FBI, Redirects, and I'm Pretty Sure a Poltergeist or Two

Discussion in 'Malware Help (A Specialist Will Reply)' started by NegligentPerSe, Oct 5, 2012.

  1. NegligentPerSe

    NegligentPerSe Private E-2

    First sign of trouble was the FBI Ransomware. Totally shut down the computer. I rebooted in Safe Mode and did a system restore which at least unlocked the computer and allowed for normal function.

    Next sign of trouble was redirects in IE. So, I returned to MajorGeeks and ran the malware removal steps. I moved on to the "wait a few days" step to see if everything was ok. Seemed fine 'til I got a blue screen. I rebooted in Safe Mode, ran CCleaner and was then able to reboot normally.

    I'm back with my logs because I'm pretty sure something is still up.

    Thank you for all your help thus far and, in advance, thank you for the help to come.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Not finding much. Let's just do this:

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [RUN][SUSP PATH] HKCU\[...]\Run : Apple Computer (rundll32.exe "C:\Users\David\AppData\Local\ArcSoft\Apple Computer\axbmnnr.dll",iTunesHelperMainEntryPointW) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-2453921347-167188869-3122483292-1001[...]\Run : Apple Computer (rundll32.exe "C:\Users\David\AppData\Local\ArcSoft\Apple Computer\axbmnnr.dll",iTunesHelperMainEntryPointW) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJPOL] HKLM\[...]\Wow6432Node\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : ConsentPromptBehaviorAdmin (0) -> FOUND
      [HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
      [HJ] HKLM\[...]\Wow6432Node\System : EnableLUA (0) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)

    Now reboot and re-scan with RogueKiller and attach that log as well.
     
  3. NegligentPerSe

    NegligentPerSe Private E-2

    I turned on the computer to do your steps, but was met with a blue screen when trying to boot normally.

    I booted in safe and ran RogueKiller. None of the previous registry items are there. Instead, I get the attached log and a big flashing Root.MBR warning.

    Things seem to have gotten worse.
     

    Attached Files:

  4. NegligentPerSe

    NegligentPerSe Private E-2

    I don't mean to "bump" but wanted to provide additional logs. Since RK wan't the same, I ran the rest of the "Do This First" steps again. Here are my results.
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Attached is bfe.zip

    Inside is:



    Extract bfe.reg to your desktop.
    Double-click bfe.reg and allow it to merge into the registry. If you get a "successfully merged into registry" type of message, reboot your PC and see if you can turn on BFE, or if it is already turned on.

    You can run these commands from the command prompt.

    • net start bfe
    • sc qc bfe


    If the service is still not running, do the following:
    Run regedit:
    1. Browse to the location for the BFE service in the registry (HKLM\System\CurrentControlSet\Services\BFE\Parameters\Policy), right click and select permissions. (note: HKLM is short for HKEY_LOCAL_MACHINE_
    2. In the “Permissions for Policy” window, click advanced | Add.
    3. Once the “Select Users, Computers or Group” box appears, change the “From this location:” to point to the local machine name.
    4. After changing the search location, enter “NT Service\BFE” in the “Enter the object name to select” box and click “Check names” – this will allow you to add the BFE account.

    5. Give the following privileges to the BFE account:
    Query Value
    Set Value
    Create Subkey
    Enumerate Subkeys
    Notify
    Read Control

    After adding the BFE account to the registry key, please try to start the Base Filtering Engine service.

    Tell me how things are running now.
     
  6. NegligentPerSe

    NegligentPerSe Private E-2

    Success!

    So, I added the FixME and BFE reg files and got success messages on both. I rebooted and did crtl-alt-delete and now see BFE running in services, where before I did not.

    Is there anything else I need to do at this point? Or, am I safe?
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Go to the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     
  8. NegligentPerSe

    NegligentPerSe Private E-2

    I read above, and saw that you had originally wanted me to delete some items in RK. It ran this time, but the log has changed, I have attached it.

    Also, MB continues to find Tojan.Agent in svchost.exe. Log attached.

    TDSSKiller and Hitman both come back clean.

    Other logs attached.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can run RogueKiller and have it fix what it found. And re-run MBAM and fix the svchost file.
     
  10. NegligentPerSe

    NegligentPerSe Private E-2

    I just wanted to check in to say that the final step cleaned everything and all is well. Thank you so much for your help!
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds