Gen2 and Zeroaccess Trojan, Quad Help Request Please-

Hello,

 

I have started getting pop-up's regarding Trojan Gen2 and Zeroaccess being blocked by NIS.  I have been on the boards researching here on this site.  This is my first post, as I have read the instructions on not to try other threads instructions. I am looking for a Quad to help me remove these viruses.

 

My system:

 

Sony Vaio VPCS111FM

Intel Core i5

Win7 Home Premium S.P. 1

x64

Norton Internet Security 2012

 

I do have a flash drive.

 

I have not tried any tools yet to remove these, wanted to wait for instructions from someone better qualified than myself.

 

Thanks in advance.

 

 

 

here is the frst.txt file

Hello, im having the same problem does the same apply? im using windows vista, I used to have AVG but couldn't get rid  of either of the trojans so I removed that a paid for Norton internet security. It pops up all the time to say its blocked but is there a way of completely removing it? Its in c:\windows\installer\{a6fd3508-a3e0-85a3-587f-ede7eae0dfb4}\u\80000000.@

 

I've had it since I downloaded the new messenger update, I even tried uninstalling that and it doesn't work.

 

my laptop wont allow me to use any of my windows security either, not even update, I've tried fix it through windows and that doesn't work either.

 

I've also tried restore, running in safe mode etc and that's not working either. That's as far as my knowledge goes, I would be very grateful for any help .

 

Regards

 

Chantelle

you need to start a new thread for your own situation, please don't post in other people's threads as we are working with a professional for our specific operating system.  Please read the information in bold at the top of the Quad's posting.  Thanks!

Hello,

 

I have started getting pop-up's regarding Trojan Gen2 and Zeroaccess being blocked by NIS.  I have been on the boards researching here on this site.  This is my first post, as I have read the instructions on not to try other threads instructions. I am looking for a Quad to help me remove these viruses.

 

My system:

 

Sony Vaio VPCS111FM

Intel Core i5

Win7 Home Premium S.P. 1

x64

Norton Internet Security 2012

 

I do have a flash drive.

 

I have not tried any tools yet to remove these, wanted to wait for instructions from someone better qualified than myself.

 

Thanks in advance.

 

 

 

ooooops sorry

Looks like you have a Bootkit as well.

 

I will have FRST get me more information

 

Download the script attached, needs to be the same file name as well (fixlist.txt), Copy across to flash drive

 

NOTE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options again. Like previously

  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe or frst64.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press the Fix button just once and wait.
  • The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

 

Quads

i am confused at how to "download" the attached script.  when I click on it it is just some text, i tried to copy and paste to my flash drive in a "new folder" that i named fixlist.txt. but it wouldn't let me paste. am I missing something here?

 

never mind, I figured it out, will post fixlog soon.

here is the file:

 

Delete your copy of fixlist.txt on your Flash Drive

 

Download the script attached, needs to be the same file name as well (fixlist.txt), Copy across to flash drive

 

NOTE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options again. Like previously

  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe or frst64.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press the Fix button just once and wait.
  • The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

 

Quads

here is the file:

 

Please read carefully and follow these steps.


Download TDSSKiller from http://support.kaspersky.com/faq/?qid=208280684  click on the TDSSkiller.exe green link.

 

Double click on TDSSKiller.exe to run the application,

Open the Change Parameters option and select the detect TDL File system

 

Root_Boot.jpg

 

Click OK

 

Then on Start Scan.


If an infected file is detected, the default action will be Cure, click on Continue.
If a suspicious file is detected, the default action will be Skip, click on Continue.

 

Look for the Filesystem detection

 

TDSSFS.jpg


It may ask you to reboot the computer to complete the process. Click on Reboot Now.


If no reboot is require, click on Report. A log file should appear. Please copy and paste into Notepad and attach back here.
If a reboot is required, the report can also be found in your root directory, (usually C:\ ) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please attach the log in the post back.

 

Quads

here is the file:

 

Run TDSSkiller with just the TDL Filesystem selected the run a scan, then after the scan in the listing change the action so that TDSSkiller will delete 

 

11:12:27.0635 7748 \Device\Harddisk0\DR0 ( TDSS File System ) - skipped by user
11:12:27.0635 7748 \Device\Harddisk0\DR0 ( TDSS File System ) - User select action: Skip

 

Quads

I ran TDS Killer with just the Filesystem Detected selected.  The scan ran and immediately showed "no threats found" I don't see the listing to change the action to delete the files you mention. However, they are both listed in the results report below. Please advise. 

 

Here is the report following the scan:

 

09:24:56.0146 6356    TDSS rootkit removing tool 2.7.48.0 Jul 24 2012 13:16:32
09:24:56.0801 6356    ============================================================
09:24:56.0801 6356    Current date / time: 2012/08/05 09:24:56.0801
09:24:56.0801 6356    SystemInfo:
09:24:56.0801 6356    
09:24:56.0801 6356    OS Version: 6.1.7601 ServicePack: 1.0
09:24:56.0801 6356    Product type: Workstation
09:24:56.0801 6356    ComputerName: ANN-VAIO
09:24:56.0801 6356    UserName: Ann
09:24:56.0801 6356    Windows directory: C:\Windows
09:24:56.0801 6356    System windows directory: C:\Windows
09:24:56.0801 6356    Running under WOW64
09:24:56.0801 6356    Processor architecture: Intel x64
09:24:56.0801 6356    Number of processors: 4
09:24:56.0801 6356    Page size: 0x1000
09:24:56.0801 6356    Boot type: Normal boot
09:24:56.0801 6356    ============================================================
09:24:57.0316 6356    Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
09:24:57.0316 6356    ============================================================
09:24:57.0316 6356    \Device\Harddisk0\DR0:
09:24:57.0316 6356    MBR partitions:
09:24:57.0316 6356    \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x1141000, BlocksNum 0x32000
09:24:57.0316 6356    \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x1173000, BlocksNum 0x39212830
09:24:57.0316 6356    ============================================================
09:24:57.0363 6356    C: <-> \Device\Harddisk0\DR0\Partition1
09:24:57.0363 6356    ============================================================
09:24:57.0363 6356    Initialize success
09:24:57.0363 6356    ============================================================
09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    Scan started
09:25:14.0757 8820    Mode: Manual; TDLFS;
09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    Scan finished
09:25:14.0757 8820    ============================================================
09:25:14.0757 8796    Detected object count: 0
09:25:14.0757 8796    Actual detected object count: 0

 

 

 

 

That is not a full scan as it still also should log all the services like in the first log.

 

See how below the scan start and finish time is the same  (fastest scan I have ever seen)

 

09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    Scan started
09:25:14.0757 8820    Mode: Manual; TDLFS;
09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    ============================================================
09:25:14.0757 8820    Scan finished
09:25:14.0757 8820    ============================================================

 

Quads

This is what the second log should still look like (attached) still also showing the services / drivers

 

Quads

 NOTE: as soon as I deleted the file with TDSSkiller, I immediately got 3 alerts from Norton saying it had blocked trojan Gen2 again. 

 

This is from Norton(note the time):

 

Category: Resolved Security Risks
Date & Time,Risk,Activity,Status,Recommended Action
2012-08-05 23:03:20,High,tsk0004.dta (Trojan.Gen.2) detected by Auto-Protect,Blocked,Resolved - No Action Required


Here is the txtlog file after scanning with TDSSkiller:

Nothing to worry about, Norton just detecting files from within the TDSSkiller quarantine folder.

 

Please read carefully Read all of this message first

 

Download Combofix http://www.bleepingcomputer.com/download/anti-virus/combofix  It will be a new copy as it always gets updated.


  • Ensure that Combofix is saved directly to the Desktop <--- Very important  (Not in the Download(s) or Temp folders)

  • Disable all security programs as they will have a negative effect on Combofix, Disabled for say 1 hour or more.
  • Close any open browsers and any other programs you might have running

 

Right click the combofix.exe on the desktop and select from the menu "Run as Administrator"

 

  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review


****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

*EXTRA NOTES*

  • If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
  • If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
  • If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)

 

Quads

I ran combofix. it took a really long time, and during that time my NIS started back up (I had disabled it for 1 hour)

 

It seemed like combofix was froze at "preparing log, do not open any other programs" for quite some time.  I closed it and attached the file.

 

do you suggest I run it again, this time shutting down NIS completely, so it doesn't open back up?