Removing Tojan GAC_64/32 Desktop.ini

Discussion in 'Malware Help (A Specialist Will Reply)' started by Josh123, May 25, 2012.

  1. Josh123

    Josh123 Private E-2

    Hello, This is been going on now for about 4 days, I've tried and tried to remove it, but it just wont leave me alone. I've tried all kinds of anti-malware, virus, etc...

    My AVG says its "Windows/Assembly/GAC_64/Desktop.ini" (Same goes for _32)
    My Windows defender says its "Trojan:Win32/Sirefef.AB" (And .P)

    Please, Help me out, This is the first time that I had to get another person to help me out with killing a virus. (I'm a computer freak)

    P.S. Thanks to who over does.
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything. Note if you cannot save things in C:\ then just save them to your Desktop. Make sure that you have disable UAC and rebooted first if you are running Windows Vista or Windows 7.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.

    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.



    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!

    Helpful Notes:


    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:

    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:


    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. Josh123

    Josh123 Private E-2

    Ok, I did all the steps that you asked for, Lets see what happens next....

    Tell me if I missed anything please, Thanks.
     

    Attached Files:

  4. thisisu

    thisisu Malware Consultant

    Hello :)

    Just to keep you going... you are missing ComboFix.txt.
    Please attach this log (C:\ComboFix.txt) or tell us what issues you had with running ComboFix.
     
  5. Josh123

    Josh123 Private E-2

    I ran ComboFix in Administration Mode, But it just extracted, Didn't actually run anything, Just extracted.
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download OTL to your desktop.

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :killallprocesses
    :files
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\TEMP\fla3932.tmp
    C:\Windows\TEMP\fla958B.tmp
    C:\Windows\TEMP\flaB405.tmp
    C:\Windows\TEMP\flaC5C2.tmp
    C:\Windows\TEMP\flaC764.tmp
    C:\Windows\TEMP\flaD157.tmp
    C:\Windows\TEMP\flaDF79.tmp
    C:\Windows\TEMP\flaF9BD.tmp
    C:\Windows\TEMP\flaFA99.tmp
    C:\Users\Youssef\AppData\Local\Temp\div1016.tmp
    C:\Users\Youssef\AppData\Local\Temp\div176.tmp
    C:\Users\Youssef\AppData\Local\Temp\div1A34.tmp
    C:\Users\Youssef\AppData\Local\Temp\div1D6E.tmp
    C:\Users\Youssef\AppData\Local\Temp\div29E.tmp
    C:\Users\Youssef\AppData\Local\Temp\div3580.tmp
    C:\Users\Youssef\AppData\Local\Temp\div3F40.tmp
    C:\Users\Youssef\AppData\Local\Temp\div5A9D.tmp
    C:\Users\Youssef\AppData\Local\Temp\div6344.tmp
    C:\Users\Youssef\AppData\Local\Temp\div6FB3.tmp
    C:\Users\Youssef\AppData\Local\Temp\divD374.tmp
    C:\Users\Youssef\AppData\Local\Temp\divD99B.tmp
    C:\Users\Youssef\AppData\Local\Temp\divEC70.tmp
    C:\Users\Youssef\AppData\Local\Temp\divF0E3.tmp
    C:\Users\Youssef\AppData\Local\Temp\is1598539481
    C:\Users\Youssef\AppData\Local\Temp\ish1178618
    C:\Users\Youssef\AppData\Local\Temp\JET1AB0.tmp
    C:\Users\Youssef\AppData\Local\Temp\JET4864.tmp
    C:\Users\Youssef\AppData\Local\Temp\JETC419.tmp
    C:\Users\Youssef\AppData\Local\Temp\JETC9D.tmp
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir14358
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir16762
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir17086
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir19845
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir20145
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir20381
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir20854
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir22960
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir22964
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir26327
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir26331
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir26340
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir28998
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir29005
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir30753
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir30907
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir_28638
    C:\Users\Youssef\AppData\Local\Temp\scoped_dir_28697
    C:\Users\Youssef\AppData\Local\Temp\sfamcc00001.dll
    C:\Users\Youssef\AppData\Local\Temp\sfareca00001.dll
    C:\Users\Youssef\AppData\Local\Temp\SFCC10F.tmp
    
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.


    Now see if you can run ComboFix

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  7. Josh123

    Josh123 Private E-2

    Ok, So still i couldn't run ComboFix, (I think because i already ran it before) (Just Extraction)

    Um....here are my logs.

    My computer feels the same, It still redirects me to different sites, (Shopping Sites mostly)

    Still, Lets see what happens next...
     

    Attached Files:

  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Go to the below link and follow the instructions for running TDSSKiller from Kaspersky

    Be sure to attach your log from TDSSKiller

    Please also download MBRCheck to your desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  9. Josh123

    Josh123 Private E-2

    Here are the logs for you.
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please do the below so that we can boot to System Recovery Options to run a scan. There will be two options to choose from. One if you do not have your Windows 7 boot DVD and another when you have your DVD.

    For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Option1: Enter System Recovery Options from the Advanced Boot Options:

    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    Option2: Enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)




    Now boot into normal Windows can continue with the below.

    Running MGTools.
     
  11. Josh123

    Josh123 Private E-2

    I did exactly as you said to do, Here are the fresh logs.
    Still my Opera Browser still redirects me to different sites.

    Whats next....
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Save fixlist.txt to your flash drive.

    • You should now have both fixlist.txt and FRST.exe on your flash drive.

    Now reboot back into the System Recovery Options as you did previously.
    Run FRST and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now boot into normal Windows can continue with the below.

    Try to immediately run ComboFix.
     

    Attached Files:

  13. Josh123

    Josh123 Private E-2

    Here are the fix-logs.
    And I paid close attention to combo fix, i saw that it was deleting alot of files, and extracting new ones.

    Is it suppose to open an application or something? to run a scan?
     

    Attached Files:

  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Did combo produce a log?
     
  15. Josh123

    Josh123 Private E-2

    Not that I know of, Where exactly would i find the log for it?
    It didn't open a program, just deleted some files and extracted new ones...

    What is the name of the log?
     
  16. Josh123

    Josh123 Private E-2

    UPDATED:

    I went searching for that ComboFix log that you wanted, Instead I found _OTL folder and i opened it, found GAC_32 and 64, Deleted them both, My browser is working perfectly, thank you so much.
    Love you Tim.
     
  17. Josh123

    Josh123 Private E-2

    Uggg...Update again, Sorry tim.

    Yeah, My browser (Opera) still redirects me to different sites, I thought by deleting the files would take care of it.

    Once again, I'm stuck and need help.

    Thanks.
     
  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Have you tried uninstalling Opera?

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip

    If Combo ran, the log would be at C:\ComboFix.txt.
     
  19. Josh123

    Josh123 Private E-2

    Thanks Tim, I actually Deleted the GAC Files (64/32) and then ran malwarebytes, found the virus that was messing with my registry and deleted it.

    Then had a friend discover another problem.
    It was PING.EXE, Registry Virus, GAC-32-64.

    And I want to thank you, because without your help I wouldn't of got so far.
    I ran Malwarebytes, saw that _OTL moved the files to somewhere i could access. Then traces back the PING.EXE and deleted it.

    No more virus, No more redirects, Perfect, And I fixed my firewall problem, (Its working now)

    Thanks tim.

    If you need a log to check if anything is running ok, let me know.
     
  20. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are quite welcome.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     
  21. Josh123

    Josh123 Private E-2

    I did everything, I created a restore point which is today. (3-30-2012),Its a clean copy.
    Thanks again Tim.
     
  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You're most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds