Jump to content

Recommended Posts

I've been advised to post here from the thread https://forums.malwarebytes.org/index.php?/topic/158317-custom-scan-isnt-scanning-drives/#entry888265

That basically says that when I do a Custom scan, the file systems seleced aren't scanned.

I ran Farbar again and am attaching the latest log - the original one is in the thread I just mentioned.

By the way, your instructions don't say whether I should run Farbar as Admin or as a normal user. I ran it as Admin, but don't know if it makes a difference. If it does, maybe you could update the web page to let us know.

FRST.txt

Addition.txt

Link to post
Share on other sites

Hi there,
my name is Marius and I will assist you with your malware related problems.

Before we move on, please read the following points carefully.

  • First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while following my instructions, Stop there and tell me the exact nature of your problem.
  • Do not run any other scans without instruction or add/remove software unless I tell you to do so. This would change the output of our tools and could be confusing for me.
  • Post all logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.
  • If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.
  • Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.
  • My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.

  • Important: To help me reviewing your logs, please post them in code boxes. You can create them by clicking on the <>-symbol on top of the reply window.

 

 

 

Scan with Gmer rootkit scanner

Please download Gmer from here by clicking on the "Download EXE" Button.

  • Double click on the randomly named GMER.exe. If asked to allow gmer.sys driver to load, please consent.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.
  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Show All ( should be unchecked by default )

    [*]Leave everything else as it is. [*]Close all other running programs as well as your Browser. [*]Click the Scan button & wait for it to finish. [*]Once done click on the Save.. button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post. [*]Save it where you can easily find it, such as your desktop. [*]Please post the content of the ark.txt here.


**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

Scan with TDSS-Killer

Please read and follow these instructions carefully. We do not want it to fix anything yet (if found), we need to see a report first.

Download TDSSKiller.zip and extract to your desktop

  • Execute TDSSKiller.exe by doubleclicking on it.
  • Press Start Scan
  • If Malicious objects are found, do NOT select Copy to quarantine. Change the action to Skip, and save the log.
  • Once complete, a log will be produced at the root drive which is typically C:\ ,for example, C:\TDSSKiller.<version_date_time>log.txt



Please attach this file to your next reply.

Link to post
Share on other sites

Marius.

Thank you for helping me. I am sure that your English is better than my German, so I will try not to use idions as you ask.

I ran both of the scans that you suggested. Both of them finished without finding anything. Ark.txt has zero bytes, and TDSSKiller also finished without any log file.

Link to post
Share on other sites

Marius - one question.

I've just had a Microsoft notification of 11 "important" updates. Should I apply them now or wait until my machine is cleaned up? You asked me not to add/remove software.

Link to post
Share on other sites

Please postpone these updates until we´re finished here.

 

Fix with FRST (normal mode)

WARNING: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system
 

  • Download the attached fixlist.txt and save it to the location where FRST is saved to.
  • Run FRST.exe (on 64bit, run FRST64.exe) and press the Fix button just once and wait.
  • The tool will make a log (Fixlog.txt) which you find where you saved FRST. Please post it to your reply.

 

 

 

 

Use the Windows Error Checking utility (Check Disk), with the options to fix file system errors and scan the disk surface for errors, attempt recovery of data and repair the disk:
 

  • Click the "Windows Orb" Start button, then click Computer.
  • Right-click on the drive that you wish to check > Properties > Tools tab
  • In the "Error checking" section, click on Check now.
  • Place a checkmark in both boxes > Start.
  • If the disk you have chosen is the Windows system disk:
  • A message will notify you that a restart is necessary ask "Do you want to check for hard disk errors the next time you start your computer?".
  • Click Schedule disk check > OK and close all windows.
  • Re-start the computer. The disk will be checked when the system boots.
  • This will take some time to run and at times may appear stalled but just let it run.
  • When the disk check is complete, the system will re-start automatically and load Windows.

A log of the disk check is recorded only if the scheduled re-start is used, and only for drives on the same HDD as the Operating System.
To open Event Viewer and view the log:
 

  • Click the "Windows Orb" Start button -> type "eventvwr" without the quotes -> press the key.
  • The Event Viewer window will open.
  • In the left pane, expand "Windows Logs" and then click on Application.
  • In the right pane, at the top, click on the column heading Source to sort the list alphabetically.
  • Look in the Source column for "Wininit", with an entry corresponding to the date and time of the disk check.
  • Click on that Wininit entry to select it.
  • On the top main menu, click Action > Copy > Copy Details as Text.
  • Paste the contents into your next reply.

 

 

 

 

System File Check

For Windows XP:
 

  • Press the Windows- and the R-key simultanously.
  • Within the text box that jus opened, write cmd and hit Enter.

For Windows Vista/7:
 

  • Press the Windows key to open the start menu.
  • Don´t highlight anything, just write cmd.
  • The start menu will offer you an entry named cmd.
  • Right click it and select "run as administrator"


Within the opening window, write the following:
 

sfc /scannow

(See the blank within).

 

  • Hit enter. Your system will be checked for damaged system files.
  • Tell me the result of that scan in here (as the tool produces no log).

 

fixlist.txt

Link to post
Share on other sites

Thanks for all of this. I've done as you asked, and here are the results. It seems that either I'm not infected, or it's a very clever rootkit!

 

FRST output

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 15-10-2014 02Ran by Peter at 2014-10-16 14:54:11 Run:1Running from D:\PC Software\PC Utilities\MalwarebytesLoaded Profile: Peter (Available profiles: Admin & Peter & Spare Admin)Boot Mode: Normal==============================================Content of fixlist:*****************Hosts:EmptyTemp:*****************"C:\Windows\System32\Drivers\etc\hosts" => Could not move.Could not reset Hosts.EmptyTemp: => Removed 1.9 GB temporary data.The system needed a reboot. ==== End of Fixlog ====

DIsk check results (I ran this on the C:drive - there are other partitions on the same hard drive, one's used for data, one for the swap file and onthers are unused).

Log Name:      ApplicationSource:        Microsoft-Windows-WininitDate:          16/10/2014 15:47:03Event ID:      1001Task Category: NoneLevel:         InformationKeywords:      ClassicUser:          N/AComputer:      Peter-PC2Description:Checking file system on C:The type of the file system is NTFS.Volume label is SYSTEM.A disk check has been scheduled.Windows will now check the disk.                         CHKDSK is verifying files (stage 1 of 5)...  380160 file records processed.                                         File verification completed.  1037 large file records processed.                                     0 bad file records processed.                                       0 EA records processed.                                             72 reparse records processed.                                      CHKDSK is verifying indexes (stage 2 of 5)...  487750 index entries processed.                                        Index verification completed.CHKDSK is scanning unindexed files for reconnect to their original directory.Recovering orphaned file APAB1D~1.EXE (1168) into directory file 79463.Recovering orphaned file AppCrash_VueMinder.exe_9df537daa82a92726324d8fb5a1bf7e28a7705f_0df57203 (1168) into directory file 79463.Recovering orphaned file SA54D4~1.SDB (194797) into directory file 104365.Recovering orphaned file SASCORE-4-4-2013( 9-31-18 ).440.SDB (194797) into directory file 104365.Recovering orphaned file SA008C~1.SDB (212540) into directory file 104365.Recovering orphaned file SASCORE-4-2-2013( 9-31-49 ).422.SDB (212540) into directory file 104365.Recovering orphaned file {94688~1 (271883) into directory file 16063.Recovering orphaned file {94688FCB-88EF-4F2D-BAD6-213AC64F922E} (271883) into directory file 16063.  5 unindexed files scanned.                                        Recovering orphaned file {26C92~1 (274399) into directory file 16063.Recovering orphaned file {26C92D15-5ABC-4BEE-B4A3-62F16CA5275B} (274399) into directory file 16063.  0 unindexed files recovered.                                      CHKDSK is verifying security descriptors (stage 3 of 5)...Inserting an index entry with Id 4187 into index $SDH of file 9.Repairing the security file record segment.  380160 file SDs/SIDs processed.                                        Cleaning up 1784 unused index entries from index $SII of file 9.Cleaning up 1784 unused index entries from index $SDH of file 9.Cleaning up 1784 unused security descriptors.Security descriptor verification completed.  53796 data files processed.                                           CHKDSK is verifying Usn Journal...  37561728 USN bytes processed.                                            Usn Journal verification completed.CHKDSK is verifying file data (stage 4 of 5)...  380144 files processed.                                                File data verification completed.CHKDSK is verifying free space (stage 5 of 5)...  7516633 free clusters processed.                                        Free space verification is complete.Windows has made corrections to the file system.  81803978 KB total disk space.  51093152 KB in 260351 files.    155584 KB in 53797 indexes.         0 KB in bad sectors.    488710 KB in use by the system.     65536 KB occupied by the log file.  30066532 KB available on disk.      4096 bytes in each allocation unit.  20450994 total allocation units on disk.   7516633 allocation units available on disk.Internal Info:00 cd 05 00 30 cb 04 00 9a 3f 08 00 00 00 00 00  ....0....?......05 6b 00 00 48 00 00 00 00 00 00 00 00 00 00 00  .k..H...........00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................Windows has finished checking your disk.Please wait while your computer restarts.Event Xml:<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">  <System>    <Provider Name="Microsoft-Windows-Wininit" Guid="{206f6dea-d3c5-4d10-bc72-989f03c8b84b}" EventSourceName="Wininit" />    <EventID Qualifiers="16384">1001</EventID>    <Version>0</Version>    <Level>4</Level>    <Task>0</Task>    <Opcode>0</Opcode>    <Keywords>0x80000000000000</Keywords>    <TimeCreated SystemTime="2014-10-16T14:47:03.000000000Z" />    <EventRecordID>96160</EventRecordID>    <Correlation />    <Execution ProcessID="0" ThreadID="0" />    <Channel>Application</Channel>    <Computer>Peter-PC2</Computer>    <Security />  </System>  <EventData>    <Data>Checking file system on C:The type of the file system is NTFS.Volume label is SYSTEM.A disk check has been scheduled.Windows will now check the disk.                         CHKDSK is verifying files (stage 1 of 5)...  380160 file records processed.                                         File verification completed.  1037 large file records processed.                                     0 bad file records processed.                                       0 EA records processed.                                             72 reparse records processed.                                      CHKDSK is verifying indexes (stage 2 of 5)...  487750 index entries processed.                                        Index verification completed.CHKDSK is scanning unindexed files for reconnect to their original directory.Recovering orphaned file APAB1D~1.EXE (1168) into directory file 79463.Recovering orphaned file AppCrash_VueMinder.exe_9df537daa82a92726324d8fb5a1bf7e28a7705f_0df57203 (1168) into directory file 79463.Recovering orphaned file SA54D4~1.SDB (194797) into directory file 104365.Recovering orphaned file SASCORE-4-4-2013( 9-31-18 ).440.SDB (194797) into directory file 104365.Recovering orphaned file SA008C~1.SDB (212540) into directory file 104365.Recovering orphaned file SASCORE-4-2-2013( 9-31-49 ).422.SDB (212540) into directory file 104365.Recovering orphaned file {94688~1 (271883) into directory file 16063.Recovering orphaned file {94688FCB-88EF-4F2D-BAD6-213AC64F922E} (271883) into directory file 16063.  5 unindexed files scanned.                                        Recovering orphaned file {26C92~1 (274399) into directory file 16063.Recovering orphaned file {26C92D15-5ABC-4BEE-B4A3-62F16CA5275B} (274399) into directory file 16063.  0 unindexed files recovered.                                      CHKDSK is verifying security descriptors (stage 3 of 5)...Inserting an index entry with Id 4187 into index $SDH of file 9.Repairing the security file record segment.  380160 file SDs/SIDs processed.                                        Cleaning up 1784 unused index entries from index $SII of file 9.Cleaning up 1784 unused index entries from index $SDH of file 9.Cleaning up 1784 unused security descriptors.Security descriptor verification completed.  53796 data files processed.                                           CHKDSK is verifying Usn Journal...  37561728 USN bytes processed.                                            Usn Journal verification completed.CHKDSK is verifying file data (stage 4 of 5)...  380144 files processed.                                                File data verification completed.CHKDSK is verifying free space (stage 5 of 5)...  7516633 free clusters processed.                                        Free space verification is complete.Windows has made corrections to the file system.  81803978 KB total disk space.  51093152 KB in 260351 files.    155584 KB in 53797 indexes.         0 KB in bad sectors.    488710 KB in use by the system.     65536 KB occupied by the log file.  30066532 KB available on disk.      4096 bytes in each allocation unit.  20450994 total allocation units on disk.   7516633 allocation units available on disk.Internal Info:00 cd 05 00 30 cb 04 00 9a 3f 08 00 00 00 00 00  ....0....?......05 6b 00 00 48 00 00 00 00 00 00 00 00 00 00 00  .k..H...........00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................Windows has finished checking your disk.Please wait while your computer restarts.</Data>  </EventData></Event>

SFC output

C:\Windows\system32>sfc /scannowBeginning system scan.  This process will take some time.Beginning verification phase of system scan.Verification 100% complete.Windows Resource Protection did not find any integrity violations.C:\Windows\system32>
Link to post
Share on other sites

No rootkit here, but a damaged filesystem. ;)

 

 

Full System Scan with Malwarebytes Antimalware


  • If not existing, please download
Malwarebytes Anti-Malware to your desktop. Double-click the downloaded setup file and follow the prompts to install the program. At the end, be sure a checkmark is placed next to the following:

  • Launch Malwarebytes Anti-Malware
  • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.

[*]Click Finish.



If the program is already installed:

  • Run Malwarebytes Antimalware
  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.


  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

Link to post
Share on other sites

You didn't say so, but I assume that you want me to run MBAM as Admin (which I normally do).

 

I ran it, and there were no errors. Here's the clipboard.

Malwarebytes Anti-Malwarewww.malwarebytes.orgScan Date: 17/10/2014Scan Time: 14:41:41Logfile: Administrator: YesVersion: 2.00.3.1025Malware Database: v2014.10.17.04Rootkit Database: v2014.10.15.01License: FreeMalware Protection: DisabledMalicious Website Protection: DisabledSelf-protection: DisabledOS: Windows 7 Service Pack 1CPU: x64File System: NTFSUser: AdminScan Type: Threat ScanResult: CompletedObjects Scanned: 435372Time Elapsed: 11 min, 17 secMemory: EnabledStartup: EnabledFilesystem: EnabledArchives: EnabledRootkits: DisabledHeuristics: EnabledPUP: EnabledPUM: EnabledProcesses: 0(No malicious items detected)Modules: 0(No malicious items detected)Registry Keys: 0(No malicious items detected)Registry Values: 0(No malicious items detected)Registry Data: 0(No malicious items detected)Folders: 0(No malicious items detected)Files: 0(No malicious items detected)Physical Sectors: 0(No malicious items detected)(end)

This is terrible - I've just found out the problem. It's my own fault. I wasn't ticking the correct boxes in the Custom Scan. So it wasn't looking at the filesystem. In English we say "I've got egg on my face". I don't know the German for this, and my dictionary doesn't help. I owe you a HUGE apology. I hope my donation will help deflect your anger.

Link to post
Share on other sites

No anger, thank you very much! :D

 

 

Uninstall our tools using delfix

Please follow these steps in order:

  1. In the case we used Defogger to turn off your CD emulation software. You can start it again and use the Enable button.
  2. In the case we used Combofix. Deactivate your antivirus software once more, then rename the combofix.exe to uninstall.exe and run it one last time. You shall be noted that Combofix has been removed.
  3. In any case please download delfix to your desktop.
    • Close all other programms and start delfix.
    • Please check all the boxes and run the tool.
    • delfix will now delete all found traces of our removal process

[*] If there is still something left please delete it manualy.





Delete System Restore Points

To ensure your System Restore Points are free of malware, we will delete all of them but the most recent or create a new one.

On Windows Vista: Please follow these instructions to delete all but the most common System Protection Restore Points.
On Windows 7/8: Please follow these instructions to delete all but the most common System Protection Restore Points.
On Windows XP: Please follow these instructions to delete all but the most common System Protection Restore Points.




Temp File Cleaner

We need to download Temp File Cleaner (TFC) by OldTimer:

  • Please download TFC.exe by Oldtimer at one of the two links: Link 1 Link 2
  • Save and close all running applications
  • Double-click on TFC.exe to run the program
  • Click on Start to begin the cleaning process note: this program may close running applications, make your screen disappear temporarily, or require a reboot of your PC - this is normal and part of the cleanup
  • When the scan is complete, if you were not asked to reboot the computer, please do so now

More Information can be found about the tool here: http://www.geekstogo.com/forum/files/file/187-tfc-temp-file-cleaner-by-oldtimer/

 

 

 

Recommendations: How to protect yourself

  • System Updates
    Please ensure to have automatic updates activated in your control panel.
    For further information and a tutorial, see this Microsoft Support article.
  • Protection
    What you need is one (not more) virus scanner with background protection. Additionally I recommend a special malware scanner to run on demand weekly.
    Personally I am using avast! Antivirus Free Edition and Malwarebytes Anti-Malware. They offer good protection for free.
    • To keep your browser free of advertising, you may install the Adblock Plus browser extension.
      It will filter unwanted advertising out of the website´s content.
    • To protect yourself from accidentally visiting malicious web sites, install the Web of Trust (WOT) browser extension.
      It will display a green (safe), yellow (unknown) or red (potentially dangerous) icon for a visited website within your browser.
      In addition, before accessing a dangerous classified web site, a warning screen is displayed.

    [*]Up to date Software
    Keep your Windows and your third party software up to date. The easiest way to get infected is an outdated windows, followed by: browser(s) (including add-ons and plug-ins), Adobe Flash Player and Adobe Reader, Java Runtime Environment, your antivirus program and so on. These links may help you to check:

    [*]Backup
    Hardware issues, malware, fire, lightning strike: There is a long list of different ways to loose all your data. Back up your files regularly. Use the windows internal backup function or a third party tool and save your data onto an external hard drive, cloud storage, optical media like CDs or DVDs or (if available) a professional network backup system. [*]Behaviour
    The commonest error when using a computer is "error 80" - what means that the error is located about 80cm in front of the monitor. This is a common joke between IT support technicians but it shows that all the safety mechanisms won´t help if you aren´t careful enough.

    • While surfing the internet, don´t click on anything you don´t know. In the worst case, it infects your system with malware.
    • Watch your step in social networks! Many cyber criminals use them to spread malware, mine personal pata (to be sold to advertising companies, for example) or simply do damage to other users. Even if a received hyperlink within a message seems to be coming from one of your friends, have a closer look. In addition, don´t click everything.
    • When installing software, have a look to each of the setup windows and uncheck any additional toolbars or free programs that may be offered additionally. Most of today´s setup procedures contain potentially unwanted programs so keep them off your system.
    • Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.
      They are a security risk which can make your computer susceptible to a wide variety of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.



Link to post
Share on other sites

  • 1 month later...

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.