Hi, I’ve gotten this virus on my laptop and have followed a post on here up until running and saving ‘Gmer’. The posts says the next step is written specifically for the individuals problem and if I were to use the example there I might do more damage so I’ve attached the Gmer log reports on here and it would be absolutely fantastic if someone could save me… it’s shortcutted my uni assessment due today SOS.
(I’ve actually copied and pasted it because I’ve lost the plot and I can’t figure out how to attach)
GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2014-07-30 09:24:08
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 → \Device\00000027 Windows_8.1-0 rev.F.MBKD2M 64.00GB
Running: b2l1nz5g.exe; Driver: C:\Users\GEORGI~1\AppData\Local\Temp\agtcykod.sys
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\svchost.exe[868] C:\Windows\SYSTEM32\sechost.dll!CredProfileLoadedEx 00007ff896934d58 8 bytes {JMP QWORD [RIP-0x14cb6]}
.text C:\Windows\system32\svchost.exe[868] C:\Windows\SYSTEM32\sechost.dll!CredProfileLoaded 00007ff896973d50 7 bytes {JMP QWORD [RIP-0x53cee]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!EndPaint 00007ff896ed1070 8 bytes {JMP QWORD [RIP-0x10fce]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!SetLayeredWindowAttributes 00007ff896ed1dd0 8 bytes {JMP QWORD [RIP-0x11cee]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!ReleaseDC + 1 00007ff896ed5051 5 bytes {JMP QWORD [RIP-0x14fee]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!SetProcessDPIAware + 1 00007ff896ed8321 5 bytes {JMP QWORD [RIP-0x1817e]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!UpdateLayeredWindow 00007ff896f0c390 7 bytes {JMP QWORD [RIP-0x4c26e]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1568] C:\Windows\system32\USER32.dll!UpdateLayeredWindowIndirect 00007ff896f0c54c 7 bytes {JMP QWORD [RIP-0x4c3ea]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!EndPaint 00007ff896ed1070 8 bytes {JMP QWORD [RIP-0x10fce]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!SetLayeredWindowAttributes 00007ff896ed1dd0 8 bytes {JMP QWORD [RIP-0x11cee]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!ReleaseDC + 1 00007ff896ed5051 5 bytes {JMP QWORD [RIP-0x14fee]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!SetProcessDPIAware + 1 00007ff896ed8321 5 bytes {JMP QWORD [RIP-0x1817e]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!UpdateLayeredWindow 00007ff896f0c390 7 bytes {JMP QWORD [RIP-0x4c26e]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\USER32.dll!UpdateLayeredWindowIndirect 00007ff896f0c54c 7 bytes {JMP QWORD [RIP-0x4c3ea]}
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 506 00007ff898f5169a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 514 00007ff898f516a2 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\psapi.dll!QueryWorkingSet + 118 00007ff898f5181a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\coherence.exe[1584] C:\Windows\system32\psapi.dll!QueryWorkingSet + 142 00007ff898f51832 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\prl_tools.exe[1704] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ff898f5169a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\prl_tools.exe[1704] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ff898f516a2 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\prl_tools.exe[1704] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ff898f5181a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\Services\prl_tools.exe[1704] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ff898f51832 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[1864] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 506 00007ff898f5169a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[1864] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 514 00007ff898f516a2 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[1864] C:\Windows\system32\psapi.dll!QueryWorkingSet + 118 00007ff898f5181a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[1864] C:\Windows\system32\psapi.dll!QueryWorkingSet + 142 00007ff898f51832 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\prl_cc.exe[2792] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ff898f5169a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\prl_cc.exe[2792] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ff898f516a2 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\prl_cc.exe[2792] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ff898f5181a 4 bytes [F5, 98, F8, 7F]
.text C:\Program Files (x86)\Parallels\Parallels Tools\prl_cc.exe[2792] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ff898f51832 4 bytes [F5, 98, F8, 7F]
---- Threads - GMER 2.1 ----
Thread C:\Windows\system32\csrss.exe [468:484] fffff960009ba4d0
Thread C:\Windows\system32\svchost.exe [868:4072] 00007ff88f2d5340
Thread C:\Windows\system32\svchost.exe [868:1536] 00007ff88c1511b0
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\Control\CMF\SqmData@SystemStartTime 0xEA 0xB4 0xAB 0xF9 …
Reg HKLM\SYSTEM\CurrentControlSet\Control\CMF\SqmData@SystemLastStartTime 0x2E 0xC2 0x8E 0x6A …
Reg HKLM\SYSTEM\CurrentControlSet\Control\CMF\SqmData@CMFStartTime 0x14 0xDB 0xB2 0xF9 …
Reg HKLM\SYSTEM\CurrentControlSet\Control\CMF\SqmData@CMFLastStartTime 0x44 0x84 0x93 0x6A …
Reg HKLM\SYSTEM\CurrentControlSet\Control\CMF\SqmData\BootLanguages@en-GB 13
Reg HKLM\SYSTEM\CurrentControlSet\Control\GraphicsDrivers\Configuration\PRL50005001_06_07DD_D5^D6D4B164413B615CA87D2A9B2B5139BA@Timestamp 0xFC 0xAF 0x26 0xFA …
Reg HKLM\SYSTEM\CurrentControlSet\Control\Lsa@LsaPid 660
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager@PendingFileRenameOperations ??\C:\ProgramData\DataMngr\stats.cfg???
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Executive@UuidSequenceNumber 3899992
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel\RNG@RNGAuxiliarySeed 1074162472
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters@BootId 15
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters@BaseTime 418293807
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power@POSTTime 374
Reg HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server@InstanceID 483894fa-1124-4204-bb4b-8f33a01
Reg HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\WdiContextLog@FileCounter 3
Reg HKLM\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters\Probe{895f2804-d27a-4939-990c-05d88d44f8b9}@LastProbeTime 1406676109
Reg HKLM\SYSTEM\CurrentControlSet\Services\rdyboost\Parameters@LastBootPlanUserTime ?Tue?, ?Jul ?29 ?14, 11:23:15 PM???
Reg HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch@Epoch 374
Reg HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch2@Epoch 120
Reg HKLM\SYSTEM\CurrentControlSet\Services\srvnet\Parameters@MajorSequence 14
Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{2CF9D29D-60DB-4D15-8971-2D0616D38DE8}@LeaseObtainedTime 1406674956
Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{2CF9D29D-60DB-4D15-8971-2D0616D38DE8}@T1 1406675856
Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{2CF9D29D-60DB-4D15-8971-2D0616D38DE8}@T2 1406676531
Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces{2CF9D29D-60DB-4D15-8971-2D0616D38DE8}@LeaseTerminatesTime 1406676756
Reg HKLM\SYSTEM\CurrentControlSet\Services\Winmgmt\Parameters@ServiceDllUnloadOnStop 0
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shutdown@CleanShutdown 1
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce@Report C:\AdwCleaner\AdwCleaner[S0].txt
---- EOF - GMER 2.1 ----