Help me Please! Remnants of Trojan.0access

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Gidz, Jan 6, 2013.

  1. Gidz

    Gidz Private E-2

    Thank you for taking a look.

    I found this website a month back when I was searching for Trojan.0access since it came up in my MalwareBytes check. I thought I could do it myself so I followed the steps from this thread: http://forums.majorgeeks.com/showthread.php?t=262034

    I also have Comodo antivirus, firewall enabled, which also detected Heur.Packed.Unknown@4294967295. After a prompt, I quarentied it using the antivirus, and begun following the steps in the above thread. RogueKiller did show up with something that looked like a rootkit, so did TDSKiller and others.

    I naively thought that this is easy now, I will clean it myself, no need to bother someone. So I did the best I could and it seemed, no more pop-ups from Comodo and the scans were clean. However, it seems there are remnants of the rootkit still there.

    I have lost links to a lot of programs/folders I used to keep in a folder on desktop. I can access the folder back by pulling back the privileges on my admin account, however I saved some to show you how it looks in case you need it. While changing some of permissions and owner properties, a user would quickly change its name and have access to the folder I couldn't access. I have attached pics of that as well.

    My computer also would become slow randomly. I saw in Task Manager that my CPU was only using less than 10% even though my super fast laptop was crawling like a dinosaur. I cannot install some software and it gives me an error "Can not create temp folder archive."

    The rootkit was found in the $recycle.bin folder. After a while (end of Dec), it showed up again on Comodo's 'on alert' virus check and is quarentied there again.

    I re-ran all the tests again which are attached below, except for few like RogueKiller, which surprisingly does not create a report and the EULA is empty as well. This did not happen last time when I ran it. It shows up with one result in registry tab (Key type: HOSTS | Global: HKLM | Key: SYSTEM\CurrentControlSet\services\Tcpip\Parameters | Value: DataBasePath).

    Malwarebytes ran fine and showed up with nothing. Tdsskiller also encountered a problem (cannot initialize log; cannot load driver), which did not happen before. It comes with nothing now and there is no log available.

    Ok, so something is seriously wrong here now. HitmanPro starts and loads up, but 13% into the scan, I get the message HitmanPro has stopped working and windows creates a log file of the crash of program to be sent to microsoft. This keeps on happening. This did not happen a month ago.

    I had to do "Now locate the GetLogs.bat file in the MGTools folder and right click on it and select Run As Administrator this should begin the scan process" since even MGTools did not run properly. I have attached the zip file as well

    I do have all the old log files of the day I previously cleaned up, where the rootkit did show up if you need.

    Please help. Thanks!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You need to attach the logs from RogueKiller, Hitman and TDSSKiller.
     
  3. Gidz

    Gidz Private E-2

    Please advice what steps I need to take in order to get those tests running now.
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Sorry.......

    Do you know what this is:
    C:\\Program Files (x86)\\puush\\puush.exe
     
  5. Gidz

    Gidz Private E-2

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not finding any remnants. Let's do this:

    • Please download ZeroAccess Removal Tool (By Webroot)to your desktop.
    • Double click on it to run it (If running Vista or Windows 7, right click on it and select "Run as an Administrator")
    • Type y and press enter to run the scan .
    • Hit any key to exit once it has finished it's scan.
    • Attach the log which will be in the same location as you ran the tool from. (Should be desktop)
     
  7. Gidz

    Gidz Private E-2

    I cannot run it since it says the program only runs on 32bit systems (Mine is 64bit)
     
  8. Gidz

    Gidz Private E-2

    I am thinking something is definitely wrong.

    There are lost shortcuts, folders I don't have access to anymore, privileges being messed up, some software that I cannot install. Somehow, 3 out of 5 tools do not seem to run anymore. It seems to me, either the rootkit was not removed, or something is left over.
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now please we will try using two tools designed especially for this kind of infection.
    • Download
      AntiZeroAccess
      to Desktop
    • Also download and save this >>

      ESETSirefefRemover
      to your Desktop
    • Now double click on AntiZeroAccess to run it (If running Vista or Windows 7, right click on
      it and select "Run as an Administrator")
      • Type y and press enter to run the scan
      • Please attach the AntiZeroAccess_Log.txt log to your next message. This file is saved in the
        same location as AntiZeroAccess program.
    • Now run the Win32/Sirefef tool while in Normal Mode and follow the prompts as directed
    Now download and run MGtools ( from the READ & RUN ME ) and run it as per the below instructions and
    attach the MGlogs.zip file that is requested.

    Using MGtools
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds