Malware Removal Assistance

Discussion in 'Malware Help (A Specialist Will Reply)' started by chondalar, Jul 4, 2012.

  1. chondalar

    chondalar Private E-2

    Hi there,

    Over the past couple of days I have experienced issues with malware on my PC.

    Namely the issues are the files:

    TR/ATRAPS.Gen2 & W32/Patched.ZA

    I am running Avira Antivir which identifies this malware but I am having trouble removing it even though I choose the option to remove when prompted by Avira Antivir.

    I have followed the steps posted by Chaslang.
    Please find attached the logs which were the outcome of running the various malware programs outlined in that post.

    Any assistance with removing these issues would be greatly appreciated.

    Cheers,
    Chondalar
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!


    Right click on RogueKiller.exe and select Run As Administrator. Click the Scan button again.
    • Then select the Registry tab and put check marks only on the below items ( uncheck anything other than these);
      • [SUSP PATH] HKCU\[...]\Run : TrpEfnxk (C:\Users\Jaclyn\AppData\Local\llxrunow\trpefnxk.exe) -> FOUND
      • [SUSP PATH] HKUS\S-1-5-21-773039124-3534946725-4237542823-1000[...]\Run : TrpEfnxk (C:\Users\Jaclyn\AppData\Local\llxrunow\trpefnxk.exe) -> FOUND
      • [SUSP PATH] HKLM\[...]\Winlogon : Userinit (C:\Windows\system32\userinit.exe,,,C:\Users\Jaclyn\AppData\Local\llxrunow\trpefnxk.exe) -> FOUND
      • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Jaclyn\AppData\Local\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\n.) -> FOUND
    • Then on the Files tab see if you can select and delete the below
      • [ZeroAccess][FILE] @ : c:\windows\installer\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\@ --> FOUND
      • [ZeroAccess][FOLDER] U : c:\windows\installer\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\U --> FOUND
      • [ZeroAccess][FOLDER] L : c:\windows\installer\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\L --> FOUND
      • [ZeroAccess][FILE] @ : c:\users\jaclyn\appdata\local\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\@ --> FOUND
      • [ZeroAccess][FOLDER] U : c:\users\jaclyn\appdata\local\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\U --> FOUND
      • [ZeroAccess][FOLDER] L : c:\users\jaclyn\appdata\local\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\L --> FOUND
      • [ZeroAccess][FILE] Desktop.ini : c:\windows\assembly\gac\desktop.ini --> FOUND
    Then immeditaly reboot your PC. After reboot continue with the below.

    Run a new scan with RogueKiller and attach the new log. Also do the below.

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.


    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
    Last edited: Jul 4, 2012
  3. chondalar

    chondalar Private E-2

    Hi Chaslang,

    Thanks for your help.

    I have followed all of the steps that you outlined in your previous post. However, there was one file that you quoted from my previous log that didnt appear in the RogueKiller scan the second time around and as a result I could not delete it.

    • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Jaclyn\AppData\Local\{072ad5e9-015b-b9d4-f9ff-e656ec6f5f07}\n.) -> FOUND

    As I type Avira Antivir is continually alerting me to the detection of
    W32/Patched.ZA found in C:\Windows\System32\services.exe

    Please find attached the logs resulting from the RogueKiller and FRST.exe scans.

    Thanks again for your assistance.

    Cheers,
    chondalar
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Download this >> View attachment fixlist.txt


    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now boot into normal Windows can continue with the below.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • Fixlog.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  5. chondalar

    chondalar Private E-2

    Hi chaslang,


    Here are the two logs as requested.

    The virus alerts from Avira Antivir have ceased. I guess this has been resolved?

    Thanks again, your assistance is much appreciated.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Looks much better but you have some residual damage to some services and registry keys to fix. These are impacting your Windows Firewall.

    Be patient while doing the below. The fixes can take quite awhile to run. Especially the permissions repairs. It may be best to kick it off and goto bed or do something else. It is better not to run anything while the repairs are going on.


    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
     
  7. chondalar

    chondalar Private E-2

    Hi chaslang,

    The steps outlined previously have been completed.

    Please find the MGlogs.zip file attached.

    The properties menu says that it hasnt been modified since Wednesday. Should the previous actions have changed this file?

    cheers,
    chondalar
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes normally it is and the files in the ZIP are from July 6th.

    Your firewall is working now.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key http://forums.majorgeeks.com/chaslang/images/Windows_Logo_key.gif and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds