Unable to delete desktop.ini trojan

Discussion in 'Malware Help (A Specialist Will Reply)' started by rice.williams, Jul 20, 2012.

  1. rice.williams

    rice.williams Private E-2

    Hi, I'm new on this site, and you guys seem to be experts so I'm inclined to trust you more than some of the other sites I found!

    My problem is that my AV program keeps trying to block a desktop.ini trojan from opening. Sometimes it's successful, sometimes it isn't as the trojan redirects my browser to inappropriate sites. I delete the files it flags, and then I reboot but that does not solve the problem.

    I see similar threads, but each has a bit different solution. Can you help me?
    THANK YOU!!
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  3. rice.williams

    rice.williams Private E-2

    Hi,

    I did what you asked. It kept rebooting my computer, even in safe mode, until I figured out I had to turn off my AV program. Then it ran to completion. I uploaded the logfile. I very much appreciate your assistance!
     

    Attached Files:

  4. rice.williams

    rice.williams Private E-2

    Sorry, here are the other files I should have uploaded as well.
    Rice
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It looks like Combo cleared the infection. You still need to run CCleaner to empty out your temp folders.

    Tell me what malware issues you may still have, if any.

    Also, you need to put ComboFix directly on your desktop, not here:
    Running from: c:\users\Rice\Downloads\ComboFix.exe
     
  6. rice.williams

    rice.williams Private E-2

    Thanks! I'll move combofix to my desktop. You were a great help!
     
  7. rice.williams

    rice.williams Private E-2

    I'm still having redirection problems, same as before. Next step?
    Rice
     
  8. rice.williams

    rice.williams Private E-2

    I re-downloaded Combofix.exe to my desktop and tried to run it. My computer reboots every time about halfway through. I have disabled AV directly from Task Manager, and tried running it in safe mode. Same thing keeps happening.:confused. I also tried running CCleaner first, clearing java cache, flushing dns cache. No effect, still reboots by itself.
     
  9. rice.williams

    rice.williams Private E-2

    OK, so I was trying to run the DNS poisoning fix by resetting my router. I re-enabled defogger. Now, when I disable it, it doesn't restart my computer or leave a logfile even if I manually reboot. Sorry I jumped ahead. Hope I didn't screw up too badly.

    Rice
     
  10. rice.williams

    rice.williams Private E-2

    One other clue. Now when I reboot I see "desktop.ini" files on my desktop that weren't there before.
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Sorry for the delay, I lost internet service on Sat. and just got it back.

    The desktop.ini file is normal, it will go away when we do the final cleanup. For now:

    Run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  12. rice.williams

    rice.williams Private E-2

    Thank you. Attached is the file you requested. A couple of things:

    - HiJackThis did not run. Only the batch file ran.
    - When MGTools got to "Check Testing NDS servers with nslookup" I got an error message that said: "The ordinal 1108 could not be located in the dynamic link library WSOCK32.dll". I had to hit "OK" to get it to continue.

    Rice
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please re-run HitmanPro and attach the new log.
     
  14. rice.williams

    rice.williams Private E-2

    Wow, a bootkit, 2 trojans and over 10 zero access items. I am seriously infected! So how do I get rid of all this?
     

    Attached Files:

    • log.zip
      File size:
      877 bytes
      Views:
      3
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Rescan with HitmanPro, when it finds services.exe - Virus, allow it to Replace by clicking the down arrow next to the detection and choosing Replace.
    Choose to Delete these files if they are detected:

    • C:\Windows\assembly\GAC_32\Desktop.ini
    • BackDoor.Maxplus.5220
    • BackDoor.Maxplus.6342
    • Virus:Win64/Sirefef.B
    • Win64/Bootkit

    Ignore all other detections.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.

    Now run RogueKiller and attach that log.

    Run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  16. rice.williams

    rice.williams Private E-2

    Here is the Rogue Killer log and the MG Tools zip file.
    Rice
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download ComboFix to your desktop and run it. Do not do anything while it runs. Attach the log when it is finished.
     
  18. rice.williams

    rice.williams Private E-2

    Here is the Combofix log you requested. Again, thank you so much for your help.
    Rice
     

    Attached Files:

  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I think that got it, but to be sure, run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Attach the C:\MGLogs.zip.
     
  20. rice.williams

    rice.williams Private E-2

    Here is the logfile. I am hoping that cleared it up. Wow. Can't believe how hard it was to kill this thing. I am so appreciative of your help!:)

    Rice
     

    Attached Files:

  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You're logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds