Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

File permissions locked at read only


  • This topic is locked This topic is locked
3 replies to this topic

#1 SteveRC

SteveRC

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:00 PM

Posted 11 February 2014 - 05:51 AM

Hello, my file structure seems to be locked into read only mode. This occurred a few days ago. I've tried tweaking all the permission, ran a preboot live avira rescue, safe mode malwarebytes. Found 7 things between the 2 of them, and they were erased. Kept coming back as read only so I formatted the whole drive and installed fresh. Still got the read only after a format and there are some weird locked registry keys. Currently system restore is disabled. Thank you in advance!


DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 8.0.7600.16385
Run by Steve at 5:42:22 on 2014-02-11
Microsoft Windows 7 Ultimate   6.1.7600.0.1252.1.1033.18.8191.6417 [GMT -5:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\WUDFHost.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\SearchIndexer.exe
C:\Windows\explorer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Users\Steve\Downloads\HijackThis.exe
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
TCP: NameServer = 209.18.47.61 209.18.47.62
TCP: Interfaces\{4322F62F-1EB3-46E6-B2FE-B4842FE9A888} : DHCPNameServer = 209.18.47.61 209.18.47.62
SSODL: WebCheck - <orphaned>
x64-SSODL: WebCheck - <orphaned>
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\Steve\AppData\Roaming\Mozilla\Firefox\Profiles\0wiz6y8j.default\
.
============= SERVICES / DRIVERS ===============
.
.
=============== Created Last 30 ================
.
2014-02-11 12:37:12    --------    d-----w-    C:\Windows\Panther
2014-02-11 12:36:57    --------    d-----w-    C:\Boot
2014-02-11 10:15:22    --------    d-sh--w-    C:\$RECYCLE.BIN
2014-02-11 10:09:54    98816    ----a-w-    C:\Windows\sed.exe
2014-02-11 10:09:54    256000    ----a-w-    C:\Windows\PEV.exe
2014-02-11 10:09:54    208896    ----a-w-    C:\Windows\MBR.exe
2014-02-11 09:56:48    10315576    ----a-w-    C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{E935C655-3527-477B-A673-56C897585777}\mpengine.dll
2014-02-11 09:56:47    270496    ------w-    C:\Windows\System32\MpSigStub.exe
2014-02-11 09:52:58    2622464    ----a-w-    C:\Windows\System32\wucltux.dll
2014-02-11 09:52:31    36864    ----a-w-    C:\Windows\System32\wuapp.exe
2014-02-11 09:52:31    186752    ----a-w-    C:\Windows\System32\wuwebv.dll
2014-02-11 09:49:29    --------    d-----w-    C:\Users\Steve\AppData\Local\VirtualStore
2014-02-11 09:47:27    --------    d-----w-    C:\Recovery
.
==================== Find3M  ====================
.
.
============= FINISH:  5:42:30.79 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 SteveRC

SteveRC
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:00 PM

Posted 11 February 2014 - 06:31 AM

I know I wasn't told to use combofix yet but it cut out my ethernet connection and denied me access to any folders in the file system. Using combofix got my internet connection back and I can access folders again.It seems whatever it is will make the changes back after a set time or something. Anywho, combofix log.

ComboFix 14-02-11.01 - Steve 02/11/2014   6:24.2.4 - x64
Microsoft Windows 7 Ultimate   6.1.7600.0.1252.1.1033.18.8191.6707 [GMT -5:00]
Running from: c:\users\Steve\Downloads\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((   Files Created from 2014-01-11 to 2014-02-11  )))))))))))))))))))))))))))))))
.
.
2014-02-11 12:37 . 2014-02-11 09:47    --------    d-----w-    c:\windows\Panther
2014-02-11 12:36 . 2014-02-11 12:36    --------    d-----w-    C:\Boot
2014-02-11 11:26 . 2014-02-11 11:26    --------    d-----w-    c:\users\Default\AppData\Local\temp
2014-02-11 10:04 . 2014-02-11 10:04    --------    d-----w-    c:\program files (x86)\Mozilla Maintenance Service
2014-02-11 09:56 . 2013-12-16 06:54    10315576    ----a-w-    c:\programdata\Microsoft\Windows Defender\Definition Updates\{E935C655-3527-477B-A673-56C897585777}\mpengine.dll
2014-02-11 09:56 . 2013-12-18 11:13    270496    ------w-    c:\windows\system32\MpSigStub.exe
2014-02-11 09:52 . 2012-06-02 22:19    57880    ----a-w-    c:\windows\system32\wuauclt.exe
2014-02-11 09:52 . 2012-06-02 22:19    44056    ----a-w-    c:\windows\system32\wups2.dll
2014-02-11 09:52 . 2012-06-02 22:15    2622464    ----a-w-    c:\windows\system32\wucltux.dll
2014-02-11 09:52 . 2012-06-02 22:19    2428952    ----a-w-    c:\windows\system32\wuaueng.dll
2014-02-11 09:52 . 2012-06-02 20:19    186752    ----a-w-    c:\windows\system32\wuwebv.dll
2014-02-11 09:52 . 2012-06-02 20:15    36864    ----a-w-    c:\windows\system32\wuapp.exe
2014-02-11 09:47 . 2014-02-11 09:49    --------    d-----w-    c:\users\Steve
2014-02-11 09:47 . 2014-02-11 09:47    --------    d-----w-    C:\Recovery
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
.
--------- X64 Entries -----------
.
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
FF - ProfilePath - c:\users\Steve\AppData\Roaming\Mozilla\Firefox\Profiles\0wiz6y8j.default\
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2014-02-11  06:28:13
ComboFix-quarantined-files.txt  2014-02-11 11:28
ComboFix2.txt  2014-02-11 10:15
.
Pre-Run: 975,442,862,080 bytes free
Post-Run: 975,390,568,448 bytes free
.
- - End Of File - - 1AA24A5A14E143D66CC87038BE0AD10C
A36C5E4F47E84449FF07ED3517B43A31
 



#3 nasdaq

nasdaq

  • Malware Response Team
  • 40,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:01:00 PM

Posted 13 February 2014 - 09:35 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Download correct tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.

Let me know what problem persists.

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:01:00 PM

Posted 19 February 2014 - 10:39 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users