IE redirecting/hijack

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by edcruz_2010, Dec 17, 2011.

  1. edcruz_2010

    edcruz_2010 Private E-2

    Hello all
    A few days ago my Mcafee started to report that the firewall was turned off. After several attempts to get it back on I contacted their service support and they quickly fixed the situation by connecting remotely to my computer and running a patch. They claimed that it was a registry issue but I have the feeling that the soft got corrupted.

    2 days later, on the 14th, I noticed that the IE was getting redirected and the actual desktop of one of my user's accounts was taken over and modified. I tried all that came to my mind including a system restore. Some of the programs I ran found some issues, and running the TFC by Old Timer seamed to solved it for a few moments, but then the whole issue came back.

    Then I found this site and proceeded to do the procedure described in the READ & RUN sticky with no much success. The logs came back with problems, so I am posting them here hopping for the best.

    Systems settings:
    Windows 7 Home Premium, 64 bits, SP1
    McAfee Security Center 10.1
    IE8

    At this point I am running out of hope, so any help would be appreciated.

    Attached are the logs as requested.

    Thanks
     

    Attached Files:

    Last edited: Dec 17, 2011
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Wwlcome to Major Geeks!

    Yes you have one of the most recent waves of infections going around the removed your BFE and MpsSvc registry keys which in is noticable to you in that your firewall stops working.

    Okay now press the Windows key and the R key at the same time to bring up the Run box. Type in regedit and hit OK.
    • Then in the Registry Editor click File, Import.
    • Navigate your way to the C:\MGtools folder and locate the fixW7BFE.reg key and select it.
    • Then click the Open button and allow this to be added into your registry
    Tell me what happend exactly. Like do you get any error messages or do you get a success message?

    If you received a success message then repeat the above import but with below to files from the MGtools folder.
    • fixW7FW.reg
    • FixW7FWdrv.reg
    Then so that we can see what effect this had, I need to you to run a newer version of MGtools.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )

    Now attach the below log:
    • C:\MGlogs.zip

    This is not going to fix all your problems. It is just a start.
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Note, it also appears that your hard disk as been infected with a newer for of TDL infection that replaces your boot partition with an infection and makes it the active partition to boot from.
    Code:
     
    Partition Disk #0, Partition #3 
    Partition Size 1.70 MB (1,785,856 bytes) 
    
    Do you have your Windows 7 Boot DVD? We are going to need it
     
  4. edcruz_2010

    edcruz_2010 Private E-2

    Hello chaslang
    Thanks for the quick response.

    I tried the regedit steps but it will not allow to import the file. I get a message saying the following:

    Cannot import C:\MGTools\FixW7BFE.reg: Error accessing the registry.

    Regarding the boot DVD, W7 came pre-installed and did not have a factory boot disk. I have a repair system disk that I created myself, but I don't know if it is ok or clean.
    I have also a repair disk from a second W7 computer we have, can we use that one in a pinch?

    Again, thanks for your quick response.
    Ed
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    See if either of these two disks allows you to boot from it into the System Recovery Environment and get into the Command Prompt as illustrated in the below link:

    http://www.bleepingcomputer.com/tutorials/windows-7-recovery-environment-command-prompt/

    I don't want you to do anything in the command prompt right now. We just need to verify that you are able to do this before we take other steps. Also it is highly recommended that you back up important data before we start to fix this problem.
     
  6. edcruz_2010

    edcruz_2010 Private E-2

    Hello chaslang
    I will try that right away, but I will do a backup before. All my relevant data is sitting in a secondary hard drive so it should be fine. I might even disconect it if you say so.
    Now, would it be safe to do a backup while the virus is still running rampant on the system?

    Update: while I was typing this in my laptop I tried the DVD and it did popped up the System Recovery Window up to the language selection option. I stopped there because I would like to hear from you before. also, I would probably cancel the whole thing first and do a backup before proceeding full ahead.
    Again, thanks for your help.
    Ed
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    While there is always a chance that this type of infection could spread to another drive, I don't think that is going to happen with the variety you have. So it should be okay. You don't have much of a choice anyway.

    See if you can get to the command prompt window. You don't need to worry about this causing any damage before your backup. We are not fixing anything. We are just testing you can get there.

    I have another boot CD that you are going to need to create that will contain G-parted partitioning software. This will be next after we confirm you get to the command prompt.
     
  8. edcruz_2010

    edcruz_2010 Private E-2

    It did get to the command prompt. However, I don't know if it is relevant but in the window where I am supposed to choose the operating system to repair there was nothing shown there. I still picked the first option rather than the second one that says " Restore from an image created earlier"

    From there it went straigth to the Recovery Tool selection window, where I clicked Command Prompt. It opened a command prompt window, with the following prompt:

    X:\windows\system32

    What shoudl I do next?

    Thanks
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This is due to the infection changing the active boot partition to not boot from Windows.

    What did the first option say?



    First, download Download gparted-live-0.10.0-3.iso (115.1 MB)
    You will need a blank CD to burn this ISO to. You can burn the .ISO using software like ImgBurn. You can see info on how to do this here >>
    Using ImageBurn to Burn an ISO image

    Now boot off of this newly created CD.

    http://img829.imageshack.us/img829/5772/gpartedsplash.th.png
    You should be here...
    Press ENTER

    http://img5.imageshack.us/img5/7286/gpartedkeymaps.th.png
    By default, "do not touch keymap" is highlighted. Leave this setting alone and just press ENTER.

    http://img404.imageshack.us/img404/9840/gpartedlanguage.th.png
    Choose your language and press ENTER. English is default [33]

    http://img140.imageshack.us/img140/7958/gpartedgui.th.png
    Once again, at this prompt, press ENTER

    You will now be taken to the main GUI screen below
    http://img32.imageshack.us/img32/1122/gpartedo.th.png
    According to your logs, the partition that you want to delete is 1.70 MB (MiB)
    Click the trash can icon to delete and then click Apply.

    You should now be here confirming your actions:
    http://img233.imageshack.us/img233/1533/gpartedsteps.th.png

    Now you should be here:
    http://img696.imageshack.us/img696/8471/gpartedsuccessclose.th.png

    http://img194.imageshack.us/img194/7753/gpartedboot.th.png
    Is "boot" next to your OS drive? -- According to your logs, your OS drive is the 683.57 GB size partition.

    If "boot" is not next to your OS drive under "Flags", right-mouse click the OS drive while in Gparted and select Manage Flags

    In the menu that pops up, place a checkmark in boot like the picture below:
    http://img196.imageshack.us/img196/3483/gpartedmanageflagsboot.th.png

    Now double-click the http://img822.imageshack.us/img822/641/gpartedexit.png button.

    You should receive a small pop up like this:
    http://img88.imageshack.us/img88/8986/gpartedexitreboot.png
    Choose reboot and then press OK.

    Now reboot into the Windows 7 System Recovery Environment command prompt as you previously did using your CD. And in the command prompt, execute the following commands:
    • bootrec /fixmbr
    • bootrec /fixboot
    • exit
     
  10. edcruz_2010

    edcruz_2010 Private E-2

    The window I mentioned looked exactly to Fig.4 on the link from bleepingcomputer you sent me to do the recovery procedure. The only difference is that where it says Windows 7 mine was blank.

    I will try your solution and I keep you posted. It might take me a couple of hours as I have to step out for a kid's function.

    Thanks.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No problem. It's Sunday. I will be in and out of here too. ;)
     
  12. edcruz_2010

    edcruz_2010 Private E-2

    Ok, did all the procedures as described. Here are the results:

    I was able to run the Gparted as described and got through it as per description. One thing that caught my attention: in your comment you said that the OS partition should be 683G. The Gparted reported that partition as 919G. Also, I had to manually change the flag to the OS to set it as boot.

    After that I ran the System Recovery again. This time I got a different window popping up right before I could select the operating system to repair. This pop up said that Windows had found problems and asked for permission to fix them. I denied it as I didn't know what to do and proceeded as earlier into the system repair options.

    Again, Windows 7 didn't show up on it so I proceeded to get to the Command Prompt.

    Once there all the commands reported success and after Exit it came back to the GUI for the System Recovery Options. I am assuming that I need to rebbot but I am not touching anything until you say so.

    Thanks.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry about that. I just forgot to edit that line for your PC. Your logs actually showed it as 919.22 GB

    Yes if you ran both the
    bootrec /fixmbr and bootrec /fixboot commands, you need to type exit and reboot normally. Then rerun MBRcheck and attach a new log. Also rerun C:\MGtools\GetLogs.bat and attach the new MGlogs.zip file.
     
  14. edcruz_2010

    edcruz_2010 Private E-2

    Do I reboot normally or using the CD?

    When I try to reboot it comes back with the following message:

    BOOTMGR missing
    Press Ctrl+ALt+Del to restart.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Should be normally but since you have received this error message, boot up the CD again but this time instead of choosing the command prompt, choose Startup Repair

    It should prompt you to reboot when it finishes the repair.
     
  16. edcruz_2010

    edcruz_2010 Private E-2

    That allowed me to boot back normally. The Windows 7 partition showed up on the System Recovery options after the fix.

    However, after rebooting MBRCheck is still reporting problems with the MBR. Please see the attached logs.

    I wonder if my Recovery DVD could be infected as well. I don't remember if this DVD was done before or during the problems. Could it be that after all the clean up when it booted back and used the information in the DVD actually brough back the problem?

    I have a different one here from a different computer, just so you know.

    Thanks
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not entirely correct. Your boot drive and the fake partition has been fixed. Your second drive still has an infected MBR which needs to be fixed now.

    But I have a question about this 2nd drive. Is this a different drive than you had earlier. When you first posted your very first MGlogs.zip, there was a log from MBRcheck that showed
    Code:
    PhysicalDrive0 Model Number: SAMSUNGHD103SJ, Rev: 1AJ10001
    PhysicalDrive1 Model Number: ST31000340AS, Rev: SD15    
          Size  Device Name          MBR Status
      --------------------------------------------
        931 GB  [URL="file://\\.\PhysicalDrive0"]\\.\PhysicalDrive0[/URL]   MBR Code Faked!
                SHA1: AE3E0A945D44C8EA304A19A8F50F69065C34344B
        931 GB  [URL="file://\\.\PhysicalDrive1"]\\.\PhysicalDrive1[/URL]   MBR Code Faked!
                SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A
    
    And now it shows
    Code:
    \\.\C: --> [URL="file://\\.\PhysicalDrive0"]\\.\PhysicalDrive0[/URL] at offset 0x00000003`12600000  (NTFS)
    [URL="file://\\.\E"]\\.\E[/URL]: --> [URL="file://\\.\PhysicalDrive1"]\\.\PhysicalDrive1[/URL] at offset 0x00000000`00007e00  (NTFS)
    PhysicalDrive0 Model Number: SAMSUNGHD103SJ, Rev: 1AJ10001
    PhysicalDrive1 Model Number: SAMSUNGHD502HI, Rev: 1AG01118
          Size  Device Name          MBR Status
      --------------------------------------------
        931 GB  [URL="file://\\.\PhysicalDrive0"]\\.\PhysicalDrive0[/URL]   Windows 7 MBR code detected
                SHA1: 4379A3D43019B46FA357F7DD6A53B45A3CA8FB79
        465 GB  [URL="file://\\.\PhysicalDrive1"]\\.\PhysicalDrive1[/URL]   Unknown MBR code
                SHA1: 639AC5CDF8A5CF3245975932C6A4215450A7B98F
    You appear to have been changing drives??????????????
     
  18. edcruz_2010

    edcruz_2010 Private E-2

    Ok, how do I do that?

    Also, I just noticed that my McAfee is so out of tune that it is not even reporting the fact that the Firewall is off anymore. It shows all green like everything is fine but when you go into the settings it actually show the firewall as Off.


    Sorry, I typed this before you updated your post. Yes, I didn't want to use the other drive for the backup and put that one in. My mistake, I should have asked you before hand. Sorry about that.

    What do I need to do now to fix this and the other drive?

    Thanks.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please re-read my last message which I edited to add more comments. You need to explain why you are changing hard disks!!!!
     
  20. edcruz_2010

    edcruz_2010 Private E-2

    I just edited my last with the explanation. I was typing when your edited came through.
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You will need to boot back to the System Recovery Environment and figure out the drive letter for this second drive, by entering commands like the below. One command changes drives, and the second ( the dir ) lists the contents. From the contents, you should be able to figure out what the drive letter of this other infected drive is while in the Recovery Environment. Drive lettes may not be the same as when in normal Windows.

    c:\
    dir
    d:\
    dir
    e:\
    dir
    f:\
    dir
    .....etc

    One you find the correct drive letter, you would run the below command and substitute in for the x, the actual drive letter.

    bootsect.exe /nt60 x: /mbr

    Then you would reboot normally and attach another new log from MBRcheck.


    Seems likely that all of your hard disks are infected.
     
  22. edcruz_2010

    edcruz_2010 Private E-2

    Here is the latest MBRCheck log. I did the procedure and found the driver and eveything worked.
    MBR came back clean.

    I still wonder about the McAfee acting up so weird. It concerns me that we might go through all this pain and the Antivirus then cave on us again.
    I also notice that it seems to be some major activity on the disks, at least I can hear them accessing and doing something, but I can not seem to find the reason. If I try to open the Task Manager the HD will go quite all the sudden. It might be the McAfee doing something there.

    Thanks for your patience.

    I just noticed your added comment regarding all the HD. How could that happen and how could I prevent it? The second driver was not even in use in the computer. It was used as a secondary, seldom used, hard drive with a WD Media Player.
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Great. You will need to fix that other 931 GB drive at some point but not now.

    As stated in my first message, you have other problems. Your MBR and Partition infections needed to be removed first. Now the rest of your problems with the BFE and MpsSvc services and a load of file, folder, and registry permissions need to be fixed. You are far from done. Such is the nature of the infections you managed to get. However you picked them up, you need to be much more careful or you will be doing these fixes all the time and not having any time to actually use your computer for anything. In addition, these infections can be dangerous and may steal information.


    Now you need to run C:\MGtools\GetLogs.bat and attach a new log before I can start the next steps.
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to avoid getting the infections to begin with. Only you know what you were doing when you got infected. As you can see McAfee is not going to protect you 100%. Not even close. You ( and other users of the PC ) are the most important component of security.

    I'm not sure what you are saying. It is a "drive" not a "driver" which would be software. And you did put both of them into this PC. Hence they may have gotten infected when you plugged them in, or they may have been already infected.
     
  25. edcruz_2010

    edcruz_2010 Private E-2

    Here we go. Latest Getlog log.

    Regarding the comment with driver, yes, it is a typo, I was referring to the drive. So, basically this infection will replicate from one HD MBR to another within the PC? What I meant was that the drive I have now installed was used very seldom, as it was a external drive for the Media Center and hasn't been used or accessed in a while since we don't use that Media Center a lot.

    I don't recall doing anything particularly risky when I first noticed the problem. It might had happened earlier and just came on at a later time. How is this particualr wave spreaded? Does it need an actual permission to execute or it will come through other carriers/trojans/etc? Did it come as a malware or an actual virus?

    At some point before this is over I would like you to enlightme on how to better protect me because obviously the Antivirus is not really doing all what I expected and the Firewalls and other protections are not cutting it.

    Thanks for your help. It might take a bit longer to reply after this as it is getting a bit late and have to show up for work tomorrow.
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Unknown but in most cases there is some kind of interaction by the end user that would possibly be deemed as questionable behavior or the inappropriate response may have been taken.


    Malware is a generic term to cover all malicious software. A virus is malware, but this infection is not a virus. We don't know exactly where people are picking it up. There could be many ways. Typical ones include
    • downloading bittorrents
    • download illegal software ( normally obtained with the above )
    • accessing any kind of video downloading site especially porn and even more so if they have you download any special codecs.
    • opening questionable email content
    • but this does not mean you cannot get it from legit sites either. Especially ones that do no police their content or are too big to properly police. Even Google as been know to be a spreader of malware.
    Next steps.



    Download SubInACL.msi from Microsoft.
    • Now double click on SubInACL.msi to run the installer. Accept any prompts you get about installing this.
    • Now download the below file and save it to your Desktop:
    • Now right click onresetperm.cmd and select Run As Administrator to run this script. Be patient as this may take awhile to run. Also it is imperative that you Run As Administrator. This is not the same thing as your user account having administrator priviledges.
    Once it finishes, reboot your PC.


    Okay now press the Windows key and the R key at the same time to bring up the Run box. Type in regedit and hit OK.
    • Then in the Registry Editor click File, Import.
    • Navigate your way to the C:\MGtools folder and locate the fixW7BFE.reg key and select it.
    • Then click the Open button and allow this to be added into your registry
    Tell me what happend exactly. Like do you get any error messages or do you get a success message?


    If you received a success message then repeat the above import but with below to files from the MGtools folder.
    • fixW7FW.reg
    • FixW7FWdrv.reg
    Wherther the imports work or not, now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
     
    Last edited: Dec 19, 2011
  27. edcruz_2010

    edcruz_2010 Private E-2

    Ok, just had a chance to try your latest advice.

    SubInAcl----No problems
    resetperm-x64-----No problems
    Import fixW7BFE.reg---Successful
    Import fixW7FW.reg-----Successful
    Import fixW7FWdrv.reg----Error message. See below:

    Cannot import C:\MGTools\FixW7FWdrv.reg: Not all data was successfully written to the registry. Some keys are open by the system or other processes.

    Please see the latest log attached as requested.

    Thanks
     

    Attached Files:

  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Good job!

    Okay the BFE service has now started. But the MpsSvc service for the Windows Firewall has not started. This is likely due to the error message you saw when importing FixW7FWdrv.reg.

    The below registry entry is missing and we need to get this in.

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MPSDRV\0000\Control]
    "ActiveService"="mpsdrv"

    Can you try powering down your PC? Wait a minute and then turn back on and try just importing the FixW7FWdrv.reg patch again. Let me know what happens with any full error messages just like you supplied to me last time. We may need to try some manual permissions editing in the registry.
     
  29. edcruz_2010

    edcruz_2010 Private E-2

    Good job uh? You are doing an excellent job, I feel like a semi-dumb monkey just trying to type your commands correctly, plus I managed to get the thing in the first place, remember? :)

    Anyways, tried powering down and up and just the importing the FixW7FWdrv.reg and I got exactly the same error message as described before.

    Thanks
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Thanks.

    Yes and this is an important part of the task and giving me good/complete feedback on what happens makes it easier for me to know what is going on. ;) So when you provided information like below
    It is very helpful and much better than one someone just tells us "it didn't work" or "I got an error" which are not helpful because the details are left out.


    Let's try running the Windows Registry Editor as Administrator and see what happens. Click Start and in the search box just type regedit do not hit enter. In the area above you should see a regedit.exe icon appear when it is found. Right click on it and select Run As Administrator. Retry importing the same registry key. And see what happens. If it still has the same error, just tell me later, but try the below.


    Navigate to the below registry path

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root

    • Then right click on it and select Permissions
    • What names do you see in the section under Group or user names:
    • Also select SYSTEM from the names area and then look in the bottom box under Permissions for SYSTEM and tell me which check boxes are checked.
    • Now also with that Permissions for Root form open, click on the Advanced button down towards the bottom right.
    • On the next Advanced Security Settings for Root form, click the Owner tab and tell me which names appear in the below two boxes
      • Current owner:
      • Change owner to:
     
  31. edcruz_2010

    edcruz_2010 Private E-2

    Chas
    Thanks, I know what you mean. I design electronic hardware devices and embedded applications for the industrial applications and when someone calls and just says that something it is not working I feel like blowing my brains off.

    Anyways, back to business:

    Tried the regedit as Administrator and got the same error.

    I then did check the Permissions for Root. Please see the attached file with a little table with the names and permissions. Please notice that those with 2 functions means that both were selected.

    Then proceeded to Advanced Security Settings for Root>Owner:

    Current Owner----Administrators (SG1-PC\Administrators)
    Change Owner to-------SG1 (SG1-PC\SG1)


    SG1 is the name of the computer. I am ashamed to admit that I was a fan of StarGate 1 and I knew that picking that name would come back to haunt me one day :))

    Thanks
     

    Attached Files:

  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay let's modify the Owner by adding Everyone to the list.
    • On this Advanced... form, Click the Other users of groups... button
    • One the next form, in the Enter the objec name to select box, type in Everyone and then click Check Names which will then verify that Everyone exists and will underline the text to show it was found
    • Then click OK
    • Then back on the Advanced Security Settings for Root form select Everyone and then click the Apply button. And then OK out of this form.
    • Now you should be back at the Permissions for Root form.
    • Select Everyone and see if you can now give Full Control by checking the box and clicking Apply.
    If the above works, do the same thing for the below subkey of Root

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MPSDRV

    It may even already have Everyone set to full control if we are lucky.

    If all of this works, then try importing the fixW7FWdrv.reg file again.

    Tell me what happens.
     
  33. edcruz_2010

    edcruz_2010 Private E-2

    this worked fine and all the steps done as instructed. All the permissions were changed and the changes took well as I opened the windows after the fact to make sure that they took.

    The permissions were not set to Everyone>Full when I opened the settings for this part. However, I changed them and the changes took.

    After that I tried importing the FixW7FWdrv patch but still got the same error.

    However, I noticed that the firewall is not turning off by itself anymore and I dared to do a search and the IE was not redirecting any longer. Just so you are up to date.

    Thanks
     
  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Okay that is sounding good.

    Please reboot your PC and after reboot continue with the below.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7, make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  35. edcruz_2010

    edcruz_2010 Private E-2

    Hello chas
    I powered down the PC, reboot it and then ran the latest version of MGTools as instructed.

    The log is attached.

    I tried the IE and it is working fine now, actually much faster than it had been for a while. I guess the general cleanup helped, but it is noticeable faster.
    The Firewall appears to be working well as it is not turning off.

    I have a few different accounts on this computer (wife, kids & office account) beside the Administrative one and I haven't tried them yet, but I would think they should be fine too.

    Do we need to worry about the FixW7FWdrv patch not been able to write everything properly?

    Thanks for nth time for your help.
     

    Attached Files:

  36. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    You should just double check each one now to make sure they are okay before performing the below final instructions.

    No! Everything we needed has been added already.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  37. edcruz_2010

    edcruz_2010 Private E-2

    I will do that shortly but I just wanted to comment on something:
    While trying the other accounts I noticed that my IE, in all the accounts, would show the icon Internet|Protected Mode:OFF even when in the security settings is set to enable the Protected Mode for Internet.
    Is this normal?

    Thanks
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Renable UAC and see what you get.
     
  39. edcruz_2010

    edcruz_2010 Private E-2

    Chas
    I worked through the steps down to the 9 and everything so far seems to be ok. The uninstall for the Combofix worked fine as well as all the other described procedures there.
    I created a Restore Point after I finished.

    I will be going through the How to protect yourself from Malware tonight or tomorrow. That write up is really good and detailed as there are all the other documents in this site.

    I also will try to do the other disk I have here with the MBR problem. What do you recommend to do just to make sure I don't mess it up again?

    In another note, I am truly thankful for your help on this. I don't how you do it, but the write ups are some of the more complete and professionally written I have seen in many years and the hours you put to it amaze me. Is this a full time thing for you? I can't see the amount of time you put into this compatible with anything else, seriously.
    Furthermore, if you or MajorGeeks get percentage or otherwise benefit from the sale of any recommended or endorsed software I will more than willing to get it, because I will gladly help to keep this excellent place functioning plus I know that I would get an excellent value for the money. The fact that, unlike other places, all along the process you had never directed me to buy or get any paid program that would be my "only" solution is more than reassuring.

    Thanks again.
    Ed
     
  40. edcruz_2010

    edcruz_2010 Private E-2

    Chas
    I was typing the other message when I saw this one.
    I enabled UAC but the Protected mode is still showing as OFF.
     
  41. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After changing making any changes to UAC, you have to reboot for them to take effect.

    Also changes to Protected Mode will not take effect until all browsers are exited and then restarted. But this also has a dependency on UAC being enabled first.

    See some tips here: http://www.sevenforums.com/tutorials/63141-internet-explorer-protected-mode-turn-off.html
     
  42. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just fix it the same way you fixed the other drive. Minimize any use of the drive to only plugging it in and fixing it.... until it is fixed.

    Thanks! I tried to make things as detailed as possible to cover all scenarios and to give lots of tips to avoid questions that many less experience users run into. It makes the documents bigger and some people are put off by this, but the details are there for the less experienced people.

    No. I have full time job that occupies 10 to 12 hrs a day on average.

    No I do not get a percentage. The forums are maintained and run by the owners at their expense. Typical of most websites they get kick back for the advertisements and software being recommended thru them. Use the main download site at www.majorgeeks.com to download applications whether free or for ones you may eventually purchase. Purchasing is your choice. Every application on the site is tested before being made available for download. We don't just put everything that exists there. In fact, many submissions may be rejected.
     
  43. edcruz_2010

    edcruz_2010 Private E-2

    Chas
    I just now was able to check on this. This days are mayhem around here.

    Regarding your answers, I am truly amazed and impressed for what you do and the time you put to it. Thanks again.

    I will try to follow your final advices tomorrow and will keep you posted. I really haven't used the computer but I just checked it and everything seems to be fine. The IE is opening with a speed that hasn't had in months and the Firewall is holding.

    Keep up the good work.
    Thanks.
     
  44. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     
  45. edcruz_2010

    edcruz_2010 Private E-2

    Hello Chas
    Just a quick update.
    I just ran the solution for the other disk and the MBR came back clean, so we are good. Everything is looking good. I have Malwarebytes Anti-Malware Trial running and once it expires I will get the SuperAntispyware, as per recommendation.
    I will probably install IE9 as well, even when I don't really like it but it seems as having a better protection.

    Again, thanks a lot and have yourself a Merry Christmas and a Happy New Year.

    Thanks
    Ed.
     
  46. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Excellent!

    Currently I would recommend purchasing Malwarebytes over SUPERAntiSpyware. ;)


    You're welcome and thanks. Merry Xmas and Happy New Year to you too.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds