win64 patched.A trojan and zeroAccess infection :(

Discussion in 'Malware Help (A Specialist Will Reply)' started by Proximo, Sep 19, 2012.

  1. Proximo

    Proximo Private E-2

    I'm infected with these items and need your help please. I think I've followed all the directions for submission. I really appreciate your time in helping me out good sirs/madams.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 8 detections:

    • [Tr.Karagany][FILE] plugs : C:\Users\kenji\AppData\Roaming\Adobe\plugs --> FOUND
    • [Tr.Karagany][FILE] shed : C:\Users\kenji\AppData\Roaming\Adobe\shed --> FOUND
    • [ZeroAccess][FILE] @ : C:\Windows\Installer\{c1f3eea0-dfca-0fdf-0fb9-e9b63280d0c9}\@ --> FOUND
    • [ZeroAccess][FOLDER] U : C:\Windows\Installer\{c1f3eea0-dfca-0fdf-0fb9-e9b63280d0c9}\U --> FOUND
    • [ZeroAccess][FOLDER] L : C:\Windows\Installer\{c1f3eea0-dfca-0fdf-0fb9-e9b63280d0c9}\L --> FOUND
    • [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_32\Desktop.ini --> FOUND
    • [ZeroAccess][FILE] Desktop.ini : C:\Windows\Assembly\GAC_64\Desktop.ini --> FOUND
    • [Susp.ASLR][FILE] services.exe : C:\Windows\system32\services.exe --> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.


    Rerun HitmanPro and when you see this C:\Windows\system32\services.exe if it gives you the option to replace, please do so.


    Delete these files if they show.

    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\52h5h7605243wu0s6s47i4pe30d4fnlmmo642754218s3b
    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\704717r6b828l388e861f1irm1n2


    If you did not deliberately set this proxy yourself then please include it in the HJT fix further below:

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;127.0.0.1:9421;<local>
    • O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    • O16 - DPF: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} (Java Plug-in 1.6.0_27) -

    After clicking Fix exit HJT.
    • Reboot the machine.
    • Re run RogueKiller and attach the log.
    • Re run HitmanPro and attach the log.
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. Proximo

    Proximo Private E-2

    Hi Kestrel13!,

    Thanks a ton for taking the time to help me out.

    I initially ran into a problem when i scanned with RogueKiller. I wanted to check with you before I started deleting things.

    I could not find the exact listings you asked me to delete under the 'Registry' tab. Under the file tab I found entries that looked more like what you asked to delete, but I dont know the corresponding registry detections since they look different.

    Attached is the RogueKiller log, with no action taken yet. Please advise kind sir/madam.

    Many thanks!
    P
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    My mistake! Yes, Files/Folders tab they are on. :)
     
  5. Proximo

    Proximo Private E-2

    I ran all the instructions and have the logs attached. There doesnt seem to be any more infection!

    Thank you very much for your help, you are the bomb. :)
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. A little more force will be needed for these stubborn files.


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :Files
    
    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\52h5h7605243wu0s6s47i4pe30d4fnlmmo642754218s3b
    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\704717r6b828l388e861f1irm1n2
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.

    Navigate back to their locations - C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates are they now gone?
     
  7. Proximo

    Proximo Private E-2

    Ha, i would have quit at the last step, not seeing any further errors.

    I ran OTM as you instructed. The files were successfully moved. Here is the log from OTM below.

    Let me know if its really dead now. :)

    You're like a virus assassin.

    -P




    All processes killed
    ========== FILES ==========
    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\52h5h7605243wu0s6s47i4pe30d4fnlmmo642754218s3b moved successfully.
    C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates\704717r6b828l388e861f1irm1n2 moved successfully.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 56478 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: kenji
    ->Temp folder emptied: 153509758 bytes
    ->Temporary Internet Files folder emptied: 3510124 bytes
    ->Java cache emptied: 999990 bytes
    ->FireFox cache emptied: 66199243 bytes
    ->Google Chrome cache emptied: 46025409 bytes
    ->Flash cache emptied: 57431 bytes

    User: Public

    User: UpdatusUser
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 9377100 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 153605493 bytes
    %systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 670 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 67697 bytes
    RecycleBin emptied: 4480 bytes

    Total Files Cleaned = 413.00 mb


    OTM by OldTimer - Version 3.1.21.0 log created on 09212012_194530

    Files moved on Reboot...
    C:\Users\kenji\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
    File move failed. C:\Windows\temp\_avast_\Webshlock.txt scheduled to be moved on reboot.

    Registry entries deleted on Reboot...
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Navigate back to their locations - C:\Users\kenji\AppData\Roaming\Microsoft\Windows\Templates are they now gone?
     
  9. Proximo

    Proximo Private E-2

    They are gone, the folder is now empty.
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Excellent. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  11. Proximo

    Proximo Private E-2

    Cool, I performed the last steps.

    Thanks again for helping me out!

    P
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds