Finished the Malware Removal steps. What's next?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by cbnepa, Aug 18, 2013.

  1. cbnepa

    cbnepa Private E-2

    Hi. Hope I'm doing this right. I'm confused because I thought I would be removing the malware that was detected by Hitman by the Hitman software, as opposed to sending something in. Forgive my ignorance.

    Here are some logs you asked that be saved.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    • Exit any programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • Rerun RogueKiller ( if running Vista,Win7, or Win8 user right-click and select Run as Administrator to run ) for WinXP and Win 2K just double click to run
    • Wait until Prescan has finished
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and attach the content of the Notepad into your next reply.
    • The log should be found in a new RKreport[x].txt on your Desktop
    • Exit/Close RogueKiller and reboot your PC.
    Now run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: (no name) - {A3BC75A2-1F87-4686-AA43-5347D756017C} - (no file)
    R3 - URLSearchHook: (no name) - {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
    R3 - URLSearchHook: (no name) - {d40b90b4-d3b1-4d6b-a5d7-dc041c1b76c0} - (no file)
    O2 - BHO: (no name) - cardisabled - (no file)
    O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file)
    O2 - BHO: (no name) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - (no file)
    O2 - BHO: (no name) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - (no file)
    O18 - Protocol: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)
    O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file)
    O18 - Protocol: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - (no file)

    After clicking Fix, exit HJT.


    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\john\AppData\Roaming\\aspnhe.dll
    C:\Users\john\AppData\Local\Conduit
    C:\Users\john\AppData\LocalLow\Conduit
    C:\Program Files (x86)\FunWebProducts
    C:\Users\john\AppData\Local\Temp\*.*
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\aspnhe]
    [-HKEY_USERS\S-1-5-21-3387473751-436036899-2650916086-1001\Software\AppDataLow\Software\Smartbar]
    [-HKEY_USERS\S-1-5-21-3387473751-436036899-2650916086-1001\Software\Conduit]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{14B5A260-C8A7-4F6E-BA0F-7A7AF0F08BDC}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the new RogueKiller log
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. cbnepa

    cbnepa Private E-2

    So far it seems to be going well. I'm afraid to breathe!!
     

    Attached Files:

  4. cbnepa

    cbnepa Private E-2

    I sent the attachments. Are there more things we need to do?

    Thanks so much for your help!
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. That looks better but I want to be sure that those junctions related to the ZeroAccess infection were all remove. Please run a new scan with Hitman Pro and save a new log. Attach this log.

    Also test how your PC is working.
     
  6. cbnepa

    cbnepa Private E-2

    Things seem to be working great! This is my parents computer and I told them to never download anything again. Ever. Ha.

    I did notice some of the virus-related files in the startup sections in msconfig and also CCleaner. They've been disabled from startup but I wasn't sure whether to delete them completely.

    The only problems that remain are the inability to set the Windows firewall and to update all of the MS Updates. There is one critical security update that cannot be installed. Is there an area where I can go to get help for that?

    Thanks so much! Here are the attachments.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    My last fix remove this. You really need to put the PC into normal startup mode too. MSconfig should not be used for a long term startup manager. It is meant only for temporary use primarily in debugging problems.

    Okay let's try to fix the broken services for the firewall.

    Run the C:\MGtools\NetFWfix.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator). After it finishes do the below to collect a new log before a reboot.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below log:
    • C:\MGlogs.zip
    Now reboot the PC and do the below again.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below log:
    • C:\MGlogs.zip
     
  8. cbnepa

    cbnepa Private E-2

    What does this mean? Do I delete the files or ignore them and just change the startup mode to normal?
     
  9. cbnepa

    cbnepa Private E-2

    I think I did something wrong. After I run this file (C:\MGtools\NetFWfix.bat file) a box pops up for a second and then disappears so it looks like nothing is running at all. How do I know if it is running or not?
     
  10. cbnepa

    cbnepa Private E-2

    Before reboot.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It runs really fast. A command prompt window will open while it runs and then closes. I can see that it ran based on this first log and it fixed a few things. Now reboot and get the second log.
     
  12. cbnepa

    cbnepa Private E-2

    A little while ago that MS Security update was able to be installed. The last time I checked the only remaining items were the Firewall and the Windows Security Center Service could not be turned on.

    After reboot:
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay based on this log, now we need to continue with the below.



    Be patient while doing the below. The fixes can sometimes take quite awhile to run. Especially the permissions repairs. It may be best to kick it off and goto bed or do something else. It is better not to run anything while the repairs are going on.


    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  14. cbnepa

    cbnepa Private E-2

    Everything seems to be working great! I can't thank you enough!

    Do you have any recommendations for uninstalling AVG completely? I hear it's very difficult.

    Thank you very much!
     

    Attached Files:

  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    Uninstall the below:
    AVG 2013
    AVG PC TuneUp Language Pack (en-US)
    AVG PC TuneUp

    Then reboot your PC. After reboot, run the below too:

    AVG Remover 2013.3341


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds