Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

trojan.zeraccess!kmem


  • Please log in to reply
3 replies to this topic

#1 kolle050

kolle050

  • Members
  • 3 posts
  • OFFLINE
  •  

Posted 09 February 2012 - 03:41 PM

Hello,

I've been having problems for the last couple days, slow computer, pop-ups, etc. I ran symantec, which is how I found the trojan, but it couldn't remove it so I ran Malware Bytes. Ran Symantec again, the trojan was still found. Downloaded the removal tool, ran that. Downloaded TDSS Killer and ran it. Rebooted when instructed. Ran Symantec over night and came up clean.

This morning I ran Malware Bytes just to be sure, it came up with 24 objects. I'll submit both Malware logs.

From yesterday:
Malwarebytes Anti-Malware 1.60.0.1800
www.malwarebytes.org

Database version: v2012.01.19.04

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
merissa :: UGANIK [administrator]

2/8/2012 12:12:50 PM
mbam-log-2012-02-08 (12-12-50).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 518036
Time elapsed: 3 hour(s), 39 minute(s),

Memory Processes Detected: 1
C:\Documents and Settings\merissa\Application Data\Microsoft\Windows\System\wchksys.exe (Trojan.Agent) -> 3580 -> Delete on reboot.

Memory Modules Detected: 1
C:\Documents and Settings\merissa\Application Data\Adobe\sp.DLL (TrojanProxy.Agent) -> Delete on reboot.

Registry Keys Detected: 4
HKCR\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} (TrojanProxy.Agent) -> Quarantined and deleted successfully.
HKCR\sp (TrojanProxy.Agent) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\sp (TrojanProxy.Agent) -> Quarantined and deleted successfully.
HKLM\System\CurrentControlSet\Services\SPService (TrojanProxy.Agent) -> Quarantined and deleted successfully.

Registry Values Detected: 4
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Network Host (Trojan.Agent) -> Data: C:\Documents and Settings\merissa\Application Data\Microsoft\Windows\System\wchksys.exe -m -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{96AFBE69-C3B0-4B00-8578-D933D2896EE2} (TrojanProxy.Agent) -> Data: sp -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} (TrojanProxy.Agent) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost|netsvc (TrojanProxy.Agent) -> Data: SPService^w^ -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)



From today:
Malwarebytes Anti-Malware 1.60.1.1000
www.malwarebytes.org

Database version: v2012.02.09.01

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
merissa :: UGANIK [administrator]

2/9/2012 9:39:32 AM
mbam-log-2012-02-09 (09-39-32).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 520171
Time elapsed: 1 hour(s), 50 minute(s), 17 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 3
C:\Documents and Settings\NetworkService\Application Data\Adobe\sp.DLL (Trojan.Proxy) -> Delete on reboot.
C:\WINDOWS\system32\6to4v32.dll (Trojan.Wimpixo) -> Delete on reboot.
C:\WINDOWS\system32\NCUSBw32.dll (Trojan.Dropper) -> Delete on reboot.

Registry Keys Detected: 4
HKCR\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} (Trojan.Proxy) -> Quarantined and deleted successfully.
HKCR\sp (TrojanProxy.Agent) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\sp (TrojanProxy.Agent) -> Quarantined and deleted successfully.
HKLM\System\CurrentControlSet\Services\SPService (TrojanProxy.Agent) -> Quarantined and deleted successfully.

Registry Values Detected: 3
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{96AFBE69-C3B0-4B00-8578-D933D2896EE2} (Trojan.Proxy) -> Data: sp -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} (TrojanProxy.Agent) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost|netsvc (TrojanProxy.Agent) -> Data: SPService^w^ -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 14
C:\Documents and Settings\NetworkService\Application Data\Adobe\sp.DLL (Trojan.Proxy) -> Delete on reboot.
C:\WINDOWS\system32\6to4v32.dll (Trojan.Wimpixo) -> Delete on reboot.
C:\WINDOWS\system32\NCUSBw32.dll (Trojan.Dropper) -> Delete on reboot.
C:\WINDOWS\system32\drivers\cdrom.sys (Rootkit.0Access) -> Quarantined and deleted successfully.
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\5\3f97a605-4bcec37c (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\NetworkService\Application Data\Sun\Java\Deployment\cache\6.0\27\7f900edb-6349c32c (Rogue.InternetSecurity) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{779255AA-FDC3-49C0-B7D8-DE49C6538E09}\RP906\A0077660.sys (Rootkit.0Access) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\vsr31405.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\wfclyvs.exe (Trojan.Zbot.CBCGen) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\yr0.8599225936316945.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\yr0.9565796412626003.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\0.3434959559167581.exe (Rogue.InternetSecurity) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\hdgfsh.exe (Trojan.Zbot.CBCGen) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\certstore.dat (Trojan.Agent) -> Quarantined and deleted successfully.

(end)


Please let me know what to do next. Thanks!

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,682 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:58 AM

Posted 09 February 2012 - 06:21 PM

Please follow the instructions in ==>This Guide<== starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 kolle050

kolle050
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  

Posted 16 February 2012 - 08:39 PM

Just wanted to update you: the next day I logged on to my computer, it froze. I shut it down and Windows wouldn't start up. We called someone in to take care of it -- ended up having to replace the hard drive. Yikes!

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,682 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:10:58 AM

Posted 16 February 2012 - 08:53 PM

I'm sorry for your loss :(

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users