Fake Hard Drive errors infection

Discussion in 'Malware Help (A Specialist Will Reply)' started by webbyte, Aug 3, 2012.

  1. webbyte

    webbyte Private E-2

    Windows Vista 32bit.

    Ran recommended scans and logs attached.

    Infection appears to be gone, no longer getting warnings re: hard drive failure, but several files have been tagged as hidden so no icons appear on desktop, under All Programs, etc.

    Is there a way to unhide these icons?
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download OTCby Old Timer and save it to your Desktop.

    Please download and save the below tool from Grinler @ bleepingcomputer to your Desktop or anywhere else you can find it ( if the Desktop is not showing )

    http://download.bleepingcomputer.com/grinler/unhide.exe

    Now run it. Now see if you can find the items that seemed to be missing?

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Files/folders tab and locate these detections:


    • [SUSP PATH] HKCU\[...]\Run : ytaockaSPr.exe (C:\ProgramData\ytaockaSPr.exe) -> FOUND
      [SUSP PATH] HKCU\[...]\Run : 9jJ0D7eLKdT5CV (C:\ProgramData\9jJ0D7eLKdT5CV.exe) -> FOUND
      [SUSP PATH] HKUS\S-1-5-21-3204725611-2338143393-1354349831-1000[...]\Run : ytaockaSPr.exe (C:\ProgramData\ytaockaSPr.exe) -> FOUND
      [SUSP PATH] HKUS\S-1-5-21-3204725611-2338143393-1354349831-1000[...]\Run : 9jJ0D7eLKdT5CV (C:\ProgramData\9jJ0D7eLKdT5CV.exe) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :killallprocesses
    :files
    C:\ProgramData\-9jJ0D7eLKdT5CV
    C:\ProgramData\-9jJ0D7eLKdT5CVr
    C:\ProgramData\9jJ0D7eLKdT5CV
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  3. webbyte

    webbyte Private E-2

    unhide appears to have worked and all desktop items, Start menu program files, etc. are displayed.

    Ran RogueKiller scan but nothing listed under Files so couldn't complete those directions. Log attached. The RKQuarantine folder on the desktop was empty before but now there is data in the folder.

    Ran OTL and rebooted as instructed. On reboot, after displaying the Toshiba splash screen, "Windows is Loading Files" was displayed in white bar at bottom of screen (where it would appear if running a system recovery). That was happening before cleanup but first time it displayed since running Malewarebytes. System was hung at that point, pressed power button to turn off computer. Turned computer on and it started successfully and displayed OTL log file, which is attached.

    Ran GetLogs and MGLogs.zip also attached.

    System appears to be running okay at this time. Did both a restart and a complete shut down and powered on and did not get the Windows is Loading Files indicator either time. Internet connection working also.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds