win64/patched.a and other threats

Discussion in 'Malware Help (A Specialist Will Reply)' started by O.R.V, Oct 17, 2012.

  1. O.R.V

    O.R.V Private E-2

    Hello. I have win64/patched.a and other threats on my desktop. They were apparently loaded during a browsing session monday, 4/15 @ 4:07 pm (per malware bytes detection and file information).

    Prior to visiting this site I attempted several steps to remove the threats with no success. I used MBAM and AVG scans in safe mode ro run scans and attempt clean-up. I have not tried to clean the win/64/pathec.a threat- it is "white listed" as a critical system file. The threats are periodically revealed in an AVG resident shield pop-up window which has been popping up during the scans reccomended by this site.

    I immediately took precautions when I discovered the threats: disconnected ethernet cable, machine shutdown when not in use, threat investigation using another machine etc.

    I have followed all instructions in the read me section, have run ccleaner, turned off UAC and system restore, disabled disk emulation with defogger, downloaded and run all scanning software (files attached). I believe all software ran OK but with each scan the Resident Shield pop-up came up.

    So, I could sure use your help!

    My system: ASUS MB, AMD 6 core processor, 12 gig ram, 1TB HD with 2.5 TB of slaved HDs, WIN 7 PRO OS with all updates as of last week. I use AVG free and windows firewall- just checked and windows firewall and update do not appear to working!! Also, my systems are behind an older linksys wireless router.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    See the cleaning instructions again. You should never turn off system restore until all malware is removed and your PC is working properly again. Or unless a malware removal expert requests that you do so. Having even infected restore points can be better than none when something goes wrong! ;) Also restore points can be use to get backup files from when malware has infected or deleted necessary system files. Removing restore points, removes the backups and increases the likelihood of a reinstall becoming a necessity.

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  3. O.R.V

    O.R.V Private E-2

    Thank You. Glad to be here! Note this is an OEM copy of Win7 Pro pruchased from Micro Center- no BS add on SW from anyone (except what I chose). I built this machine with hard and soft ware all purchased from Micro Center- thought you should know.

    Attempted your process but when I selected " repair your computer" I got the Windows Boot Manager screen, NOT "System Recovery options". Boot Manager screen directed me to 1.) Insert Win7 Pro Disk 2.) Restart 3.) select "repair Computer. The screen indicated "windows failed to start" and "Status: 0xc0000225". I hit continue and the system started so I ran the FRST64.exe from inside wnidows.

    while you review the attached text file. I will try the boot manager suggestion- insert win 7 disk and see if I can get to "System Recovery Options". If success, I wll run FRST64 from cmd prompt (dos)

    Thanks for you help!
     

    Attached Files:

  4. O.R.V

    O.R.V Private E-2

    Oh yea, I turned sysrestore on while I was in Windows. :-o
     
  5. O.R.V

    O.R.V Private E-2

    Inserted win7 Pro disk, hit F8, got "hit any key to boot from disK", hit a key, got advanced boot options but no option for "repair computer"- hit esc got second boot options screen with no options, hit escape again, got the language screen, hit next, got the "select OS" screen, hit next and success!! Got the Sys recovery options screen and ran FRST64 from dos prompt (flash drive- I:)

    FRST.txt attached

    FYI, I have always had trouble on cold boot startup if a flash drive is inserted in the front USB ports (which I always forget). The success this time, I think, was two fold --hitting escape to get out of "boot from disk" and the flash drive was not inserted until I opened notepad from the sys restore options menu (it was in my laptop so I could send you the first FRST.txt file- happy accidents!!). I will investigate USB startup issue further when we are done here.

    Thank You for help AND patience.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you save the below files to these locations?
    Code:
    2012-10-15 14:06 - 2012-10-15 14:06 - 00176640 ____A C:\Users\OrvsBuild\Documents\7b500242.dll
    2012-09-27 07:48 - 2012-09-27 07:48 - 01088700 ____A C:\Users\OrvsBuild\Application Data\OrvHaugen.zip
    2012-09-27 07:48 - 2012-09-27 07:48 - 01088700 ____A C:\Users\OrvsBuild\AppData\Roaming\OrvHaugen.zip
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download this >> View attachment fixlist.txt


    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now boot into normal Windows can continue with the below.



    Be patient while doing the below. The fixes can sometimes take quite awhile to run. Especially the permissions repairs. It may be best to kick it off and goto bed or do something else. It is better not to run anything while the repairs are going on.

    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  8. O.R.V

    O.R.V Private E-2

    I did not save any of the files you listed
     
  9. O.R.V

    O.R.V Private E-2

    Ahhh, Apparently I deleted the recycle bin files and quarantined the GAC trojans AFTER I ran frst.exe fixlog.txt and a new frst.txt attached.

    Ran Widows repair- Windows Update & Firewall are working great! Thank You!! Have not run into any other applicetion issues (yet).

    MGlogs.zip attached.

    Have re-scanned with all tools. Will forward current logs in following post.

    UPATE: The .dll file you listed is from a previous system repair. The .zip file contains MS access .mdb and .txt files. I dont remember if I saved these but I have deleted to R-bin anyway.
     
  10. O.R.V

    O.R.V Private E-2

    Previous post- no attachments- here are FRST.txt, MGlogs. and Fixlog.txt
     

    Attached Files:

  11. O.R.V

    O.R.V Private E-2

    most recent scans attached
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    These last logs look good.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds