Anti virus disabled and IE cannot reach many sites

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by amporn2522, Jun 17, 2013.

  1. amporn2522

    amporn2522 Private E-2

    My desktop has been infected by something my anti virus software has been disabled and I have run maleware bytes with no joy.

    I have followed the steps and run rogue killer.

    I attach the report.

    Please help me!!!!:-o
     

    Attached Files:

  2. amporn2522

    amporn2522 Private E-2

    For information...

    I first noticed a problem when google chrome would not start so I tried to re install it.

    Then avg free software showed a warning message but would not let me access so I
    tried to reinstall it... but ie would not let me contact avg, it would not let me access avast either.... I tried to start in safe mode but it would not let me so I ran avg rescue cd....... I then got into maleware bytes and let it kill things..... tried to run hitman prro but it crashed, I then found this great site and I followed the steps and downloaded rogue killer

    Thanks!!
     
  3. amporn2522

    amporn2522 Private E-2

    Hi
    I have run the ccleaner program
    I have tried to get malware bytes and tdsskiller to run but the computer will not let me!! It will not even let me access the downloads through IE most times

    I managed to get MG to work and I attach the log.

    Thanks
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Uninstall Wajam.


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 3 detections:

    • [RUN][SUSP PATH] HKCU\[...]\Run : ObvUbcew (C:\Documents and Settings\Owner\Local Settings\Application Data\fjchkpow\obvubcew.exe [-]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-1645522239-1078081533-682003330-1003\[...]\Run : ObvUbcew (C:\Documents and Settings\Owner\Local Settings\Application Data\fjchkpow\obvubcew.exe [-]) -> FOUND
    • [SHELL][SUSP PATH] HKLM\[...]\Winlogon : userinit (C:\WINDOWS\system32\userinit.exe,C:\Documents and Settings\Owner\Local Settings\Application Data\fjchkpow\obvubcew.exe, [7][-]) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for the item on the startup entries tab...

    • [Owner][SUSP PATH] regmonstd.lnk : C:\Documents and Settings\Owner\Start Menu\Programs\Startup\regmonstd.lnk @C:\WINDOWS\system32\rundll32.exe C:\DOCUME~1\ALLUSE~1\APPLIC~1\ofoi4.dat,XFG00 [-][7][x] -> FOUND

    ...and finally also same for items on the Driver tab.
    • [Address] SSDT[41] : NtCreateKey @ 0x8062426A -> HOOKED (C:\Documents and Settings\Owner\Local Settings\Temp\ueuexmta.sys @ 0xF78796AC)
    • [Address] SSDT[119] : NtOpenKey @ 0x80625648 -> HOOKED (C:\Documents and Settings\Owner\Local Settings\Temp\ueuexmta.sys @ 0xF7879562)

    Fix the Host file entry if you can too.


    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • O2 - BHO: Babylon toolbar helper - {2EECD738-5844-4a99-B4B6-146BF802613B} - (no file)
    • O2 - BHO: Wajam IE BHO - {A7A6995D-6EE1-4FD1-A258-49395D5BF99C} - C:\Program Files\Wajam\IE\priam_bho.dll
    • O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
    • O3 - Toolbar: Babylon Toolbar - {98889811-442D-49dd-99D7-DC866BE87DBC} - (no file)
    • O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    • O4 - HKCU\..\Run: [ObvUbcew] C:\Documents and Settings\Owner\Local Settings\Application Data\fjchkpow\obvubcew.exe
    • O4 - Startup: regmonstd.lnk = C:\WINDOWS\system32\rundll32.exe
    • O23 - Service: WajamUpdater - Wajam - C:\Program Files\Wajam\Updater\WajamUpdater.exe

    After clicking Fix exit HJT.






    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.

    Code:
    :Files
    C:\Documents and Settings\All Users\Application Data\4iofo.pad
    C:\Documents and Settings\All Users\Application Data\diqlrpdu.log
    C:\Documents and Settings\All Users\Application Data\kjhy64.txt
    C:\Documents and Settings\Owner\Local Settings\Application Data\fjchkpow
    C:\DOCUME~1\ALLUSE~1\APPLIC~1\ofoi4.dat
    C:\Documents and Settings\Owner\Local Settings\Application Data\Babylon
    C:\Documents and Settings\Owner\Local Settings\Application Data\cwgrnqhh.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\esaoaplk.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\FJCHKPOW
    C:\Documents and Settings\Owner\Local Settings\Application Data\iepefyli.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\lhlmibfn.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\nvrjixtg.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\phintbvt.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\qxmbpwro.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\rmtwgerf.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\ructnigh.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\uqdlytpl.log
    C:\Documents and Settings\Owner\Local Settings\Application Data\Wajam
    C:\Documents and Settings\Owner\Local Settings\Temp\ueuexmta.sys
    
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document into a text file and attach it here in your next post.





    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    After reboot, check to see if your firewall is working.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let us know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  5. amporn2522

    amporn2522 Private E-2

    Hi Kestrel

    I have followed your instructions and have attached the logs as requested.

    I still cannot access windows firewall and I think I am still infected as I cannot launch google chrome and it will not let me access the AVG website.

    Have I done something wrong?
     

    Attached Files:

    Last edited: Jun 19, 2013
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I think you may have a Ramnet infection, let's dig a bit deeper to confirm.
    Run this and attach the results.

    Using ESET's Online Scanner
     
  7. amporn2522

    amporn2522 Private E-2

    Hi Kestrel

    It will not let me go to the eset webpage via your link, when I get on to eset webpage after a google search when I try to run the scan it shows a cannot access the page notice!!

    Thanks
     
  8. amporn2522

    amporn2522 Private E-2

    It looks as this infection will try to prevent me accessing sites that can eliminate it as if it has become selfaware.........

    Is there anything else I can try?

    Thanks
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ramnit infections have really become quite nasty and dangerous. We could attempt to remove it, and we have had some success in the past, but recently it has become even more troublesome to remove. It is really safer to just bite the bullet and do a clean reinstall. :(

    The problem is that the damage caused by this infection really makes a PC unreliable/untrustworthy. PE file infectors like Ramnit, Virut,.... etc can infect all executable files (DLL, EXE, SCR....and many more and also HTML). These infections can open back doors that truly may compromise your computer and your security. These backdoors could allow a remote attacker to access and instruct the infected computer to download and execute more malicious files.

    In many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus or by other scanning tools. Also when disinfection is attempted, the files often become corrupted and the system may become unstable or irrepairable. The longer Ramnit remains on a computer, the more files it may infect and/or corrupt so the degree of infection can vary.

    Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies the Ramnit worm using a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are a major source of system infection.
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hello there, if you are still with me, let's try this below tool.

    Please run the below anti-rootkit tool from Malwarebytes.

    Malwarebytes Anti-Rootkit BETA 1.06


    Attach a log
    from the above.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds