Got a persistant Malware problem.

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Necrosis103, Oct 1, 2012.

  1. Necrosis103

    Necrosis103 Private E-2

    Hi!
    I've currently got some form of ransomware (I believe) on my desktop, so I'm using my netbook as a go between. I followed the guide presented to me and the screen lock is still in place when I don't boot it in 'Safe Mode with Command Prompt'.

    I fixed a malware problem a few hours before getting this one, that involved trying to get me to purchase fake anti-virus software, though due to the small time span between them both I'm worried there may be a problem with that as well. So I thought it would be best to mention it.

    If anyone can help me I would be really grateful! My relevant logs should all be attached.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Rerun RogueKiller and run a scan. After it finishes the scan, select the Registry tab and then select any of the below that exist and then click the Delete button.

    Then select the Files tab and if the below exist, click the Delete button again.

    Then immediately reboot your PC and then continue with the below.



    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Users\Alex\AppData\Roaming\dhutr.dll
    C:\Users\Alex\AppData\Roaming\wsf3CmCT.exe
    C:\Users\Alex\AppData\Local\Temp\wgsdgsdgdsgsd.exe
    C:\Users\Alex\AppData\Local\Temp\~298C.tmp
    C:\Users\Alex\AppData\Local\Temp\~2DE.tmp
    C:\$Recycle.Bin\S-1-5-18\$5a291945e65ae95e31ada9cbd5ff03e3
    C:\Windows\Installer\{5a291945-e65a-e95e-31ad-a9cbd5ff03e3}
     
    :Reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "dhutr"=-
    "jICc7n9BYxBTRVw"=-
    [HKEY_USERS\S-1-5-21-2184733142-459457271-790691183-1001\Software\Microsoft\Windows\CurrentVersion\run]
    "dhutr"=-
    "jICc7n9BYxBTRVw"=-
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    After reboot, run a new scan with RogueKiller and save a log as in original instructions and attach the new log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the new RogueKiller log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. Necrosis103

    Necrosis103 Private E-2

    Thank you ever so much, the screen lock is now gone and I'm responding via the infected desktop. Everything appears fine, but I know there's sometimes extra clean up to do after.

    Thank you again!
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There could be more to do. Your RogueKiller log still shows some of the entries I had ask to fix in my previous message. Also your MGtools log ( MGlog.zip ) is from Oct 1st. You did not get a new log as requested. Thus it is difficult for me to know where things really stand.

    Please do the below.

    But first, you need to run CCleaner as requested in the read and run me first which stated the below
    Code:
    [SIZE=4][B]Step 5:[/B][COLOR=black] [B][U]Temp File/Folder Cleaning[/U][/B][/COLOR][/SIZE]
    [INDENT][COLOR=black][B][SIZE=3][COLOR=red]**** WARNING ****[/COLOR][/SIZE] [/B][/COLOR]
    [COLOR=black][B]Skip running CCleaner or any other disk cleaning program if you are missing icons, items from your Star Menu, from All Programs....etc.[/B][/COLOR]
    [/INDENT]
    [LIST]
    [*][COLOR=black][B]Download and install [/B][URL="http://majorgeeks.com/CCleaner_Slim_d4191.html"][SIZE=3][COLOR=blue][B]CCleaner[/B][/COLOR][/SIZE][/URL][/COLOR]
    [*][COLOR=black]Now run [/COLOR][COLOR=black][B]Ccleaner[/B][/COLOR][COLOR=black] with the default options (that means don’t change anything) to clean out temporary files.[/COLOR]
    [*][COLOR=black]Only use the default settings on the [B]Windows Tab[/B] and select [I][B]Run Cleaner[/B][/I]. Do not run any other options from other tabs.[/COLOR]
    [*][COLOR=black]Also it is highly recommended to login to all other User Accounts on the PC. [/COLOR]
    [LIST]
    [*][COLOR=black]Run CCleaner on each account. This can greatly reduce scan time and log sizes from the later scanning you will do below. [/COLOR]
    [*][COLOR=black]If you don’t see Ccleaner’s link when logging into the other accounts, just go to the [B]C:\Program Files\Ccleaner[/B] folder and double click on the [B]ccleaner.exe [/B]file to run it. You can also create a shortcut to the file on the Desktop of your other user accounts to make it easier to run in the future[/COLOR]
    [/LIST]
    [/LIST]
    Then I strongly advise you to cleanup your Desktop. Remove eveything but links to run programs. Do not download and save programs here and defintely do not use it for long term storage. You need to keep ComboFix.exe here for now as we need it, but we will be removing it when we are finished with your cleanup. A cluttered Desktop is malware's playground and it can also cause performance degradation especially when you start saving large files here like you are doing.

    Now delete all previous logs from RogueKiller that you have saved so that we can start fresh.

    Shutdown all protection software you have running like McAfee, SuperAntiSpyware, IoBit, ....etc to make sure they do not interfere with fixes. Always do this prior to running any fix.

    No rerun RogueKiller and run a scan. After it finishes the scan, select the Registry tab and then select any of the below that still exist and then click the Delete button. If you do not see any of them, then just save a new RogueKiller log and continue with instructions following the RogueKiller fix.

    Then immediately reboot your PC.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the new RogueKiller log
    • C:\MGlogs.zip
     
  5. Necrosis103

    Necrosis103 Private E-2

    I'm ever so sorry for the problems with my last post, though I was sure I had done a better job with the RogueKiller registry file deletions, so I may have made a similar error again.

    Regardless, thank you so much. I'm cleared up most of the rubbish on my desktop, but I've yet to download a file called ComboFix.exe.

    Here are my logs.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that looks better. Your logs are clean.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  7. Necrosis103

    Necrosis103 Private E-2

    Sorry for the late reply, but thank you ever so much for your help!
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds