Followed read/run step, still having issues

Discussion in 'Malware Help (A Specialist Will Reply)' started by Richard63, Nov 1, 2010.

  1. Richard63

    Richard63 Private E-2

    Good afternoon.

    I am running Win XP Professional, SP3 V2002.

    I got hit with an attack page while searching Google images a few days ago. I was redirected to a page with a pop up that said "Wait a minute. This is important. We check your drive". I used the task manager to kill the page, but I suspect a cookie was planted before I could kill it. I cleared cookies, but there is one file that I cannot delete as it says it is in use, even though no other programs are running.

    It has FF and IE locked down. I can use Safari (limited) but Google searches are redirected. It also locked down Spybot and AdAware. A Norton scan showed nothing.

    I had mixed success on the cleaning steps. Super Anti Spyware showed no issues. I got Mallware Bytes to install but it would not run, even after renaming the file.

    Combo Fix ran and generated a log.

    Root Repeal ran for a minute but got hung on "Initializing, please wait". Had to hard boot the PC.

    MG Tools ran and generated a log.

    Here are the logs, any help is greatly appreciated!
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please put ComboFix directly on your desktop, not here :
    Running from: c:\cleaners\CF.exe

    Then please attach the entire C:\MGLogs.zip.
     
  3. Richard63

    Richard63 Private E-2

    Will do. I am currently running an ESET scan on the infected PC (almost 4 hours into it). Once that is finished I will follow the steps you posted.

    Thanks!

    Richard
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I will be here when you are ready.
     
  5. Richard63

    Richard63 Private E-2

    OK, sorry for the delay but had to work today. I moved Combo Fix and re-ran it, the new log is attached. I also found the MGlog zip file. Not sure if it matters but what is normally "C" drive on most machines if the "F" drive on mine. When we built this PC I reused an old HD and for some reason it labeled the main drive "F".

    I also ran ESET after reading a thread with an issue that sounds much like mine. I am attaching that log as well.

    Thanks so much for your help, I'll wait for the next steps.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing any malware in your logs. We can do this:

    Please Disable Spybot's TeaTimer --> Should have been done as per the R&R instructions!

    * Run Spybot and click Mode
    * Select Advanced Mode.
    * Then click Tools and select Resident.
    * Now in the right window pane, uncheck TeaTimer.
    * Also while this is open, in the left column now select IE Tweaks
    * and then in the right pane make sure all the Miscellaneous locks are unchecked.
    * Now quit Spybot!

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    Now tell me exactly what issues you may still have, if any.
     
  7. Richard63

    Richard63 Private E-2

    I followed those steps and am still having issues. Can't run Spy Bot or Malwarebytes, my browsers are being redirected to a fake spyware warning page, google searches are redirected, etc.

    I was reading online about Hitman Pro and am going to give it a shot. Any other thoughts?

    Thanks again for the help!
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    After you run Hitman, Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message
     
  9. Richard63

    Richard63 Private E-2

    OK, I am cautiously optimistic!

    Hitman found a possible variant of TDLE (Alureon) and also identified another rootkit, mouclass.sys in F:\Windows\System32\Drivers. It took them both out after rebooting. A subsequent scan was clean.

    TDSS Killer came back with nothing, log is attached.

    I opened all 3 browsers, FF, IE, and Safari and surfed and searched. No redirects, Google searches went fine.

    I reinstalled Mawarebytes to see if it would run. It is scanning as I type.

    Am I really out of the woods? And what can I do in the future to prevent this?

    Once again, thanks for your help!
     

    Attached Files:

  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know. I just wonder if TDSSKiller would have found them. As to the future, just read the last link in the final cleanup instructions. You may want to hold off on this for a day or two to be sure you are out of the woods.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Support MajorGeeks with Geek Wear!
     
  11. Richard63

    Richard63 Private E-2

    Tim,

    Thanks so much for your help! I really appreciate it. I'll be keeping this place bookmarked and plan to do a lot of reading through the forum.

    I'll give it a couple of days and follow the steps you outlined.

    Given the fact this site just saved me a few hundred bucks on a house call, is there a method to make a donation to the site? I would gladly kick in a few bucks for the cause.

    Thanks again,

    Richard
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are more than welcome. We don't ask for any kind of payment for the volunteers that work this forum. But you can always do yourself and the site a favor by purchasing Geek wear....just see my very last link in the Final Instructions on buying geek wear. Or maybe for a loved one?


    Support MajorGeeks with Geek Wear!
     
  13. Richard63

    Richard63 Private E-2

    Cool, I will check it out!
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good deal. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds