Trojans C 05 help.

Discussion in 'Malware Help (A Specialist Will Reply)' started by KevinR225, Mar 14, 2011.

  1. KevinR225

    KevinR225 Private E-2

    I've been trying to track down an issue with Bluescreens due to mrxsmb.sys according to the mini dump.
    Anyway, I had discounted it being due to a bug because neither Norton IS, SuperAntispyware, or Malware Bytes detected anything on several scans.

    Well, last night I decided to download Spybot S&D and run it just because, and it came back with a few Coupon Bars and the listed Trojans C 05. Haven't been able to find any real info on what that is, or does, but now am second guessing the reports from Malware etc, and worried there may be something else still.
    The system has been running slower lately, but I chalked it up to Turbotax being a hog or something. Now I don't know.

    Any help to verify weather I am clean or not would be greatly appreciated.

    Note: SB S&D Cleared the Trojan supposedly, and most of the CBs. It said there were 2 things that it would have to reboot to clean, so I did, and after rebooting, it re-ran and said everything was clear now.

    Kevin
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. KevinR225

    KevinR225 Private E-2

    OK, all files are attached as requested except RootRepeal since this is a 64bit W7 setup.
    When I ran combofix it popped up a screen that said this was an incompatible OS. I deleted and re-downloaded and got the same. Since the program infos says it should work on it, I ran it anyway. Seemd to run without issue.

    #5 I think on the things to do said run something from MGtools in boot directory to make a registry addition to re-enable UAC, since MGtools disabled it.
    I had already diabled it per the instructions earlier on, so I didn't know if it was needed, but ran it as requested.
    After doing that and the reboot, the UAC was still where I set it when I turned it off, so I re-enabled it the reverse of the initial disable.
    Did running the script from MGtools that edited the registy do anything wrong since MGtools didn't need to turn off UAC anyway, and why wasn't UAC on after running it?
    Sorry for all the questions, just trying to understand the process.

    Regarding the question, is everything alright, I'm not sure. There wasn't a operational problem to start with other than occasional Bluescreens, and I won't know if that's changed for a week or two. My concern was that a freshly downloaded Spybot S&D found a Trojan that Norton, and weekly manual runs of Malwarebytes, and Super anti spware never saw. Also, a few weeks ago, one of my Visa's had what may have been fraudulent activity on it, and FaceBook disabled my account due to access from an unknown loaction. All the above leaves me needing to verify that something isn't hiding, that I missed.
    Thanks for all the help.

    Kevin
     

    Attached Files:

  4. KevinR225

    KevinR225 Private E-2

    FyI, I noticed today that when I opened IE it said IE wasn't my primary browser and did I want to make it so.
    Since it has been in the past, is this because of the cleaning and scans I ran, or because previously something (Trojan etc.) had been taking the place of IE?

    Thanks again,

    Kevin
     
    Last edited: Mar 15, 2011
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    • O18 - Protocol: vsharechrome - {3F3A4B8A-86FC-43A4-BB00-6D7EBE9D4484} - (no file)

    After clicking Fix exit HJT.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Driver::
    AMPingService
    DirLook::
    C:\{6AE5C5F8-2C56-4075-B44B-67FDE4376A28}
    C:\{979507E8-A3E5-4271-9032-5BDB1ED2C50A}
    C:\{9BE40489-83A3-477B-870E-D964B6FF1471}
    d:\users\Admin\AppData\Roaming\OPHA
    Registry::
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}\NoExplorer]
    File::
    d:\users\Kevin\AppData\Local\Temp\AMPing.exe
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  6. KevinR225

    KevinR225 Private E-2

    Thanks again for all the help.

    Did as requested, but wanted to make sure I did it the way you wanted.
    I have an Admin and Personal accounts. The personal are all standard accounts, not admins. Because of this, I ran and did all the things you have been requesting from the Admin account, not the personal one, which is what I use most of the time. If you want me to run any of this from the standard account I normally use just let me know.

    Also, I now have 2 transparent icons on the admin desktop called "desktop.ini". Are these from what we've been doing, and should I delete them when we are done?

    Since Norton Internet Security evidently didn't catch this, has it been compromised, and should I un-install and re-install it when we are done?

    Finally, what are the different things we (and by we I mean YOU :) ) have been removing, and are these likely anything that would compromise my important info etc., or is it other tracking stuff?

    Kevin
     

    Attached Files:

  7. KevinR225

    KevinR225 Private E-2

    OK, for some reason now I can only view flash video when IE is run as Admin?
    Tried un-install re-install Flash 10, but still the same.

    Kevin
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You can delete these three empty directories:
    • C:\{6AE5C5F8-2C56-4075-B44B-67FDE4376A28}
    • C:\{979507E8-A3E5-4271-9032-5BDB1ED2C50A}
    • C:\{9BE40489-83A3-477B-870E-D964B6FF1471}

    What can you tell me about the contents of this one?

    • d:\users\Admin\AppData\Roaming\OPHA
    If you do not know anything about the files inside then just delete the whole folder!

    Well if you have any problems on those accounts, any unusual behaviour then you can temporarily give them admin rights and run scans on them.
    Not a malware issue.
    They are showing now because we have hidden files and folders set to show during the cleaning procedure. They will hide themselves again after you have followed final steps.
    I wouldn't think you would need to resort to that, no.
    I have not found alot to remove. I found a service running from a temporary location and stopped it and killed it's corresponding file. I took a look inside of four directories, three of which are empty and one I am questioning you about.

    So for this account, final steps time.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:

    If you wish to have me review logs from running our procedures on another account, go ahead and post them here in this thread. :)
     
  9. KevinR225

    KevinR225 Private E-2

    OK, I do not recognise the OPHA items, so deleted them and the other 3.
    Will remove everything else except SAS and MB as directed.
    As far as the transparent desktop .inis, I believe I had the system set to show hidden files before all this, but will see what happens when done.
    Main question left, is you mentioned giving my account admin status and running scans.
    Do you mean all the stuff including combo fix etc. or just SAS MB?
    Also, does this mean that running either from Admin doesn't check all accounts on the PC?
    Running MB or SAS from a standard account doesn't fully work on that account?
    Have you ever heard of the Trojans C05 that Spybot found?

    Anyway, thanks again for all the help. Luckily from the sounds of it I wasn't really compromised to any real extent.

    Kevin
     
  10. KevinR225

    KevinR225 Private E-2

    Note, this is what's in the 2 ini files:
    "[.ShellClassInfo]
    LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21799
    [LocalizedFileNames]
    Norton Internet Security.lnk=@C:\PROGRA~2\NORTON~3\Branding\muis.dll,-102"

    "[.ShellClassInfo]
    LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21769
    IconResource=%SystemRoot%\system32\imageres.dll,-183
    [LocalizedFileNames]
    Internet Explorer (64-bit).lnk=@%windir%\System32\ie4uinit.exe,-735"

    If I can delete them let me know.
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes everything including Combofix and MGTools.
    Correct.
    For example just because you ran SAS and MBAM on this account it does not mean it automatically scanned on other accounts, no.
    I would have to see the exact file and file path of what was being reported. But according to a little research I just did, it could also be a false positive.
    The ini files are nothing to worry about as mentioned!!
     
  12. KevinR225

    KevinR225 Private E-2

    Thanks.
    Just to be safe, I will run everything on my my account.
    Already deleted all but MB and SAS, so will re-download and run.

    I assume since it seemed specific to the log from the admin account, I don't run the Combofix with the txt file you had me save and drag to it?

    Kevin
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No, just run Combofix like you did the very first time, double clicking its icon on your desktop.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds