OpenCloudSecurity, then more malware

Discussion in 'Malware Help (A Specialist Will Reply)' started by handyaj, Sep 21, 2011.

  1. handyaj

    handyaj Private E-2

    I followed the Windows XP Malware Removal instructions but there seems to be something wrong.

    It started last week on 9/14. I was searching the White Pages to confirm someone's address when I got a fake alert called OpenCloudSecurity. I was remote controling this computer and could not shut it down for about an hour. I used Malwarebytes and it cleaned numerous entries. After the reboot, there was an error box that stayed on top of everything. The message inside was, "The Maximum number of secrets that may be stored in a single system has been exceeded. The length and number of secrets is limited to satisfy United States State Department export restrictions." I knew this did not look legit.

    I used a boot CD called Secured 2K and ran the online ESET scan. It found and cleaned several trojans including Win32/Patched.HN trojan and Win32/Rootkit.Kryptik.DM trojan.

    I am attaching the first Malwarebytes scan, the ESET scan as well as the Super AntiSpyware scan and the Malwarebytes scan. The other requested logs will be in a second post since there is a limit of 4 attachments.

    I will work with all suggestions and hope this can be cleaned.
     

    Attached Files:

  2. handyaj

    handyaj Private E-2

    Attached are the remaining logs. I do not have a Combo Fix log as it never completed. There was a message about a root kit found attached to the TCP/IP stack. I confirmed the message to let it continue scanning. I left it overnight and found it never showed any progress on the screen. I ran it several more times an never was able to generate a log file. I do have logs for Root Repeal and MGTools.

    Thank you for any help you can provide.
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now download The Avenger by Swandog46 to your Desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif
    Extract avenger.exe from the Zip file and save it to your desktop.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.


    1. Run avenger.exe by double-clicking on it.
    2. Click OK at the warning to continue to use The Avenger
    3. Do not change any of the check box options!
    4. Shut down your protection software now to avoid possible conflicts.
    5. Copy everything in the Quote box below, and paste it into the Input script here: part of The Avenger
    6. Now click the http://img33.imageshack.us/img33/9159/executeavenger.jpg button
    7. Click Yes to the prompt to confirm you want to execute.
    8. Click Yes to the Reboot now? question that will appear when The Avenger finishes running.
    9. Your PC should reboot, if not, reboot it yourself.
    10. A log file from The Avenger will be produced at C:\avenger.txt and it will pop-up for you to view when you login after reboot.
    11. Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )


    Download and run Win32kDiag per the below instructions:

    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log

    C:\win32kdiag.exe -f -r



    Now download Junction,zip to your Windows folder

    • Please download Junction.zip and save it to your Windows folder (i.e, C:\Windows\Junction.zip This assumes C:\ is your Windows boot drive.)
    • Now unzip it and put junction.exeinto the Windows folder (i.e., C:\Windows\junction.exe)
    • Do not try to run it right now. We will run something that uses it later.

    Now we need to reset the permissions altered by the malware on some files.

    • Download and save inhertit.exe to your Desktop: Inherit.exe
    • It must be in your Desktop or the below fix will not work!

    Now run the C:\MGtools\FixPerm.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    • A command prompt window opens and also a license agreement from SysInternals will appear for Junction.
    • Accept the license agreement and the scan will begin.
    • Wait until it finishes we can take a while to run since it scans your whole harddisk. e patient and don't do anything else while it is scanning.
    • The command prompt window should close when it finishes.
    • While this is running, you will get several/many popups that have a title Finish and say OK. Just click the OK button each time. This is an indication that it has found a file and has attempted to fix permissions. Depending on how many files that need to be fixed, you could get only a few or many of these popups.

    And one more scanning tool I want to use to collect more information is OTL per the below.

    Please download OTL by Old Timer to your desktop.
    See the download links under this icon: http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    1. Double-click OTL.exe to run (Vista and Win7 right click and select Run as Administrator)
    2. When OTL opens, change the Output (at the top-right portion of the program) to Minimal Output.
    3. Put check-marks in LOP Check and Purity Check.
    4. Now click the http://img171.imageshack.us/img171/2405/runscanotl.png button.



    • When the scan is complete, two logs entitled OTL.txt and Extras.txt will be created on your desktop.
    • Attach both of these logs to your next message. Along with the Avenger log.


    Next, please do this:
    Go to the below link and follow the instructions for running TDSSKiller from Kaspersky

    Be sure to attach your log from TDSSKiller

    Please also download MBRCheck to your desktop.

    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  4. handyaj

    handyaj Private E-2

    Tim, Thank you for helping me out with this. I do not have any log files to attach at this time. I ran the analyse as you instructed and then The Avenger with the script you supplied. Upon reboot, I get a blue screen with a STOP 0 X 7B error. After a few reboots and trying safe mode, I used last known good configuration and was able to boot into Windows. I tried again with the same results. I booted into the recovery console and deleted the files and folders indicated in the script and then booted up using Secured 2K boot CD. I looked at the registry and the two entries do not exist. I booted with last known good menu to get Windows to load again.

    What should be my next step? Should I follow the rest of the directions and just skip The Avenger? I work a long day again tomorrow so I may be dragging this out a few days. I do appreciate your expertise and will follow your instruction to try and get a working computer again.

    Thank you, handyaj.
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, do the rest of my instructions. When you are done, attach the logs from OTL and then also run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * OTL logs
    * C:\MGlogs.zip
    * TDSSKiller log
    * MBRCheck log.
    Make sure you tell me how things are working now!
     
  6. handyaj

    handyaj Private E-2

    I was able to follow the rest of your directions and only one program had a problem. The win32diag was scanning for about 30 seconds and then crashed. It did this several times so I skipped it. The rest worked and I have the 4 logs to attach.

    The computer seems more responsive so far. It was really dragging when I first signed up to this forum. I hope it can be cleaned but if not, I at least need to move the data off.
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please double-click the RootRepeal.exe previously downloaded.

    * Select File then Scan
    * On the Select Drives form select drive C by "ticking" the box for drive C and click OK
    * When the scan is complete - highlight each of the following file(s) (one at a time if more then one is listed) by left clicking it. Then use right mouse click and select the Wipe File option only for each file.

    C:\WINDOWS\$NtUninstallKB10028$\3844515885

    * After Wiping all files, immediately reboot your pc!


    Now:
    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    
    :services
    lobaub
    jfucyow
    avqz
    
    :files
    @Alternate Data Stream - 122 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:4B7BEAFF
    C:\D02AB189
    C:\qhliuh.txt
    C:\qmnmwxdz.txt
    C:\WINDOWS\1145018343
    C:\WINDOWS\System32\drivers\lobaub.sys
    C:\WINDOWS\System32\drivers\jfucyow.sys
    C:\WINDOWS\System32\drivers\avqz.sys
    C:\WINDOWS\$NtUninstallKB10028$
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!

    Also, what is this drive ( an external or slave drive )?:
    31 GB \\.\PhysicalDrive0 Unknown MBR code
     
    Last edited: Sep 23, 2011
  8. handyaj

    handyaj Private E-2

    All the scans ran without errors today. The computer seems good and is fast again. I noticed this yesterday also.

    The drive in question is a D drive and is internal. The main drive is a SATA and this smaller drive is a PATA. It is used a second drive for a quick backup and holds some backups of database files for accounting software. It was in an old Windows 98 system several years ago and I just moved it over to this new computer at that time as a second drive.

    The 2 logs requested are attached.
     

    Attached Files:

    Last edited: Sep 23, 2011
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0


    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  10. handyaj

    handyaj Private E-2

    Thank you, Tim for all your help.

    Some people told me to just scrub and re-install. I felt that finding all the software and copying back data was going to take a long time and wanted to give the cleaning a shot. I am glad I did. It took a few days but that is because I could not work on it at the same time you were available.

    I really appreciate you giving of your time to help people resolve issues with their computers. This really helped. I would have taken a lot more time getting all the applications and configuration back for the pastor, secretary, clerk and treasurer.

    I will definitely make sure security applications don't lapse any more and follow the suggestions on keeping a computer clean.

    Andy
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, cleaning is often more productive than having to reformat and go thru the process of re installation.

    And you are most welcome. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds