Agent_r aks help

Discussion in 'Malware Help (A Specialist Will Reply)' started by nykb, Oct 3, 2011.

  1. nykb

    nykb Private E-2

    Hello I followed your instructions from your original reply at
    http://forums.majorgeeks.com/showthread.php?p=1670416#post1670416
    It said AVG found Agent_r.aks and can't remove the threat. Malwarebytes scan does not even find it. Also, my Internet Explorer does not work and I'm not sure if it's related. Help me get rid of this please!

    Attached are the logs
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please attach a log from AVG so I can know what file it is complaining about.

    Now let's use ComboFix to remove a bunch of malware files.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\assembly\tmp\U
    C:\Windows\assembly\tmp\U\00000001.@
    C:\Windows\assembly\tmp\U\00000002.@
    C:\Windows\assembly\tmp\U\000000c0.@
    C:\Windows\assembly\tmp\U\000000cb.@
    C:\Windows\assembly\tmp\U\000000cf.@
    C:\Windows\assembly\tmp\U\80000000.@
    C:\Windows\assembly\tmp\U\80000032.@
    C:\Windows\assembly\tmp\U\80000064.@
    C:\Windows\assembly\tmp\U\800000c0.@
    C:\Windows\assembly\tmp\U\800000cb.@
    C:\Windows\assembly\tmp\U\800000cf.@
    
    Folder::
    c:\users\kb\AppData\Roaming\orrzzPPNyxAuv2
    c:\users\kb\AppData\Roaming\UD22oonF4pm
    c:\users\kb\AppData\Local\Conduit
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Note: If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Download and run Win32kDiag per the below instructions:

    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log

    C:\win32kdiag.exe -f -r



    Now download Junction,zip to your Windows folder

    • Please download Junction.zip and save it to your Windows folder (i.e, C:\Windows\Junction.zip This assumes C:\ is your Windows boot drive.)
    • Now unzip it and put junction.exeinto the Windows folder (i.e., C:\Windows\junction.exe)
    • Do not try to run it right now. We will run something that uses it later.

    Now we need to reset the permissions altered by the malware on some files.

    • Download and save inhertit.exe to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!

    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    • A command prompt window opens and also a license agreement from SysInternals will appear for Junction.
    • Accept the license agreement and the scan will begin.
    • Wait until it finishes we can take a while to run since it scans your whole harddisk. e patient and don't do anything else while it is scanning.
    • The command prompt window should close when it finishes.
    • While this is running, you will get several/many popups that have a title Finish and say OK. Just click the OK button each time. This is an indication that it has found a file and has attempted to fix permissions. Depending on how many files that need to be fixed, you could get only a few or many of these popups.

    And one more scanning tool I want to use to collect more information is OTL per the below.

    Please download OTL by Old Timer to your desktop.
    See the download links under this icon: http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    1. Double-click OTL.exe to run (Vista and Win7 right click and select Run as Administrator)
    2. When OTL opens, change the Output (at the top-right portion of the program) to Minimal Output.
    3. Put check-marks in LOP Check and Purity Check.
    4. Now click the http://img171.imageshack.us/img171/2405/runscanotl.png button.



    • When the scan is complete, two logs entitled OTL.txt and Extras.txt will be created on your desktop.
    • Attach both of these logs to your next message.
     
  3. nykb

    nykb Private E-2

    I couldn't get Inherit exe or Win32Diag to work. Win32 said something about Vista but I'm on Windows 7 64 bit so maybe that's why? There was just no action on Inherit.
    Attached are the other logs.
    Should there also be a log for MGtools? I run that and got a bunch of OK dialog boxes.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I still need the logs from running OTL.

    If you ran MGTools.exe, yes there should be a log at C:\MGLogs.zip.
     
  5. nykb

    nykb Private E-2

    There's a bunch of text files, not sure what you're looking for so let me know the file name. As for OTL, I am running again, this time in compatibility mode, because it didn't produce anything last time. I will upload the logs shortly.
     
    Last edited: Oct 4, 2011
  6. nykb

    nykb Private E-2

    Here are the OTL files
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    NO!!! You are looking in the C:\MGtools folder. You are not supposed to look there. The log is not in that folder. It is C:\MGlogs.zip which is just compressed file containing all the logs we need. This was in the instructions.
     
  8. nykb

    nykb Private E-2

    Ah ok. When you said "a log" I thought you were just referring to one file within the zip. OK attached is the whole zip. Sorry for misunderstanding.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :otl
    
    :files
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    C:\Windows\assembly\tmp\U
    C:\Windows\assembly\tmp\U\00000001.@
    C:\Windows\assembly\tmp\U\00000002.@
    C:\Windows\assembly\tmp\U\000000c0.@
    C:\Windows\assembly\tmp\U\000000cb.@
    C:\Windows\assembly\tmp\U\000000cf.@
    C:\Windows\assembly\tmp\U\80000000.@
    C:\Windows\assembly\tmp\U\80000032.@
    C:\Windows\assembly\tmp\U\80000064.@
    C:\Windows\assembly\tmp\U\800000c0.@
    C:\Windows\assembly\tmp\U\800000cb.@
    C:\Windows\assembly\tmp\U\800000cf.@
    
    :reg
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.
    Please try to run RootRepeal and get me a log.

    Noiw re-run OTL and get me those logs as well.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip
     
    Last edited: Oct 5, 2011
  10. nykb

    nykb Private E-2

    Attached is the MGzip and the OTL log. RootRepeal zip says it does not run on a 64 bit OS so it wouldn't run. I accidently double clicked Getlogsbat but I'm logged in as an admin already so I think it's ok.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You never did tell me what AVG was complaining about. Your logs are looking good, but let's have you run OTL one more time. Attach the logs.


    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.


    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  12. nykb

    nykb Private E-2

    I am not actually sure where the text file logs are in AVG but I went back to the scan history and am attaching a screenshot.
    Attached also is the log from OTL. I still have yesterday's Extras on my desktop, it didn't produce a new log.
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    AVG was reporting what we just got finished fighting, a Zero Access infection. What malware issues ar you still having, if any?
     
  14. nykb

    nykb Private E-2

    I don't seem to have any more Malware issues. Everything is working. Thank you for your help.
    What should I do with all these programs I downled per your instructions?
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0


    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds