Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MawareBytes unable to remove Packer.Gen, Fake AV others


  • Please log in to reply
4 replies to this topic

#1 nbrose

nbrose

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 26 August 2012 - 02:30 PM

It appears I have a boot sector virus. When I run Malwarebytes, I get the following results:

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected: x:\I386\System32\keybtray.exe (Malware.Packer.Gen) -> 1572 -> No action taken.

Memory Modules Infected: x:\I386\System32\wzcsvc.dll (Trojan.FakeAV) -> No action taken.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{3F4DACA4-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{3F4DACA7-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{3F4DACA0-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\VBScript.RegExp (Malware.Packer.Gen) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMHelp (PUM.Hijack.Help) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
x:\I386\System32\wzcsvc.dll (Trojan.FakeAV) -> No action taken.
x:\I386\System32\keybtray.exe (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\msxml2.dll (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\vbscript.dll (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\fdco1.dll (Malware.Packer.GenX) -> No action taken.
x:\I386\System32\sfcfiles.dll (Trojan.Patched) -> No action taken.

I marked for these issues to be removed, reboot immediately, but they are still there. I'm using Hiren Boot tools to access my computer.

Thanks in advance for your help.

BC AdBot (Login to Remove)

 


#2 roelof1967

roelof1967

  • Members
  • 52 posts
  • OFFLINE
  •  
  • Local time:08:16 PM

Posted 26 August 2012 - 02:35 PM

Maybe a wierd question but do you use keygens on your system ?

And can I see the whole log included the headers ?

Roelof

Edited by roelof1967, 26 August 2012 - 02:43 PM.


#3 nbrose

nbrose
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 26 August 2012 - 04:23 PM

No keygen that I'm aware of.

Here is full log.

Malwarebytes' Anti-Malware
www.malwarebytes.org

Database version:

Windows 5.1.2600
Internet Explorer 6.0.2800.5512

2012-08-26 14:58:09
mbam-log-2012-08-26 (14-57-49).txt

Scan type: Full scan (B:\|C:\|X:\|)
Objects scanned: 174357
Time elapsed: 34 minute(s), 51 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 6

Memory Processes Infected:
x:\I386\System32\keybtray.exe (Malware.Packer.Gen) -> 1572 -> No action taken.

Memory Modules Infected:
x:\I386\System32\wzcsvc.dll (Trojan.FakeAV) -> No action taken.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{3F4DACA4-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\TypeLib\{3F4DACA7-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\Interface\{3F4DACA0-160D-11D2-A8E9-00104B365C9F} (Malware.Packer.Gen) -> No action taken.
HKEY_CLASSES_ROOT\VBScript.RegExp (Malware.Packer.Gen) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSMHelp (PUM.Hijack.Help) -> Bad: (1) Good: (0) -> No action taken.

Folders Infected:
(No malicious items detected)

Files Infected:
x:\I386\System32\wzcsvc.dll (Trojan.FakeAV) -> No action taken.
x:\I386\System32\keybtray.exe (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\msxml2.dll (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\vbscript.dll (Malware.Packer.Gen) -> No action taken.
x:\I386\System32\fdco1.dll (Malware.Packer.GenX) -> No action taken.
x:\I386\System32\sfcfiles.dll (Trojan.Patched) -> No action taken.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:16 PM

Posted 26 August 2012 - 06:55 PM

Hello,would you submit this file... keybtray.exe

Please visit the online Jotti Virus Scanner Posted Image<--link
  • Browse to the following filepath:

    ---------put the filepath here -------

  • Click on the Posted Image button.
    The scanner will check the file with various AV companies.
  • Copy and paste the results box into a reply to this thread.



Next ... Run RKill....


Download and Run RKill
  • Please download RKill by Grinler from one of the 4 links below and save it to your desktop.

    Link 1
    Link 2
    Link 3
    Link 4

  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply

Do not reboot your computer after running rkill as the malware programs will start again. Or if rebooting is required run it again.


If you continue having problems running rkill.com, you can download iExplore.exe or eXplorer.exe, which are renamed copies of rkill.com, and try them instead.



Next run Superantisypware (SAS):

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
    For instructions with screenshots, please refer to the How to use SUPERAntiSpyware to scan and remove malware from your computer Guide.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all other options as they are set):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the Control Center screen.
  • Back on the main screen, under "Select Scan Type" check the box for Complete Scan.
  • If your computer is badly infected, be sure to check the box next to Enable Rescue Scan (Highly Infected Systems ONLY).
  • Click the Scan your computer... button.
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the scan log after reboot, launch SUPERAntiSpyware again.
  • Click the View Scan Logs button at the bottom.
  • This will open the Scanner Logs Window.
  • Click on the log to highlight it and then click on View Selected Log to open it.
  • Copy and paste the scan log results in your next reply.
-- Some types of malware will disable security tools. If SUPERAntiSpyware will not install, please refer to these instructions for using the SUPERAntiSpyware Installer. If SUPERAntiSpyware is already installed but will not run, then follow the instructions for using RUNSAS.EXE to launch the program.




Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select FULL scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Rusty Shackleford II

Rusty Shackleford II

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:12:16 PM

Posted 08 December 2012 - 08:41 PM

The x:\ drive is where Mini XP is running from the Hiren's Boot USB/CD. They are essentially false positives because those are the tools that can help to reset administrator passwords, etc. The reason they are deamed positives is because they can be used in a malicioius way by. However, since they are only on Hiren's Boot drive itself you need not concern yourself with them and if you really wanted you could go back to Hiren's website and customize your boot with the programs you like. If those programs had been in c:\ or d:\ then you would have cause for alarm....




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users