It claimed I was infected - it lied

Discussion in 'Malware Help (A Specialist Will Reply)' started by apolodorus, Mar 28, 2011.

  1. apolodorus

    apolodorus Private E-2

    HI -

    There I was browsing happily along when a series of pop-ups informed me that I was infected. Naturally I panicked and started frantically trying to close these (unclosable) windows. In the course of doing that I'm pretty sure I clicked on the wrong button and told the thing "sure, go ahead, wreck my computer". So I closed the computer down by the button method, started it again, and proceeded to apply Geekish methods to clean whatever it was. I enclose the resulting logs, and will greatly value your analysis.

    By the way, I'm using Windows 7 firewall combined with Online Armor with the firewall disabled - this strange arrangement is because the OA firewall started some time ago reducing my browsing to an intolerable crawl. Any opinions on whether my rather ad hoc solution could have anything to do with the problem?

    Regards to all,

    Bob
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Does your version of online armour include antivirus?? If not then you need to install some. I see remnants of avast which we will clear up from also.

    Important Notice: A new version of SUPERAntiSpyware is available.
    • Please uninstall your current version (this is necessary).
    • Then download this SUPERAntiSpyware
    • Install this new version. It may tell you that you need to reboot to complete the installation. You must reboot at this time.
    • After the reboot, run SUPERAntiSpyware and immediately click the Check for Updates button to get more updates for the database.
    • Now run a new full scan of your system. And attach this log later.

    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    DirLook::
    c:\users\Robert\AppData\Local\{A6D4DEFC-9DE4-47D9-BBC9-6607958D9529}
    c:\users\Robert\AppData\Local\{90F78ACE-BD35-4A2E-B80B-7AE15E023567}
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
    Last edited: Mar 28, 2011
  3. apolodorus

    apolodorus Private E-2

    Sorry about that - I should have checked the SAS version, but I forgot. I'll now follow your instructions.

    Bob
     
  4. apolodorus

    apolodorus Private E-2

    By the way, I don't know why you didn't detect Avast! - it's installed and normally is running. Could it be because I'd stopped it as instructed when running ComboFix?
     
  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let me edit the fix then...do not follow that fix until I post that it's been altered to reflect the fact that avast is still installed even though the logs tell me a different story
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK. Edited now. :) You can follow the fix.
     
  7. apolodorus

    apolodorus Private E-2

    Kestrel13!-

    I was in and out all day yesterday, and somehow I applied the original fix. I'll attach the resulting logs, but instead of a text file for the MBR Check log I've attached a 'photograph' of it in the form of a Word document. The right-click, 'Select All' thing didn't work with the displayed command prompt window. Maybe it's a Windows 7 thing - it's always worked for me in the past. I hope I haven't screwed everything up.

    Regards,

    Bob

    P.S. I see you don't like Word files. Let me know if you want me to copy out the data in the Word file and send it to you as a text file. If it's any good to you it consists of: (a) motherboard info; (b) a logical drives mask of hex 7d; (c) three physical drive offsets; and (d) a very long MBR code.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run MBR Check and you can show me the results in a screenshot.

    You forgot to attach the NEW C:\MGlogs.zip into your reply.
     
  9. apolodorus

    apolodorus Private E-2

    Kestrel13!-

    Sorry for the delay - I had to do some travelling before I could continue with the really serious business. I've attached MGLogs text file, but how should I get you the screen shot? I always save them in Word, and your system won't accept the resulting .doc file. I must be missing something obvious.

    Bob
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I just ran MBRCheck myself and I found a log directly on the desktop. Have you not got one after running it? :confused
     
  11. apolodorus

    apolodorus Private E-2

    I'm pretty sure I'm the one who's confused. I noticed a file MBRCheck_dateandtime.txt, but thought you wanted something different. I'll attach that file anyway - in fact two different ones from two different runs.

    What I was trying to do was get you the contents of the command prompt displayed at the end of the MBRCheck run - I couldn't copy it by the usual methods, so I took a screen print, pasted it into Word (my usual method), then found the your system didn't appear to accept .doc files.

    Bob
     

    Attached Files:

  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You need to save the files in notepad. Your 931 GB \\.\PhysicalDrive2 is infected. What is that drive? Is it a partition or a slave / external drive?
     
  13. apolodorus

    apolodorus Private E-2

    It's an external USB drive
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    * Run MBRCheck.exe
    * Wait until you see the following lines:
    o Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    o Options:
    [1] Dump the MBR of a physical disk to file.
    [2] Restore the MBR of a physical disk with a standard boot code.
    [3] Exit.
    Enter your choice:

    * Please push the 'Y' key and then press Enter
    * When the program asks you to Enter your choice: enter 2 to Restore the MBR and press the Enter key
    * Now the program will ask you to "Enter the physical disk number to fix (0-99, -1 to cancel):"
    o Enter 2 and press the Enter key.
    * The program will show Available MBR codes as below

    * You need to select your version of Windows from the list. For example, enter 0 or 1 for XP or enter 3 for Vista.....etc. and then press Enter.
    * The program will prompt for confirmation. Type 'YES' and hit Enter.
    * Left click on the title bar (where program name and path is written). From menu chose Edit -> Select All
    * You will see all the text in the window get highlighted.
    * Hit the Enter key on your keyboard to copy all of the text into the clipboard.
    * Paste that text into Notepad, save it to your desktop as MBRfix.txt
    * Restart your PC.
    * Attach the MBRfix.txt file to your next message..

    Now please re-run MBRCheck.exe and attach that log also.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This can be determined from sysinfo.txt which has the below
    Code:
      
    Description Disk drive 
    Manufacturer (Standard disk drives) 
    Model TOSHIBA USB 3.5"-HDD 
    Bytes/Sector 512 
    Media Loaded Yes 
    Media Type External hard disk media 
    Partitions 1 
    SCSI Bus Not Available 
    SCSI Logical Unit Not Available 
    SCSI Port Not Available 
    SCSI Target ID Not Available 
    Sectors/Track 63 
    Size 931.51 GB (1,000,202,273,280 bytes) 
    Total Cylinders 121,601 
    Total Sectors 1,953,520,065 
    Total Tracks 31,008,255 
    Tracks/Cylinder 255 
    Partition Disk #2, Partition #0 
    Partition Size 931.51 GB (1,000,202,241,024 bytes) 
    Partition Starting Offset 32,256 bytes 
    
     
  16. apolodorus

    apolodorus Private E-2

    Tim -

    I've always noticed that Windows has 2 versions of the command prompt - depending on how you get it up. I think that was probably the reason for my confusion. Will explain further if anyone's interested.

    By the way, I kept the 2 earlier screen print versions of the display I'm attaching, and you might be interested that the first one didn't have the 'MBR Code Faked!' line that the next 2 - including the attached one - had.

    Bob
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Thanks Chaslang, but all I have looked at in this thread is his latest MBRCheck log. Just giving Kes a hand until she returns to this thread.
     
  18. apolodorus

    apolodorus Private E-2

    Knew I'd find it eventually!
     

    Attached Files:

  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Do you have your Win7 disc, as we may need to go into the Recovery Environment to fix this?
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First I would ask what malware problems (if any) are currently being experienced?
     
  21. apolodorus

    apolodorus Private E-2

    I don't think there are any malware problems at the moment.

    I think I could find the W7 disk given a bit of time.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I don't think it is necessary. I think it is just a case of MBRcheck not understanding the MBR structure for your external Toshiba drive
     
  23. apolodorus

    apolodorus Private E-2

    What do you think I should do now? Can I for example reverse whatever defogger did?
     
  24. apolodorus

    apolodorus Private E-2

    It occurs to me that the various workarounds I've had to find since we started are NOT NECESSARILY the result of defogger. For instance: Daemon has disappeared (expected); the 'back' links have stopped appearing in Firefox pages; etc. Just thought I'd mention it.
     
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  26. apolodorus

    apolodorus Private E-2

    Thanks for your patience. I can't tell you how reassuring it is to have a resource like MajorGeeks support available, and to know that no matter how long it takes, you guys will sort it out every time. Thanks again for all your trouble!
     
  27. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    On behalf of us all, you are most welcome. Safe surfing. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds