Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit help (500+ of em)


  • This topic is locked This topic is locked
9 replies to this topic

#1 taro248

taro248

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:23 AM

Posted 27 June 2014 - 10:49 AM

What's up BleepingComputer, i have a BIG problem i runned my anti-virus for the night when i woke up, my anti-virus found more than like 500 rootkits, i tried repairing them, Access Denied, tryed to delete em, access denied, tryed to put em in quarantine it says: This demand couldn't be taken in charge. So long story short, i cant delete em. 



Thanks for reading and hopefully you can help me out!

For quarantine:http://gyazo.com/4ae27cdab7aa84fe0881c2a3ce573941
Trying deleting: http://gyazo.com/e26c53307ae2e84924d2629aa5420f3f

 



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 39,962 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:23 AM

Posted 02 July 2014 - 09:03 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

See if you can run this tool.

--RogueKiller--
  • Download & SAVE to your Desktop For 32bit system or For 64bit system
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
=======

#3 taro248

taro248
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:23 AM

Posted 07 July 2014 - 02:15 AM

Here's the log:

 

RogueKiller V9.1.0.0 (x64) [Jun 23 2014] par Adlice Software
 
Système d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Démarrage : Mode normal
Utilisateur : Valérie [Droits d'admin]
Mode : Recherche -- Date : 07/07/2014  03:09:27
 
¤¤¤ Processus malicieux : 0 ¤¤¤
 
¤¤¤ Entrées de registre : 25 ¤¤¤
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\dump_wmimmc -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\vtany -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va001 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va003 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va005 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va006 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va007 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\dump_wmimmc -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\vtany -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va001 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va003 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va005 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va006 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va007 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\dump_wmimmc -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\vtany -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va001 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va003 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va005 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va006 -> TROUVÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va007 -> TROUVÉ
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> TROUVÉ
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> TROUVÉ
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> TROUVÉ
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> TROUVÉ
 
¤¤¤ Tâches planifiées : 7 ¤¤¤
[Suspicious.Path] \\{3EF9700B-BFEF-457A-827A-9DEF426E60FF} -- C:\Windows\system32\pcalua.exe (-a C:\Users\Valérie\Desktop\CombatArmsSetupV47.exe -d C:\Users\Valérie\Desktop) -> TROUVÉ
[Suspicious.Path] \\{78299254-E2C8-4422-84F9-7AF5ADB7006B} -- C:\Windows\system32\pcalua.exe (-a "C:\Users\Valérie\Desktop\CrimeCraft Downloads\setup.exe" -d "C:\Users\Valérie\Desktop\CrimeCraft Downloads\" -c {ModuleArguments}) -> TROUVÉ
[Suspicious.Path] \\{8A0FE251-A7A1-4CF3-AB39-F6E011B46E25} -- C:\Windows\system32\pcalua.exe (-a C:\Users\Valérie\Downloads\sp55471.exe -d C:\Users\Valérie\Downloads) -> TROUVÉ
[Suspicious.Path] \\{92D56520-0DFD-45AB-AA31-B619456B9B2D} -- C:\Windows\system32\pcalua.exe (-a C:\Users\Valérie\AppData\Local\Roblox\Versions\version-14fe283fc52248e5\RobloxPlayerLauncher.exe -c -uninstall) -> TROUVÉ
[Suspicious.Path] \\{A719D071-EE2B-4C3F-BDE8-F1A96DFC5F5A} -- C:\Windows\system32\pcalua.exe (-a C:\Users\Valérie\AppData\Local\Roblox\Versions\version-14fe283fc52248e5\RobloxPlayerLauncher.exe -c -uninstall) -> TROUVÉ
[Suspicious.Path] \\{B8475425-830B-4DEA-942E-56F1DADB8636} -- C:\Windows\system32\pcalua.exe (-a "C:\Users\Valérie\Desktop\LOTRO Standard Res Install Files\LOTROSetup.exe" -d "C:\Users\Valérie\Desktop\LOTRO Standard Res Install Files") -> TROUVÉ
[Suspicious.Path] \\{CF1D2369-2BA6-4A77-9A7E-83D384FA9C40} -- C:\Windows\system32\pcalua.exe (-a "C:\Users\Valérie\Desktop\Ps3 foulder\Pangya_Eu\uninstall.exe" -d "C:\Users\Valérie\Desktop\Ps3 foulder\Pangya_Eu") -> TROUVÉ
 
¤¤¤ Fichiers : 1 ¤¤¤
[Tr.Karagany][Repertoire] plugs -- C:\Users\Valérie\AppData\Roaming\Adobe\plugs -> TROUVÉ
 
¤¤¤ Fichier HOSTS : 0 ¤¤¤
 
¤¤¤ Antirootkit : 0 ¤¤¤
 
¤¤¤ Navigateurs web : 2 ¤¤¤
[PUM.Proxy][FIREFX:Config] kurlkv1e.default : user_pref("network.proxy.http", "94.154.31.10"); -> TROUVÉ
[PUM.Proxy][FIREFX:Config] kurlkv1e.default : user_pref("network.proxy.http_port", 8090); -> TROUVÉ
 
¤¤¤ MBR Verif : ¤¤¤
+++++ PhysicalDrive0: WDC WD50 00AAKS-65V0A SCSI Disk Device +++++
--- User ---
[MBR] 33ac8be5a0e2011f4ed30d4da523a415
[BSP] 7d4c6fd333c05d0f83c903ade30cb386 : Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 464857 MB
2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 952233984 | Size: 11981 MB
User = LL1 ... OK
Error reading LL2 MBR! ([1] Fonction incorrecte. )


#4 nasdaq

nasdaq

  • Malware Response Team
  • 39,962 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:23 AM

Posted 07 July 2014 - 06:46 AM


Create a restore point.

Following steps involve registry editing. Please create new restore point before proceeding!!!
How to:

Vista and Seven - http://windows.microsoft.com/en-gb/windows7/create-a-restore-point

===

Run the RogueKiller tool and this time select the Clean option.

Post the log.

Restart the computer normally.

How is the computer running now?


#5 taro248

taro248
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:23 AM

Posted 09 July 2014 - 04:23 AM

Here's the log: 
 

RogueKiller V9.2.0.0 (x64) [Jun 23 2014] par Adlice Software
 
Système d'exploitation : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Démarrage : Mode normal
Utilisateur : Valérie [Droits d'admin]
Mode : Suppression -- Date : 07/09/2014  05:19:37
 
¤¤¤ Processus malicieux : 2 ¤¤¤
[Suspicious.Path] (SVC) BHDrvx64 -- \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NAV_17.0.0.136\Definitions\BASHDefs\20100324.001\BHDrvx64.sys[7] -> STOPPÉ
[Suspicious.Path] (SVC) IDSVia64 -- \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NAV_17.0.0.136\Definitions\IPSDefs\20100326.001\IDSvia64.sys[7] -> STOPPÉ
 
¤¤¤ Entrées de registre : 37 ¤¤¤
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BHDrvx64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\dump_wmimmc -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IDSVia64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NAVENG -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NAVEX15 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\vtany -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va001 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va003 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va005 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va006 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\X6va007 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BHDrvx64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\dump_wmimmc -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\IDSVia64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NAVENG -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NAVEX15 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\vtany -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va001 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va003 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va005 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va006 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\X6va007 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BHDrvx64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\dump_wmimmc -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\IDSVia64 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\NAVENG -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\NAVEX15 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\vtany -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va001 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va003 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va005 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va006 -> SUPPRIMÉ
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\X6va007 -> SUPPRIMÉ
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> REMPLACÉ (0)
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> REMPLACÉ (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> REMPLACÉ (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> REMPLACÉ (0)
 
¤¤¤ Tâches planifiées : 0 ¤¤¤
 
¤¤¤ Fichiers : 0 ¤¤¤
 
¤¤¤ Fichier HOSTS : 0 ¤¤¤
 
¤¤¤ Antirootkit : 0 (Driver: CHARGE) ¤¤¤
 
¤¤¤ Navigateurs web : 10 ¤¤¤
[IE:Addon] System : avast! Online Security [{318A227B-5E9F-45bd-8999-7F8F10CA4CF5}] -> SUPPRIMÉ
[PUM.Proxy][FIREFX:Config] kurlkv1e.default : user_pref("network.proxy.http", "94.154.31.10"); -> SUPPRIMÉ
[PUM.Proxy][FIREFX:Config] kurlkv1e.default : user_pref("network.proxy.http_port", 8090); -> SUPPRIMÉ
[CHROME:Addon] Default : Google Docs [aohghmighlieiainnegkcijnfilokake] -> SUPPRIMÉ
[CHROME:Addon] Default : Google Drive [apdfllckaahabafndbhieahigkjlhalf] -> ERROR [2]
[CHROME:Addon] Default : YouTube [blpcfgokakmgnkcojhhkbfbldkacnbeo] -> ERROR [2]
[CHROME:Addon] Default : Google Search [coobgpohoikkiipiblmjeljniedjpjpf] -> ERROR [2]
[CHROME:Addon] Default : AdBlock [gighmmpiobklfepjocnamgkkbiglidom] -> ERROR [2]
[CHROME:Addon] Default : Google Wallet [nmmhkkegccagdldgiimedpiccmgmieda] -> ERROR [2]
[CHROME:Addon] Default : Gmail [pjkljhegncpnkpknbcohdijeoejaedia] -> ERROR [2]
 
¤¤¤ MBR Verif : ¤¤¤
+++++ PhysicalDrive0: WDC WD50 00AAKS-65V0A SCSI Disk Device +++++
--- User ---
[MBR] 33ac8be5a0e2011f4ed30d4da523a415
[BSP] 7d4c6fd333c05d0f83c903ade30cb386 : Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 464857 MB
2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 952233984 | Size: 11981 MB
User = LL1 ... OK
Error reading LL2 MBR! ([1] Fonction incorrecte. )
 
 
============================================
RKreport_DEL_07072014_031132.log - RKreport_SCN_07072014_030927.log - RKreport_SCN_07072014_032438.log - RKreport_SCN_07092014_051619.log

 

Edited by taro248, 09 July 2014 - 04:24 AM.


#6 nasdaq

nasdaq

  • Malware Response Team
  • 39,962 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:23 AM

Posted 09 July 2014 - 08:41 AM

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Uncheck the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
How is the computer running now?

#7 nasdaq

nasdaq

  • Malware Response Team
  • 39,962 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:23 AM

Posted 15 July 2014 - 08:54 AM

Are you still with me?

#8 taro248

taro248
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:23 AM

Posted 16 July 2014 - 02:51 AM

Yes, Sorry it's really hard for me to do scan has i have little to no time because there is the whole family using this computer



#9 taro248

taro248
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:10:23 AM

Posted 01 September 2014 - 02:22 AM

I will just reset my computer and re-install windows 7...


Edited by taro248, 01 September 2014 - 02:22 AM.


#10 nasdaq

nasdaq

  • Malware Response Team
  • 39,962 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:23 AM

Posted 01 September 2014 - 07:13 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users