elero Posted January 18, 2009 ID:48772 Share Posted January 18, 2009 Malwarebytes' Anti-Malware 1.33Database version: 1665Windows 5.1.2600 Service Pack 318.01.2009 14:02:31mbam-log-2009-01-18 (14-02-27).txtScan type: Quick ScanObjects scanned: 54417Time elapsed: 2 minute(s), 21 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 0Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 0Files Infected: 1Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:(No malicious items detected)Registry Values Infected:(No malicious items detected)Registry Data Items Infected:(No malicious items detected)Folders Infected:(No malicious items detected)Files Infected:C:\WINDOWS\system32\gaopdxxwhowipl.dll (Trojan.DNSChanger) -> No action taken.________________________________________________________________________Logfile of Trend Micro HijackThis v2.0.2Scan saved at 14:18:25, on 18.01.2009Platform: Windows XP SP3 (WinNT 5.01.2600)MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)Boot mode: NormalRunning processes:C:\WINDOWS\System32\smss.exeC:\WINDOWS\system32\winlogon.exeC:\WINDOWS\system32\services.exeC:\WINDOWS\system32\lsass.exeC:\WINDOWS\system32\svchost.exeC:\WINDOWS\System32\svchost.exeC:\WINDOWS\system32\LEXBCES.EXEC:\WINDOWS\system32\spoolsv.exeC:\WINDOWS\system32\LEXPPS.EXEC:\WINDOWS\Explorer.EXEC:\Programme\Microsoft Office\Office12\GrooveMonitor.exeC:\WINDOWS\system32\RUNDLL32.EXEC:\WINDOWS\RTHDCPL.EXEC:\Programme\Lexmark 1200 Series\lxczbmgr.exeC:\Programme\FreePDF_XP\fpassist.exeC:\Programme\iTunes\iTunesHelper.exeC:\Programme\Lexmark 1200 Series\lxczbmon.exeC:\Programme\Winamp\winampa.exeC:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exeC:\Programme\Java\jre6\bin\jusched.exeC:\PROGRA~1\AVG\AVG8\avgtray.exeC:\WINDOWS\system32\ctfmon.exeC:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Programme\Bonjour\mDNSResponder.exeC:\Programme\Java\jre6\bin\jqs.exeC:\WINDOWS\system32\nvsvc32.exeC:\WINDOWS\system32\svchost.exeC:\Programme\AVG\AVG8\avgui.exeC:\Programme\iPod\bin\iPodService.exeC:\Programme\AVG\AVG8\avgscanx.exeC:\WINDOWS\system32\wbem\wmiapsrv.exeC:\Dokumente und Einstellungen\Bia\Desktop\trendmicro.exeC:\PROGRA~1\AVG\AVG8\avgwdsvc.exeC:\PROGRA~1\AVG\AVG8\avgrsx.exeR0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.orf.at/R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.localO2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelper.dllO2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Programme\AVG\AVG8\avgssie.dllO2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre6\bin\ssv.dllO2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programme\Java\jre6\bin\jp2ssv.dllO2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Programme\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dllO4 - HKLM\..\Run: [GrooveMonitor] "C:\Programme\Microsoft Office\Office12\GrooveMonitor.exe"O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartupO4 - HKLM\..\Run: [nwiz] nwiz.exe /installO4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInitO4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXEO4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXEO4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exeO4 - HKLM\..\Run: [Lexmark 1200 Series] "C:\Programme\Lexmark 1200 Series\lxczbmgr.exe"O4 - HKLM\..\Run: [FreePDF Assistant] C:\Programme\FreePDF_XP\fpassist.exeO4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\QuickTime\QTTask.exe" -atboottimeO4 - HKLM\..\Run: [iTunesHelper] "C:\Programme\iTunes\iTunesHelper.exe"O4 - HKLM\..\Run: [WinampAgent] C:\Programme\Winamp\winampa.exeO4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe"O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Programme\Java\jre6\bin\jusched.exe"O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exeO4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exeO4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre6\bin\jp2iexp.dllO9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre6\bin\jp2iexp.dllO9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dllO9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLLO9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exeO9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exeO9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exeO9 - Extra button: @C:\Programme\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exeO9 - Extra 'Tools' menuitem: @C:\Programme\Messenger\Msgslang.dll,-61144 - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exeO18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLLO18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Programme\AVG\AVG8\avgpp.dllO20 - AppInit_DLLs: avgrsstx.dllO23 - Service: ArcSoft Connect Daemon (ACDaemon) - Unknown owner - C:\Programme\Gemeinsame Dateien\ArcSoft\Connection Service\Bin\ACService.exe (file missing)O23 - Service: Apple Mobile Device - Apple Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeO23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exeO23 - Service: Bonjour-Dienst (Bonjour Service) - Apple Inc. - C:\Programme\Bonjour\mDNSResponder.exeO23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exeO23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Programme\Java\jre6\bin\jqs.exeO23 - Service: LexBce Server (LexBceS) - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXEO23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe--End of file - 6470 bytes Link to post Share on other sites More sharing options...
elero Posted January 18, 2009 Author ID:48785 Share Posted January 18, 2009 I can't find the file in Windows Explorer, why this? Hidden files are visible AVG update doesn't work and I can't connect to this forum on the infected machine Link to post Share on other sites More sharing options...
Fatdcuk Posted January 18, 2009 ID:48894 Share Posted January 18, 2009 Hi spt,It is quite possibly CLB driver related infection from information you have supplied but just to check for sureCan you download Rootrepeal>>>http://rootrepeal.googlepages.com/Run a scan and post back the output log generated. Link to post Share on other sites More sharing options...
elero Posted January 19, 2009 Author ID:49018 Share Posted January 19, 2009 ROOTREPEAL © AD, 2007-2008==================================================Scan Time: 2009/01/19 11:07Program Version: Version 1.2.3.0Windows Version: Windows XP SP3==================================================Drivers-------------------Name: 1394BUS.SYSImage Path: C:\WINDOWS\system32\DRIVERS\1394BUS.SYSAddress: 0xF7607000 Size: 57344 File Visible: -Status: -Name: Aavmker4.SYSImage Path: C:\WINDOWS\System32\Drivers\Aavmker4.SYSAddress: 0xF77AF000 Size: 19072 File Visible: -Status: -Name: ACPI.sysImage Path: ACPI.sysAddress: 0xF748F000 Size: 188800 File Visible: -Status: -Name: ACPI_HALImage Path: \Driver\ACPI_HALAddress: 0x804D7000 Size: 2265088 File Visible: -Status: -Name: afd.sysImage Path: C:\WINDOWS\System32\drivers\afd.sysAddress: 0xB6E1A000 Size: 138496 File Visible: -Status: -Name: arp1394.sysImage Path: C:\WINDOWS\system32\DRIVERS\arp1394.sysAddress: 0xF7877000 Size: 60800 File Visible: -Status: -Name: aswFsBlk.sysImage Path: C:\WINDOWS\system32\DRIVERS\aswFsBlk.sysAddress: 0xF77EF000 Size: 32768 File Visible: -Status: -Name: aswMon2.SYSImage Path: C:\WINDOWS\System32\Drivers\aswMon2.SYSAddress: 0xB67B7000 Size: 87296 File Visible: -Status: -Name: aswRdr.SYSImage Path: C:\WINDOWS\System32\Drivers\aswRdr.SYSAddress: 0xB5386000 Size: 15136 File Visible: -Status: -Name: aswSP.SYSImage Path: C:\WINDOWS\System32\Drivers\aswSP.SYSAddress: 0xB6D37000 Size: 131072 File Visible: -Status: -Name: aswTdi.SYSImage Path: C:\WINDOWS\System32\Drivers\aswTdi.SYSAddress: 0xF740E000 Size: 41152 File Visible: -Status: -Name: atapi.sysImage Path: atapi.sysAddress: 0xF796F000 Size: 98304 File Visible: -Status: -Name: atapi.sysImage Path: atapi.sysAddress: 0x00000000 Size: 0 File Visible: -Status: -Name: atksgt.sysImage Path: C:\WINDOWS\system32\DRIVERS\atksgt.sysAddress: 0xB56D8000 Size: 271360 File Visible: -Status: -Name: atl01_xp.sysImage Path: C:\WINDOWS\system32\DRIVERS\atl01_xp.sysAddress: 0xBA6DD000 Size: 35840 File Visible: -Status: -Name: ATMFD.DLLImage Path: C:\WINDOWS\System32\ATMFD.DLLAddress: 0xBFFA9000 Size: 286720 File Visible: -Status: -Name: audstub.sysImage Path: C:\WINDOWS\system32\DRIVERS\audstub.sysAddress: 0xF7AC0000 Size: 3072 File Visible: -Status: -Name: Beep.SYSImage Path: C:\WINDOWS\System32\Drivers\Beep.SYSAddress: 0xF79D3000 Size: 4224 File Visible: -Status: -Name: BOOTVID.dllImage Path: C:\WINDOWS\system32\BOOTVID.dllAddress: 0xF7897000 Size: 12288 File Visible: -Status: -Name: Cdfs.SYSImage Path: C:\WINDOWS\System32\Drivers\Cdfs.SYSAddress: 0xBAF4E000 Size: 63744 File Visible: -Status: -Name: cdrom.sysImage Path: C:\WINDOWS\system32\DRIVERS\cdrom.sysAddress: 0xBA69D000 Size: 62976 File Visible: -Status: -Name: CLASSPNP.SYSImage Path: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYSAddress: 0xF7657000 Size: 53248 File Visible: -Status: -Name: disk.sysImage Path: disk.sysAddress: 0xF7647000 Size: 36352 File Visible: -Status: -Name: dmio.sysImage Path: dmio.sysAddress: 0xF7832000 Size: 154112 File Visible: -Status: -Name: dmload.sysImage Path: dmload.sysAddress: 0xF798B000 Size: 5888 File Visible: -Status: -Name: drmk.sysImage Path: C:\WINDOWS\system32\drivers\drmk.sysAddress: 0xF744E000 Size: 61440 File Visible: -Status: -Name: dump_atapi.sysImage Path: C:\WINDOWS\System32\Drivers\dump_atapi.sysAddress: 0xB6C9D000 Size: 98304 File Visible: NoStatus: -Name: dump_WMILIB.SYSImage Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYSAddress: 0xF79E3000 Size: 8192 File Visible: NoStatus: -Name: Dxapi.sysImage Path: C:\WINDOWS\System32\drivers\Dxapi.sysAddress: 0xB6E92000 Size: 12288 File Visible: -Status: -Name: dxg.sysImage Path: C:\WINDOWS\System32\drivers\dxg.sysAddress: 0xBF9C3000 Size: 73728 File Visible: -Status: -Name: dxgthk.sysImage Path: C:\WINDOWS\System32\drivers\dxgthk.sysAddress: 0xF7A9B000 Size: 4096 File Visible: -Status: -Name: Fips.SYSImage Path: C:\WINDOWS\System32\Drivers\Fips.SYSAddress: 0xBAFAE000 Size: 44672 File Visible: -Status: -Name: fltmgr.sysImage Path: fltmgr.sysAddress: 0xBAFE0000 Size: 129792 File Visible: -Status: -Name: Fs_Rec.SYSImage Path: C:\WINDOWS\System32\Drivers\Fs_Rec.SYSAddress: 0xF79D1000 Size: 7936 File Visible: -Status: -Name: ftdisk.sysImage Path: ftdisk.sysAddress: 0xF7858000 Size: 126336 File Visible: -Status: -Name: gaopdxcfqxblak.sysImage Path: C:\WINDOWS\system32\drivers\gaopdxcfqxblak.sysAddress: 0xB6F50000 Size: 163840 File Visible: -Status: Hidden from Windows API!Name: GEARAspiWDM.sysImage Path: C:\WINDOWS\system32\DRIVERS\GEARAspiWDM.sysAddress: 0xBAB72000 Size: 9984 File Visible: -Status: -Name: hal.dllImage Path: C:\WINDOWS\system32\hal.dllAddress: 0x80700000 Size: 134400 File Visible: -Status: -Name: HDAudBus.sysImage Path: C:\WINDOWS\system32\DRIVERS\HDAudBus.sysAddress: 0xB999E000 Size: 163840 File Visible: -Status: -Name: HIDCLASS.SYSImage Path: C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYSAddress: 0xBAF6E000 Size: 36864 File Visible: -Status: -Name: HIDPARSE.SYSImage Path: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYSAddress: 0xF776F000 Size: 28672 File Visible: -Status: -Name: hidusb.sysImage Path: C:\WINDOWS\system32\DRIVERS\hidusb.sysAddress: 0xB6F40000 Size: 10368 File Visible: -Status: -Name: HTTP.sysImage Path: C:\WINDOWS\System32\Drivers\HTTP.sysAddress: 0xB5155000 Size: 264832 File Visible: -Status: -Name: imapi.sysImage Path: C:\WINDOWS\system32\DRIVERS\imapi.sysAddress: 0xBA6AD000 Size: 42112 File Visible: -Status: -Name: intelppm.sysImage Path: C:\WINDOWS\system32\DRIVERS\intelppm.sysAddress: 0xBA6ED000 Size: 40448 File Visible: -Status: -Name: ipnat.sysImage Path: C:\WINDOWS\system32\DRIVERS\ipnat.sysAddress: 0xB6E64000 Size: 152832 File Visible: -Status: -Name: ipsec.sysImage Path: C:\WINDOWS\system32\DRIVERS\ipsec.sysAddress: 0xB6F15000 Size: 75264 File Visible: -Status: -Name: isapnp.sysImage Path: isapnp.sysAddress: 0xF7617000 Size: 37632 File Visible: -Status: -Name: kbdclass.sysImage Path: C:\WINDOWS\system32\DRIVERS\kbdclass.sysAddress: 0xBA629000 Size: 25216 File Visible: -Status: -Name: kbdhid.sysImage Path: C:\WINDOWS\system32\DRIVERS\kbdhid.sysAddress: 0xB6F2C000 Size: 14720 File Visible: -Status: -Name: KDCOM.DLLImage Path: C:\WINDOWS\system32\KDCOM.DLLAddress: 0xF7987000 Size: 8192 File Visible: -Status: -Name: kmixer.sysImage Path: C:\WINDOWS\system32\drivers\kmixer.sysAddress: 0xB4CC3000 Size: 172416 File Visible: -Status: -Name: ks.sysImage Path: C:\WINDOWS\system32\DRIVERS\ks.sysAddress: 0xB9943000 Size: 143360 File Visible: -Status: -Name: KSecDD.sysImage Path: KSecDD.sysAddress: 0xBAF17000 Size: 92288 File Visible: -Status: -Name: lirsgt.sysImage Path: C:\WINDOWS\system32\DRIVERS\lirsgt.sysAddress: 0xF7817000 Size: 18048 File Visible: -Status: -Name: mnmdd.SYSImage Path: C:\WINDOWS\System32\Drivers\mnmdd.SYSAddress: 0xF79D5000 Size: 4224 File Visible: -Status: -Name: mouclass.sysImage Path: C:\WINDOWS\system32\DRIVERS\mouclass.sysAddress: 0xBA621000 Size: 23552 File Visible: -Status: -Name: mouhid.sysImage Path: C:\WINDOWS\system32\DRIVERS\mouhid.sysAddress: 0xB6F34000 Size: 12288 File Visible: -Status: -Name: MountMgr.sysImage Path: MountMgr.sysAddress: 0xF7627000 Size: 42368 File Visible: -Status: -Name: mrxdav.sysImage Path: C:\WINDOWS\system32\DRIVERS\mrxdav.sysAddress: 0xB5743000 Size: 180608 File Visible: -Status: -Name: mrxsmb.sysImage Path: C:\WINDOWS\system32\DRIVERS\mrxsmb.sysAddress: 0xB6D7F000 Size: 455296 File Visible: -Status: -Name: Msfs.SYSImage Path: C:\WINDOWS\System32\Drivers\Msfs.SYSAddress: 0xF778F000 Size: 19072 File Visible: -Status: -Name: msgpc.sysImage Path: C:\WINDOWS\system32\DRIVERS\msgpc.sysAddress: 0xF76D7000 Size: 35072 File Visible: -Status: -Name: mssmbios.sysImage Path: C:\WINDOWS\system32\DRIVERS\mssmbios.sysAddress: 0xF7923000 Size: 15488 File Visible: -Status: -Name: Mup.sysImage Path: Mup.sysAddress: 0xBAE43000 Size: 105344 File Visible: -Status: -Name: NDIS.sysImage Path: NDIS.sysAddress: 0xBAE5D000 Size: 182656 File Visible: -Status: -Name: ndistapi.sysImage Path: C:\WINDOWS\system32\DRIVERS\ndistapi.sysAddress: 0xBAB6A000 Size: 10112 File Visible: -Status: -Name: ndisuio.sysImage Path: C:\WINDOWS\system32\DRIVERS\ndisuio.sysAddress: 0xB6D5B000 Size: 14592 File Visible: -Status: -Name: ndiswan.sysImage Path: C:\WINDOWS\system32\DRIVERS\ndiswan.sysAddress: 0xB992C000 Size: 91520 File Visible: -Status: -Name: NDProxy.SYSImage Path: C:\WINDOWS\System32\Drivers\NDProxy.SYSAddress: 0xF745E000 Size: 40576 File Visible: -Status: -Name: netbios.sysImage Path: C:\WINDOWS\system32\DRIVERS\netbios.sysAddress: 0xBAFBE000 Size: 34688 File Visible: -Status: -Name: netbt.sysImage Path: C:\WINDOWS\system32\DRIVERS\netbt.sysAddress: 0xB6E3C000 Size: 162816 File Visible: -Status: -Name: nic1394.sysImage Path: C:\WINDOWS\system32\DRIVERS\nic1394.sysAddress: 0xBA6CD000 Size: 61824 File Visible: -Status: -Name: Npfs.SYSImage Path: C:\WINDOWS\System32\Drivers\Npfs.SYSAddress: 0xF7797000 Size: 30848 File Visible: -Status: -Name: Ntfs.sysImage Path: Ntfs.sysAddress: 0xBAE8A000 Size: 574976 File Visible: -Status: -Name: ntoskrnl.exeImage Path: C:\WINDOWS\system32\ntoskrnl.exeAddress: 0x804D7000 Size: 2265088 File Visible: -Status: -Name: Null.SYSImage Path: C:\WINDOWS\System32\Drivers\Null.SYSAddress: 0xB70B7000 Size: 2944 File Visible: -Status: -Name: nv4_disp.dllImage Path: C:\WINDOWS\System32\nv4_disp.dllAddress: 0xBF9D5000 Size: 6111232 File Visible: -Status: -Name: nv4_mini.sysImage Path: C:\WINDOWS\system32\DRIVERS\nv4_mini.sysAddress: 0xB99DA000 Size: 6557408 File Visible: -Status: -Name: ohci1394.sysImage Path: ohci1394.sysAddress: 0xF75F7000 Size: 61696 File Visible: -Status: -Name: parport.sysImage Path: C:\WINDOWS\system32\DRIVERS\parport.sysAddress: 0xB9966000 Size: 80384 File Visible: -Status: -Name: PartMgr.sysImage Path: PartMgr.sysAddress: 0xF770F000 Size: 19712 File Visible: -Status: -Name: ParVdm.SYSImage Path: C:\WINDOWS\System32\Drivers\ParVdm.SYSAddress: 0xB6691000 Size: 7040 File Visible: -Status: -Name: pci.sysImage Path: pci.sysAddress: 0xF747E000 Size: 68224 File Visible: -Status: -Name: PCI_PNP2096Image Path: \Driver\PCI_PNP2096Address: 0x00000000 Size: 0 File Visible: NoStatus: -Name: pciide.sysImage Path: pciide.sysAddress: 0xF7A4F000 Size: 3328 File Visible: -Status: -Name: PCIIDEX.SYSImage Path: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYSAddress: 0xF7707000 Size: 28672 File Visible: -Status: -Name: PnpManagerImage Path: \Driver\PnpManagerAddress: 0x804D7000 Size: 2265088 File Visible: -Status: -Name: portcls.sysImage Path: C:\WINDOWS\system32\drivers\portcls.sysAddress: 0xB70FA000 Size: 147456 File Visible: -Status: -Name: psched.sysImage Path: C:\WINDOWS\system32\DRIVERS\psched.sysAddress: 0xB991B000 Size: 69120 File Visible: -Status: -Name: ptilink.sysImage Path: C:\WINDOWS\system32\DRIVERS\ptilink.sysAddress: 0xBA639000 Size: 17792 File Visible: -Status: -Name: PxHelp20.sysImage Path: PxHelp20.sysAddress: 0xF7667000 Size: 35712 File Visible: -Status: -Name: rasacd.sysImage Path: C:\WINDOWS\system32\DRIVERS\rasacd.sysAddress: 0xB8708000 Size: 8832 File Visible: -Status: -Name: rasl2tp.sysImage Path: C:\WINDOWS\system32\DRIVERS\rasl2tp.sysAddress: 0xF76A7000 Size: 51328 File Visible: -Status: -Name: raspppoe.sysImage Path: C:\WINDOWS\system32\DRIVERS\raspppoe.sysAddress: 0xF76B7000 Size: 41472 File Visible: -Status: -Name: raspptp.sysImage Path: C:\WINDOWS\system32\DRIVERS\raspptp.sysAddress: 0xF76C7000 Size: 48384 File Visible: -Status: -Name: raspti.sysImage Path: C:\WINDOWS\system32\DRIVERS\raspti.sysAddress: 0xBA631000 Size: 16512 File Visible: -Status: -Name: RAWImage Path: \FileSystem\RAWAddress: 0x804D7000 Size: 2265088 File Visible: -Status: -Name: rdbss.sysImage Path: C:\WINDOWS\system32\DRIVERS\rdbss.sysAddress: 0xB6DEF000 Size: 175744 File Visible: -Status: -Name: RDPCDD.sysImage Path: C:\WINDOWS\System32\DRIVERS\RDPCDD.sysAddress: 0xF79D7000 Size: 4224 File Visible: -Status: -Name: rdpdr.sysImage Path: C:\WINDOWS\system32\DRIVERS\rdpdr.sysAddress: 0xB98DA000 Size: 196224 File Visible: -Status: -Name: redbook.sysImage Path: C:\WINDOWS\system32\DRIVERS\redbook.sysAddress: 0xF7697000 Size: 57728 File Visible: -Status: -Name: rootrepeal.sysImage Path: C:\WINDOWS\system32\drivers\rootrepeal.sysAddress: 0xF76E7000 Size: 45056 File Visible: NoStatus: -Name: RtkHDAud.sysImage Path: C:\WINDOWS\system32\drivers\RtkHDAud.sysAddress: 0xB711E000 Size: 4927488 File Visible: -Status: -Name: SCSIPORT.SYSImage Path: C:\WINDOWS\System32\Drivers\SCSIPORT.SYSAddress: 0xF74BE000 Size: 98304 File Visible: -Status: -Name: serenum.sysImage Path: C:\WINDOWS\system32\DRIVERS\serenum.sysAddress: 0xBAB76000 Size: 15744 File Visible: -Status: -Name: serial.sysImage Path: C:\WINDOWS\system32\DRIVERS\serial.sysAddress: 0xBA6BD000 Size: 65536 File Visible: -Status: -Name: spcu.sysImage Path: spcu.sysAddress: 0xF74D6000 Size: 1048576 File Visible: NoStatus: -Name: sptdImage Path: \Driver\sptdAddress: 0x00000000 Size: 0 File Visible: NoStatus: -Name: sr.sysImage Path: sr.sysAddress: 0xBAFCE000 Size: 73472 File Visible: -Status: -Name: srv.sysImage Path: C:\WINDOWS\system32\DRIVERS\srv.sysAddress: 0xB557E000 Size: 333952 File Visible: -Status: -Name: swenum.sysImage Path: C:\WINDOWS\system32\DRIVERS\swenum.sysAddress: 0xF79C5000 Size: 4352 File Visible: -Status: -Name: sysaudio.sysImage Path: C:\WINDOWS\system32\drivers\sysaudio.sysAddress: 0xB664B000 Size: 60800 File Visible: -Status: -Name: tcpip.sysImage Path: C:\WINDOWS\system32\DRIVERS\tcpip.sysAddress: 0xB6EBC000 Size: 361600 File Visible: -Status: -Name: TDI.SYSImage Path: C:\WINDOWS\system32\DRIVERS\TDI.SYSAddress: 0xBA641000 Size: 20480 File Visible: -Status: -Name: termdd.sysImage Path: C:\WINDOWS\system32\DRIVERS\termdd.sysAddress: 0xF76F7000 Size: 40704 File Visible: -Status: -Name: tmcomm.sysImage Path: C:\WINDOWS\system32\drivers\tmcomm.sysAddress: 0xB55D0000 Size: 97280 File Visible: -Status: -Name: update.sysImage Path: C:\WINDOWS\system32\DRIVERS\update.sysAddress: 0xB9828000 Size: 384768 File Visible: -Status: -Name: usbccgp.sysImage Path: C:\WINDOWS\system32\DRIVERS\usbccgp.sysAddress: 0xF77B7000 Size: 32128 File Visible: -Status: -Name: USBD.SYSImage Path: C:\WINDOWS\system32\DRIVERS\USBD.SYSAddress: 0xF79CF000 Size: 8192 File Visible: -Status: -Name: usbehci.sysImage Path: C:\WINDOWS\system32\DRIVERS\usbehci.sysAddress: 0xBA649000 Size: 30208 File Visible: -Status: -Name: usbhub.sysImage Path: C:\WINDOWS\system32\DRIVERS\usbhub.sysAddress: 0xF742E000 Size: 59520 File Visible: -Status: -Name: USBPORT.SYSImage Path: C:\WINDOWS\system32\DRIVERS\USBPORT.SYSAddress: 0xB997A000 Size: 147456 File Visible: -Status: -Name: usbprint.sysImage Path: C:\WINDOWS\system32\DRIVERS\usbprint.sysAddress: 0xF7787000 Size: 25856 File Visible: -Status: -Name: usbuhci.sysImage Path: C:\WINDOWS\system32\DRIVERS\usbuhci.sysAddress: 0xBA651000 Size: 20608 File Visible: -Status: -Name: vga.sysImage Path: C:\WINDOWS\System32\drivers\vga.sysAddress: 0xF7777000 Size: 20992 File Visible: -Status: -Name: VIDEOPRT.SYSImage Path: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYSAddress: 0xB99C6000 Size: 81920 File Visible: -Status: -Name: VolSnap.sysImage Path: VolSnap.sysAddress: 0xF7637000 Size: 53760 File Visible: -Status: -Name: wanarp.sysImage Path: C:\WINDOWS\system32\DRIVERS\wanarp.sysAddress: 0xF7887000 Size: 34560 File Visible: -Status: -Name: watchdog.sysImage Path: C:\WINDOWS\System32\watchdog.sysAddress: 0xF77BF000 Size: 20480 File Visible: -Status: -Name: wdmaud.sysImage Path: C:\WINDOWS\system32\drivers\wdmaud.sysAddress: 0xB59A0000 Size: 83072 File Visible: -Status: -Name: Win32kImage Path: \Driver\Win32kAddress: 0xBF800000 Size: 1847296 File Visible: -Status: -Name: win32k.sysImage Path: C:\WINDOWS\System32\win32k.sysAddress: 0xBF800000 Size: 1847296 File Visible: -Status: -Name: WMILIB.SYSImage Path: C:\WINDOWS\System32\Drivers\WMILIB.SYSAddress: 0xF7989000 Size: 8192 File Visible: -Status: -Name: WMIxWDMImage Path: \Driver\WMIxWDMAddress: 0x804D7000 Size: 2265088 File Visible: -Status: - Link to post Share on other sites More sharing options...
Fatdcuk Posted January 19, 2009 ID:49022 Share Posted January 19, 2009 As suspected you have new variant of CLB driver.Name: gaopdxcfqxblak.sysImage Path: C:\WINDOWS\system32\drivers\gaopdxcfqxblak.sysAddress: 0xB6F50000 Size: 163840 File Visible: -Status: Hidden from Windows API!If possible i would like to see the infection files for further analysis.So please can you you use the file scan of RootRepeal this time.We are looking for all files with the same, simmillar name to the above driver.If you highlight each line and then right click(Copy file) and save to holding folder.Zip the folder and upload to a new topic here>>>http://www.malwarebytes.org/forums/index.php?showforum=55Please also can i see the output logs from RootRepeal for Files,Process's/Stealth Objects and Hidden Services.Thanks:) Link to post Share on other sites More sharing options...
elero Posted January 19, 2009 Author ID:49033 Share Posted January 19, 2009 If possible i would like to see the infection files for further analysis.Sorry, it seems that AVG Anti-Rootkit has deleted the file? MBAM log file is clean now:Malwarebytes' Anti-Malware 1.33Database version: 1666Windows 5.1.2600 Service Pack 319.01.2009 13:46:32mbam-log-2009-01-19 (13-46-32).txtScan type: Quick ScanObjects scanned: 54274Time elapsed: 3 minute(s), 43 second(s)Memory Processes Infected: 0Memory Modules Infected: 0Registry Keys Infected: 0Registry Values Infected: 0Registry Data Items Infected: 0Folders Infected: 0Files Infected: 0Memory Processes Infected:(No malicious items detected)Memory Modules Infected:(No malicious items detected)Registry Keys Infected:(No malicious items detected)Registry Values Infected:(No malicious items detected)Registry Data Items Infected:(No malicious items detected)Folders Infected:(No malicious items detected)Files Infected:(No malicious items detected)___________________________________________________________RootRepeal:Drivers: Found 134 drivers (0 hidden)!Processes: Found 38 processes (0 hidden, 0 locked)Stealth Objects: Found 116 stealth objects!Hidden Services: Found 1 hidden services! When I want to copy the file I get this: (see screenshot)So the machine isn't clean? Link to post Share on other sites More sharing options...
Fatdcuk Posted January 19, 2009 ID:49035 Share Posted January 19, 2009 Ok use Rootrepeal to delete the Hidden service file by right clicking on its line and selecting delete.Reboot the system and see if AVG updates & PC can get onto this forum.Also can you run a fresh scan with Rootrepeal and post the output(Report) log generated. Link to post Share on other sites More sharing options...
elero Posted January 19, 2009 Author ID:49042 Share Posted January 19, 2009 Hello!The machine can get onto this forum and AVG updates! But it seems that there are some registry keys that can't be deleted:HKEY_LOCAL_MACHINE\System\ControlSet001\Services\gaopdxserv.sys\modulesHKEY_LOCAL_MACHINE\System\ControlSet003\Services\gaopdxserv.sys\modulesI tried to delete it with regedit, but I got the message that the keys couldn't be deleted Is there any way to get rid of these keys? Link to post Share on other sites More sharing options...
Fatdcuk Posted January 19, 2009 ID:49044 Share Posted January 19, 2009 Download IceSword>>>http://majorgeeks.com/Icesword_d5199.htmlWhen you have extracted and run IceSword.exe,you will see a Registry button/option in the lower left of the software main GUI.Use this option to navigate to the offending keys and when your there,right click and select delete. Link to post Share on other sites More sharing options...
elero Posted January 19, 2009 Author ID:49065 Share Posted January 19, 2009 IceSword did it, the keys are gone Thank you for your help! Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted January 22, 2009 Root Admin ID:49958 Share Posted January 22, 2009 Update and Scan with Malwarebytes' Anti-MalwareStart MalwareBytes AntiMalware (Vista users must Right click and choose RunAs Admin)Please DO NOT run MBAM in Safe Mode unless requested to, you MUST run it in normal Windows mode.Update Malwarebytes' Anti-Malware Select the Update tabClick Update[*]When the update is complete, select the Scanner tab[*]Select Perform quick scan, then click Scan.[*]When the scan is complete, click OK, then Show Results to view the results.[*]Be sure that everything is checked, and click Remove Selected.[*]When completed, a log will open in Notepad. please copy and paste the log into your next reply If you accidently close it, the log file is saved here and will be named like this:C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txtThen RESTART the computerAFTER the reboot run HJT Do a system scan and save a logfileThe post back NEW MBAM and HJT logs in that order please. Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted January 27, 2009 Root Admin ID:51108 Share Posted January 27, 2009 Due to the lack of feedback this Topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!The fixes and advice in this thread are for this machine only. Do not apply the instructions from this thread to your own machine. Please start a new thread describing your issue and someone will be along to assist you. Link to post Share on other sites More sharing options...
Recommended Posts