Intractable Google redirector trojan

Discussion in 'Malware Help (A Specialist Will Reply)' started by TyphoidMary, Dec 28, 2009.

  1. TyphoidMary

    TyphoidMary Private E-2

    Both IE & firefox google search result links redirect to ad sites when clicked.
    Entries into address bar sometimes result in an additional tab opened to adsite hxxp:http://www.thewebsitesurvey.com.
    Infection occured less than 2 days ago I believe.

    Spent many hours reading various forums and trying to resolve this on my own.
    I know I should have started here instead of trying these things on my own but i include these earlier self-help attempts for additional information.

    1) anti-malware program first detected/removed both trojan.dropper & trojan.agent.

    2) trojan.dropper removed a second time rerunning same prog.

    3) Same prog rerun later detected/removed olmarik.sd

    4) Super Anti-spyware detect/remove Trojan Downloader-SVCHost/Fake seemed to coincide with malicious redirects "your pc protector".

    5) Gmer warned of a "suspicious modification" to atapi.sys, so I tried TDSSKiller by Kaspersky as suggested on various forums.
    This almost bricked my computer, seems like windows couldn't find atapi.sys on reboot. I am dumber than a sack of hammers.
    In the boot menu I chose to attempt booting from last known good config. Which might have just reinfected some things.
    This motivated me to register here and follow suggested steps exactly from this point.

    6) As part of the required logs for this post, rootrepeal found some rootkit labled with a chinese character. (see attached log)

    7) I still have the problem after running everything required for these logs.
     

    Attached Files:

    Last edited: Dec 28, 2009
  2. TyphoidMary

    TyphoidMary Private E-2

    5th attachment for MGlogs.zip
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please do the below while I look thru all of your other logs.

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop
    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Click Start > Run and copy/paste the following bold command into Run box and hit Enter.
    "%userprofile%\Desktop\TDSSKiller.exe" -v
    • Follow the instructions to type in "delete" when it asks you what to do when if finds something.
    • When done, a log file should be created on your C: drive named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmmmm! Apparently you also run TDSSkiller too before posting as I see it added a fix to your computer. That should have fixed your rootkit prooblem when it correctly the atapi.sys rootkit.

    Are you sure you are still being hijacked after a reboot? You do have a couple other things to do but I want to know your real status first.


    You should however start on the below now.

    I strongly advise you to cleanup your Desktop. Remove eveything but links to run programs. Do not download and save programs here and defintely do not use it for long term storage. You need to keep ComboFix.exe here for now as we need it, but we will be removing it when we are finished with your cleanup. A cluttered Desktop is malware's playground and it can also cause performance degradation especially when you start saving large files here like you are doing.


    Also please attach the below first logs from SAS and MBAM as they are the ones we needed
    Code:
    "C:\Users\mike\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\Logs\"
    Dec 28 2009        1940  "SUPERAntiSpyware Scan Log - 12-28-2009 - 08-34-53.log"
     
    "C:\Users\mike\AppData\Roaming\Malwarebytes\Malwarebytes' Anti-Malware\Logs\"
    Dec 28 2009        1210  "mbam-log-2009-12-28 (06-58-21).txt"
    Dec 28 2009        1049  "mbam-log-2009-12-28 (08-17-40).txt"
     
  5. TyphoidMary

    TyphoidMary Private E-2

    Yes I ran TDDSkiller before my post.
    It removed the infected atapi.sys, but never put in a good one to replace it! Leaving my computer unbootable.
    My laptop never came with an OS disc (I think this is fairly common), so I couldn't do a repair to fix this file.

    The only way I could recover was by chosing to recover from last known good state from the F8 advanced boot menu, which probably just reinfected things but at least I could boot again.

    I have just found a vista repair disc online and will burn it and give it a try now: http://www.howtogeek.com/howto/wind...ndows-vista-repair-disk-if-you-dont-have-one/

    This will let me run TDDSkiller again. If this works, I will then follow your instructions from there.

    I think my fundamental problem is atapi.sys perpetually reinstalling itself and downloading lots of trojans, hopefully fixed soon
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    TDSSkiller does not delete the atapi.sys file. It rehooks into a new file that it creates. It was previosly called tsk_atapi.sys and now there is a file named atapi.tsk. As long as you do not delete the tsk_atapi.sys or atapi.tsk files before fixing the registry keys that are pointing to them rather than the atapi.sys file, the PC would still be bootable. It is possible that something else may have deleted the atapi.sys file or the tsk_atapi.sys file.

    If your PC is bootable right now, we could use a different fix with ComboFix to just replace the infected atapi.sys file with a clean one and avoid running TDSSkiller. I was just confused by your logs which seem to show everything was fixed.
     
  7. TyphoidMary

    TyphoidMary Private E-2

    I have now run TDSSkiller twice, and am rather certain that it is this program that results in atapi.sys not being found on the reboot that is part of this program.

    Both times, when rebooting as the program requires, windows says it cannot start because of a missing atapi.sys file. I was able to reboot fine until running TDSSkiller, and recovered each time by selecting revert to last known good configuration with F8 advanced boot option. (These runs of TDSSkiller were a day apart, with lots of successful reboots in between after recovery)

    It can't be something else I am doing, because it reboots fine until I run TDSSkiller.

    If you have a way of replacing atapi.sys with a known good version using combofix, could you set me up for that?

    I'm not having luck burning a windows vista repair disc, my CD drive just burns frisbees it seems.

    I can't pretend to know what I'm doing, but it sure seems like getting a good atapi.sys in there is the core problem.

    (and how can I be sure the clean one I am replacing the bad one with is really clean? Maybe there isn't a clean one on my system to replace it with, so where do I get one?)
     
  8. TyphoidMary

    TyphoidMary Private E-2

    I'm giving up on burning a recovery disk with this laptop.
    Hoping I can replace atapi.sys without it.

    The logs I posted were from the runs I did for this posting.
    I don't have any logs of prior runs, I searched for them.
    I can create new logs as needed.

    GMER log sure looks interesting

    GMER 1.0.15.15281 - http://www.gmer.net
    Rootkit quick scan 2009-12-30 07:12:52
    Windows 6.0.6002 Service Pack 2
    Running: gmer.exe; Driver: C:\Users\mike\AppData\Local\Temp\fxldapoc.sys


    ---- Devices - GMER 1.0.15 ----

    AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)

    Device -> \Driver\atapi \Device\Harddisk0\DR0 861CB841

    ---- Files - GMER 1.0.15 ----

    File C:\Windows\system32\drivers\atapi.sys suspicious modification

    ---- EOF - GMER 1.0.15 ----
     
  9. TyphoidMary

    TyphoidMary Private E-2

     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Hmmm? Possibly a new version of the infection is out.

    Please download and run the latest version of MGtools then attach the new MGlogs.zip file. I want to see if the registry key for loading atapi.sys has been modified. Do not run TDSSkiller anymore unless I specifically request.
     
  11. TyphoidMary

    TyphoidMary Private E-2

    oh brother.

    I was running drweb when you posted, it's still going.

    How does this find so much others miss? A backdoor.tdss.565 process.

    My combofix was even infected, with BATCH.virus!

    And the MGtools you told me to run? Infected as well. With Tool.Prockill

    What a crazy trojan.

    I'll attempt to run mgtools later today, when this scan ends and I get a clean mgtools.
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It actually has a lot of false detections including the detection of ComboFix and the process.exe file used by MGtools and many other programs. In reality, dr.web just has lots of problems that need to be ignored.;)

    Just download the current version of MGtools which I just updated again about two minutes ago. And run it and attach the new log.

    The first Important notes in the READ & RUN ME said the below and you are ignoring this
     
  13. TyphoidMary

    TyphoidMary Private E-2

    Whoops! My bad.
    Was this a false alarm too?
    Process in memory C:\Windows\system32\svchost.exe:724 BackDoor.Tdss.565

    I'm going to kill off drweb and try a fresh download of mgtools now
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not necessarily. svchost.exe itself is valid but the infection may have hooked into svchost.exe which is quite common. If you deleted this svchost.exe file, Windows would no longer run.
     
  15. TyphoidMary

    TyphoidMary Private E-2

    OK attached is the mgtool log.

    Doubt this info is helpful, but usually when I quit firefox the CPU goes to 100% on one processor indefinitely until I kill firefox.exe manually with task manager.
    I haven't heard this problem reported elsewhere with firefox 3.6 beta 5. Well my problem ocurs with both IE and firefox so guess not related
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Question: Why are you running this PC without proper protection? I see no antivirus and you are relying only on the less than adequate Windows Defender for antispyware and the also poor Windows Vista firewall.

    Okay the service entry in your registry is still pointing to C:\Windows\system32\drivers\atapi.sys which is good. Let's see if we can replace the possibly infected file with another good copy that shows in your logs. Also we will fix a few other problems.



    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of
      allowing ComboFix to run properly.
    • If ComboFix tells you it has expired or need to be updated to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run Ccleaner. Only use the Run Cleaner button. Do not run anything else on any other forms.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
    Last edited: Dec 30, 2009
  17. TyphoidMary

    TyphoidMary Private E-2

    Probably a combination of ignorance and stupidity.

    I do have a good hardware router/firewall, so I don't need a software one.
    I run firefox with noscript, ghostery, adblock, which suffice to protect me from web gunk. I disabled uneeded services, filesharing, etc.
    I muddle through with a blue moon run of lavasoft ad-aware or online virus scanner.
    Believe it or not I never had major problems for many years like this.
    But one mistake with a "friend" running an infected game installer and here I am.
    The initial shorter explanation of ignorance and stupidity was probably much better.

    Anyway I'll run spywareblaster after this, and whatever else you suggest.

    I ran combofix, and had to reboot a second additional time because running anything resulted in error "illegal operation attempted on registry key that has been marked for deletion". No problem after the second reboot.

    I also include the mbtool&combofix log here.

    I read through so many forum postings, I don't understand why my experience with tddskiller was so different from everyone elses, resulting in the missing atapi.sys. Oh well, everything seems better now!
     

    Attached Files:

    Last edited: Dec 30, 2009
  18. TyphoidMary

    TyphoidMary Private E-2

    I ran GMER, still shows suspicious modification to atapi.sys.
    No symptoms yet, guess a false positive warning?
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please do not rename any log files. You should be posting exactly what we request. i.e., C:\MGlogs.zip and C:\combofix.txt

    Totally not correct. You still need a real bidirection software firewall for proper protection for many reasons. One example is, a hardware firewall only protects you from incoming hackers. If you get an infection on to your PC (even by plugging in an infected USB drive), your hardware firewall will allow the malware to dial home or even worse, it will allow your PC to infected other computers on the network behind the firewall.

    FireFox has more security holes than Internet Explorer and is currently one of the largest problems we have in the forum with fixing malware issues and hijacks. Even with all of those in place, you still got infected as you mentioned due to a friend installing something. This is another reason you want a real software firewall and obviously a antivirus. A hardware firewall is not going to protect you from identity theft.

    Don't know why either.

    So you are saying you are not getting search redirections now? Not sure why you are still seeing something with GMER. That is what you would expect if the infection was still in place. Are you sure you have no redirections using any browser. Try both IE and FireFox.

    Not sure if this is due to what TDSSkiller did that was causing you problems before or somehow due to the atapi.tsk file that TDSSkiller created. The file we replaced atapu.sys with was a valid file on your system which is a direct replacement for file use with Vista SP2.
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    One more thing I want you to do.

    Please download SystemLook from one of the links below and save it to your Desktop

    Download Mirror #1
    Download Mirror #2

    • Double-click SystemLook.exe to run it.
    • Copy the contents of the following codebox into the main textfield:
      Code:
      :filefind
      atapi.sys
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please attach this log to your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  21. TyphoidMary

    TyphoidMary Private E-2

    Huh?
    This contradicts the advice given by the sticky on this forum for preventing malware :

    Is the advice given in the sticky incorrect or in need of updating?
     
  22. TyphoidMary

    TyphoidMary Private E-2

    I will follow your advice about running a software firewall, thank you.

    I have included systemlook.txt
     

    Attached Files:

  23. TyphoidMary

    TyphoidMary Private E-2

    You're not going to believe this, but it's back again.
    It's redirecting google links again.

    It was running clean for a while, then just suddenly came back.
     
  24. TyphoidMary

    TyphoidMary Private E-2

    MBAM and SAS detect nothing at all.
    But I know I have the infected, redirecting atapi.sys again.
    How come MBAM and SAS can't detect a bad atapi.sys anyhow?
     
  25. TyphoidMary

    TyphoidMary Private E-2

    Several hours after my above posting, while the computer was idle for some time -
    Windows defender notifies me of these and asks me to remove them.

    Trojan:Win32/Vundo.ME
    TrojanDownloader:Win32/Fakeinit
    Trojan:Win32/Fakeplus

    I click remove.
    After doing this I am unable to start any programs successfully, they all report failure to start in module kbdsock.dll
    Then I receive a giant (bogus/malware) message about being infected with netsky, my desktop disappears, and I can't run anything.. control alt delete works, but taskmanager is disabled. I am able to shutdown.

    I boot into safe mode w/networking, message appears, but clicking ok gives me access to desktop now.

    MAB won't run, but superspyware will. It is running right now as I post this from safemode, so far detected 33 infected files. I'll post the log later if I recover from this point. By the way I encountered this exact problem before, I'm sure it's all spawned from the malware atapi.sys

    I did a scan only of HJT, has an interesting 020 entry
    020 AppInit.DLLs: C:\Windows\System32\kbdsock.dll, fevubitu.dll
    and a bunch of wacky 04's..
    i include a log here


    Guess you were right about vista's windows defender being inadequate!
     

    Attached Files:

    Last edited: Dec 31, 2009
  26. TyphoidMary

    TyphoidMary Private E-2

    1) When you last told me to run combofix, I encountered strange behavior I described in my earlier message:

    I've never read about people having to reboot the second time after running combofix, because when anything was attempted to run it gave an error message about illegal operations on registry keys scheduled for deletion.

    Maybe this is something that was missed, that was trying to write to the same nasty registry keys combofix removed?


    2) I reinstalled MBAM and ran it twice. I'm now in regular mode instead of safe mode. It found a lot of malware on the first run, reports clean on the second. Log included for first run. Also included the earlier run of SAS.

    3) updated HJT log. Looks ok to me except maybe some 04 entry with antivirusplus and los alamos that i'm not sure about. Maybe one corresponds to the spywareblaster software i just installed
    (I did not do any manual changes with HJT, the differences between this HJT log and earlier one are result of MBAM and SAS runs)

    I think I'm back to where I was before we last ran combofix
     

    Attached Files:

    Last edited: Dec 31, 2009
  27. TyphoidMary

    TyphoidMary Private E-2

    My windows update service had been disabled, I was able to set it to automatic and start it manually.

    The security center service was disabled.
    When I click properties for it, I get this error message:

    Configuration manager: the specified device instance handle does not correspond to a present device. So i can't enable it

    I looked this up on the web and they say combofix can repair this problem
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not really a contradiction but yes it is somewhat out of date. Basically it was telling you the one from Vista is better than the older version and provides some protection. However the problem is that it is just not good enough with the evolution that has occurred in malware. If you install an antivirus that has built-in antispyware protection (like Avira, Avast, or AVG), you would have more adequate protection and since the protection of Windows Defender is so limited, it would run okay along side them.


    Side note: You need to read this sticky: Don't Bump! It Only Hurts You!!!
     
  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It did not show any problems in your atapi.sys file. All MD5 codes were valid. However this does not mean that the hackers have not figured out how to keep the MD5 codes the same. Also some other file could be infected.


    That was the reason for my question back in message # 19 asking if you were sure! Which brower do the redirects occur with?
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Note: Please do not attach HijackThis logs. It is already part of MGtools and is run properly when Mgtools is run.

    Your logs from MBAM, SAS and HJT show that you have new infections. This is probably occurring because you are running without proper protection. The items shown in your logs are all new!!!! This may explain your new redirections too.

    Please run C:\MGtools\GetLogs.bat and attach the new C:\MGlogs.zip file.
     
  31. TyphoidMary

    TyphoidMary Private E-2

    Your question #19 was answered in question #18, when I said that I had no symptoms. I tested it extensively in disbelief that it was finally fixed. No redirections occured in either browser for a period of several hours. No reboot occured between no symptoms appearing and then later redirection suddenly occuring again.

    Is it really considered a bump to let you know that the problem behavior has newly returned, that the computer is newly unusable to the extent that no processes of any kind can be run, that it had to be booted into safemode and disinfected, etc...

    I appreciate your help a lot..
    I'm not trying to break any rules with my updates.
    I wouldn't have posted if I didn't think they were major developments that dramatically changed my case.

    Alright, but GMER reports a suspicious modification to atapi.sys.
     
  32. TyphoidMary

    TyphoidMary Private E-2

    1) I have not done anything new or unusual that would give me new infections. I had verified redirections were not occuring, tested extensively, went to sleep leaving my computer idle. I wake up a few hours later, comp just sitting there, and I get the windows defender message alerts that I have 3 new infections. I click to remove them, and then my computer is from point unusuable, as my messages explained. I had to reboot into safe mode to get a working computer and disinfect.

    I believe I have an existing infection, that existed before and after our attempts to fix it, which is downloading lots of additional trojans, particularly when attempts are made to remove it. Evidence to support this is that I have seen the exact same set of new trojans appear twice after attempts to clean up the original infection.

    2) You say I am not running proper protection.
    The post before yours noted that a trojan had nuked my security center, not sure if my windows defender or software firewall are still running.
    After your fix attempt, I got windows software firewall up, windows defender, and installed spywareblaster. What else should I do? You say windows defender is inadequate, which specific one would you suggest to replace with?

    3) I include mglog here. Does MGLOG include a GMER run? Because GMER shows some significant new info
     

    Attached Files:

  33. TyphoidMary

    TyphoidMary Private E-2

    I missed the time limit for editing.

    #1 should say that I verified no redirection, then hours later (as seen in message log) redirection start occuring, I run virus scan and they show clean. Then hours later I see windows defender with warning about 3 new infection, i click remove, and computer unusable from this point, boot into safe mode to disinfect.

    So situation is, both browsers redirect, then we try to disinfect, neither browser redirects for some hours, then both start redirecting, then later new trojans reported by defender and computer unusable.

    I'll make one more post when gmer finish to post that log. Looks like it's going to be a while, it said it found a rootkit and suggested a complete scan, which i'm doing now
     
  34. TyphoidMary

    TyphoidMary Private E-2

    Here's the result from GMER, attached log.
    Two lines were in red, with big warnings about the entries being a rootkit.
     

    Attached Files:

  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I was not asking you a question. I was merely pointing out the fact that in msg # 18 I asked "were you sure" because I had a feeling you were still infected.

    I do still need to know which browser the redirects occur with.

    As stated in the sticky, it does not matter why. Every post bumps your position back to the end of the work queue. If you post a few minutes later or even an hour, the impact is not too large. If you post the next day again before we answer, it could cost you 1 day minimum or possibly 2 days. If you add another additional post another day later, you would then tack on at least another day. If a person were to continually keep adding a post (and some people do) they could potentially never get an answer.

    This is explained in the sticky. In most cases the additional info can wait or if you don't care about the delay added by the bump, then add your messages, but remember the effect.

    Yes I know but the MD5 code says otherwise which is what I was pointing out. GMER and other tools like it are not perfect and sometimes have problems with false detections. At this point, we still don't know for sure if the atapi.sys file is bad or something else in the chain. It could also just be that GMER is misinterpreting due to the necessary changes that were made when TDSSkiller fixed the problems due to the infected atapi.sys driver being detected and fixed.

    You don't need to do anything other than turn your PC on or leave it running. You don't have proper protection and your PC is susceptible to getting reinfected because of this and it was. This is a prime example of why proper protection is required. We have seen brand new PCs out of the box get infected literally with 2 to 5 minutes of connecting the cable to the internet when they are not properly protected. Will this always happen....no! But when a PC like yours has already been infected, especially with malware like you have, odds are very high that your address is already known or that you have malware already installed that will look for more malware to download and install. Again this is a reason why you need a read software firewall installed since a hardware firewall does not protect you from the dial home problem I already mentioned. And neither does the Windows firewall since it is unidirectional and its protection is poorly rated.

    SpywareBlaster is a good addition but provides no active protection. You need to install are an antivirus, and antispyware, and a real firewall program. Since many new AV programs include an antispyware component, you could install one like Avira or Avast to add these two components and they should run okay without being impacted by having Windows Defender running. Then you need to install a firewall like Comodo or PC Tools (only the firewall and nothing else from their download since they sometimes come with other adders). However as stated in the READ & RUN ME, DO NOT install anything else right now other than what I ask you to install. Installing these could potentially get in the way of removal or the install could get corrupted by certain malware.

    Let's continue with some cleaning steps.


    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O4 - HKUS\S-1-5-18\..\Run: [AntiVirus Plus] "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\config\systemprofile\AppData\Roaming\AntiVirus Plus\AntiVirus Plus.70367201.dll", start 70367201 (User 'SYSTEM')
    O4 - HKUS\S-1-5-18\..\Run: [LosAlamos] rundll32.exe C:\Windows\system32\sshnas.dll,AddConsoleAliasAW (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [AntiVirus Plus] "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\config\systemprofile\AppData\Roaming\AntiVirus Plus\AntiVirus Plus.70367201.dll", start 70367201 (User 'Default user')

    After clicking Fix, exit HJT.

    Now we need to use ComboFix to remove a bunch of malware files.
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it has expired or need to be updated to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box into it:
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now it would be potentionally be very helpful if you would install Microsoft .NET Framework 3.5 Service Pack 1 since not having it installed is blocking a useful scan from MGtools from running. Also it actually block thousands of other useful programs and webpage scripts from running. If it tells you it needs to reboot to complete the installation, make sure you reboot before continuing with the below.


    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Users\mike\AppData\Local\temp\

    Now run Ccleaner. Only use the Run Cleaner button. Do not run anything else on any other forms.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )


    Now attach the below log:
    • C:\ComboFix.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
    Last edited: Jan 3, 2010
  36. TyphoidMary

    TyphoidMary Private E-2

    1) i ran everything you said to
    2) Just like our previous attempt, I saw something really unusual (to me) when combofix finished writing its log. When combofix exited, it was not possible to run any program -- an error messaging saying that registry keys were attempted to be modified that were slated for deletion. Had to reboot an extra time than I should have because of this.

    3) On reboot, unusual amount of ongoing disk activity after logging on. Possible evidence of the reinfection.

    4) I installed net framework 3.5 patch 1 just before running mglogs. It didn't prompt me to install, it prompted whether to repair or delete, I guess it was installed already but broken somehow? I clicked repair.

    4) Firefox is now still redirecting, but Internet explorer isn't. Before it was both. I'm still infected.

    5) security center is back.

    6) logs attached

    7) If the previous pattern holds, I'll get reinfected with the same set of nasty trojans in a few hours after this combofix run. The ones that require me to boot into safe mode. Seems like attempts to remove the infection awake a nasty beast that decides to download lots of malicious trojans.

    EDIT:

    oh heck i forgot to run CC cleaner before mglogs.
    I'll try that and rerun mglog
     

    Attached Files:

    Last edited: Jan 3, 2010
  37. TyphoidMary

    TyphoidMary Private E-2

    new mglog after running ccleaner

    i hope its ok if i uninstall and reinstall firefox
     

    Attached Files:

    Last edited: Jan 3, 2010
  38. TyphoidMary

    TyphoidMary Private E-2

    reinstalling firefox didn't help, still redirect in firefox.
    i don't see anything weird in hijackthis log, looks like you successfully got rid of the 3 bad lines in there.
     
  39. TyphoidMary

    TyphoidMary Private E-2

  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! While we still do not have everything fixed, we have currently gotten into better shape than seen in previous logs. To try and keep things in better this conditon, please do the below:

    Download, install, and update AntiVir Personal Edition

    Also download and install PC Tools Firewall Plus <-- make sure you uncheck the options to install Google Toolbar and Threatfire free edition. There's is no sense in installing excess baggage.

    Now run GMER again and attach a new log.

    Now I want to try and debug a problem where a log for MGtools is not showing up. Click Start, Run, and enter cmd and click OK. This will open a command prompt. In the command prompt Window enter the below black bold print commands. The purple text is only comments to help you follow what should be happening. Observe the spaces in the commands.

    cd C:\MGtools <<-- if this works, the prompt should change to C:\MGtools>
    processdll << if this runs, a list of process should scroll by and a file name procdll.txt should appear on your Desktop. I expect you may get an error. Tell me exactly what happens.

    Then no matter what happens, do the below.


    Run this Using ESET's Online Scanner


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • the log from ESET
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  41. TyphoidMary

    TyphoidMary Private E-2

    1) i installed the antivir and pctools firewall.
    2) gmer log attached
    3) i did cd into mgtools directory and typed processdll.
    It simply returned another command prompt. No error output of any kind. No normal output of any kind.
    working on the rest
     

    Attached Files:

  42. TyphoidMary

    TyphoidMary Private E-2

    1)antivir is catching many attempts to create malware svchost.exe in windows temp, perhaps 1 every 10 min

    C:\Windows\temp\kbmy.tmp\svchost.exe Is the TR/CryptZPACK.Gen Trojan
    C:\Windows\temp\ldwj.tmp\svchost.exe is the TR/CryptZPACK.Gen Trojan
    C:\Windows\temp\vtaj.tmp\svchost.exe is the TR/CryptZPACK.Gen Trojan
    (many more)

    Antivir only gives me 10 seconds to react, after this is goes to default action of "deny". Seems to just leave empty folder in windows/temp. Guess not much difference between this and action choice of "delete".

    2) ESET log attached.
    Because it seems to have quarantined mglogs process.exe i redownloaded mglogs after this ESET run

    3) mglog log attached

    4) mbam quickscan detected nothing
     

    Attached Files:

    Last edited: Jan 3, 2010
  43. TyphoidMary

    TyphoidMary Private E-2

    I found forum posts with EXACT description of problem I am seeing: C:\WINDOWS\Temp\xxxx.tmp\svchost.exe
    Trojan - TR/Crypt.ZPACK.Gen every 10 min,

    where the "xxxx" is always four random letters.

    The solution was TDDSkiller, I am a little worried about trying this again, I don't have original OS CD or any rescue/repair CD (My HP laptop never came with one!)...
    last couple times I tried TDDSKiller I had to revert to last known good config via boot F8 menu, as it reported atapi.sys could not be found making windows unbootable.

    http://forum.avira.com/wbb/index.php?page=Thread&postID=890441

    It sounds like I have one of the most advanced trojans according to this document:

    http://rootbiez.blogspot.com/2009/11/rootkit-tdl3-why-so-serious-lets-put.html

    From what they are saying, there is no chance to fix this trojan without tddskiller.

    More people with same problem, all solved with tddskiller:
    http://forum.avira.com/wbb/index.php?page=Thread&threadID=104105
    http://forum.avira.com/wbb/index.php?page=Thread&threadID=104078
    http://forum.avira.com/wbb/index.php?page=Thread&postID=890576#post890576
     
    Last edited: Jan 3, 2010
  44. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes I figured it would which is why I stated way back that you need an antivirus and firewall.;)

    We know all about what the infection is and what it does; however, infections do evolve. So either you have a newer vintage or something else on your system had become broken before coming here which may explain why you could not run TDSSkiller without having a problem.

    Yes it is one solution which is why I gave it to you in my first message. The other solution is that ComboFix can also automatically fix it in many cases and when it does not, a manual replacement of the files using ComboFix or Avenger also works. We also did this on your PC. So either the infection came back when other infections showed up or on of the other commonly infected .SYS files could also be hooked.

    You are at the point where you don't have too much of a choice. I you had your DVD and could boot to the recovery console, you could attempt to manually replace the infected files which may or may not be successful if we don't know all of the files that are infection.

    You could make a backup copy of a clean atapi.sys file in the drivers folder and just give it a different name ( like atapi.sys.bak ) and then if you run into a problem after running TDSSkiller, you could boot to safe mode with command prompt. In this mode, you could copy the backup file back to atapi.sys and then reboot. You could even try booting in this mode right now as a learning experiment to see if you can actually get it to boot in this mode. There is no familiar Windows running in this mode. Everything is done from a command prompt like in DOS days.

    The clean file to copy is the one I had you use with ComboFix earlier:
    C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_b12d8e84\atapi.sys

    And the place to copy it to as a backup would be:
    C:\Windows\System32\drivers\atapi.sys.bak

    Then from the command prompt, you would cd to the C:\Windows\System32\drivers folder and run the below copy command:

    copy C:\Windows\System32\drivers\atapi.sys.bak C:\Windows\System32\drivers\atapi.sys
     
  45. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  46. TyphoidMary

    TyphoidMary Private E-2

    i tried the esagelab tool.
    Unfortunately I ticked an additional box for a random looking string in addition to the rootkit. Which may have convinced windows that i needed to reactivate. Except it now isn't possible to reactivate, spent hours with the MS tech support trying all sorts of convoluted things to fix it. My own fault. Oh yeah it didn't wipe out the rootkit either, which is depressing when I read so many testimonials saying that the tool worked for them.

    I either have to do a repair install if I find vista disk somewhere or buy windows 7 and back up what i can.

    If I hook up an external drive is the virus is likely to propagate to that and then to any new install i hook it up to?
     
  47. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Sorry to hear of this problem. The tool sounded promising.

    I would say it is not likely since this infection is based on hooking into the running OS files. If you are just backing up your own data, you should not have any problem.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds