Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Is MBAM infected?

  • This topic is locked This topic is locked
3 replies to this topic

#1 Tony Pal

Tony Pal

  • Members
  • 19 posts
  • Local time:03:48 AM

Posted 13 August 2012 - 06:18 PM

The virus began by blocking MBAM. I was able to download another copy under a pseudonym and delete some virus files but they keep returning. The main problem is that connections are being made to random web sites and I imagine keystrokes are captured and sent. Occasionally, my browser is sent to random web sites.

Here are some viruses quarantineed and deleted by MBAM:

C:\Documents and Settings\Tony\Local Settings\temp\0.04204812566829097 (Trojan.Happili)
HKCU\SOFTWARE\CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32| (Trojan.Zaccess)

HKCR\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InProcServer32| (Trojan.Zaccess) -> Bad: (\\.\globalroot\systemroot\Installer\{0c904c13-2c91-5ff6-2d9b-7aa317c684e5}\n.) Good: (wbemess.dll) -> Quarantined and repaired successfully.
C:\Documents and Settings\All Users\Application Data\6F638BEC0009CBFA049C2EA7E56C3425\6F638BEC0009CBFA049C2EA7E56C3425.exe (Trojan.LameShield)
C:\Documents and Settings\Tony\Application Data\nprad.dll (Trojan.Agent)
C:\RECYCLER\S-1-5-21-1078081533-1677128483-1343024091-1003\Dc62.tmp (Trojan.Agent.BRVGen)
C:\WINDOWS\Installer\{0c904c13-2c91-5ff6-2d9b-7aa317c684e5}\n (Trojan.Agent.BVXGen)
C:\WINDOWS\Installer\{0c904c13-2c91-5ff6-2d9b-7aa317c684e5}\U\00000004.@ (Rootkit.Zaccess)
C:\WINDOWS\Installer\{0c904c13-2c91-5ff6-2d9b-7aa317c684e5}\U\000000cb.@ (Rootkit.0Access)
C:\WINDOWS\Installer\{0c904c13-2c91-5ff6-2d9b-7aa317c684e5}\U\80000032.@ (Rootkit.0Access)

I hope that's enough information to get started. Thanks!

BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,490 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:04:48 AM

Posted 13 August 2012 - 07:56 PM

Hello, you have a Rootkit of the Zeroaccess fame. It will be best to remove this by reposting that info with the info below in a new topic.

Please go here....Preparation Guide ,do steps 6-9.

Create a DDS log and post it in the new topic explained in step 9 which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If GMER won't run (it may not on a 64 bit system) skip it and move on.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Tony Pal

Tony Pal
  • Topic Starter

  • Members
  • 19 posts
  • Local time:03:48 AM

Posted 14 August 2012 - 07:18 AM

Thank you, I appreciate your help. I knew I had come to the right place!

I have generated the dds and attach files but I can't get GMER to work. On the first attempt, the scan froze after about 15-20 min. After closing all applications and disconnecting the Internet, I get very short incomplete results when the scan runs. When GMER opens I notice many entries flickering across the bottom of the screen before I can untick the IAT/EAT box and press the Scan button. I suspect that these entries are being skipped.

I will post what I have in the new forum.

#4 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,769 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:48 AM

Posted 14 August 2012 - 01:13 PM

Your log(s) is posted here.

Now that your log is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Response Team member...nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log(s) you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process or make things worst which would extend the time it takes to clean your computer.

From this point on the Malware Response Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take several days to get a response because the Malware Response Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have posted your log and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Response Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Response Team member is already assisting you and not open the thread to respond.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.

To avoid confusion, I am closing this topic until you are cleared by the Malware Response Team. If you still need assistance after your log has been reviewed and you have been cleared, please PM me or another moderator and we will re-open this topic.

Good luck with your log.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users