rookit problem

Discussion in 'Malware Help (A Specialist Will Reply)' started by Markuk86, Jun 16, 2012.

  1. Markuk86

    Markuk86 Private E-2

    hey all! having a few problems with some rootkit.access0. i already had malwarebyte installed and have run it several times and each time it tells me it has deleted but it keeps popping up! I did see when this problem started i got a message about windows needs digitally signed driver and then my computer rebooted.
    heres my logs:

    seem to be having problems with mgtools. I've attached what i can but the program just seems to hang at the "running processdll.exe to find loaded dlls"
    its been open for over an hour now... if its known to take long i will have to try again and attach it when i get back from work. Sorry!

    update i just got an error saying:
    this program requires a missing windows component, flash.ocx which is no longer included in this version of windows.

    i've attached what i can, forgive me if anything is wrong!
    thanks in advance!
     

    Attached Files:

  2. Markuk86

    Markuk86 Private E-2

    Sorry, not sure if you wanted the hitman.zip or the xml. Or are they both the same? I'll attach it anyways!
    Just seen that i cannot attach the .xml file, guess i did it correct the first time. cannot delete my own posts. sorry for this!
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now download The Avenger by Swandog46, and save it to your Desktop.
    See the download links under this icon http://www.majorgeeks.com/images/dll.gif
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    Now download the current version of MGtools and save it to your root folder. Overwrite your previous MGtools.exe file with this one.

    Run MGtools.exe ( Note: If using Vista or Win7 make sure UAC is still disabled. Also don't double click on it, use right click and select Run As Administrator )

    Then attach the below logs:
    • C:\avenger.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  4. Markuk86

    Markuk86 Private E-2

    Hello. I did ask you asked, pc rebooted after using Avenger. But it did not save any log file?. Also MGtools still hangs on running processdll.exe to find loaded dlls. heres the file from mgtools, but it didnt complete!
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then it did not work. We will use a different tool, but first we will need to run a new scan using this tool. See below.

    It is working well enough. This problem may just be due to the fact that you have not updated .NET Framework from Microsoft. You are way out of date.


    Please download OTL by OldTimer.
    • Save it to your desktop.
    • Double click on the OTL icon on your desktop. (If running Vista or Win7 right-click and select Run as Administrator)
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the Customs Scans/Fixes text-field.
      Code:
      netsvcs
      /md5start
      afd.sys
      atapi.sys
      csrss.exe
      dhcpcsvc.dll
      explorer.exe
      lsass.exe
      nsiproxy.sys
      regedit.exe
      services.exe
      svchost.exe
      tcpip.sys
      tdx.sys
      userinit.exe
      winlogon.exe
      /md5stop
      %systemdrive%\*.*
      %systemdrive%\MGtools\*.*
      %systemroot%\*. /mp /s
      %systemroot%\system32\*.sys /90
      %systemroot%\system32\*.exe /lockedfiles
      %systemroot%\system32\drivers\*.sys /lockedfiles
      %windir%\assembly\GAC\*.ini
      %windir%\assembly\GAC_MSIL\*.ini
      %windir%\assembly\gac_32\*.ini
      %windir%\assembly\gac_64\*.ini
      %windir%\assembly\temp\*.ini
      %windir%\assembly\tmp\u /s
      %allusersprofile%\application data\*.exe
      hklm\system\currentcontrolset\services\dhcp
      hklm\system\currentcontrolset\services\afd
      hklm\system\currentcontrolset\services\tdx
      hklm\system\currentcontrolset\services\tcpip
      hklm\system\currentcontrolset\services\nsiproxy
      hklm\software\microsoft\windows\currentversion\run
      hklm\software\microsoft\windows\currentversion\runonce
      
    • Now click the Run Scan button.
    • Two reports will be created:
      • OTL.txt <-- Will be opened
      • Extra.txt <-- Will be minimized
    • Attach both OTL.txt and Extras.txt to your next message. (See how to attach)
     
  6. Markuk86

    Markuk86 Private E-2

    hello again, heres the 2 files you requested. thanks again!
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now shut down your protection software now (antivirus, antispyware...etc) to avoid possible conflicts.
    Code:
    :OTL
    DRV - [2012/06/17 18:42:54 | 000,061,440 | ---- | M] () [Kernel | Boot | Stopped] -- C:\Windows\SysWOW64\drivers\mgtdzaci.sys -- (snpmx)
    DRV - [2012/06/17 18:26:39 | 000,061,440 | ---- | M] () [Kernel | Boot | Stopped] -- C:\Windows\SysWOW64\drivers\ozuml.sys -- (vlyvqyyb)
    DRV - [2012/06/17 11:26:08 | 000,061,440 | ---- | M] () [Kernel | Boot | Stopped] -- C:\Windows\SysWOW64\drivers\qmjpdp.sys -- (uvey)
    DRV - [2012/06/17 06:00:38 | 000,061,440 | ---- | M] () [Kernel | Boot | Stopped] -- C:\Windows\SysWOW64\drivers\ewoza.sys -- (xkkp)
    SRV:[B]64bit:[/B] - [2012/06/16 19:11:25 | 000,075,712 | ---- | M] () [Unknown (-1) | Unknown] -- C:\Windows\SysNative\drivers\e8199214427a68cc.sys -- (e8199214427a68cc)
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    [2012/06/17 18:42:54 | 000,061,440 | ---- | M] () -- C:\Windows\SysWow64\drivers\mgtdzaci.sys
    [2012/06/17 18:26:39 | 000,061,440 | ---- | M] () -- C:\Windows\SysWow64\drivers\ozuml.sys
    [2012/06/17 11:26:08 | 000,061,440 | ---- | M] () -- C:\Windows\SysWow64\drivers\qmjpdp.sys
    [2012/06/17 06:00:38 | 000,061,440 | ---- | M] () -- C:\Windows\SysWow64\drivers\ewoza.sys
    :Files
    C:\Windows\Installer\{4BD429B9-1DC5-B854-1713-D42BF6F1C39D}\syshost.exe
    C:\Windows\System32\Drivers\e8199214427a68cc.sys
    c:\windows\syshost.exe
    c:\users\mark\appdata\local\temp\syshost.exe
    c:\users\updatususer.mark-pc\appdata\local\temp\syshost.exe
    c:\users\updatususer\appdata\local\temp\syshost.exe
    c:\windows\serviceprofiles\localservice\appdata\local\temp\syshost.exe
    c:\windows\serviceprofiles\networkservice\appdata\local\temp\syshost.exe
    c:\windows\temp\syshost.exe
    C:\Windows\Installer\{ab0307de-1411-ae05-6490-a1aaed70c947}\U
    C:\Windows\Installer\{ab0307de-1411-ae05-6490-a1aaed70c947}
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\syshost32]
    [-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\e8199214427a68cc]
    :Commands
    [PURITY]
    [EMPTYTEMP] 
    [EMPTYFLASH]
    
    [REBOOT]
    • Now click the http://img3.imageshack.us/img3/407/otlrunfix.png button.
    • If the fix needed a reboot please do it.
    • Click the OK button (upon reboot).
    • When OTL is finished, Notepad will open. Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (See: How to attach)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the log from OTL
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  8. Markuk86

    Markuk86 Private E-2

    ok i've done that and heres the logs. mgtools completed this time!
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks better but your Windows Firewall is not running because your Base Filtering Service has been deleted from the registry. Ad other services are likely broken too.

    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.
    Now please download Farbar Service Scanner and run it on the computer with the issue.
    • Put a check mark in each option box on the left side.
    • Click "Scan".
    • It will create a log (FSS.txt) in the same directory the tool is run.
    • Please attach this log to your next reply.
     
  10. Markuk86

    Markuk86 Private E-2

    Hi again, quick question about the windows repair program. It started fine but for the last 40mins its been on the same page. As its 3am here i have no problem leaving it while i sleep if its going to take a couple of hours or so to complete. I've uploaded a pic,

    thanks again!
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just let it keep running. It can take quite awhile to go thru all files and folders repairing permissions.​
     
  12. Markuk86

    Markuk86 Private E-2

    Morning. just woke up and that windows repair program was still on the same thingy. Nothing had changed from that picture i uploaded. So i stopped it, rebooted and ran it again but without "Reset File Permissions" checked. the program finished and now windows firewall is atleast working!
    I know we're not finished, is it correct im still seeing syshost popup all over the place still?
    heres the FSS log you wanted.
     

    Attached Files:

    • FSS.txt
      File size:
      4.7 KB
      Views:
      5
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Where exactly?

    Let's check status with MGtools logs.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below log:
    • C:\MGlogs.zip
     
  14. Markuk86

    Markuk86 Private E-2

    hello! syshost.exe is running in windows task manager. Its also in C\windows\installer\{4BD429B9-1DC5-B854-1713-D42BF6F1C39D}

    Windows update no longer works, my comp seems to be getting worse now also.

    Would it be easier if i put the windows disk in and did a reinstall or factory settings? Also could you tell me if i should be worried about this infection? Should i be changing my passwords/contacting my bank.

    will run mgtools now, 2sec!
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not necessarily. Depends on your capabilities and the whether you have the ability to backup and restore everything you need including all software and settings. Sometimes to get a PC back into the same state that you normally have ( that is without malware ) it running in.... well it is much different than factory ship state.

    It would be very helpful if you had a Vista Boot DVD as that would make detection and removal of some of thes problems easier. Does a friend have one?

    Potentially yes and you should not change them with this PC.


    I would also like you to run the below.


    Goto the below link and follow the instructions for running TDSSKiller from Kaspersky
    • Be sure to attach your log from TDSSKiller
    Now please also download MBRCheck to your desktop.


    See the download links under this icon http://forums.majorgeeks.com/chaslang/images/MGDownloadLoc.gif
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  16. Markuk86

    Markuk86 Private E-2

    Damn this rootkit is a pain!

    Heres the files you asked for.

    I have Windows Vista Home DVD if thats the samething?
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Is it a DVD that you can boot your PC from? We don't want to boot into Windows! We want to boot into the System Recovery Environment.
     
  18. Markuk86

    Markuk86 Private E-2

    yup, pretty sure i've used this before
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay then let's see if you can do the below.

    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.



    Enter System Recovery Options by using Windows installation disc:
    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  20. Markuk86

    Markuk86 Private E-2

    Hey. That didnt go as planned! But! i managed to use the restore feature, i choose a date 5days before i got the infection.

    Loaded up windows and nomore syshost.exe!

    done re-scans and will put the logs up here. Although Hitmanpro found no problems and didnt create a log. Mgtools stopped at the process dll part again, but heres what i got. Everything looks fine to me but i'd rather have you look over them if you could please :)
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You ran a very out dated ( more than a year old ) version of MGtools so the log is not as helpful as an updated version would be. However it looks okay from what's in it.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key http://forums.majorgeeks.com/chaslang/images/Windows_Logo_key.gif and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds