Yes, ZeroFrost, same results here. Only a few traces left over. Nice tool.
A forum for reverse engineering, OS internals and malware analysis
Junction v1.06 - Windows junction creator and reparse point viewer
Copyright (C) 2000-2010 Mark Russinovich
Sysinternals - www.sysinternals.com
Failed to open \\?\c:\\pagefile.sys: The process cannot access the file because it is being used by another process.
...\\?\c:\\WINDOWS\$NtUninstallKB55876$\2579806779: SYMBOLIC LINK
Print Name : c:\windows\system32\config
Substitute Name: \systemroot\system32\config
\\?\c:\\WINDOWS\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a: JUNCTION
Print Name : C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790
Substitute Name: C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_2.0.0.0_x-ww_7d5f3790
.\\?\c:\\WINDOWS\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a: JUNCTION
Print Name : C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_4.0.0.0_x-ww_29b51492
Substitute Name: C:\WINDOWS\WinSxS\x86_System.EnterpriseServices_b03f5f7f11d50a3a_4.0.0.0_x-ww_29b51492
2012-03-20 15:58:58: Checking for bad folder
2012-03-20 15:58:58: Found 1 folders.
2012-03-20 15:58:58: Checking C:\WINDOWS\assembly\tmp
2012-03-20 15:58:58: ... Folder test returns: 1
2012-03-20 15:58:58: Checking for bad folder
2012-03-20 15:58:58: Found 1 folders.
2012-03-20 15:58:58: Checking C:\WINDOWS\$NtUninstallKB55876$
2012-03-20 15:58:58: ... Folder test returns: 1
2012-03-20 15:59:02: Some drivers where replaced. We need to enforce...
2012-03-20 15:59:02: Drivers replaced:
2012-03-20 15:59:02:
2012-03-20 15:59:02: Autonomous mode, clearing out yt folder
2012-03-20 15:59:28: Restarting...
2012-03-20 20:56:49: Checking for bad folder
2012-03-20 20:56:49: Found 1 folders.
2012-03-20 20:56:49: Checking C:\WINDOWS\assembly\tmp
2012-03-20 20:56:49: ... Folder test returns: 1
2012-03-20 20:56:49: Checking for bad folder
2012-03-20 20:56:49: Found 1 folders.
2012-03-20 20:56:49: Checking C:\WINDOWS\$NtUninstallKB22488$
2012-03-20 20:56:49: ... Folder test returns: 1
2012-03-20 20:56:50: Some drivers where replaced. We need to enforce...
2012-03-20 20:56:50: Drivers replaced:
2012-03-20 20:56:50:
2012-03-20 20:56:50: Autonomous mode, clearing out yt folder
2012-03-20 20:57:55: Restarting...
B-boy/StyLe/ wrote:Anyway - the Panda tool failed again in a colleague's topic as well.Hi Georgi,
thisisu wrote:Yes, sure.B-boy/StyLe/ wrote:Anyway - the Panda tool failed again in a colleague's topic as well.Hi Georgi,
Can you link us to the topic(s) where it has failed?
LeastPrivileges wrote:I noticed that sometimes the various removal tools have to be run more than once to be able to delete the entire infection. I usually use stand-alone permissions tools on the directories first, then run automated removal tools, it seems to help.
I ran the Panda yorkyt.exe which found the services & said it had cleaned the infection but the services are still there. I have uploaded the log.