-
OK, thank you, I'll do this tomorrow, when back in my office, where I left the infected computer, as I have much other work tonight.
By the way, it could indeed be that Superantispyware is bullsh...; in fact, I tried everything (!!!) I could find to get rid of that infection, before finally coming to you.
And, if it is not too much to ask you, once it is settled, I was indeed going to ask you if you perhaps had a link to a page with some good advices on how to be better protected, in the future: recommended softwares, possibly a UTM (Unified threat management) unit at the incoming adsl line, a remover for USB autorun.inf and... what else...???
Thank you again for helping me fighting that incredibly resistant virus.
Good night / day,
Paul
:)
-
Goog morning Rene-gad,
Sorry I couldn't answer faster: I was in meetings with customers.
Here it is:
- I uninstalled Superantispyware and all similar programs, except for your AVPTool.
- I ran GMER with your latest script, but still with the same errors:
(Error) DeleteService: Access is denied
(Error) DeleteKey: Access is denied
and a new one:
(Error) An error 0x0000001F occured during the deletion of file: "C:\Wind ... \zoxausba.sys": Access denied
:(
The logs are attached here.
Thanks again for your time and courage!
Paul
-
Did you run GMER AS ADMINISTRATOR?
-
YES
I am the only user of the computer, log as administrator and, additionally, by precaution, do the "run as admin" option when clicking on the pgm...
[size="1"][color="#666686"][B][I]Добавлено через 1 минуту[/I][/B][/color][/size]
PS: in case you would answer immediately, pls, just note that I'm leaving now for +/- 2 hours, for a customer visit.
THANK YOU
Paul
-
[QUOTE=np2c;594308]
I am the only user of the computer, log as administrator and, additionally, by precaution[/QUOTE]it's not relevant
[QUOTE] do the "run as admin" option when clicking on the pgm...[/QUOTE]It's correct.
Download and extract this program: [url]http://forum.sysinternals.com/uploads/20071210_182632_rku37300509.rar[/url]
Disable Antivirus.
Run the file rku37300509.exe as administrator, search zn the tab SSDT the string with
[QUOTE][B]zoxausba[/B] with the file [B]C:\Windows\System32\Drivers\zoxausba.sys[/B][/QUOTE]
choose it an in context menu choose Unhook selected and Wipe File.
Probably you'll be asked to reboot the system to remove the file.
Reboot, repeat the log
-
Dear Rene-gad,
Sorry for my long silence: I was away for work (without my infected computer, of course...!)
OK, now I just tried your latest instructions and ran rku37300509.exe as administrator.
However, it immediately gives an "Error loading driver, NTSTATUS code: C0000001" and nothing else: no windows of any kind.
I searched "rku + ntstatus" on Google but could not find helpful advices, sorry.
What would you suggest now ?
THANK YOU.
Paul
-
Dear Rene-gad,
Would you have a new suggestion for fighting that nasty rootkit ?
It would be a shame to let him definitely win against us...
With hope and thanks,
Cordially yours,
Paul
-
[QUOTE=np2c;597479]
It would be a shame to let him definitely win against us...
[/QUOTE]It's a wrong position: for your security it's be better, just from the very beginnig to make a format c:\. Pls. read here: [url]http://technet.microsoft.com/de-de/library/cc512587%28en-us%29.aspx[/url]
-
Dear Rene-gad,
OK, if there are no other choice then reformatting and re-installing everything, that's what I'll do...:(
However, as you are a specialist, would you perhaps have some recommendation (or links to recommended web pages or sites) for:
- being sure not to have the virus hided into the special partition with the original windows install, nor into my files backups ?
- how to be better protected in the future, ideally with [B]free[/B]ware programs (anti-virus, anti-rootkit, firewall, anti-USB-autoruns, etc ?)
- do you think that a UTM (Unified threat management) unit at the incoming adsl line would be recommended and efficient ? (Like the [URL="http://prosecure.netgear.com/products/prosecure-utm-series.php"]Netgear Prosecure UTM 5[/URL], etc)
Thank you,
Paul
-
[QUOTE=np2c;599352]
- being sure not to have the virus hided into the special partition with the original windows install, nor into my files backups ?[/QUOTE]We have to make a difference between file infectors, which can be hidden in file array and rootkits, which have to been installed and integrated in the active system. After removing/creating of system partition, formating it and installing of OS and all actuall service packs the has rootkit no chance to be installed. File infector will be dangerous further, if you call the infected file.
[QUOTE]- how to be better protected in the future, ideally with [B]free[/B]ware programs (anti-virus, anti-rootkit, firewall, anti-USB-autoruns, etc ?)[/QUOTE]The best solution was, is and will be BRAIN.exe - always think before make :). One antivirus program is recommended.
[QUOTE=np2c;599352]- do you think that a UTM (Unified threat management) unit at the incoming adsl line would be recommended and efficient ?[/QUOTE]It would be nice, if you test it and write a small report here :) I've no idea, if this thing is really effective and good.
-
Итог лечения
Статистика проведенного лечения:
[LIST][*]Получено карантинов: [B]3[/B][*]Обработано файлов: [B]13[/B][*]В ходе лечения вредоносные программы в карантинах не обнаружены[/LIST]
Page generated in 0.00421 seconds with 10 queries