I think im still infected

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by DigitalWarlord, Sep 19, 2011.

  1. DigitalWarlord

    DigitalWarlord Private E-2

    Im still having a lot of problems here. I cant get root repeal to run. It starts to run and then will encounter an error and close. My explorer is having problems as well. My tool bar looks like its from a 9x windows installation.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now let's use ComboFix to remove a bunch of malware files.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\Users\b\AppData\Roaming\Microsoft\Windows\Templates\ig4si02yxx53kwkcu83704n4dy1yockvq8f8gk8f
    C:\ProgramData\ig4si02yxx53kwkcu83704n4dy1yockvq8f8gk8f
    C:\Users\b\AppData\Local\ig4si02yxx53kwkcu83704n4dy1yockvq8f8gk8f
    
    Folder::
    C:\Users\b\AppData\Local\{0034A5BB-C81A-413B-8CC3-D8B3612BEEFA}
    C:\Users\b\AppData\Local\{02D07BC8-08AE-49D1-9771-9DD5CE2E6A00}
    C:\Users\b\AppData\Local\{08120CB8-EDB1-4845-9344-F6EE422400A9}
    C:\Users\b\AppData\Local\{0E57FDA6-D946-434F-A202-8D36DC0D8A38}
    C:\Users\b\AppData\Local\{0FB62670-970B-4AA3-8784-21AB51E0BF54}
    C:\Users\b\AppData\Local\{1282DF4C-7210-4484-88ED-D0C0D2AA7655}
    C:\Users\b\AppData\Local\{139B44B5-CB09-4B78-9BE2-878CCEBD8C29}
    C:\Users\b\AppData\Local\{1763FBC8-3972-47F2-8DAA-BEB558EDE0BF}
    C:\Users\b\AppData\Local\{18B14BD7-8CC8-4DA0-A979-E1487683FBE4}
    C:\Users\b\AppData\Local\{18D94EA3-670D-4108-A4E8-6CD2A9EF9569}
    C:\Users\b\AppData\Local\{1EAF4F60-38A5-4016-BEB3-AD505C694480}
    C:\Users\b\AppData\Local\{1FE24726-CAC9-42DE-8E9C-FDD7BA38F4E2}
    C:\Users\b\AppData\Local\{2122D9AB-DF88-4837-B3CD-C89254B4199A}
    C:\Users\b\AppData\Local\{22F28C3D-5786-43A0-B193-0EDFB44000A8}
    C:\Users\b\AppData\Local\{27F91C23-DB00-4FE0-A2B8-3152E2CC42A5}
    C:\Users\b\AppData\Local\{2A2A3AE5-1B48-4B6C-895B-FB29110C14FA}
    C:\Users\b\AppData\Local\{2A441AED-FC8D-4330-B622-180BBC7F38D6}
    C:\Users\b\AppData\Local\{324B53EF-2ED0-4136-8AF1-5B535508ED28}
    C:\Users\b\AppData\Local\{336A298A-7BDF-427E-AE71-0B081483AA0A}
    C:\Users\b\AppData\Local\{34B1E47E-8011-4FFE-8CE6-0307A6B1347E}
    C:\Users\b\AppData\Local\{3A8ACA37-BB07-402F-89B5-651DEB3689C7}
    C:\Users\b\AppData\Local\{3EF208B5-A5D1-447B-8E3C-77B21ABA30E5}
    C:\Users\b\AppData\Local\{41D8D353-C669-4A64-A8C4-483C0ABC4833}
    C:\Users\b\AppData\Local\{462B2524-6C39-4F95-9FE5-A56C5B23146B}
    C:\Users\b\AppData\Local\{48398C27-E697-4C11-892B-1946D0C84649}
    C:\Users\b\AppData\Local\{4950C6AB-F9BB-4869-B4D4-717F6ED6F2C8}
    C:\Users\b\AppData\Local\{4B221D9F-4250-4B6E-A611-095CF5E6FE70}
    C:\Users\b\AppData\Local\{4C765067-AEFB-4C08-B265-988809628176}
    C:\Users\b\AppData\Local\{4EB72674-DCEB-45A0-B028-336EF14033AD}
    C:\Users\b\AppData\Local\{4F38D478-A816-48E1-90B9-EA286EE3D18F}
    C:\Users\b\AppData\Local\{57A84CC3-7C6A-4E6D-80A0-1A154E214451}
    C:\Users\b\AppData\Local\{61EF4C7A-9A4C-4855-AA01-A2F235DC3855}
    C:\Users\b\AppData\Local\{65655D0D-8F11-4CF1-98DE-1707F06CEE8C}
    C:\Users\b\AppData\Local\{6838BDC8-3CF9-4499-9374-A09CC626E7C2}
    C:\Users\b\AppData\Local\{68ACEF2E-FA57-4439-854C-CA0665EDEB16}
    C:\Users\b\AppData\Local\{6D3969E6-D972-4878-AE05-76F63B7276E1}
    C:\Users\b\AppData\Local\{6D3A6C53-8DDE-4B69-85B7-48872D5929B0}
    C:\Users\b\AppData\Local\{6E9D98DC-65A7-43BF-8CDC-CD6391A78277}
    C:\Users\b\AppData\Local\{76C77BB1-1EE0-4859-BBB1-758F6C159DD1}
    C:\Users\b\AppData\Local\{77059ADB-FEB8-4341-BECE-183B0C2667FB}
    C:\Users\b\AppData\Local\{7DF83ED2-3A61-4E08-A5CA-6B3BC1DE933F}
    C:\Users\b\AppData\Local\{80F8328B-15A9-4BDA-AE6A-2FDC906CD0AC}
    C:\Users\b\AppData\Local\{850FD02C-77A4-4857-BAC1-69B291F150CD}
    C:\Users\b\AppData\Local\{878403AF-EDA4-4857-AEC9-E5B741BDAF4D}
    C:\Users\b\AppData\Local\{8C00F343-34B0-43C8-BBB0-E2653903A128}
    C:\Users\b\AppData\Local\{8D7AD5C1-A894-4279-B7D5-69BDF3521CDC}
    C:\Users\b\AppData\Local\{923231FC-2FA8-4C1C-839A-6E7377D7C803}
    C:\Users\b\AppData\Local\{9BD7C4E5-222D-4757-8EB1-121EA1EB1CD3}
    C:\Users\b\AppData\Local\{9BE2D07F-BB29-4684-8A74-42E39D8975AD}
    C:\Users\b\AppData\Local\{A4217569-23F7-41DC-92C8-FAA097327461}
    C:\Users\b\AppData\Local\{A73B3CAE-125A-4631-BE99-0498E93A6E24}
    C:\Users\b\AppData\Local\{AA1B0CD9-AFB5-4A3F-BCE9-9997FF857A1A}
    C:\Users\b\AppData\Local\{B3452459-4FC0-4F55-870D-D67DF822F473}
    C:\Users\b\AppData\Local\{B740D9E5-C29D-4ACC-B7E7-FD39DA93FD1D}
    C:\Users\b\AppData\Local\{B7643C7F-D282-48FC-922A-049F34A79CF9}
    C:\Users\b\AppData\Local\{BAF01770-18B1-440C-881C-BDD5BC6B6B0E}
    C:\Users\b\AppData\Local\{BB507A04-1C6F-4A34-9850-29D56AB15B8D}
    C:\Users\b\AppData\Local\{BE432377-1F55-4237-9BBA-3C167F34F68D}
    C:\Users\b\AppData\Local\{C732E63E-47EE-4B92-BCC3-FAACC1EB3EEB}
    C:\Users\b\AppData\Local\{C7B7F7EE-86BC-491F-9516-6CF8B2FBF873}
    C:\Users\b\AppData\Local\{CA65F407-7F29-4F6B-B350-812D1C3982CC}
    C:\Users\b\AppData\Local\{CB922D86-1585-44DE-ADBA-4D9397075CAB}
    C:\Users\b\AppData\Local\{D3A09732-B5E8-4358-A9E0-478AD284053C}
    C:\Users\b\AppData\Local\{D4622D03-363C-4AAC-A11C-6CEC1DCED6F8}
    C:\Users\b\AppData\Local\{D8F9BDA9-2276-49C3-B9D2-1554574392AA}
    C:\Users\b\AppData\Local\{DAB7C2EE-782F-4F51-88B8-8719851B4734}
    C:\Users\b\AppData\Local\{E30333FD-30EF-4F53-A98B-BA35BC71EB38}
    C:\Users\b\AppData\Local\{E849067A-D452-4DA9-BF8D-254F44B3FF23}
    C:\Users\b\AppData\Local\{E8D7BC2D-AD6F-4A99-AC77-69360408E1BE}
    C:\Users\b\AppData\Local\{E99E96CE-2353-4F13-BB3A-EA447FBA20AD}
    C:\Users\b\AppData\Local\{EDB3DBB5-748B-4986-B8DA-71FDC37A2223}
    C:\Users\b\AppData\Local\{F423BB21-E37C-4715-A5C8-8F6C12F186C2}
    C:\Users\b\AppData\Local\{F73AFA16-BF29-47E3-9873-41D8A74CC626}
    C:\Users\b\AppData\Local\{F81A0512-70E7-49A4-A3CC-C21EEA5DD81C}
    C:\Users\b\AppData\Local\{F8B1C8FE-0A62-4B0F-BC3A-38125980E851}
    C:\Users\b\AppData\Local\{F8E2CCE1-1F7C-4499-885D-C61D3A162253}
    C:\Users\b\AppData\Local\{FB23D79D-00DF-4BBD-A6A5-13482C2FFE01}
    
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Note: If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Go to the below link and follow the instructions for running TDSSKiller from Kaspersky

    Be sure to attach your log from TDSSKiller

    Please also download MBRCheck to your desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below log:

    • C:\MGlogs.zip
    • C:\ComboFix log
    • TDSSKiller log
    • MBRCheck log

    Make sure you tell me how things are working now!
     
  3. DigitalWarlord

    DigitalWarlord Private E-2

    Seems to be running much better. Here are the new logs.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0


    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds