Jump to content

tough rootkit shuts down antivirus programs


antidote

Recommended Posts

i've been fighting with a nasty rootkit since last night. it kills malwarebytes, super antispyware and most antivirus programs after a few seconds then denies access to the progs after that. I can run tdsskiller and it always finds 2 things, cures them (if i run prog again right away it shows as clean), but the prob doesn't go away. upon reboot and running tdsskiller again, it always still finds 2 things (albeit in different files than before). cant run combofix either. i believe there's a search hijack as well, as i did notice a redirect earlier when using google. not sure what to do since it kills most antispyware.

Also note: when this problem first appeared, I had a popup about "maximum number of secrets have been exceeded" and avg found something, then entire computer locked up and windows wouldn't load after that. took a while to clear that up but windows runs now. antiviruses will not. The main suspicious file is in windows and is a string of numbers, a colon then a string of other numbers. cannot kill the process. After much reading i'm hoping this isn't the rootkit which creates its own reg partition.

am running win xp sp3

Link to post
Share on other sites

  • Replies 63
  • Created
  • Last Reply

Top Posters In This Topic

Hello, this sounds like a ZeroAccess rootkit.

COMBOFIX

---------------

Please download ComboFix from one of these locations:


Bleepingcomputer
ForoSpyware

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.

Query_RC.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC_successful.gif

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\Combofix.txt in your next reply.

Link to post
Share on other sites

hi,

combofix shuts down after a few seconds, as is the case with other antivirus programs. It doesn't get to the recovery console phase.

Hello, this sounds like a ZeroAccess rootkit.

COMBOFIX

---------------

Please download ComboFix from one of these locations:


Bleepingcomputer
ForoSpyware

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Double click on Combofix.exe and follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, or if you are running Vista, ComboFix will continue it's malware removal procedures.

Query_RC.gif

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

RC_successful.gif

Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\Combofix.txt in your next reply.

Link to post
Share on other sites

Hi again,

In that case, lets try it a bit differently.

Try this please. You will need a USB drive.

Download GETxPUD.exe to the desktop of your clean computer

  • Run GETxPUD.exe
  • A new folder will appear on the desktop.
  • Open the GETxPUD folder and click on the get&burn.bat
  • The program will download xpud_0.9.2.iso, and upon finished will open BurnCDCC ready to burn the image.
  • Click on Start and follow the prompts to burn the image to a CD.
  • Next download driver.sh to your USB drive
  • Remove the USB & CD and insert it in the sick computer
  • Boot the Sick computer with the CD you just burned
  • The computer must be set to boot from the CD
  • Gently tap F12 and choose to boot from the CD
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert it back in your working computer and navigate to report.txt
    Please note - all text entries are case sensitive

Copy and paste the report.txt for my review

Link to post
Share on other sites

No problem, try it like this. :)

Download http://unetbootin.sourceforge.net/unetbootin-xpud-windows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer

  • Insert your USB drive
  • Press Start > My Computer > right click your USB drive > choose Format > Quick format
  • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
  • Press Run then OK
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded
  • Verify the correct drive letter is selected for your USB device then click OK
  • It will install a little bootable OS on your USB device
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface
  • After it has completed do not choose to reboot the clean computer simply close the installer
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt
    Please note - all text entries are case sensitive

Copy and paste the report.txt for my review

Link to post
Share on other sites

thanks. Completed everything up through inserting USB in new computer. When i select boot options, I do see the removable disk as a boot option, but it's in parentheses, as are the other choices (HDD). A note on the side says a device enclosed in parentheses has been disabled in the corresponding type menu. I don't see a way to enable it, i've tried. So when I reboot after doing this, with removable device as first item in boot order, it still boots windows instead of the device.

Link to post
Share on other sites

by new computer, i mean the sick computer. thanks

thanks. Completed everything up through inserting USB in new computer. When i select boot options, I do see the removable disk as a boot option, but it's in parentheses, as are the other choices (HDD). A note on the side says a device enclosed in parentheses has been disabled in the corresponding type menu. I don't see a way to enable it, i've tried. So when I reboot after doing this, with removable device as first item in boot order, it still boots windows instead of the device.

Link to post
Share on other sites

Then lets run the following to see if we can reset some file permissions in order to get some tools to work.

We need to scan the system with this special tool:

* Please download and save:

Junction.zip

* Unzip it and place Junction.exe in the Windows directory (C:\Windows).

* Go to Start => Run... => Copy and paste the following command in the Run box and click OK:

cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

A command window opens starting to scan the system. Wait until a log file opens. Copy and paste the log in your next reply.

Link to post
Share on other sites

not sure what's happening here but upon entering that text, junction did start running and asked me to agree to terms. I did and the cmd prompt came up.. and did nothing just a blinking cursor and you can't type in the box. I waited a while to see if something would happen, nope.

I retried the steps starting with the run command. Subsequent tries pull up only the cmd prompt, which sits there frozen with the blinking cursor. Junction doesn't pop up anymore. I even clicked it within windows and a cmd window popped up briefly and quickly closed. Can't delete and reinstall junction - access denied.

Link to post
Share on other sites

Seems like the rootkit has found a way to block Junction too.

Do you have an XP CD at hand (or can you borrow one from a friend/family member)? All XP CD's will work, except for Dell disks.

If so, do the following.

Let's try to boot your computer using a Boot CD.

Please print this guide for future reference!

You will need a blank CD, your Windows XP install disc, a clean computer and a flash drive.

Please follow the steps below and let me know if you were successful. Please tell me what error messages you got and/or what steps you got hung up on.

1. Download the PE Builder to your desktop

http://www.nu2.nu/download.php?sFile=pebuilder3110a.exe

  • Double-Click on the PE Builder that you just downloaded to your desktop.
  • Follow all of the instructions/prompts that come up.

2. Insert your XP CD with SP1/SP2/SP3 into a CD Rom drive

  • Double-Click on PE Builder.exe located on your desktop.
  • Click NO to Search for Windows Installation Files
  • Make the following selections from the Main Screen that pops up:
    • Builder
      • Source:(path to Windows installation files)
        • Enter the path to the drive where your XP CD is located.
        • You can click on the "..." button on the right to navigate to the path as well.

        [*]Custom: (include files and folders from this directory)

        • No information is necessary, leave blank.

        [*]Output:

        • Keep the default

    • Media output
      • Choose Create ISO image

      • Do not choose Burn to CD/DVD
        • Download the RunScanner plugin and save it to your desktop

        http://www.paraglidernc.com/Files/RunScanner10025.cab

        Please note: You will be prompted for the folder that it shall be saved. By default it appears as runscanner10025. It should be modified to just runscanner <--- Important!!!

        • Press the Plugin button on the PE Builder interface
        • Press the Add button and navigate to the location of the RunScanner plugin to install
        • Please note: If you are using a Windows XP disc with sp2 then highlight RpsSS needs to launch DComLaunch and then press Enable

        [*]When your done press Close and the PE Builder interface will re-appear

    3. Click on the "Build" button

    • You will see the Windows EULA message. Click on I Agree
    • You will now see the Build Screen. Let it run it's course
    • When the Build is finished you can click close, then exit

    4. Burn your ISO file to CD

    ==========

    Next........

    From your clean computer..

    Please download OTLPE.zip and save it to a flash drive.

    http://oldtimer.geekstogo.com/OTLPE.zip

    http://www.itxassociates.com/OT-Tools/OTLPE.zip

    Double click and unzip OTLPE.zip to its own folder on your flash drive. Name it OTLPE <-- Important!!

    ==========

    Plug your flash drive into your sick computer now and do as instructed below..

    ==========

    1. Restart Your sick Computer Using the PE Builder ISO CD That You Have Created

    • Insert the CD in to one of your CD/DVD drives.
    • Restart your computer.
      • The computer should choose to boot from the CD automatically. If it doesn't and you are asked if you want to boot from CD, then choose that option.

      [*]Once the desktop appears, you will receive a message asking: Do you want to start Network support?

      • Click on No

      [*]After it loads press the Go button in the lower left and do this....

      • Go
      • System
      • Display
      • Screen Resolution
      • 1024x768

      Next choose....

      • Go
      • Programs
      • A43 File Management Utility

    ==========

    In A43File Management you should see your flash drive

    Navigate to the OTLPE folder that you saved to your flash drive.

    Open the OTLPE folder and double click Start.cmd.

    • When asked "Do you wish to load remote user profile(s) for scanning", select Yes
    • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
    • OTLPE should now start
      Change the following settings
      • Change Services, Drivers, Standard and Extra Registry to Use Safelist
      • Uncheck LOP and Purity check

      Please note: Stay with your computer during the course of the scan. If "Entry Point Errors" are encountered simply press "ok" and allow the program to continue. <-- Important!!

      [*]Push runscanbutton.png

      [*]A report will open named "OTL.tx"t and another will be minimized to the system tray named "Extra.txt". Save both log's to your flash drive. Copy and Paste them in your next reply.

Link to post
Share on other sites

no xp cd :(

Seems like the rootkit has found a way to block Junction too.

Do you have an XP CD at hand (or can you borrow one from a friend/family member)? All XP CD's will work, except for Dell disks.

If so, do the following.

Let's try to boot your computer using a Boot CD.

Please print this guide for future reference!

You will need a blank CD, your Windows XP install disc, a clean computer and a flash drive.

Please follow the steps below and let me know if you were successful. Please tell me what error messages you got and/or what steps you got hung up on.

1. Download the PE Builder to your desktop

http://www.nu2.nu/download.php?sFile=pebuilder3110a.exe

  • Double-Click on the PE Builder that you just downloaded to your desktop.
  • Follow all of the instructions/prompts that come up.

2. Insert your XP CD with SP1/SP2/SP3 into a CD Rom drive

  • Double-Click on PE Builder.exe located on your desktop.
  • Click NO to Search for Windows Installation Files
  • Make the following selections from the Main Screen that pops up:
    • Builder
      • Source:(path to Windows installation files)
        • Enter the path to the drive where your XP CD is located.
        • You can click on the "..." button on the right to navigate to the path as well.

        [*]Custom: (include files and folders from this directory)

        • No information is necessary, leave blank.

        [*]Output:

        • Keep the default

    • Media output
      • Choose Create ISO image

      • Do not choose Burn to CD/DVD
        • Download the RunScanner plugin and save it to your desktop

        http://www.paraglidernc.com/Files/RunScanner10025.cab

        Please note: You will be prompted for the folder that it shall be saved. By default it appears as runscanner10025. It should be modified to just runscanner <--- Important!!!

        • Press the Plugin button on the PE Builder interface
        • Press the Add button and navigate to the location of the RunScanner plugin to install
        • Please note: If you are using a Windows XP disc with sp2 then highlight RpsSS needs to launch DComLaunch and then press Enable

        [*]When your done press Close and the PE Builder interface will re-appear

    3. Click on the "Build" button

    • You will see the Windows EULA message. Click on I Agree
    • You will now see the Build Screen. Let it run it's course
    • When the Build is finished you can click close, then exit

    4. Burn your ISO file to CD

    ==========

    Next........

    From your clean computer..

    Please download OTLPE.zip and save it to a flash drive.

    http://oldtimer.geekstogo.com/OTLPE.zip

    http://www.itxassociates.com/OT-Tools/OTLPE.zip

    Double click and unzip OTLPE.zip to its own folder on your flash drive. Name it OTLPE <-- Important!!

    ==========

    Plug your flash drive into your sick computer now and do as instructed below..

    ==========

    1. Restart Your sick Computer Using the PE Builder ISO CD That You Have Created

    • Insert the CD in to one of your CD/DVD drives.
    • Restart your computer.
      • The computer should choose to boot from the CD automatically. If it doesn't and you are asked if you want to boot from CD, then choose that option.

      [*]Once the desktop appears, you will receive a message asking: Do you want to start Network support?

      • Click on No

      [*]After it loads press the Go button in the lower left and do this....

      • Go
      • System
      • Display
      • Screen Resolution
      • 1024x768

      Next choose....

      • Go
      • Programs
      • A43 File Management Utility

    ==========

    In A43File Management you should see your flash drive

    Navigate to the OTLPE folder that you saved to your flash drive.

    Open the OTLPE folder and double click Start.cmd.

    • When asked "Do you wish to load remote user profile(s) for scanning", select Yes
    • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
    • OTLPE should now start
      Change the following settings
      • Change Services, Drivers, Standard and Extra Registry to Use Safelist
      • Uncheck LOP and Purity check

      Please note: Stay with your computer during the course of the scan. If "Entry Point Errors" are encountered simply press "ok" and allow the program to continue. <-- Important!!

      [*]Push runscanbutton.png

      [*]A report will open named "OTL.tx"t and another will be minimized to the system tray named "Extra.txt". Save both log's to your flash drive. Copy and Paste them in your next reply.

Link to post
Share on other sites

When i select boot options, I do see the removable disk as a boot option, but it's in parentheses, as are the other choices (HDD). A note on the side says a device enclosed in parentheses has been disabled in the corresponding type menu. I don't see a way to enable it, i've tried. So when I reboot after doing this, with removable device as first item in boot order, it still boots windows instead of the device.
What are all options you see in the Boot Menu?
Link to post
Share on other sites

good news: got the USB to boot and ran xPud. Hmm, i see zeroaccess in the report!! Here's the report:

Wed Sep 14 15:39:21 UTC 2011

Driver report for /mnt/sda1/WINDOWS/system32/drivers

e6d35f3aa51a65eb35c1f2340154a25e fganwhh.sys has NO Company Name!

72472b9ce5d02e443cff49a40355455d hitmanpro35.sys has NO Company Name!

7dd41b7ac1fbb1dbf20bb1f4e4fbe58c 11091301.sys

Kaspersky Lab

a305fad3719c5db0c13d1c2bfd08a04d 11091302.sys

Kaspersky Lab

66ef49622baa18e4d4f1fe4bae1d51b8 1109130.sys

Kaspersky Lab

9859c0f6936e723e4892d7141b1327d5 acpiec.sys

Microsoft Corporation

8fd99680a539792a30e97944fdaecf17 acpi.sys

Microsoft Corporation

8bed39e3c35d6a489438b8141717a557 aec.sys

Microsoft Corporation

10b5b921f711380e69a3105e9ea3b105 afd.sys

Microsoft Corporation

f6af59d6eee5e1c304f7f73706ad11d8 Ambfilt.sys

tH`HHVS_VERSION_INFOnn?StringFileInfobtCompanyNameCreativebFileDescriptionCreativeWDMDAudioDriver:rFileVersion...XLegalCopyrightCopyrightCreative>rProductVersion...DVarFileInfo$Translationtb*

d7701d7e72243286cc88c9973d891057 amdk6.sys

Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys

Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f arp1394.sys

Microsoft Corporation

12415a4b61ded200fe9932b47a35fa42 ASUSACPI.SYS

H`$``VS_VERSION_INFO?(aStringFileInfobLCompanyNameASUSTeKComputerInc.XFileDescriptionASUSACPIDeviceDrivervFileVersion,,,:rInternalNameasusacpi.sys~-LegalCopyrightCopyright©ASUSTeKComputerInc.-BrOriginalFilenameasusacpi.sys:rProductNameasusacpi.sys:vProductVersion,,,bSpecialBuildReleaseDVarFileInfo$Translationt

b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys

Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys

Microsoft Corporation

7d53e5646ba23fd51296f7ef8979a000 athw.sys

Atheros Communications

9916c1225104ba14794209cfa8012159 atmarpc.sys

Microsoft Corporation

39a0a59180f19946374275745b21aeba atmepvc.sys

Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836 atmlane.sys

Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys

Microsoft Corporation

e05ae1168e3f716797e1aaaf11ba134b atwpkt264.sys

America Online

8a11527579faac8237f6d70946132c24 atwpkt2.sys

America Online

d9f724aa26c010a217c97606b160ed68 audstub.sys

Microsoft Corporation

53b3f979930a786a614d29cafe99f645 avgmfx86.sys

AVG Technologies

9a7a93388f503a34e7339ae7f9997449 avgtdix.sys

AVG Technologies

0d93976f7801b7fcd8135cc77257bbd0 battc.sys

Microsoft Corporation

da1f27d85e0d1525f6621372e7b685e9 beep.sys

Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys

Microsoft Corporation

4b43dfe1c1fbb305a1dc5504ef9bb34e btaudio.sys

Broadcom Corporation

662bfd909447dd9cc15b1a1c366583b4 bthport.sys

Microsoft Corporation

70455baffc078b6152d1e52376296467 btkrnl.sys

Broadcom Corporation

2f9f111d31aa3fbbe5781d829a4524e6 btport.sys

Broadcom Corporation

485020a1e1fc5c51a800ca69c618d881 btwdndis.sys

Broadcom Corporation

949eca9c56f657c06d3166d51f3226c7 btwhid.sys

Broadcom Corporation

c21362bb5a22ce4b40a7b475254f858c btwsecfl.sys

Broadcom Corporation

2cfc2bd8785f82a42fcad83de1fa5a36 btwusb.sys

Broadcom Corporation

90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys

Microsoft Corporation

0be5aef125be881c4f854c554f2b025c CCDECODE.sys

Microsoft Corporation

c1b486a7658353d33a10cc15211a873b cdaudio.sys

Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32 cdfs.sys

Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe cdrom.sys

Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c cinemst2.sys

Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys

Microsoft Corporation

0f6c187d38d98f8df904589a5f94d411 CmBatt.sys

Microsoft Corporation

6e4c9f21f0fae8940661144f41b13203 compbatt.sys

Microsoft Corporation

9624293e55ad405415862b504ca95b73 cpqdap01.sys

Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f crusoe.sys

Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys

Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25 disk.sys

Microsoft Corporation

d992fe1274bde0f84ad826acae022a41 dmboot.sys

Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f dmio.sys

Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f dmload.sys

Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45 DMusic.sys

Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys

Microsoft Corporation

6cb08593487f5701d2d2254e693eafce drmk.sys

Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys

Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e dxg.sys

Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd dxgthk.sys

Microsoft Corporation

d1669c3eb818b4264be85fb7705acfc8 ETD.sys

ELANTECH Devices

38d332a6d56af32635675f132548343e fastfat.sys

Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys

Microsoft Corporation

e6d35f3aa51a65eb35c1f2340154a25e fganwhh.sys

d45926117eb9fa946a6af572fbe1caa3 fips.sys

Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys

Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0 fltMgr.sys

Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys

Microsoft Corporation

455f778ee14368468560bd7cb8c854d0 fsvga.sys

Microsoft Corporation

6ac26732762483366c3969c9e4d2259d ftdisk.sys

Microsoft Corporation

573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys

Windows Server DDK provider

1af592532532a402ed7c060f6954004f hidclass.sys

Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d hidparse.sys

Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys

Microsoft Corporation

72472b9ce5d02e443cff49a40355455d hitmanpro35.sys

f80a415ef82cd06ffaf0d971528ead38 http.sys

Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys

Microsoft Corporation

0f68e2ec713f132ffb19e45415b09679 igxpmp32.sys

Intel Corporation

083a052659f5310dd8b6a6cb05edcf8e imapi.sys

Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b intelppm.sys

Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0 ip6fw.sys

Microsoft Corporation

731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys

Microsoft Corporation

b87ab476dcf76e72010632b5550955f5 ipinip.sys

Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb ipnat.sys

Microsoft Corporation

23c74d75e36e7158768dd63d92789a91 ipsec.sys

Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89 irenum.sys

Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys

Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128 kbdclass.sys

Microsoft Corporation

692bcf44383d056aed41b045a323d378 kmixer.sys

Microsoft Corporation

b467646c54cc746128904e1654c750c1 ksecdd.sys

Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1 ks.sys

Microsoft Corporation

fa46f5d09edf93e0c71fe6500fe3f4ae l1e51x86.sys

Atheros Communications

b18225739ed9caa83ba2df966e9f43e8 mbamswissarmy.sys

Malwarebytes Corporation

eca00eed9ab95489007b0ef84c7149de mbam.sys

Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys

Microsoft Corporation

a7da20ab18a1bdae28b0f349e57da0d1 mf.sys

Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys

Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys

Microsoft Corporation

9fa7207d1b1adead88ae8eed9cdbbaa5 Monfilt.sys

Creative Technology

35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys

Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys

Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys

Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys

Microsoft Corporation

0dc719e9b15e902346e87e9dcd5751fa mrxsmb.sys

Microsoft Corporation

c941ea2454ba8350021d774daf0f1027 msfs.sys

Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys

Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1 MSKSSRV.sys

Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e MSPCLOCK.sys

Microsoft Corporation

bad59648ba099da4a17680b39730cb3d MSPQM.sys

Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys

Microsoft Corporation

e53736a9e30c45fa9e7b5eac55056d1d MSTEE.sys

Microsoft Corporation

de6a75f5c270e756c5508d94b6cf68f5 mup.sys

Microsoft Corporation

5b50f1b2a2ed47d560577b221da734db NABTSFEC.sys

Microsoft Corporation

7ff1f1fd8609c149aa432f95a8163d97 NdisIP.sys

Microsoft Corporation

1df7f42665c94b825322fae71721130d ndis.sys

Microsoft Corporation

0109c4f3850dfbab279542515386ae22 ndistapi.sys

Microsoft Corporation

f927a4434c5028758a842943ef1a3849 ndisuio.sys

Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab ndiswan.sys

Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b ndproxy.sys

Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys

Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys

Microsoft Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys

Microsoft Corporation

be984d604d91c217355cdd3737aad25d nikedrv.sys

Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b nmnt.sys

Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a npfs.sys

Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys

Microsoft Corporation

73c1e1f395918bc2c6dd67af7591a3ad null.sys

Microsoft Corporation

b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys

Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys

Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys

Microsoft Corporation

56d34a67c05e94e16377c60609741ff8 nwlnknb.sys

Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys

Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys

Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3 p3.sys

Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c parport.sys

Microsoft Corporation

beb3ba25197665d82ec7065b724171c6 partmgr.sys

Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys

Microsoft Corporation

3adb8bd6154a3ef87496e8fce9c22493 pavboot.sys

Panda Security

ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys

Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys

Microsoft Corporation

a219903ccf74233761d92bef471a07b1 pci.sys

Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys

Microsoft Corporation

e82a496c3961efc6828b508c310ce98f portcls.sys

Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26 processr.sys

Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424 psched.sys

Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys

Parallel Technologies

fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys

Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys

Microsoft Corporation

5bc962f2654137c9909c3d4603587dee raspppoe.sys

Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys

Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys

Microsoft Corporation

01524cd237223b18adbb48f70083f101 rawwan.sys

Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a rdbss.sys

Microsoft Corporation

4912d5b403614ce99c28420f75353332 rdpcdd.sys

Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1 rdpdr.sys

Microsoft Corporation

6728e45b66f93c08f11de2e316fc70dd rdpwd.sys

Microsoft Corporation

f828dd7e1419b6653894a8f97a0094c5 redbook.sys

Microsoft Corporation

a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys

Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys

Diamond Multimedia Systems

96f7a9a7bf0c9c0440a967440065d33c rmcast.sys

Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d rndismp.sys

Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys

Microsoft Corporation

12a9dafe2266b6fa6ddbce1847347751 RtkHDAud.sys

Realtek Semiconductor

76c465f570e90c28942d52ccb2580a10 scsiport.sys

Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys

Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677 secdrv.sys

Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce serenum.sys

Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys

Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys

Microsoft Corporation

d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys

Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac sffp_sd.sys

Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys

Microsoft Corporation

866d538ebe33709a5c9f5c62b73b7d14 SLIP.sys

Microsoft Corporation

017daecf0ed3aa731313433601ec40fa smclib.sys

Microsoft Corporation

489703624dac94ed943c2abda022a1cd sonydcam.sys

Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys

Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys

Microsoft Corporation

47ddfc2f003f7f9f0592c6874962a2e7 srv.sys

Microsoft Corporation

77813007ba6265c4b6098187e6ed79d2 StreamIP.sys

Microsoft Corporation

3e5d89099ded9e86e5639f411693218f stream.sys

Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f swenum.sys

Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys

Microsoft Corporation

8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys

Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72 tape.sys

Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys

Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys

Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf tdi.sys

Microsoft Corporation

6471a66807f5e104e4885f5b67349397 tdpipe.sys

Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys

Microsoft Corporation

88155247177638048422893737429d9e termdd.sys

Microsoft Corporation

310465d1ba3481b299247b38b2f5da84 tmcomm.sys

tH`PPVS_VERSION_INFOP/P/?(bStringFileInfobCommentsBCompanyNameTrendMicroInc.ZFileDescriptionTrendMicroCommonModulebFileVersion...vInternalNameTmComm.sysGLegalCopyrightCopyright©-TrendMicroIncorporated.Allrightsreserved.fLegalTrademarksCopyright©TrendMicroInc.>vOriginalFilenameTmComm.sysNPrivateBuildBuild-//DProductNameTrendMicroAEGIS.ProductVersion.*SpecialBuildDVarFileInfo$Translationt

699450901c5ccfd82357cbc531cedd23 tosdvd.sys

Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys

Toshiba Corporation

8f861eda21c05857eb8197300a92501c tunmp.sys

Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys

Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31 update.sys

Microsoft Corporation

bee793d4a059caea55d6ac20e19b3a8f usb8023.sys

Microsoft Corporation

ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys

Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e usbcamd.sys

Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys

Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693 usbd.sys

Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys

Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c usbhub.sys

Microsoft Corporation

290913dc4f1125e5a82de52579a44c43 usbintel.sys

Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys

Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys

Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys

Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys

Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys

Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys

Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1 vga.sys

Microsoft Corporation

e28726b72c46821a28830e077d39a55b videoprt.sys

Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025 volsnap.sys

Microsoft Corporation

e20b95baedb550f32dd489265c1da1f6 wanarp.sys

Microsoft Corporation

0a716c08cb13c3a8f4f51e882dbf7416 wanatw4.sys

America Online

6768acf64b18196494413695f0c3a00f wdmaud.sys

Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b wmilib.sys

Microsoft Corporation

cf4def1bf66f06964dc0d91844239104 wpdusb.sys

Microsoft Corporation

6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys

Microsoft Corporation

c98b39829c2bbd34e454150633c62c78 WSTCODEC.SYS

Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311 WudfPf.sys

Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b WudfRd.sys

Microsoft Corporation

a7a5102afb90cc4910080de766471e43 ZeroAccess.sys

H``LLVS_VERSION_INFOStringFileInfob>CompanyNamePrevXResearchFileDescriptionPrevXZeroAccess/Max++KernelModeRemoverDrivervFileVersion,,,>InternalNameAntiZeroAccessh"LegalCopyrightCopyright©PrevXResearchFOriginalFilenameZeroAccess.sys>ProductNameAntiZeroAccess:vProductVersion,,,DVarFileInfo$Translation*

Link to post
Share on other sites

Using xPUD, navigate to the following files, right click them, and rename them by changing the .sys extension to .vir

/mnt/sda1/WINDOWS/system32/drivers/fganwhh.sys

/mnt/sda1/WINDOWS/system32/drivers/ZeroAccess.sys

Then restart your ocmputer.

Back in Windows do the following:

Please download GrantPerms.zip and save it to your desktop.

Unzip the file and depending on the system run GrantPerms.exe or GrantPerms64.exe

Copy and paste the following in the edit box:

c:\windows\junction.exe

Click Unlock. When it is done click "OK".

Click List Permissions and post the result (Perms.txt) that pops up. A copy of Perms.txt will be saved in the same directory the tool is run.

Now repeat the steps in post #9 of this topic to run Junction.

Link to post
Share on other sites

grant perms result:

GrantPerms by Farbar

Ran by peace love at 2011-09-14 16:58:13

===============================================

\\?\c:\windows\junction.exe

Owner: BUILTIN\Administrators

DACL(NP)(AI):

BUILTIN\Users READ/EXECUTE ALLOW (I)

BUILTIN\Administrators FULL ALLOW (I)

NT AUTHORITY\SYSTEM FULL ALLOW (I)

=============================================================

When i do step 9, i get the cmd prompt with blinking cursor. something popped up quickly then disappeared, No text in cmd prompt area and no log file. Tried again, just the empty cmd window w blinking cursor.

Link to post
Share on other sites

i apparently spoke too soon. after 5-10 mins a log appeared. Those are some lovely 'access denied' msgs:

Junction v1.06 - Windows junction creator and reparse point viewer

Copyright © 2000-2010 Mark Russinovich

Sysinternals - www.sysinternals.com

Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.

Failed to open \\?\c:\\System Volume Information: Access is denied.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

Failed to open \\?\c:\\Documents and Settings\peace love\Desktop\ComboFix.exe: Access is denied.

Failed to open \\?\c:\\Documents and Settings\peace love\Desktop\explorer.exe: Access is denied.

...

...

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Downloads\ComboFix.exe: Access is denied.

.

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Downloads\TmboFx.exe: Access is denied.

..

...

...

...

...

...

...

...

...

...

...

...

...

.

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Virus Removal Tool\kill virii\rkillUSEME.com: Access is denied.

..

...

...

...

...

Failed to open \\?\c:\\Program Files\AVG\AVG9\avgtray.exe: Access is denied.

...

...

...

...

...

...

..

Failed to open \\?\c:\\Program Files\Internet Explorer\iexplore.exe: Access is denied.

.

...

..

Failed to open \\?\c:\\Program Files\Malwarebytes' Anti-Malware\mbam.exe: Access is denied.

.

...

...

Failed to open \\?\c:\\Program Files\PCPitstop\Exterminate2\Exterminate2.exe: Access is denied.

Failed to open \\?\c:\\Program Files\Spybot - Search & Destroy\TeaTimer.exe: Access is denied.

...

...

...

...

...

...

.

Failed to open \\?\c:\\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe: Access is denied.

..

.

Failed to open \\?\c:\\WINDOWS\$NtUninstallKB26770$: Access is denied.

Failed to open \\?\c:\\WINDOWS\Listdlls.exe: Access is denied.

..

...

...\\?\c:\\WINDOWS\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a: JUNCTION

Print Name : C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790

Substitute Name: C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790

Failed to open \\?\c:\\WINDOWS\assembly\GAC_MSIL\Desktop.ini: Access is denied.

\\?\c:\\WINDOWS\assembly\GAC_MSIL\IEExecRemote\2.0.0.0__b03f5f7f11d50a3a: JUNCTION

Print Name : C:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e

Substitute Name: C:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e

...

...

...

...

...

...

...

...

...

...

...

.

Link to post
Share on other sites

here's the result:

GrantPerms by Farbar

Ran by peace love at 2011-09-15 13:01:45

===============================================

\\?\c:\windows\junction.exe

Owner: BUILTIN\Administrators

DACL(NP)(AI):

BUILTIN\Users READ/EXECUTE ALLOW (I)

BUILTIN\Administrators FULL ALLOW (I)

NT AUTHORITY\SYSTEM FULL ALLOW (I)

Link to post
Share on other sites

here u go:

=================================

Junction v1.06 - Windows junction creator and reparse point viewer

Copyright © 2000-2010 Mark Russinovich

Sysinternals - www.sysinternals.com

Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.

Failed to open \\?\c:\\System Volume Information: Access is denied.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

Failed to open \\?\c:\\Documents and Settings\peace love\Desktop\ComboFix.exe: Access is denied.

Failed to open \\?\c:\\Documents and Settings\peace love\Desktop\explorer.exe: Access is denied.

...

...

..

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Downloads\ComboFix.exe: Access is denied.

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Downloads\TmboFx.exe: Access is denied.

.

...

...

...

...

...

...

...

...

...

...

...

...

...

Failed to open \\?\c:\\Documents and Settings\peace love\My Documents\Virus Removal Tool\kill virii\rkillUSEME.com: Access is denied.

...

...

...

...

..

Failed to open \\?\c:\\Program Files\AVG\AVG9\avgtray.exe: Access is denied.

.

...

...

...

...

...

...

Failed to open \\?\c:\\Program Files\Internet Explorer\iexplore.exe: Access is denied.

...

...

Failed to open \\?\c:\\Program Files\Malwarebytes' Anti-Malware\mbam.exe: Access is denied.

...

...

.

Failed to open \\?\c:\\Program Files\PCPitstop\Exterminate2\Exterminate2.exe: Access is denied.

.

Failed to open \\?\c:\\Program Files\Spybot - Search & Destroy\TeaTimer.exe: Access is denied.

.

...

...

...

...

...

...

Failed to open \\?\c:\\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe: Access is denied.

...

Failed to open \\?\c:\\WINDOWS\$NtUninstallKB26770$: Access is denied.

Failed to open \\?\c:\\WINDOWS\Listdlls.exe: Access is denied.

...

...

.\\?\c:\\WINDOWS\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a: JUNCTION

Print Name : C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790

Substitute Name: C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790

Failed to open \\?\c:\\WINDOWS\assembly\GAC_MSIL\Desktop.ini: Access is denied.

\\?\c:\\WINDOWS\assembly\GAC_MSIL\IEExecRemote\2.0.0.0__b03f5f7f11d50a3a: JUNCTION

Print Name : C:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e

Substitute Name: C:\WINDOWS\WinSxS\MSIL_IEExecRemote_b03f5f7f11d50a3a_2.0.0.0_x-ww_6e57c34e

..

...

...

...

...

...

...

...

...

...

...

...

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.