Hello,
Good, now I can use their logs to map my strategy.
The primary diagnostic tool FRST does not show the presence of malware nor any sign of RootKit activities. But none the less, GMER does show a few suspicious behavior as well as unknown MBR. This does not necessarily mean the bad RootKit but this requires some comprehensive ARK (aka. antirootkit) attack.
We shall initially deploy FixList to tell the FRST tool to preform some pre-cleaning. Then we shall strike with preconfigured TDSSKiller and configured MBAR. Both tools are ARK based. Let’s start …
— — — — — —
=> Creating FixList script for FRST
1. Open notepad and copy/paste the text present inside the code box below.
To do this highlight the contents of the box and right click on it. Paste this into the open notepad.
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to the operating system
Start
File: C:\Windows\system32\winrm.vbs
File: C:\Windows\system32\AUDIODG.EXE
VerifySignature: C:\Windows\system32\AUDIODG.EXE
C:\Users\W500-User\AppData\Local\Temp\*.dll
C:\Users\W500-User\AppData\Local\*.tmp
C:\Users\W500-User\AppData\Local\Temp\*.exe
CMD: RD /S /Q %TEMP%
End
2. Save notepad as fixlist.txt to your Desktop.
NOTE: => It’s important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
3. Run FRST/FRST64 and press the Fix button just once and wait.
If the tool needed a restart please make sure you let the system to restart normally and let the tool completes its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.
Note: If the tool warned you about the outdated version please download and run the updated version.
— — — — — —
=> Configuring and running TDSSKiller
Please download TDSSKiller and save it to your desktop
Execute TDSSKiller.exe by doubleclicking on it and then click on Change parameters.
[*] Put a checkmark beside loaded modules.
[*] A reboot will be needed to apply the changes. Do it!
TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
[*] Then, again click on Change parameters in TDSSKiller.
[*] Check all boxes then click OK.
[*] Click the Start Scan button.
- If a suspicious object is detected, the default action will be Skip, click on Continue.
- If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
[*] Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
A report will be created in your root directory, (usually C:\ folder) in the form of “TDSSKiller.[Version][Date][Time]_log.txt”.
[*] Please attache the contents of that file here.
— — — — — —
=> Configuring and running MBAR and preforming the fixdamage.exe fixes
Please download Malwarebytes AntiRootkit (MBAR) and save it to your desktop.
[i]For full instructions how MBAR works, read this article
> Doubleclick on the MBAR file (
http://www.mcshield.net/personal/magna86/Images/mbar.png
) and allow it to run.
• Click OK on the next screen, to allow the package to extract the contents of the file to its own folder named mbar.
• mbar.exe will launch automatically. On some systems, this may take a few extra seconds. Please be patient and wait for the program to open.
• After reading the Introduction, click Next if you agree.
• On the Update Database screen, click on the Update button. Once you see ‘Success: Database was successfully updated’ click on Next
• Under Scan Targets ensure all boxes are ticked. Then click the Scan button.
Notice: with some infections, you may see two messages boxes:
- ‘Could not load protection driver’. Click ‘OK’.
- ‘Could not load DDA driver’. Click ‘Yes’ to this message, to allow the driver to load after a restart. Allow the computer to restart. Continue with the rest of these instructions.
>> If malware is not detected, click the Exit button to close the program and post the mbar-log-year-month-day.txt and system-log.txt reports.
>> If an infection/s are found ensure Create Restore Point are ticked. Then select the "Cleanup! button to remove threats.
• The clean up procedure will be scheduled for process, pop-up will be shown.
Select the Yes button and the system should re-boot to complete the cleaning process.
>> Notice: only if an RootKit are detected, ensure to run fixdamage.exe tool located in mbar folder, \Plugins\fixdamage.exe
- Run fixdamage.exe, at the black window to continue type Y (alias for Yes). Wait few seconds for execution …
- When you see “press any key to exit” fix is completed, press any key to close the window. Reboot the system.
> The following reports will be created in mbar folder:
- mbar-log-year-month-day (hour-minute-second).txt
- system-log.txt
Please post both logs in your next reply.