Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Interpreting gmer logs / Pushdo/Cutwail Virus

  • This topic is locked This topic is locked
2 replies to this topic

#1 festival67


  • Members
  • 1 posts
  • Local time:03:28 PM

Posted 11 June 2014 - 07:21 PM

Hello everyone, I'm new to the site and forums but just signed up today. I have gotten much useful information from here however (a belated thank you to all that contribute)


Today I got an e-mail saying there was a virus on student computer that I make the image for. I always scan before making an image. I think it was a student but wanted to stay on the safe side so after looking it up found that it was Pushdo/Cutwail


I found Kapersky's TDSKiller and gmer. TDSkiller said it was clean but gmer (which I've never used) generated the log below but I don't know how to interpret it. Among my searches a link took me to a forum that had one of the lines common to our logs. I can't find the topic but it was closed. There was a user that had experience with gmer and I was wondering if anyone could help explain the choices and when I right-click on each of them which (if any) of the available actions should I take?


Thank you very much everyone



GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2014-06-11 16:07:14
Windows 6.1.7601 Service Pack 1 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST250DM000-1BD141 rev.KC45 232.89GB
Running: gmer.exe; Driver: C:\Users\open\AppData\Local\Temp\kwdiikod.sys

---- Kernel code sections - GMER 2.1 ----

.text   ntkrnlpa.exe!ZwSaveKey + 13C1                                                                    84240339 1 Byte  [06]
.text   ntkrnlpa.exe!KiDispatchInterrupt + 5A2                                                           84279D52 19 Bytes  [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
?       system32\drivers\16977120.sys                                                                    The system cannot find the path specified. !

---- Devices - GMER 2.1 ----

Device  \FileSystem\03520146 \Device\KLMD30052014_02100202_B                                             16977120.sys
Device  \Driver\00000907 \Device\KLMD30052014_02100202                                                   16977120.sys

---- Registry - GMER 2.1 ----

Reg     HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\0015833435ff                      
Reg     HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\c4d9872c9f4c                      
Reg     HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\0015833435ff (not active ControlSet)  
Reg     HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\c4d9872c9f4c (not active ControlSet)  

---- EOF - GMER 2.1 ----

BC AdBot (Login to Remove)


#2 nasdaq


  • Malware Response Team
  • 40,456 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:28 PM

Posted 15 June 2014 - 08:34 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.


Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).

Download the correct version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.


Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.

Let me know what problem persists.

#3 nasdaq


  • Malware Response Team
  • 40,456 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:28 PM

Posted 20 June 2014 - 08:53 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users