ZeroAccess Issue. MGlogs and MBAM attached

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by wisem2540, Jul 19, 2012.

  1. wisem2540

    wisem2540 Private E-2

    So Im not sure if malware has gotten harder to remove, or if my methods are outdated. :)

    There was a time when MBAM and combofix seemed to remove almost everything (seemlingly i guess)

    Now I look through these forums, and I see people being directed to use text files with combofix? Is this a newer thing or have I always used it the wrong way?

    Anyway, normally I have always been able to clean my own machines. This is the first time ive enlisted help. I have attached MGtools logs... (again something ive never used) and MBAM logs

    any help would be great
     

    Attached Files:

  2. wisem2540

    wisem2540 Private E-2

    MBAM still continues to produce an infection. Should I be including other logs?

    thanks
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  4. wisem2540

    wisem2540 Private E-2

    All logs attached.

    Thanks for the response
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Files/folders tab and locate these detections:
    • [ZeroAccess][FILE] @ : c:\windows\installer\{6f2ab251-93bd-2598-4215-32a905b204be}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : c:\windows\installer\{6f2ab251-93bd-2598-4215-32a905b204be}\U --> FOUND
    • [ZeroAccess][FOLDER] L : c:\windows\installer\{6f2ab251-93bd-2598-4215-32a905b204be}\L --> FOUND
    • [ZeroAccess][FILE] @ : c:\users\owner\appdata\local\{6f2ab251-93bd-2598-4215-32a905b204be}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : c:\users\owner\appdata\local\{6f2ab251-93bd-2598-4215-32a905b204be}\U --> FOUND
    • [ZeroAccess][FOLDER] L : c:\users\owner\appdata\local\{6f2ab251-93bd-2598-4215-32a905b204be}\L --> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.


    [​IMG] For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  6. wisem2540

    wisem2540 Private E-2

    Hello again,

    I wasnt sure which file it was, so I attached both.


    Also, I should have mentioned, I am doing this remotely, so the second step you asked for is not possible at this time. Its possible I MAY be able to get the owner to do this step, but ya know....
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes I will need the FRST step to be completed.
     
  8. wisem2540

    wisem2540 Private E-2

    I do not have an ability to do that right now. What does this scan accomplish? Can you move past it for now and come back?
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The FRST will be very useful for letting me know of possible infected system files. Otherwise, I may not know at all. There are other tools we could run but FRST is safer. It's up to you, you want it fixed, ay? :)
     
  10. wisem2540

    wisem2540 Private E-2


    well that was a fun adventure....

    here ya go....
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Run RogueKiller again, not to fix anything, I just want to see what it still finds. Attach the log. FRST shows that the services.exe file is not infected, which is good. :)
     
  12. wisem2540

    wisem2540 Private E-2

    When I initially had this issue, before asking for help, services.exe WAS infected and I used SFC to replace it with a good copy. I will have a log for you soon

    sfc /scanfile=c:\windows\system32\services.exe worked like a charm :)
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ah I see. Okay. Attach the log whenever you are ready. I'll be floating about somewhere I just need to go make a cup of tea!
     
  14. wisem2540

    wisem2540 Private E-2

    Log...

    Looks clean to me :)
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Indeed. Everything running as it should at this point? :)
     
  16. wisem2540

    wisem2540 Private E-2

    Yeah, things were definitely on the right track after I replaced the service.exe file. MBAM kept coming back with one infection, but Rougekiller seems to have taken care of that nicely. All in all, I would have to say I think its good.

    Is there anything else youd like to look at before we call it fixed?
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Not particularly, no. :) I have thoroughly examined all of the logs you have provided and everything does look great now.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  18. wisem2540

    wisem2540 Private E-2

    thank you. Close it up when you are ready
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're most welcome. No need to lock the thread per se, but it is closed now because you've been given final steps.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds