Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Vista Business Trojan/Malware B.exe and {BB65B0FB-5712-401b-B616-E69AC55E2757}


  • This topic is locked This topic is locked
13 replies to this topic

#1 Rudeseal

Rudeseal

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 22 September 2009 - 02:58 PM

Got hit with a bad one.. It has a rootkit and has infected several system files.. Tried to fix on my own but came across a bad wall..

Symptoms are:

1) Not allowing me to run any anti-Virus programs, root-kits, fixers.

2) When I DO run something like autoruns, the program may run for a few seconds, then shuts down the program. Any try afterwards shows the error "Windows cannot access the specified device, path, or file. you may not have the appropriate permissions to access the item".. the folder the program was in can NOT be deleted from the desktop. no matter what I do. It says I do not have permission, that I need to be an administrator to change the file from read to read/write, etc.. even though I am logged in as administrator.

3) there are several tasks in the task scheduler, including the one named "{BB65B0FB-5712-401b-B616-E69AC55E2757}".

4) When I try to use BING or any thing related to Microsoft, get random search links.. the same when I do a google search for sites to fix this problem, instant random links.. Have to copy/past the link in the address bar before it will let me get to the site.

5) Unable to run DDs.scr. All I see is a quick msdos window then it quickly disappears. Tried running it in a dos windows and run it using a command prompt, but the same problem..

6) Unable to run root repeal.. same thing.. it runs for a few seconds then quits.. any tries to run it again and the system says "Windows cannot access the specified device, path, or file. you may not have the appropriate permissions to access the item"

I have tried several programs to fix this.. the closest I got was using combo-fix from another posting on this website, but no matter what I do, once it completes, I try to connect to the internet or do anything else.. there is an error that says "item is using a process that is slated for deletion".. I have to reboot and once it reboots, I am able to do things again, but cannot connect to the Internet.. I have done everything including shutting down the windows firewall, stop all run processes using Codestuff Starter, turned off windows defender, but it is always the same problem.. the rootkit is deleted and it looks like everything is mostly cleaned off (except for my ability to delete the autoruns folders from the desktop and possibly other things I am not aware of), but I cannot connect to the internet.. The other problem I get if I try to shut down the tasks in task scheduler is on a reboot, the system automatically gives me the error "Critical system error occured, reboot in 1 minute, close any programs" and I have to do another restore so i can do anything again.

I have had to use system restore to get back to a point where I can use the computer to work and access the network, but it is infected and needs fixed.. Please Help!

Just Tried to run win32Kdiag.exe and it crashed and burned with the following logfile left on the desktop:

Running from: C:UsersUserDesktopWin32kDiag.exe

Log file at : C:UsersUserDesktopWin32kDiag.txt

WARNING: Could not get backup privileges!

Searching 'C:Windows'...



Found mount point : C:WindowsAppPatchCustomCustom

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyGAC_32Microsoft.GroupPolicy.GpmgmtLib2.0.0.0__31bf3856ad364e352.0.0.0__31bf3856ad364e35

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyGAC_32Microsoft.GroupPolicy.Private.GpmgmtpLib2.0.0.0__31bf3856ad364e352.0.0.0__31bf3856ad364e35

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyGAC_MSILMicrosoft.GroupPolicy.GPOAdminGrid2.0.0.0__31bf3856ad364e352.0.0.0__31bf3856ad364e35

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyNativeImages_v2.0.50727_32TempZAP862F.tmpZAP862F.tmp

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyNativeImages_v2.0.50727_32TempZAP8D75.tmpZAP8D75.tmp

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyNativeImages_v2.0.50727_32TempZAPD6AF.tmpZAPD6AF.tmp

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyNativeImages_v2.0.50727_32TempZAPE4F1.tmpZAPE4F1.tmp

Mount point destination : Device__max++>^

Found mount point : C:WindowsassemblyNativeImages_v2.0.50727_32TempZAPF8DF.tmpZAPF8DF.tmp

Mount point destination : Device__max++>^

Found mount point : C:Windowsassemblytemptemp

Mount point destination : Device__max++>^

Found mount point : C:Windowsassemblytmptmp

Mount point destination : Device__max++>^

Found mount point : C:WindowsCSCv2.0.6namespacenamespace

Mount point destination : Device__max++>^

Cannot access: C:WindowsCSCv2.0.6pq



ERROR OCCURRED!

------------------------------

Windows Version: Windows Vista SP2

Exception Code: 0xc0000005

Exception Address: 0x00f02415

Attempt to write to address: 0x00000000

Attached File  Win32kDiag.txt   2.13KB   16 downloads

an update..

I was checking for PIF's in the Windows directory and the Virus/worm/Trojan decided that Explorer.exe does not need to run anymore.. so now I no longer have a Desktop. When I try to manuall run explorer.exe from the C:windows directory it says that I do not have the required permissions to run the program.. I have to use task manager and run from a command window..

Did some searching using my home computer and I saw that there are "Process Blockers" out there that stop programs from running even if you are in safe mode especially if the virus/worm/trojan is running in the background through a rootkit that I think is running.. From reading the forums, I see that there are alot who have close to the same problem I am having.. But no-one is saying if there is a text (txt) file that these brand of viruses use to append program names to prevent them from running.

Does anyone know where this file may exist? of if a Restore will fix it till I get the rest of the system cleaned up? or am I just screwed?

Merged 3 posts. ~ OB

Thanks OB..

Today, I was able to run Restore from a command prompt.. Had to browse to c:\windows\system32\restore\rstrui.exe and was able to restore to a couple of days ago.. This allowed my desktop to return, but now Outlook is no longer working, so I am transferring everything over to Windows Live Mail.. (I like this better anyhow)..

So my system is still jacked.. Still have the Tasks being run in task scheduler, the rootkit is running, and I cannot run Hijackthis at all..

Any Suggestions? This is Vista Business w/SP2

Edited by Rudeseal, 23 September 2009 - 11:02 AM.


BC AdBot (Login to Remove)

 


#2 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 23 September 2009 - 07:06 PM

Hello! :(
My name is Sam and I will be helping you.

In order to see what's going on with your computer I will ask for you to post various logs from the tools that we will use to resolve your issue. Please also share with me any information about how your computer is reacting and behaving each step of the way as we work through this process.



Download and run a batch file (peek.bat):
  • Download peek.bat from the download link below and save it to your Desktop.
  • Double-click peek.bat to run it.A black Command Prompt window will appear shortly: the program is running.
  • Once it is finished, copy and paste the entire contents of the Log.txt file it creates as a reply to this post.
==========
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#3 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 24 September 2009 - 09:39 AM

Hello Sam! Thanks for helping me out :(

I ran the bat file and it looked liked it ran ok.. here is the results.. I also attached to original log.txt in case the pasting is messed. the only thing different from yesterday is that I was able to disable the tasks in task scheduler and unhide them all.. one of them points to the b.exe file which is a file I was able to delete last week before I got over my head, so this at least is not running anymore. Still have problems with the browser search redirects.. no Microsoft searches work, google, yahoo all mostly redirected.. can actually see the link change under the mousepointer to a search page.. but our firewall blocks access to most bad webpages, so that's a good thing.

--------------

Volume in drive C has no label.
Volume Serial Number is 0991-CC14

Directory of C:\WINDOWS\System32

04/11/2009 12:28 AM 177,152 scecli.dll

Directory of C:\WINDOWS\System32

04/11/2009 12:28 AM 592,896 netlogon.dll

Directory of C:\WINDOWS\System32

11/02/2006 03:46 AM 61,952 cngaudit.dll
3 File(s) 832,000 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.0.6000.16386_none_e62d292932a96ce6

11/02/2006 03:46 AM 11,776 cngaudit.dll
1 File(s) 11,776 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6000.16386_none_35d7205fdc305e3e

11/02/2006 03:46 AM 176,640 scecli.dll
1 File(s) 176,640 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6001.18000_none_380de25bd91b6f12

01/19/2008 01:36 AM 177,152 scecli.dll
1 File(s) 177,152 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.0.6002.18005_none_39f95b67d63d3a5e

04/11/2009 12:28 AM 177,152 scecli.dll
1 File(s) 177,152 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6000.16386_none_fb80f5473b0ed783

11/02/2006 03:46 AM 559,616 netlogon.dll
1 File(s) 559,616 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6001.18000_none_fdb7b74337f9e857

01/19/2008 01:35 AM 592,384 netlogon.dll
1 File(s) 592,384 bytes

Directory of C:\WINDOWS\winsxs\x86_microsoft-windows-security-netlogon_31bf3856ad364e35_6.0.6002.18005_none_ffa3304f351bb3a3

04/11/2009 12:28 AM 592,896 netlogon.dll
1 File(s) 592,896 bytes

Total Files Listed:
10 File(s) 3,119,616 bytes
0 Dir(s) 21,741,117,440 bytes free


Attached File  Log.txt   2.09KB   12 downloads

Edited by Rudeseal, 24 September 2009 - 09:43 AM.


#4 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 24 September 2009 - 03:27 PM

Let's try this the easy way first and see where it gets us.

Please download ComboFix from one of these locations:

Link 1
Link 2
Link 3

Important!
You should NOT use Combofix unless you have been instructed to do so by a Malware Removal Expert.
It is intended by its creator to be used under the guidance and supervision of an Malware Removal Expert, not for private use.
Using this tool incorrectly could lead to disastrous problems with your operating system such as preventing it from ever starting again.



Make sure that you save ComboFix.exe to your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools

  • Double click on ComboFix.exe & follow the prompts.

  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Posted Image


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

Posted Image


Click on Yes, to continue scanning for malware.

When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#5 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 25 September 2009 - 10:30 AM

Did a System Restore setpoint and then I restored from that setpoint to make sure I had a good restore point in case of failure of combofix that I was not able to recover from..

Used Codestuff starter to turn off any of the brother printer drivers that I normally have loaded on boot, along with the Windows Defender startup. Even went to services and disabled Defender service till combofix was done.. Then turned off the Windows Firewall. no virus checkers installed as the virus had earlier killed my AVG and I uninstalled it but the virus would not let me re-install AVG Anti-Virus..

Downloaded ComboFix from the bleepingcomputer.com website and saved it as "123.exe" just to be safe. it had a couple of errors while running..

1) Combofix found a rootkit and on reboot had a "Catchme.cfxxe - Application Error".. Was not able to get the error code in the message written down before it rebooted and I do not see the errors in the combofix log report.

2) After the final reboot and just before it showed the log, I saw a couple of errors in the dos window, something about not able to read catch logs or something, but it closed before I could really read it and write down what it said, then the log.txt came up. Again, none of the errors I saw were in the log report.

3) Tried to run Internet explorer, but this error came up "Illegal Operation attempted on a registry key that has been marked for deletion" it then asked to retry or cancel.. retry just came up with the same error.. so I just canceled.. This happened on just about anything I tried to run.. So I just rebooted again and this time the error did not come up.

4) I saw that the network was not connected.. Opened up network and sharing center and it told me that file and print sharing were turned off.. turned them back on and was able to see local network resources again, but no internet.. played around and found that the gateway address was missing.. typed it back in and now have internet access again. So this time I don't need to restore to get access.. whoo hoo!..

5) Still not able to delete any of the folders off my desktop that I used to try to run "autoruns" cannot rename or move them either, the system keeps saying "Windows cannot access the specified device, path, or file. you may not have the appropriate permissions to access the item". I noticed that these files were also located in the Combofix.txt file in a temp folder.. not sure what that is about.. they still exist on my desktop undeletable and a pain in the rear.

Here is the log (if you want me to paste it in a reply, I will, but I figure why let spiders know my b'idnus):

Attached File  ComboFix.txt   21.37KB   17 downloads

Edited by Rudeseal, 25 September 2009 - 02:10 PM.


#6 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 25 September 2009 - 06:12 PM

We'll be able to remove those folders once we restore permissions.

Make sure that win32kdiag.exe is located on your desktop.
Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK.

"%userprofile%\desktop\win32kdiag.exe" -f -r

When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please open it with notepad and post the contents here.


=================


We need to scan the system with this special tool.
  • Please download Junction.zip and save it.
  • Unzip it and put junction.exe in the Windows directory (C:\Windows).
  • Go to Start => Run... => Copy and paste the following command in the run box and click OK:

    cmd /c junction -s c:\ >log.txt&log.txt& del log.txt

    A command window opens starting to scan the system. Wait until a log file opens. Copy and paste or attach the content of it.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#7 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 28 September 2009 - 09:55 AM

I ran both files.. the Win2kdiag.exe ran with no problems but had to take out the "& del log.txt" part of the command line for Junction.exe as the 1st time I ran it, the Log file came up blank.. Also had to zip it up so it would upload.

Attached File  Win32kDiag.txt   169.78KB   9 downloads
Attached File  Junction_log.zip   22.13KB   19 downloads

#8 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 28 September 2009 - 07:04 PM

Well that didn't work.

Please delete win32kdiag.exe from your desktop.

Please download and run Win32kDiag:
=======================


Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

Edited by Buckeye_Sam, 28 September 2009 - 07:04 PM.

Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#9 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 29 September 2009 - 09:34 AM

Deleted Win32Kdiag.exe from the desktop and deleted all the old log files. Re-Downloaded Win32Kdiag.exe from the bleepingcomputer download link (#2) and ran it by doubleclicking on it. Here are the Results:

Attached File  Win32kDiag.txt   168.38KB   16 downloads

Downloaded the MBAM from the CNET Download link (#1). Did find that there was already a directory in Program Files, but the program itself was uninstalled.. Deleted the directory and installed MBAM. Ran it using the quickscan only and saw that several items were flagged as virus/trojans. This is the Log it produced:

Attached File  mbam_log_2009_09_29__08_17_52_.txt   1.39KB   17 downloads

I then clicked on the "Remove Selected" and this is the log it produced:

Attached File  mbam_log_2009_09_29__08_19_21_.txt   1.53KB   18 downloads

MBAM then Forced a reboot to clean out what it needed.

Here is the copy/paste version of the final report:

Malwarebytes' Anti-Malware 1.41
Database version: 2871
Windows 6.0.6002 Service Pack 2

9/29/2009 8:19:21 AM
mbam-log-2009-09-29 (08-19-21).txt

Scan type: Quick Scan
Objects scanned: 90351
Time elapsed: 3 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 3
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\RegistrySmart (Rogue.RegistrySmart) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Users\User\AppData\Roaming\RegistrySmart (Rogue.RegistrySmart) -> Quarantined and deleted successfully.
C:\Users\User\AppData\Roaming\RegistrySmart\Log (Rogue.RegistrySmart) -> Quarantined and deleted successfully.
C:\Users\User\AppData\Roaming\RegistrySmart\Registry Backups (Rogue.RegistrySmart) -> Quarantined and deleted successfully.

Files Infected:
C:\Users\User\AppData\Roaming\RegistrySmart\Log\2009 Aug 13 - 03_30_00 AM_885.log (Rogue.RegistrySmart) -> Quarantined and deleted successfully.
C:\Users\User\AppData\Roaming\RegistrySmart\Registry Backups\2009-03-04_12-50-34.reg (Rogue.RegistrySmart) -> Quarantined and deleted successfully.
C:\windows\win32k.sys (Trojan.Dropper) -> Quarantined and deleted successfully.

Edited by Rudeseal, 29 September 2009 - 12:45 PM.


#10 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 30 September 2009 - 07:53 AM

Much better. How is your computer behaving now? Let me know of any issues that you are still having.
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#11 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 30 September 2009 - 02:17 PM

So far it seems to be ok.. You think the worms/trojans/rootkits are pretty much cleaned out? Also, I manually went in and tried to reset the permissions on the program files and the desktop so I can delete the autorun folders.. are there any other registry values/trees or folders I need to check to be sure that they have the correct security permissions and settings?

#12 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 30 September 2009 - 05:56 PM

As far I can tell you are malware free. So you are still unable to delete the folders from your desktop?
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================

#13 Rudeseal

Rudeseal
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 01 October 2009 - 08:57 AM

I was able to get the permissions reset so I was able to get those deleted.. Was just curious with this type of infection if there is any other places I need to check so I don't get bit in the future. Like hidden or locked registery trees I should check or folders I need to look for.

Other then that. Whoo Hoo! Thank you very very much helping me through this!

#14 Buckeye_Sam

Buckeye_Sam

    Malware Expert


  • Members
  • 17,382 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Pickerington, Ohio
  • Local time:12:49 PM

Posted 02 October 2009 - 10:07 AM

Nope, you should be good to go! Here are few final steps and then some recommendations for you.


We need to remove Combofix now that we're done with it.
  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

  • Posted Image



==================



Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - You should disable and reenable system restore to make sure there are no infected files found in a restore point left over from what we have just cleaned.

    You can find instructions on how to enable and reenable system restore here:

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

:( :(
Posted Image If I have helped you in any way, please consider a donation to help me continue the fight against malware.


Failing to respond back to the person that is giving up their own time to help you not only is insensitive and disrespectful, but it guarantees that you will never receive help from me again. Please thank your helpers and there will always be help here when you need it!


========================================================




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users