Jump to content
simplyred

Possible rootkit keeps re-installing programs

Recommended Posts

IMG_20180516_200541.thumb.jpg.78e6d470957b3bf328927d8f0d6166d0.jpg

IMG_20180516_194219.thumb.jpg.b7f600fad90a863a6063fae0cac42066.jpg

Hello:

Sorry if this has been asked before. I've already searched but since I don't know the name of this malware, I can't find it.

There's a possible rootkit that keeps reinstalling programs on my Windows 7. These programs are "Safe finder" "Butler" and some others. When I uninstall these programs, they appear againg shortly after, and they keep opening by themselves and my browsers keep opening new tabs that lead to spam.

I've tried using Malwarebytes and it removes these programs really fast. But when the computer restarts after the cleaning, the programs appear again.

I've found the icon displayed on the photos on the toolbar and when I shut down the computer. And it seems to be running on the backround installing something. My guess is those programs. Anyone knows what it is and/or how to remove it?

Thank you!

Edited by simplyred

Share this post


Link to post
Share on other sites

Hello @simplyred and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Share this post


Link to post
Share on other sites

Hi Ron. Thank you so much for your speedy reply.

I couldn't run Malwarebytes despite downloading the latest version. But here are the logs for the next two steps.

As it happened yesterday, after running adwcleaner, all apps were deleted and re installed agan.

AdwCleaner[C03].txt

Addition.txt

FRST.txt

Share this post


Link to post
Share on other sites

Did you create all these Administrator accounts? Is this a business computer?

27230171 (S-1-5-21-1713209809-2354955906-521802131-1003 - Administrator - Enabled) => C:\Users\27230171
27677583 (S-1-5-21-1713209809-2354955906-521802131-1002 - Administrator - Enabled) => C:\Users\27677583
30633774 (S-1-5-21-1713209809-2354955906-521802131-1008 - Administrator - Enabled) => C:\Users\30633774
30728541 (S-1-5-21-1713209809-2354955906-521802131-1001 - Administrator - Enabled) => C:\Users\30728541
31899551 (S-1-5-21-1713209809-2354955906-521802131-1006 - Administrator - Enabled) => C:\Users\31899551
37802781 (S-1-5-21-1713209809-2354955906-521802131-1009 - Administrator - Enabled) => C:\Users\37802781

 

Share this post


Link to post
Share on other sites

Hi Ron. I didn't create the accounts. The computer was at a point used as a business computer for a small family business, but now everyone uses it as a regular computer.

Share this post


Link to post
Share on other sites

The computer has a rootkit. This is going to take a bit of work to get cleaned up. Do you have access to another clean computer?

This process below will not remove the rootkit but it should clean up a lot of junk from the computer. Then you'll need access to a clean computer to build a USB stick to help remove the rootkit.

 


Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

 

 

Share this post


Link to post
Share on other sites

Hello Ron! Here's the log after the fix.

I do have access to a clean computer!

Thank you!

Fixlog.txt

Edited by simplyred

Share this post


Link to post
Share on other sites

If your computer does not have the Windows Recovery Environment installed and available you can use the following method to run the Recovery Environment from a bootable USB disk.

NOTE: This USB disk needs to be created from a clean computer. You cannot use an infected computer for this process

NOTE: An 8GB USB 2.0 stick is required or at least recommended. In some cases a USB 3.0 disk can be used but some computers have issues booting from USB 3.0 disks.

Example drive (no endorsement implied, example only) - This drive example has not been tested by me. It is an older 2015 model with many good reviews though.
Amazon: Kingston 8GB DataTraveler 101 G2 USB 2.0 Flash Drive (DT101G2/8GBZ)
NewEgg: Kingston 8GB DataTraveler 101 G2 USB 2.0 Flash Drive (DT101G2/8GBZ)


STEP 1
Download a Windows 10 ISO image from Microsoft.

Method A: Using the Microsoft Media Creation Tool
https://www.microsoft.com/en-gb/software-download/windows10
Download the Media Creation Tool: https://go.microsoft.com/fwlink/?LinkId=691209

Follow the instructions displayed on the tool to download the Windows 10 ISO image.

In my testing I was not prompted for a license key to download the latest Windows 10 ISO image.
At the time of this writing 2017/12/21 there was only one ISO image offered. Windows 10

32-bit x86  or  64-bit x64

Note: You need to run the version compatible with your system.
You can check here if you're not sure if your computer is 32-bit or 64-bit
 

Method B: If Method A: above is not working for you then you can try the following method
Microsoft Windows and Office ISO Download Tool (this is not an authorized Microsoft tool, but appears to be legal)
https://www.heidoc.net/joomla/technology-science/microsoft/67-microsoft-windows-and-office-iso-download-tool
Download: https://www.heidoc.net/php/Windows%20ISO%20Downloader.exe

STEP 2
If you were unable to use the Windows Media Creation Tool in STEP 1 to create a USB disk then you can use this tool to burn the Windows 10 ISO image from STEP 1 above.

Download the Windows USB/DVD Download Tool from Gitbub and save to your computer.
English version: https://github.com/mantas-masidlauskas/wudt/raw/master/Downloads/Windows7-USB-DVD-Download-Tool-Installer-en-US.exe

Then install the Windows USB/DVD Download Tool and run it to burn a bootable USB disk from the ISO image. Browse to the location where you saved the Windows 10 ISO image in STEP 1
Note: This tool should work on XP, Vista, Windows 7, or Windows 10 - it is simply used to make a bootable USB disk. Remember, all of this needs to be done on a clean computer.

MCWx4mf.jpg

5IvFX1o.jpg

1hzeggf.jpg

g1iLLSH.jpg

KkzebK6.jpg

 
STEP 3
Please download the Farbar Recovery Scan Tool and save it to your desktop or other location you know where it's saved to. Then copy it to the USB disk you just created.

Note: You need to run the version compatible with your system.
You can check here if you're not sure if your computer is 32-bit or 64-bit

STEP 4
Shut down the infected computer. Do Not insert the USB disk you created until the infected computer has been shut down.
Once the computer is shut down then insert the newly created Windows 10 USB disk into the infected computer and power it back on and press the appropriate key to bring up the boot menu. The link below will help show you which key for various computers manufacturers is used to bring up the boot menu. Most will be either USB or UEFI depending on hardware and settings. If the computer boots up into the Normal Windows instead of the USB stick it may become infected and need to be completely redone again. Make sure you select the correct boot option.

How to Boot Your Computer from a USB Flash Drive

STEP 5
Once the computer starts to boot up from the USB disk, follow the screens and directions below.

Gvt31DC.jpg

wk8hs0E.jpg

F2gCAoF.jpg

X8NEEvb.jpg

You will need to open NOTEPAD.EXE to help find out which drive is your Windows drive and which drive is your USB disk drive you just created

O27kz3e.jpg

RRI6og4.jpg

For the more advanced user you could also use DISKPART to help locate which drive is mapped to your USB disk. In most cases the USB disk will be either ? or E: but depending on hardware the drive could be a much higher level such as H: or higher.

Example only - your hardware will look different

DISKPART> list volume
	  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
  Volume 0     Z                       DVD-ROM         0 B  No Media
  Volume 1     C                NTFS   Partition    931 GB  Healthy    System
  Volume 2     Q   SEA-USB-4.0  NTFS   Partition   3725 GB  Healthy
  Volume 3     D                NTFS   Removable   7636 MB  Healthy


Go back to the DOS Command Prompt (if you used DISKPART type in Exit and press the Enter key) and type in the following and press the Enter key.

CD /D  ? (or E: or whichever drive letter the USB stick is on)

Then type in CD\
and press the Enter key to get to the root or top of the USB disk.

Then type in FRST   or   FRST64  (depending on which version your computer uses) and click the Scan button.

A log called FRST.txt will be saved on your USB Flash Drive. Attach it in your next reply.

If all went well you should now be able to boot into Normal Mode and run Malwarebytes and run a Threat Scan to have it finish the removal process.

 

Share this post


Link to post
Share on other sites

Hi Ron!

Sorry for the delay, I'll get right on that.

I have a 16GB second generation USB flash drive. Will it be functional as a storage device after doing this?

Sorry if this a dumb question!

Regards,

Daniel.

Share this post


Link to post
Share on other sites

Hello again. I'm having a little issue.

This link seems to be unavailable. And the entire craftedflash page is too. Could you direct me to another instructive?

On 5/19/2018 at 3:38 AM, AdvancedSetup said:

How to Boot Your Computer from a USB Flash Drive

Thank you so much,

Daniel.

Edit: Seems like we both posted at almost the same time. Alright, I'll format it after this is done. Thanks!

Edited by simplyred
Posting too soon

Share this post


Link to post
Share on other sites

Bummer that link is down. Basically it just shows different key combinations for different computers to bring up the boot menu of it does not boot from USB

If you need help with it not booting to USB then let me know the exact MFG, Make, and Model and I'll look it up for you.

Ron

 

Share this post


Link to post
Share on other sites

Hi Ron, sorry about the super late response.

I booted the computer via the flash drive and run FRST. Here are the results. After that, I could run Malwarebytes, and it deleted a bunch of stuff.

Cheers,

Daniel

FRST.txt

Results.txt

Share this post


Link to post
Share on other sites

Well, better late than never @simplyred

Let's go ahead then and run a full set of scans again to see what might be left over.

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Share this post


Link to post
Share on other sites

The logs show that the computer is still infected. Please follow the previous steps exactly as shown above again. Don't insert the USB stick until the computer is shut down and then started again. Post #8

C:\Windows\system32\drivers\qgjjqfps.sys -> Access Denied <======= ATTENTION

Thanks

Ron

 

Share this post


Link to post
Share on other sites

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Share this post


Link to post
Share on other sites

Hello Ron.

Here are the new results:

However, when I check the “search for rootkits” box on the “Protection” tab on Malwarebytes, the analysis is interrupted when the computer suddenly crashes and displays the following blue screen message:

Page Fault in Nonpaged Area

Cheers,

Daniel.

FRST.txt

Malwarebytes analisis.txt

Share this post


Link to post
Share on other sites

Please try running the following

 

Then run this rootkit scanner as well

 

Please download the following scanner from Kaspersky and save it to your computer: TDSSkiller

Then watch the following video on how to use the tool and make sure to temporarily disable your security applications before running TDSSkiller.

PC Winvids - How to run Kaspersky TDSSKiller

If any infection is found please make sure to choose SKIP and post back the log in case of a False Positive detection.

Once the tool has completed scanning make sure to re-enable your other security applications.

Thank you

Ron

 

 

Share this post


Link to post
Share on other sites

Done:

MBAR was able to run and found nothing.

But TDDSkiller wasn't able to finish the scan due to another blue screen. This time it was 'Critical structure corruption'. It did find two treats before the computer shut down, wich I hope are in the log. 

Cheers,

Daniel.

mbar-log-2018-09-25 (11-29-56).txt

system-log.txt

TDSSKiller.3.1.0.17_25.09.2018_14.29.36_log.txt

Share this post


Link to post
Share on other sites

Okay, looks like the computer either got reinfected or was not able to fully replace bad files. Do you have access to the installation DVD for Windows 7 ?

Please try the following.

Click on Start and type in CMD.EXE when it shows on the menu, right click and select "Run as administrator"
Then type in the following and press the Enter key. It will check and try to repair missing or invalid OS files.

SFC   /SCANNOW

Let me know the results and also run a new FRST scan and make sure you place a check mark in the Additions.txt check box and attach back both new logs.

 

Share this post


Link to post
Share on other sites

Slight update:

I tried to run TDDSkiller again, and this time, it did finish without the computer shutting down. Here are the results.

 

Regarding answer #22 to this thread, I don't have the Windows 7 DVD.

I'm standing by about the command prompt thing until you tell me to in case this log changes anything.

TDSSKiller.3.1.0.17_25.09.2018_15.17.45_log.txt

Share this post


Link to post
Share on other sites

Please run the TDSSKiller again. Then go ahead and have it remove this item.

polpjude ( UDS:DangerousObject.Multi.Generic ) -

Then go ahead and run the SFC command and reboot. Then run the new FRST scans once the SFC is done and the computer has been rebooted.

 

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.