Suspicious INI in App Data

Discussion in 'Malware Help (A Specialist Will Reply)' started by koredump, Oct 22, 2013.

  1. koredump

    koredump Private E-2

    The INI in question: C:\Documents and Settings\kore\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini

    A quick Google search confirms this is a malicious file. Normally I'd just run some Safe Mode AVG, MB, and Hitman Pro scans, check all the Run registries, and check all profile Local Settings and Application Data folders for out of the ordinary files. But this time around I just stumbled upon this file while copying some files and folders under a restricted profile I haven't used in several weeks.

    Strange thing is that the scans all came up clean, except RK for which the instructions say don't fix anything.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You have a zero access infection.


    Before we continue I would like for you to use MSConfig to put this machine back into normal start up mode.



    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [HJ][PUM] HKLM\[...]\SystemRestore : DisableSR (1) -> FOUND
    • [HJ SECU][PUM] HKLM\[...]\Security Center : FirewallDisableNotify (1) -> FOUND
    • [HJ SECU][PUM] HKLM\[...]\Security Center : UpdatesDisableNotify (1) -> FOUND
    • [HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
    • [SHELLSPWN] HKUS\S-1-5-21-1708537768-1450960922-839522115-1003\[...]\command : ("C:\Documents and Settings\kore\Local Settings\Application Data\owr.exe" -a "%1" %*) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these entries on the files tab please:

    • [ZeroAccess][File] @ : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1003\$fc78242ff7515808bf1afa423834fdca\@ [-] --> FOUND
    • [ZeroAccess][File] @ : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1006\$fc78242ff7515808bf1afa423834fdca\@ [-] --> FOUND
    • [ZeroAccess][Folder] U : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1003\$fc78242ff7515808bf1afa423834fdca\U [-] --> FOUND
    • [ZeroAccess][Folder] U : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1006\$fc78242ff7515808bf1afa423834fdca\U [-] --> FOUND
    • [ZeroAccess][Folder] L : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1003\$fc78242ff7515808bf1afa423834fdca\L [-] --> FOUND
    • [ZeroAccess][Folder] L : C:\RECYCLER\S-1-5-21-1708537768-1450960922-839522115-1006\$fc78242ff7515808bf1afa423834fdca\L [-] --> FOUND

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :Files
    C:\Documents and Settings\kore\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
    C:\Documents and Settings\admin\Local Settings\Application Data\a.zip
    C:\Documents and Settings\admin\Local Settings\Application Data\BcsKtYcHW.dll
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. koredump

    koredump Private E-2

    I'm currently at work so I don't have access to the infected machine, but I'm slightly puzzled by what you mean by "put [the] machine into normal startup mode." I'm concerned that I may have missed something in the READ ME FIRST sticky or that I've created some some misunderstanding.

    1) As a matter of full disclosure, I followed the instructions in READ ME FIRST while logged into a Restricted user, "kore", and the machine was running under normal startup. Where necessary, I ran all programs "as administrator" under this Restricted profile.

    2) My comments about Safe Mode were merely a reference to previous, unrelated infections that I've dealt with on my own. That is to say, if I were dealing with this issue myself, I'd be running through my Registry and checking App Data folders for foreign files while running various virus scans in Safe Mode. This time around I decided to enlist the help of majorgeeks.com.

    My apologies for muddying the water. Does this change any of the instructions you've posted?
     
  4. koredump

    koredump Private E-2

    Argh, just missed the 10-minute-edit-post limit.

    I don't know if it's important or if it will make sense contextually, but a couple of images in your instructions are not loading for me.

    - "Paste the following code under the [X] area. Do not include the word Code."
    - "Push the large [X] button."
     
    Last edited: Oct 22, 2013
  5. koredump

    koredump Private E-2

    So, when I initially posted my logs I wasn't having any real trouble with speed. Then I booted up tonight to do the follow-up scans and the speed was unbearable. I had to use the drag-select lines to determine where my mouse pointer was located on the screen.

    Anyhow, I've attached the new RK log and will proceed with the OTM instructions.
     

    Attached Files:

  6. koredump

    koredump Private E-2

    Okay, some unexpected things happened while running OTM.

    OTM moved the files as instructed and proceeded to delete the various folders as commanded but hung on Temporary Internet Files for the profile I'm using, "kore". After about 5 minutes of watching the progress bar continuously run I clicked "Move It!" again and it seemed to skip to the end but created no log file. I then reran OTM and it locked up on my TIF files. That's when I figured having an open browser window for the profile might have something to do with it so I proceeded to reboot yet again and run OTM another time.

    Thus, I've attached all of the log files that were generated from OTM for my various runs. I also verified that the 3 files were moved upon the first run.

    Moving on to Junkware...
     

    Attached Files:

  7. koredump

    koredump Private E-2

    JRT file.
     

    Attached Files:

    • JRT.txt
      File size:
      1.6 KB
      Views:
      1
  8. koredump

    koredump Private E-2

    I wasn't able to execute the GetLogs.bat script "as admin", so I ran MGtools.exe to acquire the new MGlogs.zip.

    My computer is still a bit sluggish and Windows takes an abnormal amount of time to load and get to the profile logon screen.
     

    Attached Files:

    Last edited: Oct 23, 2013
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Run RogueKiller for me, one more time, just a scan - and attach the log please.
     
  10. koredump

    koredump Private E-2

    Downloaded the new RK and scanned.
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    7. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds