Problems After Removing "ntuser.vbe"

Discussion in 'Malware Help (A Specialist Will Reply)' started by pentlandite, Sep 7, 2018.

  1. pentlandite

    pentlandite Private E-2

    Dear Major Geeks,

    First, a short descritpion what happened before. I detected "ntuser.vbe", both on a USB-pendrive and on my PC (the latter in C:\Users\MyUserAccount). By the way, I have a Windows 8, 64-bit system. As the file was recreated each time I was erasing it on USB, I tried to be smart and quickly pulled the USB-drive out of the computer just after erasing it - in other words, I tried to be faster than the recreation process. It seemed to work, as I have noticed when plugged the USB-drive to a Macbook -> no "ntuser.vbe" detected. Aferwards, I removed the file from my PC with Malwarebytes scan.

    Since then, I noticed some changes in the behavior of my computer, including:

    - I cannot open Outlook -> when I do that I get the message that Outlook is unable to open my ".ost"-file (in "C:\Users\MyUserAccount\AppData\Local\Microsoft\Outlook"). This is followed by the message that Outlook cannot be started, the Outlook window cannot be opened, the folder group could not be opened, client operation failed.

    - I cannot save any data on my Desktop. I get the message that I do not have the permission to save in this location and should contact the administrator to obtain the permission (when I save a text file with Notepad)

    - When I try to opne a new Excel sheet, I get the message that Excel cannot open or save any additional additional files because there is not enough memory or hard drive space available.

    - When I try to start File Explorer by right-clicking on the Windows icon (the one in the bottom left) and selecting "Explorer", nothing happens.

    - I cannot view pictures with Windows Photo Viewer, as it says that I do not have the correct permissions to access the file location.

    I performed the scans with AdwCleaner, Malwarebytes, Rougekiller, HitmanPro and MGTools. The logs for the first four scans are attached. MGTool was not able to create a log, so I pasted the console output to the text file and attached it to the message - I could paste only the content I saw in the console, so the initial messages are not included there.

    If needed I can provide you with the Malwarebytes log from the previous scan, when "ntuser.vbe" was removed.

    The User Account Control was disabled before performing the scans. It is still disabled now.

    My internet browser (Firefox) seems to be OK. I create this post from the infected PC. My whole system is set in German, so I translated the dialog messages given above by myself.

    I would humbly request for your help to bring my computer back to the initial state, Sir/Ma'am...


    Best regards
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You did not run MGTools.exe correctly. Please run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7,or Win8 or Win10 don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).
     
  3. pentlandite

    pentlandite Private E-2

    Thank you for the quick reply!

    I am sorry for not running the MGTools.exe correctly. I just clicked on the icon of the MGTools.exe file, as suggested in "Using MGtools"-thread (for Windows 8 user) and the things just happened...

    I ran now the GetLogs.txt as instructed. The zip file is attached to this message. By the way, I could not attach the zip file on the infected PC - nothing happened when I clicked on "Upload a File" button. I typed this post on another computer.

    Best regards
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not finding any malware in your system. Let's do two things.

    Go to run...type in %temp% and clean it all out.

    Next, go to run....type sfc /runnow. You may have to do it twice.

    If that doesn't help, you then need to post in the software forum for additional assistance.

    Since you are not having any malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Re-enable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 or 10 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. After doing the above, you should work thru the below link:
     
  5. pentlandite

    pentlandite Private E-2

    Thank you for your reply. I am sorry for the delayed answer, I just spent a nice weekend without any computers...

    I proceeded as instructed and allow me to share the following remarks:

    - during cleaning the Temp-directory, I had to close some programs before removing those. The only one left was FXSAPIDebugLogFile.txt which was reported to be open in Windows Explorer. Although I found some ways in Google how to remove it, I let it stay. Do you mean I should remove it as well?

    - I ran sfc /scannow (instead of /runnow which was not found) in Command Prompt (admin mode) rather than over run - the latter just popped up the Command Prompt window which disappeared right away. I took this way around (Command Prompt in admin mode) as suggested by Google.

    - sfc returned the following message "Windows Resource Protection found corrupt files but was unable to fix some of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not supported in offline servicing scenarios.". I found this cbs.log file, which is of around 1 MB size. Do you wish me to upload it here?

    I would like to ask you if dealing with the sfc-reported problem is beyond your/this-forum-section responsibility. If this is the case, I am going to proceed with the 7 steps from your last post and bother your colleagues in the software forum, as suggested. Otherwise, I am eager to get more instructions from you.

    Best regards
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    My mind must have been out to lunch. Yes, scannow. Gezzz.. but if you found corrupt files, you will need to post in the software forum for further assistance.
     
  7. pentlandite

    pentlandite Private E-2

    Thank you very much for your advice and patience. God bless you.

    Best regards
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good luck. :)
     
  9. pentlandite

    pentlandite Private E-2

    Eeehhhmmmmmm... Just wanted to mention that running EnableUAC.reg did NOT result in switching the UAC to the initial state. I did click on Yes in the appearing Registry Editor window (the one with the long text: Adding information can unintentionally change or delete values and cause components to stop working correctly. If you do not trust the source of this information in C:\MGtools\EnableUAC.reg, do not add it to the registry. Are sure you want to continue?) which was followed by the next Registry Editor window claiming that The keys and values contained in C:\MGtools\EnableUAC.reg have been successfully added to the registry. Maybe it is because of my corrupted Windows... Anyway, I switched UAC to the previous state manually (over Control Panel).

    MGclean.bat did the job as expected.

    Thank you once again!

    Best regards
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You too.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds