Can't run malware bytes or combofix; regedit inoperable

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by MikeD052, May 26, 2009.

  1. MikeD052

    MikeD052 Private E-2

    Howdy, my first post anywhere so excuse me if not up to speed on protocol.

    My system has been protected by AVG 8.5 but for some reason the latest definitions could not be updated, Server refusal? this may be unrelated to what follows.

    The first indication of trouble (5-21-09) was when clicking on google search results, I was redirected to what seemed like random URLs; then I noticed a Health site that I was directed to a couple of times and realized it was not broken links that were at work here, I guess this is called URL redirecting?
    Then quite suddenly I had red warnings popping up from "Spyware Remove 2009"
    I recognized this was rogue and researched for a remover tool, came up with PC tools Spyware Doctor which found many problems and fixed them, then for good measure I ran the associated Registery Mechanic and fixed more stuff.

    However some critical programs that I need for work could not function; working with their tech support showed that the regedit could not be run and I had serious issues beyond what PC Tools could deal with. I was told I could call back when my computer was fixed.

    After stumbling around and trying several fixes and scans to no avail, I chanced upon this thread:
    http://forums.majorgeeks.com/showthread.php?t=139313

    and followed the directions religiously. SuperAntiSpyware would only run using the alternately named program, but it did work, and I have attached the log.

    Malwarebytes would not finish installing even after renaming to MB.exe; the install progress bar goes to about 60% and freezes each time; an unusable icon does land on desktop

    Combo fix will not install.

    MGTools ran but with errors not described in the instructional thread;
    Errors;
    Sort utility needs to close

    ProcessDll.exe
    Application generated exception which cant be handled
    process id=0x17a8(6056) tread id=0xc04(3076)

    Runtime error 216@00E44A49

    Please help, I have aprox 26 hours invested in trying to fix this on my own, I love this computer and don't want to have to replace it because the evil ones have dealt it a near fatal blow.

    If you need more info or I've left out critical details, forgive me, this is my first effort posting on a help site.
     

    Attached Files:

  2. MikeD052

    MikeD052 Private E-2

    Upon shutting down windows, I get memory error referencing ati2avxx which may be a root kit problem.
    Other symptom, computer will run for about an hour or so before freezing.
    Not sure how to edit the existing post but thought this should be helpful to whoever is looking at this post.
     
  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let's start with this and then see if you can run the other scans.

    download The Avenger by Swandog469, and save it to your Desktop.

    Please Disable Spybot's TeaTimer

    * Run Spybot and click Mode
    * Select Advanced Mode.
    * Then click Tools and select Resident.
    * Now in the right window pane, uncheck TeaTimer.
    * Also while this is open, in the left column now select IE Tweaks
    * and then in the right pane make sure all the Miscellaneous locks are unchecked.
    * Now quit Spybot!

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    * Extract+ avenger.exe from the Zip file and save it to your desktop
    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:


    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.
    -
    Now run Ccleaner to clean out only temp files and nothing else!

    Then find these folders and delete everything ( you can not remove files from today):
    C:\WINDOWS\Temp\
    C:\Documents and Settings\HP_Administrator\Local Settings\Temp\

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    MBAM
    Combo
    MGLogs.zip
     
  4. MikeD052

    MikeD052 Private E-2

    TimW
    Thanks so much for your assistance.
    Was away til yesterday travelling.

    I should mention that I am using another computer to access the internet to minimize the time that the infected computer is on the network.

    I followed the procedure, but with little luck.
    Most importantly it took 4 attempts to reboot after the Avenger Shutdown, and I am afraid to tun it off in case I can't ever reboot it.

    But from the top, Spybot will not run a window even though it it is evident in the tray. I used process manager to shut down teatimer and other apperances of Spybot. Did the best I could on AVG and SuperAntiSpyware.

    The avenger process seemed to go well, but could not restart. On reboot the HP Logo screen would freeze; across the bottom of the screen it says;

    v3.18 <esc=bootmenu> <F1=setup> <F10=System Restore>

    I was finally able to get past this point by rebooting with a media drive removed and after a while staring at the Logo Screen, I slid the drive in and engaged it, that surprisingly kicked Windows past this logo screen to a black startup screen which asked what operating system to start up with; chose XP, cant remember the other option. When stuck at the Logo Screen the wireless keyboard is not operable.

    The avenger popup window did come up

    When running CCleaner; only Internet Exploret temp and System temp was checked.

    As to manually deleted files, there was only one older than today

    Double clicking on getlogs.bat did not appear to do anything.
    I ran MGtools in the C: directory and attached that zip, renamed with an 02

    mb and combofix will still not run
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:


    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now run Ccleaner to clean out only temp files and nothing else!
    Then make sure this folder is empty:
    C:\Documents and Settings\HP_Administrator\Local Settings\Temp\

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  6. MikeD052

    MikeD052 Private E-2

    I think we are making progress; the Temp folder had 65,000 files in it, deleted them in batches of 4-5,000 at a time. Upon reboot something added about 40 new files, all with 0 kb. One or two files cannot be deleted as used by other program? I attached screen captures. The temporary Internet folder has about 50 files, mostly cookies, which were not removed by Ccleaner, I assume that is normal.

    this time I was able to run getlogs.bat by dbl clicking

    On boot up still got no disk error
    on running mg tools still got sort utilities error

    byw rebooting takes a long time
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You have three files that I cant identify:
    C:\gz_spec.dbf
    C:\WINDOWS\gf_prf2006.IN2
    C:\WINDOWS\gf_prf2006.ini

    Let's try taking each of those files and renaming them as such:
    C:\gz_spec.dbf.old
    C:\WINDOWS\gf_prf2006.IN2.old
    C:\WINDOWS\gf_prf2006.ini.old

    Then lets see if that causes problem or stops some of the problems.

    Then do this:
    Using BitDefender Online Scan.

    You have teatimer (which you should have disable before) still running as well as threatfire...may be the cause of your slow boot time....that is something you need to address in the software section.
     
  8. MikeD052

    MikeD052 Private E-2

    First of all I want to thank you so much for the help, I would be at a loss trying to clear this myself.

    The C:\gz_spec.dbf file is from an industry pricing program
    not sure about the other 2, I renamed them as suggested

    I ran the online scan overnight, but the computer froze this morning when I went to save the log, the files detected were deleted. They were mostly generic; one file was a jpg (never knew a jpg could carry a virus) , a couple were from my download file for pdf995 (great program, not spyware), and a couple were adware which were in the aol file from the bundled junk that came with the computer. nothing stood out to my untrained eye, except the last item that said "update failed".

    Upon reboot, a long wait at the logo screen, during which time the temp file began to fill up again with those verxx.tmp files. Dont know if this is a symptom of my problem but is seems significant. In the attached screen capture you can see that over 2000 temp files were created during the few minutes of the bootup, also visible is ssupdate.exe which is probably part of SuperAntiSpyware but Googling it results in some warnings, so want you to be aware. also in the temp file is ~DFxxx.tmp which is always 16kb, this is one file that I previously reported that I could not delete.

    Another symptom is is my computer makes the click-snap sound that it makes when changing web pages, but it will do it when no browser is open.
    I think that when the network cable is disconnected the errant clicks stop.

    should I run the bitdefender scan again? it takes several hours
     

    Attached Files:

    Last edited: Jun 4, 2009
  9. MikeD052

    MikeD052 Private E-2

    Update
    My computer froze and upon rebooting;
    I am back to having 65,000 plus temp files
    it takes a while to delete them but I will do that now
    some will not delete
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    And is not CCleaner removing these files? Please run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip
     
  11. MikeD052

    MikeD052 Private E-2

    I have been running Ccleaner as requested with only two boxes checked. IE temporary files and system temporary files. Today I did use ATF cleaner and checked "current user temp" that worked on that folder.

    also I had popup for "Personal Antispyware, a rogue I think, jpg attached.

    UNINSTALLED SPYBOT!!
    Spybot would not run in a window even though it appeared in the tray, I uninstalled it, hoping that would address the teatimer issue. not sure what I need to do about threatfire.
     

    Attached Files:

  12. MikeD052

    MikeD052 Private E-2

    Should have also mentioned that I ran SAS BEFORE MGtools, did not get log.

    Just now tried to start SAS to see if i could get the log but it will not now run.
    when it ran it earlier it found the same "Rootkit.Agent/Gen-UACFake" as before
     
  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    This is annoying .....let's have you do a few things.

    First, I would uninstall ThreatFire. And is your version of Spyware Doctor a paid for or free version. If free, uninstall it also.

    Now I want you to run both SAS and MBAM on the guest account. When it is finished, disable the account!

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    * Run avenger.exe by double-clicking on it.
    * -Do not change any check box options!!
    * Copy everything in the Quote box below, and paste it into the Input script here: part of the window:


    * Now click the Execute button.
    * Click Yes to the prompt to confirm you want to execute.
    * Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    * Your PC should reboot, if not, reboot it yourself.
    * A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\Avenger.txt
    * C:\MGlogs.zip
     
  14. MikeD052

    MikeD052 Private E-2

    OK
    Threatfire; Don't know how it was installed on my computer, I assumed it came with Foxfire or PC Doctor. Was not listed in "Add-Remove Programs" and did not see it running as a process in Process manager or Security Process manager. I downloaded and ran a utility which was supposed to remove all traces of the program.

    Spyware Doctor is a paid version ( as well as the registry Mechanic that was offered at a discount with it )

    Ran SAS on the Guest account, no threats found; log attached

    MalwareBytes; cannot still install this program, either mbam or mb, the install hangs up; see previous screen capture jpg.

    MGTools; I ran this from the new file on the root directory, I hope this is what you intended. 2 errors as prev. reported, Sort util error, and ProcessDLL.exe exception.
     

    Attached Files:

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am beginning to think this is a software problem as the only thing left is the temp files which you need to remove....
    Code:
    C:\Documents and Settings\HP_Administrator\Local Settings\Temp\"
    dio14.tmp     Jun  8 2009       47122  "DIO14.tmp"
    dio16.tmp     Jun  8 2009       47122  "DIO16.tmp"
    dio17.tmp     Jun  8 2009       47122  "DIO17.tmp"
    dio18.tmp     Jun  8 2009       47122  "DIO18.tmp"
    dio19.tmp     Jun  8 2009       47122  "DIO19.tmp"
    dio1b.tmp     Jun  8 2009       47122  "DIO1B.tmp"
    dio1d.tmp     Jun  5 2009       47122  "DIO1D.tmp"
    dio1e.tmp     Jun  8 2009       47122  "DIO1E.tmp"
    dio4.tmp      Jun  8 2009       47122  "DIO4.tmp"
    dio6.tmp      Jun  8 2009       47122  "DIO6.tmp"
    dio7.tmp      Jun  8 2009       47122  "DIO7.tmp"
    dio9.tmp      Jun  8 2009       47122  "DIO9.tmp"
    hpodvd09.log  Jun  8 2009        6030  "hpodvd09.log"
    hpqddusr.log  Jun  8 2009        1244  "hpqddusr.log"
    IS-M1IBJ.TMP  Jun  8 2009              "is-M1IBJ.tmp"
    mar1.tmp      Jun  8 2009        1342  "MAR1.tmp"
    mar2.tmp      Jun  8 2009        1342  "MAR2.tmp"
    mar3.tmp      Jun  8 2009        1285  "MAR3.tmp"
    mar4.tmp      Jun  8 2009        1342  "MAR4.tmp"
    mar5.tmp      Jun  8 2009        1285  "MAR5.tmp"
    mar6.tmp      Jun  8 2009        1285  "MAR6.tmp"
    mar7.tmp      Jun  8 2009        1342  "MAR7.tmp"
    mar8.tmp      Jun  8 2009        1285  "MAR8.tmp"
    ssupdate.exe  May 14 2009      158960  "SSUPDATE.EXE"
    sts13.tmp     Jun  8 2009         116  "STS13.tmp"
    sts18.tmp     Jun  8 2009         116  "STS18.tmp"
    sts1b.tmp     Jun  8 2009         116  "STS1B.tmp"
    sts26.tmp     Jun  8 2009         115  "STS26.tmp
    
    Run CCleaner first and them also run ATF Cleaner by Atribune.

    Then manually remove anything left over (other than files with today's date).

    Have you been using Reg Mechanic to do registry changes?
     
  16. MikeD052

    MikeD052 Private E-2

    A quickscan with SAS still shows a rootkit; after it's removed the computer is forced to reboot, (Windows RPC System Shutdown.) I am sure that it is reinstalled upon reboot because it is always found and removed by SAS.

    There is definitely malware on this computer. I usually work with the network cable unplugged as if left plugged in I hear several sounds (a click/snap) that is the same auditory confirmation heard when intentionally moving through web pages.

    SUDAN Broadcast
    Today when checking email, (i was plugged in for only about 5 mins.) my computer began playing a broadcast on Sudan!
    First several click sounds, then a narration on SUDAN came through my speakers. No open window was used. I closed all windows and only after disconnecting the network cable did the broadcast cease. WTF, never dealt w/ anything like this.

    Have not used Registry mechanic since B4 contacting MajorGeeks
    Ran the cleaners and deleted temp files.
    The log is from a quickscan only
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    GMER's MBR.exe

    • Double click on the MBR.exe file to run it.
    • A log will be produced & saved to the desktop, called MBR.log.
    • Attach this log to your next message.


    Now delete the current mbr.log file and then run the below instructions.
    Click Start > Run and copy & paste the following text in the code box into the Run box and then click OK. You must copy and paste or type in this exactly. The quotes must be exactly as shown and there is a space before the -f
    Code:
    
         "%userprofile%\desktop\mbr.exe" -f
    
    Now double click on the mbr.exe file and attach the new mbr.log

    Then run a deep scan with SAS.
     
  18. MikeD052

    MikeD052 Private E-2

    This log was produced on the 2nd attempt
    the first attempt did not produce a log, I moved the mbr.exe file to the desktop and tried again, ( it was in the download file. )

    Will delete and follow your instructions for the next message
     

    Attached Files:

    • mbr.log
      File size:
      169 bytes
      Views:
      5
  19. MikeD052

    MikeD052 Private E-2

    Here is the second log, had to rename it
     
  20. MikeD052

    MikeD052 Private E-2

    Sorry I do not see that the log attached to the last message but the system says I already attached a file named mbr-02.log so I am trying with -02a; sorry, won't let me attach any renamed file, here is what was in the log;

    Stealth MBR rootkit/Mebroot/Sinowal detector 0.3.6 by Gmer, http://www.gmer.net

    device: opened successfully
    user: error reading MBR
    kernel: MBR read successfully
     
  21. MikeD052

    MikeD052 Private E-2

    Tim,
    A couple of clues.
    After my computer started playing the Sudan broadcast, I checked Windows processes and found 3 versions of iexplorer.exe running. I use mozilla but did not have it opened, I terminated the process without ill effects.

    Just now I checked IE history and found web activity unassociated with my own doing, one item in history was a youtube TV show which as it turns out was what I heard the soundtrack from, other items:
    alertsfind.com
    fulldotfinds.com
    216.133.243.28 (which may be findology.com)
    obviously something is operating IE in the background.
     
  22. MikeD052

    MikeD052 Private E-2

    Here is the log, interestingly it picked up the MBR file, I reported it as false positive to sas.
     

    Attached Files:

  23. MikeD052

    MikeD052 Private E-2

    OK;
    I believe I have overcome this;

    CLB Rootkit infection aka WinNT-Alureon
    fixed with "RootRepeal"

    The key was that MBAM would not run, but THERE IS A TOOL!!!

    If you cannot run MBAM, MB, Combofix, or if AVG or others won't update, the malware has blocked these activities.

    http://www.malwarebytes.org/forums/index.php?showtopic=12709

    I ran this tool and it basically uncovered the "invisible" rootkit

    If you have iexplorer processes running in task manager, but not showing a window, this is one symptom. Look at iexplorer history and see where the malware is trying to take your computer.

    I only found this solution by googling these URLs and found another victim with the same infection, (this probably is a new infection because very few google result were generated and they were all new.
    fulldotfinds.com
    alertsfind.com

    When working on the fix, try disconnecting the internet cable and keep closing iexplorer processes while working on the fix. I am fortunate to have a 2nd computer to download to, then, disconnect the dsl modem and connect the infected computer to the network, in this way I was able to isolate the infected computer from the internet but still get information and download tools, well it worked for me.

    So far all my programs that were disabled by this infection now work! I hope I'm not jinxing myself but the scans look clean.
     

    Attached Files:

  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I apologize for the delay....my isp took a 4 day dump.

    Let me give you the final cleaning step if you are not having any issues. (If you still are, attach a new MGLogs.zip):


    1. We recommed you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They are useful as backup scanners. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.

      • Delete the C:\combofix folder from combofix (if it exists)

    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    7. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds