Jump to content

Unable to remove Trojan.Dropper.BCMiner and...


Recommended Posts

Hello, my computer is infected with the following virus:

C:\Windows\assembly\GAC\Desktop.ini (Trojan.0access) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000004.@ (Rootkit.Zaccess) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000008.@ (Trojan.Dropper.BCMiner) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\000000cb.@ (Rootkit.0Access) -> No action taken.

I haven't been able to remove them with either Avast and Malwarebytes Anti-Malware.

I have uninstalled uTorrent (which I hadn't been using in a long while).

This is the mbam-log-2012-08-18 (13-58-45):

Malwarebytes Anti-Malware 1.62.0.1300

www.malwarebytes.org

Database version: v2012.08.18.02

Windows Vista Service Pack 1 x86 NTFS

Internet Explorer 8.0.6001.19088

carlo :: PC-CARLO [administrator]

18/08/2012 13.53.21

mbam-log-2012-08-18 (13-58-45).txt

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 183170

Time elapsed: 4 minute(s), 49 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 4

C:\Windows\assembly\GAC\Desktop.ini (Trojan.0access) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000004.@ (Rootkit.Zaccess) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000008.@ (Trojan.Dropper.BCMiner) -> No action taken.

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\000000cb.@ (Rootkit.0Access) -> No action taken.

(end)

I have downloaded Rogue Killer to my desktop. (I have removed any usb and external drives from the computer before I ran the scan.) I have scanned the system with Rogue Killer and closed out the program without fixing anything.

This is the RKreport[1]:

RogueKiller V7.6.6 [08/10/2012] by Tigzy

mail: tigzyRK<at>gmail<dot>com

Feedback: http://www.geekstogo.com/forum/files/file/413-roguekiller/

Blog: http://tigzyrk.blogspot.com

Operating System: Windows Vista (6.0.6001 Service Pack 1) 32 bits version

Started in : Normal mode

User: carlo [Admin rights]

Mode: Scan -- Date: 08/18/2012 14:17:44

¤¤¤ Bad processes: 0 ¤¤¤

¤¤¤ Registry Entries: 2 ¤¤¤

[HJ] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FILE] n : c:\windows\installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\n --> FOUND

[ZeroAccess][FILE] @ : c:\windows\installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\@ --> FOUND

[ZeroAccess][FOLDER] U : c:\windows\installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U --> FOUND

[ZeroAccess][FOLDER] L : c:\windows\installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\L --> FOUND

[ZeroAccess][FILE] n : c:\users\carlo\appdata\local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\n --> FOUND

[ZeroAccess][FILE] @ : c:\users\carlo\appdata\local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\@ --> FOUND

[ZeroAccess][FOLDER] U : c:\users\carlo\appdata\local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U --> FOUND

[ZeroAccess][FOLDER] L : c:\users\carlo\appdata\local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\L --> FOUND

[ZeroAccess][FILE] Desktop.ini : c:\windows\assembly\gac\desktop.ini --> FOUND

[susp.ASLR][ASLR WIPED-OFF] services.exe : c:\windows\system32\services.exe --> FOUND

[ZeroAccess][sig found] services.exe : c:\windows\system32\services.exe --> FOUND

¤¤¤ Driver: [LOADED] ¤¤¤

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

127.0.0.1 localhost

::1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9500325AS +++++

--- User ---

[MBR] 596a4b03fd9ea26defacaee865a280fc

[bSP] e8cd7f5c27c06a41018545bf7dd8c956 : Acer tatooed MBR Code

Partition table:

0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 10240 Mo

1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 20973568 | Size: 233348 Mo

2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 498870272 | Size: 229785 Mo

3 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 969469952 | Size: 3565 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[1].txt >>

RKreport[1].txt

Any help would be greatly appreciated. Thanks in advance.

Link to post
Share on other sites

Here you go......

Your computer is infected with a nasty rootkit. Please read the following information first.

You're infected with Rootkit.ZeroAccess, a BackDoor Trojan.

BACKDOOR WARNING

------------------------------

One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

http://www.dslreports.com/faq/10451

When Should I Format, How Should I Reinstall

http://www.dslreports.com/faq/10063

I will try my best to clean this machine but I can't guarantee that it will be 100% secure afterwards.

Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.

-----------------------------------------

Please make sure system restore is running and create a new restore point before continuing!

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:

  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

On the System Recovery Options menu you will get the following options:


    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt

[*]Select Command Prompt

[*]In the command window type in notepad and press Enter.

[*]The notepad opens. Under File menu select Open.

[*]Select "Computer" and find your flash drive letter and close the notepad.

[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter

Note: Replace letter e with the drive letter of your flash drive.

[*]The tool will start to run.

[*]When the tool opens click Yes to disclaimer.

[*]Press Scan button.

[*]FRST will let you know when the scan is complete and has written the FRST.txt to file, close out this message, then type the following into the search box:

services.exe

[*]Now press the Search button

[*]When the search is complete, search.txt will also be written to your USB

[*]Type exit and reboot the computer normally

[*]Please copy and paste both logs in your reply.(FRST.txt and Search.txt)

MrC

Link to post
Share on other sites

Thank you for the swift reply, here are the logs:

FRST

Scan result of Farbar Recovery Scan Tool (FRST written by Farbar) Version: 15-08-2012

Ran by SYSTEM at 18-08-2012 16:27:14

Running from G:\

Windows Vista Home Premium (X86) OS Language: English(US)

The current controlset is ControlSet001

========================== Registry (Whitelisted) =============

HKLM\...\Run: [iAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe [182808 2008-07-20] (Intel Corporation)

HKLM\...\Run: [RtHDVCpl] RtHDVCpl.exe [x]

HKLM\...\Run: [ePower_DMC] C:\Program Files\Acer\Empowering Technology\ePower\ePower_DMC.exe [405504 2008-08-01] (Acer Inc.)

HKLM\...\Run: [eDataSecurity Loader] C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe [526896 2008-07-29] (Egis Incorporated)

HKLM\...\Run: [eAudio] "C:\Program Files\Acer\Empowering Technology\eAudio\eAudio.exe" [544768 2008-09-11] (Acer Incorporated)

HKLM\...\Run: [bkupTray] "C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BkupTray.exe" [28672 2008-04-25] ()

HKLM\...\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [34672 2008-06-11] (Adobe Systems Incorporated)

HKLM\...\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup [13543968 2008-07-18] (NVIDIA Corporation)

HKLM\...\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit [92704 2008-07-18] (NVIDIA Corporation)

HKLM\...\Run: [PLFSetI] C:\Windows\PLFSetI.exe [200704 2007-10-23] ()

HKLM\...\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1049896 2008-04-24] (Synaptics, Inc.)

HKLM\...\Run: [LManager] C:\PROGRA~1\LAUNCH~1\QtZgAcer.EXE [817672 2008-06-04] (Dritek System Inc.)

HKLM\...\Run: [Google Desktop Search] "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup [30192 2010-09-11] (Google)

HKLM\...\Run: [eRecoveryService] [x]

HKLM\...\Run: [ArcadeDeluxeAgent] "C:\Program Files\Acer Arcade Deluxe\Acer Arcade Deluxe\ArcadeDeluxeAgent.exe" [147456 2008-07-24] (CyberLink Corp.)

HKLM\...\Run: [CLMLServer] "C:\Program Files\Acer Arcade Deluxe\Acer Arcade Deluxe\Kernel\CLML\CLMLSvc.exe" [167936 2008-07-24] (CyberLink)

HKLM\...\Run: [PlayMovie] "C:\Program Files\Acer Arcade Deluxe\PlayMovie\PMVService.exe" [167936 2008-07-18] (Acer Corp.)

HKLM\...\Run: [ProductReg] "C:\Program Files\Acer\WR_PopUp\ProductReg.exe" [6144 2008-09-22] (Acer)

HKLM\...\Run: [seekmoOE] C:\Program Files\Seekmo\bin\10.3.85.0\OEAddOn.exe [x]

HKLM\...\Run: [avast5] C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe /nogui [3459712 2011-05-10] (AVAST Software)

HKLM\...\Run: [sunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" [254696 2011-04-08] (Sun Microsystems, Inc.)

HKLM\...\Run: [CanonMyPrinter] C:\Program Files\Canon\MyPrinter\BJMyPrt.exe /logon [2516296 2010-03-24] (CANON INC.)

HKLM\...\Run: [CanonSolutionMenuEx] C:\Program Files\Canon\Solution Menu EX\CNSEMAIN.EXE /logon [1185112 2010-04-02] (CANON INC.)

HKU\Default\...\RunOnce: [AcerScrSav] C:\Windows\Acer\run_NB.exe [2153472 2008-01-20] (Microsoft Corporation)

HKU\Default User\...\RunOnce: [AcerScrSav] C:\Windows\Acer\run_NB.exe [2153472 2008-01-20] (Microsoft Corporation)

Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL

================================ Services (Whitelisted) ==================

2 avast! Antivirus; "C:\Program Files\Alwil Software\Avast5\AvastSvc.exe" [42184 2011-05-10] (AVAST Software)

2 BUNAgentSvc; "C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe" [16384 2008-03-03] (NewTech Infosystems, Inc.)

2 CLHNService; C:\Program Files\Acer Arcade Deluxe\HomeMedia\Kernel\DMP\CLHNService.exe [81504 2008-01-16] ()

2 ETService; C:\Program Files\Acer\Empowering Technology\Service\ETService.exe [24576 2008-08-19] ()

2 Eventlog; C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted [21504 2008-01-20] (Microsoft Corporation)

3 GoogleDesktopManager-051210-111108; "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" [30192 2010-09-11] (Google)

2 MobilityService; C:\Acer\Mobility Center\MobilityService.exe -p [110592 2007-12-06] ()

2 NTISchedulerSvc; C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe [131072 2008-04-25] ()

2 RichVideo; "C:\Program Files\Cyberlink\Shared files\RichVideo.exe" [272024 2007-01-08] ()

2 Net Driver HPZ12; C:\Windows\system32\HPZinw12.dll [x]

2 Pml Driver HPZ12; C:\Windows\system32\HPZipm12.dll [x]

========================== Drivers (Whitelisted) =============

4 adpu160m; C:\Windows\system32\drivers\adpu160m.sys [101432 2008-01-20] (Adaptec, Inc.)

2 aswFsBlk; C:\Windows\System32\Drivers\aswFsBlk.sys [19544 2011-05-10] (AVAST Software)

2 aswMonFlt; \??\C:\Windows\system32\drivers\aswMonFlt.sys [53592 2011-05-10] (AVAST Software)

1 aswRdr; C:\Windows\System32\Drivers\aswRdr.sys [25432 2011-05-10] (AVAST Software)

1 aswSnx; C:\Windows\System32\Drivers\aswSnx.sys [441176 2011-05-10] (AVAST Software)

1 aswSP; C:\Windows\System32\Drivers\aswSP.sys [307928 2011-05-10] (AVAST Software)

1 aswTdi; C:\Windows\System32\Drivers\aswTdi.sys [49240 2011-05-10] (AVAST Software)

3 L1E; C:\Windows\System32\DRIVERS\L1E60x86.sys [47104 2008-05-19] (Atheros Communications, Inc.)

3 winbondcir; C:\Windows\System32\DRIVERS\winbondcir.sys [43008 2007-03-27] (Winbond Electronics Corporation)

2 {49DE1C67-83F8-4102-99E0-C16DCC7EEC796}; \??\C:\Program Files\Acer Arcade Deluxe\PlayMovie\000.fcl [61424 2008-07-18] (Cyberlink Corp.)

3 IpInIp; C:\Windows\System32\DRIVERS\ipinip.sys [x]

3 NwlnkFlt; C:\Windows\System32\DRIVERS\nwlnkflt.sys [x]

3 NwlnkFwd; C:\Windows\System32\DRIVERS\nwlnkfwd.sys [x]

========================== NetSvcs (Whitelisted) ===========

============ One Month Created Files and Folders ==============

2012-08-18 16:27 - 2012-08-18 16:27 - 00000000 ____D C:\FRST

2012-08-18 06:18 - 2012-08-18 06:18 - 00004360 ____N C:\bootex.log

2012-08-18 04:17 - 2012-08-18 04:17 - 00002485 ____A C:\Users\carlo\Desktop\RKreport[1].txt

2012-08-18 04:14 - 2012-08-18 04:36 - 00004781 ____A C:\Users\carlo\Desktop\aiuto.txt

2012-08-18 04:01 - 2012-08-18 04:06 - 00000000 ____D C:\Users\carlo\Desktop\RK_Quarantine

2012-08-18 03:56 - 2012-08-18 03:56 - 01558528 ____A C:\Users\carlo\Desktop\RogueKiller.exe

2012-08-18 03:16 - 2012-08-18 03:16 - 00000910 ____A C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk

2012-08-18 03:16 - 2012-08-18 03:16 - 00000000 ____D C:\Users\carlo\AppData\Roaming\Malwarebytes

2012-08-18 03:16 - 2012-08-18 03:16 - 00000000 ____D C:\Users\All Users\Malwarebytes

2012-08-18 03:16 - 2012-08-18 03:16 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware

2012-08-18 03:16 - 2012-07-03 03:46 - 00022344 ____A (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbam.sys

2012-08-18 03:15 - 2012-08-18 03:15 - 10652120 ____A (Malwarebytes Corporation ) C:\Users\carlo\Downloads\mbam-setup-1.62.0.1300.exe

2012-08-18 03:12 - 2012-08-18 03:12 - 00050688 ____A (Atribune.org) C:\Users\carlo\Desktop\ATF-Cleaner.exe

2012-08-18 03:10 - 2012-08-18 03:10 - 00352944 ____A (Softonic) C:\Users\carlo\Downloads\SoftonicDownloader_for_atf-cleaner.exe

2012-08-18 02:45 - 2012-08-18 02:45 - 00000000 ____D C:\Users\All Users\WindowsSearch

2012-08-18 02:29 - 2012-08-18 02:29 - 00000942 ____A C:\Windows\wininit.ini

2012-08-18 01:43 - 2012-08-18 02:30 - 00000000 ____D C:\Users\All Users\Spybot - Search & Destroy

2012-08-18 01:43 - 2012-08-18 01:43 - 00001059 ____A C:\Users\carlo\Desktop\Spybot - Search & Destroy.lnk

2012-08-18 01:43 - 2012-08-18 01:43 - 00000000 ____D C:\Program Files\Spybot - Search & Destroy

2012-08-18 01:39 - 2012-08-18 01:40 - 16409960 ____A (Safer Networking Limited ) C:\Users\carlo\Downloads\spybotsd162.exe

2012-08-17 23:21 - 2012-08-17 23:22 - 00139080 ____A C:\Windows\Minidump\Mini081812-01.dmp

============ 3 Months Modified Files ========================

2012-08-18 06:18 - 2012-08-18 06:18 - 00004360 ____N C:\bootex.log

2012-08-18 06:05 - 2008-12-12 13:03 - 00000000 ____A C:\Windows\System32\LogConfigTemp.xml

2012-08-18 06:04 - 2011-06-23 03:21 - 00009256 ____A C:\Windows\System32\spsys.log

2012-08-18 06:04 - 2010-01-18 04:22 - 00027839 ____A C:\Users\All Users\nvModes.001

2012-08-18 06:04 - 2008-11-20 10:18 - 00000147 ____A C:\Windows\System32\agent.log

2012-08-18 06:04 - 2008-01-20 18:47 - 05486984 ____A C:\Windows\PFRO.log

2012-08-18 06:04 - 2006-11-02 05:01 - 00000006 ___AH C:\Windows\Tasks\SA.DAT

2012-08-18 06:04 - 2006-11-02 04:47 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0

2012-08-18 06:04 - 2006-11-02 04:47 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0

2012-08-18 06:03 - 2006-11-02 05:01 - 00032594 ____A C:\Windows\Tasks\SCHEDLGU.TXT

2012-08-18 04:36 - 2012-08-18 04:14 - 00004781 ____A C:\Users\carlo\Desktop\aiuto.txt

2012-08-18 04:36 - 2008-12-12 12:49 - 01364595 ____A C:\Windows\WindowsUpdate.log

2012-08-18 04:17 - 2012-08-18 04:17 - 00002485 ____A C:\Users\carlo\Desktop\RKreport[1].txt

2012-08-18 03:56 - 2012-08-18 03:56 - 01558528 ____A C:\Users\carlo\Desktop\RogueKiller.exe

2012-08-18 03:40 - 2008-01-20 22:31 - 01486266 ____A C:\Windows\System32\PerfStringBackup.INI

2012-08-18 03:40 - 2008-01-20 22:30 - 00671944 ____A C:\Windows\System32\perfh010.dat

2012-08-18 03:40 - 2008-01-20 22:30 - 00123464 ____A C:\Windows\System32\perfc010.dat

2012-08-18 03:16 - 2012-08-18 03:16 - 00000910 ____A C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk

2012-08-18 03:15 - 2012-08-18 03:15 - 10652120 ____A (Malwarebytes Corporation ) C:\Users\carlo\Downloads\mbam-setup-1.62.0.1300.exe

2012-08-18 03:12 - 2012-08-18 03:12 - 00050688 ____A (Atribune.org) C:\Users\carlo\Desktop\ATF-Cleaner.exe

2012-08-18 03:10 - 2012-08-18 03:10 - 00352944 ____A (Softonic) C:\Users\carlo\Downloads\SoftonicDownloader_for_atf-cleaner.exe

2012-08-18 02:29 - 2012-08-18 02:29 - 00000942 ____A C:\Windows\wininit.ini

2012-08-18 01:43 - 2012-08-18 01:43 - 00001059 ____A C:\Users\carlo\Desktop\Spybot - Search & Destroy.lnk

2012-08-18 01:40 - 2012-08-18 01:39 - 16409960 ____A (Safer Networking Limited ) C:\Users\carlo\Downloads\spybotsd162.exe

2012-08-17 23:22 - 2012-08-17 23:21 - 00139080 ____A C:\Windows\Minidump\Mini081812-01.dmp

2012-08-17 23:21 - 2010-07-06 22:55 - 321584391 ____A C:\Windows\MEMORY.DMP

2012-08-15 21:53 - 2006-11-02 02:24 - 59884088 ____A (Microsoft Corporation) C:\Windows\System32\mrt.exe

2012-07-14 00:24 - 2012-07-14 00:24 - 00139080 ____A C:\Windows\Minidump\Mini071412-01.dmp

2012-07-03 03:46 - 2012-08-18 03:16 - 00022344 ____A (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbam.sys

2012-05-31 02:25 - 2009-10-02 23:08 - 00237072 ____N (Microsoft Corporation) C:\Windows\System32\MpSigStub.exe

ZeroAccess:

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\@

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\L

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\n

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000004.@

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\00000008.@

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U\000000cb.@

ZeroAccess:

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\@

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\L

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\n

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7}\U

ZeroAccess:

C:\Windows\assembly\GAC\Desktop.ini

========================= Known DLLs (Whitelisted) ============

========================= Bamital & volsnap Check ============

C:\Windows\explorer.exe => MD5 is legit

C:\Windows\System32\winlogon.exe => MD5 is legit

C:\Windows\System32\wininit.exe => MD5 is legit

C:\Windows\System32\svchost.exe => MD5 is legit

C:\Windows\System32\services.exe 5DC3C54FC22BBB6F66C290C7C0384DF9 ZeroAccess <==== ATTENTION!.

C:\Windows\System32\User32.dll => MD5 is legit

C:\Windows\System32\userinit.exe => MD5 is legit

C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK

HKLM\...\exefile\DefaultIcon: %1 => OK

HKLM\...\exefile\open\command: "%1" %* => OK

========================= Memory info ======================

Percentage of memory in use: 8%

Total physical RAM: 4090.06 MB

Available physical RAM: 3726.77 MB

Total Pagefile: 3955.8 MB

Available Pagefile: 3792.27 MB

Total Virtual: 2047.88 MB

Available Virtual: 1983.72 MB

======================= Partitions =========================

1 Drive c: (ACER) (Fixed) (Total:227.88 GB) (Free:99.31 GB) NTFS ==>[Drive with boot components (obtained from BCD)]

2 Drive d: (DATA) (Fixed) (Total:224.4 GB) (Free:217.67 GB) NTFS

5 Drive g: (KINGSTON) (Removable) (Total:0.47 GB) (Free:0.07 GB) FAT

6 Drive x: (PQSERVICE) (Fixed) (Total:10 GB) (Free:0.7 GB) NTFS

Disk ### Status Size Free Dyn Gpt

-------- ---------- ------- ------- --- ---

Disk 0 Online 466 GB 0 B

Disk 1 No Media 0 B 0 B

Disk 2 Online 477 MB 0 B

Partitions of Disk 0:

===============

Partition ### Type Size Offset

------------- ---------------- ------- -------

Partition 1 OEM 10 GB 1024 KB

Partition 2 Primary 228 GB 10 GB

Partition 3 Primary 224 GB 238 GB

Partition 4 OEM 3565 MB 462 GB

==================================================================================

