Potential malware problem - request log review

Discussion in 'Malware Help (A Specialist Will Reply)' started by RGM84D, Jan 8, 2011.

  1. RGM84D

    RGM84D Private E-2

    I suspect I may have a malware problem but can't tell for sure, and would appreciate it if the experts could take a look at my logs.

    My system is a Dell Inspiron E1505 running WIN XP SP2 32 bit. I have Norton 360 as my primary AV and firewall. The system is working almost normally following correction (with MG help) of some self-inflicted damage detailed here:
    http://forums.majorgeeks.com/showthread.php?t=230179

    However, I am frequently getting frequent Malwarebytes warnings that it has blocked block attempts to access IP address 106.196.143.78 which appears to be in Russia. The attempts to access this IP are being generated automatically, and occur when my internet connection is active, even when no browser is open. Further, I frequently, but not consistently, get this warning within about 30 seconds of opening Norton or Malwarebytes control panels, suggesting that something on the system is "aware" of my AV.

    I previously used Norton 360 AV to find and remove C:\WINDOWS\Drivers\atapi.sys infected with the Bloodhound virus. SAS found and removed Rogue.Paladin, but this did not correct the symptom.

    Two other errors that may or may not be connected to malware are that

    - I am unable to install the XP SP3 upgrade due to an "atapi.sys is in use by another program" error during installation. The initial upgrade attempt failed at least a year ago but I have not pursued it until recently.

    - I can no longer read an external hard drive I was previously able to use. When I connect the external drive the laptop crashes with "BAD_POOL_HEADER" error. The external drive still works fine with another computer.

    Once I confirm my system is clean I'll pursue those issues on the appropriate software hardware forums.

    Thanks in advance.
     

    Attached Files:

  2. RGM84D

    RGM84D Private E-2

    Additional logs attached. I included the RootReveal process log in case it provides any clue what processes may be using atapi.sys.

    Thanks again
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are misinterpreting the information. This is normal information and is why you install programs like Malwarebytes and Norton. They are there to protect you from the bad sites on the internet. I'm suspecting that you need to add a router with a hardware firewall in between your PC and your cable or DSL modem to add another layer of protection that may even stop many of these kinds of external searches from getting to your PC.



    Download TDSSKiller from Kaspersky to your directly onto your Desktop
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor. )
    • If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123tdk.com).
    • Allow the application to run if prompted by Windows or any security programs you have installed
    • It will start the scan and run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    • Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also see if you can locate the below file and put it into a ZIP file and attach it here. This file seems suspicious.

    c:\windows\system32\drivers\uucrkea.sys


    When you ran MGtools, did you have your cable to the internet disconnected? It looks like your network interface was totally down.


    You also need to uninstall the below:
    Ad-Aware SE Personal << way out of date and totally ineffective
    Spybot - Search & Destroy 1.2 << way out of date
    SpywareBlaster 4.1 << way out of date
    SpywareGuard v2.2 << way out of date and totally ineffective

    You can install the proper version of Spyware Blaster from here >> SpyWare Blaster
     
    Last edited: Jan 8, 2011
  5. RGM84D

    RGM84D Private E-2

    Thanks a lot.

    TDSSkiller found and deleted
    c:\windows\system32\drivers\uucrkea.sys
    before I read your most recent post, so I can't attach a copy of the file. I have not had any connection warnings since running TDSSkiller (~1 hour now).

    I normally connect my laptop to the internet via a wireless connection. Because many of the scanning steps require disabling AV or firewall I have been manually disabling the connection except when downloading tools or posting. Should I re-run MGtools with the connection enabled?

    I have verizon as my ISP and connect via a router with a firewall. As far as I know I don't have any visibility or control of the router firewall. Any suggestions on this?

    I have deleted / updated the tools as you recommended. I plan to keep Norton as my primary AV and firewall. What would you recommend as the online scanner? SAS professional?
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    So my suspicion was correct. ;)

    Yes. Run like below.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
    Not sure how effective their firewall is, but first are you still seeing those addresses being blocked by MBAM?

    Is his what you meant to ask? You don't need an online scanner. You just need backup malware scanners like Malwarebytes and SUPERAntispyware to pickup the many many things that Norton will not.
     
  7. RGM84D

    RGM84D Private E-2

    chaslang,

    Thanks again. The new MGtools log is attached. I have not seen any warnings since running TDSSkiller so you appear to have solved my problem. :-D,

    Apologies if I am misusing the terminology. I have read the "How to protect yourself from malware thread" and think I mostly get it. I plan to keep Norton for AV and firewall. I now have the free versions of SuperAntiSpyware, Malwarebytes, plus SpywareBlaster and plan to add Spybot Search & Destroy. Malwarebytes appears to be functioning as an a realtime blocker (even though it is the free version) based on alerts and the protection tab showing "protection enabled". Do you recommend also upgrading SAS or is that overkill?
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    According to what your logs show and what you are saying, you have the paid version not the free version.

    Not since you have the paid version of MBAM.

    Your logs are clean.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds