Re: Trojan Patched c.lyt + Windows Update not working

Discussion in 'Malware Help (A Specialist Will Reply)' started by TheRealStig, Aug 6, 2012.

  1. TheRealStig

    TheRealStig Private E-2

    Hi,

    My laptop has been infected with several Trojans - I had tried Malwarebytes, SuperAntiSpyware, Ccleaner, McAfee Stinger and the installed AVG Antivirus before stumbling upon the post by Chaslang posted 10-04-07
    http://forums.majorgeeks.com/showthread.php?t=35407

    I ran the 4 scans - situation is better but not 100% solved.
    My AVG has stopped popping warnings but Stinger and ESET onlinescanner still detects trojan.
    Also, Windows update does not work, stating that "Windows Update is not able to search for Updates as the service is not running - it might be necesary to restart the computer". Which I've done to no help.

    I'm running Vista Home basic, SP2 in Brazilian-Portuguse.

    Thanks a lot in advance

    Stig
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  3. TheRealStig

    TheRealStig Private E-2

    Hi Kestrel13!

    Thanks a lot for quick reply.
    I saved the FARBAR 32bits (correct) to a flashdrive, plugged it in when computer started (recognised normally), then restarted tapping F8.
    But I only get the error DISK ERROR - PRESS ANY KEY TO RESTART

    I don't have the windows install disc with me right now - any other options?

    Thanks

    Stig
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Files/Folder tab and locate these 6 detections:
    • [ZeroAccess][FILE] @ : c:\windows\installer\{b0a567b9-4f39-9074-de85-39456d56048b}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : c:\windows\installer\{b0a567b9-4f39-9074-de85-39456d56048b}\U --> FOUND
    • [ZeroAccess][FOLDER] L : c:\windows\installer\{b0a567b9-4f39-9074-de85-39456d56048b}\L --> FOUND
    • [ZeroAccess][FILE] @ : c:\users\administrador\appdata\local\{b0a567b9-4f39-9074-de85-39456d56048b}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : c:\users\administrador\appdata\local\{b0a567b9-4f39-9074-de85-39456d56048b}\U --> FOUND
    • [ZeroAccess][FOLDER] L : c:\users\administrador\appdata\local\{b0a567b9-4f39-9074-de85-39456d56048b}\L --> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.



    C:\ProgramData\036DFF982B17ABE9BF7F44A92F3B707C <--- What's inside this folder? If empty, delete it.

    Now re run RogueKiller - no fix, just a scan and attach the log.
     
  5. TheRealStig

    TheRealStig Private E-2

    Kestrel, in the meantime managed to get hold of the Windows Vista CD booting in Sys Rec Op getting attached log from FARBAR.
    I've NOT (yet) run the Roguekiller as you've just posted, please advise.
    Certain things have improved in the meantime, e.g. I can now action windows update, but I'm getting error 80246008. Searching, I found out I've got no BITS (Background Intelligent Transfer Service) under SERVICES.
    Have run the BITS repair tool (KB940520) - no positive result.
    Also have run SFC /scannow which just tells me DID NOT FIND ANY VIOLATIONS.
    Finally read a post from a Microsoft Support Engineer suggesting to type loads of commands in the command promt - many returned OK, but the following were missing:
    mshtml.dll (command = regsvr32.exe mshtml.dll)
    shdocvw.dll
    browseui.dll
    msxml.dll
    gpkcsp.dll
    sccbase.dll
    slbcsp.dll
    initpki.dll
    wucltui.dll
    wuweb.dll
    qmgr.dll
    muweb.dll

    Thanks

    Stig
     

    Attached Files:

  6. TheRealStig

    TheRealStig Private E-2

    Kestrel, I ran the Roguekiller - it does find the 6 detections mentioned, but:
    1) States detections found, but there's no way to checkmark them as you asked? I clicked DELETE and then
    2) a window/folder appeared? C:\Users\Administrator\Documents
    - and STATUS in the Roguekiller in the window behind is LOOKING FOR FALSIFICATED ARQUIVES (scanning again apparantly)
    It actually ended up with those 6 detections stating REMOVED
    3) I re ran Roguekiller and it detects the same 6, but now with RAR ERROR
    4) Content of the folder you asked (C:\ProgramData\036......
    2 files:
    036DFF982B17ABE9BF7F44A92F3B707C (2kb, no extention showed)
    036DFF982B17ABE9BF7F44A92F3B707C.ico (5kb)

    Thanks

    Stig
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -------------------------------

    Run FRST like you did before, no fix, just a scan and attach log.
     

    Attached Files:

  8. TheRealStig

    TheRealStig Private E-2

    Thanks Kestrel,

    Have run without prob - though it's FRST.exe and not FRST64, right?

    Cheers

    Stig
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    FRST was not run correctly. Please try again, attach new log.
     
  10. TheRealStig

    TheRealStig Private E-2

    Just ran the FRST again, without restarting or having done any other changes.
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You attached a log from FRST after running it correctly in post #5. That's what I'm looking for because the latest log indicates that you did not run correctly. ;)
     
  12. TheRealStig

    TheRealStig Private E-2

    OK, just to avoid any misunderstanding:
    The first log (which were OK) is the one I ran entering SYSTEM RECOVERY OPTIONS (POST#5).
    The second (which was not run correctly) is from post #7 where you asked to boot normally and run it again.
    I did twice with same result.
    Please find new log from the scan I just did in SYSTEM RECOVERY OPTIONS.

    Thanks

    Stig
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    That's better. Re run RogueKiller and attach the results.
    Is this still the case? If so, we can fix that up too. :)
     
  14. TheRealStig

    TheRealStig Private E-2

    Perfect, please find log.
    Yes, still having problem, I can't find BITS under services.

    Thanks a lot

    Stig
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Download this to your desktop BITS.reg
    • Double click it and allow it to merge into the registry. Let me know if you receieve a success message or not.
    • Reboot and let me know if all is well now.
     
  16. TheRealStig

    TheRealStig Private E-2

    Hi Kestrel, yes, now BITS is running, Windows Update works fine and everything seems well. Any more needs done?

    Thanks a lot

    Stig
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  18. TheRealStig

    TheRealStig Private E-2

    Thanks, I've run Malwarebytes, SuperAntiSpyware, AVG ANtivirus, Glary, Ccleaner all without anything to report.
    I also ran ESET onlinescanner and right at the end of the scan AVG popped up with 3 tracking cookies found: Overture, Atdmt and Yieldmanager. All 3 located in C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies.
    Filenames respectively:
    YMY812YJ.txt
    A0OE6NBQ.txt
    7V512I1X.txt

    Despite cleaning with Glary+Ccleaner and running all above, these were NOT detected/removed.
    I've NOT been on the internet in the meantime (use a separate PC to communicate with you) so wonder if this is something potentially dangerous?

    Please advise before I follow your instructions in latest post.

    Thanks

    Stig
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Nothing to worry about. ;)
     
  20. TheRealStig

    TheRealStig Private E-2

    Good :cool
    Last thing: Just noticed I can't launch Windows Defender.
    Also noted that some places on MajorGeek advise to run Spywareblaster, Spybot, Microsoft Security Essentials (but believe you didn't mention). Please advise.
    Finally, any Remote Control software you can recommend?

    Thanks a million for all your help!!!!

    Stig
     
  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please ask about this in the software forum. Thanks.

    All down to personal preference, for the record, I run none of those. I use Malware Bytes and SUPERantispyware with Avast free edition as antivirus.

    Again, software forum. ;) Oh I like TeamViewer.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds