Computer invaded runs ultra slow - logs attached

Discussion in 'Malware Help (A Specialist Will Reply)' started by crowninglory, Apr 17, 2011.

  1. crowninglory

    crowninglory Private E-2

    Good day forum members,

    This issue started about 2 weeks ago. I am trying to solve why the computer runs so slow that you cannot even run anything after Windows Vista boots up. I am helping my family out as it seems someone has downloaded an infected program that has made everything slow to a dead halt.

    What I can tell you is that when I launch Windows Safe Mode with Networking it runs perfect, it's as soon as I launch Windows that's the issue.

    I have read the log section of the forums and have attached accordingly for your review. All of the files were run in Windows Safe Mode, because I can't run it normally in Windows.

    Also of other note prior to coming to these forums I ran the file msert.exe and did a complete system scan. The information I got back showed that there were 6 Trjoan Viruses. Some of them were related to Java. 3 Ended up being quartined and the other were "removed" - I have attached the screenshot for review as well showing the exact information it found (sorry I don't think there was the ability to create a log file for this one) - I hope it sheds some clues as to what is affecting it.

    Logs and screen shot attached for review. Please note this is 64bit and not 32bit.

    Thank you for looking into this and for your assistance, it is much appreciated.

    Crowninglory
     

    Attached Files:

  2. crowninglory

    crowninglory Private E-2

    Also, additional files - picture attached (sorry, you'll have to zoom in to see clearly)

    Thanks,

    Crowninglory
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are using a very old version of MGTools. Although I am not seeing any malware in your logs, I still want you to download the latest version and get me a new MGLog.zip.

    Now download the latest version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one. Run the Exe.
     
  4. crowninglory

    crowninglory Private E-2

    Hi TimW,

    Thanks for taking the time to look at these files. Your assistance in any way is much appreciated.

    As per your request I have downloaded the link you have provided and have redone mgtools again.

    Attached is the file you seek.

    It seems to me that this is more of a trojan virus of some type, but then again, I'm not an expert like you are. When they ran Norton, it did not pick up anything.

    If it's going to be too much trouble, I guess the family will have to cut their losses and reformat.

    Thanks again.
     
  5. crowninglory

    crowninglory Private E-2

    Forgot to attach - Now attached.

    Thanks.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    That log was missing many items. Did you allow it to run until it told you it was finished? You did not make the agreement to run HJT either. Please run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * C:\MGlogs.zip

    While we are at it, let's check with one more thing:

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123tdk.com).
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message
     
  7. crowninglory

    crowninglory Private E-2

    Hi Tim,

    After I downloaded the update you suggested, I went the the log file as you suggested and right clicked on "run as administrator".

    I'm not sure if this program is running on the computer properly. When I run the program, a command prompt window pops on the bottom menu bar but when I click on it, it will not open it. I cannot see what's going on with the program. It basically just sits there and nothing happens. I can close the window with no issues at any time, but I never get any confirmation messages or anything with licenses "I accept" popping up. Is this the norm with this program? If it is, how long should I wait? Does this run pretty fast?
    (Also, I can screen shot it for you if you'd like)

    Note that all the recommendations such as user’s settings, firewalls, etc is off. I'm not sure why it isn't working?

    Also I will run your other program you suggested below and advise when complete.

    Thanks for your help!
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please click Start, All Program, Accessories and you will see ( among other things ) a Command Prompt entry.

    • Right click the Command Prompt entry and select Run As Administrator.
      • It is critical that you run it this way.

    • If you do this properly, a command prompt window will open with a title of Administrator Command Prompt.
    • Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple/brown is merely informational.

    cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    GRK64 <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    SN64 <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
     
  9. crowninglory

    crowninglory Private E-2

    Greetings Tim,

    I have completed the below as per your instructions:

    1) I reran MGtools again in the command prompt and executed your instructions below. I'm not 100% sure that it went OK, so I attached a screenshot for you to view just to make sure. Also attached is the updated zip file as a result of running those commands. Hopefully it works now as you expect it.

    2) I downloaded TDSSkiller and ran the program with no issues. When it did the scan however it seemed to pick up something related to the boot sector. I have not actioned this yet as I'll await instructions from you. It seems there has been a version update and some of your instructions below don't match up. It seems like once it finds the issue it gives you three options: skip, copy to quaratine, or delete. Also attached the log for your review.

    Again, thanks for your help through this. It's much appreciated. I'll await for your further instructions.

    Thanks!
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not finding any malware in your logs. If you run fine in safe mode, then I suggest you go into msconfig and disable all startups and reboot. See if that makes a difference. Ultimately, you need to post in the software forums to further diagnose your issues with normal mode.

    Is that the only issue you are having?
     
  11. crowninglory

    crowninglory Private E-2

    Hi Tim,

    Thanks for taking the time to check all of the logs. The more I think about it, the more you're right. I don't believe this is a malware / virus issue, it's probably more along the lines of a corrput registry or corrupt drivers. When I disabled all services under MSCONFIG it loaded Windows fine. As soon as I enabled them all, it gets into Windows and has that permanent "loading" effect.

    Do you have any experience with registry / driver errors? Or should I venture over to the software forums and ask for help? Any help would be appreciated.

    Thanks.
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, you need to post in the software forum. But in the meantime, you need to go back to msconfig and disable it all again. Then if the system is running ok, re-enable just two items at a time until you find what is causing the issues.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0

    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds