FBI Locked Computer

Discussion in 'Malware Help (A Specialist Will Reply)' started by Lydster, Oct 9, 2012.

  1. Lydster

    Lydster Private First Class

    Hello. A friend got this virus that's locking the computer from accessing anything in normal mode. I booted into Safe mode and did the following:

    > Ran RogueKiller to get log only.

    > Ran Mbam - It found and removed items, so I thought I might be able to go into normal mode to run the other programs, but no luck. So I booted again into Safe mode...

    > Ran TDSSKiller - Nothing was found.

    > Ran HitmanPro to get log only.

    > Ran MGTools -- logs attached.

    So, everything was run in Safe mode. After everything was run, I thought I'd just try to boot into Normal again, but I still got the FBI screen. (FYI, I didn't run CCleaner because the Start Menu looked like some things might be missing, and I didn't want to take the chance of removing temp files we may need to restore later.) Please let me know what you think we should do next.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button

    Now click the Registry tab and locate these detections:

    • [RUN][SUSP PATH] HKLM\[...]\Run : Verizon Custom Uninstall Tracking (C:\DOCUME~1\CONFER~1\LOCALS~1\Temp\InstallHelper.exe /uninstalltrackingvendor=Verizon) -> FOUND
      [RUN][SUSP PATH] HKLM\[...]\Run : wmcodecdspps (C:\Documents and Settings\EDDIE\Local Settings\Application Data\Microsoft\Windows\2520\wmcodecdspps.exe) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJ] HKLM\[...]\System : ConsentPromptBehaviorUser (0) -> FOUND
      [HJ] HKCU\[...]\Internet Settings : WarnOnHTTPSToHTTPRedirect (0) -> FOUND
      [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
      [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.


    Now click the Files/folders tab and locate these detections:

    • [ZeroAccess][FOLDER] U : C:\WINDOWS\Installer\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\U --> FOUND
      [ZeroAccess][FOLDER] L : C:\WINDOWS\Installer\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\L --> FOUND
      [ZeroAccess][FOLDER] U : C:\Documents and Settings\EDDIE\Local Settings\Application Data\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\U --> FOUND
      [ZeroAccess][FOLDER] L : C:\Documents and Settings\EDDIE\Local Settings\Application Data\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\L --> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach[/URL])
    Do not reboot your computer yet.

    Rescan with HitmanPro.

    Choose to Delete these files if they are detected:

    • C:\Documents and Settings\EDDIE\Local Settings\Application Data\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\L\ (ZeroAccess)
      C:\Documents and Settings\EDDIE\Local Settings\Application Data\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\L\00000004.@ (ZeroAccess)
      C:\Documents and Settings\EDDIE\Local Settings\Application Data\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\U\ (ZeroAccess)
      C:\WINDOWS\Installer\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\L\ (ZeroAccess)
      C:\WINDOWS\Installer\{69292cb4-683b-f662-a8cb-6efa11b06f0a}\U\ (ZeroAccess)
      HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR
      PAGE BYPASS ZONE CHECK FOR HTTPS KB954312\ (Trojan.FakeAV)
      C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\ (AskBar)
      C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\partnercobranding.dat (AskBar)
      C:\Program Files\Ask.com\ (AskBar)
      C:\Program Files\Ask.com\btn_search.png (AskBar)
      C:\Program Files\Ask.com\limewire_logo.png (AskBar)
      HKU\S-1-5-21-3309738133-2895428757-792191449-1012\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}\ (AskBar)
    Ignore all other detections.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.

    Now re-scan with both RogueKiller and HitmanPro and attach those new logs as well.
     
  3. Lydster

    Lydster Private First Class

    Thanks for your help. On your RK instructions, I wanted to let you know: After I went to the Registry tab and unchecked the two you *didn't* want me to remove, I clicked on the Delete button; and it showed that they were removed. Then I went to the Files tab to make the choices you asked for there, and it appeared that the Delete function I just did under Registry also deleted all the entries under the Files tab. That included the 4 you asked to be deleted, plus 1 item that you'll see in the attached log. (I'm guessing now that all items under all tabs must be automatically checked in advance, and I should have gone into each tab first and unchecked everything I didn't want then hit Delete.)

    Then I ran HitmanPro and deleted what you requested. I restarted the computer, this time into Normal mode (which *did* work). Then I re-ran RK and HitmanPro again. All 4 logs are attached.

    Right now, the FBI message is *not* coming up, and the computer seems to be performing normally. IE launches the home page, etc. Thanks!
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Re-run HitmanPro and delete these:
    C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\ (AskBar)
    C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\partnercobranding.dat (AskBar)
    C:\Program Files\Ask.com\ (AskBar)
    C:\Program Files\Ask.com\btn_search.png (AskBar)
    C:\Program Files\Ask.com\limewire_logo.png (AskBar)

    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip
     
  5. Lydster

    Lydster Private First Class

    Done. Here are the logs. (I inadvertently quarantined MGTools after HitmanPro ran, but then I restored it.)
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can re-run Hitman and have it clean out these:
    C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\ (AskBar)
    C:\Documents and Settings\Nina\Local Settings\Temp\AskSearch\partnercobranding.dat (AskBar)
    C:\Program Files\Ask.com\ (AskBar)
    C:\Program Files\Ask.com\btn_search.png (AskBar)
    C:\Program Files\Ask.com\limewire_logo.png (AskBar)

    Otherwise, your logs are clean. But I would suggest you run CCLeaner and clean out your temp folders.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:
    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds