GAC_32/GAC_64 desktop.ini help

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by thepspgamer, May 17, 2012.

  1. thepspgamer

    thepspgamer Private E-2

    hey

    recently, i have been having firefix redirect me to numerous sites, and opening tabs of its own accord, i ran a few virus scanners (AVG and Malwarebytes) to see if i could combat the issue, it found a few bits, and they removed ok, but the problem persisted.

    Then, when i booted my computer after coming home from work, AVG seems to have picked up these 2 files GAC_32 and GAC_64\Desktop.ini

    from what i have researched, these 2 files are the cause of firefox redirecting me, and thus, would please ask for your help in the removal of these damned files

    i have run Gooredfix as in the removal sticky thread here and attached the log on this post

    thanks already, and i hope to get back to normal ASAP

    many thanks :)
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Alot to get through: Follow these instructions first:

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.


    Now continue on with the below!!


    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. thepspgamer

    thepspgamer Private E-2

    ran the TDSSkiller, here is the log :)
     

    Attached Files:

  4. thepspgamer

    thepspgamer Private E-2

    sorry for the double post :S here is the log from the MBRcheck program too
     

    Attached Files:

  5. thepspgamer

    thepspgamer Private E-2

    any help please?
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  7. thepspgamer

    thepspgamer Private E-2

    followed as per in that link, here are my log files

    combofix wouldnt run, seemed to extract and then do nothing, not sure what was wrong, also didnt run RootRepeal as i am running 64bit windows

    logs for superantivirus, malwarebytes and MGTools

    many thanks again
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    
    :files
    C:\Users\Daz\AppData\Local\Temp\Own3dAddin.zip
    C:\Users\Daz\AppData\Local\Temp\Pangya_downloader.exe.log
    C:\Users\Daz\AppData\Local\Temp\pdo7CDF.tmp
    C:\Users\Daz\AppData\Local\Temp\is2968.tmp
    C:\Users\Daz\AppData\Local\Temp\is5097.tmp
    C:\Users\Daz\AppData\Local\Temp\is5890.tmp
    C:\Users\Daz\AppData\Local\Temp\is7A3F.tmp
    C:\Users\Daz\AppData\Local\Temp\isAEE5.tmp
    C:\Users\Daz\AppData\Local\Temp\isD196.tmp
    C:\Users\Daz\AppData\Local\Temp\i4j1638074143434027868.tmp
    C:\Users\Daz\AppData\Local\Temp\i4j8020566933414302007.tmp
    C:\Users\Daz\AppData\Local\Temp\i4j957996191143275039.tmp
    C:\Users\Daz\AppData\Local\Temp\E8D7.tmp
    C:\Users\Daz\AppData\Local\Temp\F65F.tmp
    C:\Users\Daz\AppData\Local\Temp\FB5E.tmp
    C:\Users\Daz\AppData\Local\Temp\flaC6B0.tmp
    C:\Users\Daz\AppData\Local\Temp\E510.tmp
    C:\Users\Daz\AppData\Local\Temp\E7CE.tmp
    C:\Users\Daz\AppData\Local\Temp\DMI67AC.tmp
    C:\Users\Daz\AppData\Local\Temp\DMIBA79.tmp
    C:\Users\Daz\AppData\Local\Temp\DMIDC8B.tmp
    C:\Users\Daz\AppData\Local\Temp\CFG3FE0.tmp
    C:\Users\Daz\AppData\Local\Temp\D161.tmp
    C:\Users\Daz\AppData\Local\Temp\8fc9be52d88fd0e65c237045e5cf63ab.lock
    C:\Users\Daz\AppData\Local\Temp\A227.tmp
    C:\Users\Daz\AppData\Local\Temp\7F8B.tmp
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Users\Daz\AppData\Roaming\Diysz.txt
    C:\Users\Daz\AppData\Roaming\Ogwon.txt
    C:\Users\Daz\AppData\Roaming\YBlHX.txt
    C:\Users\Daz\AppData\Local\Temp\33970514581710394.tmp
    C:\Users\Daz\AppData\Local\Temp\33970514582974689.tmp
    C:\Users\Daz\AppData\Local\Temp\3397051458932168.tmp
    C:\Users\Daz\AppData\Local\Temp\35906606021710348.tmp
    C:\Users\Daz\AppData\Local\Temp\35906606022974689.tmp
    C:\Users\Daz\AppData\Local\Temp\41530318191717992.tmp
    C:\Users\Daz\AppData\Local\Temp\41530318192978667.tmp
    C:\Users\Daz\AppData\Local\Temp\4153031819936817.tmp
    C:\Users\Daz\AppData\Local\Temp\4153031819963103.tmp
    C:\Users\Daz\AppData\Local\Temp\5F8.tmp
    C:\Users\Daz\AppData\Local\Temp\737A.tmp
    C:\Users\Daz\AppData\Local\Temp\778255.htm
    C:\Users\Daz\AppData\Local\Temp\778255.mht
    C:\Users\Daz\AppData\Local\Temp\10384292911720207.tmp
    C:\Users\Daz\AppData\Local\Temp\10384292912984673.tmp
    C:\Users\Daz\AppData\Local\Temp\15116100991710738.tmp
    C:\Users\Daz\AppData\Local\Temp\15116100992974689.tmp
    C:\Users\Daz\AppData\Local\Temp\15116100992974985.tmp
    C:\Users\Daz\AppData\Local\Temp\1511610099932527.tmp
    C:\Users\Daz\AppData\Local\Temp\1511610099958423.tmp
    C:\Users\Daz\AppData\Local\Temp\1682576111710394.tmp
    C:\Users\Daz\AppData\Local\Temp\1682576112978215.tmp
    C:\Users\Daz\AppData\Local\Temp\A7B3.tmp
    C:\Users\Daz\AppData\Local\Temp\BBC6.tmp
    C:\Users\Daz\AppData\Local\Temp\BE8.tmp
    C:\Windows\3F5C371F8EA24F259D3DD0B4526E3AEA.TMP
    C:\Users\Daz\AppData\Local\Temp\2090.tmp
    C:\Users\Daz\AppData\Local\Temp\9513.tmp
    C:\Users\Daz\AppData\Local\Temp\778255_files
    C:\Users\Daz\AppData\Local\Temp\29CD.tmp
    C:\Users\Daz\AppData\Local\Temp\A5B6.tmp
    C:\Users\Daz\AppData\Local\Temp\e4j1C4.tmp_dir29133
    C:\Users\Daz\AppData\Local\Temp\e4j2A0C.tmp_dir30485
    C:\Users\Daz\AppData\Local\Temp\e4j2D33.tmp_dir21365
    C:\Users\Daz\AppData\Local\Temp\e4j35B2.tmp_dir22270
    C:\Users\Daz\AppData\Local\Temp\e4j39B5.tmp_dir9563
    C:\Users\Daz\AppData\Local\Temp\e4j3A03.tmp_dir28150
    C:\Users\Daz\AppData\Local\Temp\e4j3C63.tmp_dir17873
    C:\Users\Daz\AppData\Local\Temp\e4j4422.tmp_dir19999
    C:\Users\Daz\AppData\Local\Temp\e4j4691.tmp_dir28506
    C:\Users\Daz\AppData\Local\Temp\e4j46C0.tmp_dir9149
    C:\Users\Daz\AppData\Local\Temp\e4j4B24.tmp_dir28799
    C:\Users\Daz\AppData\Local\Temp\e4j5552.tmp_dir5044
    C:\Users\Daz\AppData\Local\Temp\e4j5953.tmp_dir15010
    C:\Users\Daz\AppData\Local\Temp\e4j59A4.tmp_dir29702
    C:\Users\Daz\AppData\Local\Temp\e4j6882.tmp_dir5431
    C:\Users\Daz\AppData\Local\Temp\e4j6D34.tmp_dir11228
    C:\Users\Daz\AppData\Local\Temp\e4j8DF2.tmp_dir16044
    C:\Users\Daz\AppData\Local\Temp\e4j96F1.tmp_dir12836
    C:\Users\Daz\AppData\Local\Temp\e4j977E.tmp_dir14043
    C:\Users\Daz\AppData\Local\Temp\e4j9A31.tmp_dir18819
    C:\Users\Daz\AppData\Local\Temp\e4j9A6D.tmp_dir20240
    C:\Users\Daz\AppData\Local\Temp\e4j9D7A.tmp_dir18490
    C:\Users\Daz\AppData\Local\Temp\e4j9DA6.tmp_dir11185
    C:\Users\Daz\AppData\Local\Temp\e4jAF8.tmp_dir8963
    C:\Users\Daz\AppData\Local\Temp\e4jB0B8.tmp_dir24445
    C:\Users\Daz\AppData\Local\Temp\e4jB52C.tmp_dir19580
    C:\Users\Daz\AppData\Local\Temp\e4jB7F8.tmp_dir13753
    C:\Users\Daz\AppData\Local\Temp\e4jBDD4.tmp_dir21977
    C:\Users\Daz\AppData\Local\Temp\e4jBEAE.tmp_dir15850
    C:\Users\Daz\AppData\Local\Temp\e4jCBF.tmp_dir21907
    C:\Users\Daz\AppData\Local\Temp\e4jD28A.tmp_dir14621
    C:\Users\Daz\AppData\Local\Temp\e4jD615.tmp_dir17014
    C:\Users\Daz\AppData\Local\Temp\e4jD9AC.tmp_dir28490
    C:\Users\Daz\AppData\Local\Temp\e4jDE6F.tmp_dir10886
    C:\Users\Daz\AppData\Local\Temp\e4jE1D6.tmp_dir17090
    C:\Users\Daz\AppData\Local\Temp\e4jE6C6.tmp_dir17480
    C:\Users\Daz\AppData\Local\Temp\e4jF8D2.tmp_dir1536
    C:\Users\Daz\AppData\Local\Temp\e4jF9FB.tmp_dir12433
    C:\Users\Daz\AppData\Local\Temp\e4jFC48.tmp_dir16868
    C:\Users\Daz\AppData\Local\Temp\e4jFFD1.tmp_dir30813
    C:\Users\Daz\AppData\Local\Temp\E823.tmp
    C:\Users\Daz\AppData\Local\Temp\is-E8VRT.tmp
    C:\Users\Daz\AppData\Local\Temp\IXP000.TMP
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Please download CCleaner Slim Run it to clean out temp files, but do not use the registry scanner section. Just the cleaner itself.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  9. thepspgamer

    thepspgamer Private E-2

    done as you said , here are the logs for OTM and GETLog bat

    i have found that desktop.ini files are appearing in random folders, i have hidden files automatically set to on, so can see them, i have been clearing them as i have been finding them

    also, it seems like they are trying to lock my out of a few folders, such as documents and music, but i can still access them via the links to the left, on the sidebar, just not via double clicking the folders, still getting redirects and random tabs opening too

    many thanks again :)
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please disable Dameon tools as per the Read and Run First instructions.

    The only .ini files we wish to delete are the ones in the below fix so leave alone.

    Firefox or IE? Or both?

    Download The Avenger by Swandog469, and save it to your Desktop.

    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  11. thepspgamer

    thepspgamer Private E-2

    Firefox, i dont use IE at all

    ok, i disabled daemon tools using the program in the malware removal guide, restarted and then ran the avenger (am i right in saying that if daemon tools is properly disabled, my virtual drive should also dissapear, as i noticed, its still there, dispite defogger disabling it. would it be better just to uninstall daemen tools alltogether?)

    after pasting the script in and clicking execute, it said that its first step was complete and, to reboot and it would continue after, to which i did. On startup however, nothing happens and if i goto open the program manually, it just says the same as before, as if i had never started ran it the boot before

    so, not getting anywhere here, this program does not wanna run >.<
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Avenger does not run on 64bit systems.

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :killallprocesses
    :files
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  13. thepspgamer

    thepspgamer Private E-2

    here are the logs from OTL and MG

    nothing seems different unfortunatly...still getting popups....

    thanks :)

    also, out of curiosity, if i were to backup and format, would this kill the malware once and for all? also, would my external HDD be comprimised through all this, i have only music, movies etc on there, no programs

    many thanks :)
     

    Attached Files:

  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let's try it again.

    Download OTM by Old Timer and save it to your Desktop.


    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    :Files
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\SysWOW64\drivers\hqhmqq.sys
    C:\Windows\SysWOW64\drivers\htvg.sys
    C:\Windows\SysWOW64\drivers\jljkmoxb.sys
    C:\Windows\SysWOW64\drivers\mzzylba.sys
    C:\Windows\SysWOW64\drivers\sfygbb.sys
    :Commands
    [purity]
    [ResetHosts]
    [createrestorepoint]
    [emptytemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  15. thepspgamer

    thepspgamer Private E-2

    here are the logs for OTM and MGTools

    again, no different also
     

    Attached Files:

  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Make sure you disable your security software, then:


    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    :Files
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\fcnzlq.txt
    
    :Commands
    [purity]
    [ResetHosts]
    [createrestorepoint]
    [emptytemp]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  17. thepspgamer

    thepspgamer Private E-2

    here are the new logs

    again, no change :(
     

    Attached Files:

  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download ComboFix to your desktop and try to run it:
    ComboFix

    Attach the log when it is finished.
     
  19. thepspgamer

    thepspgamer Private E-2

    i have tryed to run combofix already, it extracts when i try to install it, but does nothing after
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  21. thepspgamer

    thepspgamer Private E-2

    im afraid that my computer wont go into system recovery without my windows disk, and i dont have my disk to hand, its currently at my girlfriends, and im not seeing her till the end of the week.

    its saying that my boot device in inaccessable when i try to get into windows via bootup

    also, i found out last night what the cause of this whole mess was, dodgy game download, after a thread deemed that i was not the only person who fell into this trap, somone in this same thread also pointed out whatever we had downloaded had put keylogging software onto our computer, i found the offending file, and deleted it right away, and hasnt come back since (it had logged my keystrokes too)

    so, i have to ask, since i am in a position to format my computer, would this be a viable option? would this be enough to rid my computer of the virus, by wiping everything clean and starting again?

    many thanks guys :)
     
  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You will need your install disc to wipe the system, but that would remove any trojans. Be sure to repartition the drives when you format.
     
  23. thepspgamer

    thepspgamer Private E-2

    thanks, i have formatted my system many times before, so i will be fine from here, i just wanted to check with you guys that if i did so, it would get rid of it, and that it wouldnt still be clinging to my system somehow

    one last question, my external HDD has been connected to my computer all this time, i am i right in saying it is safe, given all it has on it are movie, music and picture files, no programs?

    and thank you very much for all the help, il be sure to some back if i happen to catch anything else (which i hope i wont)

    you guys are awesome, many thanks again for all the help and advice :)
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your external should be safe. After reformatting and installing, scan the external when you get it connected. ;)
     
  25. thepspgamer

    thepspgamer Private E-2

    awesome, thanks again guys, you have been lifesavers :)
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Formatting is not enough which is why Tim mentioned repartitioning. MBR and partition infections are very common now and they will survice a plain format. You must delete partitions ( all of them ) and then repartition and format. Otherwise if you have one of these types of infections, it will still be present. And the Zero Access infection you had can infect MBRs and partitions.
     
  27. thepspgamer

    thepspgamer Private E-2

    will do, il be sure to partition when i do the wipe :)

    am i right in saying that during the win7 install, repartitioning involes wiping the partition so it says "unallocated space", like when you buy a drive brand new and set it up for the first time?

    im sure i have done this, i just wanted to double check as so not to have to deal with this damn thing again

    many thanks
     
    Last edited: May 22, 2012
  28. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes. During set up it will as if you want to repartition.
     
  29. thepspgamer

    thepspgamer Private E-2

    ok, il be sure to do that

    thanks again guys
     
  30. thepspgamer

    thepspgamer Private E-2

    sorry to double post...but im just concerned about something, prpbably nothing, but i just want to play it safe as im backing up, so i dont accidentally take this thing with me...>.<

    i am seeing desktop.ini files in some of my music folders, with code very similer to this inside

    is this normal, and should i leave these files alone or wipe them as i go?

    thanks, probably me just being overly paranoid >.<
     
  31. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    They should be fine.
     
  32. thepspgamer

    thepspgamer Private E-2

    cool, once i have formatted, could you reccomend a program i could use to scan my external, just to make sure its clean?

    i dont know if or not this malware can infect other files, so i just wanna be safe

    thanks again :)
     
  33. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Scan it with both SAS and MBAM.
     
  34. thepspgamer

    thepspgamer Private E-2

    Would it be ok to post the logs here once I have scanned the external drive, to get your guys opinion on that the drive is safe?

    I'm doing the format/repartition tonight, so once I have finished backing up, and done the format, il post the logs for MBAM and SAS

    Thanks again guys
     
  35. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Sure, no problem. ;)
     
  36. thepspgamer

    thepspgamer Private E-2

    format and partition complete, ran the scans on my external and they both came out clean of the virus, the only thing it picked up is a cracked game i am aware of, and i know is safe

    here are the logs none the less :)
     

    Attached Files:

  37. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    So it looks like you are good to go. ;)
     
  38. thepspgamer

    thepspgamer Private E-2

    indeed, computer is running 20 degree's cooler, faster and no more redirects

    thank you all so much for the help guys, you are all awesome :D
     
  39. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You're welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds