Posted 21 August 2011 - 10:50 AM
Posted 21 August 2011 - 11:12 AM
Say, a couple of interesting things just happened while I was waiting.
I was running the unhide, and I noticed that the shortcut icons were all back to the state they should be, showing the correct pictures. Not sure when that happened, but it was recent, maybe even the unhide itself.
After the unhide ran I looked and didn't see any mystery drives shown. (Just "C", and a documents folder.)
So I rebooted to see what would happen. It shut down very quickly, much more so than normal. (Which is good, I have felt for a while that it was taking a long time to shut down which makes me suspicious.) Then when it started up again, it took forever, as it has since I got this thing. I clicked on "my computer" and it just hung for a while. (That flashlight shining back and forth endlessly.) When the machine finally fully booted, there was no change, couldn't see any mystery drives. BUT...
The icons have reverted to non-pictures again. (Except the ones I had fixed by hand.)
Also, and more curiously, when it first started up it said the firewall was install when I clicked on the security thingy in the lower right. Then it changed to "off" all my itself, and the little nag balloon popped up and had changed to a warning about no AV- and no firewall. Hmmmm.
Anyways, I'll work on the restore console.
Posted 21 August 2011 - 11:51 AM
I thought about it about it a bit- and then renamed Combofix to a random name, and it let me put that on the desktop. I dropped the Microsoft file you had me download into that, and it seems to be working. (Had me say "yes" to an end user agreement, seems to be installing ...
Now it says congratulations, recovery console installed. Let's see if I can reboot and get into it....
Posted 21 August 2011 - 12:03 PM
Download GMER from http://www.gmer.net/download.php Note the file's name and save it to your root folder, such as C:\.
- Disconnect from the Internet and close all running programs.
- Temporarily disable any real-time active protection so your security program drivers will not conflict with this file.
- Click on http://www.bleepingcomputer.com/forums/topic114351.html to see a list of programs that should be disabled.
- Double-click on the downloaded file to start the program. (If running Vista, right click on it and select "Run as an Administrator")
- Allow the driver to load if asked.
- You may be prompted to scan immediately if it detects rootkit activity.
- If you are prompted to scan your system click "No", save the log and post back the results.
- If not prompted, click the "Rootkit/Malware" tab.
- On the right-side, all items to be scanned should be checked by default except for "Show All". Leave that box unchecked.
- Select all drives that are connected to your system to be scanned.
- Click the Scan button to begin. (Please be patient as it can take some time to complete)
- When the scan is finished, click Save to save the scan results to your Desktop.
- Save the file as Results.log and copy/paste the contents in your next reply.
- Exit the program and re-enable all active protection when done.
We Need to check for Rootkits with RootRepeal
- Download RootRepeal from the following location and save it to your desktop.
- Zip Mirrors (Recommended)
[*]Extract RootRepeal.exe from the archive.
Right click on rootrepeal.zip and Extract All. Then move to the folder it created and find rootrepeal.exe and run it.
[*]Open on your desktop.
[*]Click the tab.
[*]Click the button.
[*]Check all seven boxes:
[*]Check the box for your main system drive (Usually C:), and press Ok.
[*]Allow RootRepeal to run a scan of your system. This may take some time.
[*]Once the scan completes, push the button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.
Please download and unzip Icesword to its own folder on your desktop
If you get a lot of "red entries" in an IceSword log, don't panic.
Step 1 : Close all windows and run IceSword. Click the Processes tab and watch for processes displayed in red color. A red colored process in this list indicates that it's hidden. Write down the PathName of any processes in red color. Then click on LOG at the top left. It will prompt you to save the log, call this Processes and save it to your desktop.
Step 2 : Click the Win32 Services tab and look out for red colored entries in the services list. Write down the Module name of any services in red color, you will need to expand out the Module tab to see the full name. Then click on LOG. It will prompt you to save the log, call this Services and save it to your desktop.
Step 3 : Click the Startup tab and look out for red colored entries in the startup list. Write down the Path of any startup entries in red color. Then click on LOG. It will prompt you to save the log, call this Startup and save it to your desktop.
Step 4 : Click the SSDT tab and check for red colored entries. If there are any, write down the KModule name.
Step 5 : Click the Message Hooks tab and check for any entries that are underneath Type and labelled WH_KEYBOARD. Write down the Process Path of these entries if present.
Now post all of the data collected under the headings for :
Now for the fix. Close all windows and disconnect from the Internet. Run IceSword.exe. Do not restart your PC until the very end to ensure the fix works
Step 1 : Click the Processes tab and right-click on the following red colored processes one by one and choose "Terminate Process". This will kill the rooted processes.
PLACE FILES HERE
Step 2 : Click the Win32 Services tab. Since the rooted processes are already terminated, the rootkit service will be stopped automatically. The service will not be hidden now and so it will not be displayed in red color. Since the service name was already noted down in Step 2, there will not be problem in finding it on the list. Now, right-click on this service and choose "Disabled" to permanently disable this service.
PLACE FILES HERE
Step 3 : Now, we have to delete the rooted files. Click the File button. This will display a Windows Explorer type interface. Navigate to the following file(s) in bold and delete them.
PLACE FILES HERE
Step 4 : Now, we have to delete the rooted registry keys. Click the Registry button. This will display a regedit type interface. Navigate to the following registry keys in bold and delete them.
PLACE FILES HERE
Then reboot your PC and run IceSword again. Save new logs from the "Processes", "Win32 Services", and "Startup" functions, taking note of any red entries from them and from the SSDT tab.
Posted 21 August 2011 - 12:13 PM
It asked me *which* Windows installation I would like to log onto:
wow! "E:Windows". Invasion of the Bodysnatchers, or what? Now I think if I go look in the kitchen- there is a guy who looks just like me going through the fridge. Only he's not me- he's an impostor.
Posted 21 August 2011 - 12:18 PM
Dang. That's unfortunate, (not for you but for me), because...
"Let me give you some other scans to do:"
Running all these scans are all well and good and everything- but if there is a hidden drive- they won't know to do anything with it and it's all for nothing, right?
Posted 21 August 2011 - 12:57 PM
Posted 21 August 2011 - 01:02 PM
Posted 21 August 2011 - 01:08 PM
and it should show you details.
Posted 21 August 2011 - 01:13 PM
Posted 21 August 2011 - 01:13 PM
and it should show you details."
I'll give that a try.
Posted 21 August 2011 - 01:24 PM
I can't type anything- other than choose which Windows.
When I get into recovery console, it says which Windows installation to log onto, and the answer must be a single character. It wants me to chose "1" for "C\Windows", or "2" for "E\Windows".
Posted 21 August 2011 - 01:43 PM
I think this illustrates the essence of this virus. If you Google this, you will find all these "help me" pages, where people are trying to get rid of the Zeroaccess virus, (aka "Max++ virus"), all looking in the wrong place.
How is someone going to get rid of a virus installed on a hidden partition, such as "Drive E", but running logs showing all the other drives except the hidden one?
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users