CryVICSky

CLOSED C:\Windows\system32\wbiosrvp.dll --- Trojan.GenericKD.4561291 (B) [krnl.xmd]

Recommended Posts

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

HKU\S-1-5-21-4253043346-147581255-1932667179-1001\...\Policies\Explorer: [NoLowDiskSpaceChecks] 1
HKU\S-1-5-21-4253043346-147581255-1932667179-1001\...\MountPoints2: {ec54938a-5810-11e6-981a-001f3c7a99de} - "H:\Install MegaFon Internet.exe" 
HKU\S-1-5-21-4253043346-147581255-1932667179-1001\...\MountPoints2: {ec54956b-5810-11e6-981a-001f3c7a99de} - "H:\Install MegaFon Internet.exe" 
ShellIconOverlayIdentifiers: [00avast] -> {472083B0-C522-11CF-8763-00608CC02F24} =>  -> No File
GroupPolicy: Restriction ? <======= ATTENTION
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
SearchScopes: HKLM -> DefaultScope value is missing
Toolbar: HKU\S-1-5-21-4253043346-147581255-1932667179-1001 -> No Name - {093F479D-712E-46CD-9E06-62E734A05F68} -  No File
FF user.js: detected! => C:\Users\Иван\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\user.js [2016-05-20]
FF DefaultSearchEngine: Mozilla\Firefox\Profiles\nahd6ha2.default -> Яндекс
FF SelectedSearchEngine: Mozilla\Firefox\Profiles\nahd6ha2.default -> Яндекс
R2 themctrl; C:\Windows\System32\themctrl.dll [663040 2014-03-20] () [File not signed]
S2 wbiosrvp; C:\Windows\System32\wbiosrvp.dll [290304 2014-03-20] () [File not signed]
R1 uze3mjk3; C:\Windows\system32\Drivers\uze3mjk3.sys [11264 2017-05-16] () [File not signed]
2014-11-25 17:01 - 2017-03-27 19:24 - 0007637 _____ () C:\Users\Иван\AppData\Local\resmon.resmoncfg
2016-06-19 20:18 - 2016-06-19 20:18 - 0000077 _____ () C:\Users\Иван\AppData\Local\smplayerhdpi.ini
2016-05-16 11:13 - 2016-05-16 11:13 - 0000000 ____H () C:\ProgramData\DP45977C.lfl
2014-10-25 12:47 - 2015-05-02 20:32 - 0000261 _____ () C:\ProgramData\fontcacheev1.dat
2016-05-17 23:39 - 2016-05-17 23:39 - 0000016 _____ () C:\ProgramData\mntemp
2016-05-17 23:39 - 2016-05-17 23:39 - 0004927 _____ () C:\ProgramData\mtbjfghn.xbe
C:\ProgramData\fontcacheev1.dat
C:\Users\Все пользователи\fontcacheev1.dat
C:\Windows\Tasks\{3E184383-EEF9-4767-BF14-614D1C634BCE}.job
HKU\S-1-5-21-4253043346-147581255-1932667179-1001\...\ChromeHTML: -> C:\Program Files\Chrome\chrome.exe (Google Inc.) <==== ATTENTION
CustomCLSID: HKU\S-1-5-21-4253043346-147581255-1932667179-1001_Classes\CLSID\{E36606FE-036A-4dd0-ABA9-A58F409803F0}\InprocServer32 -> no filepath
Task: C:\Windows\Tasks\{3E184383-EEF9-4767-BF14-614D1C634BCE}.job => c:\program files\opera next\launcher.exe Bhxxp:/ui.skype.com
AlternateDataStreams: C:\Windows\system32\crypt32.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\DeviceSetupStatusProvider.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\dxtrans.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\kerberos.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\MrmCoreR.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\mshtmled.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\pku2u.dll:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\poqexec.exe:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\Drivers\browserMon.sys:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\Drivers\dumpsd.sys:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\Drivers\intelpep.sys:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\Drivers\pdc.sys:$CmdTcID [64]
AlternateDataStreams: C:\Windows\system32\Drivers\sdbus.sys:$CmdTcID [64]
AlternateDataStreams: C:\ProgramData\TEMP:41ADDB8A [152]
AlternateDataStreams: C:\ProgramData\TEMP:A064CECC [144]
AlternateDataStreams: C:\Users\Все пользователи\TEMP:41ADDB8A [152]
AlternateDataStreams: C:\Users\Все пользователи\TEMP:A064CECC [144]
C:\Users\Иван\Downloads\Электронные Книги\Программирование\Занимальные уроки с Паскалем\Projects\ProjectsPAS\Транслитерация\транслитерация.exe
C:\Users\Иван\Downloads\Электронные Книги\Программирование\Занимальные уроки с Паскалем\Projects\ProjectsPAS\Элементы управления\WFControls.exe
C:\Windows\system32\wbiosrvp.dll

Close Notepad.

NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

  • Upvote 1

Share this post


Link to post
Share on other sites
...
R1 uze3mjk3; C:\Windows\system32\Drivers\uze3mjk3.sys [11264 2017-05-16] () [File not signed]
...
C:\Users\Иван\Downloads\Электронные Книги\Программирование\Занимальные уроки с Паскалем\Projects\ProjectsPAS\Транслитерация\транслитерация.exe
C:\Users\Иван\Downloads\Электронные Книги\Программирование\Занимальные уроки с Паскалем\Projects\ProjectsPAS\Элементы управления\WFControls.exe
...

The driver uze3mjk3.sys* (may have a different name) is well known to me. It was created by the AVZ utility (http://www.z-oleg.com/secur/avz/, https://forum.kaspersky.com/index.php?showforum=150) from Kaspersky Lab.

* Process and driver monitoring driver AVZPM. It is intended for tracking start and stop processes and loading / unloading drivers for searching masking drivers and detecting distortions in the structures describing processes and drivers created by DKOM rootkits.

Executables: транслитерация.ехе and WFControls.exe; Can not be dangerous, as they are written and compiled for educational purposes in the learning environment of programming - PascalABC.NET (http://pascalabc.net/).

Fixlog.txt

Share this post


Link to post
Share on other sites

The script removed malicious items, corrected orphaned/broken settings, and deleted several Alternate Data Streams.

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

Be sure to let me know how things are running.

  • Upvote 1

Share this post


Link to post
Share on other sites

Your FRST logs show that wbiosrvp.dll is no longer present. However, your EEK scan log shows another DLL present that we need to remove.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

C:\Windows\system32\biosysrt.dll

Close Notepad.

NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

  • Upvote 1

Share this post


Link to post
Share on other sites
10 hours ago, Kevin Zoll said:

Your FRST logs show that wbiosrvp.dll is no longer present.

You want to say that this operating system restores dynamic libraries, which are its critical elements from the backup storage, if they are accidentally or intentionally deleted by someone or something? Or did I misunderstand?

Fixlog.txt

Share this post


Link to post
Share on other sites

Is there real-time interaction with the developer of the Farbar Recovery Scan Tool utility as experience is gained and for making changes and / or improvements?

Share this post


Link to post
Share on other sites

We are able to pass suggestions and bugs to the developer of FRST.

Yes, Windows is capable of restoring system critical files.  However, that is somewhat limited.  Not every driver, library or executable is considered critical and will not be backed up in the Windows File Store.

Let's take a fresh look.

Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply.

  • Upvote 1

Share this post


Link to post
Share on other sites
15 hours ago, Kevin Zoll said:

We are able to pass suggestions and bugs to the developer of FRST.

Does the Farbar Recovery Scan Tool (FRST) have a change log?

On 23.05.2017 at 01:18, Kevin Zoll said:

The script removed malicious items, corrected orphaned/broken settings, and deleted several Alternate Data Streams.

How can I work with alternative data streams in the future? What kind of danger can they carry? Do I need to immediately delete all found elements of alternative data streams? That is, to perform the same actions as you did in this case?

Addition.txt

FRST.txt

scan_170525-131425.txt

Share this post


Link to post
Share on other sites
15 hours ago, Kevin Zoll said:

We are able to pass suggestions and bugs to the developer of FRST.

In this case, I would like to ask you to recommend to the developer of Farbar Recovery Scan Tool to allocate separate blocks of information for suspicious and / or infected objects in the scan logs.

For example:

==================== Processes (Suspicious) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

Item 1
Item 2
Item 3
etc...

==================== Processes (Infected) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

Item 1
Item 2
Item 3
etc...

 

Share this post


Link to post
Share on other sites

Yes, Farbar, does publish changes made to FRST, but that is not publicly accessible.

I Can forward that suggestion to Farbar.

ADS themselves are not malicious but can be used to perform malicious functions. A couple of articles on ADS:

https://blogs.technet.microsoft.com/askcore/2013/03/24/alternate-data-streams-in-ntfs/

https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/

Your logs look fine.

How are things running?

  • Upvote 1

Share this post


Link to post
Share on other sites
15 hours ago, Kevin Zoll said:

I Can forward that suggestion to Farbar.

Yes, pass on this suggestion, please. In the current lists it is difficult to find those points on which it is necessary to pay close attention.

In which section of the forum can I discuss with the experts logs Farbar Recovery Scan Tool? I may have questions on some elements of these logs to understand the functions and actions of this utility.

15 hours ago, Kevin Zoll said:

Your logs look fine.

How are things running?

I think it's worth closing this thread of discussion. All problems are solved at the current stage. If there are new problems, then I will come back and open a new thread of discussions in this forum.

Thank you for your help!

Share this post


Link to post
Share on other sites

The FRST Tutorial is publicly accessible at http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

The public FRST discussion forum is at  http://www.geekstogo.com/forum/topic/335083-frst-tutorial-comment/

Unless you are having problems, it is time to do the final steps.

Now to remove most of the tools that we have used in fixing your machine:

Download Delfix from here and save it to your desktop.

  • Ensure Remove disinfection tools is checked.
  • Also place a checkmark next to:
    • Create registry backup
    • Purge system restore

  • Click the Run button.


When the tool is finished, a log will open in notepad. I do not need the log.  You can close Notepad.

Empty the Recycle Bin

Download to your Desktop:
- CCleaner Portable

  • UnZip CCleaner Portable to a folder on your Desktop named CCleaner


Run CCleaner

  • Open the CCleaner Folder on your Desktop and double-click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit)
  • Click "Options" and choose "Advanced"
  • Uncheck "Only delete files in Windows Temp folders older than 24 hours"
  • Then go back to "Cleaner" and click the "RunCleaner" button.
  • Exit CCleaner.


You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

To Remove EEK simple delete the EEK for in the of your System Drive, normally C:\EEK

Run Windows Update and update your Windows Operating System.

Articles to Read:
How to Protect Your Computer From Malware
How to keep you and your Windows PC happy
Web, email, chat, password and kids safety
How Did I Get Infected?

That should take care of everything.

Safe Surfing!

  • Upvote 1

Share this post


Link to post
Share on other sites

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only.  Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair.  Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread.

  • Upvote 1

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.