Malware after kids had computer

Discussion in 'Malware Help (A Specialist Will Reply)' started by Gene2308, Jul 30, 2012.

  1. Gene2308

    Gene2308 Private E-2

    Hello,

    I'm having crazy pop-up problems and the tools I ran (from here) show trojans and stuff. Any help for ridding myself of these?

    Thanks guys!!
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img827.imageshack.us/img827/1263/frst.gif For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  3. Gene2308

    Gene2308 Private E-2

    Okay, I think I got it --

    Thank you!
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -----------------------------

    • Now run FRST again like you did the first time, no fix just a scan and attach the log.
    • Re run RogueKiller - no fix, just s scan and attach that log too please.
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     

    Attached Files:

  5. Gene2308

    Gene2308 Private E-2

  6. Gene2308

    Gene2308 Private E-2

    Oh, and computer seems faster already -- no pop ups yet! :)
     
  7. Gene2308

    Gene2308 Private E-2

    Note - no pop-ups yet, but I keep getting that yellow bar on the bottom of the screen that says "show all content" -- "what's the risk"? kind of thing that I think is associated with windows 7. I don't recall this happening before....

    Thanks,
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 1 detection:
    • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Gene and Beth\AppData\Local\{0897f896-86fd-6c5d-3f02-05be245cec4c}\n.) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.

    Now run FRST again like I asked you to before. No fix just a scan and attach the log.
    Run RogueKiller again - no fix! Just a scan - attach log.
    Now run C:\MGTools.exe and THEN you will have a new C:\MGlogs.zip to attach for me. ;)
     
  9. Gene2308

    Gene2308 Private E-2

    Okay, I got these done just a minute ago --

    But the Mglogs.zip thing never saved anywhere....? I don't know why this happened, but I did notice that the zeroaccess thing was there again on the roguekiller log. Is it masking my Mglogs.zip?

    Thanks for your help!
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.
    ----------------------------------------------
    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 8 detections:
    • [BLACKLIST DLL] HKCU\[...]\Run : dvepac ("C:\Windows\System32\rundll32.exe" "C:\Users\Gene and Beth\AppData\Roaming\dvepac.dll",HasAttrString) -> FOUND
    • [BLACKLIST DLL] HKCU\[...]\Run : uines (rundll32.exe "C:\Users\Gene and Beth\AppData\Roaming\uines.dll",HrFindInetTimeZone) -> FOUND
    • [BLACKLIST DLL] HKLM\[...]\Run : uines (rundll32.exe "C:\Users\Gene and Beth\AppData\Roaming\uines.dll",HrFindInetTimeZone) -> FOUND
    • [BLACKLIST DLL] HKLM\[...]\Run : dvepac (rundll32.exe "C:\Users\Gene and Beth\AppData\Roaming\dvepac.dll",HasAttrString) -> FOUND
    • [SUSP PATH] HKUS\S-1-5-21-3873084420-705770580-899885779-1001[...]\Run : SUPERAntiSpyware (C:\Users\Gene and Beth\Desktop\SUPERAntiSpyware.exe) -> FOUND
    • [BLACKLIST DLL] HKUS\S-1-5-21-3873084420-705770580-899885779-1001[...]\Run : dvepac ("C:\Windows\System32\rundll32.exe" "C:\Users\Gene and Beth\AppData\Roaming\dvepac.dll",HasAttrString) -> FOUND
    • [BLACKLIST DLL] HKUS\S-1-5-21-3873084420-705770580-899885779-1001[...]\Run : uines (rundll32.exe "C:\Users\Gene and Beth\AppData\Roaming\uines.dll",HrFindInetTimeZone) -> FOUND
    • [ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Gene and Beth\AppData\Local\{0897f896-86fd-6c5d-3f02-05be245cec4c}\n.) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    --------------------------------------------------

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.

    ------------------------------------------
    • Now run RogueKiller again, no fix just a scan and attach the log
    • Rerun FRST no fix just a scan and attach the log.
    • You will have to re run MGTools.exe in order to get a MGlogs.zip.
     

    Attached Files:

  11. Gene2308

    Gene2308 Private E-2

    First logs
     

    Attached Files:

  12. Gene2308

    Gene2308 Private E-2

    Again - thank you for all of this help! :)
     

    Attached Files:

  13. Gene2308

    Gene2308 Private E-2

    Whoops, forgot that 2nd to last log from the H-drive after the scan
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Describe to me how things are running please. :)
     
  15. Gene2308

    Gene2308 Private E-2

    Oh, well....so far okay. When I ran one of those tests it picked up some stuff....I'm referring to the new one you had me dl and run earlier this evening.

    When I ran roguekiller I got a weird pop-up to some blog for rogue killer it looked like. Actually, that pop-up happened every time I ran rogue killer.

    I was getting pop-ups from that "zero" thingy while trying to run some of the tests.

    From just surfing, I'm getting occasoinal netflix pop-ups, but nothing else yet. Is there a way I can tell if things are messed up?

    Thanks,
     
  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Which one exactly?

    Normal.

    But you are not getting that happening now? And what "zero" thingy do you mean? Do you mean that at the time you were still being warned of a zero access infection? :confused Let me know.
     
  17. Gene2308

    Gene2308 Private E-2

    Okay, things seem pretty good again! I haven't had pop-ups on anything other than weather channel website, but they always drown you with those.

    Should I dl some kind of free antivirus program?

    Thank you VERY MUCH for your time and effort in helping me!! :)
     
  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Consider a pop up blocker for your browser. ;)
    Yes! You should install antivirus. I use Avast Free edition personally and have done for years.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  19. Gene2308

    Gene2308 Private E-2

    Hey, one final thingy:

    I noticed that I have some folders (pictures) that say "access denied" when I try to open them. I will not have any kids or anyone else other than me on this computer (last family visit was rare), so how can I rig it to allow me to do everything? I assume that this happened due to running something as "administrator" or something...?

    I tried r-clicking and opening the "security" tab, but I couldn't figure out how to change things. Also, I'd rather just have permission for EVERYTHING rather than having to do this for each file.

    Thanks! :)
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    This is normal for the operating system you have - it's the same for me ;)
     
  21. Gene2308

    Gene2308 Private E-2

    crap - I thought things were fine, but the new avast anti-virus that I dl the other day says it found malware.

    What should I do?

    Thank you again --
     
  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You need to tell me WHERE exactly it found malware (File path) and what malware it was (what was the file/folder it pointed to) Just saying it found malware is no good to me. :) You see it could be finding something we have already removed. Something that is in quarantine.
     
  23. Gene2308

    Gene2308 Private E-2

    Okay, I'll get on there once I get home today and try to paste the file information. Thank you!
     
  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds