Trojan/Zero Access infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by Billiebob56, Nov 20, 2012.

  1. Billiebob56

    Billiebob56 Private E-2

    Hi,

    Unfortunately my computer has become infected again...AVG is picking it up as Trojan and Zero Access.

    AVG is working away to delete/quarantine the files as they appear (every 3-5 mins) but there is one that has attached itself to a services.exe file and as such I can't delete it!

    I think I picked up this when searching for christmas vector images...but I also don't know if it could be left over from a previous infection?

    I've run through Read me first and have attached the logs.

    I would be grateful if you could help!

    Thanks

    Will.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You can rerun Hitman and have it delete everything under the heading "Malware" except: C:\Users\Will Thornton\Desktop\OTM.exe

    Also, when Hitman finds services.exe under Suspicious files let it REPLACE.

    Under heading "malware remnants" let it delete the lot.

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the files tab and locate these detections:

    • [ZeroAccess][FILE] @ : C:\Windows\Installer\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : C:\Windows\Installer\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\U --> FOUND
    • [ZeroAccess][FOLDER] L : C:\Windows\Installer\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\L --> FOUND
    • [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_32\Desktop.ini --> FOUND
    • [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_64\Desktop.ini --> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Rerun Roguekiller - just a scan, and attach that log too please.

    Re run Malware Bytes and attach that log too.

    Now rerun Hitman, just a scan and attach log.


    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    After reboot, check to see if your firewall is working.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. Billiebob56

    Billiebob56 Private E-2

    Hi,

    I executed things as best I could, but there were one or two problems:

    Hitman: Couldn't replace the Service.exe file, also I could not see the Malware and Malware remnants headings...so I deleted the "viruses" and ignored the OTM.exe.

    RogueKiller: under the Files tab there were no boxes to check mark so I highlighted the two that were on your list and deleted these. This then gave the appearance of deleting all the FOUND items in the Registry (causing me serious panic!)

    The various scans are still picking up on Services.exe as a virus.

    Thanks for the help.

    Will.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  5. Billiebob56

    Billiebob56 Private E-2

    Hi,

    Please find attached the FRST.txt file.

    Thanks.

    Will.
     

    Attached Files:

  6. Billiebob56

    Billiebob56 Private E-2

    Hi Kestrel 13!,

    If you get a chance would you mind having a look at my last post?

    Thanks

    Will.
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    BillieBob, forgive me, you slipped out of my radar somehow. I am sorry. reviewing the log RIGHT now and will sort a fix.
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -------------------------------

    Re run FRST again (just a scan) and attach the log.
     

    Attached Files:

  9. Billiebob56

    Billiebob56 Private E-2

    Hi,

    Thanks for getting back to me.

    I've attached the two logs...hopfully that will resolve things.

    Just let me know what I should do to finish off!

    Cheers

    Will.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Make sure to run FRST properly. Just a scan, then attach new log.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds