Help requested. Thank you.

Discussion in 'Malware Help (A Specialist Will Reply)' started by hola_amigos, Jun 12, 2012.

  1. hola_amigos

    hola_amigos Private E-2

    After updating to Windows Vista Home Premium SP2, an AVG scan has found 18 rootkits. I downloaded and ran combofix on the recommendation of a friend at work a few days ago (I understand now that this was not a good idea), but AVG still finds the rootkits and can not remove them. AVG has been removed with the removal tool as instructed. I have followed all other instructions in the readme, however, RootRepeal will not run, so there is no log for this tool. All other logs are attached. Thank you for your help :).
     

    Attached Files:

  2. thisisu

    thisisu Malware Consultant

    Welcome to MajorGeeks, hola_amigos :)

    http://img196.imageshack.us/img196/3557/tdsskiller.gif I want you to read and follow these instructions: TDSSKiller - How to run

    http://img805.imageshack.us/img805/9659/rktigzy.gif Please download RogueKiller to your desktop.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    When it is finished, there will be a log on your desktop called: RKreport[1].txt
    Attach RKreport[1].txt to your next message. (How to attach)
     
  3. hola_amigos

    hola_amigos Private E-2

    The requested logs are attached. I did not delete anything that Rogue Killer found. Thank You.
     

    Attached Files:

  4. thisisu

    thisisu Malware Consultant

    So far your logs are clean. I'd like to run one more scan but you should pick one of the following Antiviruses to keep:
    • Trend Micro
    • AVG
    • Webroot
    Then uninstall the rest.

    http://img205.imageshack.us/img205/1894/otl.gif Please download OTL by OldTimer.

    • Save it to your desktop.
    • Right mouse click on the OTL icon on your desktop and select Run as Administrator
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the http://img14.imageshack.us/img14/66/otlcustomfix.png text-field.
      Code:
      activex
      netsvcs
      /md5start
      afd.sys
      i8042prt.sys
      netbt.sys
      nsiproxy.sys
      services.exe
      svchost.exe
      tcpip.sys
      tdx.sys
      /md5stop
      %windir%\$ntuninstallkb*. /120
      %windir%\system32\drivers\*.sys /lockedfiles
      
    • Now click the http://img171.imageshack.us/img171/2405/runscanotl.png button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  5. hola_amigos

    hola_amigos Private E-2

    I'm relieved that the previous logs look clean :). Was I correct in not deleting anything that RogueKiller found, or should I go back and delete them? Here are the OTL logs. Thank you very much !:)
     

    Attached Files:

  6. thisisu

    thisisu Malware Consultant

    Yes you were correct ;)

    This log is clean too and this fix mostly just removes junk the AVG uninstaller missed. This fix is optional as it is not removing any malware.
    You can skip to the final steps below if you decide not to run the OTL step.

    http://img205.imageshack.us/img205/1894/otl.gif Fix items using OTL by OldTimer

    Double-click OTL.exe to run. (Vista/7 right-click and select Run as Administrator)
    Shut down your protection software now (antivirus, antispyware...etc) to avoid possible conflicts.
    Copy the text in the code box below and paste it into the http://img14.imageshack.us/img14/66/otlcustomfix.png text-field.
    Code:
    [COLOR="DarkRed"]:otl[/COLOR]
    SRV - File not found [On_Demand | Stopped] -- c:\Program Files\Common Files\SureThing Shared\stllssvr.exe -- (stllssvr)
    DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Windows\system32\drivers\rootrepeal.sys -- (rootrepeal)
    DRV - File not found [Kernel | On_Demand | Stopped] -- system32\DRIVERS\nwlnkfwd.sys -- (NwlnkFwd)
    DRV - File not found [Kernel | On_Demand | Stopped] -- system32\DRIVERS\nwlnkflt.sys -- (NwlnkFlt)
    DRV - File not found [Kernel | On_Demand | Stopped] -- system32\DRIVERS\ipinip.sys -- (IpInIp)
    DRV - File not found [Kernel | On_Demand | Stopped] -- C:\Users\Owner\AppData\Local\Temp\catchme.sys -- (catchme)
    DRV - File not found [Kernel | Disabled | Stopped] -- C:\Windows\system32\drivers\blbdrive.sys -- (blbdrive)
    DRV - File not found [Kernel | On_Demand | Stopped] -- system32\DRIVERS\avgidsshimx.sys -- (AVGIDSShim)
    DRV - File not found [Kernel | Boot | Stopped] -- system32\DRIVERS\avgidshx.sys -- (AVGIDSHX)
    IE - HKLM\..\SearchScopes\{136A6348-D601-4D57-A77A-BF9231B38261}: "URL" = http://www.ask.com/web?q={searchterms}&l=dis&o=ushpd
    IE - HKU\S-1-5-21-151704840-877029032-3775423955-1000\..\SearchScopes\{136A6348-D601-4D57-A77A-BF9231B38261}: "URL" = http://www.ask.com/web?q={searchterms}&l=dis&o=ushpd
    IE - HKU\S-1-5-21-151704840-877029032-3775423955-1000\..\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}: "URL" = http://isearch.avg.com/search?cid={7CD8B035-BB8F-4AF0-A189-4BE3B11F08AF}&mid=d1b6da51e66247d09b94d152baa5ec99-a3179f2d162a85d21ef03decfb3f8fe2958cb45d&lang=en&ds=AVG&pr=fr&d=2012-06-07 00:41:31&v=11.1.0.7&sap=dsp&q={searchTerms}
    FF - prefs.js..keyword.URL: "http://isearch.avg.com/search?cid=%7Bc7ec91ca-61b6-4181-8683-cf35065fde05%7D&mid=d1b6da51e66247d09b94d152baa5ec99-a3179f2d162a85d21ef03decfb3f8fe2958cb45d&ds=AVG&v=11.1.0.7&lang=en&pr=fr&d=2012-06-07%2000%3A41%3A31&sap=ku&q="
    FF - prefs.js..browser.search.defaultenginename: "AVG Secure Search"
    [2012/06/07 00:39:03 | 000,000,000 | ---D | M] (AVG Do Not Track) -- C:\PROGRAM FILES\AVG\AVG2012\FIREFOX\DONOTTRACK
    O2 - BHO: (AVG Do Not Track) - {31332EEF-CB9F-458F-AFEB-D30E9A66B6BA} - C:\Program Files\AVG\AVG2012\avgdtiex.dll File not found
    O2 - BHO: (no name) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - No CLSID value found.
    O9 - Extra Button: AVG Do Not Track - {68BCFFE1-A2DA-4B40-9068-87ECBFC19D16} - C:\Program Files\AVG\AVG2012\avgdtiex.dll File not found
    [2012/06/12 19:19:51 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AVG
    [2012/06/07 00:43:17 | 000,000,000 | ---D | C] -- C:\Users\Owner\AppData\Roaming\AVG2012
    [2012/06/07 00:38:26 | 000,000,000 | ---D | C] -- C:\ProgramData\AVG2012
    [2012/06/07 00:38:26 | 000,000,000 | ---D | C] -- C:\$AVG
    [2012/06/07 00:36:33 | 000,000,000 | ---D | C] -- C:\Program Files\AVG
    [2012/06/08 03:05:53 | 000,008,798 | ---- | M] () -- C:\Windows\System32\icrav03.rat
    [2012/06/08 03:05:53 | 000,001,988 | ---- | M] () -- C:\Windows\System32\ticrf.rat
    [2012/06/07 00:16:10 | 000,000,042 | ---- | C] () -- C:\Windows\System32\AK083E209605E394C.lie
    @Alternate Data Stream - 121 bytes -> C:\ProgramData\TEMP:DFC5A2B2
    [COLOR="DarkRed"]:reg[/COLOR]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{136A6348-D601-4D57-A77A-BF9231B38261}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{136A6348-D601-4D57-A77A-BF9231B38261}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31332EEF-CB9F-458F-AFEB-D30E9A66B6BA}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupfolder]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupfolder]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\state]
    "startup"=dword:00000000
    [COLOR="DarkRed"]:commands[/COLOR]
    [clearallrestorepoints]
    [emptytemp]
    
    Now click the http://img3.imageshack.us/img3/407/otlrunfix.png button.
    If the fix needed a reboot please do it.
    Click the OK button (upon reboot).
    When OTL is finished, Notepad will open. Close Notepad.
    A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    Attach this log to your next message. (How to attach)

    FINAL STEPS

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis if it present
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work through the below link:
    Be safe :)
     
  7. hola_amigos

    hola_amigos Private E-2

    thisisu, thank you very much for your knowledge and time! You have made my day! :)
     
  8. hola_amigos

    hola_amigos Private E-2

    Here is the final OTL log. :)
     

    Attached Files:

  9. thisisu

    thisisu Malware Consultant

    You're welcome :) Be safe.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds