Is my system safe? Allowed trojans access... :( Please help!

Discussion in 'Malware Help (A Specialist Will Reply)' started by channel_zero, Apr 6, 2010.

  1. channel_zero

    channel_zero Private E-2

    Hi! I've been looking over a lot of threads in this forum, and they have been very helpful--this seems like a terrific forum! I recently had a scary brush with some trojans and would greatly appreciate any help that y'all could provide.

    Yesterday, I accidentally opened a malicious .exe file--which spawned at least two trojans that my antivirus (Avira AntiVir) notified me about. Regrettably, by accident, I clicked "Allow" (see below)--thinking I was allowing my antivirus take care of them, when instead I was allowing the trojans access to my computer...

    Virus or unwanted program 'TR/Downloader.Gen [trojan]'
    detected in file 'C:\Windows\SysWOW64\eventcrreate.exe.
    Action performed: Allow access
    Date/Time: 4/4/2010, 7:56:16 PM

    Virus or unwanted program 'TR/Downloader.Gen [trojan]'
    detected in file 'C:\Windows\SysWOW64\rdrleakkdiag.exe.
    Action performed: Allow access
    Date/Time: 4/4/2010, 7:56:16 PM


    I caught my mistake, though, and immediately had Avira run a scan, which re-detected them, however, Avira ran into problems trying to quarantine them:

    The file 'C:\Windows\SysWOW64\rdrleakkdiag.exe'
    contained a virus or unwanted program 'TR/Downloader.Gen' [trojan]
    Action(s) taken:
    An error has occurred and the file was not deleted. ErrorID: 26003.
    The file could not be deleted!
    Attempting to perform action using the ARK library.
    The file could not be copied to quarantine!
    The driver could not be initialized.
    The file could not be selected for deletion after the restart. Possible cause: Access is denied.
    Date/Time: 4/4/2010, 7:57:07 PM

    The file 'C:\Windows\SysWOW64\eventcrreate.exe'
    contained a virus or unwanted program 'TR/Downloader.Gen' [trojan]
    Action(s) taken:
    An error has occurred and the file was not deleted. ErrorID: 26003.
    The file could not be deleted!
    Attempting to perform action using the ARK library.
    Access to the rootkit scan was denied.
    The file could not be selected for deletion after the restart. Possible cause: Access is denied.
    Date/Time: 4/4/2010, 7:57:07 PM


    After finishing the scan with these two error messages indicating that the file could not be selected for deletion after restarting, Avira (still?) gave me a message about needing to restart to quarantine the trojans. So, I clicked "Yes" to restart, and after that, I restarted again into Safe Mode and ran a full system scan with Avira, which came up with nothing:

    Scan ended [The scan has been done completely.].
    Number of files: 782724
    Number of folders: 32307
    Number of malware: 0
    Number of errors: 0
    Date/Time: 4/4/2010, 9:41:43 PM


    Wondering what happened to the two trojans, I looked in Avira's quarrintine, and -what do you know- there they were! A couple hours later, at 11:24:20 PM, I also completed a scan using Spybot - Search & Destroy, which detected a Fraud.Sysguard malware in my registry (this is the first time in a long time that Spybot has detected anything other than tracking cookies, so I'm thinking that this is connected in some way?).

    Since then, I've run another full scan using Avira AntiVir, run more Spybot scans, installed COMODO Firewall, run a Windows Defender scan, and a Hitman Pro scan... They haven't turned up anything.

    So, anyways, this is the first time a trojan has gotten this far on my poor new computer, and I'm feeling kinda paranoid--my question is: am I safe now? Secondly, if the trojans are safely quarantined now, for the period of time that they were allowed access in my computer, should I worry about changing the passwords I have saved in Firefox for various websites (like my e-mail, ebay, amazon), etc.?
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  3. channel_zero

    channel_zero Private E-2

    Hi again--I have just followed the "READ & RUN ME FIRST. Malware Removal Guide" steps that you posted above to the tee. Attached to this post should be all the requested logs.

    I'll look forward to your response! Thank you so much for your time and consideration on this, I appreciate it so much--this has been quite nerve-wracking.
     

    Attached Files:

    Last edited by a moderator: Apr 7, 2010
  4. channel_zero

    channel_zero Private E-2

    I just noticed that one of the MG logs includes my network adapter's MAC address, and I feel uncomfortable with having that posted on the internet. I have attached a new MGlogs.zip file to this post, with the MAC address on the log in question "X"-ed out. Could the MGlogs.zip file please be removed from my previous post?

    I still, of course, look forward to your analysis and response about all the logs! Thank you so much again!
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You need to read this:
    Warning about Porn, Keygens, Cracks, and other Illegal Software
    Trojan.Agent/Gen-FSG:
    C:\USERS\BEN\FROM THE EQUALIZER\PROGRAM INSTALLERS\NERO_BURNING_ROM_V6.6.0.13\KEYGEN.EXE

    Use windows explorer to find and delete:
    C:\Windows\tasks\At1.job
    C:\Windows\tasks\At2.job
    C:\Users\Ben\Local Settings\TEMP\6kWiVpo0.exe.part
    C:\Users\Ben\Local Settings\TEMP\A9R5531.tmp
    C:\Users\Ben\Local Settings\TEMP\RHn5e4Us.exe.part
    C:\Users\Ben\Local Settings\TEMP\uxlyqaow.sys

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  6. channel_zero

    channel_zero Private E-2

    That's it!? Yay! Thank you so much for your time and response! :)

    Sorry about this--I did read that, and I don't go for any of that stuff. This was an old file from a friend's computer (i.e. "from The Equalizer") that I didn't even realize I had on my computer. It's gone now.

    I was able to delete these two job files, but...
    ...when I click on "Local Settings" (the folder has a little shortcut arrow in the corner) it says that the file is not accessible and that access is denied. Alternately, if I use the drop-down explorer tree that's on the left-hand side of Windows 7 explorer windows it gives me a different error (see attached screenshot). I get these same errors for other files there that have the little shortcut arrow in the corner of their icons (like the "Start Menu" one), too, by the way.
     

    Attached Files:

  7. channel_zero

    channel_zero Private E-2

    Okay, I found that the "Local Settings" shortcut points to C:/Users/Ben/AppData/Local and the Temp folder with the remaining files to delete that you specified are there.

    I was able to delete all of them except A9R5531.tmp--there was no A9R5531.tmp in the folder. There is, however, a A9R5AF8.tmp. I tried deleting that file, but it gave me this error message: "The action can't be completed because the file is open in Firefox," and when I close Firefox, the file disappears (and I do have hidden files set to visible).

    What should I do?

    P.S. Every time I reopen Firefox, it shows up again in the Temp folder with a different name--now it's "A9R6DDC.tmp."
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can't remove files from today's date. I wouldnt worry with it. If you are not having malware issues and all is running smoothly, then you should just go ahead with the final clean up. :)
     
  9. channel_zero

    channel_zero Private E-2

    Yup--everything's good, and actually, after you posted this, I decided to try just uninstalling and reinstalling Firefox, and that .tmp file in the Temp folder isn't showing up anymore! Thank you SO much for your help--it's a wonderful service that you offer here.

    One last question, about, re: "How to Protect yourself from malware!"--I have COMODO Firewall installed, with Defense+, which is described as this:

    Defense+ for proactive monitoring of internal systems and processes
    Defense+ is an advanced Host Intrusion Prevention System (HIPS) that proactively monitors systems and system processes to prevent system changes such as rootkit installations, inter-process memory injections, key-loggers and more. HIPS technology is driven by an extensive white list database (with nearly one million applications and growing) which identifies trusted applications and prevents untrusted applications from being introduced onto the computer.
    - Comodo Press Releases

    Would this be considered a Realtime-blocking AntiSpyWare tool?

    If yes, since I just should have one--I'm considering disabling the Defense+ part of the COMODO Firewall, since I have AntiVir Personal Edition already installed (as it is also the antivirus I use).

    Would AntiVir Personal Edition be sufficient for both antivirus and realtime-blocking antispyware, or would you recommend that I purchase and use SUPERAntiSpyware for my Realtime-blocking AntiSpyWare tool in addition to having AntiVir Personal Edition as my antivirus tool?
     
    Last edited: Apr 9, 2010
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I never recommend purchasing anything. You would be safe to allow the Comodo Defense+ run as that is for spyware and your AV software will not conflict with it.

    And you are most welcome. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds