GAC_32/64\desktop.ini

Discussion in 'Malware Help (A Specialist Will Reply)' started by dlmcmurr, Dec 1, 2012.

  1. dlmcmurr

    dlmcmurr Private E-2

    Working on a Win 7 Home 64 system for a friend. My first exposure to a rootkit. I had already removed a lot of problems using SUPERantispyware and MalwareBytes. Then the standalone AVG spotted the problem with services.exe. I've repaired that then discovered the MBR problem and am about to exceed my experience level. Still getting popups when browsing. View attachment RKreport[1]_S_11302012_02d2109.txt

    View attachment mbam-log-2012-11-30 (21-01-39).txt

    View attachment TDSSKiller.2.8.15.0_30.11.2012_21.14.57_log.txt

    View attachment HitmanPro_20121130_2128.log

    View attachment MGlogs.zip
     
  2. dlmcmurr

    dlmcmurr Private E-2

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall this >> Yontoo Layers Client

    See if you can find and delete the below folder:
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}

    Reboot after deleting and then double check to make sure it does not come back.

    Which browsers, if any, are still having redirection problems?
     
  4. dlmcmurr

    dlmcmurr Private E-2

    1. The uninstall worked.

    2. With some difficulty, I was able to delete the folder mentioned. It hasn't come back.

    3. The system only has IE9 on it.

    Thanks,
    Dave
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Okay. Are you still having redirects?
     
  6. dlmcmurr

    dlmcmurr Private E-2

    I haven't noticed it yet.

    Do I need to worry about the GAC_32/64\desktop.ini infection or the reported problem with the MBR?

    Thanks,
    Dave
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Those files are already gone, but we do have some other items to fix. I just was curious on whether the redirects were still happening right now.


    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run
    As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX
    until you exit all browser sessions including the one you are reading in right now:
    R3 - URLSearchHook: (no name) - - (no file)
    O2 - BHO: ArcadeCandy Games - {AB6BD08C-DB6B-4F02-8A22-4BD343E990FF} - C:\Users\Joy Selvidge\AppData\Local\ArcadeCandy\candyEX.dll
    O2 - BHO: MediaBar - {c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c} - (no file)
    O2 - BHO: Updater For Simppull Toolbar - {C4B8BAB4-1667-11DF-A242-BA9455D89593} - (no file)
    O2 - BHO: (no name) - {E4E6BF2A-1667-11DF-A01F-1F9655D89593} - (no file)
    O3 - Toolbar: (no name) - {c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c} - (no file)
    O3 - Toolbar: (no name) - !{2c1e21b5-5666-4cd5-8152-96b690b7216e} - (no file)
    O3 - Toolbar: (no name) - !{B821BF60-5C2D-41EB-92DC-3E4CCD3A22E4} - (no file)

    After clicking Fix, exit HJT.

    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    :Files
    C:\Users\Joy Selvidge\AppData\Local\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\@
    C:\Users\Joy Selvidge\AppData\Local\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\L
    C:\Users\Joy Selvidge\AppData\Local\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\U
    C:\Users\Joy Selvidge\AppData\Local\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\@
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\L\00000004.@
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\L\1afb2d56
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\L\201d3dde
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\L
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}\U
    C:\Windows\Installer\{c82640b9-f59e-6ef3-9832-5fcab3f9515f}
    C:\Users\Joy Selvidge\AppData\LocalLow\DataMngr\{7CA1F051-A4FB-4143-B263-02B41E571EED}
    C:\Users\Joy Selvidge\AppData\LocalLow\DataMngr
    C:\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\_Setupx.dll
    C:\Users\Joy Selvidge\AppData\Local\ArcadeCandy\candyEX.dll
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AB6BD08C-DB6B-4F02-8A22-4BD343E990FF}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C4B8BAB4-1667-11DF-A242-BA9455D89593}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E4E6BF2A-1667-11DF-A01F-1F9655D89593}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{c2d64ff7-0ab8-4263-89c9-ea3b0f8f050c}"=-
    "!{2c1e21b5-5666-4cd5-8152-96b690b7216e}"=-
    "!{B821BF60-5C2D-41EB-92DC-3E4CCD3A22E4}"=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{A1F1ECD3-4806-44C6-A869-F0DADF11C57C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{D74CCC9B-C87E-49B8-B686-5DFEED1CCF08}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2F3646F-8BEE-4D69-856A-8434159A6E9E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D74CCC9B-C87E-49B8-B686-5DFEED1CCF08}]
    [-HKEY_USERS\S-1-5-21-581310276-1093699521-47977366-1000\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\{DB38E21A-0133-419d-92AD-ECDFD5244D6D}]
    [-HKEY_USERS\S-1-5-21-581310276-1093699521-47977366-1000\Software\Microsoft\Internet Explorer\LowRegistry\Extensions\CmdMapping\{EB620C54-E229-4942-87CE-E717109FC8C6}]
    [-HKEY_USERS\S-1-5-21-581310276-1093699521-47977366-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A2F3646F-8BEE-4D69-856A-8434159A6E9E}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD22}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD22}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{acbd5593-e5ee-4c15-b48f-1823ce819dec}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{d43b3890-80c7-4010-a95d-1e77b5924dc3}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{d944bb61-2e34-4dbf-a683-47e505c587dc}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double
    click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  8. dlmcmurr

    dlmcmurr Private E-2

    Haven't done a lot of browsing yet, but I haven't had any problems yet. Note that I disabled Panda AV before downloading OTM. When rebooting, it reenabled and removed OTM on startup. Don't know if that affected the log or not.

    Thanks,
    Dave
    View attachment 12012012_212830.log

    View attachment MGlogs.zip
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    8. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  10. dlmcmurr

    dlmcmurr Private E-2

    chaslang,

    Thanks so much for your help. I haven't noticed any problems yet.

    Thanks,
    Dave
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds