Malware Removal FAQ

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Snuffleupagus, Sep 10, 2012.

  1. Snuffleupagus

    Snuffleupagus Private E-2

    I have an unknown malicious bug. Don't know if its malware, trojan or virus. I've downloaded all of the tools in the Malware Removal FAQ thread. Problem is, my bug seizes my apps in normal Win 7 mode before I can launch them. I can only run in Safe Mode. Win 7 Ultimate 32 bit.

    How should I procede?

    Thanks.

    Snuffleupagus.
     
  2. Snuffleupagus

    Snuffleupagus Private E-2

    RKreport[1].txt
    mbam-log.txt
    TDSSKiller log.txt
    HitmanPro.log
     

    Attached Files:

  3. Snuffleupagus

    Snuffleupagus Private E-2

    MGlogs.zip

    NOTE: After running MalwareBytes in Safe Mode, I was able to complete the other scans in a normal WIN 7 environment.

    MalWareBytes detected rootkit.pihar and quarantined it, I believe.
     
  4. Snuffleupagus

    Snuffleupagus Private E-2

    MGlogs.zip retry.
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    TDSSkiller removed a TDL infection. Are you still having problems? If yes then do the below.


    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  6. Snuffleupagus

    Snuffleupagus Private E-2

    Thanks for the added info Chaslang. But after TDSSkiller removed the trojan virus Trojan.pihar from my laptop, it has been working well. I had some collateral damage from the infiction:

    1. Had to reinstall Trend Micro Officescan
    2. Had to reactivate services for Intel Rapid Storage Technology
    3. Had to reinstall VNC Server software.

    Trend Micro found 7 viruses after I reinstalled it an ran a scan.

    All appears well for now.

    Thanks for all the help!
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Glad to hear you have it fixed.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds