Jump to content

Help also! RootKit.0Access


Recommended Posts

Hey, new here and was hoping someone could help me. I have the RootKit.0Access problem. I tried to follow the instructions you laid out here, but I got really REALLY lost. It's been almost 10 years since I've had any virus or malware. In that time I've lost a lot of computer skills, so I really need someone to help me step by step. Thanks to anyone who is willing to try!

Link to post
Share on other sites

  • Replies 67
  • Created
  • Last Reply

Top Posters In This Topic

Welcome to the forum, please start at the link below:

http://forums.malwar...?showtopic=9573

Post back the 2 logs here.....DDS.txt and Attach.txt

<====><====><====><====><====><====><====><====>

Next.......

Please remove any usb or external drives from the computer before you run this scan!

Please download and run RogueKiller to your desktop.

For Windows XP, double-click to start.

For Vista or Windows 7, do a right-click on the program, select Run as Administrator to start, & when prompted Allow to run.

Click Scan to scan the system.

When the scan completes > Close out the program > Don't Fix anything!

Don't run any other options, they're not all bad!!!!!!!

Post back the report which should be located on your desktop.

MrC

Link to post
Share on other sites

Oh! I doubt it's worth mentioning, but during those scans Malwarebytes was scanning. I doubt it interfered with anything. Also, when RogueKiller finished scanning it linked me to this site. My guess it that I won't be using any of the information on that site. Thanks!

Link to post
Share on other sites

Here you go......

Your computer is infected with a nasty rootkit. Please read the following information first.

You're infected with Rootkit.ZeroAccess, a BackDoor Trojan.

BACKDOOR WARNING

------------------------------

One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

http://www.dslreports.com/faq/10451

When Should I Format, How Should I Reinstall

http://www.dslreports.com/faq/10063

I will try my best to clean this machine but I can't guarantee that it will be 100% secure afterwards.

Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.

-----------------------------------------

Before we proceed further, please uninstall or disable uTorrent and any other peer-to-peer filesharing app.

Continued use of filesharing or ill-advised downloads will surely re-infect your system.

Risks of File-Sharing Technology.

P2P file sharing: Know the risks

It's also against the forums policy:

http://forums.malwar...showtopic=97700

~~~~~~~~~~~~~~~~~~~~~~~

Please make sure system restore is running and create a new restore point before continuing!

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.

To enter System Recovery Options by using Windows installation disc:

  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.

On the System Recovery Options menu you will get the following options:



    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt

    [*]Select Command Prompt

    [*]In the command window type in notepad and press Enter.

    [*]The notepad opens. Under File menu select Open.

    [*]Select "Computer" and find your flash drive letter and close the notepad.

    [*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter

    Note: Replace letter e with the drive letter of your flash drive.

    [*]The tool will start to run.

    [*]When the tool opens click Yes to disclaimer.

    [*]Press Scan button.

    [*]FRST will let you know when the scan is complete and has written the FRST.txt to file, close out this message, then type the following into the search box:

    services.exe

    [*]Now press the Search button

    [*]When the search is complete, search.txt will also be written to your USB

    [*]Type exit and reboot the computer normally

    [*]Please copy and paste both logs in your reply.(FRST.txt and Search.txt)

MrC

Link to post
Share on other sites

First of all it's not my policy > I have nothing to do with Malwarebytes and I'm not one of the staff.

I just follow the forums rules just like you have to!

Like it says in my signature: I volunteer my free time to help you.

Here's the stated policy on P2P programs:

If you're using Peer 2 Peer software such as uTorrent or similar you must either fully uninstall it or completely disable it from running while being assisted here.

Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.

The reason they want it disabled is:

Continued use of filesharing or ill-advised downloads will surely re-infect your system.

Not piracy.

~~~~~~~~~~~~~~~~~~~~

By the way, what do I do with the contents of C:\Users\User\Desktop\RK_Quarantine?

Leave it for now, when we are done you can delete it.

~~~~~~~~~~~~~~~~

Just so we're clear, I disabled uTorrent, but I don't agree with the view that having such a program installed labels me as some sort of criminal.

That's not what they're saying...again the resaon is:

Continued use of filesharing or ill-advised downloads will surely re-infect your system.

You have to take it up with the forums administration .....OK!!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Run RogueKiller again and click Scan

When the scan completes > click on the Registry tab

Put a check next to all of these and uncheck the rest: (if found)

[RUN][bLACKLIST DLL] HKCU\[...]\Run : mstaxt ("C:\Windows\System32\rundll32.exe" "C:\Users\User\AppData\Roaming\mstaxt.dll",_ascii_formatd) -> FOUND

[RUN][bLACKLIST DLL] HKUS\S-1-5-21-297971519-1915049780-1549598355-1001[...]\Run : mstaxt ("C:\Windows\System32\rundll32.exe" "C:\Users\User\AppData\Roaming\mstaxt.dll",_ascii_formatd) -> FOUND

[HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\$Recycle.Bin\S-1-5-21-297971519-1915049780-1549598355-1001\$3568e537840c333f469ff821fd809671\n.) -> FOUND

Now click Delete on the right hand column under Options

OK, here you go......Please carefully carry out this procedure!!!!!!

Please download the attached fixlist.txt and copy it to your flashdrive.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options. (as you did before)

Run FRST64 or FRST (which ever one you're using) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

MrC

Link to post
Share on other sites

I ran RogueKiller again like you said. I deleted the first two but the following said it was replaced instead of being deleted: [HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\$Recycle.Bin\S-1-5-21-297971519-1915049780-1549598355-1001\$3568e537840c333f469ff821fd809671\n.) -> FOUND

I appreciate that you're giving your time to do this for free. I meant no disrespect.

I am now about to start the next part of the process and run FRST64 from System Recovery.

Link to post
Share on other sites

I'm still getting redirects. Trying to log in to the forums here I was redirected to some mal site. I don't know if that's unusual for this stage of the process or not. I have attached the file you requested. Just as I was typing this Malwarebytes gave me a pop-up. I took a screenshot and attached it. Again, not sure if that's unusual for this stage. Again, thank you for your continuing support.

Fixlog.txt

post-117409-0-48950100-1346444453.png

Link to post
Share on other sites

OK, that's part of the infection.

Are you on a wireless network??

~~~~~~~~~~~~~~~~~~~~

Please make sure system restore is running and create a new restore point before continuing.

XP <===> Vista & W7

Please read the directions carefully so you don't end up deleting something that is good!!

Please download and run TDSSKiller to your desktop as outlined below:

Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.

For Windows XP, double-click to start.

For Vista or Windows 7, do a right-click on the program, select Run as Administrator to start, & when prompted Allow to run.

tdss_1.jpg

-------------------------

Check the boxes beside Verify Driver Digital Signature and Detect TDLFS file system, then click OK.

tdss_2.jpg

------------------------

Click the Start Scan button.

tdss_3.jpg

-----------------------

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

tdss_4.jpg

----------------------

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

tdss_5.jpg

--------------------

A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste its contents on your next reply.

Sometimes these logs can be very large, in that case please attach it or zip it up and attach it.

-------------------

Here's a summary of what to do if you would like to print it out:

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

MrC

Link to post
Share on other sites

I am on a network with my roommate (who is very good with computers and very security conscious). I am hardwired into the network, but we do have password protected wireless access.

While I'm thinking of it, would using a restore point from a few weeks ago solve this whole problem?

I am now beginning the process with TDSSKiller.

Link to post
Share on other sites

While I'm thinking of it, would using a restore point from a few weeks ago solve this whole problem?

No

~~~~~~~~~~~~~~~~~~~~

The TDSSKiller log is clean, those files are good.

Can you hook up directly to the modem and by pass the wireless?

If so........

Please download and run ComboFix.

The most important things to remember when running it is to disable all your malware programs and run Combofix from your desktop.

Please visit this webpage for download links, and instructions for running ComboFix

http://www.bleepingc...to-use-combofix

Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Information on disabling your malware programs can be found Here.

Make sure you run ComboFix from your desktop.

Give it at least 30-45 minutes to finish if needed.

Please include the C:\ComboFix.txt in your next reply for further review.

---------->NOTE<----------

If you get the message Illegal operation attempted on registry key that has been marked for deletion after you run ComboFix....please reboot the computer, this should resolve the problem. You may have to do this several times if needed.

MrC

Link to post
Share on other sites

Ok, about to run Combofix following the instructions in the link. I will have to leave for work in less than an hour. I'm hoping combo fix will be done by then. If not, I'll have to leave it running and come back to it - and this post - when I return home.

Link to post
Share on other sites

Here is the log from ComboFix. I would like to note that after running it and resarting several times, my computer is unable to see any networks whatsoever. I was only able to get online by borrowing my roommate's laptop. I've tried the few basic things I know to reestablish connection, but it literally thinks there's nothing there. I don't know how ComboFix works so I can't say what it did. I could sure use some help reestablishing my network connection.

Time for me to head out the door. I'll check back in 6 to 10 hours. Thanks for your help thus far. Please don't ghost on me!

ComboFixLog.txt

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.