Is There A Virus Or Malware With ZZZZZZ As The File Name

Discussion in 'Malware Help (A Specialist Will Reply)' started by highbids, Dec 17, 2010.

  1. highbids

    highbids Private E-2

    I've got a folder I'm trying to delete with the name of KOWHUOSQ and inside
    of that there's a subfolder named ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
    and two files inside that one.

    I've tried everything to delete it, secure file shredders moving it & booting
    into safe mode & nothing seems to work, It's a read only file that won't
    let me delete it.
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  3. highbids

    highbids Private E-2

    I followed the instruction like you said it's still there & not able to be deleted.
     
  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    highbids

    *You have not completed our instructions.
     
  5. highbids

    highbids Private E-2

    I did everything mentioned above & still it's there.
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    So attach logs then so we can actually get to work on eradicating the malware. ;) Without us seeing logs, we cannot do anything!
     
  7. highbids

    highbids Private E-2

    hjt log
     

    Attached Files:

    Last edited by a moderator: Dec 17, 2010
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    We did not request a HJT log. :(

    And you are not attaching items. We do not post "inline" like some forums do.

    Please refer to the below before you continue, and then once done, please only attach REQUESTED logs.


    HOW TO: Attach Items To Your Post
     
  9. highbids

    highbids Private E-2

    Now whats the next step
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I'm afraid you are just going to have to READ the instructions!

    We need you to run:

    • SUPERantispyware
    • MalwareBytes
    • Combofix
    • MGTools
    • RootRepeal

    DO NOT post back until you have done that and attached logs from those programs.
     
  11. highbids

    highbids Private E-2

    I've done all the scans & have attached the file here's the first attachments.
     

    Attached Files:

  12. highbids

    highbids Private E-2

    Here's the second batch of logs. Combofix said it found a rootkit
    and seemed to have cleaned it. I still cannot delete the folder with
    all the zzz's in it.

    When I ran MGtools.exe there was a error here it is.

    This application has failed to start because framedyn.dll was not found. Re-installing
    the application may fix this problem.

    I don't know if it's important or not but it said that the framedyn.dll was missing.
     

    Attached Files:

    Last edited: Dec 19, 2010
  13. highbids

    highbids Private E-2

    I've got "Paragon Backup & Recovery 2010" I tried to disable it
    before I ran all the tools but couldn't figure out how to.
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing that folder in your logs. Please tell me the exact path to the folder, please.
     
  15. highbids

    highbids Private E-2

    D:\Backup\KOWHUOSQ\ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ\

    Then there's two sub folders that I cannot get into with these names.

    BQJU & CCAUU when I click on those two folders it says access denied.

    The folder is on my second drive D & has all my passwords & logins.

    I had roboform installed & all the data was being backed up to it's
    own folder D:\Backup\Roboform

    Roboform quit working and I then downloaded the latest version of roboform
    & manually restored all my logins & passwords & it's working fine now.

    I'm trying to find out if this is a rootkit,keylogger or a virus
    and if it's stolen all my login info banking info etc.

    I've got text files inside that backup folder that list all my login info that's not password protected whats a simple way to password protect the folder.
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run MBAM and do a deep scan that includes the D: drive. Attach the resultant log.
     
  17. highbids

    highbids Private E-2

    I did that here's the log file.
     

    Attached Files:

  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let me get clear about this. You want to remove:
    D:\Backup\KOWHUOSQ

    In this folder there is another folder called:
    D:\Backup\KOWHUOSQ\ZZZZZZZZZZZZZ

    and within this folder there are two more titled:
    BQJU & CCAUU ?

    What software have you tried using to remove it?
     
  19. highbids

    highbids Private E-2

    I just removed it by using tuneup shreader by TuneUp Utilities 2010
    and it removed it alright, but it then created a new folder

    ZZZZZZZZ with those two same files inside of it.

    I've tried Absoluteshield file shredder,TuneUp Utilities 2010
    CyberScrub Privacy Suite
     
  20. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Is the D: drive a partition or an external drive?
     
  21. highbids

    highbids Private E-2

    The D drive is a external drive.
     
  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Then have you considered transferring your data back to your C; drive and reformatting the external?

    We could try using Avenger:

    Download The Avenger by Swandog469, and save it to your Desktop.

    * Extract+ avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.
     
  23. highbids

    highbids Private E-2

    What is Avenger
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It's a program that can be used to remove folders, files and registry items.
     
  25. highbids

    highbids Private E-2

    I put in the path to it D:\Backup\ZZZZZZZZ and it says

    Invalid script must begin with a command directive.
     
  26. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Did you precede the file path with:
    Folders to delete:
     
  27. highbids

    highbids Private E-2

    I just put it into the box like this D:\Backup\ZZZZZZZZ

    thats the exact path thats showing in explorer how should
    I write it can you post the correct path i should use.
     
  28. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

     
  29. highbids

    highbids Private E-2

    Ok it got rid of it but it's now in a folder on my D: drive that avenger created
    or the rootkit did.

    I also I didn't check the box that says automatically disable
    any rootkits if that matters.

    Here's where it at now.

    D:\Avenger\ZZZZZZZZ

    I uploaded the Avenger log file.
     

    Attached Files:

  30. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Avenger has quarantined it. Plus I am starting to think it may be a folder that is associated with your external drive, not malware. If you want to see if you can remove it completely, I suggest you copy all your data off the drive to either a cd or a folder on your C: drive and reformat the external. Then see if it re-appears.
     
  31. highbids

    highbids Private E-2

    Thanks tim I'll do that, I've got killdisk on a cd would you reccomend using that or just format the drive in xp.
     
  32. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You should be able to just format the drive in windows. And you are most welcome.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  33. highbids

    highbids Private E-2

    Just to double check i ran combofix again & it detected the
    presense of a rootkit so I attached the log.

    Drweb has quaranteened three files two av-test.txt and one named
    a0000089.bat which was in the system restore.

    I uploaded a pic for you to check out.

    http://tinypic.com/r/5xo4fa/7
     
  34. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The log did not attach.

    Also :

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  35. highbids

    highbids Private E-2

    Sorry about that here's combofix's log & Drwebs quarantined files.
     

    Attached Files:

  36. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    What dr web found, two were in temporary location, Other one is in system restore and will only stop being detected when you follow final steps. Run the below:

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )

    Then:
    run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  37. highbids

    highbids Private E-2

    I ran it & it found nothing here's the log.
     

    Attached Files:

  38. highbids

    highbids Private E-2

    Here's the MGlogs.zip file
     

    Attached Files:

  39. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Dr.Web found nothing valid and ComboFix is only detecting the hooks of Dr.Web. You need to complete the final instructions that TimW gave you in message # 32.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds