Removed Rootkit.Piharc now Windows 7 Will Not Boot

Discussion in 'Malware Help (A Specialist Will Reply)' started by Lery, Jan 3, 2013.

  1. Lery

    Lery Private E-2

    Hello and thank you very much for taking the time to read my post. I'm working on a computer for a family member who originally reached out to me saying their computer would always run a repair whenever it was shutdown. After doing some investigation I found the computer to be infected with a few Trojans. The tricky one seems to be Rootkit.Piharc.MBR. I was able to use Malewarebytes root detector program to remove it. My family member would do a system restore each time, which would allow the system to boot normally.

    My problem started when I wanted to run the rootkit detector program in safe mode. I ran msconfig and selected Safe Mode with networking for my boot option. I restarted, and this is when the computer started having this problem. Earlier attempts to boot into safe mode, and normal modes, all worked without issue. Only after the removal of the rootkit did this problem start.

    Using the advice from other posts, I've downloaded the program FRST64 and attached the output from the scan option.

    Currently, I restored the computer and am able to boot normally. I'm going to let the Malewarebytes root detector program run again, and this time I'm not going to change the boot option to Safe Mode. Hopefully this will clear things up, but I'm not very hopeful.

    Any advice you can give would be greatly appreciated.
     

    Attached Files:

  2. Lery

    Lery Private E-2

    This is a follow-up to my original post. I was able to use a system restore to revert back to the time prior to the root kit removal. I then launched the Malewarebyte Root Kit removal and removed the trojan again. This time leaving Safe Mode alone. Everything seems operational and the system is coming up clean on scans. I took another FRST scan and attached the output for comparison purposes.
     

    Attached Files:

  3. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Welcome to MajorGeeks!

    No sign of the TDL4 infection now; however if you wish a thorough checkup, please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide

    and then attach the requested logs to your next reply when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.
    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:

    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes, you could use a flash drive too, but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run RogueKiller, Malwarebytes, HitmanPro and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    * Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated - our system works the oldest threads FIRST.
     
  4. Lery

    Lery Private E-2

    Thank you very much for the follow-up. I went ahead and followed the guide linked and have attached all requested log files. Looking over the results it would seem like there is still some left over infection. I will await further orders ;) For your information, Malewarebyte scan quick and full is coming up as no threats detected.

    -Lery
     

    Attached Files:

  5. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hello, Lery

    Please re-scan with Hitman Pro and have it delete everything under the headings of
    • Potential Unwanted Programs
    • Malware remnants
    ...ignore any other findings.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.

    Next, double-click RogueKiller.exe to run it. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button, then select the Registry tab and then select any of the below that exist and then click the Delete button.
    • [RUN][SUSP PATH] HKCU\[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND
    • [RUN][SUSP PATH] HKLM\[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3239236465-4203213585-1723261147-1001[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND
    When it is finished there will be a log on your desktop called RKreport[2].txt, attach it to your next reply.
    Then immediately reboot your PC.

    After reboot, run new scans with both RogueKiller and Hitman Pro, attach those new logs to your next reply.

    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach the JRT.txt to your next message.
    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Windows 7, use right click and select Run As Administrator).

    Please attach these new logs to your next reply:
    • the new Hitman log
    • the new RogueKiller log & RKreport[2].txt
    • the JRT.txt
    • C:\MGLogs.zip

    How is your pc running now?
     
  6. Lery

    Lery Private E-2

    I've done as instructed and attached the updated logs.

    Yesterday when I ran RogueKiller I deleted these items:

    [RUN][SUSP PATH] HKCU\[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND
    [RUN][SUSP PATH] HKLM\[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND
    [RUN][SUSP PATH] HKUS\S-1-5-21-3239236465-4203213585-1723261147-1001[...]\Run : vcresr ("C:\Windows\System32\rundll32.exe" "C:\Users\Addie Grace\AppData\Roaming\vcresr.dll",Number_Absolute) -> FOUND

    Therefore, I think the RogueKiller log file is clean.

    I will await further orders. Overall the computer is running great.
     

    Attached Files:

  7. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Somehow, the Potential Unwanted Programs listings from HitmanPro didn't get removed. Please re-scan with it now and select to delete those PUPs. Ignore any other findings then click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.
    After reboot and when you are back in Windows, run another scan with HitmanPro and then attach the latest hitmanpro.zip log

    Please look in Add/Remove Programs (Programs and Features if using Vista or Windows 7) for the following and uninstall if found. If you get any errors just make a note and continue on.
    Ask Toolbar
    Java 7 Update 7 <--- outdated
    NOTE: Although the below "is not technically considered spyware it does have built in components to update itself and gather information about the computer system", you may wish to get rid of them.
    Update Installer for WildTangent Games App
    WildTangent Games App (HP Games)

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R3 - URLSearchHook: (no name) - {06b5b051-1d05-443d-822f-39ab0d05f018} - C:\Program Files (x86)\BringMeSports_1c\bar\1.bin\1cSrcAs.dll (file missing)
    R3 - URLSearchHook: (no name) - {9b138bf3-1d40-4e7e-84bb-2975198ad938} - C:\Program Files (x86)\CouponXplorer_5z\bar\1.bin\5zSrcAs.dll (file missing)
    O3 - Toolbar: BringMeSports - {cc53bd19-7b23-43b0-ab7c-0e06c708cced} - C:\Program Files (x86)\BringMeSports_1c\bar\1.bin\1cbar.dll (file missing)
    O3 - Toolbar: CouponXplorer - {65c72339-fb1d-4155-84e1-9afacee02d6f} - C:\Program Files (x86)\CouponXplorer_5z\bar\1.bin\5zbar.dll (file missing)

    After clicking Fix, exit HJT.

    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of the code box
    Code:
    :Processes
    explorer.exe
    
    :Files
    C:\Program Files (x86)\BringMeSports_1c
    C:\Program Files (x86)\CouponXplorer_5z
    
    :Commands
    [purity]
    [emptytemp]
    [start explorer]
    [reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow barand choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt%21.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    Then run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Windows 7, use right click and select Run As Administrator).

    Please attach the below logs to your next reply:
    • C:\MGlogs.zip]
    • the C:\_OTM\MovedFiles log
    • the 2 updated HitmanPro logs
     
  8. Lery

    Lery Private E-2

    The log files requested are attached. I only have one hitman log. This log is the scan after the reboot when I ran the program again.
     

    Attached Files:

  9. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    :)

    Just one more thing to do ---> please install the latest Sun Java Runtime Environment

    * It is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. It provides no "real-time" protection unless you purchase it and does not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. Go back to step 4 of the READ ME and re-enable your Disk Emulation software with Defogger if you had disabled it.
    3. If running Vista or Win 7, it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be
      added to the registry.
    4. Go to add/remove programs and uninstall HijackThis.
    5. Go to the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and/or deleted.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work through the below link:
    Safe surfing! http://i268.photobucket.com/albums/jj5/drmoriarty/Emoticons/char145.gif
     
  10. Lery

    Lery Private E-2

    Thank you so very much for your help with cleaning this machine.
     
  11. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    :cool

    You're very welcome!
    dr.m
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds