malware-bogus hard disk error messages

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by jlcom, Aug 30, 2012.

  1. jlcom

    jlcom Private E-2

    This problem is on a machine running Windows XP Home 32-bit. Yesterday, multiple windows began to open at startup containing bogus alerts concerning hard disk failure, etc. Another window promised a cure by buying their software.
    I found the .exe files that were re-loading the trojan at startup and deleted them. This stopped the obvious signs of the trojan, but I want to make sure of its complete deletion, so I have followed the instructions on MajorGeeks.

    Logs are attached.

    Two notes:

    1. When running the Malwarebytes self-extracting .exe file (which I had renamed to mb.exe), I get an "Access is Denied" error message. Malwarebytes will not install.

    2. Running MGTools, when I clicked on "I Accept" in the license agreement for HijackThis, I got the following error:
    An unexpected error has occurred at procedure:
    modRegistry_IniGetString(sFile=system.ini, sSection=boot, sValue=Shell)
    Error #5 - Invalid procedure call or argument.

    Thanks in advance.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Are you missing your desktop icons?

    Please use add/remove programs to uninstall:
    J2SE Runtime Environment 5.0 Update 6
    Java(TM) 6 Update 15
    Java(TM) 6 Update 2
    Java(TM) 6 Update 3

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these 3 detections:


    • [RUN][SUSP PATH] HKCU\[...]\Run : lkYxEkDfd2d5zQ (C:\Documents and Settings\All Users\Application Data\lkYxEkDfd2d5zQ.exe) -> FOUND
      [RUN][SUSP PATH] HKCU\[...]\Run : pGNNTAhZPbmQVI (C:\Documents and Settings\All Users\Application Data\pGNNTAhZPbmQVI.exe) -> FOUND
      [RUN][SUSP PATH] HKLM\[...]\Run : HFTAMiwlSWdo.exe (C:\Documents and Settings\All Users\Application Data\HFTAMiwlSWdo.exe) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-663394168-2983804326-2879074296-1006[...]\Run : lkYxEkDfd2d5zQ (C:\Documents and Settings\All Users\Application Data\lkYxEkDfd2d5zQ.exe) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-663394168-2983804326-2879074296-1006[...]\Run : pGNNTAhZPbmQVI (C:\Documents and Settings\All Users\Application Data\pGNNTAhZPbmQVI.exe) -> FOUND
      [Services][BLPATH] HKLM\[...]\ControlSet001\Services\RumorServer ("C:\Program Files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe" /RunDLL=RumorServer.dll;ServiceHost) -> FOUND
      [Services][BLPATH] HKLM\[...]\ControlSet002\Services\RumorServer ("C:\Program Files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe" /RunDLL=RumorServer.dll;ServiceHost) -> FOUND
      [Services][BLPATH] HKLM\[...]\ControlSet003\Services\RumorServer ("C:\Program Files\McAfee\Managed VirusScan\Agent\myAgtSvc.exe" /RunDLL=RumorServer.dll;ServiceHost) -> FOUND
      [HJPOL] HKCU\[...]\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableTaskMgr (0) -> FOUND
      [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
      Place a checkmark each of these items, leave the others unchecked.
      Now press the Delete button.
      When it is finished, there will be a log on your desktop called: RKreport[2].txt
      Attach RKreport[2].txt to your next message. (How to attach)
      Do not reboot your computer yet.

      Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
      Make sure that you tell me if you receive a success message about adding the above
      to the registry. If you do not get a success message, it definitely did not work.


      Download OTL to your desktop.
      Double-click OTL.exe to start the program.
      • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

      Code:
      :processes
      :killallprocesses
      :files
      C:\Documents and Settings\All Users\Application Data\lkYxEkDfd2d5zQ.exe
      C:\Documents and Settings\All Users\Application Data\pGNNTAhZPbmQVI.exe
      C:\Documents and Settings\All Users\Application Data\HFTAMiwlSWdo.exe
      :commands
      [PURITY]
      [EMPTYTEMP]
      [RESETHOSTS]
      [REBOOT]
      
      
      • Then click the Run Fix button at the top.
      • Click the OK button.
      • OTL may ask to reboot the machine. Please do so if asked.
      • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.


      Now run CCLeaner and clean out your temp folders.

      Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


      Then attach the below logs:
      • C:\MGlogs.zip
      • OTL log
      • RogueKiller log

      Make sure you tell me how things are working now!
     
  3. jlcom

    jlcom Private E-2

    "Are you missing your desktop icons?"

    Desktop icons were grayed out, but the files had been marked 'hidden'. Also, everything under 'All programs' on the Start Menu was missing, also due to hidden files. I had corrected those issues prior to my first post.
    The Start Menu still has missing items. 'Control Panel', for instance, is not there and has to be accessed from Explorer. But these are minor items; just mentioning them in response to your question.

    Computer now seems to be working properly and is somewhat faster than it was before the problem arose.

    Just curious: What piece of malware created this problem?

    Logs are attached. Let me know what else I need to do, and thanks VERY much for your help!
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good. I don't know what malware was responsible, various AV software gives different names to the same virus. But good to know everything is running well.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    One last thing. Go to start / run / and type:
    services.msc and scroll down to the BITS service ( Background Intelligence Transfer Service ) and see if it is running.
     
  6. jlcom

    jlcom Private E-2

    Yes, BITS is running.
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds