Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Zero Access Alternate File System Jail


  • This topic is locked This topic is locked
10 replies to this topic

#1 unwillingmark

unwillingmark

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:05:57 AM

Posted 14 May 2012 - 02:32 PM

This is the second of two systems I need assistance cleaning. I have included a TDDSkiller log from just after I installed the OS (Win 7 Home 64 Bit) and one from today. Compare the partitioning of the disk... UGH. I do see the hidden file with the 16 digit numerical name and 16 digit file extention! Internet access is now history on the machine.

Included also is a new set of OTL logs, an Avast MBR log and a zipped MBR.dat file.

BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 15 May 2012 - 07:49 AM

Do this scan on the computer.

Please download ComboFix from any of the links below, and save it to your desktop. For information regarding this download, please visit this web page: http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Link 1
Link 2


* IMPORTANT !!! Save ComboFix.exe to your Desktop

IMPORTANT....

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Do not install any other programs until this if fixed.


How to : Disable Anti-virus and Firewall...
http://www.bleepingcomputer.com/forums/topic114351.html

Double click on ComboFix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt
Note:
Do not mouse click ComboFix's window while it's running. That may cause it to stall


Note: If you have difficulty properly disabling your protective programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

#3 unwillingmark

unwillingmark
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:05:57 AM

Posted 15 May 2012 - 11:29 AM

I have run Combofix as requested and cannot click anything because the links to everything is gone (...key set for deletion error). Do you want me to reboot? Please advise.

Thanks. Btw, is this MBR file clean as well as the other machine?

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 15 May 2012 - 01:26 PM

A restart may be required to it now.

Yes the MBR looks clean.

#5 unwillingmark

unwillingmark
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:05:57 AM

Posted 15 May 2012 - 03:52 PM

Herew is the Combofix log.

If this helps, it seems control of the fake desktop I'm using from the Malware partition has it's hooks in group policy.... [attachment=123849:combofix.txt]

#6 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 16 May 2012 - 06:38 AM

If this helps, it seems control of the fake desktop I'm using from the Malware partition has it's hooks in group policy


That is new to me.

Can you export that group policy for my review?
===

Lets have a look at your partitions.

Please download this ListPart.exe to a folder of you choice. Select the proper tool for your system.

For x86 (x32) bit systems please download Listparts
For x64 bit systems please download Listparts64
Run the tool as an Administrator , click Scan and copy and post the log (Result.txt) in your next reply.

#7 unwillingmark

unwillingmark
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:05:57 AM

Posted 16 May 2012 - 12:19 PM

Here is the part scan.

ListParts by Farbar Version: 12-03-2012 03
Ran by slayer (administrator) on 16-05-2012 at 10:40:36
Windows 7 (X64)
Running From: C:\Users\slayer\Desktop
Language: 0409
************************************************************

========================= Memory info ======================

Percentage of memory in use: 14%
Total physical RAM: 6143.3 MB
Available physical RAM: 5281.01 MB
Total Pagefile: 12284.79 MB
Available Pagefile: 11399.99 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

======================= Partitions =========================

1 Drive c: () (Fixed) (Total:918.17 GB) (Free:897.7 GB) NTFS
2 Drive d: (RECOVERY) (Fixed) (Total:13.25 GB) (Free:12.68 GB) NTFS ==>[System with boot components (obtained from reading drive)]

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 931 GB 0 B
Disk 1 No Media 0 B 0 B
Disk 2 No Media 0 B 0 B
Disk 3 No Media 0 B 0 B
Disk 4 No Media 0 B 0 B

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 13 GB 1024 KB
Partition 2 Primary 100 MB 13 GB
Partition 3 Primary 918 GB 13 GB

======================================================================================================

Disk: 0
Partition 1
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 D RECOVERY NTFS Partition 13 GB Healthy

======================================================================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 System Rese NTFS Partition 100 MB Healthy System (partition with boot components)

======================================================================================================

Disk: 0
Partition 3
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 C NTFS Partition 918 GB Healthy Boot

======================================================================================================

Windows Boot Manager
--------------------
identifier {9dea862c-5cdd-4e70-acc1-f32b344d4795}
device partition=\Device\HarddiskVolume2
description Windows Boot Manager
locale en-US
inherit {7ea2e1ac-2e61-4728-aaa3-896d9d0a9f0e}
default {2982a6cf-bcb7-11df-b07b-a0f2115ccc9a}
resumeobject {2982a6ce-bcb7-11df-b07b-a0f2115ccc9a}
displayorder {2982a6cf-bcb7-11df-b07b-a0f2115ccc9a}
toolsdisplayorder {b2721d73-1db4-4c62-bf78-c548a880142d}
timeout 30

Windows Boot Loader
-------------------
identifier {2982a6cf-bcb7-11df-b07b-a0f2115ccc9a}
device partition=C:
path \Windows\system32\winload.exe
description Windows 7
locale en-US
inherit {6efb52bf-1766-41db-a6b3-0ee5eff72bd7}
recoverysequence {2982a6d0-bcb7-11df-b07b-a0f2115ccc9a}
recoveryenabled Yes
osdevice partition=C:
systemroot \Windows
resumeobject {2982a6ce-bcb7-11df-b07b-a0f2115ccc9a}
nx OptIn

Windows Boot Loader
-------------------
identifier {2982a6d0-bcb7-11df-b07b-a0f2115ccc9a}
device ramdisk=[C:]\Recovery\2982a6d0-bcb7-11df-b07b-a0f2115ccc9a\Winre.wim,{2982a6d1-bcb7-11df-b07b-a0f2115ccc9a}
path \windows\system32\winload.exe
description Windows Recovery Environment
inherit {6efb52bf-1766-41db-a6b3-0ee5eff72bd7}
osdevice ramdisk=[C:]\Recovery\2982a6d0-bcb7-11df-b07b-a0f2115ccc9a\Winre.wim,{2982a6d1-bcb7-11df-b07b-a0f2115ccc9a}
systemroot \windows
nx OptIn
winpe Yes
custom:46000010 Yes

Resume from Hibernate
---------------------
identifier {2982a6ce-bcb7-11df-b07b-a0f2115ccc9a}
device partition=C:
path \Windows\system32\winresume.exe
description Windows Resume Application
locale en-US
inherit {1afa9c49-16ab-4a5c-901b-212802da9460}
filedevice partition=C:
filepath \hiberfil.sys
debugoptionenabled No

Windows Memory Tester
---------------------
identifier {b2721d73-1db4-4c62-bf78-c548a880142d}
device partition=\Device\HarddiskVolume2
path \boot\memtest.exe
description Windows Memory Diagnostic
locale en-US
inherit {7ea2e1ac-2e61-4728-aaa3-896d9d0a9f0e}
badmemoryaccess Yes

EMS Settings
------------
identifier {0ce4991b-e6b3-4b16-b23c-5e0d9250e5d9}
bootems Yes

Debugger Settings
-----------------
identifier {4636856e-540f-4170-a130-a84776f4c654}
debugtype Serial
debugport 1
baudrate 115200

RAM Defects
-----------
identifier {5189b25c-5558-4bf2-bca4-289b11bd29e2}

Global Settings
---------------
identifier {7ea2e1ac-2e61-4728-aaa3-896d9d0a9f0e}
inherit {4636856e-540f-4170-a130-a84776f4c654}
{0ce4991b-e6b3-4b16-b23c-5e0d9250e5d9}
{5189b25c-5558-4bf2-bca4-289b11bd29e2}

Boot Loader Settings
--------------------
identifier {6efb52bf-1766-41db-a6b3-0ee5eff72bd7}
inherit {7ea2e1ac-2e61-4728-aaa3-896d9d0a9f0e}
{7ff607e0-4395-11db-b0de-0800200c9a66}

Hypervisor Settings
-------------------
identifier {7ff607e0-4395-11db-b0de-0800200c9a66}
hypervisordebugtype Serial
hypervisordebugport 1
hypervisorbaudrate 115200

Resume Loader Settings
----------------------
identifier {1afa9c49-16ab-4a5c-901b-212802da9460}
inherit {7ea2e1ac-2e61-4728-aaa3-896d9d0a9f0e}

Device options
--------------
identifier {2982a6d1-bcb7-11df-b07b-a0f2115ccc9a}
description Ramdisk Options
ramdisksdidevice partition=C:
ramdisksdipath \Recovery\2982a6d0-bcb7-11df-b07b-a0f2115ccc9a\boot.sdi


****** End Of Log ******

#8 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 16 May 2012 - 01:15 PM

Your log is clean.

Can you export that group policy for my review?

If you need help to export this key let me know.

I do see the hidden file with the 16 digit numerical name and 16 digit file extention! Internet access is now history on the machine.

What can you give me on this. I have nothing to verify.

#9 unwillingmark

unwillingmark
  • Topic Starter

  • Members
  • 26 posts
  • OFFLINE
  •  
  • Local time:05:57 AM

Posted 17 May 2012 - 09:16 AM

Everywhere i look is clean. Internet access is good. Performanceis fine.

#10 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 17 May 2012 - 12:38 PM

Gad we could help.

Time for some housekeeping

The following will implement some cleanup procedures as well as reset System Restore points:

Click Start > Run and copy/paste the following bold text into the Run box and click OK:

ComboFix /Uninstall
===

Delete the other tools we used.

#11 nasdaq

nasdaq

  • Malware Response Team
  • 40,171 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:57 AM

Posted 24 May 2012 - 12:32 PM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users