Persistent virus/browser redirect

Discussion in 'Malware Help (A Specialist Will Reply)' started by ZigZag, Oct 30, 2010.

  1. ZigZag

    ZigZag Private E-2

    Hi all,

    AVG first spotted this a few days ago. Scanning with AVG, ad-aware, malwarebytes has not been able to fix it. IE and FF both re-direct to advertising/search pages.

    Strangely, since the infection, one svchost process would use either 99% or exactly 50% processor power. I *think* I have an extra svchost process although I can't be sure - there are nine running.... The 50%/99% problem has never happened in the two years that I've been running this machine but seems to be fixed after following the steps in the read/run-me.

    I have performed the steps in the read/run-me. All completed without issues except combofix, which completed then froze the computer on just the desktop image for 30 minutes or so before the log creation stage. I had to turn off at the mains, restarted the computer and it completed sucessfully.

    Logs are attached as requested. Any advice would be much appreciated.
     

    Attached Files:

  2. ZigZag

    ZigZag Private E-2

    and another to upload the SAS log
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    Driver::
    gtermddo
    
    File::
    c:\program files\microsoft\watermark.exe
    c:\documents and settings\Simon\LOCAL Settings\Temp\gtermddo.sys
    Folder::
    c:\documents and settings\Simon\Application Data\Vuha
    c:\documents and settings\Simon\Application Data\Eteqty
    c:\documents and settings\Simon\Application Data\Umetu
    c:\documents and settings\Simon\Application Data\Zaagu
    c:\documents and settings\Simon\Application Data\Ugboul
    c:\documents and settings\Simon\Application Data\Etfu
    c:\documents and settings\Simon\Application Data\Deky
    c:\documents and settings\Simon\Application Data\Agepuc
    c:\documents and settings\Simon\Application Data\Nueho
    c:\documents and settings\Simon\Application Data\Ennuhy
    c:\documents and settings\Simon\Application Data\Ovwe
    c:\documents and settings\Simon\Application Data\Yzygyv
    c:\windows\system32\config\systemprofile\Application Data\Yfazig
    c:\windows\system32\config\systemprofile\Application Data\Pebu
    c:\windows\system32\config\systemprofile\Application Data\Kaymcy
    c:\windows\system32\config\systemprofile\Application Data\Ahlamu
    
    Registry::
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
    "Userinit"="c:\windows\system32\userinit.exe,"
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Please download the TDSS Rootkit Removing Tool (TDSSKiller.exe) and save it to your Desktop. <-Important!!!


    Be sure to download TDSSKiller.exe (v2.4.0.0) from Kaspersky's website and not TDSSKiller.zip which appears to be an older version 2.3.2.2 of the tool.

    • Double-click on TDSSKiller.exe to run the tool for known TDSS variants.
      Vista/Windows 7 users right-click and select Run As Administrator.
    • If TDSSKiller does not run, try renaming it.
    • To do this, right-click on TDSSKiller.exe, select Rename and give it a random name with the .com file extension (i.e. 123abc.com). If you do not see the file extension, please refer to How to change the file extension.
    • Click the Start Scan button.
    • Do not use the computer during the scan
    • If the scan completes with nothing found, click Close to exit.
    • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    • A log file named TDSSKiller_version_date_time_log.txt (i.e. TDSSKiller.2.4.0.0_27.07.2010_14.17.05_log.txt) will be created and saved to the root directory ( usually Local Disk C ).
    • Attach this log to your next message



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  4. ZigZag

    ZigZag Private E-2

    Thankyou for your speedy reply!

    I ran combofix - again it had trouble rebooting the system and I had to manually reboot. It seemed to work OK and produced a log on reboot.

    I ran TDSSKiller - it found suspicious items but no malicious items. The default was ignore so I clicked continue and nothing was done.

    I ran MGtools - no issues.

    I have attemped to browse to 20 different websites through manual entry of the address and through google links and no re-directs so far. However, my computer seems to be working a lot in the background - there is no obvious process from looking at taskmanager (from a processor or memory perspective) but just listening to the HD, it sounds like its performing a scan. I hope that makes sense!

    Still, the system seems to be behaving normally - if the logs agree then things are looking good.
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    There is still a problem in your reg keys. Please run MBAM and attach the log. Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip
     
  6. ZigZag

    ZigZag Private E-2

    Nothing found by MBAM (I did a full scan). Both logs attached.

    No more re-directs yet, still seems to be lots more HD activity than usual but maybe I am just being paranoid... svchost is not doing anything ridiculous anymore so thats a good sign...
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Copy just the bold text below to notepad (Do not include any space above the word REGEDIT). Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Use windows explorer to try to find and delete:
    c:\program files\microsoft\watermark.exe

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip
     
  8. ZigZag

    ZigZag Private E-2

    Ran the reg file - it completed sucessfully.

    I found the watermark.exe file but could not delete it - access denied.

    I rebooted my computer to see if the file could be deleted on reboot - unfortunately there is a problem. The system starts up, loads my desktop background and just as it seems explorer will start, it logs me off for some reason. When I click to log myself in - it tries to log me in, gets to the desktop background page and just stays there.

    I can move the curser but have no ctrl+alt+delete function for example. I can't log myself back out, or even shut down without turning off at the wall. Please help!
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Have you tried booting into safe mode? Do you have your OS cd? You may need to do a repair install.
     
  10. ZigZag

    ZigZag Private E-2

    I cannot boot in any of the safe mode options - I just get bounced back out to the login screen.

    I do not have my windows disk at this address and it will be difficult for me to get it before christmas! (it is at my parents home).

    I do have the recovery console, can I fix it using that? I have never used it before but can sucessfully boot into it. It would seem the registry fix on the userinit.exe logon file may have caused the problem - is it possible to copy a new one over in the recovery console? I have never used it before but it looks like DOS...
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    1. Insert the original Windows XP CD (Windows XP with Service Pack 2 is preferred, but not required) and reboot the computer. You may need to configure your computer to boot from the CD-ROM drive.
    2. When the Windows XP Setup has started, press "R" to "repair the Windows XP installation using Recovery Console".
    3. Select the Windows installation to repair (generally this is C:\Windows) by typing its number and then pressing ENTER.
    4. Type the Administrator password and press ENTER.
    5. Type the following commands:

    D: [ENTER]
    CD I386 [ENTER]
    EXPAND USERINIT.EX_ C:\WINDOWS\SYSTEM32 [ENTER]

    NOTE: If your CD-ROM drive has a different letter assigned to it, enter "X:" instead, where X is the appropriate drive letter.

    After entering "EXPAND USERINIT.EX_ C:\WINDOWS\SYSTEM32" you should see the text "1 file(s) copied", in which case all went well.

    Remove the Windows XP CD, type "EXIT" and press ENTER to restart your computer. You should now be able to log on as normally.
     
  12. ZigZag

    ZigZag Private E-2

    Like I said in my last post, I do not have my Windows disk - can we fix this using the recovery console?
     
  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes, just boot into the recovery console and follow the rest of the instructions starting at #5.
     
  14. ZigZag

    ZigZag Private E-2

    I don't understand - in step 5 you are expanding from a file on the D: drive, i.e. the winXP CD.

    Can you please explain how to do this without the CD? I tried it anyway and it said "the system cannot find the file or directory specified" at the CD I386 step...

    Maybe I am doing something stupid...
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No, I am being stupid. We need a place to copy the file from and without the cd, it will not work. Can you possibly borrow a disc from someone ( as long as it is the same version as what you have ie. Home or Pro)?
     
  16. ZigZag

    ZigZag Private E-2

    I am in a house with a load of mac users! Is it possible to download the file from somewhere, burn it to a CD and use that CD? or will it only work with a genuine winXP CD?
     
  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    First let's see if this works.

    Once in the recovery console, type:
    cd c {enter}
    copy c:\i386\userinit.exe c:\windows\system32\ {enter}
    exit

    We are hoping you have a good copy in that location. If not, we will have to try something else.
     
  18. ZigZag

    ZigZag Private E-2

    I tried the procedure - it says "access is denied" :(
     
  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    At the Recovery console C:\WINDOWS prompt, type
    chkdsk /r
     
  20. ZigZag

    ZigZag Private E-2

    I ran the chkdsk function, it found and fixed "one or more errors" on the disk. I will try the previous fixes.

    Just as an aside, I am wondering whether the following is a possibility (from searching the web):

    Meaning, that even if we can replace this file, we will probably need to edit the winlogon registry value...

    Thanks for your continuing help!
     
  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  23. ZigZag

    ZigZag Private E-2

    I did it the hard way - it took a while but I got there in the end! phew!

    So now - I can get into windows fine and everything seems to be there still. The malware infection had deleted all my restore points so the registry that I have manually pulled was only from 2 days ago and may have brought back some unwanted stuff.

    I don't seem to have a browser re-direct so I suspect we are back to the same place before the registry got messed up!

    This time I have gone into the registry, to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
    NT\CurrentVersion\Winlogon
    and had a look. Sure enough, the value had been modified to "C:\WINDOWS\system32\userinit.exe,,C:\program files\microsoft\watermark.exe"

    I have changed it to "C:\WINDOWS\system32\userinit.exe"

    I will not restart until I hear back from you so if you think this is not correct then please let me know - otherwise, if you have any final changes I need to make then I would be grateful to hear them.

    Thanks again for your time and help
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good job. That was exactly right. We can check this by having you run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip

    NOTE: MBAM usually finds and removes the C:\program files\microsoft\watermark.exe. I don't know why it is not doing it this time. Perhaps you should run a deep scan.
     
  25. ZigZag

    ZigZag Private E-2

    See attached.

    I still have that watermark.exe file in c:\program files\microsoft\watermark.exe which I cannot delete - access denied.

    The HD also still seems to be doing something as before....
     

    Attached Files:

  26. ZigZag

    ZigZag Private E-2

    also, i have run MBAM straight onto watermark i.e. by right clicking and choosing scan with MBAM - no infection found...
     
  27. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    c:\program files\microsoft\watermark.exe
    C:\Documents and Settings\Simon\Application Data\Giamyg\wevu.exe
    
    Folder::
    C:\Documents and Settings\Simon\Application Data\Axcumo
    C:\Documents and Settings\Simon\Application Data\Giamyg
    
    Registry::
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "{84C35D54-3542-82F4-7975-9AD1A1F6EB92}"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
    "Userinit"="c:\windows\system32\userinit.exe,"
    
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now re-run TDSSKiller and attach that log.

    Next, re-run MBAM but this time do a deep scan. Attach that log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  28. ZigZag

    ZigZag Private E-2

    I ran HJT, found the line and fixed it.

    I ran combofix - it had to update itself, then detected rootkit activity and had to reboot. It asked me to note down the following file (not sure why):
    C:\windows\system32\drivers\sptd.sys

    As usual, it didnt reboot and I had to do a hard reboot - it completed sucessfully on reboot.

    I ran TDSKiller - no infections found.

    I ran MBAM full scan - no infections found.

    I ran mgtools log - no problems.

    I still see this watermark file and, checking that reg key, it has been re-written to include the pointer to watermark - if i change it and re-open regedit, it has changed it back. It would seem that something is not being killed and re-installing everything each time...
     

    Attached Files:

  29. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am curious as to why you are skipping what TDSSKiller finds.

    Let's do this one more time:

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    Driver::
    gtermddo
    
    File::
    c:\documents and settings\Simon\LOCAL Settings\Temp\gtermddo.sys
    c:\program files\microsoft\watermark.exe
    c:\windows\FixCamera.exe
    Folder::
    c:\program files\temp
    c:\program files\win
    c:\program files\tmp
    Registry::
    [-HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FixCamera]
    
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Please also download MBRCheck to your desktop

    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...

    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:

    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  30. ZigZag

    ZigZag Private E-2

    TSDKiller has only found suspicious entries, not malicious ones - the default is allow (or whatever). In the absense of any instructions otherwise, I followed the default.

    I ran HJT - fixed the entries.

    I ran combofix - no problems.

    I ran MBR - nothing found.

    I ran the MG logs - no problems.

    The above combination seems to have got rid of the watermark file (hurrah!), but the dodgy entry in the userinit key still remains. If I fix it with HJT, or manually, it changes straight back the instant I exit HJT/regedit.

    I am therefore worried that if I re-boot, I will have that horrible problem where userinit points to watermark file (which is no longer there) and therefore I can't login to windows...
     

    Attached Files:

  31. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Well, the MBRCheck came back clean. But you are still showing some unknown item in your boot record. Are you using the latest version of MBAM and fully updated? I ask because other users are able to have it remove the desktoplayer file.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    c:\documents and settings\Simon\Application Data\Aloqb\paaw.exe
    c:\program files\microsoft\watermark.exe
    
    Folder::
    c:\documents and settings\Simon\Application Data\Aloqb
    c:\documents and settings\Simon\Application Data\Udhuar
    
    Registry::
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
    "Userinit"="c:\windows\system32\userinit.exe,"
    
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "{84C35D54-3542-82F4-7975-9AD1A1F6EB92}"=-
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the previous file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip
     
  32. ZigZag

    ZigZag Private E-2

    MBAM is v1.46. The MBAM db was 5 days old so I updated it and ran a quick scan then a full scan - the quick scanfound two items which I fixed - I have included the log for reference.

    I ran combofix and MG log - no issues.

    The reg file is still bad....argh! I do feel like progress has been made in getting rid of the watermark file, how do you see it? any ideas?
     

    Attached Files:

  33. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    That reg key is the only thing left that I am seeing. When you edited your registry and removed the desktoplayer file did you immediately hit F5?

    Let's see if eSet will remove it.
    eSet Online Scan.
     
  34. ZigZag

    ZigZag Private E-2

    Well it found over 6000 infections....I am not convinced....log attached - please let me know if these are likely infections as I see a lot of stuff in there that I don't want deleted. Saying that, a lot of things it says its quarantined still seem to be there.

    I have not had a desktoplayer file that I know of, only the watermark one (maybe this is the same thing). I have pressed F5 to refresh and this is when it is changed back to the bad value.

    I think that one of the svchost processes on the computer is to blame - I have found a couple of articles that mention this as a possibility with the watermark.exe file and ramnit infection. I am also convinced that I had less than 9 svchost processes before - if this is the case, how would we identify it?

    Note: I have had to split the log over three text files
     

    Attached Files:

  35. ZigZag

    ZigZag Private E-2

    Ha! I think I have found it. The HD had a lot of activity and I noticed that one svchost process was using processing power. It was also under the account name rather than "system" or "local service". I killed it using taskmanager and changed that registry value and it didn't change back.

    It will probably start up again on reboot - could you advise how to get rid of it?

    Thanks for your help.
     
  36. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    This infection has really become quit nasty and dangerous. We could attempt to remove and have had some success in the past, but recently it has become even more trouble to remove. It is really safer to just bite the bullet and do a clean reinstall.

    The problem is that the damage caused by this infection really makes a PC unreliable/untrustworthy. PE file infectors like Ramnit, Virut,.... etc are can infect all executable files (DLL, EXE, SCR....and many more and also HTML). These infections can open back doors that truly may compromise your computer and your security. These backdoors, could allow a remote attacker to access and instruct the infected computer to download and execute more malicious files.

    In many cases the infected files (which could number in the thousands) cannot be disinfected properly by your anti-virus or by other scanning tools. Also when disinfection is attempted, the files often become corrupted and the system may become unstable or irrepairable. The longer Ramnit.A remains on a computer, the more files it infects and corrupts so the degree of infection can vary.

    Ramnit is commonly spread via a flash drive (usb, pen, thumb, jump) infection where it copies Worm:Win32/Ramnit.A with a random file name. The infection is often contracted by visiting remote, crack and keygen sites. These type of sites are a major source of system infection.

    So all the above being said, and please do take serious note of the warnings, do you really wish to attempt cleaning even though the stability and security of your be cannot be guaranteed? And also, we could spend a lot of time trying to fix it and still fail due to the number of files that have been infected.
     
  37. ZigZag

    ZigZag Private E-2

    Yes, I wish to go ahead - lets continue please.
     
  38. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    We may not be able to unhook that file. If we can't then doing a reformat and clean install will be the only safe thing to do.

    Please get me another set of eSet scans. Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\MGlogs.zip
     
  39. ZigZag

    ZigZag Private E-2

    Nothing has changed since the last eset scan or MGlog as I have not used the computer since running them (I am writing from a different computer) so you can assume that those are current.

    Kind regards, Zig.
     
  40. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please disable system restore and then run another set of eSet scans. When finished, run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    * C:\MGlogs.zip
     
  41. ZigZag

    ZigZag Private E-2

    Only 2000 this time...see attached
     

    Attached Files:

  42. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I can not in any good faith suggest that we continue with this. The virus is too deeply embedded in your system to have any chance of getting your system to be not only clean, but safe. The best thing for you to do is to save your personal data and files to a cd and then do a clean install. This is the only way we can get your system to be reliable and secure.
     
  43. ZigZag

    ZigZag Private E-2

    OK, I have video, picture and music files that I want to keep. Is there any danger of bringing over the virus if I move them over to a clean system whenever I do this?
     
  44. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I would suggest that you copy them to a cd and once you have reformated and done a clean install, scan them to be certain they are safe to put back on your system.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds