Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

FBI virus only boots in safe mode command prompt


  • Please log in to reply
31 replies to this topic

#1 Thomas840

Thomas840

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 04:38 PM

I woke up this morning to the FBI virus on my Dell Desktop. It will only boot in safe mode command prompt. Does anyone have any suggestions? Any help is greatly appreciated



BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:38 PM

Posted 23 March 2013 - 04:54 PM

Run these commands in the command window(bold ones)

 

net user test /add

press ENTER

net localgroup administrators test /add

press ENTER

 

Restart the PC and let me know if you can boot into test account


Edited by narenxp, 23 March 2013 - 04:54 PM.


#3 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 05:58 PM

How do I reboot from command prompt in windows 7. I did what you said and the only way I have to restart it is to use the power button on the tower and when it comes on I have to boot normally boot safe mode etc. I let it reboot normally on its own and it booted up to the FBI screen immediately so there was no change if I did it right.



#4 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:38 PM

Posted 23 March 2013 - 06:00 PM

Did both the commands showed successful message?

 

Even if you reboot manually ,test account should come up.Do you have malwarebytes installed on your PC?



#5 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:10 PM

I am not sure if it said it was successfull or not.. It didnt say anything about successful but it said something to the effect of "the syntax of this command is: NET USER [username[password:*} and I dont remember the rest. The second message was similar to the first. I do have malwarebytes installed but havent used the pc in a few weeks and it was probably outdated then. If you would like I can try what you said about the test account and let you know exactly what it says.


Edited by Thomas840, 23 March 2013 - 06:14 PM.


#6 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:38 PM

Posted 23 March 2013 - 06:14 PM

.


Edited by narenxp, 23 March 2013 - 07:15 PM.


#7 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:23 PM

I will try it again real quick.



#8 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:35 PM

I typed in netusertest /add it says 'netusertest' is not recognized as an internal or external command, operable program or batch file.



#9 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:36 PM

Disregard thet. I just realized my mistake. One moment and I will type it in right



#10 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:38 PM

Posted 23 March 2013 - 06:36 PM

It is not netusertest

 

The command is  net user test.Spaces between words are important



#11 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:39 PM

Ok it was successful and now it shows my user account and test at login screen



#12 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 06:42 PM

I was able to log in to the test account successfully



#13 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:06:38 PM

Posted 23 March 2013 - 07:14 PM

  • Please download TDSSKiller from here and save it to your Desktop
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters


    tds2.jpg
  • Check Loaded Modules and Detect TDLFS file system. Do not check Verify file digital signatures (even though it is checked in the example)
  • If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now


    2012081514h0118.png
  • Click Start Scan and allow the scan process to run
  • If threats are detected select Skip for all of them unless I instruct you otherwise
  • Click Continue


    tds6.jpg
  • Click Reboot computer
  • Please post the contents of TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)in your reply
  • Due to forum upgrade you may face issues posting the TDSSkiller log.Just last few lines of log is sufficient

===================================================

RKILL

  • Please download Rkill by Grinler from one of the 4 links below (if one of them does not work try another.) and save it to your desktop:
  • Link 1
  • Link 2
  • Link 3
  • Link 4
  • In order for Rkill to run properly you must disable your anti-malware software. Please refer to this page if you are not sure how.
  • Double-click on Rkill. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • Note: You may have to run Rkill a few times before it is successful. You may also have to download Rkill from a different link which will save it as a different file name.
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • An Rkill.log will appear. Please copy and paste the contents in your reply (file also located at c:\rkill.log)
  • Do not reboot your computer after running Rkill as the malware programs will start again. If your computer reboots, run Rkill again before continuing on to the next step.
  • If nothing happens or if the tool does not run, please let me know in your next reply.

===================================================

ESET Online Scanner

I'd like us to scan your machine with ESET OnlineScan This process may may take several hours, that is normal

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    esetsmartinstaller_enu.png

    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Copy and paste the information in your next reply. Note: If no malware was found you will not get a log.
  • Click the Back button.
  • Click the Finish button

===================================================

Junkware Removal Tool by thisisu

  • Please download Junkware Removal Tool
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Right-mouse click JRT.exe and select Run as administrator (Windows XP double click the icon)
  • Please allow the program time to run
  • Once completed a Notepad document will open on your desktop
  • Copy and paste the contents in your reply.

Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • TDSSKiller log
  • RKILL log
  • ESET log
  • Junkware removal tool log


#14 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 07:29 PM

I am now on the desktop that is infected. I downloaded Kaspersky TDSS killer to the desktop as you said. I did have to reboot as you said as well. I ran the scan and it shown no infections.



#15 Thomas840

Thomas840
  • Topic Starter

  • Members
  • 22 posts
  • OFFLINE
  •  
  • Local time:07:38 PM

Posted 23 March 2013 - 08:04 PM

20:21:24.0222 0820  TDSS rootkit removing tool 2.8.16.0 Feb 11 2013 18:50:42
20:21:24.0623 0820  ============================================================
20:21:24.0623 0820  Current date / time: 2013/03/23 20:21:24.0623
20:21:24.0623 0820  SystemInfo:
20:21:24.0623 0820  
20:21:24.0623 0820  OS Version: 6.1.7601 ServicePack: 1.0
20:21:24.0623 0820  Product type: Workstation
20:21:24.0624 0820  ComputerName: BIGDELL
20:21:24.0624 0820  UserName: BigDaddy
20:21:24.0624 0820  Windows directory: C:\Windows
20:21:24.0624 0820  System windows directory: C:\Windows
20:21:24.0624 0820  Processor architecture: Intel x86
20:21:24.0624 0820  Number of processors: 4
20:21:24.0624 0820  Page size: 0x1000
20:21:24.0624 0820  Boot type: Normal boot
20:21:24.0624 0820  ============================================================
20:21:25.0900 0820  Drive \Device\Harddisk0\DR0 - Size: 0x7470C06000 (465.76 Gb), SectorSize: 0x200, Cylinders: 0xED81, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000050
20:21:25.0939 0820  ============================================================
20:21:25.0939 0820  \Device\Harddisk0\DR0:
20:21:25.0939 0820  MBR partitions:
20:21:25.0939 0820  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x32000
20:21:25.0939 0820  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x32800, BlocksNum 0x3A353000
20:21:25.0939 0820  ============================================================
20:21:25.0973 0820  C: <-> \Device\Harddisk0\DR0\Partition2
20:21:25.0973 0820  ============================================================
20:21:25.0973 0820  Initialize success
20:21:25.0973 0820  ============================================================
20:22:21.0504 2352  Deinitialize success
 
Is this what you meant by TDSSKiller.[Version]_[Date]_[Time]_log.txt?





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users