Several problems, zeroaccess, FBI MoneyPak etc

Discussion in 'Malware Help (A Specialist Will Reply)' started by FNVegas, Oct 22, 2012.

  1. FNVegas

    FNVegas Private E-2

    Hello and thank you in advance for the help.

    I completed all instructions as per the "Read Me First" post and waited to see if things cleared up, and so far things have not been resolved.

    Attached are my logs. As to the problems, the biggest one now is that my computer is very slow and laggy, which wasn't happening (at least to the extent it is now) before I did the scans. Previous problems that I haven't encountered in the past two days were my Task Manager closing immediately when I opened it, and the FBI Moneypak scam lockout.

    Thanks Again.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [RUN][SUSP PATH] HKCU\[...]\Run : fsdahdafhdaf (C:\Users\Alytheia\AppData\Local\sgdfvsdzfgst56j.exe) -> FOUND
      [RUN][SUSP PATH] HKCU\[...]\Run : xsderty5r (C:\Users\Alytheia\AppData\Roaming\xredsyt54esy.exe) -> FOUND
      [RUN][SUSP PATH] HKCU\[...]\Run : VirtualStore (rundll32.exe "C:\Users\Alytheia\AppData\Local\Wizards_of_the_Coast\VirtualStore\xfmgqdawo.dll",fltInfoW) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1271663379-2846033125-3096041387-1000[...]\Run : fsdahdafhdaf (C:\Users\Alytheia\AppData\Local\sgdfvsdzfgst56j.exe) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1271663379-2846033125-3096041387-1000[...]\Run : xsderty5r (C:\Users\Alytheia\AppData\Roaming\xredsyt54esy.exe) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1271663379-2846033125-3096041387-1000[...]\Run : VirtualStore (rundll32.exe "C:\Users\Alytheia\AppData\Local\Wizards_of_the_Coast\VirtualStore\xfmgqdawo.dll",fltInfoW) -> FOUND
      [SHELL][SUSP PATH] HKCU\[...]\Winlogon : Shell (C:\Users\Alytheia\AppData\Roaming\xredsyt54esy.exe) -> FOUND
      [SHELL][SUSP PATH] HKUS\S-1-5-21-1271663379-2846033125-3096041387-1000[...]\Winlogon : Shell (C:\Users\Alytheia\AppData\Roaming\xredsyt54esy.exe) -> FOUND
      [STARTUP][HJNAME] ctfmon.lnk @Alytheia : C:\ProgramData\lsass.exe -> FOUND
      [HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJPOL] HKLM\[...]\Wow6432Node\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
      [HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\n.) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Now click the Files/folders tab and locate these detections:


    • [ZeroAccess][FILE] @ : C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\@ --> FOUND
      [ZeroAccess][FOLDER] U : C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\U --> FOUND
      [ZeroAccess][FOLDER] L : C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\L --> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Rescan with HitmanPro.
    Choose to Delete these files if they are detected:


    • C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\@ (ZeroAccess)
      C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\L\ (ZeroAccess)
      C:\Users\Alytheia\AppData\Local\{57a4b7be-dc22-fe71-a014-f2b5fcc3a0c3}\U\ (ZeroAccess)

    Ignore all other detections.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.

    Now after a reboot, rescan with both RogueKiller and Hitman and attach both those new logs as well.

    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  3. FNVegas

    FNVegas Private E-2

    Thanks for the quick reply.

    I followed your instructions as best I could, and here are the logs you asked me to generate. How are they looking?

    As far as how things are running now, a bit better. faster, less lag. I did notice there are these files called "Desktop.ini" that appeared on my desktop. I didn't put them there - is that normal?
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download OTL to your desktop.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code
    Code:
    :processes
    :killallprocesses
    :files
    C:\ProgramData\tlbtjbodfbtfrte
    C:\ProgramData\oylvreix.exe
    C:\ProgramData\shnwsiqozoqkawu
    C:\Windows\assembly\GAC_32\Desktop.ini
    C:\Windows\assembly\GAC_64\Desktop.ini
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now rerun TDSSKiller and fix this!! :
    Code:
    04:40:20.0652 2632  Detected object count: 1
    04:40:20.0652 2632  Actual detected object count: 1
    04:40:31.0879 2632  \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - skipped by user
    04:40:31.0879 2632  \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - User select action: Skip 
    04:42:07.0402 2396  Deinitialize success
    Then attach the two logs> OTL and TDSSKiller.
     
  5. FNVegas

    FNVegas Private E-2

    I'm sorry I didn't read your first post thououghly concerning the TDSSKiller scan; here's the report of the rescan and cure I did as well as the OTL log. Thank you again for taking the time to help me.

    What else should I do?
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please tell me how things are running now. ;)
     
  7. FNVegas

    FNVegas Private E-2

    Things are running much better now! thank you so much for your help and guidance.
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:
    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds