[Vista 64]Rootkit.0access.h

Discussion in 'Malware Help (A Specialist Will Reply)' started by Radwan, Mar 17, 2013.

  1. Radwan

    Radwan Private E-2

    Hello, let me first say that I do not know what files to provide or what programs to use to provide them, but upon request I will provide anything necessary in order to help with this issue.



    I just realized and was informed that someone had access to one of my main passwords that I use for most of my important affairs and upon learning of this I started a full scan with Malwarebytes. Upon ending I found two entries for:
    Rootkit.0access.h

    These files were both located in the directory:
    C:\Users\<computername>\AppData\Local\{<followed by many letters and hyphens)\U\themalwareinquestion(s).@ or something odd like that.

    After the scan and detection I promptly chose to have the program delete the two entries, then went to the directory itself, saw that they were gone, then deleted the main folder they were in ({numbers/hyphens folder) this folder in addition to the U folder also had an L folder and a file named "@."

    I restarted my computer, reran a scan on my Appdata folder and found nothing. I then went about my normal routines on the computer, excluding entering sensitive information, and reran the scan in the Appdata folder, and once more in the Appdata/Local folder some time after. All three times, nothing was found.

    This leads me to believe that either
    )the malware is possibly capable of reinstalling itself in other locations (as I did not perform another full-scan, just a scan in the folder the two entries were in the firstplace)
    )or I managed to fix my problem.

    I'm still quite skeptical that all is well on this computer (I'm currently using it to type this message, and have however started to use the On-screen keyboard to enter passwords).

    I'm quite concerned still with using the on-screen keyboard for entering passwords as in my mind there's still a chance that my computer is still vulnerable.

    To start, I'm really just looking for anyone that can help me with verifying/checking/scanning all possible occurrences so I can be 100% sure that it's safe and ready to start using as normal again.



    Again, will provide any information necessary, just need to know what,

    Thanks
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:
    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual update Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only RogueKiller and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run the rest of the READ & RUN ME FIRST instructions on the infected account.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. Radwan

    Radwan Private E-2

    Thank you so much for the reply, sorry for not realizing it myself prior to posting that I should of had all of these logs ready and available.

    I truly do appreciate it, because as I suspected I am still very much infected, the first scan with RougeKiller found a ZeroAccess threat, I'm quite concerned really. I have done nothing besides scan and attach the logs as advised, and will patiently await however long it takes for any necessary aid.

    One thing I would like to mention and inquire about, however, is am I at risk at the moment, because as stated previously, I have been using Windows On-screen Keyboard to enter passwords, and I'm wondering if those passwords entered using that are vulnerable and accessed, and if so, should I begin recreating every password, after, under the assumption that, this issue is resolved entirely with your help?

    Regardless, thank you.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Although this infection is not specifically noted as stealing passwords, it could download other things that could have. So yes it would be a good idea to change all passwords ( even your PC login password ) anyway, but wait until we are finished with your cleanup.

    From the data in your last MGlogs.zip file, it looks like you may not have disabled UAC and/or you may not have used Run As Administrator. Make sure that you have UAC disabled now and leave it disable until we are finish. Also below I will ask you to run some steps using Run As Administrator, please make sure you do this.



    Please download OTM by Old Timer and save it to your Desktop.
    • Run it by double clicking on it (Note: if using Vista, Win7, or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Program Files (x86)\Ask.com
    C:\Users\Radwam\AppData\Local\{02b0226d-d98e-116c-4291-3ea81417f967}\n.
    C:\Users\Radwam\AppData\Local\{02b0226d-d98e-116c-4291-3ea81417f967}\n
    C:\Users\Radwam\AppData\Local\{02b0226d-d98e-116c-4291-3ea81417f967}
    C:\Windows\TEMP\*.*                 
    C:\Users\Radwam\AppData\Local\Temp\*.*
    dir C:\ProgramData\{E8674DB2-4487-4238-A191-4DD8B190B0BC}  /c
    
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4027C7F-154A-4066-A1AD-4243D8127440}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{D4027C7F-154A-4066-A1AD-4243D8127440}"=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A24B5BB8521B03E0C8D908F5ABC0AE6]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AA0923513360135B272E8289C5F13FA]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\922525DCC5199162F8935747CA3D8E59]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1A24B5BB8521B03E0C8D908F5ABC0AE6]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6AA0923513360135B272E8289C5F13FA]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\922525DCC5199162F8935747CA3D8E59]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  5. Radwan

    Radwan Private E-2

    Thank you for the response sir, I really do appreciate it. I am sorry about the improper execution of the programs though, I do have UAC disabled but I believe I forgot to Run As Administrator on the MGtools.

    I've attached the requested logs, I had to .zip the OTM log because I was told it exceeds the limit.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Okay that looks much better. Now we have a registry patch to apply.


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Reboot your PC after the above and then tell me if you still having problems?
     
  7. Radwan

    Radwan Private E-2

    Thank you very much for the fast reply. I have done the following and received this success message:

    http://i.cubeupload.com/paAjd8.png

    When you ask after rebooting if I'm still having problems, as far as I know, I do not, I reran RougeKiller and TDSKiller as precuation scans and they did not come up with anything, so I'm assuming I'm safe and back to normal? With your blessing, do you think at this point it is now safe to begin entering passwords on this computer?
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    After completing all of the below final instructions.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove, you can delete these files now.
    7. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    8. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds