Trojan.agent.ertfor

Discussion in 'Malware Help (A Specialist Will Reply)' started by rkane3000, Oct 3, 2009.

  1. rkane3000

    rkane3000 Private E-2

    This wasn't picked up at all up my McAfee. I tried another couple of free anti virus scanners but they were stopped from scanning about a third of the way through, then i eventually found one that allowed me to scan. I found I had a few trojans, most of which it got rid off (the worst of which were BHO trojans, that steal sensitive information).

    Now I've still got the Trojan.agent.ertfor buried in my registry - I can't delete them from the registry and the anti virus programme I bought picks them up but doesn't remove them. I tried to run Combofix but that won't run either.

    So, the bottom line is I'm out of ideas here - how in the hell can I get rid of these trojans?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Let's see if we can get some info so that we can determine which system file has been corrupted. That way we can try to replace it.

    Download and save the below to your PC (save it anywhere you can find it. The Desktop is fine). Then doube click on it to run it.

    AVPFind.bat

    It should take a couple minutes to run. You will see a black command prompt window while it is running and it should close when it is finished. Once it finishes, attach the c:\avplog.txt file that is will hopefully create as long as the malware does not block the batch file from running.


    Now download and Run exeHelper
    • Please download exeHelper to your desktop.
    • Double-click on exeHelper.com to run the fix.
    • A black window should pop up, press any key to close once the fix is completed.
    • Post the contents of log.txt (Will be created in the directory where you ran exeHelper.com)
    Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).


    Also please try running the below online scan:

    http://www.superantispyware.com/onlinescan.html

    Reboot immediately after scanning if it finds and removes anything. Let me know if anything was found. See if you can save a log with it.


    Then try running these instructions: Using MGtools

    Attach the below logs when finished with all of the above:
    • C:\avplog.txt - from AVPfind
    • a log from online SAS scan if you could make one
    • log.txt - from exeHelper
    • C:\MGlogs.zip - from MGtools
    The C:\ assumes that drive C is you Windows boot drive. If you boot from another drive, then use the correct drive letter above.
     
  3. rkane3000

    rkane3000 Private E-2

    Thank you for your detailed response below.

    I have thankfully found a solution to my problem and managed to clean my system.

    A combination of Silentrunner, The Fixer and then Combofix, finally cleaning up my problems. Hopefully I won't have to come back with anymore problems in the future (slightly optimistic I know) but thank you for taking the time to response to my initial post.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you had a Windows Police Pro infection as your symptoms described, you may still have many problems especially with system file permissions. I strongly suggest that you attach the current ComboFix log you have and then run thru the below.

    READ & RUN ME FIRST. Malware Removal Guide
     
  5. rkane3000

    rkane3000 Private E-2

    Hi, the support guy came back and told me that the system was now clean. However, as you requested, here is the combo log I sent to him last week.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Based on what I see in the ComboFix log, you probably still have issues that you may not even know about yet.

    The below file needs to be deleted which came from the infection:
    c:\windows\win32k.sys

    And the below folder is questionable:
    Code:
    2009-09-29 18:25 -------- d-sh--we c:\windows\uninstall\uninstall


    Please download and run Win32kDiag per the below instructions:
    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log
    C:\win32kdiag.exe -f -r

    Then I suggest that you run the READ & RUN ME FIRST. Malware Removal Guide and attach the logs just to be safe. The infection that you had can cause quite a few problems with system file and registry permissions.
     
  7. rkane3000

    rkane3000 Private E-2

    Oh I see, thanks for this additional help.

    Here is the log from Win32kDiag.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I was correct, you had a load of permissions that were modified by the malware. Thus you were not clean and still may not be. You really should complete the READ & RUN ME instructions.
     
  9. rkane3000

    rkane3000 Private E-2

    Ok, I will look into doing that - can you tell me what sort of permissions you mean?
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Permissions of files and folders and even the registry. This can affect the ability to install programs, uninstall programs, run programs, delete/edit files and folders....etc. The Win32kDiag program repaired a load of issues but only with in the Windows core folders. It does not look for or fix problems that may exist anywhere else outside of the Windows folders. When your support guy said you were clean, he was not correct. The Win32kDiag log alone shows all the mountpoint (aka junctions) related to the malware that were still in place. All the items with the \Device\__max++>\^ below them were affected.

    Combofix found and repaired only the below:
    Infected copy of c:\windows\system32\cngaudit.dll was found and disinfected

    Which is the root of the infection and what was preventing many things from being run but this does not repair all the damage. The amount of damage is variable depending on how long the infection was in place and how many times the PC was booted, and how many times incorrect fixes were attempted, and how much software was installed or run while the infection was inplace.
     
  11. rkane3000

    rkane3000 Private E-2

    Thanks very much for this.

    I will do the RUN AND READ ME process and report back in a day or so.
     
  12. rkane3000

    rkane3000 Private E-2

    I worked through the various steps but ran into some problems.

    I have a log for Combofix and Mbam - I ran into errors on Superantispyware (error code 1321), Rootrepeal would not run at all and MGTools ran but would not 'allow' a log report to be produced. It did bring up numerous requests associated with the registry, so I guess it worked?
     

    Attached Files:

  13. rkane3000

    rkane3000 Private E-2

    I did notice this log just now for Hijackthis. It was in the MGTools folder that also contained a lot .exe files - should I be worried about these? Files like swreg, vfind etc?
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you sure? Did you check to see if the C:\MGlogs.zip file exists? This is the log we need to continue.
    • Did you shutdown McAfee before trying to run MGtools?
    • Did you disable UAC and reboot before running MGtools?
    • Did you use Run As Administrator? This was required!
    Why are you still running barebones Vista? You have not installed the service packs that contain many required/necessary security fixes!

    Do you know what the below is for? Is this something for your workplace?

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
    "Dhcpfat"= {5F5E6808-9798-4D3B-BDC4-8EF94026F291} - c:\windows\system32\confboot.dll [2009-02-13 1036288]
     
    Last edited: Oct 24, 2009
  15. rkane3000

    rkane3000 Private E-2

    Sorry, I think I made a mistake there. I have attached the MGTools log.

    You ask why am I running barebones Vista etc but how do I change that? As far as I know I haven't not added anything I shouldn't of.

    And that registry part you mentioned has nothing to do with my work, I only have links to my work online, bookmarked, so nothing should've changed in my registry for those. I have no idea what that is you have asked about.
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It is not so much a matter of what you have installed, it is a matter of what you have not installed! You have not installed the required and necessary Windows Updates. Vista is already up to service pack 2 ( call SP2 ) and you are still running the original ( what I call barebones ) Vista with no updates at all which puts you at great risk due to security issues. You need to install the updates from Microsoft Update but not until we finish with your cleanup.


    Now download Junction,zip to your Windows folder
    • Please download Junction.zip and save it to your Windows folder (i.e, C:\Windows\Junction.zip This assumes C:\ is your Windows boot drive.)
    • Now unzip it and put junction.exeinto the Windows folder (i.e., C:\Windows\junction.exe)
    • Do not try to run it right now. We will run something that uses it later.


    Now we need to reset the permissions altered by the malware on some files.
    • Download and save inhertit.exe to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!
    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).
    • A command prompt window opens and also a license agreement from SysInternals will appear for Junction.
    • Accept the license agreement and the scan will begin.
    • Wait until it finishes we can take a while to run since it scans your whole harddisk. e patient and don't do anything else while it is scanning.
    • The command prompt window should close when it finishes.
    • While this is running, you will get several/many popups that have a title Finish and say OK. Just click the OK button each time. This is an indication that it has found a file and has attempted to fix permissions. Depending on how many files that need to be fixed, you could get only a few or many of these popups.


    Now we need to use ComboFix again
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it has expired or need to be updated to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.


    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\Windows\Temp
    C:\Users\Rkane\AppData\Local\temp

    Now run Ccleaner. Only use the Run Cleaner button. Do not run anything else on any other forms.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  17. rkane3000

    rkane3000 Private E-2

    The logs are attached.

    You asked me to tell you how things were running and to be honest, since I had originally 'cleaned' the system with the Support dude, things seemed to have returned to normal. Though I had no idea of the deep rooted problems you have pointed out to me, so i am very grateful for all your help with this.
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean. You need to put the ComboFix.exe onto your Desktop as stated in our instruction or you will not be able complete our final instructions. You currently have it in a logfile folder on your Desktop which is not where it should be.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  19. rkane3000

    rkane3000 Private E-2

    Well that seems to be everything now, I've installed the SP2 for Vista as well, so no more bare bones for me!

    Once again, thankyou so much for all your help and hopefully I won't need to come back here in hurry!

    All the best
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds