Just Messed Up Everywhere :(

Discussion in 'Malware Help (A Specialist Will Reply)' started by 1jzx5000, Aug 29, 2010.

  1. 1jzx5000

    1jzx5000 Private E-2

    Hello Major Geeks. Thank God there's guys like you out there.
    I stumbled upon this site and forum approximately 3 weeks ago in what was then a desperate attempt to resolve some pretty obnoxious malware issues - Ironically enough this has been my first experience with anything of the sort in the 25+ years I have been using computers (Commodore 64/Tandy TRS-80 days - such simple days then - but fairly useless also!) Guess without them though we couldn't have gotten here.
    I had hoped (and actually believed) that my troubles were over as early on as the completion of the first two processes that you guys outline (SAS & Malwarebytes). I noticed an immediate difference even at that point - should've known better.
    My initial awareness of such trouble came from what seemed like an overnight transition - literally. One day I was working with the typical efficiency, speed and stability I've come to appreciate, and the next day soon after booting up things were going haywire. In addition to what I imagine are typical symptoms (redirection on links, pop-up surveys, etc) I noticed a significant decrease in system performance and also experienced two lock-ups which resulted in my having to proceed with manual shut-downs. Additionally, all prior System Restore points had been wiped out. Again, I did not bother to post for help at that time as it seemed like things were going pretty smoothly after just two scans, considering the resulting malware that had been removed. Foolishly enough, I had not bothered to think it strange, even though I never actually was able to successfully run MGtools at the end. I decided that it was just simply a fluke between the software and my system. What seemed like sufficiently restored performance along with denial and the desire to just move on and put it in the past were prime motivators for me to leave you guys alone.
    Well, here I am. This time I was able to complete all of the steps required as I decided to be extremely thorough. Additionally, I am submitting two RootRepeal logs as the first alerted me of its inability to read the boot sector on one particular drive, and required my going back to adjust the disk access level before executing a rerun. As of this moment I have once again regained what seems like a reasonable state of stability, but my fears are of what might actually still be lurking in my system. My system froze up at least a dozen times today. RootRepeal has identified what it believes to be an MBR Rootkit on my external WD Passport (HDD). Also, I have noticed in great length other little problems all over the place. For example, NO MATTER WHAT I HAVE TRIED (having researched and experimented at great length), msconfig continues to spit out the same message whenever I go near it - "An Access Denied error was returned while attempting to change a service. You may need to log on using an Administrator account to make the specified changes." Needless to say, I am the owner, the Administrator, and everything thereafter. Fortunately, as far as msconfig is concerned, even though I continue to receive these access denied errors , I am not actually denied access - it seems to allow the changes. It would be really nice however to figure out what the heck is going on. Every single search I've done on the matter results in its association with malware or corrupt files or the both. As of now I have executed every recommended procedure for the fix with no success. I am hoping to avoid a CD repair of the OS (if at all possible). Furthermore, it seems that in order to gain access or control over certain files I have to actually go in and 'add' myself as a user who has those permissions. On one final note, an inspection of the Event Viewer (local) in Component Services has revealed a huge list of errors and warnings, most of which I wouldn't even know where to begin as far as fixing is concerned. I can only imagine what else.
    Well, I'll be waiting patiently for your prognosis (with fingers crossed). Thanks again for just being there and doing what you guys do. Hopefully I've been as thorough as possible. I will be sure not to attempt any further changes until I hear from you guys - Thanks. (WILL POST REMAINING TWO LOGS IMMEDIATELY FOLLOWING THREAD SUBMISSION)
     

    Attached Files:

  2. 1jzx5000

    1jzx5000 Private E-2

    additional logs
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there and welcome. I am currently reviewing your logs and will get back to you with a set of instructions in the next post I make to you.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Go to TDSSKiller and Download TDSSKiller.zip to your Desktop

    • Extract its contents to your Desktop so that you have TDSSKiller.exe directly on your Desktop and not in any subfolder of the Desktop.
    • Now double click the TDSSkiller.exe file to run it ( if using Vista or Windows 7 do not double click on it but rather, right click and select Run As Administrartor.
    • Allow the application to run and a window will open showing that it is TDSSkiller from Kaspersky
    • Click Start scan
    • It will run rather quickly and will notify you of whether anything is found or not.
    • Follow the instructions to delete/quarantine if asks you what to do when if finds something.
    Whether an infection is found or not, a log file should be created on your C: drive ( or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run. Please attach this log to your next reply. (See: HOW TO: Attach Items To Your Post )


    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread


    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    After clicking Fix exit HJT.


    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Folder::
    C:\Documents and Settings\Jamie\Local Settings\Application Data\koioiubsr
    C:\Documents and Settings\Jamie\Local Settings\Application Data\mmopirypi
    C:\Documents and Settings\Jamie\Local Settings\Application Data\tncoicaao
    
    DirLook::
    c:\program files\SearchPredict
    c:\program files\Regedit
    c:\documents and settings\Jamie\Application Data\Toolbar4
    
    Registry::
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{074C1DC5-9320-4A9A-947D-C042949C6216}]
    
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Run Rootrepeal again and attach the log it creates.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this, also attach logs from both TDSSKiller and MBRCheck.exe also rootrepeal.

    Let me know how things are running, please.
     
  5. 1jzx5000

    1jzx5000 Private E-2

    Hello Kestrel13!

    Thank you for such a quick response. I am attaching everything you've requested.

    Please note that at the end of the MBRCheck I was given options to Dump MBR to file, Restore MBR to standard boot code, or Exit. I chose to Exit without any action as that seemed to be closest thing to the intructions you gave me (those specific options were not addressed).

    Okay - As with the original thread I will submit two posts here to include the 5 total logs requested.

    Again Kestrel13!, thank you so much - I will keep a watch for your next post.
     

    Attached Files:

  6. 1jzx5000

    1jzx5000 Private E-2

    AND LAST BUT NOT LEAST - MGlogs.zip
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    We may need to do something else but in the meantime let me know how things are running now?
     
  8. 1jzx5000

    1jzx5000 Private E-2

    Hello Again - For the most part everything seems pretty stable as of right now. Definitely a significant difference from how it was running before!

    One thing Kestrel, I woke this morning to what I guess is known as the infamous BSOD?? The Blue Screen Of Death. I had the dump analyzed using a program called WhoCrashed and have attached it here for the heck of it.

    Is this just irony that this has happened now or do you think that this could've somehow been related to the malware issue?

    Also, do you have a recommendation for whatever was reported by MBRCheck regarding non-standard or infected MBR? I know there was an option for dump to file or restore with standard boot code.

    Since the restart after the crash I double checked all USB controllers and everything seems (at least to me) to be in order. No conflicts are reported. I've been working on the system all day and no major problems so far, thankfully. Okay Kestrel - Let me know. Thank you again.
     

    Attached Files:

  9. 1jzx5000

    1jzx5000 Private E-2

    I sent a reply Kestrel but it said it was being submitted to moderators for approval???
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes, I approved your thread. So it shows now. Bear with me because I have to ask Chaslang something before we continue. :)
    Thanks for understanding.
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do you have all important data backed up? You really should do this before continuing since we will need to rewrite your MBR to fix this and while most times this can be done without any problem, these infections can react badly and that could result in a PC not being bootable. You really don't have much choice though since these infections are too dangerous to your security to leave on a PC.

    Also note if you have a Dell PC which uses a non-standard MBR ( or another manufacturer's who does similar to Dell) , fixing the mbr may prevent access the the Dell Restore Utility, which allows you to press a key on startup and revert your computer to a factory delivered state. There are a couple of known fixes for said condition, though the methods are somewhat advanced. If you are unwilling to take such a risk, you should not continue but you risk serious problems leaving this infection in place and thus your only other option would be to try using the Dell Restore Utility to return a factory ship state which will remove everything you additional you have put onto the PC.



    Now if you wish to continue and fix the malware - please do the following:
    • Run MBRCheck.exe
    • Wait until you see the following lines:
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
      • Options:
        [1] Dump the MBR of a physical disk to file.
        [2] Restore the MBR of a physical disk with a standard boot code.
        [3] Exit.
        Enter your choice:
    • Please push the 'Y' key and then press Enter
    • When the program asks you to Enter your choice: enter 2 to Rstore the MBR and press the Enter key
    • Now the program will ask you to "Enter the physical disk number to fix (0-99, -1 to cancel):"
      • Enter 0 and press the Enter key.
    • The program will show Available MBR codes as below
    • You need to select your version of Windows frrom the list. For example, enter 0 or 1 for XP or enter 3 for Vista.....etc. and then press Enter.
    • The program will prompt for confirmation. Type 'YES' and hit Enter.
    • Left click on the title bar (where program name and path is written). From menu chose Edit -> Select All
    • You will see all the text in the window get highlighted.
    • Hit the Enter key on your keyboard to copy all of the text into the clipboard.
    • Paste that text into Notepad, save it to your desktop as MBRfix.txt
    • Restart your PC.
    • Attach the MBRfix.txt file to your next message..
    Also tell me how things are working.

    Now re-run MBRCheck.exe like so:

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread
    • and let's see what it reports now.
    Run RootRepeal too again if you like. Attach all of the requested logs from each program that you ran.
     
  12. 1jzx5000

    1jzx5000 Private E-2

    I hear you Kestrel. I just want to make sure we're on the same page here. First off, I do have a Dell, but there is no option any longer on the system to go back to factory settings. I wiped that out about 3 years ago as I got tired of having to do multiple factory resets due to the computer having serious troubles right out of the box. At that time Dell was not helping me solve the problem at all. Ulimately, they went ahead and sent me a new computer, which still proved to be useless as they loaded it once again with the same garbage. Long story short - it was a gift from my mother who wanted to surprise me. She knows very little about computers, so she called Dell and in turn got taken advantage of by the sales rep, who sold her everything but the kitchen sink and stuffed it into the computer. As I said, major conflicts right out of the box and crashes within the first week that I had it - doing factory resets sometimes 2x per week. They weren't being very helpful but I finally convinced them to send me the actual Win XP Disk (as if they shouldn't send those automatically), from which I proceeded to do everything from scratch myself. I learned a huge amount in the process, and my computer has run perfectly ever since, that is up until now. Shame on me however for relying solely upon System Restore and not having done more formal backing up. After this I'll be doing clones from now on.
    NOW, regarding the MBR. If I'm not mistaken Kestrel it seems that MBRCheck is showing my C: drive to be okay? (Windows XP MBR code detected):

    Size Device Name MBR Status
    --------------------------------------------
    91 GB \\.\PhysicalDrive0 Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A
    465 GB \\.\PhysicalDrive2 RE: Unknown MBR code
    SHA1: CE7DBBBEE43059700485C7835F4E1ED6D2FADB1C

    The 500GB drive I have (PhysicalDrve2) is a portable pocket sized external which I MAINLY use for media storage, plus some file backup. I don't get the MBR code issue because this drive in no way has anything bootable on it. I guess that's where there's some confusion? Or am I missing something otherwise? I do have an extensive amount of data on the drive which I would prefer not to lose, and I have a 250GB external drive on its way (should be here any day) for that purpose. So I'm thinking at this point that MBRCheck is actually referring to this external which never actually had a boot record on it (meaning what is it actually seeing after all)? Also, I had a MAC that I was sharing this drive with (found a program that allows MAC to read/write NTSF) and was constantly switching back and forth - could that be related to this perhaps? Like, stuff that the MAC had written to the drive? Anyway, just wanted to clarify all this before proceeding. If my C: drive is okay then I can pretty much happily deal with whatever else - that's the ONLY drive I boot from. If however the suggestion is being made that this potentially risky MBR restore needs to be done on that drive also, then I think it might be a good idea to do that backup first. Thank you very much for the tremendous help you've been so far. Let me know if I should proceed in the same way you requested after reviewing this reply - Jamie
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Let's do this:

    For the external Hard Drive and a USB stick.

    Insert your flash drive before we begin. Hold down the Shift key when inserting the flash drive until Windows detects it to bypass the autorun feature. This will keep the autorun.inf from executing automatically.

    Please have all your removable storage devices ready for disinfection.

    Download Flash Disinfector by sUBs and save it to your desktop.

    • Double-click Flash_Disinfector.exe to run it.
    • Your desktop and icons may disappear. This is normal.
    • It will do a cleanup of removable storage devices, and write a protected Autorun.inf file to help prevent re-infection.
    • Follow any prompts that may appear.
    • The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone. Please do so and allow the utility to clean up those drives as well.
    • Wait until it has finished scanning and then exit the program.
    • There will be no GUI interface or log file produced.
    • Reboot your computer when done.

    Note: Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive plugged in when you ran it. Don't delete this folder. It will help protect your drives from future infection.

    Then:

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some data on it
    • Right click on the screen and select > Select All
    • Press Control+C
    • Open a notepad and press Control+V
    • now please ATTACH that report to this thread
     
  14. 1jzx5000

    1jzx5000 Private E-2

    Ok Kestrel - I did exactly as you requested. Attached is the MBRCheck log. Unfortunately we're still showing the same thing:

    On my 91GB (C:) drive (Where Win XP in installed):
    "Windows XP MBR code detected"

    On my 465GB (G:) drive (Used only for file storage and access):
    "RE: Unknown MBR code"
    I'M ASSUMING THIS IS THE DRIVE THAT IT SAYS HAS NON-STANDARD OR INFECTED MBR??

    Given the 3 options I chose to just EXIT once again as you haven't given me any instruction otherwise.

    Thank you Kestrel - Let me know - Jamie
     

    Attached Files:

  15. 1jzx5000

    1jzx5000 Private E-2

    Sorry - Didn't know the colon after drive letters would turn into a smiley face.
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Some external drives do not have a MBR. What issues are you currently having?
     
  17. 1jzx5000

    1jzx5000 Private E-2

    Well I guess I was hoping you could tell me Tim. Just been following along here with the instructions I've been given so far and overall I have to say so far so good. So here's EXACTLY where I'm at:

    Scan back a couple posts and I think it's pretty clearly laid out. I have 2 drives. The internal one in the computer itself (a Dell Inspiron E1405 laptop) is the ONLY one that I'm aware of that should have any sort of MBR on it, period. The other drive is a 500GB USB2 ultra portable Western Digital "passport" external hard drive, WHICH, straight out of the box I COMPLETELY formatted (NTFS) with one single huge partition for one purpose - to hold a ton of files (mostly media for that matter). So now, MBRCheck states this:

    Size Device Name MBR Status
    --------------------------------------------
    91 GB \\.\PhysicalDrive0 Windows XP MBR code detected
    SHA1: DA38B874B7713D1B51CBC449F4EF809B0DEC644A
    465 GB \\.\PhysicalDrive2 RE: Unknown MBR code
    SHA1: CE7DBBBEE43059700485C7835F4E1ED6D2FADB1C


    Found non-standard or infected MBR.
    Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    Options:
    [1] Dump the MBR of a physical disk to file.
    [2] Restore the MBR of a physical disk with a standard boot code.
    [3] Exit.

    Enter your choice: 3

    Done!

    SOOOOO -Any reason for concern here?? Non-standard or infected MBR on my external?? As far as I know there shouldn't be an MBR on that drive at all as I never intended on making it a bootable drive (or is that just automatic after formatting NTFS?), so I'm a little confused there.

    System performance and overall stability have improved by about 95% (from what I can SEE, that is). DO YOU HAVE ANY RECOMMENDATIONS FOR WHAT CLEARLY SEEMS TO ME TO BE THE RESIDUE FROM THIS ATTACK? (OTHER THAN THE COUNTLESS HOURS ALREADY SPENT RESEARCHING AND EXECUTING MULTITUDES OF SUGGESTED SOLUTIONS WITH ZERO SUCCESS) For example:
    -error message from msconfig telling me access denied, to log in as ADMIN when (silly me) I thought I already was! At what point did I become a guest on my own system?
    -The infamous BSOD as of yesterday morning. Hey, there's a first time for everything, right?

    I don't know, my brain is fried right now.
    I VERY MUCH WANTED TO BE A COMPUTER GENIUS AT ONE TIME AND I JUST CAN'T KEEP UP WITH IT ANYMORE. BEFORE THIS MY COMPUTER WAS LITERALLY PERFECT FOR ALMOST 3 SOLID YEARS. I'VE LEARNED ENOUGH TO HANDLE MY OWN WHICH I'VE DONE QUITE NICELY UP TO THIS IRRITATING MOMENT IN TIME. THIS MARKS A PERIOD HENCEFORTH FROM WHICH I WILL ALWAYS MAINTAIN A CLONE OF THAT PERFECT CONDITION - THIS I WILL ULTIMATELY ACHIEVE ONE WAY OR ANOTHER ONCE AGAIN. THERE IS NO DELL FACTORY RESET ON THIS SYSTEM ANYMORE - THE FACTORY SETTINGS TOTALLY SUCKED, FORCING ME TO FIGURE IT ALL OUT ON MY OWN. BY THE TIME I WAS DONE I HAD IT RUNNING TEN TIMES BETTER THAN THE OVERWEIGHT, BLOATED BOX OF RUBBISH THAT WAS SENT TO ME BY DELL. STILL, SHOULD'VE HAD A GOOD CLONE AND INSTEAD FELT LIKE SYSTEM RESTORE WAS GOOD ENOUGH. FOOLISH OF ME NOT TO HAVE KNOWN BETTER.

    BY THE WAY - THANK YOU GUYS SINCERELY AND I MEAN THAT!! I COULD BE A LOT WORSE OFF IF IT WEREN'T FOR YOUR VOLUNTARY SERVICES.

    Anything else you guys see in any logs I've submitted to you that should cause any concern?
     
  18. 1jzx5000

    1jzx5000 Private E-2

    Okay guys - this seems pretty harmless to me. Dumped the MBR of external to file (attached).

    It appears that the thing is just looking for an OS that isn't there, which tells me that this "non-standard or infected" MBR has probably been sitting there since the day I formatted it NTFS.

    Any other takes? Seems like we're looking pretty good?
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Sorry for any confusion I caused you.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  20. 1jzx5000

    1jzx5000 Private E-2

    Thank you again Kestrel13! and Tim
     
  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Most welcome. Safe surfing!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds