TechSpot

Infected PC no task bar and constant popups

By Necro007
Apr 11, 2013
  1. Hi guys,

    I have a PC that is infected. It was constantly showing popups of just in time debugger. The task bar is not working and comes up with an error. Windows can't find taskmgr make sure the name is correct... We have ESET NOD 32 Antivirus and it does not start up automatically. Once it is started it starts to pickup viruses and cleans them. The PC then after a while has full pop ups and freezes.

    I installed Malware bytes, updated it and ran it. It cleaned all infections and I restarted the PC. It is much better then before however the taskbar still doesn't work and NOD 32 does not start automatically.
    It also had 20+ entries as schedule tasks that was set to run every minute or so. I manually deleted them. There are strange .exe programs in my C:\

    Any help would be great.
     
  2. Broni

    Broni Malware Annihilator Posts: 52,911   +344

    Welcome aboard [​IMG]

    Please, complete all steps listed here: http://www.techspot.com/vb/topic58138.html
    Make sure, you PASTE all logs. If some log exceeds 50,000 characters post limit, split it between couple of replies.
    Attached logs won't be reviewed.

    Please, observe following rules:
    • Read all of my instructions very carefully. Your mistakes during cleaning process may have very serious consequences, like unbootable computer.
    • If you're stuck, or you're not sure about certain step, always ask before doing anything else.
    • Please refrain from running any tools, fixes or applying any changes to your computer other than those I suggest.
    • Never run more than one scan at a time.
    • Keep updating me regarding your computer behavior, good, or bad.
    • The cleaning process, once started, has to be completed. Even if your computer appears to act better, it may still be infected. Once the computer is totally clean, I'll certainly let you know.
    • If you leave the topic without explanation in the middle of a cleaning process, you may not be eligible to receive any more help in malware removal forum.
    • I close my topics if you have not replied in 5 days. If you need more time, simply let me know. If I closed your topic and you need it to be reopened, simply PM me.
     
  3. Necro007

    Necro007 TS Rookie Topic Starter

    Hi Borni,

    Thank you for the reply.

    I ran the malware scan and its picking up "pup.serverCCProxy" for my .Net\Framework files. This PC is used to host some websites. I'm a bit worried to click the clean button as what if that stops our websites from functioning.

    Here is the log file, I have not clicked the remove selected yet.

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2013.04.12.04

    Windows Server 2003 Service Pack 1 x86 NTFS
    Internet Explorer 7.0.5730.11
    Administrator :: DRAGON [administrator]

    2013/04/12 03:17:34 PM
    MBAM-log-2013-04-12 (16-52-23).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 445359
    Time elapsed: 31 minute(s), 13 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 52
    C:\boottfmm.exe (Malware.NSPack) -> No action taken.
    C:\WINDOWS\system32\eb.exe (PUP.ServerCCProxy) -> No action taken.
    C:\WINDOWS\system32\uuid.dll (PUP.ServerCCProxy) -> No action taken.
    C:\WINDOWS\system32\boottfmm.exe (Malware.NSPack) -> No action taken.
    C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\eb.exe (PUP.ServerCCProxy) -> No action taken.
    C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\uuid.dll (PUP.ServerCCProxy) -> No action taken.
    C:\RECYCLER\hex1.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hex5.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hex8.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hexavse.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hexnbbm2.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hexSevrs.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hexstartnet.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\hexvideo.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xp123.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xp33.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xp360.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xp5.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpavse.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpcmsaa.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpffmm.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpmsts.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpnbbm2.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpoffice.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xprora.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpserver.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpSevrs.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpstartnet.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpsvchost.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpsvshost.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xptfmm.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\xpvideo.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy1.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy123.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy33.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy360.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy5.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy8.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zy888.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyavse.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyjeel.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zymsts.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zynbbm2.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyoffice.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyrora.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyserver.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zySevrs.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zystartnet.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zysvchost.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zysvshost.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyvideo.exe (Trojan.Agent) -> No action taken.
    C:\RECYCLER\zyxixi.exe (Trojan.Agent) -> No action taken.

    (end)
     
  4. Broni

    Broni Malware Annihilator Posts: 52,911   +344

    You have to fix all issues and give me new log.
     
  5. Necro007

    Necro007 TS Rookie Topic Starter

    Hi Broni,

    I ran the scan again, please see bellow for log.

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2013.04.15.02

    Windows Server 2003 Service Pack 1 x86 NTFS
    Internet Explorer 7.0.5730.11
    Administrator :: DRAGON [administrator]

    4/15/2013 8:52:07 AM
    mbam-log-2013-04-15 (08-52-07).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 443994
    Time elapsed: 35 minute(s), 44 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 24
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rps.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cfp.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsafeTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSWebShield.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXp.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvxp.kxp (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Kwatch.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCRTP.EXE (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmond.exe (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTRAY.EXE (Security.Hijack) -> Quarantined and deleted successfully.
    HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SHSTAT.EXE (Security.Hijack) -> Quarantined and deleted successfully.

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 80
    C:\boottfmm.exe (Malware.NSPack) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\eb.exe (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\uuid.dll (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\TmpC446.tmp (Trojan.AVDis.Gen) -> Quarantined and deleted successfully.
    C:\WINDOWS\system32\boottfmm.exe (Malware.NSPack) -> Quarantined and deleted successfully.
    C:\Documents and Settings\Administrator\Local Settings\Temp\PPTV_Update.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
    C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\eb.exe (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
    C:\WINDOWS\Microsoft.NET\Framework\v3.2.0.5\uuid.dll (PUP.ServerCCProxy) -> Quarantined and deleted successfully.
    C:\RECYCLER\hex360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hex8.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexnbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexnetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexSevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexstartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hextaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp123.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp33.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xp5.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpcmsaa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpdagg.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpffmm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpHades.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpifly01.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpmsts.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpnbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpnetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpoffice.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xprora.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpserver.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpSevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpsogou.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpstartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpsvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpsvshost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xptaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xptfmm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy123.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy1818tt.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy33.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy360.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy5.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy8.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zy888.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyavse.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zybfbm.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyconfig.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zydagg.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyHades.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyifly01.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyjeel.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zylsadds.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zymsts.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zynbbm2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zynetstat.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyoffice.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyrora.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyseer.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyserver.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zySevrs.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zystartnet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zysvchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zysvshost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zytaskmgr.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyvideo.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyxhddos.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyxixi.exe (Trojan.Agent) -> Quarantined and deleted successfully.

    (end)
     
  6. Necro007

    Necro007 TS Rookie Topic Starter

    Hi Broni,

    I can't run dds as it says my OS is not supported. I'm using windows server 2003.
     
  7. Necro007

    Necro007 TS Rookie Topic Starter

    I updated Malwarebytes and ran another scan. Please see results bellow:

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2013.04.15.03

    Windows Server 2003 Service Pack 1 x86 NTFS
    Internet Explorer 7.0.5730.11
    Administrator :: DRAGON [administrator]

    2013/04/15 10:04:57 AM
    mbam-log-2013-04-15 (10-04-57).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 444356
    Time elapsed: 30 minute(s), 44 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 4
    C:\WINDOWS\system32\TmpC445.tmp (Trojan.AVDis.Gen) -> Quarantined and deleted successfully.
    C:\RECYCLER\hexvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\xpvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
    C:\RECYCLER\zyvbsa.exe (Trojan.Agent) -> Quarantined and deleted successfully.

    (end)
     
  8. Broni

    Broni Malware Annihilator Posts: 52,911   +344

    We don't have too many tools for windows server 2003 but we'll see what we can do.

    [​IMG] Download RogueKiller on the desktop
    • Close all the running programs
    • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
    • Otherwise just double-click on RogueKiller.exe
    • Pre-scan will start. Let it finish.
    • Click on SCAN button.
    • Wait until the Status box shows Scan Finished
    • Click on Delete.
    • Wait until the Status box shows Deleting Finished.
    • Click on Report and copy/paste the content of the Notepad into your next reply.
    • RKreport.txt could also be found on your desktop.
    • If more than one log is produced post all logs.
    • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again

    [​IMG] Download Malwarebytes Anti-Rootkit (MBAR) from HERE
    • Unzip downloaded file.
    • Open the folder where the contents were unzipped and run mbar.exe
    • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    • Wait while the system shuts down and the cleanup process is performed.
    • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt
     
  9. Necro007

    Necro007 TS Rookie Topic Starter

    Hi, Broni,

    Thank you for the help I really appreciate it. Please see results bellow from Rogue Killer:

    Report 1:
    RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
    Website : http://tigzy.geekstogo.com/roguekiller.php
    Blog : http://tigzyrk.blogspot.com/

    Operating System : Windows XP 64 / Windows Home Server / Windows Server 2003 (5.2.3790 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : Administrator [Admin rights]
    Mode : Scan -- Date : 04/17/2013 11:23:20
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 1 ¤¤¤
    [Microsoft][HJNAME] svchost.exe -- C:\WINDOWS\system32\Syswin\svchost.exe [-] -> KILLED [TermProc]

    ¤¤¤ Registry Entries : 13 ¤¤¤
    [RUN][HJNAME] HKLM\[...]\Run : ghdddhx (C:\WINDOWS\ime\svchost.exe) [x] -> FOUND
    [RUN][HJNAME] HKLM\[...]\Run : jhbddc (C:\WINDOWS\ime\svchost.exe) [x] -> FOUND
    [RUN][HJNAME] HKLM\[...]\Run : kuai (C:\Program Files\Common Files\svchost.exe) [x] -> FOUND
    [RUN][HJNAME] HKLM\[...]\Run : shell (C:\windows\svchost.exe) [x] -> FOUND
    [STARTUP][ROGUE ST] 360.exe @All Users : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> FOUND
    [STARTUP][ROGUE ST] 360.exe Common : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> FOUND
    [IFEO] HKLM\[...]\app.exe : debugger (C:\WINDOWS\ime\cv.exe) -> FOUND
    [IFEO] HKLM\[...]\net2.exe : debugger (C:\WINDOWS\ime\cv.exe) -> FOUND
    [IFEO] HKLM\[...]\Storm.exe : Debugger (taskkill.exe) -> FOUND
    [HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyDocs (0) -> FOUND
    [HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
    [HJ] HKLM\[...]\Command Processor : AutoRun (C:\windows\svchost.exe) -> FOUND

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [LOADED] ¤¤¤

    ¤¤¤ Infection : Root.MBR ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\WINDOWS\system32\drivers\etc\hosts

    127.0.0.1 localhost



    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] 774590f16c6a03ca30f595646be31eea
    [BSP] c2b50a953c61090942ae9f81a2bac3e4 : Alipop MBR Code!
    Partition table:
    0 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 63 | Size: 149 Mo
    1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 305235 | Size: 237311 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    +++++ PhysicalDrive1: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] 53328983c26aa185e956e01299f77b78
    [BSP] b9a1e964581115b65b93d3d3d4c68a70 : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    +++++ PhysicalDrive2: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] a933a7456265861555ad5dbdd4c18bc9
    [BSP] 5e0fe1a85e41358db400ab0941209344 : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    Finished : << RKreport[1]_S_04172013_02d1123.txt >>
    RKreport[1]_S_04172013_02d1123.txt

    Report 2:
    RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
    Website : http://tigzy.geekstogo.com/roguekiller.php
    Blog : http://tigzyrk.blogspot.com/

    Operating System : Windows XP 64 / Windows Home Server / Windows Server 2003 (5.2.3790 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : Administrator [Admin rights]
    Mode : Remove -- Date : 04/17/2013 11:25:16
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 1 ¤¤¤
    [Microsoft][HJNAME] svchost.exe -- C:\WINDOWS\system32\Syswin\svchost.exe [-] -> KILLED [TermProc]

    ¤¤¤ Registry Entries : 12 ¤¤¤
    [RUN][HJNAME] HKLM\[...]\Run : ghdddhx (C:\WINDOWS\ime\svchost.exe) [x] -> DELETED
    [RUN][HJNAME] HKLM\[...]\Run : jhbddc (C:\WINDOWS\ime\svchost.exe) [x] -> DELETED
    [RUN][HJNAME] HKLM\[...]\Run : kuai (C:\Program Files\Common Files\svchost.exe) [x] -> DELETED
    [RUN][HJNAME] HKLM\[...]\Run : shell (C:\windows\svchost.exe) [x] -> DELETED
    [STARTUP][ROGUE ST] 360.exe @All Users : C:\Documents and Settings\All Users\Start Menu\Programs\Startup\360.exe -> DELETED
    [IFEO] HKLM\[...]\app.exe : debugger (C:\WINDOWS\ime\cv.exe) -> DELETED
    [IFEO] HKLM\[...]\net2.exe : debugger (C:\WINDOWS\ime\cv.exe) -> DELETED
    [IFEO] HKLM\[...]\Storm.exe : Debugger (taskkill.exe) -> DELETED
    [HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyDocs (0) -> REPLACED (1)
    [HJ SMENU] HKCU\[...]\Advanced : Start_ShowRecentDocs (0) -> REPLACED (1)
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
    [HJ] HKLM\[...]\Command Processor : AutoRun (C:\windows\svchost.exe) -> REPLACED ()

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [LOADED] ¤¤¤

    ¤¤¤ Infection : Root.MBR ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\WINDOWS\system32\drivers\etc\hosts

    127.0.0.1 localhost



    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] 774590f16c6a03ca30f595646be31eea
    [BSP] c2b50a953c61090942ae9f81a2bac3e4 : Alipop MBR Code!
    Partition table:
    0 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 63 | Size: 149 Mo
    1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 305235 | Size: 237311 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    +++++ PhysicalDrive1: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] 53328983c26aa185e956e01299f77b78
    [BSP] b9a1e964581115b65b93d3d3d4c68a70 : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    +++++ PhysicalDrive2: LSI MegaSR SCSI Disk Device +++++
    --- User ---
    [MBR] a933a7456265861555ad5dbdd4c18bc9
    [BSP] 5e0fe1a85e41358db400ab0941209344 : Windows XP MBR Code
    Partition table:
    0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 475878 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    Finished : << RKreport[2]_D_04172013_02d1125.txt >>
    RKreport[1]_S_04172013_02d1123.txt ; RKreport[2]_D_04172013_02d1125.txt

    I'm running the Mbam Anti Rootkit, will post the results when it is completed.
     
  10. Broni

    Broni Malware Annihilator Posts: 52,911   +344

  11. Broni

    Broni Malware Annihilator Posts: 52,911   +344

    Still waiting for MBAR logs.
     
  12. Broni

    Broni Malware Annihilator Posts: 52,911   +344

    This topic is marked as abandoned and closed due to inactivity.
    This member will NOT be eligible to receive any more help in malware removal forum.
     
Topic Status:
Not open for further replies.

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...