No Text in Safe Mode

Discussion in 'Malware Help (A Specialist Will Reply)' started by dyn, Jun 25, 2013.

  1. dyn

    dyn Private E-2

    Hi, this is my first post so hopefully I'm posting in the right place...

    So I'm pretty sure I have some malware on my PC, when I start in normal mode I get a BSOD (bad_pool_header) before I can start any programs. I've been trying to remove it in Safe mode but unfortunately when I boot in safe mode (also in networking + command prompt modes) no text appears except on the help menu. Icons have no title, folders appear blank, the start menu doesn't open, task manager is blank, etc. Any programs I manage to open (only possible from the desktop) cause a BSOD. I have tried running some software from a USB using command prompt (malwarebytes (+ chameleon) and HitmanPro), however for both an error message (I assume it is an error but there is no text. I cannot be sure how long this has been happening, as I have never needed to use safe mode until now.

    If anyone knows any way to fix this problem, I think I can find a way to get rid of the malware so it would be great if anyone can give any advice.
    Thanks guys
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    This may or may not be due to malware. More frequently it is not.

    What version of Windows are you running?

    And were you having any issues prior to this happening?
     
  3. dyn

    dyn Private E-2

    Hi, thanks for the quick reply
    I am running windows 7, until a few days ago I was having no problems, then I started getting a BSOD shortly after booting. However I don't know whether the problem with safe mode was present before because I had never needed to use it before now.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.


    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.


    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  5. dyn

    dyn Private E-2

    When I try to run frst.exe I'm getting a message saying 'The subsystem needed to support the image type is not present.' :(
     
  6. dyn

    dyn Private E-2

    Realized the problem, was not aware that I have an x64 system.
    I've attached the log, I hope it helps.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay you have a few problems. The below should help with them but there may be more to do after we get your PC to boot. Once we get to that point, we can attempt to address any other issues that may remain. We will likely have to run a full malware cleaning process to make sure it is clean.

    Download this >> View attachment fixlist.txt

    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now see if you can boot into normal Windows. If you can, I recommend that you run the below to make sure you are clean.


    READ & RUN ME FIRST. Malware Removal Guide
     
  8. dyn

    dyn Private E-2

    I ran the fix, tried to run in normal mode but got the same BSOD as before. I have attached the log
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay but can you run in safe boot mode now?
     
  10. dyn

    dyn Private E-2

    Yes I can boot in safe mode without getting a BSOD
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Good then run the READ & RUN ME FIRST in safe mode
     
  12. dyn

    dyn Private E-2

    Ok so I have tried to follow all the steps but as text still does not appear in safe mode all I have been able to do is run CCleaner (through command prompt safe mode, this took several tries as I get a BSOD after running a program or windows explorer for more than a few minutes). I don't know of any way to complete the other steps without solving the text problem in safe mode :(
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's try using System Restore from the System Recovery Options

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.


    On the System Recovery Options menu you will get the following options:
    • Select System Restore
    • See if you can restore your PC to a date that is before when your problem began. Per your first FRST log you had multiple restore points.

    The below restore points were see. Hopefully you can use one of them.

    ==================== Restore Points =========================

    Restore point made on: 2013-06-13 06:14:26
    Restore point made on: 2013-06-14 07:42:42
    Restore point made on: 2013-06-15 18:00:36
    Restore point made on: 2013-06-23 11:45:56
     
  14. dyn

    dyn Private E-2

    Tried all of the restore points, each of them completed but I still see no text in safe mode and cannot boot in normal mode
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This may not be a malware issue that we can help you with. Seems more like a corruption to Windows.
    Which did you use first and which did you use last?

    Please rerun FRST just like you originally did in message # 4 of this thread and attach a new log.


    Also I have a couple questions:

    1) Do you have any other user account on this PC? If yes, have you tried the other accounts to see what happens?

    2) Have you tried running sfc /scannow from a command prompt?
     
    Last edited: Jul 1, 2013
  16. dyn

    dyn Private E-2

    Hi, sorry I didn't have a chance to reply over the last few days,

    I think I used all the restore points starting from the oldest (2013-06-13) to the newest (2013-06-23).

    I have attached a new FRST log.

    I don't have any other users.

    I was able to run sfc /scannow when the problem started, however I don't think it found anything. Trying to run it again, I get a message saying a system repair is scheduled and to restart my PC. When I restart I get the same message.
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As I suspected, the System Restore ( probably from the more recent date ) brought back the infection components. So let's remove them again.


    Download this >> View attachment fixlist.txt



    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Attach the above fixlist.txt log now and then see if you can do the below somehow.

    Try to boot into normal Windows and even if you still have no text, see if you can some how manage to run FRST64 from normal more too to create another fixlist.txt log from normal boot mode which may be able to help remove junctions being reported in the Windows Defender folder. Attach this second fixlist.txt log if you can run it this way.
     
    Last edited: Jul 6, 2013
  18. dyn

    dyn Private E-2

    When I click 'Fix' I get a message saying:
    'Looks like you don't know what to do. To prevent damage to the system the tool will exit'.
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    At which part? When in the Recovery Options? Or from Normal Boot mode?
     
  20. dyn

    dyn Private E-2

    In recovery options
     
  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay I modified the fixlist.txt file. Try downloading it again and give it another run.
     
  22. dyn

    dyn Private E-2

    I ran the fix and I can now boot in normal mode and view text in safe mode! Thanks so much for all your help so far, what should I do next?
     

    Attached Files:

  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  24. dyn

    dyn Private E-2

    I had to run the scan twice because I got a blue screen in the middle of the first one and during the first scan it did find malware but in the second it didn't.

    Wasn't sure which file was the log, I attached both.
     

    Attached Files:

  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's good. Let's now move on to a full cleaning process to make sure there are no other malware issues hiding.


    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide
     
  26. dyn

    dyn Private E-2

    Okay I ran roguekiller and attached the log.

    Trying to run malwarebytes I get a blue screen every time I select language, I've tried re-naming it and changing the file extension but the same thing keeps happening.

    I ran TDSSKiller and attached the log.

    I get a blue screen after clicking 'Scan' on HitmanPro.

    I ran MGLogs and attached the log.
     

    Attached Files:

  27. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    • Exit any programs that you may have started. Also see if you can disable McAfee too.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • Rerun RogueKiller ( if running Vista,Win7, or Win8 user right-click and select Run as Administrator to run ) for WinXP and Win 2K just double click to run
    • Wait until Prescan has finished
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and attach the content of the Notepad into your next reply.
    • The log should be found in a new RKreport[x].txt on your Desktop
    • Exit/Close RogueKiller and reboot your PC.
    Now uninstall the below programs:
    Hyperionics DB Toolbar
    Java 7 Update 17
    Java(TM) 6 Update 37
    uTorrentBar Toolbar

    Now install the current version of Sun Java from: Sun Java Runtime Environment Make sure that when you see the form asking about installing Ask Toolbar that you uncheck this.

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: uTorrentBar Toolbar - {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - C:\Program Files (x86)\uTorrentBar\prxtbuTor.dll
    R3 - URLSearchHook: ToolbarURLSearchHook Class - {CA3EB689-8F09-4026-AA10-B9534C691CE0} - C:\Program Files (x86)\Hyperionics DB Toolbar\tbhelper.dll
    O2 - BHO: CrossriderApp0004479 - {11111111-1111-1111-1111-110011441179} - C:\Program Files (x86)\Giant Savings\Giant Savings.dll
    O2 - BHO: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\prxConduitEngin.dll (file missing)
    O2 - BHO: uTorrentBar - {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - C:\Program Files (x86)\uTorrentBar\prxtbuTor.dll
    O2 - BHO: Ask Toolbar BHO - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (file missing)
    O2 - BHO: SMTTB2009 - {FCBCCB87-9224-4B8D-B117-F56D924BEB18} - C:\Program Files (x86)\Hyperionics DB Toolbar\tbcore3.dll
    O3 - Toolbar: uTorrentBar Toolbar - {bf7380fa-e3b4-4db2-af3e-9d8783a45bfc} - C:\Program Files (x86)\uTorrentBar\prxtbuTor.dll
    O3 - Toolbar: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\prxConduitEngin.dll (file missing)
    O3 - Toolbar: Hyperionics DB Toolbar - {338B4DFE-2E2C-4338-9E41-E176D497299E} - C:\Program Files (x86)\Hyperionics DB Toolbar\tbcore3.dll
    O3 - Toolbar: Ask Toolbar - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (file missing)

    After clicking Fix, exit HJT.

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Program Files (x86)\Ask.com
    C:\Program Files (x86)\Hyperionics DB Toolbar
    C:\Program Files (x86)\Giant Saving
    C:\Program Files (x86)\ConduitEngine
    C:\Windows\TEMP\*.*
    C:\Users\Tom\AppData\Local\Temp\*.*
     
    :Reg
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the new RogueKillerlog
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  28. dyn

    dyn Private E-2

    Okay I just finished running everything and I am now able to use the internet and haven't had any problems so far.
    Thanks so much for your help :)
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds