SORRY - Patched.A issue with logs attached this time

Discussion in 'Malware Help (A Specialist Will Reply)' started by jedodes, Sep 27, 2012.

  1. jedodes

    jedodes Private E-2

    Okay, here goes. I have a legitimately purchased, expensive software pack called Native Instruments Komplete 5 (studio software), and I went to install it on my new computer last night but could not find the serial number anywhere in my files. Making what in retrospect was a terrible decision, I decided to see if anyone had posted a working serial for this program online, and when I downloaded what I thought was going to be that serial number, I appear to have contracted the patched.a virus. My AVG software keeps warning me about (and proving unable to fix) the following files:

    1. Virus identified Win64/Patched.A - object is c:\Windows\System32\services.exe (AVG says it's white-listed)

    2. Trojan horse BackDoor.Generic15.CGSY - obhect is c:\Windows\assembly\GAC_32\Desktop.ini (AVG says "infected")

    3. Trojan horse Generic29.ANPX - object is c:\Windows\assembly\GAC_64\Desktop.ini (AVG says "infected")

    In addition to AVG's warnings, I'm also periodically getting random windows/sites opening in Chrome when I'm trying to go somewhere else. Good times.

    Can someone please help? I'm desperate. Many, many thanks.

    LOGS IN TWO POSTS, ONE HERE, ONE BELOW. THANKS.
     

    Attached Files:

  2. jedodes

    jedodes Private E-2

    jedodes - Patched.A problem -SECOND SET OF LOGS

    Second set of logs for problem mentioned in my first post. Please note: for some reason, TDSSkiller kept running and coming back with a result of something like "There is still undetected malware," so, thinking this was part of the process, I his Scan again (the only option it gave me) a couple more times. Finally, when nothing changed, I simply rebooted the computer the way the post said it should ask me to. I ended up with two logs. One is attached, but the other is too big (635 KB) to attach. Not sure whether this matter.

    Again, thanks so much for any help you can provide.
     

    Attached Files:

  3. jedodes

    jedodes Private E-2

    Re: jedodes - Patched.A problem -SECOND SET OF LOGS

    Hmm, looks like this post went up right away, but my first post (with the first several logs and a longish explanation of the problem) hasn't. I'll wait to see if it just takes a few minutes, but if not, I'll repost all of that as a reply to this as well. Thanks.
     
  4. jedodes

    jedodes Private E-2

    Re: jedodes - Patched.A problem -SECOND SET OF LOGS

    TRYING THIS AGAIN - FIRST SET OF LOGS AND EXPLANATION.

    Okay, here goes. I have a legitimately purchased, expensive software pack called Native Instruments Komplete 5 (studio software), and I went to install it on my new computer last night but could not find the serial number anywhere in my files. Making what in retrospect was a terrible decision, I decided to see if anyone had posted a working serial for this program online, and when I downloaded what I thought was going to be that serial number, I appear to have contracted the patched.a virus. My AVG software keeps warning me about (and proving unable to fix) the following files:

    1. Virus identified Win64/Patched.A - object is c:\Windows\System32\services.exe (AVG says it's white-listed)

    2. Trojan horse BackDoor.Generic15.CGSY - obhect is c:\Windows\assembly\GAC_32\Desktop.ini (AVG says "infected")

    3. Trojan horse Generic29.ANPX - object is c:\Windows\assembly\GAC_64\Desktop.ini (AVG says "infected")

    In addition to AVG's warnings, I'm also periodically getting random windows/sites opening in Chrome when I'm trying to go somewhere else. Good times.

    Can someone please help? I'm desperate. Many, many thanks.

    LOGS IN TWO POSTS, ONE HERE, ONE BELOW. THANKS.
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please keep all your replies in this thread!!

    Rescan with HitmanPro, when it finds services.exe - Virus, allow it to Replace by clicking the down arrow next to the detection and choosing Replace.
    Choose to Delete these files if they are detected:


    • C:\Program Files (x86)\Native Instruments\B4 II\B4 II.exe
      C:\Program Files (x86)\Native Instruments\B4 II\DXi\B4 II DXi.dll
      C:\Program Files (x86)\Native Instruments\FM8\FM8.exe
      C:\Windows\assembly\GAC_32\Desktop.ini
      C:\Windows\assembly\GAC_64\Desktop.ini
      C:\Windows\system32\services.exe

    Ignore all other detections.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    Now, click the Files/folders tab and locate these detections:


    • [ZeroAccess][FILE] @ : C:\Windows\Installer\{3a74c7eb-3efb-6b98-a5d1-6b1f5660e0c3}\@ --> FOUND
      [ZeroAccess][FOLDER] U : C:\Windows\Installer\{3a74c7eb-3efb-6b98-a5d1-6b1f5660e0c3}\U --> FOUND
      [ZeroAccess][FOLDER] L : C:\Windows\Installer\{3a74c7eb-3efb-6b98-a5d1-6b1f5660e0c3}\L --> FOUND
      [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_32\Desktop.ini --> FOUND
      [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_64\Desktop.ini --> FOUND
      [Susp.ASLR][FILE] services.exe : C:\Windows\system32\services.exe --> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Now re-run RogueKiller and attach that log as well.

    Reboot and run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  6. jedodes

    jedodes Private E-2

    Thanks so much for your help. Quick question: Hitman Pro found C:\Windows\system32\services.exe (which I am to delete, right?), but not anything called "services.exe - Virus". Should I proceed with deleting the regular services.exe file mentioned above? And does it matter if it has next to it the notations "WRP" and "952"?

    I will await your reply before I go ahead and delete anything.

    Many thanks,
    J.
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Tell you what, leave out the services.exe file and we will replace it later.
     
  8. jedodes

    jedodes Private E-2

    Sorry for the delay! Okay, so first and most important, my machine appears to be running without problems right now, at least so far.

    1. Hitman Pro is finding no threats at all.

    2. I had to run Rogue Killer a couple of times, because I appear to have stopped it prematurely at one point, and I'm attaching the logs below. The results were a little odd:

    a. Did not find [HJ] HKLM\[...]\Wow6432Node\System : ConsentPromptBehaviorAdmin (0) -> FOUND

    b. Found 2 copies of [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND ---- I wasn't sure if they were both to be deleted, so I deleted neither for the moment. Should I?

    c. Did not find [HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> FOUND

    d. Did not find [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

    e. Did not find [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

    f. Under Files, I found only one file, but it says "REMOVED" -- I'm attaching a picture -- should I also delete?

    3. I'm attaching the MGlogs result.

    Again, I think my system's working all right, but I'd love to get your opinion about what else I might need to do.

    Many thanks.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good. As usual with this infection, your Base Filtering service is not running. So:

    Attached is bfe.zip

    Inside is:



    Extract bfe.reg to your desktop.
    Double-click bfe.reg and allow it to merge into the registry. If you get a "successfully merged into registry" type of message, reboot your PC and see if you can turn on BFE, or if it is already turned on.

    You can run these commands from the command prompt.

    • net start bfe
    • sc qc bfe


    If it is still not running:
    Run regedit:
    1. Browse to the location for the BFE service in the registry (HKLM\System\CurrentControlSet\Services\BFE\Parameters\Policy), right click and select permissions. (note: HKLM is short for HKEY_LOCAL_MACHINE_
    2. In the “Permissions for Policy” window, click advanced | Add.
    3. Once the “Select Users, Computers or Group” box appears, change the “From this location:” to point to the local machine name.
    4. After changing the search location, enter “NT Service\BFE” in the “Enter the object name to select” box and click “Check names” – this will allow you to add the BFE account.

    5. Give the following privileges to the BFE account:
    Query Value
    Set Value
    Create Subkey
    Enumerate Subkeys
    Notify
    Read Control

    After adding the BFE account to the registry key, please try to start the Base Filtering Engine service.

    Let me know how you make out.
     
  10. jedodes

    jedodes Private E-2

    Hi, I have attached a .txt of the command prompt results. Even though the first command failed, it looks like the second succeeded. Is that right?

    If so, three final things:

    1) Thank you so much. I'm amazed and grateful that you volunteer your time and expertise to help people in what seem to them like maddening and impossible jams.

    2) For the first time in this process, my AVG shield has detected a threat related to MGtools.exe. I've attached a picture of the threat alert. I've had AVG remove it, which it says it did successfully. But should I still be concerned about it, and if so, what do you recommend?

    3) Finally, any sense of what the virus I got actually does? In particular, should I worry about it having harvested any personal data, passwords, etc.?

    Again, thanks a million, and I'll await your reply.
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    AVG is giving you a false positive about MGTools. It is perfectly safe. Otherwise we wouldn't be using it.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds