I think I have a Key Logger Infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by Interceptpoint, Jun 9, 2010.

  1. Interceptpoint

    Interceptpoint Private E-2

    I'm pretty sure I have a Key Logger infection. Symptoms are uuu.uuu and xxx.xxx in the ../appdata/local/temp directory. These files continuously refresh and cannot be deleted or renamed. Malwarebytes finds them and claims to fix but I don't think the post-reboot Malwarebytes step is being completed. In any case Malwarebytes did not fix the problem.

    Also System Restore (Vista 64 bit) aborts, reports a dangerous process and reboots. Tried twice. Failed the same way twice.

    I've gone through all of the startup steps, done the msconfig stuff and the cleaning etc. and downloaded the files and ran the three Vista compatible scans. I could not find the SUPERAntiSpyware log but nothing was detected by SAS except 22 Adware cookies so I don't think the log would help you much.

    The Mbam log and the MGlogs.zip file are attached. Hoping you guys have seen this one before.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    1. The log for SUPERantispyware is here, and although you say it only found tracking cookies I would still like to see it just in case perhaps the program or database was out of date.
    2. Please go to Add/Remove programs and uninstall the following software:

    • Java(TM) 6 Update 16

    3. Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.

    4. Please go to Jotti's malware scan

    (If more than one file needs scanned they must be done separately and logs posted for each one)
    • Copy the file path in the below Code box:
      Code:
      C:\Users\Jeff\AppData\Roaming\system\kernel.exe
    • At the upload site, click the browse button.
    • Next click Submit file
    • Your file will possibly be entered into a queue which normally takes less than a minute to clear.
    • This will perform a scan across multiple different virus scanning engines.
    • Important: Wait for all of the scanning engines to complete.
    • Once the scan is finished, Copy and then Paste the link in the address bar into your next reply.

    5. Could you please get this: kernel.exe into a zipped file and attach it for me in your next post? To do this, see the below:

    Please go to start > Run and paste in the following:

    log retrievable @ C:\collect.zip


    6. What is inside of this directory? Let me know without clicking on any of the contents.

    7. Do you know what these files relate to? If you don't know, are you able to glean any information from examining the properties of the file or perhaps right clicking and send to > word pad or notepad?

    8. Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    
    :services
    ASKService
    ASKUpgrade
    
    :Files
    C:\Users\Jeff\AppData\Local\Temp\110646439.od
    C:\Users\Jeff\AppData\Local\Temp\115936245.od
    C:\Users\Jeff\AppData\Local\Temp\118262532.od
    C:\Users\Jeff\AppData\Local\Temp\125122161.od
    C:\Users\Jeff\AppData\Local\Temp\130055209.od
    C:\Users\Jeff\AppData\Local\Temp\133007170.od
    C:\Users\Jeff\AppData\Local\Temp\143842905.od
    C:\Users\Jeff\AppData\Local\Temp\175355903.od
    C:\Users\Jeff\AppData\Local\Temp\179638926.od
    C:\Users\Jeff\AppData\Local\Temp\949890.od
    C:\Users\Jeff\AppData\Local\Temp\CVR128E.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR3671.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR5468.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR7C29.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR7E82.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR8742.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR8AE5.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRB7EF.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRBF5.tmp
    C:\Users\Jeff\AppData\Local\Temp\CVRDE59.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\jKeShA4a.html.part
    C:\Users\Jeff\AppData\Local\Temp\Low
    C:\Users\Jeff\AppData\Local\Temp\UuU.uUu
    C:\Users\Jeff\AppData\Local\Temp\VBE
    C:\Users\Jeff\AppData\Local\Temp\VGX32B3.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGX3EB6.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGX5A13.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGX7BD3.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGX8B9B.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGXABE7.tmp
    C:\Users\Jeff\AppData\Local\Temp\XxX.xXx
    C:\Users\Jeff\AppData\Local\Temp\{AC76BA86-1033-F400-7760-000000000004}
    C:\Users\Jeff\AppData\Local\Temp\~27F9.tmp
    C:\Users\Jeff\AppData\Local\Temp\~2B92.tmp
    C:\Users\Jeff\AppData\Local\Temp\~42BA.tmp
    C:\Users\Jeff\AppData\Local\Temp\~6FA3.tmp
    C:\Users\Jeff\AppData\Local\Temp\~7290.tmp
    C:\Users\Jeff\AppData\Local\Temp\~859.tmp
    C:\Users\Jeff\AppData\Local\Temp\~DF2F89.tmp
    C:\Users\Jeff\AppData\Local\Temp\~DF4BCB.tmp
    C:\Users\Jeff\AppData\Local\Temp\~DF5BA7.tmp
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

    9. Also delete all files in the below bold folder except ones from the current date (Windows will not let you delete the files from the current day).

    10. Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this and also post the jotti results, the OTM log, collect.zip, the SAS log and answer any questions that I asked.

    11. How are things running now?
     
    Last edited: Jun 10, 2010
  3. Interceptpoint

    Interceptpoint Private E-2

    1. SAS log is attached.

    2. Deleted Java 6 Update 16.

    3. McAfee disabled including reboot. HiJack fix ran OK. After re-boot I found two unexpected and probably not important .ini files. Here is the text from these files:

    ********************************************
    desktop.ini #1

    [.ShellClassInfo]
    LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21769
    IconResource=%SystemRoot%\system32\imageres.dll,-183
    [LocalizedFileNames]
    Windows Media Player.lnk=@%SystemRoot%\system32\unregmp2.exe,-4
    Windows Media Player (2).lnk=@%SystemRoot%\system32\unregmp2.exe,-4
    MozyHome Status.lnk=@C:\PROGRA~1\MozyHome\oem.dll,-20101
    Notepad.lnk=@%SystemRoot%\system32\shell32.dll,-22051

    **********************************************
    desktop.ini #2

    [.ShellClassInfo]
    LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21799

    **********************************************

    4. Jotti Link:http://virusscan.jotti.org/en/scanresult/9abde518a4e939788cf07fc881343f0ae2f44576

    5. Collect.zip is attached.

    6. C:\ProgramData\~0 has only one file: mia.lib, 566KB, created Tuesday March 23, 2010.

    7a. c:\windows\fnerr.dat - No idea what this is. 88 bytes. Created/Modified/Accessed on April 14, 2010.

    7b. c:\windows\gjzsysdxt.txt: READS AS FOLLOWS:
    "Files to move:
    C:\WINDOWS\SYSTEM32\logevent.dll|C:\WINDOWS\SYSTEM32\eventlog.dll"

    7. c:\windows\system32\miglk.txt: NO LONGER IN THE SYSTEM32 FOLDER (note: after HJK and re-boot).

    8. All processes killed
    ========== SERVICES/DRIVERS ==========
    Service ASKService stopped successfully!
    Service ASKService deleted successfully!
    Service ASKUpgrade stopped successfully!
    Service ASKUpgrade deleted successfully!
    ========== FILES ==========
    C:\Users\Jeff\AppData\Local\Temp\110646439.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\115936245.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\118262532.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\125122161.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\130055209.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\133007170.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\143842905.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\175355903.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\179638926.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\949890.od moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR128E.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR3671.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR5468.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR7C29.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR7E82.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR8742.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVR8AE5.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVRB7EF.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVRBF5.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\CVRDE59.tmp.cvr moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\jKeShA4a.html.part moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\Low\AskBarDis\bar\RSS\1 folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\Low\AskBarDis\bar\RSS folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\Low\AskBarDis\bar folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\Low\AskBarDis folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\Low folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\UuU.uUu moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VBE folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX32B3.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX3EB6.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX5A13.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX7BD3.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX8B9B.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGXABE7.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\XxX.xXx moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\{AC76BA86-1033-F400-7760-000000000004} folder moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~27F9.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~2B92.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~42BA.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~6FA3.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~7290.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~859.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~DF2F89.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~DF4BCB.tmp moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\~DF5BA7.tmp moved successfully.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 33170 bytes
    ->Flash cache emptied: 41 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Guest
    ->Temp folder emptied: 51227 bytes
    ->Temporary Internet Files folder emptied: 198597 bytes
    ->FireFox cache emptied: 3363151 bytes
    ->Flash cache emptied: 84 bytes

    User: Jeff
    ->Temp folder emptied: 76832408 bytes
    ->Temporary Internet Files folder emptied: 8791951 bytes
    ->Java cache emptied: 74068532 bytes
    ->FireFox cache emptied: 40107637 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Apple Safari cache emptied: 90932 bytes
    ->Flash cache emptied: 1980782 bytes

    User: Jeff_administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Jeff_ASPNET
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Lisa
    ->Temp folder emptied: 192377 bytes
    ->Temporary Internet Files folder emptied: 12552790 bytes
    ->Java cache emptied: 1666627 bytes
    ->FireFox cache emptied: 25840968 bytes
    ->Flash cache emptied: 1830 bytes

    User: Public

    User: Radarcivilian
    ->Temp folder emptied: 73398 bytes
    ->Temporary Internet Files folder emptied: 886786 bytes
    ->FireFox cache emptied: 72447043 bytes
    ->Flash cache emptied: 4866 bytes

    User: Remotecivilian
    ->Temp folder emptied: 113988 bytes
    ->Temporary Internet Files folder emptied: 3434837 bytes
    ->Java cache emptied: 25795379 bytes
    ->FireFox cache emptied: 58681162 bytes
    ->Flash cache emptied: 8321 bytes

    User: TEMP
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 32768 bytes
    ->Flash cache emptied: 41 bytes

    User: TEMP.Jeff_Core_i7
    ->Temp folder emptied: 3420956 bytes
    ->Temporary Internet Files folder emptied: 164259 bytes
    ->Java cache emptied: 9236111 bytes
    ->FireFox cache emptied: 45524955 bytes
    ->Google Chrome cache emptied: 10724702 bytes
    ->Flash cache emptied: 605 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 9855808 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 66568 bytes
    %systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 753 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33371 bytes
    RecycleBin emptied: 3705245 bytes

    Total Files Cleaned = 467.00 mb


    OTM by OldTimer - Version 3.1.12.2 log created on 06102010_103348

    Files moved on Reboot...
    C:\Users\Jeff\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
    C:\Users\Jeff\AppData\Local\Temp\VGX6E5D.tmp moved successfully.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WU4Y4WR0\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZ6XMK2\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R56AG8EK\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQTAMFC6\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HRRCIS96\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ECMOXKGM\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2498Q9PZ\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini scheduled to be moved on reboot.
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini scheduled to be moved on reboot.

    Registry entries deleted on Reboot...

    9. Deleted all files in ..\AppData\Local\Temp. 4 files remain:
    XxX.xXx (one of the problem files for sure)
    UuU.uUu (also a problem file)
    VGXA535.tmp (Windows claims it's in use)
    FXSAPIDebugLogFile.txt (Windows claims it's in use but it is EMPTY - Size 0 KB)

    10. Things are running fine - I really haven't had any slowdown in performance but I would expect that with a key logger.

    But as long as I have the XxX.xXx and UuU.uUu files functioning I assume I'm not clean. These files are still updating themselves every minute.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I'll change the boiler plate to "attach" the log rather than pasting.

    @Intercept point... you forgot to attach the C:\Mglogs.zip

    Please do so and I can give you the next fix. There's still malware to remove.
     
  5. Interceptpoint

    Interceptpoint Private E-2

    Sorry about that. Just missed it.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Your last MGlogs.zip is very incomplete. Please re run C:\MGTools.exe and attach the new C:\Mglogs.zip into your next reply. Let it run to completion, be patient and just wait until it says hit any key to continue
     
  7. Interceptpoint

    Interceptpoint Private E-2

    I keep making mistakes. You guys are so patient. Here is the new MGLogs.zip file.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    1. Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    • O4 - HKLM\..\Run: [HKLM] C:\Users\Jeff\AppData\Roaming\system\kernel.exe
    • O4 - HKCU\..\Run: [HKCU] C:\Users\Jeff\AppData\Roaming\system\kernel.exe
    • O4 - HKLM\..\Run: [updaters.exe] C:\windows\updaters.exe
    • O4 - HKCU\..\Run: [updaters.exe] C:\windows\updaters.exe
    • O4 - HKCU\..\Run: [0x017] 0x017
    • O4 - HKLM\..\Policies\Explorer\Run: [Policies] C:\Users\Jeff\AppData\Roaming\system\kernel.exe
    • O4 - HKCU\..\Policies\Explorer\Run: [Policies] C:\Users\Jeff\AppData\Roaming\system\kernel.exe

    After clicking Fix exit HJT.

    2. OTM


    Code:
    
    :Files
    C:\Users\Jeff\AppData\Roaming\system\kernel.exe
    C:\Users\Jeff\AppData\Roaming\system
    C:\Windows\updaters.exe
    c:\windows\fnerr.dat
    C:\Users\Jeff\AppData\Local\Temp\1534862.od
    C:\Users\Jeff\AppData\Local\Temp\2864911.od
    C:\Users\Jeff\AppData\Local\Temp\33611429.od
    C:\Users\Jeff\AppData\Local\Temp\439mm_FUD.exe
    C:\Users\Jeff\AppData\Local\Temp\579465.od
    C:\Users\Jeff\AppData\Local\Temp\724921.od
    C:\Users\Jeff\AppData\Local\Temp\82809121.od
    C:\Users\Jeff\AppData\Local\Temp\9289391.od
    C:\Users\Jeff\AppData\Local\Temp\CVR6B8E.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVR9121.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRB70F.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRBEAF.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRD789.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRDEA5.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\CVRFB9.tmp.cvr
    C:\Users\Jeff\AppData\Local\Temp\Server.exe
    C:\Users\Jeff\AppData\Local\Temp\SSUPDATE64.EXE
    C:\Users\Jeff\AppData\Local\Temp\UuU.uUu
    C:\Users\Jeff\AppData\Local\Temp\VBE
    C:\Users\Jeff\AppData\Local\Temp\VGX394A.tmp
    C:\Users\Jeff\AppData\Local\Temp\VGXEC43.tmp
    C:\Users\Jeff\AppData\Local\Temp\XxX.xXx
    C:\Users\Jeff\AppData\Local\Temp\xxxyyyzzz.dat
    C:\Users\Jeff\AppData\Local\Temp\{AC76BA86-1033-F400-7760-000000000004}
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "updaters.exe"=-
    "0x017"=-
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
    "NoActiveDesktop"=-
    "NoActiveDesktopChanges"=-
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), into notepad and attach it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.

    3. Please go to Add/Remove programs and uninstall the following software:
    • Java(TM) 6 Update 14 (64-bit)
    • Java(TM) SE Development Kit 6 Update 14 (64-bit)

    4. Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this and also attach the log from OTM.

    5. Let me know how things are running.
     
  9. Interceptpoint

    Interceptpoint Private E-2

    1. Ran HiJack but these were not found:

    * O4 - HKLM\..\Run: [updaters.exe] C:\windows\updaters.exe
    * O4 - HKCU\..\Run: [0x017] 0x017

    2. Ran OTM OK. Rebooted. Log attached.

    3. Deleted Java files OK.

    4. Ran GetLogs.bat. MGlogs.zip attached.

    5. I've still got the UuU.uUu and XxX.xXx files that were the original sign of infection that can't be deleted so we aren't finished.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    With a 64 bit system we are limited as to what tools we can use. OTM does not seem to be cutting it here. Hmm, whilst I have a word with a colleague could you please reboot into safe mode.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.

    Use windows explorer to find and delete the below:

    If you are unable to delete them try renaming them to xXx.old
    and UuU.old, kernel.exe.old and then attempt deletion once more.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
    Last edited: Jun 14, 2010
  11. Interceptpoint

    Interceptpoint Private E-2

    OK. 04-HKCU\... deleted OK

    XxX.xXx deleted OK in safe mode
    UuU.uUu deleted OK in safe mode
    kernel.exe deleted OK in safe mode

    MGlogs.zip is attached.
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now reboot into normal mode and complete the below:

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  13. Interceptpoint

    Interceptpoint Private E-2

    Things look pretty good at this end doctor. So I hope my X-rays look good to you.

    See attached MGLogs.zip
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Well, doctor says "one more prescription"

    C:\Windows\updaters.exe <--- I want you to again reboot into safe mode, and attempt to delete this bold file, if necessary do a rename as I suggested before if you have trouble, rename to updaters.exe.old. Then reboot into NORMAL mode and do this:

    Also delete all files in the below bold folders except ones from the current date (Windows will not let you delete the files from the current day).

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this. :)
     
  15. Interceptpoint

    Interceptpoint Private E-2

    Deleted: C:\windows\Updaters.exe
    Deleted all files in C:\Windows\TEMP

    Deleted all files but 1 in C:\Users\Jeff\AppData\Local\Temp
    Could not delete FSXAPIDebugLogFile.txt which was empty

    All of the above in SAFE MODE

    In Normal mode re-ran GetLogs.bat in Admin mode

    See attached MGLogs.zip file
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Sweet. Looking better. Let's just delete the below bold folder.

    • Please double-click OTL.exe to run it.
    • Click on the CleanUp! button at upper Right corner.
    • When you do this a text file named cleanup.txt will be downloaded from the internet.
    • If you get a warning from your firewall or other security programs regarding OTL attempting to contact the internet you should allow it to do so. After the list has been download you'll be asked if you want to Begin cleanup process? Select Yes.
    • This step removes the files, folders, and shortcuts created by the tools I had you download and run.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  17. Interceptpoint

    Interceptpoint Private E-2

    You did well doctor. The patient has survived yet another malicious attack.

    I re-ran Malwarebytes, found 3 items that were deleted without a reboot, everything else looks OK so I think I'm fine.

    Much thanks to you guys. You are the best.
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Could you attach the MBAM log just out of interest? I'm curious.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds