Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

This file contained a virus and was deleted.


  • This topic is locked This topic is locked
10 replies to this topic

#1 Coconfused

Coconfused

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 08:31 AM

I have a friend's lap top, and I am out of my depth to fix it.

 

Just about any file I try to download gives a message:  This file contained a virus and was deleted.

 

From my reading of these forums, I've learned the names "Zero Access" and "Combo Fix."

 

I'm pretty sure I'm going to wind up posting logs and needing help.

 

On this laptop, he had Avast, McAfee, and Malwarebytes.  I wound up removing both Avast and McAfee, with the intent to reinstall something, maybe Avast later.

 

I was able to update the Malwarebytes definitions, and ran a full scan there, but it did not help with whatever the current problem is.

 

I'll sit tight and wait for instructions.

 

I do have my laptop sitting next to it with a flash drive handy if I need to move things around.

 

thanks much.


Edited by hamluis, 05 May 2014 - 09:47 AM.
Moved from Win 7 to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,054 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:12:50 PM

Posted 05 May 2014 - 08:32 AM

Hi Coconfused,
 
Lets see if this is ZeroAccess:
 
Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.
 
rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

After the tool has finished running, a text file named Rkill.txt should be located on the desktop. Please copy and paste the contents into your next reply.

xXToffeeXx~


Edited by xXToffeeXx, 05 May 2014 - 08:33 AM.

~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#3 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 08:41 AM

I got the virus detected, file deleted dialogue from attempts to Run or Save from both links.

 

should I try to download it to my computer and move it over with a flash drive?

 

could that harm my flash drive?



#4 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,054 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:12:50 PM

Posted 05 May 2014 - 08:47 AM

Hi Coconfused,

 

Yes, please use your own computer and a flash drive. Do not worry, ZeroAccess does not spread via flash drives.

 

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#5 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 09:05 AM

EDIT - post deleted


Edited by Coconfused, 05 May 2014 - 10:09 AM.


#6 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 09:08 AM

EDIT - post deleted


Edited by Coconfused, 05 May 2014 - 10:09 AM.


#7 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 09:12 AM

EDIT- post deleted


Edited by Coconfused, 05 May 2014 - 10:08 AM.


#8 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 09:29 AM

OK, I am sorry.  It was not hung up, it just took much longer than I expected it to.  Here is the TXT:

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 05/05/2014 09:18:03 AM in x64 mode.
Windows Version: Windows 7 Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * ALERT: ZEROACCESS Reparse Point/Junction found!

     * C:\Program Files\Microsoft Security Client\Backup => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\DbgHelp.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\Drivers => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\en-us => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Microsoft Security Client\EppManifest.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpAsDesc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpClient.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpCmdRun.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpCommu.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\mpevmsg.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpOAv.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpRTP.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MpSvc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MSESysprep.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpCom.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpEng.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpLics.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsMpRes.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\msseces.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\msseoobe.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\msseooberes.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\MsseWat.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\NisIpsPlugin.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\NisLog.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\NisSrv.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\NisWFP.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\Setup.exe => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SetupRes.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\shellext.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\sqmapi.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SymSrv.dll => c:\windows\system32\config [File]
     * C:\Program Files\Microsoft Security Client\SymSrv.yes => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\en-US => c:\windows\system32\config\ [Dir]
     * C:\Program Files\Windows Defender\MpAsDesc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpClient.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpCmdRun.exe => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpCommu.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpEvMsg.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpOAV.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpRTP.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MpSvc.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MSASCui.exe => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MsMpCom.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MsMpLics.dll => c:\windows\system32\config [File]
     * C:\Program Files\Windows Defender\MsMpRes.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender-events_31bf3856ad364e35_6.1.7600.16385_none_118cf1dcd54a3dea\MpEvMsg.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpAsDesc.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpClient.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpCmdRun.exe => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpCommu.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpOAV.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpRTP.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MpSvc.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MSASCui.exe => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpCom.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpLics.dll => c:\windows\system32\config [File]
     * C:\Windows\winsxs\amd64_security-malware-windows-defender_31bf3856ad364e35_6.1.7601.17514_none_b5e2b6396ecea306\MsMpRes.dll => c:\windows\system32\config [File]

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * No issues found.

Program finished at: 05/05/2014 09:26:01 AM
Execution time: 0 hours(s), 7 minute(s), and 57 seconds(s)



#9 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,054 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:12:50 PM

Posted 05 May 2014 - 09:52 AM

Hi Coconfused,
 
Yes, sometimes Rkill can take a little longer. You need to look for the "Program finished" line in the log and then you know the program has finished.
 
As Rkill proved, you are infected with ZeroAccess, we will need more advanced tools to deal with it:
 
Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

xXToffeeXx~ 


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#10 Coconfused

Coconfused
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:06:50 AM

Posted 05 May 2014 - 11:54 AM

I have started a new topic under the Virus removal heading.

 

The topic there is called "Help Removing ZeroAccess."

 

Thanks very much.



#11 hamluis

hamluis

    Moderator


  • Moderator
  • 55,565 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Killeen, TX
  • Local time:06:50 AM

Posted 05 May 2014 - 12:18 PM

MRL topic:  http://www.bleepingcomputer.com/forums/t/533360/help-removing-zeroaccess/ .

 

Now that you have properly posted a malware log topic, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on, the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.

Louis






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users