Inactive-A Infected PC no task bar and constant popups

Status
Not open for further replies.

Necro007

Posts: 6   +0
Hi guys,

I have a PC that is infected. It was constantly showing popups of just in time debugger. The task bar is not working and comes up with an error. Windows can't find taskmgr make sure the name is correct... We have ESET NOD 32 Antivirus and it does not start up automatically. Once it is started it starts to pickup viruses and cleans them. The PC then after a while has full pop ups and freezes.

I installed Malware bytes, updated it and ran it. It cleaned all infections and I restarted the PC. It is much better then before however the taskbar still doesn't work and NOD 32 does not start automatically.
It also had 20+ entries as schedule tasks that was set to run every minute or so. I manually deleted them. There are strange .exe programs in my C:\

Any help would be great.
 
Welcome aboard

Please, complete all steps listed here: https://www.techspot.com/community/...lware-removal-preliminary-instructions.58138/
Make sure, you PASTE all logs. If some log exceeds 50,000 characters post limit, split it between couple of replies.
Attached logs won't be reviewed.

Please, observe following rules:
  • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
  • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
  • Please refrain from running any tools, fixes or applying any changes to your computer other than those I suggest.
  • Never run more than one scan at a time.
  • Keep updating me regarding your computer behavior, good, or bad.
  • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
  • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
  • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.
 
Hi Borni,

Thank you for the reply.

I ran the malware scan and its picking up "pup.serverCCProxy" for my .Net\Framework files. This PC is used to host some websites. I'm a bit worried to click the clean button as what if that stops our websites from functioning.

Here is the log file, I have not clicked the remove selected yet.

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.04.12.04

Windows Server 2003 Service Pack 1 x86 NTFS
Internet Explorer 7.0.5730.11
Administrator :: DRAGON [administrator]

2013/04/12 03:17:34 PM
MBAM-log-2013-04-12 (16-52-23).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 445359
Time elapsed: 31 minute(s), 13 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 52
C:\boottfmm.exe (Malware.NSPack) -> No action taken.
C:\WINDOWS\system32\eb.exe (PUP.ServerCCProxy) -> No action taken.
C:\WINDOWS\system32\uuid.dll (PUP.ServerCCProxy) -> No action taken.
C:\WINDOWS\system32\boottfmm.exe (Malware.NSPack) -> No action taken.
C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\eb.exe (PUP.ServerCCProxy) -> No action taken.
C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\uuid.dll (PUP.ServerCCProxy) -> No action taken.
C:\RECYCLER\hex1.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hex5.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hex8.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hexavse.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hexnbbm2.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hexSevrs.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hexstartnet.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\hexvideo.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xp123.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xp33.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xp360.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xp5.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpavse.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpcmsaa.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpffmm.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpmsts.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpnbbm2.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpoffice.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xprora.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpserver.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpSevrs.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpstartnet.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpsvchost.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpsvshost.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xptfmm.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\xpvideo.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy1.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy123.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy33.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy360.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy5.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy8.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zy888.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyavse.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyjeel.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zymsts.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zynbbm2.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyoffice.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyrora.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyserver.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zySevrs.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zystartnet.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zysvchost.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zysvshost.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyvideo.exe (Trojan.Agent) -> No action taken.
C:\RECYCLER\zyxixi.exe (Trojan.Agent) -> No action taken.

(end)
 
Hi Broni,

I ran the scan again, please see bellow for log.

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.04.15.02

Windows Server 2003 Service Pack 1 x86 NTFS
Internet Explorer 7.0.5730.11
Administrator :: DRAGON [administrator]

4/15/2013 8:52:07 AM
mbam-log-2013-04-15 (08-52-07).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 443994
Time elapsed: 35 minute(s), 44 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 24
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rps.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsafeTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSWebShield.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXp.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvxp.kxp (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Kwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCRTP.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmond.exe (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTRAY.EXE (Security.Hijack) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SHSTAT.EXE (Security.Hijack) -> Quarantined and deleted successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 80
C:\boottfmm.exe (Malware.NSPack) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eb.exe (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uuid.dll (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\TmpC446.tmp (Trojan.AVDis.Gen) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\boottfmm.exe (Malware.NSPack) -> Quarantined and deleted successfully.
C:\Documents and Settings\Administrator\Local Settings\Temp\PPTV_Update.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\eb.exe (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\uuid.dll (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
C:\RECYCLER\hex360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hex8.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexnbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexnetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexSevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexstartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hextaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\hexvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp123.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp33.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xp5.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpcmsaa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpdagg.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpffmm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpHades.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpifly01.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpmsts.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpnbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpnetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpoffice.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xprora.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpserver.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpSevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpsogou.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpstartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpsvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpsvshost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xptaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xptfmm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy123.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy1818tt.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy33.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy5.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy8.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zy888.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zybfbm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyconfig.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zydagg.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyHades.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyifly01.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyjeel.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zylsadds.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zymsts.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zynbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zynetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyoffice.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyrora.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyserver.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zySevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zystartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zysvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zysvshost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zytaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyxhddos.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyxixi.exe (Trojan.Agent) -> Quarantined and deleted successfully.

(end)
 
I updated Malwarebytes and ran another scan. Please see results bellow:

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.04.15.03

Windows Server 2003 Service Pack 1 x86 NTFS
Internet Explorer 7.0.5730.11
Administrator :: DRAGON [administrator]

2013/04/15 10:04:57 AM
mbam-log-2013-04-15 (10-04-57).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 444356
Time elapsed: 30 minute(s), 44 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 4
C:\WINDOWS\system32\TmpC445.tmp (Trojan.AVDis.Gen) -> Quarantined and deleted successfully.
C:\RECYCLER\hexvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\xpvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\zyvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.

(end)
 
We don't have too many tools for windows server 2003 but we'll see what we can do.

redtarget.gif
Download RogueKiller on the desktop
  • Close all the running programs
  • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • Pre-scan will start. Let it finish.
  • Click on SCAN button.
  • Wait until the Status box shows Scan Finished
  • Click on Delete.
  • Wait until the Status box shows Deleting Finished.
  • Click on Report and copy/paste the content of the Notepad into your next reply.
  • RKreport.txt could also be found on your desktop.
  • If more than one log is produced post all logs.
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again

redtarget.gif
Download Malwarebytes Anti-Rootkit (MBAR) from HERE
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt
 
Hi, Broni,

Thank you for the help I really appreciate it. Please see results bellow from Rogue Killer:

Report 1:
RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : https://www.techspot.com/downloads/5562-roguekiller.html
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP 64 / Windows Home Server / Windows Server 2003 (5.2.3790 Service Pack 1) 32 bits version
Started in : Normal mode
User : Administrator [Admin rights]
Mode : Scan -- Date : 04/17/2013 11:23:20
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[Microsoft][HJNAME] svchost.exe -- C:\WINDOWS\system32\Syswin\svchost.exe [-] -> KILLED [TermProc]

¤¤¤ Registry Entries : 13 ¤¤¤
[RUN][HJNAME] HKLM\[...]\Run : ghdddhx (C:\WINDOWS\ime\svchost.exe) [x] -> FOUND
[RUN][HJNAME] HKLM\[...]\Run : jhbddc (C:\WINDOWS\ime\svchost.exe) [x] -> FOUND
[RUN][HJNAME] HKLM\[...]\Run : kuai (C:\Program Files\Common Files\svchost.exe) [x] -> FOUND
[RUN][HJNAME] HKLM\[...]\Run : shell (C:\windows\svchost.exe) [x] -> FOUND
[STARTUP][ROGUE ST] 360.exe @All Users : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> FOUND
[STARTUP][ROGUE ST] 360.exe Common : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> FOUND
[IFEO] HKLM\[...]\app.exe : debugger (C:\WINDOWS\ime\cv.exe) -> FOUND
[IFEO] HKLM\[...]\net2.exe : debugger (C:\WINDOWS\ime\cv.exe) -> FOUND
[IFEO] HKLM\[...]\Storm.exe : Debugger (taskkill.exe) -> FOUND
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyDocs (0) -> FOUND
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
[HJ] HKLM\[...]\Command Processor : AutoRun (C:\windows\svchost.exe) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1 localhost



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] 774590f16c6a03ca30f595646be31eea
[BSP] c2b50a953c61090942ae9f81a2bac3e4 : Alipop MBR Code!
Partition table:
0 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 63 | Size: 149 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 305235 | Size: 237311 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

+++++ PhysicalDrive1: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] 53328983c26aa185e956e01299f77b78
[BSP] b9a1e964581115b65b93d3d3d4c68a70 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

+++++ PhysicalDrive2: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] a933a7456265861555ad5dbdd4c18bc9
[BSP] 5e0fe1a85e41358db400ab0941209344 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[1]_S_04172013_02d1123.txt >>
RKreport[1]_S_04172013_02d1123.txt

Report 2:
RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : https://www.techspot.com/downloads/5562-roguekiller.html
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP 64 / Windows Home Server / Windows Server 2003 (5.2.3790 Service Pack 1) 32 bits version
Started in : Normal mode
User : Administrator [Admin rights]
Mode : Remove -- Date : 04/17/2013 11:25:16
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[Microsoft][HJNAME] svchost.exe -- C:\WINDOWS\system32\Syswin\svchost.exe [-] -> KILLED [TermProc]

¤¤¤ Registry Entries : 12 ¤¤¤
[RUN][HJNAME] HKLM\[...]\Run : ghdddhx (C:\WINDOWS\ime\svchost.exe) [x] -> DELETED
[RUN][HJNAME] HKLM\[...]\Run : jhbddc (C:\WINDOWS\ime\svchost.exe) [x] -> DELETED
[RUN][HJNAME] HKLM\[...]\Run : kuai (C:\Program Files\Common Files\svchost.exe) [x] -> DELETED
[RUN][HJNAME] HKLM\[...]\Run : shell (C:\windows\svchost.exe) [x] -> DELETED
[STARTUP][ROGUE ST] 360.exe @All Users : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> DELETED
[IFEO] HKLM\[...]\app.exe : debugger (C:\WINDOWS\ime\cv.exe) -> DELETED
[IFEO] HKLM\[...]\net2.exe : debugger (C:\WINDOWS\ime\cv.exe) -> DELETED
[IFEO] HKLM\[...]\Storm.exe : Debugger (taskkill.exe) -> DELETED
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyDocs (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> REPLACED (1)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
[HJ] HKLM\[...]\Command Processor : AutoRun (C:\windows\svchost.exe) -> REPLACED ()

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ Infection : Root.MBR ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\WINDOWS\system32\drivers\etc\hosts

127.0.0.1 localhost



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] 774590f16c6a03ca30f595646be31eea
[BSP] c2b50a953c61090942ae9f81a2bac3e4 : Alipop MBR Code!
Partition table:
0 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 63 | Size: 149 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 305235 | Size: 237311 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

+++++ PhysicalDrive1: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] 53328983c26aa185e956e01299f77b78
[BSP] b9a1e964581115b65b93d3d3d4c68a70 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

+++++ PhysicalDrive2: LSI MegaSR SCSI Disk Device +++++
--- User ---
[MBR] a933a7456265861555ad5dbdd4c18bc9
[BSP] 5e0fe1a85e41358db400ab0941209344 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[2]_D_04172013_02d1125.txt >>
RKreport[1]_S_04172013_02d1123.txt ; RKreport[2]_D_04172013_02d1125.txt

I'm running the Mbam Anti Rootkit, will post the results when it is completed.
 
This topic is marked as abandoned and closed due to inactivity.
This member will NOT be eligible to receive any more help in malware removal forum.
 
Status
Not open for further replies.
Back