Windows Freezes After Startup - Trojan Infection Win32/PrcView HELP!

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by asswhoopermcdaddy, Nov 3, 2010.

  1. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    Dear Support,

    I really need your help on this one. This is one of the nastiest infections I have ever come across. Thats what I get for getting lured into clicking a banner. :cry

    In normal mode, I load windows, sign in w/ my password, and windows desktop fully loads except for the tray icons to the lower right where Symantec is suppose to be. My cursor is able to move across the screen, but the moment I click on ANYTHING, it freezes completely.

    In safe mode, I still have most of my access. I've run all the following scans as well as the guide provided but no luck. Here's where I currently stand:

    1.) Norton Symantec - no viruses detected, but unable to perform live update. Downloaded the new signature definition file....still no new virus detected.

    2.) Eset Online Scanner - initially removed Win 32/PrcView and Win32/Agent.HZBURL Trojan......subsequent scans are clean.

    3.) Spybot Search and Destroy - removed some registry keys (though they looked normal to me).

    4.) TrendMicro Online Scanner - clean. No virus detections. Unable to install rootkitbuster and run.

    5.) SuperAntivirus Scan - log attached. Mostly clean. 1 infection is from a disabled windows popup that I have....

    6.) MBAM - clean. Unable to detect anything wrong (log attached).

    7.) Combofix - log attached.....I don't know. I see a bunch of locked registry keys that do not look familiar to me.

    8.) RootRepeal - it ran and crashed. Completely froze and did not respond at all.

    9.) MGTools - it ran and crashed. "application generated an exception that could not be handled process id =0x418(1048) thread id = 0x40c(1036) Terminate" AGHHH


    My computer is dying here. PLEASE HELP!!!!!!!! Logs are attached.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try running MGTools.exe in safe mode and see if you can then get us a set of logs.
     
  3. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    OMG THANK YOU SO MUCH FOR RESPONDING!!!!! I know you guys are very busy, it means soooo much to me.

    So I ran MGTools.exe in safe mode like you requested. It created a log that I've just uploaded. However, I did get an error message saying that the "application has generated an exception that can not be handled process id=0x5cc(1484) id 0x210(752)". Not sure what that means.

    Also wanted to let you know that I reran ESET scanner last night and it identified the following trojans:
    Win32/PrcView Application
    Win32/Agent.HZHBURL Trojan variant
    Win32/Adware.ADON Application

    ESET removed them from the System Volume Information folder. Not sure if that info helps.

    Let me know if you need any more info. My comp has gotten ***-whooped. But I'm ready to fight back :major
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    They will only truly be removed when you toggle system restore, when we finally get to having you follow final steps.

    Also:
    Uninstall these outdated versions of Java:
    J2SE Runtime Environment 5.0 Update 3
    J2SE Runtime Environment 5.0 Update 6

    Ad-Aware SE Personal <--- Out of date, and ineffective, uninstall it and make use of the free versions of Malware Bytes and SUPERantispyware instead.

    Spyware Doctor 6.0 <--- If this is just a useless trial which will not fix anything anyway then please uninstall it.

    Delete the below bold folder:

    C:\Documents and Settings\LocalService\Local Settings\Application Data\Viewpoint


    Reboot your machine and install the most current and up to date version of Java available here at the below link:

    Java Runtime 6
     
    Last edited: Nov 5, 2010
  6. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    Hello again and thanks for everything thus far.

    I have run TDSS Killer program and it located a locked file threat. It did not give me the option to cure, but it gave me the option to delete. So I deleted it. Log is pasted below.



    As for the uninstall of the Java programs, it indicates that this can not be done in safe mode.
     

    Attached Files:

    Last edited by a moderator: Nov 6, 2010
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    That log came up clean. So what issues are you still having, if any? (Malware related I mean)
     
  8. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    OMG I'm back in!! I'm able to get into Windows and load programs again. :-D THANK YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! THANK YOU THANK YOU!!!!!!!!!!!!!!!!!!!!!!!!! My hero :major

    I want to make sure my computer is clean. I'm always concerned that there might be something lurking in the shadows. This is the first time I've been able to log back into normal mode and run anything.

    What should be my next steps??
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run both SAS and MBAM and attach those logs. Run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  10. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    Hello! I got some good news and some bad news. The good news is that I can get into normal mode, but the bad news is that I'm still detecting a file that regenerates everytime I remove it. It must be stuck somewhere in the system restore or worse.

    1.) MBAM log is clean.
    2.) SAS detected 4 files in the system volume information\restore
    {202550A8-7A33-4BCA-9586-051D24DDBF8F\RP505\A066974.exe
    {202550A8-7A33-4BCA-9586-051D24DDBF8F\RP505\A066975.exe
    {202550A8-7A33-4BCA-9586-051D24DDBF8F\RP505\A068031.exe

    Even though I remove them on the restart, new files with different extensions keep showing up.

    3.) MG log attached as well.

    Nasty bugger. What do I do from here? :confused
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You need to tell me what file you are referring to. I am not seeing any malware in your logs. You need to uninstall your old java:
    J2SE Runtime Environment 5.0 Update 3
    J2SE Runtime Environment 5.0 Update 6

    Reboot and then download and install:
    Java Runtime 6

    If you are referring to system restore folders, we will remove them when we toggle system restore.
     
  12. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    Hello! Just finished updating the Java and removing the older versions.

    The infected files I'm referring to are the system restore folders. You'll notice in my other posting that the SAS logs contain

    Trojan.Agent/Gen
    that appears in the system vol info / restore. It seems to generate a new new file or restore point thats infected after the reboot.

    I assume toggling the system restore will take care of these.
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  14. asswhoopermcdaddy

    asswhoopermcdaddy Private E-2

    Kestrel13! and TimW you 2 are amazing. Thank you so much!!!! :major :-D We got it. It's clean. Finally!!!!!!!!

    Ran:
    SAS - clean
    ESET - clean
    Norton - clean
    MBAM - clean

    Very happy!!!!!!!!!!!!! Can't thank you enough. If you're ever in NYC, I owe you a dinner :major
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know. You are most welcome. Safe surfing. :)
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're most welcome.


    I'll have steak, chips, tomatoes, mushrooms, peas, onion rings and crusty buttered bread :-D
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds