Suspected Infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by radiohead_1, Oct 19, 2010.

  1. radiohead_1

    radiohead_1 Private E-2

    Hey MG,

    I heavily suspect I'm infected by something - Avast! has placed a couple viruses in the chest today, and my HJT logs make me believe something fishy is going on. I've followed all the steps in the vista cleaning procedure.

    Running Windows 7, 64bit.

    Here are the Avast findings:
    axmnrowcse.exe in c:\users\dave\appdata\local\temp (Win32:Malware-gen)
    mxoeranswc.exe in c:\users\dave\appdata\local\temp (Win32:Crypt-HVG [DRP])

    Malware Bytes log attached (it found some items).
    Super anti-spyware logs read clean, but I can attach the log on request.
    HJT shows many issues that are not removed after I attempt to fix them. Log also attached.
    MGTools log attached as well.

    UAC remains disabled. I await your expert help, and many thanks in advance!
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Currently reviewing your logs and will get back to you with a set of instructions as soon as possible.
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Your Malware Bytes log shows you took no action on the threats it found. Did you indeed take action after you attached the log?

    Yes please.

    What issues are you referring to?

    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :Files
    C:\Users\Dave\Local Settings\TEMP\183F.tmp
    C:\Users\Dave\Local Settings\TEMP\185E.tmp
    C:\Users\Dave\Local Settings\TEMP\1860.tmp
    C:\Users\Dave\Local Settings\TEMP\1860.tmp.exe.manifest
    C:\Users\Dave\Local Settings\TEMP\186F.tmp
    C:\Users\Dave\Local Settings\TEMP\1870.tmp
    C:\Users\Dave\Local Settings\TEMP\1870.tmp.exe.manifest
    C:\Users\Dave\Local Settings\TEMP\19A6.tmp
    C:\Users\Dave\Local Settings\TEMP\19A7.tmp
    C:\Users\Dave\Local Settings\TEMP\19A8.tmp
    C:\Users\Dave\Local Settings\TEMP\19A8.tmp.exe.manifest
    C:\Users\Dave\Local Settings\TEMP\xoareswmnc.exe
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into notepad, save it as something appropriate and attach it into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know how things are running for you now.
     
  4. radiohead_1

    radiohead_1 Private E-2

    Thanks Kestrel!

    My apologies. Apparently, I had 2 logs, and attached the wrong one. I did previously take action:
    Files Infected:
    C:\Users\Dave\AppData\Local\Temp\1840.tmp (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Users\Dave\AppData\Local\Temp\1860.tmp.exe (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Users\Dave\AppData\Local\Temp\1870.tmp.exe (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Users\Dave\AppData\Local\Temp\19A8.tmp.exe (Rootkit.TDSS) -> Quarantined and deleted successfully.
    C:\Users\Dave\AppData\Local\Temp\amoewrcsnx.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.

    All the O23 entries of the system32 .exes that seem to be missing. I've tried to fix them, but they just reappear.

    OTM downloaded and run. Everything went as planned, Avast! blocked another malware immediately after (or perhaps, as) the program finished, located in that C:\_OTM\movedfiles directory.

    Logs are attached: OTM, MGLogs.zip, and the previously ommitted SAS logs.

    Appreciate the continued support!
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    That does not necessarily mean they are missing! It's just the way HJT interprets it. Using HJT without being experienced in doing so is a bad idea. Those are all legitimate entries/files.

    Your logs look clean. What avast found this time was just something OTL quarantined as you can see yourself.

    Seems like your Antivirus is just doing it's job.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds