Palladium pro virus

Discussion in 'Malware Help (A Specialist Will Reply)' started by nverma, Jan 20, 2011.

  1. nverma

    nverma Private E-2

    Hi,

    My son's computer recently got infected with palladium pro spyware.

    We can not access the desktop or any other tools.

    Please help!!
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Pleases follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. nverma

    nverma Private E-2

    Thanks so much for your help. I am having difficulty in running defogger tool.

    It says that it requires administrator privileges, but I am admin on my machine.

    The malaware bytes and super antispyware did remove bad stuff, but my Win XP SP2 (repair install) still does not boot in normal mode.

    I still have to boot in safe mode. The following is the message in event viewer. Thanks so much for your help. I will wait for your reply to complete the other steps. Thanks in advance!!

    The following boot-start or system-start driver(s) failed to load:
    Fips
    intelppm
    mfehidk
    OMCI
    SASDIFSV
    SASKUTIL
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Just run what you can and attach what logs you have please.
     
  5. nverma

    nverma Private E-2

    Thanks so much for your reply.

    I have attached the scan results.

    I will send the MGTools.zip in next email.

    Thanks for being my savior!!

    Best regards,
    Nav
     

    Attached Files:

  6. nverma

    nverma Private E-2

    Attached are the MGTools scan results.

    Please let me know the next steps.

    Thanks so much,
    Nav
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    While you are waiting for Kestrel, let's do this:

    Please use add/remove programs to uninstall:
    Java(TM) 6 Update 14

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    Now copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now use windows explorer to find and delete:
    C:\Documents and Settings\All Users\Application Data\25FelT606.dat
    C:\WINDOWS\temp\setup.exe
    C:\WINDOWS\temp\sydngvobe
    C:\Temp\8a702136-2fcf-42b5-a671-c7b38facb426

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it. To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123tdk.com).
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message

    Now download and install:
    Java Runtime 6

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * TDSSKiller log
    * C:\MGlogs.zip
     
  8. nverma

    nverma Private E-2

    Tim,

    Thanks so much for your prompt reply.

    I exactly followed your instructions. The registry merge was a success.

    Attached are the log files. Please let me know what you think.

    After you give your ok, I will install java and will upgrade to Windows SP3.

    Thanks so much.

    It will be an understatement to say this problem has given me trouble.

    But then there are great people like you who come forward to help those in need. May God bless you!!

    Thanks,
    Nav
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    TDSSKiller found the MBR infection that I suspected was on your system. Now I want to double check that it did indeed fix the problem.

    Please boot into normal mode to do the following:

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...

    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:

    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message.


    Now run CCLeaner and clean out your temp folders. To make sure, also run this:

    ATF Cleaner by Atribune. This program does not require an installation. The executable actually runs the program.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * MBRCheck log
    * C:\MGlogs.zip
     
  10. nverma

    nverma Private E-2

    Tim,

    Sure, I will do that and will send you the logs.

    One concern I have is - Can this stuff spread by itself to other connected computers in LAN?

    Do I need to do any procedures for other connected computers as well? Please let me know.
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    How many other computers are in your home? Have you been experiencing any unusual behaviour whilst using any of the other machines? Have any flashdrives/removable devices been used and swapped around on the different computers?
     
  12. nverma

    nverma Private E-2

    Thanks. Have not swapped flash drives etc.

    I have not noticed anything strange yet.

    When I was reading about TDSS on Kaspersky lab's website, I got really concerned.

    I was wondering if I should remove LAN cables completely. If I remove the LAN cable, there is danger of swapping flash drives to download tools etc. Please advise.

    The strange behavior on mine is typical of such infection. A while back, I was seeing redirects on IE explorer - typical of this kind of infection.
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You should be just fine. Follow TimW's last instructions and attach the logs, please.
     
  14. nverma

    nverma Private E-2

    Thanks Tim and Kestrel. You are my heros. Attached are logs. Please let me know any further instructions.
     

    Attached Files:

  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your logs are clean. :)

    I will only suggest that you manually clean out these folders:
    C:\WINDOWS\temp\
    C:\Documents and Settings\nverma\Local Settings\temp\

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:




    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  16. nverma

    nverma Private E-2

    Thanks Tim. I did what you said. Although I am not sensing some signs of malware still present (don't see browser hijacking etc), I still get the error when I try to start my machine in the normal mode.

    The following boot-start or system-start driver(s) failed to load:
    Fips
    intelppm
    OMCI
    SASDIFSV
    SASKUTIL

    I am able to start in diagnostic mode or safe mode.

    Is reinstall the only option now? Please let me know with your valuable opinion.
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try asking about those issues in the software forum before resorting to a format/reinstall! :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds