Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I think I have the ZeroAccess rootkit...


  • This topic is locked This topic is locked
5 replies to this topic

#1 Gartichoker

Gartichoker

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 27 December 2011 - 07:10 PM

My computer is spontaneously closing browsers, and even rebooting. The browser is being redirected to other sites. A ping.exe process keeps hogging all memory.

I am not very tech savvy, but my son pointed me to this site...and told me he thinks I have a rootkit infested machine. Thank you in advance for your time.

Here are the logs:

defogger_disable by jpshortstuff (23.02.10.1)
Log created at 12:49 on 27/12/2011 (Administrator)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-


GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-12-27 17:01:38
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-3 ST380815AS rev.3.CHH
Running: lnwegt4z.exe; Driver: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\fwliakob.sys


---- User code sections - GMER 1.0.15 ----

.text C:\WINDOWS\System32\svchost.exe[1116] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00F3000A
.text C:\WINDOWS\System32\svchost.exe[1116] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00F4000A
.text C:\WINDOWS\System32\svchost.exe[1116] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00F2000C
.text C:\WINDOWS\System32\ping.exe[1244] ntdll.dll!NtCreateProcess 7C90D14E 5 Bytes JMP 00B9000A
.text C:\WINDOWS\System32\ping.exe[1244] ntdll.dll!NtCreateProcessEx 7C90D15E 5 Bytes JMP 00BA000A
.text C:\WINDOWS\System32\ping.exe[1244] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 00A4000A
.text C:\WINDOWS\System32\ping.exe[1244] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 00A5000A
.text C:\WINDOWS\System32\ping.exe[1244] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 00A3000C
.text C:\WINDOWS\System32\ping.exe[1244] USER32.dll!GetCursorPos 7E42974E 5 Bytes JMP 00BD000A
.text C:\WINDOWS\System32\ping.exe[1244] USER32.dll!WindowFromPoint 7E429766 5 Bytes JMP 00BE000A
.text C:\WINDOWS\System32\ping.exe[1244] USER32.dll!GetForegroundWindow 7E429823 5 Bytes JMP 00BF000A
.text C:\WINDOWS\System32\ping.exe[1244] ole32.dll!CoCreateInstance 774FF1AC 5 Bytes JMP 00BC000A
.text C:\WINDOWS\system32\SearchIndexer.exe[1736] kernel32.dll!WriteFile 7C810E27 7 Bytes JMP 00585C0C C:\WINDOWS\system32\MSSRCH.DLL (mssrch.dll/Microsoft Corporation)
? C:\WINDOWS\System32\svchost.exe[2724] image checksum mismatch; number of sections mismatch; time/date stamp mismatch; unknown module: oleaut32.dllunknown module: oleaut32.dllunknown module: comctl32.dllunknown module: oleaut32.dllunknown module: oleaut32.dll
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] ntdll.dll!NtProtectVirtualMemory 7C90D6EE 5 Bytes JMP 01EC000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] ntdll.dll!NtWriteVirtualMemory 7C90DFAE 5 Bytes JMP 02D4000A
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] ntdll.dll!KiUserExceptionDispatcher 7C90E47C 5 Bytes JMP 01EB000C
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!DialogBoxParamW 7E4247AB 5 Bytes JMP 3E1DF4B9 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!DialogBoxIndirectParamW 7E432072 5 Bytes JMP 3E3528F6 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!MessageBoxIndirectA 7E43A082 5 Bytes JMP 3E352877 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!DialogBoxParamA 7E43B144 5 Bytes JMP 3E3528BB C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!MessageBoxExW 7E450838 5 Bytes JMP 3E352803 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!MessageBoxExA 7E45085C 5 Bytes JMP 3E35283D C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!DialogBoxIndirectParamA 7E456D7D 5 Bytes JMP 3E352931 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] USER32.dll!MessageBoxIndirectW 7E4664D5 5 Bytes JMP 3E201762 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3800] ole32.dll!OleLoadFromStream 7752981B 5 Bytes JMP 3E352AF3 C:\WINDOWS\system32\IEFRAME.dll (Internet Explorer/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice \Driver\Tcpip \Device\Ip mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/Network Associates, Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/Network Associates, Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/Network Associates, Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp mvstdi5x.sys (Anti-Virus Mini-Firewall Driver/Network Associates, Inc.)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Modules - GMER 1.0.15 ----

Module (noname) (*** hidden *** ) B9769000-B9781000 (98304 bytes)

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Administrator\Cookies\IF5BDEYA.txt 0 bytes
File C:\Documents and Settings\Administrator\Cookies\6QYY0C9E.txt 0 bytes
File C:\Documents and Settings\Administrator\Cookies\DMKL6D20.txt 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\andes_c[1].swf 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\srad[4].js 13748 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\allthingsfinancial[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\adsCA1V5QFH.js 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\ad[7] 1249 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\ad[8] 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\B5170372[2].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\defaultCAFA3VW8.jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\buyingguide[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\optn=64[11] 6617 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\shellypalmerdaily[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\2-728x90_30_sal_dec09[1].swf 25416 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\btn-play-56x19[1].png 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\btn-play_channel[1].png 842 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\Q42011-afterxmas-mens-728x90[1].jpg 32816 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\ADT_122611_728x90_Resi_49Offer_JPEG_Holiday[1].jpg 28990 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\podsafe_logo[1].gif 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\spacer[2].gif 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\Spark_Double_728x90_MILES[1].swf 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\beacon[5].htm 677 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\2532[2].js 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\results[3].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\EJ9HVDZ4\iframe!t=1209![6].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\helmet[1].js 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\07.2[1].gif 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\du-17[2].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\du-17[3].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\getjs[3].aspx 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\get[2] 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\logo[1].png 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\300x250_DecWk5_Tuesday_H_02[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\article_3c09f1a4-2f4e-11e1-b69a-0019bb2963f4[1].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\160x600_postholidayPromo_KIS[1].swf 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\t_020626858131768271866852[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\t_020637195132327938480492[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\t_020648377132407762282856[1].jpg 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\leftside[1].png 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\tn-comments[1].css 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\log;tx=q1-10211665576_1325015044;it=0;vt=5;ic=0;atf=0;pv=1;fv=1;seq=8;et=B;cid=12486d5d7c02e65;ord=755727[1].gif 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\B5754668[1].22;sz=728x90;ord=2808410337013633143 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\;ord=3441776[1].htm 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\jquery.min[4].js 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\mt[1].js 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\YIXOFCAEIJ49LCAEH98WFCABQU55KCAQT2KE0CA51NBFSCA3LT2AOCA8PSAQ4CAOPW2HXCAXLHQF0CARRJOV3CAGL2NR1CALC7LO5CA0CD7LACAP21J00CAES6NB6CAYZDIPWCA09KVXXCAEQN66M.txt 0 bytes
File C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\O3HJBSU9\aT0xNzA3LHM9MzAweDI1MCxuPWlmcmFtZSxiPTA=[1].htm 0 bytes
File C:\WINDOWS\$NtUninstallKB62280$\2225367382 0 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278 0 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\bckfg.tmp 845 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\cfg.ini 208 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\Desktop.ini 4608 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\keywords 228 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\kwrd.dll 223744 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\L 0 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\L\leebmpoi 62976 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\lsflt7.ver 5176 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U 0 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\00000001.@ 2048 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\00000002.@ 224768 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\00000004.@ 1024 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\80000000.@ 11264 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\80000004.@ 12800 bytes
File C:\WINDOWS\$NtUninstallKB62280$\485945278\U\80000032.@ 77312 bytes

---- EOF - GMER 1.0.15 ----

Sorry for the odd format from the GMER log. I have attached the log, if that helps.

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:06 AM

Posted 01 January 2012 - 06:28 PM

Hello and Welcome to the forums!

My name is Gringo and I'll be glad to help you with your computer problems.

Somethings to remember while we are working together.

  • Do not run any other tool untill instructed to do so!
  • please Do not Attach logs or put in code boxes.
  • Tell me about any problems that have occurred during the fix.
  • Tell me of any other symptoms you may be having as these can help also.
  • Do not run anything while running a fix.
  • Do not run any other tool untill instructed to do so!


Click on the Watch Topic Button and select Immediate Notification and click on proceed, this will help you to get notified faster when I have replied and make the cleaning process faster.

Please print out or make a copy in notpad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Gartichoker

Gartichoker
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 03 January 2012 - 09:06 PM

I installl ed the recover concole and combox fix ran and computer ran and then it said computer is prepairaing for standby it then froze for several hours and i then shut down. Today on startup it appeared to scan and it came to cat got it but i don't know if it saved. I don't see a log. Thanks for the help.

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:06 AM

Posted 03 January 2012 - 09:13 PM

Hello

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.

after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:06 AM

Posted 05 January 2012 - 11:43 PM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:06 AM

Posted 09 January 2012 - 12:32 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users