Black internet free web hosting, hijack

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by katy45, Jun 14, 2010.

  1. katy45

    katy45 Private E-2

    ok, problem started Saturday, June 5, 2010 that i'm aware of. I run FIREFOX and web only email. Oh, don't know if it's related but about a month ago, i started receiving porn emails, definitely NOT based on my activities. They NOT OPENED and are deleted, after marking as spam.

    1. browser redirect to Black Internet, free web hosting ? i was in a hurry to leave.

    2. 2 files created as read only, stashed in a Microsoft folder in the System Volume Information. The files are services.exe and smss.exe, in the middle of all that code is an EZ BIBLE verse 44:13

    3. Internet Explorer is suddenly calling out........ to ? and giving me pop-up ads, even tho pop-ups are blocked.

    4. problems ongoing for about 10 days now and sound has disappeared, tough to watch the news that way..

    Having read the HOW TO file, now to see if I can find and attach all the logs.

    P.S. I desperately need to change colors on this site, the print is really tough on my eyes trying to read, haven't found instructions yet.

    More HELP needed. I swear i ran SAS, on 6-12-10, it took about 30 min but now can't find the log ???????? Nor the Malware bytes log, could the malware have deleted them ? Of course Malware bytes said it was clean. katy
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there and welcome. I am currently reviewing your logs and will get back to you with a set of instructions in the next post I make to you.
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The location for the logs from Malware Bytes and SUPERantispyware are as follows, and I need you to attach them into your next response here.
    1. You are running combofix from the wrong location.
    As specified in the R&R you must put it directly on your desktop.

    2. Also delete MGTools.exe from your desktop, this was put in the wrong location as well.

    3. Go to TDSSKiller and Download TDSSKiller.zip to your Desktop
    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Click Start > Run and copy/paste the following bold command into Run box and hit Enter.
    "%userprofile%\Desktop\TDSSKiller.exe" -v

    • Follow the instructions to type in "delete" when it asks you what to do when if finds something.
    • When done, a log file should be created on your C: drive named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply.

    4. Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    c:\documents and settings\katy\log
    Folder::
    C:\Documents and Settings\katy\Local Settings\Application Data\ebwhqfmdr
    Registry::
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2A0F3D1B-0909-4FF4-B272-609CCE6054E7}]
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      [​IMG]

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    5. Also delete all files in the below bold folder except ones from the current date (Windows will not let you delete the files from the current day).

    6. Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    7. Let me know the behaviour of the computer now.
     
  4. katy45

    katy45 Private E-2

    I'm sorry, this seems like i'm being very slow and cumbersome. Here are the two logs as requested. working on the balance.

    thanks. wish i had been more attentive regarding time. I am pleasantly surprised. How much longer will you be here this evening ?
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do not apologise. No worries. :)

    Not long because it's almost 3am here.

    Don't forget to attach the C:\mglogs.zip into your next reply here. I'll drop by again tomorrow. Going to bed now.
     
  6. katy45

    katy45 Private E-2

    OK, I finished about 22:30 and decided to take a spin around the block before posting again.

    Overall things are a bit better. remaining problems (to me at least). lol

    2 BAD FILES. services.exe and smss.exe, valid in and of themselves, but a bible verse and God only knows what else has been inserted into them, then placed in a Microsoft folder, INSIDE the System Volume Information. Even File ASSASSIN, won't work, says it does, but they are back shortly.

    NO SOUND, not a hardware change.

    Documents & settings\xxx\local settings\temp\ ~DFA067.tmp CAN'T delete

    6 SVCHOST.exe files showing in Task Manager, somehow I thought it should be only 4.

    Internet Explorer keeps finding advertisements to open in a new window.

    Last but not least Browser addy window keeps flashing that it is "searching bookmarks and History". Not a good thing,

    Still, better than it was. Oh, attached logs, coming right up.
     

    Attached Files:

  7. katy45

    katy45 Private E-2

    And while typing this, Windows Explorer says it has a problem and needs to close, will see if i can copy the notation for you. wininet.dll / offset 00003674. Not going to let me copy and paste anything.
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Nothing to worry about, these are caught in system restore and they will no longer exist once we have toggled SR and followed final steps.

    Sadly, sound issues and other non malware related issues can not be discussed here. Your best bet would be the software forum.

    Not malware. Not to worry.

    Normal.

    Did you run TDSSKiller as requested? I suspect not. Please do so and attach the log it creates into your next reply.
     
  9. katy45

    katy45 Private E-2

    Sorry about that, TDSSKILLER, I did run it, but it came up in a DOS / COMMAND PROMPT fashion, in the blink of an eye AND NO LOG !!! I think i looked everywhere, if you will give me a clue i'll be happy to look again. katy
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    As stated in a previous message:

    Are you still having redirects?
     
  11. katy45

    katy45 Private E-2

    TDSSKILLER LOG attached, apparently I did something wrong last night.
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ok. Now please address my questions:

    Are you still being redirected or not?

    How's the PC running now?
     
  13. katy45

    katy45 Private E-2

    Redirects have stopped.

    System seems unstable, current open program is being halted, must use mouse to bring it back to active. Other than that, it seems good.
     
  14. katy45

    katy45 Private E-2

    Sorry, forgot to mention that ALL sound disappeared during malware presence and has not returned, not even Windows sign on/ off. Just tried a music CD and nothing. Please ?
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Any remaining issues will have to be resolved in the appropriate forum, eg: software/hardware.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Katy45 I apologise, I missed some malware before.

    If you have not yet removed ComboFix, then we will use it. If you have, just re-download it and leave it on your desktop.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File:
    C:\System Volume Information\Microsoft\services.exe
    C:\System Volume Information\Microsoft\smss.exe
    
    Folder::
    C:\System Volume Information\Microsoft
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    [​IMG]
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
    Last edited by a moderator: Jun 18, 2010
  17. katy45

    katy45 Private E-2

    Kestrell, I posted earlier tonight, don't know what happened to it. Anyway, i ran ComboFix

    and will post log. Combo did tell me that E-Trust was still actively scanning, but I couldn't

    find any process to turn it off. Also in my very first post perhaps I should have mentioned

    that I had moved My documents and bookmarks to another Drive, fearing that I might lose

    them. Don't know if that makes a difference. Am I correct, in that the turning off of System restore comes after you examine the logs ?

    When I went to look for MGTools to download, I didn't find the zip one, so went with the

    exe. It opened in a CMD.exe promt and consequently, there is no log. Do I need to

    get MGTools.zip again and re-run it ? Thank you.
     

    Attached Files:

    Last edited by a moderator: Jun 21, 2010
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes please. Re download MGTools.exe, save it to your C:\ Drive and re run it. Attach the C:\Mglogs.zip into your next reply here.
     
  19. katy45

    katy45 Private E-2

    Kestrell, I apologize, this thing seems to have the better of me, obnoxious malware, that is.

    As I said, I ran MGTool.exe last night, but couldn't find the log. Now I see it sitting there

    plain as day. Can't think of any changes that i've made since then, but would like to mention that when I first looked at the system this morning and searched for all files created on 6-21-10 and found several batch files, which ran at about 4:30 a.m., when I was in bed asleep. Could this be part of the MGTool actions ?

    I am attaching the MGlogs.zip and await your reply. Thanks
     

    Attached Files:

  20. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please turn off system restore. Reboot and then run the ComboFix fix again. Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  21. katy45

    katy45 Private E-2

    I have run ComboFix and will attach log.

    Also will attach MGlogs.zip.

    The two problems files that were LOADERS, had been gone, but it seems they are back.

    Please let me know when I may ask questions.

    Hope we're getting close. I really appreciate your help.
     

    Attached Files:

  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can ask questions any time. :)

    Are you sure you turned off system restore? It must be off in order to remove those files. So you need to turn it off and reboot. Then run the fix. Since Combo didnt do it, lets try Avenger.

    Download The Avenger by Swandog469, and save it to your Desktop.

    * Extract+ avenger.exe from the Zip file and save it to your desktop

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run Ccleaner!

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  23. katy45

    katy45 Private E-2

    Tim, thanks for the OK on questions, I have a few.

    A week or so ago, I uninstalled Java, but one BINARY file remains, should I delete it manually ? NOTE: I did NOT download and install a fresh Java. I don't know what it does for the system.


    I also moved My Documents and Bookmarks to another Drive for safekeeping, it is possible / likely that there is bad code lurking in them ? As far as I can recall none of the scanners ask about additional drives.

    Is it possible that my LinkSys router is involved in the reinfection, and if so what to do about it ? The other system on the same router has had intermittent problems.

    I don't know when or how it happened, but the Administrator account password no longer works, and I don't know how to reset it.. As far as I know I do have administrator rights on my account, not deliberate on my part, as I have read that it's not a good practice to surf that way.

    And last, is it AUTOMATIC for System Restore to reset itself at boot up ? I'm sure I turned it off, and don't think I turned it back on, yet upon checking it's on.

    I have limited my internet time since June 5, when I became aware that there is a problem.
    I don't wish to participate in spreading malware of any sort.

    Thanks again. I will proceed with your instructions.
     
  24. katy45

    katy45 Private E-2

    HI Tim,

    I'm finished, correctly, I hope. Logs attached.
     

    Attached Files:

  25. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Java is necessary to view some web info. You can download the latest version here:
    Java Runtime 6

    This should not be a problem. However, both SAS and MBAM will scan additional drives ---> but you have to have MBAM do a deep scan in order to select additional drives.
    Not with this infection.
    Go to the control panel / user accounts and you should be able to reset a password for the Admin. account.
    It should have stayed off once you rebooted. This may be part of the infection process. We have only seen this in one other thread. So we are trying to come up with a procedure to deal with it. So, on that note:

    Again disable system recovery first.

    You will need to boot to the Recovery Console to remove this infection. That means that you have to go into your bios and set the cd as the first boot option. See the accompanying link.

    Now boot to the Recovery Console and run the fixmbr to clear a Master Boot Record infection that you have.

    You can read the below to help you do this:

    http://support.microsoft.com/kb/307654


    Then boot back into normal mode.

    Now:

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:

    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  26. katy45

    katy45 Private E-2

    Good morning Tim.

    Thank you for the instructions, everything was going quite well, UNTIL, the system came back and said "ya really want to fix that Master Boot Record ? knowing that you may well lose data ?"

    At that point I got really cold feet and backed out. My C: drive is logically (or not) split into 2 drives. It has been my understanding that when splitting, the System will look at the physical drives and assign C: and D: with E: becoming the second partition of c: Situation is, when I backed out of the FIXMBR, it dumped me at C:\, not a problem, until I ran a directory of C: and found the contents of D: there also.

    Available space = 10.6 GB available on C:, 20.5 free on D: and 7.83 on E:,

    The biggie question is, will the OS look at the physical size of C: and assign all of it ? Eliminating my partition ? Which would lead to duplicate Dir's among other things. I really didn't see this one coming, sorry. HELP !!!!!!!!
     
  27. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We can try a different track. Download bootkitremover.rar and save it to your desktop.

    • You then need to extract the remover.exe file from the RAR using a program capable of extracing RAR compressed files. If you don't have an extraction program, you can use 7-Zip
    • After extracing remover.exe to your Desktop, double-click the remover.exe file to run the program.
    • Attach or post inline here, the output from remover.exe
     
  28. katy45

    katy45 Private E-2

    I sure hope you're there, invisible ?

    Bootkit Remover version 1.0.0.1
    (c) 2009 eSage Lab
    www.esagelab.com

    \\.\C: -> \\.\PhysicalDrive0
    MD5: c74136a0395300dd00865bf7d6b58002
    \\.\D: -> \\.\PhysicalDrive1
    MD5: c74136a0395300dd00865bf7d6b58002
    \\.\E: -> \\.\PhysicalDrive0

    Size Device Name MBR Status
    --------------------------------------------
    27 GB \\.\PhysicalDrive0 Unknown boot code
    74 GB \\.\PhysicalDrive1 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>


    Press any key to quit...

    NOTE: HAVE NOT CLOSED PROGRAM.
     
  29. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have this system set up to dual boot? What is on partition D?
     
  30. katy45

    katy45 Private E-2

    NOT a dual boot. D is storage for the most part. why do you ask ? E is also storage, but more critical.
     
  31. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have everything you need backed up to the D:\ drive? Do you have your xp cd? I want to cover all bases in case the fix goes wrong. There is that chance, so we want to minimize that.

    Also, is this a Dell computer?
     
  32. katy45

    katy45 Private E-2

    Tim, would it help if i told you that I generally use FDisk and ???? in dos to set these drives up ? got the manual handy if i need it.
     
  33. katy45

    katy45 Private E-2

    NOT a Dell, I built it......... No everything is not backed up. I'm a packrat, sorry.

    Forgot something, we have purchased 2 XP systems, can't find the serials. I DO have cd's one factory, the others copies but not marked as well as they should have been. OMG i'm bad.
     
  34. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The problem exists in your MBR. We have two choices. One is to go ahead and do the recovery console fixmbr command. The second is to run the bootkit remover to fix it. That is why I want to know if all your personal data and files are backed up, in case we need to just wipe the C:\ drive and reinstall the OS on it.

    This is what we need to do if going with option 2:

    Now - please do the following:

    * Click Start, Run then copy and paste the below into the Run box and click OK.

    "%userprofile%\Desktop\remover.exe" fix \\.\PhysicalDrive0

    * Now reboot your PC and after reboot continue with the below instructions.

    See if these still exist:
    C:\System Volume Information\Microsoft\services.exe
    C:\System Volume Information\Microsoft\smss.exe
    C:\System Volume Information\Microsoft
    Delete them if they do.

    * Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    o C:\MGlogs.zip

    **Make sure you tell me how things are working now!
     
  35. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Is your D:\ drive a slave drive? Not a partition on your main master drive?
     
  36. katy45

    katy45 Private E-2


    you are correct, it is a slave.

    The problem files were still there, but in name only.........at least according to ProcessExplorer. They have been deleted, then emptied the Recycle bin.

    most recent log attached............... it's looking like you are AWESOME. thanks, but I do await your reply.
     

    Attached Files:

  37. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Sweet....it didnt turn into a brick!! LOL.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:

     
  38. katy45

    katy45 Private E-2

    Hope you haven't run off, just yet.

    I followed the clean up thru #8, and upon checking sys restore is already turned on, shall i turn it off for the reboot ? i'm thinking it was part of the MG tools clean-up procedures.

    in the meantime, i'll dig out the original procedures, to be sure i haven't missed anything.
     
  39. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, turn off system restore, then reboot and re-enable it. There are no doubt restore points that have the infection in them, so we want to flush the system. You will now have a clean restore point if needed in the near future.
     
  40. katy45

    katy45 Private E-2

    So far, so good. Windows has already come back and asked to install new hardware it found, as in audio.

    I understand that you are super busy, but i really need to know, what could / may have been achieved with the type of infection the sys had.
     
  41. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    This is a very new type of infection that is going around. We frankly do not know if it is just intended to screw with windows users or have an alternative intent. I don't believe it was intended to steal any user info, at least not at this point. We deal with a lot of infections that seemingly have no other purpose than to cripple users system. :(
     
  42. katy45

    katy45 Private E-2

    Since I'm primarily self-taught, with your permission, I will continue to dig around on your site, especially for lock-down type info. Without being explicit, it's horrible to be so vulnerable with potentially disastrous results.

    Many thanks again.
     
  43. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We hope that you will stay and participate in the forums. Do pay attention to the last link for How to Protect Yourself......

    And you are most welcome. :)
     
  44. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Katy, I just remembered to ask you why you have your drives formatted as fat32? Is there a particular reason you have not changed them to NTFS?
     
  45. katy45

    katy45 Private E-2

    Hi Tim, The rejection of NTFS came about as a result of finding that the Clent based email would be stored purely in code, I like English. That said, because of malware and sometimes idle curiosity, I drag things into a notepad for a look. Add to that eventually I came across an evaluation that indicated 64bit was not all it was cracked up to be, by MS. And I'm glad you came back, because I had another couple of questions.

    Is there any way to know when I acquired the MBR infection ? I do know that there had been system problems for several months, intermittently. Apparently I was just barely keeping them in check.

    Further I finally remembered that at one time, think several years ago, there was such a problem that I simply added a drive and installed the system on it. Thought the old system was still on D:, but after looking for it either the system worked thru it or I deleted it. There are some suspicious looking folders on D: that match trouble dates. At this point it seems best to simply delete them. It also seems odd that thru all of this MBAM kept pronouncing everything clean. How to tell if that software has been compromised ?

    I really appreciate your help and the fact that you are good to work with. Have a good one. My garden has been on hold and is calling me.
     
  46. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    None of our logs found it other than HJT> which doesn't give a date of origin. But during the course of the removal, you could have found the C:\System Volume Information\Microsoft folder and checked its date.
    If you wish to start semi-fresh, you may want to reformat the D: drive. I don't think there is any malware on it, but at least then you would be sure. You could save those things that you know are clean.
    Some protection software just will not run if they are compromised. That's often the first notice you get that you are in trouble.
    Hope the garden is growing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds