closed.




Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware and save it to your desktop.
Download Link 1
Download Link 2MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

Troubleshoot Malwarebytes' Anti-Malware
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 2tyte2paye

2tyte2paye
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 07 December 2011 - 12:54 PM

thanks for quick reply


MiniToolBox by Farbar
Ran by 2tyte2paye (administrator) on 07-12-2011 at 17:40:03
Windows 7 Ultimate (X64)

***************************************************************************

========================= Flush DNS: ===================================

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

"Reset IE Proxy Settings": IE Proxy Settings were reset.

========================= FF Proxy Settings: ==============================

"network.proxy.type", 0

"Reset FF Proxy Settings": Firefox Proxy settings were reset.

========================= Hosts content: =================================


127.0.0.1 validation.sls.microsoft.com

========================= IP Configuration: ================================

NVIDIA nForce 10/100 Mbps Ethernet = Local Area Connection (Connected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : 2tyte2payes-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : NVIDIA nForce 10/100 Mbps Ethernet
Physical Address. . . . . . . . . : 00-25-22-6F-67-60
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::48f9:e3b5:8fe2:7d18%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.0.100(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : 07 December 2011 13:39:33
Lease Expires . . . . . . . . . . : 14 December 2011 13:39:33
Default Gateway . . . . . . . . . : 192.168.0.1
DHCP Server . . . . . . . . . . . : 192.168.0.1
DHCPv6 IAID . . . . . . . . . . . : 234890530
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-16-5D-65-61-00-25-22-6F-67-60
DNS Servers . . . . . . . . . . . : 192.168.0.1
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{45D90399-6A04-4749-9501-E8828E3B9819}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 9:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2001:0:5ef5:79fd:243e:1bf1:add9:1b20(Preferred)
Link-local IPv6 Address . . . . . : fe80::243e:1bf1:add9:1b20%13(Preferred)
Default Gateway . . . . . . . . . : ::
NetBIOS over Tcpip. . . . . . . . : Disabled
Server: dir-615
Address: 192.168.0.1

Name: google.com
Addresses: 173.194.66.104
173.194.66.99
173.194.66.147
173.194.66.105
173.194.66.103
173.194.66.106


Pinging google.com [173.194.66.99] with 32 bytes of data:
Reply from 173.194.66.99: bytes=32 time=24ms TTL=45
Reply from 173.194.66.99: bytes=32 time=24ms TTL=45

Ping statistics for 173.194.66.99:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 24ms, Maximum = 24ms, Average = 24ms
Server: dir-615
Address: 192.168.0.1

Name: yahoo.com
Addresses: 209.191.122.70
72.30.2.43
98.137.149.56
98.139.180.149


Pinging yahoo.com [72.30.2.43] with 32 bytes of data:
Reply from 72.30.2.43: bytes=32 time=165ms TTL=51
Reply from 72.30.2.43: bytes=32 time=162ms TTL=51

Ping statistics for 72.30.2.43:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 162ms, Maximum = 165ms, Average = 163ms
Server: dir-615
Address: 192.168.0.1

Name: bleepingcomputer.com
Address: 208.43.87.2


Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:
Reply from 208.43.87.2: Destination host unreachable.
Reply from 208.43.87.2: Destination host unreachable.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
11...00 25 22 6f 67 60 ......NVIDIA nForce 10/100 Mbps Ethernet
1...........................Software Loopback Interface 1
12...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.100 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.0.0 255.255.255.0 On-link 192.168.0.100 276
192.168.0.100 255.255.255.255 On-link 192.168.0.100 276
192.168.0.255 255.255.255.255 On-link 192.168.0.100 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.0.100 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.0.100 276
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
13 58 ::/0 On-link
1 306 ::1/128 On-link
13 58 2001::/32 On-link
13 306 2001:0:5ef5:79fd:243e:1bf1:add9:1b20/128
On-link
11 276 fe80::/64 On-link
13 306 fe80::/64 On-link
13 306 fe80::243e:1bf1:add9:1b20/128
On-link
11 276 fe80::48f9:e3b5:8fe2:7d18/128
On-link
1 306 ff00::/8 On-link
13 306 ff00::/8 On-link
11 276 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [51712] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\winrnr.dll [20992] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\napinsp.dll [52224] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 07 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [134528] (Microsoft Corporation)
Catalog5 08 C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [134528] (Microsoft Corporation)
Catalog5 09 C:\Program Files (x86)\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [70144] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\winrnr.dll [28672] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\napinsp.dll [68096] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\pnrpnsp.dll [86016] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\pnrpnsp.dll [86016] (Microsoft Corporation)
x64-Catalog5 07 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [168304] (Microsoft Corporation)
x64-Catalog5 08 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [168304] (Microsoft Corporation)
x64-Catalog5 09 C:\Program Files\Bonjour\mdnsNSP.dll [132968] (Apple Inc.)
x64-Catalog9 01 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [320000] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (12/07/2011 05:39:40 PM) (Source: Application Error) (User: )
Description: Faulting application name: explorer.exe, version: 6.1.7600.16768, time stamp: 0x4d688122
Faulting module name: ntdll.dll, version: 6.1.7600.16695, time stamp: 0x4cc7b325
Exception code: 0xc0000005
Fault offset: 0x000000000004c8f4
Faulting process id: 0x1528
Faulting application start time: 0xexplorer.exe0
Faulting application path: explorer.exe1
Faulting module path: explorer.exe2
Report Id: explorer.exe3

Error: (12/07/2011 05:36:33 PM) (Source: Application Error) (User: )
Description: Faulting application name: explorer.exe, version: 6.1.7600.16768, time stamp: 0x4d688122
Faulting module name: ntdll.dll, version: 6.1.7600.16695, time stamp: 0x4cc7b325
Exception code: 0xc0000005
Fault offset: 0x000000000004c8f4
Faulting process id: 0x55c
Faulting application start time: 0xexplorer.exe0
Faulting application path: explorer.exe1
Faulting module path: explorer.exe2
Report Id: explorer.exe3

Error: (12/07/2011 04:51:19 PM) (Source: Application Error) (User: )
Description: Faulting application name: explorer.exe, version: 6.1.7600.16768, time stamp: 0x4d688122
Faulting module name: ntdll.dll, version: 6.1.7600.16695, time stamp: 0x4cc7b325
Exception code: 0xc0000005
Fault offset: 0x000000000004c8f4
Faulting process id: 0x8e0
Faulting application start time: 0xexplorer.exe0
Faulting application path: explorer.exe1
Faulting module path: explorer.exe2
Report Id: explorer.exe3

Error: (12/07/2011 04:43:35 PM) (Source: Application Error) (User: )
Description: Faulting application name: svchost.exe, version: 6.1.7600.16385, time stamp: 0x4a5bc3c1
Faulting module name: KERNELBASE.dll, version: 6.1.7600.16850, time stamp: 0x4e211da1
Exception code: 0xe06d7363
Fault offset: 0x000000000000a88d
Faulting process id: 0x6d0
Faulting application start time: 0xsvchost.exe0
Faulting application path: svchost.exe1
Faulting module path: svchost.exe2
Report Id: svchost.exe3

Error: (12/07/2011 03:47:15 PM) (Source: Application Hang) (User: )
Description: The program NOTEPAD.EXE version 6.1.7600.16385 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 14f4

Start Time: 01ccb4f7711080a4

Termination Time: 0

Application Path: C:\Windows\system32\NOTEPAD.EXE

Report Id: ba437a8e-20ea-11e1-8093-0025226f6760

Error: (12/07/2011 03:20:58 PM) (Source: Application Error) (User: )
Description: Faulting application name: explorer.exe, version: 6.1.7600.16768, time stamp: 0x4d688122
Faulting module name: ntdll.dll, version: 6.1.7600.16695, time stamp: 0x4cc7b325
Exception code: 0xc0000005
Fault offset: 0x000000000004c8f4
Faulting process id: 0x16c4
Faulting application start time: 0xexplorer.exe0
Faulting application path: explorer.exe1
Faulting module path: explorer.exe2
Report Id: explorer.exe3

Error: (12/07/2011 03:20:12 PM) (Source: Application Error) (User: )
Description: Faulting application name: SVLTLJ.exe, version: 1.71.0.0, time stamp: 0x44e255aa
Faulting module name: SVLTLJ.exe, version: 1.71.0.0, time stamp: 0x44e255aa
Exception code: 0xc0000005
Fault offset: 0x0003b0cd
Faulting process id: 0x1660
Faulting application start time: 0xSVLTLJ.exe0
Faulting application path: SVLTLJ.exe1
Faulting module path: SVLTLJ.exe2
Report Id: SVLTLJ.exe3

Error: (12/07/2011 03:19:37 PM) (Source: Application Error) (User: )
Description: Faulting application name: RootkitRevealer.exe, version: 1.71.0.0, time stamp: 0x44e255aa
Faulting module name: RootkitRevealer.exe, version: 1.71.0.0, time stamp: 0x44e255aa
Exception code: 0xc0000005
Fault offset: 0x000040cd
Faulting process id: 0x488
Faulting application start time: 0xRootkitRevealer.exe0
Faulting application path: RootkitRevealer.exe1
Faulting module path: RootkitRevealer.exe2
Report Id: RootkitRevealer.exe3

Error: (12/07/2011 02:53:25 PM) (Source: Application Error) (User: )
Description: Faulting application name: explorer.exe, version: 6.1.7600.16768, time stamp: 0x4d688122
Faulting module name: ntdll.dll, version: 6.1.7600.16695, time stamp: 0x4cc7b325
Exception code: 0xc0000005
Fault offset: 0x000000000004c8f4
Faulting process id: 0xeac
Faulting application start time: 0xexplorer.exe0
Faulting application path: explorer.exe1
Faulting module path: explorer.exe2
Report Id: explorer.exe3

Error: (12/07/2011 02:20:46 PM) (Source: Application Error) (User: )
Description: Windows cannot access the file for one of the following reasons:
there is a problem with the network connection, the disk that the file is stored on, or the storage
drivers installed on this computer; or the disk is missing.
Windows closed the program PCI32.EXE because of this error.

Program: PCI32.EXE
File:

The error value is listed in the Additional Data section.
User Action
1. Open the file again.
This situation might be a temporary problem that corrects itself when the program runs again.
2.
If the file still cannot be accessed and
- It is on the network,
your network administrator should verify that there is not a problem with the network and that the server can be contacted.
- It is on a removable disk, for example, a floppy disk or CD-ROM, verify that the disk is fully inserted into the computer.
3. Check and repair the file system by running CHKDSK. To run CHKDSK, click Start, click Run, type CMD, and then click OK. At the command prompt, type CHKDSK /F, and then press ENTER.
4. If the problem persists, restore the file from a backup copy.
5. Determine whether other files on the same disk can be opened. If not, the disk might be damaged. If it is a hard disk, contact your administrator or computer hardware vendor for
further assistance.

Additional Data
Error value: 00000000
Disk type: 0


System errors:
=============
Error: (12/07/2011 03:30:10 PM) (Source: Service Control Manager) (User: )
Description: The SASDIFSV service failed to start due to the following error:
%%1275

Error: (12/07/2011 03:30:10 PM) (Source: Application Popup) (User: )
Description: \??\C:\Users\2TYTE2~1\AppData\Local\Temp\HBCD\SuperAntiSpyware\ has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.

Error: (12/07/2011 03:30:09 PM) (Source: Service Control Manager) (User: )
Description: The SASKUTIL service failed to start due to the following error:
%%2

Error: (12/07/2011 03:21:52 PM) (Source: Service Control Manager) (User: )
Description: The Active@ Disk Monitor service terminated unexpectedly. It has done this 1 time(s).

Error: (12/07/2011 02:20:46 PM) (Source: Service Control Manager) (User: )
Description: The gwiopm service failed to start due to the following error:
%%1275

Error: (12/07/2011 02:20:46 PM) (Source: Application Popup) (User: )
Description: \??\C:\Users\2TYTE2~1\AppData\Local\Temp\HBCD\gwiopm.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.

Error: (12/07/2011 02:20:36 PM) (Source: Service Control Manager) (User: )
Description: The gwiopm service failed to start due to the following error:
%%1275

Error: (12/07/2011 02:20:36 PM) (Source: Application Popup) (User: )
Description: \??\C:\Users\2TYTE2~1\AppData\Local\Temp\HBCD\gwiopm.sys has been blocked from loading due to incompatibility with this system. Please contact your software vendor for a compatible version of the driver.

Error: (12/07/2011 01:55:24 PM) (Source: Service Control Manager) (User: )
Description: The Ashampoo HDD Control 2 Service service terminated unexpectedly. It has done this 1 time(s).

Error: (12/07/2011 01:40:04 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
rxvstor


Microsoft Office Sessions:
=========================
Error: (12/07/2011 05:39:40 PM) (Source: Application Error)(User: )
Description: explorer.exe6.1.7600.167684d688122ntdll.dll6.1.7600.166954cc7b325c0000005000000000004c8f4152801ccb506c56b26acC:\Windows\explorer.exeC:\Windows\SYSTEM32\ntdll.dll703543df-20fa-11e1-8093-0025226f6760

Error: (12/07/2011 05:36:33 PM) (Source: Application Error)(User: )
Description: explorer.exe6.1.7600.167684d688122ntdll.dll6.1.7600.166954cc7b325c0000005000000000004c8f455c01ccb50073488e3eC:\Windows\explorer.exeC:\Windows\SYSTEM32\ntdll.dll00c84531-20fa-11e1-8093-0025226f6760

Error: (12/07/2011 04:51:19 PM) (Source: Application Error)(User: )
Description: explorer.exe6.1.7600.167684d688122ntdll.dll6.1.7600.166954cc7b325c0000005000000000004c8f48e001ccb4f3d40064f0C:\Windows\explorer.exeC:\Windows\SYSTEM32\ntdll.dllaf17ab32-20f3-11e1-8093-0025226f6760

Error: (12/07/2011 04:43:35 PM) (Source: Application Error)(User: )
Description: svchost.exe6.1.7600.163854a5bc3c1KERNELBASE.dll6.1.7600.168504e211da1e06d7363000000000000a88d6d001ccb4fe842197bfC:\Windows\System32\svchost.exeC:\Windows\system32\KERNELBASE.dll9a9ab4be-20f2-11e1-8093-0025226f6760

Error: (12/07/2011 03:47:15 PM) (Source: Application Hang)(User: )
Description: NOTEPAD.EXE6.1.7600.1638514f401ccb4f7711080a40C:\Windows\system32\NOTEPAD.EXEba437a8e-20ea-11e1-8093-0025226f6760

Error: (12/07/2011 03:20:58 PM) (Source: Application Error)(User: )
Description: explorer.exe6.1.7600.167684d688122ntdll.dll6.1.7600.166954cc7b325c0000005000000000004c8f416c401ccb4effe85099cC:\Windows\explorer.exeC:\Windows\SYSTEM32\ntdll.dll103901f2-20e7-11e1-8093-0025226f6760

Error: (12/07/2011 03:20:12 PM) (Source: Application Error)(User: )
Description: SVLTLJ.exe1.71.0.044e255aaSVLTLJ.exe1.71.0.044e255aac00000050003b0cd166001ccb4f3b6c19a97C:\Users\2tyte2paye\AppData\Local\Temp\SVLTLJ.exeC:\Users\2tyte2paye\AppData\Local\Temp\SVLTLJ.exef472eb25-20e6-11e1-8093-0025226f6760

Error: (12/07/2011 03:19:37 PM) (Source: Application Error)(User: )
Description: RootkitRevealer.exe1.71.0.044e255aaRootkitRevealer.exe1.71.0.044e255aac0000005000040cd48801ccb4f3a1c169f6C:\Users\2tyte2paye\AppData\Local\Temp\HBCD\RootkitRevealer.exeC:\Users\2tyte2paye\AppData\Local\Temp\HBCD\RootkitRevealer.exedfa2698c-20e6-11e1-8093-0025226f6760

Error: (12/07/2011 02:53:25 PM) (Source: Application Error)(User: )
Description: explorer.exe6.1.7600.167684d688122ntdll.dll6.1.7600.166954cc7b325c0000005000000000004c8f4eac01ccb4ead9295c82C:\Windows\explorer.exeC:\Windows\SYSTEM32\ntdll.dll36ab9cd7-20e3-11e1-8093-0025226f6760

Error: (12/07/2011 02:20:46 PM) (Source: Application Error)(User: )
Description: PCI32.EXE000000000


=========================== Installed Programs ============================

7-Zip 9.20 (x64 edition) (Version: 9.20.00.0)
Active@ Hard Disk Monitor (Version: 1.3.095)
Activision® (Version: 1.0)
Activision® (Version: 1.00.0000)
Adobe Flash Player 11 ActiveX 64-bit (Version: 11.1.102.55)
Adobe Flash Player 11 Plugin 64-bit (Version: 11.1.102.55)
Aimersoft Video Converter Ultimate(Build 4.1.2.0)
Amadis DVD to iPod Converter V1.2.7
AMD APP SDK Runtime (Version: 2.5.793.1)
AMD Catalyst Install Manager (Version: 3.0.851.0)
AMD Drag and Drop Transcoding (Version: 2.00.0000)
AMD Fuel (Version: 2011.1025.2231.38573)
AMD Fusion Media Explorer (Version: 2.0.0.0174)
AMD Fusion Utility (Version: 2.0.1.117)
AMD Media Foundation Decoders (Version: 1.0.61025.2207)
AMD System Monitor (Version: 1.0.8)
AMD VISION Engine Control Center (Version: 2011.1025.2231.38573)
Apollo DVD to iPod 3.2.1
Apple Application Support (Version: 2.1.5)
Apple Mobile Device Support (Version: 4.0.0.97)
Apple Software Update (Version: 2.1.3.127)
Application Profiles (Version: 2.0.4331.36041)
Ashampoo HDD Control 2 2.07 (Version: 3.1.1)
ASRock IES v2.0.69
ASRock InstantBoot v1.24
ASRock OC DNA v1.6
ASRock OC Tuner v2.3.91
µTorrent (Version: 3.0.0)
Battlefield 3™ (Version: 1.0.0.0)
Bonjour (Version: 3.0.0.10)
Call of Duty Modern Warfare 3 version 1.0 (Version: 1.0)
Call of Duty: Black Ops
Catalyst Control Center - Branding (Version: 1.00.0000)
Catalyst Control Center Graphics Previews Common (Version: 2011.1025.2231.38573)
Catalyst Control Center InstallProxy (Version: 2011.1025.2231.38573)
ccc-utility64 (Version: 2011.1025.2231.38573)
CCC Help English (Version: 2011.1025.2230.38573)
CCleaner (Version: 3.12)
CDBurnerXP (Version: 4.4.0.2838)
Cheetah DVD Burner
Clone2Go Video Converter Professional 2.0.0
ConvertXtoDVD 4.1.12.352 (Version: 4.1.12.352)
Core Temp version 0.99.7 (Version: 0.99.7)
CoreAAC
Cucusoft Ultimate DVD + Video Converter Suite 8.3.8.3
Defraggler (Version: 2.08)
Desktop Restore (Version: 1.6.3)
DriveGLEAM V1.10
DVD Shrink 3.2
EVEREST Ultimate Edition v5.50 (Version: 5.50)
FileAlyzer 2 (Version: 2.0.5.57)
FormatFactory 2.70 (Version: 2.70)
Free Video Joiner 1.1
GetDiz (Version: 4.6)
GOM Player (Version: 2.1.33.5071)
GOM Video Converter (Version: 1.1.0.48)
Hard Reset
HDD Observer
HxD Hex Editor version 1.7.7.0 (Version: 1.7.7.0)
iTunes (Version: 10.5.1.42)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft Games for Windows - LIVE Redistributable (Version: 3.5.92.0)
Microsoft Games for Windows Marketplace (Version: 3.5.50.0)
Microsoft Silverlight (Version: 4.0.60831.0)
Microsoft SQL Server Compact 3.5 SP1 English (Version: 3.5.5692.0)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 (Version: 9.0.21022)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010 x64 Redistributable - 10.0.30319 (Version: 10.0.30319)
MSI Afterburner 2.2.0 Beta 9 (Version: 2.2.0 Beta 9)
NVIDIA Drivers (Version: 1.3)
NVIDIA ForceWare Network Access Manager (Version: 1.00.7305)
NVIDIA PhysX (Version: 9.11.1107)
Perfgraph (Version: 3.0.13)
Plato Video Converter Pro 12.11.01
Ray Adams ATI Tray Tools
Recuva (Version: 1.41)
RunAlyzer (Version: 1.6.1.24)
Sandboxie 3.60 (64-bit)
SDFormatter (Version: 3.1.0)
ShadowExplorer 0.8 (Version: 0.8.430.0)
Speccy (Version: 1.13)
SpeedFan (remove only)
Spider-Man™ - Shattered Dimensions (Version: 1.0)
Spybot - Search & Destroy 2 (Version: 2.0.6)
SUPER © v2011.build.49 (July 1st, 2011) version v2011.build.49 (Version: v2011.build.49)
Transformers - Revenge of the Fallen (Version: 1.0)
Transformers - War for Cybertron (Version: 1.0)
Unlocker 1.9.1-x64 (Version: 1.9.1)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2473228) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2533523) (Version: 1)
VirtualCloneDrive
VLC media player 1.1.11 (Version: 1.1.11)
VSuite Ramdisk (Professional Edition) 4.3.6127.1603 (Version: 4.3.6127.1603)
Waterfox 8.0.1 (x64 en-US) (Version: 8.0.1)
Windows Live ID Sign-in Assistant (Version: 6.500.3165.0)
X-Men Origins - Wolverine™ (Version: 1.00.0000)
XFastUsb
Xilisoft DVD Ripper Ultimate (Version: 5.0.64.0304)
Xilisoft Multiple Desktops (Version: 1.0.1.0630)

========================= Memory info: ===================================

Percentage of memory in use: 28%
Total physical RAM: 4095.3 MB
Available physical RAM: 2923.88 MB
Total Pagefile: 8188.76 MB
Available Pagefile: 6200.57 MB
Total Virtual: 4095.88 MB
Available Virtual: 3958.27 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:232.79 GB) (Free:73.86 GB) NTFS
3 Drive e: () (Fixed) (Total:65.33 GB) (Free:15.11 GB) NTFS
4 Drive f: (1980`s nostalgia) (Fixed) (Total:400.33 GB) (Free:88.9 GB) NTFS
5 Drive g: (System Reserved) (Fixed) (Total:0.1 GB) (Free:0.08 GB) NTFS
7 Drive i: (MULTIBOOT) (Removable) (Total:3.72 GB) (Free:2.72 GB) FAT32
8 Drive j: (New Volume) (Fixed) (Total:298.09 GB) (Free:160.17 GB) NTFS

========================= Users: ========================================

User accounts for \\2TYTE2PAYES-PC

2tyte2paye Administrator Guest

========================= Minidump Files ==================================

No minidump file found

**** End of log ****


mbam

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8328

Windows 6.1.7600
Internet Explorer 8.0.7600.16385

07/12/2011 17:50:09
mbam-log-2011-12-07 (17-50-09).txt

Scan type: Quick scan
Objects scanned: 175530
Time elapsed: 1 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
c:\program files (x86)\ray adams\ati tray tools\support.dll (Virus.Ramnit) -> Delete on reboot.
c:\program files (x86)\ray adams\ati tray tools\kbdhook.dll (Virus.Ramnit) -> Delete on reboot.
c:\program files (x86)\ray adams\ati tray tools\plugins\mongraphsexample.dll (Virus.Ramnit) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Micorsoft Windows Service (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\program files (x86)\ray adams\ati tray tools\support.dll (Virus.Ramnit) -> Quarantined and deleted successfully.
c:\program files (x86)\ray adams\ati tray tools\kbdhook.dll (Virus.Ramnit) -> Quarantined and deleted successfully.
c:\program files (x86)\ray adams\ati tray tools\plugins\mongraphsexample.dll (Virus.Ramnit) -> Quarantined and deleted successfully.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:09 AM

Posted 07 December 2011 - 02:47 PM

Hello..this is what I was afraid of.
c:\program files (x86)\ray adams\ati tray tools\support.dll (Virus.Ramnit) -> Delete on reboot.
c:\program files (x86)\ray adams\ati tray tools\kbdhook.dll (Virus.Ramnit) -> Delete on reboot.
c:\program files (x86)\ray adams\ati tray tools\plugins\mongraphsexample.dll (Virus.Ramnit) -> Delete on reboot.

I'm afraid I have very bad news.

Win32/Ramnit (and related variants) is a dangerous file infector with IRCBot functionality which infects .exe, and .HTML/HTM files, and opens a back door that compromises your computer. Using this backdoor, a remote attacker can access and instruct the infected computer to download and execute more malicious files. The infected .HTML or .HTM files may be detected as The infected .HTML or .HTM files may be detected as Virus:VBS/Ramnit.A or VBS/Generic. Win32/Ramnit.A!dll is a related file infector often seen with this infection. It too has IRCBot functionality which infects .exe, .dll and .HTML/HTM files and opens a back door that compromises your computer. This component is injected into the default web browser by Worm:Win32/Ramnit.A which is dropped by a Ramnit infected executable file.

-- Note: As with most malware infections, the threat name may be different depending on the anti-virus or anti-malware program which detected it. Each security vendor uses their own naming conventions to identify various types of malware.With this particular infection the safest solution and only sure way to remove it effectively is to reformat and reinstall the OS.

Why? The malware injects code in legitimate files similar to the Virut virus and in many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus. When disinfection is attempted, the files often become corrupted and the system may become unstable or irreparable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of damage can vary.

Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are infested with a smörgåsbord of malware and a major source of system infection.

In my opinion, Ramnit is not effectively disinfectable, so your best option is to perform a full reformat as there is no guarantee this infection can be completely removed. In most instances it may have caused so much damage to your system files that it cannot be completely cleaned or repaired. Security vendors that claim to be able to remove file infectors cannot guarantee that all traces of it will be removed as they may not find all the remnants. If something goes awry during the malware removal process there is always a risk the computer may become unstable or unbootable and you could loose access to all your data.

Further, your machine has likely been compromised by the backdoor Trojan and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if your anti-virus reports that the malware appears to have been removed.

Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:

Whenever a system has been compromised by a backdoor payload, it is impossible to know if or how much the backdoor has been used to affect your system...There are only a few ways to return a compromised system to a confident security configuration. These include:
• Reimaging the system
• Restoring the entire system using a full system backup from before the backdoor infection
• Reformatting and reinstalling the system

Backdoors and What They Mean to You

This is what security expert miekiemoes has to say: Virut and other File infectors - Throwing in the Towel?

If I guide someone with Virut (or any other File Infector) present and their Antivirus cannot properly disinfect it, then I recommend a format and reinstall...dealing with such infections is a waste of time and that's why I prefer the fastest and safest solution - which is a format and reinstall...After all, I think it would be irresponsible to let the malware "stew" (download/spread/run more malware) for another couple of days/weeks if you already know it's a lost case.


This is what Jesper M. Johansson at Microsoft TechNet has to say: Help: I Got Hacked. Now What Do I Do?.

The only way to clean a compromised system is to flatten and rebuild. That’s right. If you have a system that has been completely compromised, the only thing you can do is to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications).




Caution: If you are considering backing up data and reformatting, keep in mind, with a Virut or Ramnit infection, there is always a chance of backed up data reinfecting your system. If the data is that important to you, then you can try to salvage some of it but there is no guarantee so be forewarned that you may have to start over again afterwards if reinfected by attempting to recover your data. Only back up your important documents, personal data files, photos to a CD or DVD drive, not a flash drive or external hard drive as they may become compromised in the process. The safest practice is not to backup any executable files (*.exe), screensavers (*.scr), autorun (.ini) or script files (.php, .asp, .htm, .html, .xml ) files because they may be infected by malware. Avoid backing up compressed files (.zip, .cab, .rar) that have executables inside them as some types of malware can penetrate compressed files and infect the .exe files within them. Other types of malware may even disguise itself by hiding a file extension or adding to the existing extension as shown here (click Figure 1 to enlarge) so be sure you look closely at the full file name. If you cannot see the file extension, you may need to reconfigure Windows to show file name extensions. Then make sure you scan the backed up data with your anti-virus prior to to copying it back to your hard drive.

If your CD/DVD drive is unusable, another word of caution if you are considering backing up to an external usb hard drive as your only alternative. External drives are more susceptible to infection and can become compromised in the process of backing up data. I'm not saying you should not try using such devices but I want to make you aware of all your options and associated risks so you can make an informed decision if its worth that risk.Again, do not back up any files with the following file extensions: exe, .scr, .ini, .htm, .html, .php, .asp, .xml, .zip, .rar, .cab as they may be infected.

If you're not sure how to reformat or need help with reformatting, please review:These links include step-by-step instructions with screenshots:Vista users can refer to these instructions:Don't forget you will have to go to Microsoft Update and apply all Windows security patches after reformatting.

Note: If you're using an IBM, Sony, HP, Compaq or Dell machine, you may not have an original XP CD Disk. By policy Microsoft no longer allows OEM manufactures to include the original Windows XP CD-ROM on computers sold with Windows preinstalled. Instead, most computers manufactured and sold by OEM vendors come with a vendor-specific Recovery Disk or Recovery Partition for performing a clean "factory restore" that will reformat your hard drive, remove all data and restore the computer to the state it was in when you first purchased it. See Technology Advisory Recovery Media. If the recovery partition has become infected, you will need to contact the manufacturer, explain what happened and ask them to send full recovery disks to use instead..

If you need additional assistance with reformatting or partitioning, you can start a new topic in the Operating Systems Subforums forum.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 2tyte2paye

2tyte2paye
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 07 December 2011 - 03:26 PM

hi thanks thats exactly what i was afraid of anyway i can handle a reformat and reinstall there is just one thing as you can see from previous logs i have a few data drives most i dont really care about except the one drive my 1980 s media it has movies and tv series from 1980s in mp4 avi and also music mp3 and so on are these files ok to keep or must they go too as most are unreplaceable? many thanks to all

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:09 AM

Posted 07 December 2011 - 04:03 PM

They should be OK..
do not back up any files with the following file extensions: exe, .scr, .ini, .htm, .html, .php, .asp, .xml, .zip, .rar, .cab as they may be infected.

Scan that drive specifically or run an MBAM FULL scan with the drive connected. The Full scan will scan all drives
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 2tyte2paye

2tyte2paye
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:08:09 AM

Posted 07 December 2011 - 05:05 PM

thank you for your help

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:09 AM

Posted 07 December 2011 - 06:35 PM

You're welcome!!
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users