Conficker in External hdd not in the system

Discussion in 'Malware Help (A Specialist Will Reply)' started by infoseeker, Nov 29, 2009.

  1. infoseeker

    infoseeker Master Sergeant

    its in the external HDD 120gb 2.5

    im using
    NOd32 -heres the log of noD32
    it offers me reboot to clean- but still after rebooting - still there :(

    i tried those tools from
    F-Secure
    bit defender
    sophos
    symantec

    but no luck :(

    the mcafee stinger can trace but cant clean
    heres the log of mcafee stinger
    im using Win7 and i did not yet open that external in my window so far coz im afraid of the infections in any way

    i even turned-on the AV/AS of the zonealarm- still same it detects but cant clean it


    any option?

    thanks and best regards,


    infoseeker
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You must have had the external open or attached for something to report it. Exactly what did it report? I don't want the name given it, I want the exact path.

    In the meantime, with the external connected, please do the following:

    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.

    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.


    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:


    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:

    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:

    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. infoseeker

    infoseeker Master Sergeant

    ok thanks timw

    for some reason that i dont know - cant detect that now :) so far so good ;)

    heres the log
     

    Attached Files:

  4. infoseeker

    infoseeker Master Sergeant

    sad to say

    NOD32 -still detect it :(

    K:\RECYCLER\S-5-3-42-2819952290-8240758988-879315005-3665\jwgkvsq.vmx - a variant of Win32/Conficker.AA worm - cleaned by deleting (after the next restart) - quarantined
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Empty your recycle bin in the external HHD.

    Now go to C:\Users\infoseeker\Local Settings\TEMP
    and delete:
    C:\Users\infoseeker\Local Settings\TEMPypt19C3.tmp
    C:\Users\infoseeker\Local Settings\TEMP\ypt2201.tmp
    C:\Users\infoseeker\Local Settings\TEMP\ypt364C.tmp
    C:\Users\infoseeker\Local Settings\TEMP\yptEFEA.tmp

    Now go to C:\MGTools and click on analyse.exe....tell me what happens? Does it run? Did it produce a log? Check the MGLogs.zip to see if it was added. Attach it if it did.
     
  6. infoseeker

    infoseeker Master Sergeant

    (recycle bin is deleted on that external)
    i cannot empty nor delete that recycler folder

    access is denied on that C:\Users\infoseeker\Local Settings\TEMP :(


    HJT for that analyse is attached
     

    Attached Files:

  7. infoseeker

    infoseeker Master Sergeant

    update:

    recycler is gone

    - i restart, i activate the AV/AS of my ZonAlarm
    scanned and detected that jwgkvsq.vmx and ZA put it in quarantined - then i delete that in quarantined area
    and with the help of google- i found the "ownership context menu" for to delete- luckily its gone :)
    - and after that i deactivate my AV/AS on ZA so that no conflict on my NOD32


    please let me know if there still needs to clean on my log on hjt and how to delete those on TEMP you mentioned


    thanks in advance TiM
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Win7.....let's try using PocketKill Box.

    Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.*(or on the folders option)*
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Users\infoseeker\Local Settings\TEMPypt19C3.tmp
    C:\Users\infoseeker\Local Settings\TEMP\ypt2201.tmp
    C:\Users\infoseeker\Local Settings\TEMP\ypt364C.tmp
    C:\Users\infoseeker\Local Settings\TEMP\yptEFEA.tmp

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    * Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Tell me if they are now gone.
     
  9. infoseeker

    infoseeker Master Sergeant

    Thanks tim

    all is doing fine now

    Temp is come and go with different file name
    its going out after running CCLEANER

    thanks again tim
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are quite welcome....time now to do the final clean up.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real-time protection. They are useful as backup scanners.They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    3. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore ato create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds