Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DOJ Moneypak is Stubborn!


  • This topic is locked This topic is locked
12 replies to this topic

#1 thboxink14

thboxink14

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 11 August 2014 - 01:59 PM

Hi BC Folks!

 

I have an infected laptop running windows 7 x64.  I have tried all manner of removal procedures: Hitman kickstarter, removing the hard drive and scanning as a secondary on another machine, using the system scan on the kaspersky boot cd (these first three came up with "clean" scans), booting in to Safe Mode with Command Prompt to run Emsisoft Emergency Kit (malware takes over before I can run scan), manually removing files using the Kaspersky bootable, and running a system restore (which fails for every restore point).  Obviously, the ransom malware has taken over safe mode.  

 

Attached you will find my frst scan results.  Apologies, but DDS was an impossiblity, I'm afraid.

 

Please help and thank you!

 

-thboxink

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 11 August 2014 - 02:33 PM




Hello thboxink14

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.
.





I would also like to get some extra information on one of the files on the computer

Run FRST like you did before and Type the following in the edit box after "Search:".

User32.dll

It then should look like:

Search: User32.dll

Click Search button and post the log (Search.txt) it makes to your reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 11 August 2014 - 02:40 PM

Gringo,

 

Thank you very much for your response and your help.

 

Here are the results of the search you requested:

 

Farbar Recovery Scan Tool (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-11 15:38:13
Running from F:\
Boot Mode: Recovery
 
================== Search Files: "User32.dll" =============
 
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll
[2011-07-07 04:34][2010-11-20 04:08] 0833024 ____A (Microsoft Corporation) 5E0DB2D8B2750543CD2EBB9EA8E6CDD3
 
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_3382083abb6e47d4\user32.dll
[2009-07-13 15:24][2009-07-13 17:11] 0833024 ____A (Microsoft Corporation) E8B0FFC209E504CB7E79FC24E6C085F0
 
C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll
[2011-07-07 04:35][2010-11-20 05:27] 1008128 ____A (Microsoft Corporation) FE70103391A64039A921DBFFF9C7AB1B
 
C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_292d5de8870d85d9\user32.dll
[2009-07-13 15:38][2009-07-13 17:41] 1008640 ____A (Microsoft Corporation) 72D7B3EA16946E8F0CF7458150031CC6
 
C:\Windows\SysWOW64\user32.dll
[2011-07-07 04:34][2014-03-04 01:16] 0872448 ____A (Microsoft Corporation) 57C15EA62FDE73B864711EB1CDB1A6B0
 
C:\Windows\System32\user32.dll
[2011-07-07 04:35][2010-11-20 05:27] 1008128 ____A (Microsoft Corporation) FE70103391A64039A921DBFFF9C7AB1B
 
X:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_292d5de8870d85d9\user32.dll
[2009-07-13 15:38][2009-07-13 17:41] 1008640 ____A (Microsoft Corporation) 72D7B3EA16946E8F0CF7458150031CC6
 
X:\Windows\System32\user32.dll
[2009-07-13 15:38][2009-07-13 17:41] 1008640 ____A (Microsoft Corporation) 72D7B3EA16946E8F0CF7458150031CC6
 
====== End Of Search ======
 
Thanks!!
 
-thboxink


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 12 August 2014 - 07:35 AM


Hello thboxink



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 12 August 2014 - 02:08 PM

Hello Gringo,

 

Thanks again for all of your help.  The following is the log from the FRST Fix function:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-12 15:00:41 Run:1
Running from F:\
Boot Mode: Recovery
==============================================
 
Content of fixlist:
*****************
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
*****************
C:\Windows\SysWOW64\user32.dll => Moved successfully.
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll copied successfully to C:\Windows\SysWOW64\user32.dll
 
=========  bootrec /fixmbr =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /fixboot =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====
 
 
I am able to log in to "normal" mode now and begin the rest of the malware removal - thank you!  So, it appears the ransomware replaced the user32.dll file, which explains the persistence.  I'll know to look for that if I encounter this again.
 
Much appreciate - you guys are awesome!!
 
-thboxink


#6 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 12 August 2014 - 02:10 PM

Hello Gringo,

 

Thanks again for all of your help.  The following is the log from the FRST Fix function:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-12 15:00:41 Run:1
Running from F:\
Boot Mode: Recovery
==============================================
 
Content of fixlist:
*****************
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
*****************
C:\Windows\SysWOW64\user32.dll => Moved successfully.
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll copied successfully to C:\Windows\SysWOW64\user32.dll
 
=========  bootrec /fixmbr =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /fixboot =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====
 
 
I am able to log in to "normal" mode now and begin the rest of the malware removal - thank you!  So, it appears the ransomware replaced the user32.dll file, which explains the persistence.  I'll know to look for that if I encounter this again.
 
Much appreciate - you guys are awesome!!
 
-thboxink


#7 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 12 August 2014 - 02:10 PM

Hello Gringo,

 

Thanks again for all of your help.  The following is the log from the FRST Fix function:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-12 15:00:41 Run:1
Running from F:\
Boot Mode: Recovery
==============================================
 
Content of fixlist:
*****************
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
*****************
C:\Windows\SysWOW64\user32.dll => Moved successfully.
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll copied successfully to C:\Windows\SysWOW64\user32.dll
 
=========  bootrec /fixmbr =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /fixboot =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====
 
 
I am able to log in to "normal" mode now and begin the rest of the malware removal - thank you!  So, it appears the ransomware replaced the user32.dll file, which explains the persistence.  I'll know to look for that if I encounter this again.
 
Much appreciate - you guys are awesome!!
 
-thboxink


#8 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 12 August 2014 - 02:11 PM

Hello Gringo,

 

Thanks again for all of your help.  The following is the log from the FRST Fix function:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-12 15:00:41 Run:1
Running from F:\
Boot Mode: Recovery
==============================================
 
Content of fixlist:
*****************
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
*****************
C:\Windows\SysWOW64\user32.dll => Moved successfully.
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll copied successfully to C:\Windows\SysWOW64\user32.dll
 
=========  bootrec /fixmbr =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /fixboot =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====
 
 
I am able to log in to "normal" mode now and begin the rest of the malware removal - thank you!  So, it appears the ransomware replaced the user32.dll file, which explains the persistence.  I'll know to look for that if I encounter this again.
 
Much appreciated - you guys are awesome!!
 
-thboxink


#9 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 12 August 2014 - 02:13 PM

Hello Gringo,

 

Thanks again for all of your help.  The following is the log from the FRST Fix function:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-08-2014 01
Ran by SYSTEM at 2014-08-12 15:00:41 Run:1
Running from F:\
Boot Mode: Recovery
==============================================
 
Content of fixlist:
*****************
Replace: C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll C:\Windows\SysWOW64\user32.dll
CMD: bootrec /fixmbr
CMD: bootrec /fixboot
*****************
C:\Windows\SysWOW64\user32.dll => Moved successfully.
C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll copied successfully to C:\Windows\SysWOW64\user32.dll
 
=========  bootrec /fixmbr =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
=========  bootrec /fixboot =========
 
??T h e   o p e r a t i o n   c o m p l e t e d   s u c c e s s f u l l y . 
 
========= End of CMD: =========
 
 
==== End of Fixlog ====
 
 
I am able to log in to "normal" mode now and begin the rest of the malware removal - thank you!  So, it appears the ransomware replaced the user32.dll file, which explains the persistence.  I'll know to look for that if I encounter this again.
 
Much appreciate - you guys are awesome!!
 
-thboxink


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 15 August 2014 - 07:42 AM



Hello thboxink

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 thboxink14

thboxink14
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 15 August 2014 - 03:02 PM

Hi Gringo,

 

I had already completed the removal of the malware and returned the system back to the owner prior to your last post.  So, apologies, but I do not have access to the logs you would like to see.  Your user32.dll trick allowed me to get in and perform my usual routine. I did have to make a linux boot disk with hive editing capability as my Windows user profiles were corrupt so that I could get to the user data.  After that was taken care of,  I also ran sfc and windows updates.  Pursuant to the completion log of sfc, I also had to re-register some library files (*.dll's)

 

If it helps anyone looking to this discussion for advice, after the bleepingcomputer.com staff were able to help get me back in to Windows without the ransomware hijacking protected mode, I ran (in this order) Combofix, Junkware Removal Tool, ADW Cleaner, Hitman Pro, Malwarebytes, and also checked the Task Scheduler and regedit snapins for orphans.  If you are not experienced with the any of these, please do not attempt without the assistance of someone with experience.

 

I can't thank the staff at bleepingcomputer.com enough - they are truly the leading experts in Malware removal!

 

Thanks!!

 

-thboxink



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 17 August 2014 - 05:56 AM

You are more than welcome


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 20 August 2014 - 06:25 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users