File Recovery Virus

Discussion in 'Malware Help (A Specialist Will Reply)' started by mjmeyer05, Oct 2, 2012.

  1. mjmeyer05

    mjmeyer05 Private E-2

    This one really has me stumped. I'm repairing a computer for my brother in law. He has a zero access infection, so I'm doing google searches on possible fixes for his problem on my computer and all of a sudden, I get like 20 pop ups that say "a write command during the test has failed to complete..." and then I get a file recovery program that pops up and starts running. It tries to reboot, but I powered it off before it could restart, and pulled the network cable. It forced a disk check to run, and now widows starts with a blank desktop, programs are not accessable, and if I log in as admin, my files are not accessible. It has all but rendered the system un-usable. I'll go through the normal read and run me first process if I can get to the point of getting the programs installed. But so far, safe mode hangs at the agp40 system file, and I can't get my copy of the ultimate boot cd to load. Any advice???
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Is this Win 7 or Vista? If so...

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  3. mjmeyer05

    mjmeyer05 Private E-2

    this is an XP pro machine.
     
  4. mjmeyer05

    mjmeyer05 Private E-2

    Ok, I was able to log on as administrator, and run Rogue Killer, it found Root.mbr, microsoft security essentials popped up just before I ran it and it had quarantined trojan downloader java/openconnection.AK and trojan selace.R so I deleted those. I'm running malwarebytes as we speak, but I'm running an outdated version (21 days) because it won't let me install the one I just downloaded, and I'm not going to risk reconnecting to the internet until I get a handle on this virus. I'm considering rolling back to my last restore point.
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  6. mjmeyer05

    mjmeyer05 Private E-2

    Well, here's where I'm at so far. I was able to start the machine up in safe mode with networking. So I started going through the process. I ran rogue killer which found a bunch of stuff. Malwarebytes found 6 references to pum.hijack, tdskiller wouldn't run, hitmanpro found the file causing the fake hard drive error, and the registry entries. and MGtools starts up but then it closes out before it finishes. Logs are below.
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Hitman and have it delete all it finds.
    Re run it again and attach the new log.
    Re run RogueKiller and attach that log too.

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    • cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    • nwktst<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
    • analyse <-- this attempts to run HijackThis. Be sure to click the Accept button twice in the license agreement popup or it will just sit there and wait.
    Now look for the C:\MGlogs.zip file and attach it no matter what happened while doing the above.
     
  8. mjmeyer05

    mjmeyer05 Private E-2

    ran hitman x2 - log attached fixed all it found on first scan
    ran rogue killer - log attached
    at the command prompt, I recieved a message that access is denied for nwktst, GetRunKey, and ShowNew.

    When I ran analyze it brought up the Hijackthis window. My options were scan & save log, scan only, view a list of backups, open the Misc tools, open online hijackthis quick start, and none of the above just start the program. I selected scan and save log and when it finished scanning, I got an error "write access was denied to the location you specified. Try a different location" So I reran the scan and manually saved the log file to my documents. - MGlogs.zip, and a seperate Hijackthis log are attached.
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.
     
  10. mjmeyer05

    mjmeyer05 Private E-2

    Ok, scan is done. Here are the logs for OTL
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 3 detections:

    • [RUN][SUSP PATH] HKCU\[...]\Run : R6dhRAKgSyQpIs (C:\Documents and Settings\All Users\Application Data\R6dhRAKgSyQpIs.exe) -> FOUND
    • [RUN][SUSP PATH] HKLM\[...]\Run : lMQKNXKUTH.exe (C:\Documents and Settings\All Users\Application Data\lMQKNXKUTH.exe) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-117609710-162531612-682003330-1003[...]\Run : R6dhRAKgSyQpIs (C:\Documents and Settings\All Users\Application Data\R6dhRAKgSyQpIs.exe) -> FOUND


    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.



    You can also re run HitmanPro and have it delete all it finds. Then rescan and Attach the new log once done.


    We need to run an OTL Fix

    • Right-click OTL.exe And select " Run as administrator " to run it. If Windows UAC prompts you, please allow it.
    • Copy and Paste the following code into the Image textbox. Do not include the word Code

    Code:
    :otl
    IE - HKLM\..\SearchScopes\{8b0d31e7-0331-43cc-87cd-a472317f1305}: "URL" = http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=ZNzfb003YYUS_ZRxdm42933US&ptb=063D289B-EBB7-434E-87FD-4CDD0206D23C&psa=&ind=2010111800&ptnrS=ZNzfb003YYUS_ZRxdm42933US&si=&st=sb&n=77cfdf38&searchfor={searchTerms}
    IE - HKCU\..\SearchScopes\{8b0d31e7-0331-43cc-87cd-a472317f1305}: "URL" = http://search.mywebsearch.com/mywebsearch/GGmain.jhtml?id=ZNzfb003YYUS_ZRxdm42933US&ptb=063D289B-EBB7-434E-87FD-4CDD0206D23C&psa=&ind=2010111800&ptnrS=ZNzfb003YYUS_ZRxdm42933US&si=&st=sb&n=77cfdf38&searchfor={searchTerms}
    [2011/10/15 00:23:07 | 000,000,004 | ---- | C] () -- C:\Documents and Settings\Mike\Application Data\57bcc34e
    [2011/10/15 00:02:37 | 000,000,643 | ---- | C] () -- C:\Documents and Settings\Mike\Application Data\40194b4b
    [2011/10/05 10:38:26 | 000,000,004 | ---- | C] () -- C:\Documents and Settings\Mike\Application Data\b7613cb1
    [2011/10/15 06:29:24 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Mike\Application Data\BP0ucS2ib3
    [2011/10/15 06:29:41 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Mike\Application Data\DCwkIVrzOtAuSiF
    [2011/10/17 20:34:48 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Mike\Application Data\ppmG5aQJ6E8R9Yw
    [2011/10/15 06:29:15 | 000,000,000 | ---D | M] -- C:\Documents and Settings\Mike\Application Data\VQH6sWK7f
    
    :commands
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    • Then click the Run Fix button at the top.
    • Click Image.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. ATTACH that report in your next reply.



    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )

    Now run OTL again (just a scan) and attach new log. Let me know how things are running!!
     
  12. mjmeyer05

    mjmeyer05 Private E-2

    I just ran Rogue killer but didn't see the entries you wanted me to delete. I'll continue on with the other items and post all the logs when I'm done
     
  13. mjmeyer05

    mjmeyer05 Private E-2

    Here are the logs for the scans.
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Don't forget, I had typed:
     
  15. mjmeyer05

    mjmeyer05 Private E-2

    I apologize, I overlooked that log file. Here it is.
     

    Attached Files:

    • OTL.Txt
      File size:
      59.3 KB
      Views:
      5
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    That's ok. Now tell me how things are running please.
     
  17. mjmeyer05

    mjmeyer05 Private E-2

    It seems like the actual infection has been removed, but it really jacked up my settings. There must have been some permissions that were changed when this was infected, because when I pull up my start menu and list all programs, the programs are there, but if you go to expand the program it says it's empty. I also noticed that all the folders were marked as hidden, so I started manually changing them back. Is there a tool that will handle resetting these things back to normal?
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  19. mjmeyer05

    mjmeyer05 Private E-2

    It did help (sort of) the default start menu items have all returned, but most of my programs still show empty when expanded. The forum on bleeping computer mentioned that there's a temp folder where those items are normally stored, and the SMTMP folder is not on my computer anywhere. If I reinstall the program it appears normally, but there's alot I would have to reinstall. Any thoughts?
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  21. mjmeyer05

    mjmeyer05 Private E-2

    That one was a bust. I'm taking this opportunity to clean up some unused programs, and then I'm going to reinstall the ones I want to keep. It kinda sucks, but it looks like that is going to be my only option.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below command at the command prompt followed by the enter key. . Note the directions of each of the slashes also there are spaces after dir before the C:\ and before and after the >

    dir /s C:\_OTL > C:\files.txt


    Now attach the C:\files.txt log.
     
  23. mjmeyer05

    mjmeyer05 Private E-2

    Here's the log.
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay there were no signs of backups of your settings in the OTL folders. I was just check to see if any were removed from temp folders.

    Can you run MGtools now? How about in safe boot mode if normal mode does not work?

    Do you have other user accounts on this PC?
     
  25. mjmeyer05

    mjmeyer05 Private E-2

    The only other user account on this machine is administrator. I removed the mgtools that was on there. Redownloaded it and ran it. It ran perfectly. Here's the log.zip
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then it may not really contain enough info to copy things back into your account. What I was think was that you could potentially copy the below folder:

    C:\Documents and Settings\Administrator\Start Menu\Programs

    into the folder for your user account which is:

    C:\Documents and Settings\Mike\Start Menu\Programs

    In an attempt to restore the items missing from your Programs list. You will have to reinstall applications to get others that are still missing back. You do have quite a few things still listed in the All Users account but these should already show in your user account when you click Start and select All Programs. The below still show for All Users
    Code:
    "C:\Documents and Settings\All Users\Start Menu\Programs\"
    ACCESS~1      Mar 26 2008              "Accessories"
    ACTIVE~1      Feb 24 2011              "Active@ ISO Burner"
    ACTIVE~2      Feb 24 2011              "Active@ Data CD DVD Blu-ray Burner"
    ADMINI~1      Mar 26 2008              "Administrative Tools"
    ATIHYD~1      Jan  6 2009              "ATI HYDRAVISION"
    ATIMUL~1      Oct  7 2012              "ATI Multimedia Center"
    AUDIOR~1      Oct  7 2012              "Audio Related Programs"
    CANONP~1      Oct  7 2012              "Canon PhotoRecord"
    CANONU~1      Apr 13 2008              "Canon Utilities"
    CCLEANER      Feb 25 2011              "CCleaner"
    CREATIVE      Mar 29 2008              "Creative"
    D-LINK        Oct  7 2012              "D-Link"
    desktop.ini   May 22 2009         150  "desktop.ini"
    GAMES         Mar 26 2008              "Games"
    LIGHTS~1      Oct  7 2012              "LightScribe Direct Disc Labeling"
    LOGITECH      Mar 28 2008              "Logitech"
    MALWAR~1      Oct  2 2012              "Malwarebytes' Anti-Malware"
    MI9E44~1      Apr 19 2012              "Microsoft Office Live Add-in"
    MICROS~1      Mar 26 2008              "Microsoft Office"
    msnexp~1.lnk  Mar 26 2008        1846  "MSN Explorer.lnk"
    NCHSOF~1      Oct  7 2012              "NCH Software Suite"
    RECUVA        Sep 30 2010              "Recuva"
    SAMSUN~1      Oct  7 2012              "Samsung CLP-300 Series"
    SAMSUN~1.PRI  May  6 2008              "Samsung Dr.Printer"
    SEAGATE       Aug 17 2012              "Seagate"
    STARTUP       Mar 25 2008              "Startup"
    SWITCH~1      Jul 20 2009              "Switch Sound File Converter"
    WINFF         Oct  7 2012              "WinFF"
     
  27. mjmeyer05

    mjmeyer05 Private E-2

    I reinstalled quite a few things Sunday night and got rid of a bunch of programs that I no longer use. It wasn't as painful as I imagined it would be. It helped that I keep all my install discs labeled and organized in a binder. As far as I can tell, everything that I need is working again. Were there any lingering signs of malware in any of the logs? If you think I'm good to go, I'll toggle the restore points and we can lay this one to rest. This was by far the nastiest infection I've ever encountered. I can't thank you enough for your help.
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I'll let Kestrel13! finish off with you now since all the hardwork was done by her. ;) She can give your last MGlogs.zip the once over and hopefully the all clear.

    I was just trying to see if there was any other place we could restore things from.
     
  29. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thanks Chas. ;)

    @ mjmeyer05

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  30. mjmeyer05

    mjmeyer05 Private E-2

    Thank you very much for getting me through this one. Usually, the machines I work on belong to other people. It's a real PITA when it's your own system. Anyway, thank you for your patience and hard work.
     
  31. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're welcome from us both ;) Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds