Brutal Black
Posts: 75 +0
Hello! New here, but I've been doing a lot of research since an incident corrupted my computers soul a few nights ago, and this is the best place to be from my understanding, so hopefully you guys can help me.
I managed to pick up a keylogger at some point a few nights back, I made the mistake of falling asleep watching Hulu and had the horror of awakening to see a kyelogger attempting to send private information across servers. it was posing as an anti virus program and was completely in control of the PC. I had lost complete access to my C drive. It literally shut down on me a few times when I would try to do simple actions to combat it. Then I found that it would instantly shut down task manager, forcing me to rename the TM and close as much of it as I could just to perform a restore. After much deliberation I decided it was best to just restore to an early point.
This did me justice but of course left traces of the virus throughout my computer. I ran AVG 2012 free edition and cleaned up quite a bit, I didn't have this log saved because I hadn't discovered you guys yet, every scan I run at this point in that program comes up clean (I've ran several others return clean results as well). However I'm 100% certain my computer is infected. I'm often redirected at google links, even to this page. My homepage changes itself. Internet explorer opens itself trying to get me to download things every 10-20mins. Sometimes its an itunes file, other times its a torrent, but almost always I'm offered random software that appears malicious. This didn't happen before the keylogging incident.
I've taken the liberty of reading some of your guide lines and took the steps to get the logs you guys require to give me a hand. It's greatly appreciated in advance. You guys are life savers, no ocean involved.
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org
Database version: 8211
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
11/22/2011 8:10:32 PM
mbam-log-2011-11-22 (20-10-32).txt
Scan type: Full scan (C:\|Q:\|)
Objects scanned: 585752
Time elapsed: 1 hour(s), 34 minute(s), 13 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
------------------------------------------------------
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-23 13:21:10
Windows 6.1.7600
Running: u6gx0ld6.exe; Driver: C:\Users\gamers\AppData\Local\Temp\uftiraob.sys
---- Registry - GMER 1.0.15 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xAA 0x57 0xCF 0x1A ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x03 0x9E 0xA5 0x4D ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x75 0x0E 0x83 0x86 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x49 0x1A 0xC1 0xC4 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x03 0x9E 0xA5 0x4D ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x75 0x0E 0x83 0x86 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\mdbc@ boPD
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\TkCHktsPaogS@ LiMujQd`GzRQ\x[qnmj}FZAAhiuqgRf
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\TvaOBoztEgaf@ EziuyyUF?|fceslI]DXVPvzLIAaMMt
---- Files - GMER 1.0.15 ----
File C:\Windows\$NtUninstallKB49674$\1756167456 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059\L 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059\U 0 bytes
---- EOF - GMER 1.0.15 ----
--------------------------------------------------
I managed to pick up a keylogger at some point a few nights back, I made the mistake of falling asleep watching Hulu and had the horror of awakening to see a kyelogger attempting to send private information across servers. it was posing as an anti virus program and was completely in control of the PC. I had lost complete access to my C drive. It literally shut down on me a few times when I would try to do simple actions to combat it. Then I found that it would instantly shut down task manager, forcing me to rename the TM and close as much of it as I could just to perform a restore. After much deliberation I decided it was best to just restore to an early point.
This did me justice but of course left traces of the virus throughout my computer. I ran AVG 2012 free edition and cleaned up quite a bit, I didn't have this log saved because I hadn't discovered you guys yet, every scan I run at this point in that program comes up clean (I've ran several others return clean results as well). However I'm 100% certain my computer is infected. I'm often redirected at google links, even to this page. My homepage changes itself. Internet explorer opens itself trying to get me to download things every 10-20mins. Sometimes its an itunes file, other times its a torrent, but almost always I'm offered random software that appears malicious. This didn't happen before the keylogging incident.
I've taken the liberty of reading some of your guide lines and took the steps to get the logs you guys require to give me a hand. It's greatly appreciated in advance. You guys are life savers, no ocean involved.
Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org
Database version: 8211
Windows 6.1.7600
Internet Explorer 8.0.7600.16385
11/22/2011 8:10:32 PM
mbam-log-2011-11-22 (20-10-32).txt
Scan type: Full scan (C:\|Q:\|)
Objects scanned: 585752
Time elapsed: 1 hour(s), 34 minute(s), 13 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)
------------------------------------------------------
GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-23 13:21:10
Windows 6.1.7600
Running: u6gx0ld6.exe; Driver: C:\Users\gamers\AppData\Local\Temp\uftiraob.sys
---- Registry - GMER 1.0.15 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0xAA 0x57 0xCF 0x1A ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x03 0x9E 0xA5 0x4D ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x75 0x0E 0x83 0x86 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x49 0x1A 0xC1 0xC4 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x03 0x9E 0xA5 0x4D ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x75 0x0E 0x83 0x86 ...
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\mdbc@ boPD
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\TkCHktsPaogS@ LiMujQd`GzRQ\x[qnmj}FZAAhiuqgRf
Reg HKLM\SOFTWARE\Classes\CLSID\{909FCFE5-19B5-D007-74EB-19EE542DABFF}\TvaOBoztEgaf@ EziuyyUF?|fceslI]DXVPvzLIAaMMt
---- Files - GMER 1.0.15 ----
File C:\Windows\$NtUninstallKB49674$\1756167456 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059\L 0 bytes
File C:\Windows\$NtUninstallKB49674$\1896461059\U 0 bytes
---- EOF - GMER 1.0.15 ----
--------------------------------------------------