Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected by ZeroAccess, Artemis, and other Trojans


  • Please log in to reply
3 replies to this topic

#1 Strawberry Blush

Strawberry Blush

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:06:09 AM

Posted 04 August 2012 - 04:09 AM

Hi guys,

I have a 4 year old Acer Laptop with Windows XP Basic running. About a week or two ago, I was infected somehow by the Live Security Platinum virus. I had followed a tutorial I found on malwaretips.com which had instructed me to install Malwarebytes to get rid of the infection. I did as told and it got rid of a great number of trojans and malware. After I rebooted my computer as prompted, everything seemed fine. I -stupidly- didn't feel the need to install HitmanPro -which seemed to no longer have free service- or Rkill because things were going smoothly.

This past week or so, however, I started getting repeatedly infected with trojans such as ZeroAccess and Artemis. It went from 1 every other day to 1 every hour. I've spent my entire day with my computer in Safe Mode with Networking scanning my system with Malwarebytes and attempting to remove whatever is there. It's gotten ridiculous! I've even restored my system twice now in order to battle the viruses. McAfee is doing nothing to stop the viruses either. It only notifies me that the Trojan has been found and that I need to reboot my computer. I don't do that anymore thanks to the Artemis virus. McAfee had instructed me to reboot my computer when it caught that virus and needless to say, I could barely get my computer to function, hence why I needed to restore the first time.

I'm really very tired of having to combat these viruses daily because they have rooted themselves into my system. I'm an unemployed 18 year old fresh out of high school who lives with a single parent on a super tight budget so I cannot afford to just back up my files -which I have no source to, by the way- and buy a new laptop. I just need a way to get rid of these viruses so I can continue to use my current laptop in peace.

If anyone could help me out here, I would really appreciate it. Thank you in advance!

BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:09 AM

Posted 04 August 2012 - 05:41 AM

Download

TDSSkiller

Launch it.Click on change parameters-Select TDLFS file system

Click on "Scan".Please post the LOG report(log file should be in your C drive)

Do not change the default options on scan results

Download

aswMBR

Launch it, allow it to download latest Avast! virus definitions
Click the "Scan" button to start scan.After scan finishes,click on Save log

Post the log results here

Download

ESET online scanner

Install it

Click on START,it should download the virus definitions
When scan gets completed,click on LIST of found threats

Export the list to desktop,copy the contents of the text file in your reply

#3 Strawberry Blush

Strawberry Blush
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:06:09 AM

Posted 06 August 2012 - 06:25 AM

Hi Narenxp,

Sorry for the late reply. It took awhile to complete everything. Anyways, I did as you instructed and here are the logs I recieved.


This first one is the result of the TDSSKiller. Now I don't know if you wanted me to post the ending details or the entire log -it was incredibly long- so I just put the end details. Let me know if I need the full log and I'll fix it:


21:31:20.0432 4160 ============================================================
21:31:20.0432 4160 Scan finished
21:31:20.0432 4160 ============================================================
21:31:20.0489 4136 Detected object count: 0
21:31:20.0489 4136 Actual detected object count: 0
21:33:49.0483 6068 Deinitialize success


This next one is the log for the aswMBR scan:

aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-08-05 21:32:47
-----------------------------
21:32:47.762 OS Version: Windows 6.0.6002 Service Pack 2
21:32:47.762 Number of processors: 1 586 0x7F02
21:32:47.766 ComputerName: OWNER-PC UserName: Owner
21:33:36.502 Initialize success
21:35:52.793 AVAST engine defs: 12080501
21:36:14.739 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000061
21:36:14.811 Disk 0 Vendor: Hitachi_ 1.10 Size: 152627MB BusType: 6
21:36:14.904 Disk 0 MBR read successfully
21:36:14.969 Disk 0 MBR scan
21:36:14.989 Disk 0 unknown MBR code
21:36:15.005 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 10244 MB offset 63
21:36:15.124 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 142381 MB offset 20981760
21:36:15.216 Disk 0 scanning sectors +312578048
21:36:15.586 Disk 0 scanning C:\Windows\system32\drivers
21:36:58.975 Service scanning
21:38:05.670 Modules scanning
21:38:24.281 Disk 0 trace - called modules:
21:38:24.314 ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll storport.sys ahcix86s.sys
21:38:24.668 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x85cf3468]
21:38:24.674 3 CLASSPNP.SYS[87bb68b3] -> nt!IofCallDriver -> [0x85272700]
21:38:24.680 5 acpi.sys[806146bc] -> nt!IofCallDriver -> \Device\00000061[0x85243290]
21:38:25.790 AVAST engine scan C:\Windows
21:38:37.314 AVAST engine scan C:\Windows\system32
22:01:42.606 AVAST engine scan C:\Windows\system32\drivers
22:02:11.061 AVAST engine scan C:\Users\Owner
22:03:39.191 Disk 0 MBR has been saved successfully to "C:\Users\Owner\Documents\MBR.dat"
22:03:39.303 The log file has been saved successfully to "C:\Users\Owner\Documents\aswMBR.txt"



And this last one is the list of found threats from Eset. There's one trojan it was unable to clean for some reason:

C:\Users\Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0D22SQJA\document2_fire[1].pdf PDF/Exploit.Gen trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\ICReinstall_ICReinstall_setup-converterlite-ic-1.4.0.exe a variant of Win32/InstallCore.T application cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\ICReinstall_setup-converterlite-ic-1.4.0.exe a variant of Win32/InstallCore.T application cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\speedupmypc.exe Win32/SpeedUpMyPC application cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\~!#32E.tmp Win32/PSW.Delf.OBN trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\~!#47F9.tmp a variant of Win32/Kryptik.AJCV trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\~!#6BD2.tmp Win32/TrojanDownloader.Vespula.AY trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\~!#B6D8.tmp a variant of Win32/Kryptik.AJCV trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\is1598539481\zgInstaller.exe Win32/Toolbar.Zugo application cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\is324156961\MyBabylonTB.exe Win32/Toolbar.Babylon application cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\Temp\plugtmp-12\plugin-mqqwtqugkfa.php PDF/Exploit.Pidief.PFH trojan cleaned by deleting - quarantined
C:\Users\Owner\AppData\Local\{072EF1A9-D2E3-11E1-8270-B8AC6F996F26}\chrome\content\browser.xul JS/Redirector.NIQ trojan cleaned by deleting - quarantined
C:\Windows\System32\services.exe Win32/Sirefef.FB.Gen trojan unable to clean
C:\Windows\System32\zz-services.tmp Win32/Sirefef.FB.Gen trojan deleted - quarantined
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B46PAOY4\fw_dnslink_com[1].htm HTML/Iframe.B.Gen virus deleted - quarantined

Edited by Strawberry Blush, 06 August 2012 - 06:25 AM.


#4 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:09 AM

Posted 06 August 2012 - 07:26 AM

Download

http://www.techspot.com/downloads/4716-malwarebytes-anti-malware.html

Install,update and run a full scan

Click on SHOW results.Select all infections and remove it

Post the log

Download

systemlook

Launch it and copy this script and paste in the BOX

:filefind
services.exe

Click on LOOK,post the generated log

Download

mini toolbox

Checkmark following boxes:

Flush DNS
Report IE Proxy Settings
Reset IE Proxy Settings
Report FF Proxy Settings
Reset FF Proxy Settings
List content of Hosts
List IP configuration
List Winsock Entries
List last 10 Event Viewer log
List Installed Programs
List Users, Partitions and Memory size

Click Go and post the result.

Download

FSS

Checkmark all the boxes

Click on "Scan".
Please copy and paste the log to your reply.


Download

adware cleaner

Launch it click on Delete

post the generated log




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users