Microsoft Hoax Call - help

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Morphvr6, Apr 28, 2013.

  1. Morphvr6

    Morphvr6 Private E-2

    Hi

    New to forum and hope someone will point me in the right direction.

    InLaws Laptop - I had a call from them saying that they had a call from Microsoft - 'your PC abou to crash!' hard sell and all.....

    Well long storey short - farther inlaw ran ammyy.com :cry which to me says they have had access to laptop!

    Asked farther in-law why he did it, but its done now.....

    Told them to cancle credit cards and change online passwords in case they have found private details.

    SO....

    Back to laptop, where to start?
    Laptop isolated from any networks while I try to fix and make safe.
    PC has McAfee Security Centre installed - scans find noting.

    Unable to find ammyy anywhere on system??? Do they still have access?

    Have MGtools (hijackthis) and ran scan - what do I need to look for in log?

    Thanks for your help wit this.

    MorphVR6
     
  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything. Note if you cannot save things in C:\ then just save them to your Desktop. Make sure that you have disable UAC and rebooted first if you are running Windows Vista or Windows 7.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.

    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.



    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!

    Helpful Notes:


    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:

    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:


    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. Morphvr6

    Morphvr6 Private E-2

    Re: Microsoft Hoax Call - help - updated

    Hi

    Have followed the read and run me.

    All programs ran and completed, logs attached.

    UAC turned off aswell as AV.

    Program order;-

    RougerKiller - log
    Malware - log
    TDSKiller - nothing found when run completed - unable to see log on system?
    HitmanPro - log
    MGTools - log zip

    So far system seems to be running ok but I dont trust what has happened with the remote access.....

    Please advise if anything here needs more work.

    Thanks for any help you can give.

    MorphVR6
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [Services][BLACKLIST] HKLM\[...]\ControlSet001\Services\BrowserProtect (C:\ProgramData\BrowserProtect\2.6.1095.52\{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}\BrowserProtect.exe) [7] -> FOUND
      [Services][BLSVC] HKLM\[...]\ControlSet001\Services\IBUpdaterService (C:\Windows\System32\dmwu.exe) -> FOUND
      [TASK][SUSP PATH] VisualBeeRecovery : C:\Users\chriss\AppData\Local\VisualBeeExe\VisualBeeRecovery.exe /s [7] -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Now rerun Hitman and have it fix everything it found.

    Reboot and rescan with both RogueKiller and Hitman and attack those logs as well.

    Let me know how things are running.
     
  5. Morphvr6

    Morphvr6 Private E-2

    Hi TimW

    Thanks for the reply and advice.

    Have ru both again and fixes.

    Reboot and ran again.

    Logs for both before and after.

    All seems good at mo, tho this laptop running vista is so blood slow at bootup/login - me been impatient or just vista been vista (ps I hate vista... :crap)

    if all looks ok, one last question would you think that the remote access user (scam artists) would have had much time to log any webpage access details off the laptop?
    Have told in-laws to change all their login passwords thy use online, just in case.

    Thanks for your help.

    MorphVR6
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    All looks good. You should tell your folks to use a different computer to change the passwords.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds