Here are some log excerpts:
aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Service scanning
Service PČ• C:\WINDOWS\SYSTEM32\Drivers\PČ•.sys LOCKED 123
Service Püž C:\WINDOWS\SYSTEM32\Drivers\Püž.sys LOCKED 123
Service sptd C:\WINDOWS\System32\Drivers\sptd.sys LOCKED 32
Service Rzdz C:\WINDOWS\SYSTEM32\Drivers\Ŕżđż.sys HIDDEN
Service ĐŢ™ C:\WINDOWS\SYSTEM32\Drivers\ĐŢ™.sys LOCKED 123
Modules scanning
Disk 0 trace - called modules:
ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll iaStor.sys spuu.sys >>UNKNOWN [0x8b010938]<<
1 nt!IofCallDriver → \Device\Harddisk0\DR0[0x8afc0ab8]
3 CLASSPNP.SYS[f74e7fd7] → nt!IofCallDriver → \Device\000000bb[0x8afa7a28]
5 ACPI.sys[f7253620] → nt!IofCallDriver → \Device\Ide\IAAStorageDevice-0[0x8afa2030]
Scan finished successfully
Combofix:
S2 aOË;SyGate for NT, aOË;c:\windows\system32\Drivers\aOË.sys → c:\windows\system32\Drivers\aOË.sys [?]
S2 €ÚË;SyGate for NT, €ÚË;c:\windows\system32\Drivers\€ÚË.sys → c:\windows\system32\Drivers\€ÚË.sys [?]
S2 ?$Ë;SyGate for NT, ?$Ë;c:\windows\system32\Drivers?$Ë.sys → c:\windows\system32\Drivers?$Ë.sys [?]
S2 ¨$Ë;SyGate for NT, ¨$Ë;c:\windows\system32\Drivers\¨$Ë.sys → c:\windows\system32\Drivers\¨$Ë.sys [?]
S2 oOË;SyGate for NT, oOË;c:\windows\system32\Drivers\oOË.sys → c:\windows\system32\Drivers\oOË.sys [?]
S2 Püž;SyGate for NT, Püž;c:\windows\system32\Drivers\Püž.sys → c:\windows\system32\Drivers\Püž.sys [?]
Other Drivers in Memory
NewlyCreated - WG6N
Deregistered - wg3n
Deregistered - wg4n
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Cpqset = c:\program files\HPQ\Default Settings\cpqset.exe??? ???@???@? ???_???(?@???@
hidden files: 0
Blocked Registry Keys
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\¬ ÚË]
“Type”=dword:00000001
“Start”=dword:00000002
“ErrorControl”=dword:00000001
“ImagePath”=expand:“\SystemRoot\SYSTEM32\Drivers\€ÚË.sys”
“DisplayName”=“SyGate for NT, €ÚË”
“Group”=“TDI”
“DependOnService”=multi:“NDIS\00\00”
“DependOnGroup”=multi:“\00”
.
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\¬ ÚË\Security]
“Security”=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,
00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,
.
Current=1 Default=1 Failed=4 LastKnownGood=3 Sets=1,2,3,4
16:34:51.0484 5128 TDSS rootkit removing tool 2.6.12.0 Oct 21 2011 11:23:48
Everything OK
GMER 1.0.15.15641 - http://www.gmer.net
Running: k5xi4qy3.exe; Driver: C:\DOCUME~1.…\LOCALS~1\Temp\fxtdrpow.sys
SSDT ??\C:\WINDOWS\system32\drivers\wpsdrvnt.sys (wpsdrvnt/Sygate Technologies, Inc.) ZwCreateThread [0x9A7C06F0]
SSDT ??\C:\WINDOWS\system32\drivers\wpsdrvnt.sys (wpsdrvnt/Sygate Technologies, Inc.) ZwMapViewOfSection [0x9A7C0470]
---- Services - GMER 1.0.15 ----
Service SYSTEM32\Drivers????.sys (*** hidden *** ) [DISABLED] Rzdz ← ROOTKIT !!!
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@Type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@Start 4
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@ErrorControl 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@ImagePath \SystemRoot\SYSTEM32\Drivers????.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@DisplayName SyGate for NT, ???
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@Group TDI
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@DependOnService NDIS?
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz@DependOnGroup
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz\Security
Reg HKLM\SYSTEM\CurrentControlSet\Services\Rzdz\Security@Security 0x01 0x00 0x14 0x80 …
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@Type 1
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@Start 4
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@ErrorControl 1
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@ImagePath \SystemRoot\SYSTEM32\Drivers????.sys
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@DisplayName SyGate for NT, ???
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@Group TDI
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@DependOnService NDIS?
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz@DependOnGroup
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz\Security (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\Rzdz\Security@Security 0x01 0x00 0x14 0x80 …
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@Type 1
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@Start 2
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@ErrorControl 1
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@ImagePath \SystemRoot\SYSTEM32\Drivers????.sys
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@DisplayName SyGate for NT, ???
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@Group TDI
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@DependOnService NDIS?
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz@DependOnGroup
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz\Security (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet004\Services\Rzdz\Security@Security 0x01 0x00 0x14 0x80 …
OTL Extras logfile created on: 10/24/2011 10:01:42 PM - Run 1
========== Last 10 Event Log Errors ==========
Error reading Event Logs: The Event Service is not operating properly or the Event Logs are corrupt!
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\T\21|\5\21|\5]
“Type”=dword:00000001
“Start”=dword:00000004
“ErrorControl”=dword:00000001
“ImagePath”=str(2):“\SystemRoot\SYSTEM32\Drivers\Ŕ\21\xbf\5đ\21\xbf\5.sys”
“DisplayName”=“SyGate for NT, Ŕ\21\xbf\5đ\21\xbf\5”
“Group”=“TDI”
“DependOnService”=str(7):“NDIS\0”
“DependOnGroup”=str(7):“”
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\T\21|\5\21|\5\Security]
“Security”=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
“p0”="C:\Program Files\DAEMON Tools Lite"
“u0”=hex:00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,…
“h0”=dword:00000000
“hdf12”=hex:b3,86,e9,a5,64,24,c2,17,67,37,e3,eb,00,1c,09,d5,f2,22,bc,a5,af,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0]
“hdf12”=hex:c7,85,3c,52,7e,f0,24,8d,0c,c8,c1,b2,5b,79,dd,20,ed,d1,d2,f9,8e,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\T\21|\5\21|\5]
“Type”=dword:00000001
“Start”=dword:00000004
“ErrorControl”=dword:00000001
“ImagePath”=str(2):“\SystemRoot\SYSTEM32\Drivers\Ŕ\21\xbf\5đ\21\xbf\5.sys”
“DisplayName”=“SyGate for NT, Ŕ\21\xbf\5đ\21\xbf\5”
“Group”=“TDI”
“DependOnService”=str(7):“NDIS\0”
“DependOnGroup”=str(7):“”
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\T\21|\5\21|\5\Security]
“Security”=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
“p0”="C:\Program Files\DAEMON Tools Lite"
“u0”=hex:00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,…
“h0”=dword:00000000
“hdf12”=hex:b3,86,e9,a5,64,24,c2,17,67,37,e3,eb,00,1c,09,d5,f2,22,bc,a5,af,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0]
“hdf12”=hex:c7,85,3c,52,7e,f0,24,8d,0c,c8,c1,b2,5b,79,dd,20,ed,d1,d2,f9,8e,…
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\T\21|\5\21|\5]
“Type”=dword:00000001
“Start”=dword:00000002
“ErrorControl”=dword:00000001
“ImagePath”=str(2):“\SystemRoot\SYSTEM32\Drivers\Ŕ\21\xbf\5đ\21\xbf\5.sys”
“DisplayName”=“SyGate for NT, Ŕ\21\xbf\5đ\21\xbf\5”
“Group”=“TDI”
“DependOnService”=str(7):“NDIS\0”
“DependOnGroup”=str(7):“”
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet004\Services\T\21|\5\21|\5\Security]
“Security”=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,…
scan completed successfully
hidden processes: 0
hidden services: 1
hidden files: 0