Disk: 0

Partition 1

Type : 27

Hidden: Yes

Active: No

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 5 X PQSERVICE NTFS Partition 10 GB Healthy Hidden

==================================================================================

Disk: 0

Partition 2

Type : 07

Hidden: No

Active: Yes

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 1 C ACER NTFS Partition 228 GB Healthy

==================================================================================

Disk: 0

Partition 3

Type : 07

Hidden: No

Active: No

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 3 D DATA NTFS Partition 224 GB Healthy

==================================================================================

Disk: 0

Partition 4

Type : 12

Hidden: Yes

Active: No

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 5 NTFS Partition 3565 MB Healthy Hidden

==================================================================================

Partitions of Disk 2:

===============

Partition ### Type Size Offset

------------- ---------------- ------- -------

Partition 1 Primary 477 MB 16 KB

==================================================================================

Disk: 2

Partition 1

Type : 0E

Hidden: No

Active: Yes

Volume ### Ltr Label Fs Type Size Status Info

---------- --- ----------- ----- ---------- ------- --------- --------

* Volume 2 G KINGSTON FAT Removable 477 MB Healthy

==================================================================================

Last Boot: 2012-08-18 03:41

======================= End Of Log ==========================

And Search:

Farbar Recovery Scan Tool Version: 15-08-2012

Ran by SYSTEM at 2012-08-18 16:28:56

Running from G:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe

[2008-01-20 18:24] - [2008-01-20 18:24] - 0279040 ____A (Microsoft Corporation) 2B336AB6286D6C81FA02CBAB914E3C6C

C:\Windows\System32\services.exe

[2008-01-20 18:24] - [2008-01-20 18:24] - 0279040 ____A (Microsoft Corporation) 5DC3C54FC22BBB6F66C290C7C0384DF9

C:\Windows\SoftwareDistribution\Download\15d05090e6f876555f2419af621dda9f\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6002.18005_none_d14b3973ca6acc56\services.exe

[2009-08-05 22:54] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

=== End Of Search ===

Link to post
Share on other sites

OK, here you go......Please carefully carry out this procedure!!!!!!

Please download the attached fixlist.txt and copy it to your flashdrive.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options. (as you did before)

Run FRST64 or FRST (which ever one you're using) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

MrC

Link to post
Share on other sites

Thanks again!! Here's the FixLog:

Fix result of Farbar Recovery Tool (FRST written by Farbar) Version: 15-08-2012

Ran by SYSTEM at 2012-08-18 17:18:21 Run:1

Running from D:\

==============================================

C:\Windows\Installer\{a01b015c-c5cd-0fe5-081c-a261c41c11c7} moved successfully.

C:\Users\carlo\AppData\Local\{a01b015c-c5cd-0fe5-081c-a261c41c11c7} moved successfully.

C:\Windows\assembly\GAC\Desktop.ini moved successfully.

C:\Windows\System32\services.exe moved successfully.

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe copied successfully to C:\Windows\System32\services.exe

==== End of Fixlog ====

Link to post
Share on other sites

Well Done, lets run ComboFix to clear up any leftovers.

Please download and run ComboFix.

The most important things to remember when running it is to disable all your malware programs and run Combofix from your desktop.

Please visit this webpage for download links, and instructions for running ComboFix

http://www.bleepingc...to-use-combofix

Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Information on disabling your malware programs can be found Here.

Make sure you run ComboFix from your desktop.

Give it at least 30-45 minutes to finish if needed.

Please include the C:\ComboFix.txt in your next reply for further review.

---------->NOTE<----------

If you get the message Illegal operation attempted on registry key that has been marked for deletion after you run ComboFix....please reboot the computer, this should resolve the problem. You may have to do this several times if needed.

MrC

Link to post
Share on other sites

I had disabled avast (selecting the option "until the computer is restarted"), however Combofix told me that avast was still enabled O__O

So I interrupted Combofix and restarted the computer... I really didn't know what else to do.

Since running Combofix is potentially dangerous, I'd rather not attempt again at using Combofix...

My computer runs okay now and MalawareBytes doesn't detect any virus anymore, so I really prefer to leave things as they are.

Thank you very much for the precious help :)

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.