Zentom Antivirus removal problem (ineffective RKill)

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by PetitJedi, Sep 29, 2011.

  1. PetitJedi

    PetitJedi Private E-2

    To all people who have that lovely thing called knowledge:

    My friend and I have encountered a serious problem on her computer, called Zentom System Gard. As I realise this is a kind of well known spyware infection, I have found the actual removal guide online, but sadly cant follow it for a specific reason.

    First a little information: The computer is running on the operating system Windows XP. The virus is doing the regular fake antivirus shenanigans, fake warnings and a million popups. Most importantly it blocks programs such as Windows Taskmanager and Malwarebyte's Malware removal.

    Essentially we are unable to carry out the steps of the cleaning process, because of the step asking to run an RKill program. We have tried all of the different versions of RKill, but they've all proven to be ineffective which keeps us from progressing.

    Edit: I should mention the different RKills we've tried are:

    RKill.com
    RKill.exe
    RKill.scr
    eXplorer.exe
    uSeRiNiT.exe
    WiNlOgOn.exe

    Any advice? Thanks very much for your time
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please download RogueKiller.exe and save it to your desktop.
    • Now quit all running programs.
    • Double click RogueKiller.exe to run it.
    • When prompted, type 1 and hit Enter.
    • A RKreport.txt should appear on your desktop.
    • Note: If the program is blocked, do not hesitate to try several times. If it really does not work (it could happen), rename it to winlogon.exe .
    • Please post the contents of the RKreport.txt in your next Reply.

    Now are you able to continue with the READ & RUN ME FIRST. Malware Removal Guide ?
     
  3. PetitJedi

    PetitJedi Private E-2

    Thanks for that. I posted the RKreport as an attached file.
     
    Last edited by a moderator: Sep 29, 2011
  4. PetitJedi

    PetitJedi Private E-2

    Not sure if the file was attatched properly last time so just submitting it again, just in case.
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You have a ZeroAccess infection. Do the below and then continue on with the Read and Run me first.

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  6. PetitJedi

    PetitJedi Private E-2

    Here are all the most recent logs:
     

    Attached Files:

    Last edited by a moderator: Sep 29, 2011
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • What about Rootrepeal (If you are not on 64 bit)?
    • Combofix log?
    • Log from running MGTools?
    • MBRCheck log?
    I need to see all those too please.
     
  8. PetitJedi

    PetitJedi Private E-2

    Unfortunatey we aren't capable of providing the other logs because the virus would stop the other scans.
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, let's try and get two of them run at least.

    Rename Combofix.exe to B5dfs50h.com and try and run it again, in NORMAL mode first, then try SAFE MODE if normal mode is problematic for you.

    Try this next even if the above did not work.

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    • cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    • nwktst<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
    • analyse <-- this attempts to run HijackThis. Be sure to click the Accept button twice in the license agreement popup or it will just sit there and wait.
    Now look for the C:\MGlogs.zip file and attach it no matter what happened while doing the above.


    Then....


    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  10. PetitJedi

    PetitJedi Private E-2

    managed to run combo fix but a log did not appear automatically. Appears as though I still have the virus because it kept closing the command promt winow nor could I run root repeal. Here are the logs I did manage to procure anyway
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Before we continue I would like for you to uninstall AVG Free 9.0 please. Then run this:

    I suggest you run the Official AVG Removal Tool from here:
    http://www.avg.com/download-tools Then reboot your machine. Make sure you also delete any AVG folders in Program Files.

    Could you please get these files: Uninstall.dat and TrueSight.sys into a zipped file and attach it for me in your next post? To do this, see the below:

    On your keyboard, press the Windows key + R at the same time and paste in the following:
    http://www.simplehelp.net/images/winkey/windowskey00.jpg + the letter R (at the same time)
    This brings up the Run dialog box for windows 7
    Now paste in the following:
    Press ENTER
    log retrievable @ C:\collect.zip
    Attach collect.zip to your next message. (How to attach items to your post)


    Please go to virustotal and upload the following files for analysis, and let me know the results.

    C:\Documents and Settings\User\Desktop\Uninstall.dat
    C:\Documents and Settings\User\Desktop\TrueSight.sys



    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the textbox. Do not include the word Code
    Code:
    Code:
    :otl
    @Alternate Data Stream - 147 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
    @Alternate Data Stream - 124 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:0B4227B4
    @Alternate Data Stream - 114 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:A8ADE5D8
    
    O4 - HKCU..\Run: [finc70dkk.exe] "C:\Documents and Settings\User\Application Data\3FD658FCE7B584F439B836484783DB52\finc70dkk.exe" File not found
    O4 - HKLM..\RunOnce: [*cryptsvcdev.exe] C:\Documents and Settings\All Users\Application Data\cryptsvcdev.exe (©if systems)
    
    
    :files
    C:\Documents and Settings\All Users\Application Data\cryptsvcdev.exe
    C:\Documents and Settings\User\Application Data\3FD658FCE7B584F439B836484783DB52\finc70dkk.exe
    C:\WINDOWS\lsrslt.ini
    C:\WINDOWS\1677414492
    C:\Documents and Settings\User\Desktop\settings.dat
    C:\Documents and Settings\User\Local Settings\Application Data\e8010lu874aguygbc
    C:\Documents and Settings\All Users\Application Data\e8010lu874aguygbc
    C:\Documents and Settings\User\Local Settings\Application Data\1pu4igwom771p2571ra12y7fk5447qc4010k6c3cbv2p5ub
    C:\Documents and Settings\All Users\Application Data\1pu4igwom771p2571ra12y7fk5447qc4010k6c3cbv2p5ub
      
    :commands
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.


    Run TDSSKILLER again and attach the log.



    Now go to this MGTools and download the new version of MGtools.exe. Overwrite your previous MGtools.exe file with this one.

    Run the new C:\MGTools.exe and attach the new C:\MGlogs.zip



    Download and run Win32kDiag per the below instructions:
    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log
    C:\win32kdiag.exe -f -r


    Now we need to scan the system with this special tool.
    • Please download Junction.zip and save it to your root folder (C:\Junction.zip)
    • Unzip it and put junction.exe in the root folder (C:\junction.exe)
    • Now click Start => Run... => Copy and paste the following command in the run box and click OK:
      cmd /c junction -s c:\ >C:\log.txt
    • A command prompt window opens and also a license agreement from SysInternals will appear.
    • Accept the license agreement and the scan will begin.
    • Wait until a log file opens. Attach this C:\log.txt when it finishes (the command prompt window will close when it finishes). (How to attach items to your post)
    • NOTE: It scans your whole hard disk so if can take a long time. Be patient and don't do anything else while it is scanning.

    Does Rootrepeal now run, or still not?
     
  12. PetitJedi

    PetitJedi Private E-2

    File name:
    TrueSight.sys
    Submission date:
    2011-10-01 17:52:38 (UTC)
    Current status:
    finished
    Result:
    1/ 43 (2.3%)

    File name:
    Uninstall.dat
    Submission date:
    2011-10-01 17:54:30 (UTC)
    Current status:
    finished
    Result:
    0/ 43 (0.0%)

    (more to come: need to reboot)
     

    Attached Files:

  13. PetitJedi

    PetitJedi Private E-2

    I'm not sure where to save the Win32kDiag to. I tried to do a search bu it came up empty.

    I didn't want to proceed without following the steps correctly
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It said in the instructions. You need to save it directly to C:\
    Don't forget I need the log from OTL too.
     
  15. PetitJedi

    PetitJedi Private E-2

    When I copied cmd /c junction -s c:\ >C:\log.txt into run a command promt box poped up for a second and dissapeared. Also I tried running rootrepeal three times, it just makes everything freeze so I have to reboot manually, no matter how long I leave it to try and unfreeze.
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am not seeing Junction.exe in your logs, so you need to download this again as per the instructions if it is not on your machine right now. (Do not run it yet!!!)

    Please run the following:
    • please download GrantPerms.zip and save it to your desktop.
    • Unzip the file and run GrantPerms.exe
    • Copy and paste the following into the edit box of GrantPerms:
    Code:
    C:\Documents and Settings\User\Desktop\RootRepeal.exe
    C:\junction.exe
    
    • Now Click Unlock.
    • When it is done click "OK".
    • Now click List Permissions and attach the which is the Perms.txt file that pops up.
    • A copy of Perms.txt will be saved in the same directory from where the tool is run.


    Now try and run Rootrepeal and Junction. Attach logs if successful.


    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the textbox. Do not include the word Code
    Code:
    Code:
    :files
    C:\Documents and Settings\User\Templates\1pu4igwom771p2571ra12y7fk5447qc4010k6c3cbv2p5ub
    C:\Documents and Settings\User\Templates\e8010lu874aguygbc
    C:\Program Files\cachehostcab.exe
    
    :commands
    [EMPTYTEMP]
    
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.


    Run OTL again as you did in post number 9 and attach the log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  17. PetitJedi

    PetitJedi Private E-2

  18. PetitJedi

    PetitJedi Private E-2

    Even after performing the 'unlock' on Grantperms the same thing happens with Junction and Rootrepeal. The command prompt for Junction dissapears as soon as it pops up, with no log, and Rootrepeal just freezes the computer.
    I ran OTL, the fix worked, but after the scan when notepad popped up it said 'access denied'
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Just waiting on this log too.
     
  20. PetitJedi

    PetitJedi Private E-2

    I tried running that but it said access denied when notepad tried to open. I'm not sure how to get that log as it closed shortly after
     
  21. PetitJedi

    PetitJedi Private E-2

    Ah! Finally! After a reboot or two and fiddling with some programs it seems to have managed it!
     

    Attached Files:

    • OTL.Txt
      File size:
      92 KB
      Views:
      2
  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    IMPORTANT! You need to put this machine into NORMAL startup mode before we continue!!! Use MSCONFIG to do this now.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: (no name) - - (no file)
    O1 - Hosts: ÿþ127.0.0.1 localhost
    O1 - Hosts: ::1 localhost
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file)
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file)
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
    O4 - HKLM\..\RunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-lsf?lic=OUxTRlJFRS1WUFVaNy1HMkNNWC1SWFBXQS1QM05aSC05RDIwQy0zN1RT"&"inst=NzctNjUyNzU1MTAxLVQxNC1VODUrMS1YTCsxLUJCKzEtRlA5Mis2LUJBUjlHKzEtVEI5KzItRkwrOS1GMTBNKzUtUUlYMSs0LVgyMDEwKzItTElDKzc3LUZMMTArMS1TUDErMS1TVUQrMS1TMUkrMS1TVTMrMS1UVUcrMw"&"prod=55"&"ver=10.0.1382
    O16 - DPF: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} (Java Plug-in 1.6.0_18) -
    O18 - Protocol: avgsecuritytoolbar - {F2DDE6B2-9684-4A55-86D4-E255E237B77C} - C:\Program Files\AVG\AVG10\Toolbar\IEToolbar.dll (file missing)
    O20 - Winlogon Notify: avgrsstarter - Invalid registry found

    After clicking Fix exit HJT.


    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the textbox. Do not include the word Code
    Code:
    Code:
    
    :reg
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\RunOnce]
    "AvgUninstallURL"=-
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AFBCB7E0-F91A-4951-9F31-58FEE57A25C4}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{D82EF771-178D-4A8F-807F-30EE2FE9A50A}]
    
    :files
    C:\Documents and Settings\All Users\Application Data\5ab499a
    C:\Documents and Settings\All Users\Application Data\jLpDfOk06300
    C:\Documents and Settings\All Users\Application Data\lJcHbNg06308
    C:\Documents and Settings\All Users\Application Data\Viewpoint
    C:\Documents and Settings\User\Application Data\Uxixla
    C:\Documents and Settings\User\Application Data\Yzab
    C:\Documents and Settings\All Users\Application Data\AVG Security Toolbar
    C:\Documents and Settings\All Users\Application Data\avg9
    C:\Documents and Settings\All Users\Application Data\MFAData
    C:\Documents and Settings\User\Application Data\AVG10
    C:\$AVG
    C:\Documents and Settings\User\Templates\1pu4igwom771p2571ra12y7fk5447qc4010k6c3cbv2p5ub
    C:\Documents and Settings\User\Templates\e8010lu874aguygbc
    C:\WINDOWS\Tasks\Driver Robot.job
      
    :commands
    [EMPTYTEMP]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.

    Now try and run Junction again please now that we are in NORMAL mode. :) Attach log if succesful.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  23. PetitJedi

    PetitJedi Private E-2

    Ran everything alright, junction still doesn't appear to want to run however. I do think that the virus may be dead by now though, the problems I encountered have stopped anyway.
     

    Attached Files:

  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    PetitJedi, you are NOT in NORMAL startup. Did you use MSCONFIG as instructed to change to normal start up mode? According to your latest logs you did not. So please do this now and then run OTL and attach the log please.
     
  25. PetitJedi

    PetitJedi Private E-2

    Ahh I thought I had...obviously not. Should be in Normal mode now. Also wasn't sure which bit of OTL to run so I did both the fix and the scan.
     

    Attached Files:

  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes you should always be in normal mode. Any other mode is for troubleshooting and diagnostic purposes.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required (If we renamed it please rename it back to Combofix.exe.
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds