Help Requested to Remove Alureon FL

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Katydids, Jan 5, 2012.

  1. Katydids

    Katydids Private E-2

    Greetings Friends,

    Unfortunately, I've done myself a good one by getting this trojan: symptoms include getting multiple "write delayed on driver" messages and the bogus "click to fix" message - which I didn't do.

    The MS Security Essentials found and removed Win32/Alureon.FL, Win32/Fareit.A (this one is a password stealer) and Win32/sirefef.P -- or so it says.

    I've read the "read me and run document" and think I've completed those steps before running the scans you request. However, when I ran Super AntiSpyware, I didn't see a "statistics/logs tab", and didn't find a log put out by that scan at all. SAS did find 1 critical threat, Trojan.Agent/Gen-Fake-Alert (local), and some 548 adware tracking cookies.

    I ran Malwarebytes and it found Rogue.FakeHDD and I do have the log.

    I ran Combofix but it totally freaked me out as I saw some lines of code go by (extract) and then the scan screen disappeared and I didn't see the "preparing to run combofix" screen. I freaked thinking it was doing bad things and deleted the app.

    I have a Windows 64 bit system so I didn't run Root Repeal. I ran MGtools and I have the MGlogs.zip. I have attached all logs and look forward to working with you to clean my PC.

    Thanks in advance for your patience as this stuff doesn't come easy to me.

    Cheers,
    Katy :banghead
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    It always creates a log by default. You were supposed to disable scanning for tracking cookies. See the instructions for running it.

    Very bad idea and you could damage your PC by doing this once it started. You need to run it and get us the log.


    What you have is basically an empty log. You need to let MGtools run all the way thru to completion. Also you need to have any protection software disabled before running it and also you must make sure you run it as administrator. Try the below:

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
     
  3. Katydids

    Katydids Private E-2

    I re-ran SAS having selected the options as instructed in Read Me. SAS found no threat items, I think because the one it found yesterday, it removed. Still, though, I saw no Statistics/Log tab, and no logs under Scanner logs, even though I saw that save empty/clean logs was selected. I do not have the PAID version of SAS, if that makes a difference. I followed the instructions in Read me to a "T", I don't know why there is no log available.

    Likewise, I ran MGTools, and no MGlogs.zip file was created. I saw an I/O error, with an "invalid argument" which resulted, it read, in the output file not being created.

    ComboFix ran like a charm, with no problems. I will be sending its log after hubby's perusal. If you have instructions for me to run SAS and MGtools again, I will and attach all logs.

    Thanks.
    Katy
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you look in C:\ for the MGlogs.zip file to be sure?

    If there really is no C:\MGlogs.zip file then do the below.


    Please click Start, All Program, Accessories and you will see ( among other things ) a Command Prompt entry.
    • Right click the Command Prompt entry and select Run As Administrator.
      • It is critical that you run it this way.
    • If you do this properly, a command prompt window will open with a title of Administrator Command Prompt.
    • Enter the below commands at the command prompt each followed by the enter key. Try each command!!!! The bold black are commands. The purple/brown is merely informational.
    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    SN64 <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    nwktst <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    analyse <-- this will try to run TrendMicro Hijackthis. Click Twice on the Accept button to accept the license agreement if it shows. Then run a scan and save a log. Tell me what error messages, if any, you see.
    GRK64 <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.

    getnetinf <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see

    Now look for the C:\MGlogs.zip file and attach it no matter what happened while doing the above.
     
  5. Katydids

    Katydids Private E-2

    I'm attaching the MGlogs.zip file and I believe it contains the combofix log. Look forward to hearing from you, thanks for helping (and your patience).

    Cheers,
    Katy:)
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Ah! So MGtools actually really did run and create a log. All of those files including combofix.txt would not be in the ZIP otherwise.

    I see you already ran TDSSkiller a few times. Let's all check your MBR.


    Now please also download MBRCheck to your desktop.

    See the download links under this icon [​IMG]
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  7. Katydids

    Katydids Private E-2

    OK. The MBRcheck log is attached.
     

    Attached Files:

    Last edited: Jan 7, 2012
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have an infected partition added to your hard disk as shown below in bold red:
    Code:
    Get Partition Info From WMI in K-bytes                          
    ==============================================================  
    Bootable  Name                   Size          Type                     
    TRUE      Disk #0, Partition #0  208666624     Installable File System  
    FALSE     Disk #0, Partition #1  226493464576  Installable File System  
    FALSE     Disk #0, Partition #2  29243736064   Installable File System  
    [B][COLOR=red]FALSE     Disk #0, Partition #3  112549888     Unknown[/COLOR][/B]                  
    
    Do you have your Windows 7 Boot DVD? If not, see if you can follow the instructions in the below to create a bootable repair disk.

    http://windows.microsoft.com/en-us/windows7/Create-a-system-repair-disc

    Let me know when/if you can make this disc.
     
    Last edited: Jan 8, 2012
  9. Katydids

    Katydids Private E-2

    Hi Chaslang,

    I have created the system repair disc - what fun!

    Katy
    :)
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay now let's get rid of the infected partition which requires you creating another special bootable CD. More fun!;)

    Preferably from a clean computer but not necessary if you do not have another computer, I need you to download: gparted-live-0.11.0-7.iso (114 MB)
    Create a bootable CD for GParted. You can use ImgBurn to accomplish this.
    If you need help on how to use ImgBurn, please view this guide by dr.m -- Using ImageBurn to Burn an ISO image

    Now boot off of the newly created GParted CD.
    [​IMG]
    You should be here...
    Press ENTER
    [​IMG]
    By default, do not touch keymap is highlighted. Leave this setting alone and just press ENTER.
    [​IMG]
    Choose your language and press ENTER. English is default [33]
    [​IMG]
    Once again, at this prompt, press ENTER
    You will now be taken to the main GUI screen below
    [​IMG]
    According to your logs, the partition that you want to delete is 107.34 MiB (107.34 MB)
    Click the trash can icon to delete and then click Apply.
    You should now be here confirming your actions:
    [​IMG]
    Now you should be here:
    [​IMG]
    Is boot next to your OS drive? According to your logs, your OS drive is the 210.94 GB sized partition.
    [​IMG]
    If boot is not next to your OS drive under Flags, right-mouse click the OS drive while in Gparted and select Manage Flags
    In the menu that pops up, place a checkmark in boot like the picture below:
    [​IMG]
    Now press the Close button to save these changes.
    Now double-click the [​IMG] button.
    You should receive a small pop up like this:
    [​IMG]
    Choose reboot and then press OK.


    Now reboot from the Windows 7 Recovery Disc and execute the following commands:
    • bootrec /fixmbr
    • bootrec /fixboot
    • exit
    Once back in Windows...
    [​IMG] Re-run another scan withMBRCheck and attach its latest log. (How to attach)
     
  11. Katydids

    Katydids Private E-2

    Well, this time, it wasn't much fun because I didn't read the instrutions very well. :(

    I was humming along until Windows wouldn't start after the reboot and, after very many OMGs, I thought to boot from the recovery disk you had me make. Yay! Then went back to re-read your instructions and, yeah, it was supposed to dot that, and then I was to enter those 3 commands.

    I then rebooted wth the G-parted disk, expecting to enter those commands when it rebooted (and wondering when I would know to do that - before Windows started) when...Windows started and I never did enter "fix mbr" and "fix boot".

    So, I've run MBRcheck and am attaching the log - hope it wasn't mucked up.

    Katy
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    From your message, I cannot tell what you ran properly and what you did not run. So to see where things stand, I will need a new log from MGtools.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
     
  13. Katydids

    Katydids Private E-2

    The MGlogs.zip file is attached.
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay it looks like you were able to remove the infected partition with Gparted. Now just do the below.

    Now reboot from the Windows 7 Recovery Disc and select command prompt. Execute the following commands at the Command prompt.
    • bootrec /fixmbr
    • bootrec /fixboot
    • exit
    After booting back up normally, rerun MBRcheck and attach a new log
     
  15. Katydids

    Katydids Private E-2

     
  16. Katydids

    Katydids Private E-2

     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you running MBRcheck by using the Run As Administrator method???
     
  18. Katydids

    Katydids Private E-2

    Yes, I believe I did.

    But, I just now ran MBR check again, being certain to run it as administrator. The log is attached.

    Katy
     

    Attached Files:

  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then I'm not sure why the below is occurring
    Code:
    \\.\C: -->  error 5
    [URL="file://\\.\D"]\\.\D[/URL]: -->  error 5
    [URL="file://\\.\F"]\\.\F[/URL]: -->  error 5
    PhysicalDrive0 Model Number: <error opening>
          Size  Device Name          MBR Status
      --------------------------------------------
    ERROR Opening: [URL="file://\\.\PhysicalDrive0"]\\.\PhysicalDrive0[/URL] (5)
    I thought error 5 was is an access denied type message but I don't know why you are getting this.

    Are you having any malware problems?
     
  20. Katydids

    Katydids Private E-2

    I logged into the admin. account and ran MBR check (right click, run as administrator), if this would make a difference. The MBR check log is attached.

    Regards,
    Kathy
     

    Attached Files:

  21. Katydids

    Katydids Private E-2

    I don't see the error 5 message is this latest log. I guess I was not really running MBR check as administrator: I was logged into the restricted account before.

    Katy
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's the reason!!! As I said, access was being denied and that was because you were not running as administrator which you always have to do for all tools. You cannot perform malware cleanup in a user account that is restricted. You have to give it admin permissions during the cleanup and then after finished, you can set it back to restricted.

    How is everything working now?​
     
  23. Katydids

    Katydids Private E-2

    On the account that had the malware, my wallpaper is not there, there are no programs under my "start" button, and the system tray is empty.

    I have not yet tried getting on the Internet, am out for an hour, will check in with you when I return.

    Katy
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you referring to the DLL user account? Try the following unhide program.

    Please download and save the below tool from Grinler @ bleepingcomputer to your Desktop or anywhere else you can find it ( if the Desktop is not showing )

    http://download.bleepingcomputer.com/grinler/unhide.exe

    Now run it. Now see if you can find the items that seemed to be missing ( like shortcuts, Start Programs... etc )?

    Give it a try now.
     
  25. Katydids

    Katydids Private E-2

    ChasLang,

    No, the account that had the trouble is KML. I'll try your instructions in that account tomorrow, if I can.

    Katy
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then you have been posting logs from the wrong user account. To properly clean any user account, the scans have to be run on that account otherwise only things that are common to all user accounts will be found and not things unique to a particular user account.

    Restricted User Accounts have to be given administrator priviledges while performing the cleaning process.
     
  27. Katydids

    Katydids Private E-2

    Quote:
    Originally Posted by chaslang
    Restricted User Accounts have to be given administrator priviledges while performing the cleaning process.

    It just seems counterintuitive to give admin. priviledges to the account that has the bad stuff, like the password stealer, on it. Do I have to start the pc in safe mode or anything? Or just do the regular start? I guess since the recovery disk is a system recovery, I don't have to make another one, do I?

    Once I know how to start the machine, I'll run the scans and attach the logs for (please strikethrough any you don't want me to run):

    Super Antispyware
    Mgtools
    Combofix
    MBRcheck


    My apologies, chaslang, for not being clearer at the start, but on the good side, there was that infected partition.

    Katy
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes but not really. Admin type accounts get infected all the time too and we clean them anyway. Restricted accounts will not be able to run many tools properly inorder to clean them. If they are already infected, you have no choice.

    Normal boot mode is always preferred unless it cannot be run. However this is another reason for making Restricted Accounts become admin accounts. You cannot log into a restricted account in safe mode. The account name will not even appear unless it is an admin account.

    Correct. You probably will not even need this disc since we already used it.


    Remove SUPERAntiSpyware and run Malwarebytes instead. Then run ComboFix, and then run MGtools. You don't need to run MBRcheck as the MBR is not user account specific. It relates to the whole PC.
     
  29. Katydids

    Katydids Private E-2

    :wave chaslang,

    The logs are attached and thanks for your patience and help.


    Katy
     

    Attached Files:

  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No malware is being detected.

    Please download and save the below tool from Grinler @ bleepingcomputer to your Desktop or anywhere else you can find it ( if the Desktop is not showing )

    http://download.bleepingcomputer.com/grinler/unhide.exe

    Now run it. Now see if you can find the items that seemed to be missing ( like shortcuts, Start Programs... etc )?

    If they don't come back, they are most likely gone for good and you would have to manually restore what you need. Either by copying from another user account or by reinstalling software.

    Is this info missing for the DLL and NRL accounts too. ComboFix does have some APPDATA info from these accounts saved in the Quarantine
     
  31. Katydids

    Katydids Private E-2

    I ran the unhide.exe and some, but not all, items came back. This info is not missing from the other accounts.

    Should we get rid of the APPDATA info from DLL & NRL?
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay. My point was to see if you can copy various items/shortcuts...etc from the other accounts to this account. If unhide did not restore them, there is nothing to restore.

    No.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. After doing the above, you should work thru the below link:
     
  33. Katydids

    Katydids Private E-2

    Everything has been uninstalled/deleted, AV turned on and UAC active.

    I now get the message, Your current security settings put your computer at risk, when I access the internet and on each page to which I navigate.

    The security settings in internet explorer are set exactly the same for each user account and only one, KML, is getting this message.

    Don't want to click "fix settings for me" before I hear from you.

    Thanks, chaslang.

    Katy
     
  34. Katydids

    Katydids Private E-2

    chaslang,

    I've corrected the security settings and am no longer getting this message, so please disregard.

    Everything has been done and I'll copy & re-install anything I need. Thanks so much for your help.

    Why do/must hackers do this to people?

    Katy
     
    Last edited: Jan 13, 2012
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    There are many types of hackers, some want to steal info and possibly your money. And other just want to make life difficult for you. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds