The United States Department of Justice

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by monita, Sep 17, 2013.

  1. monita

    monita Private E-2

    I had not problems running the programs in safe mode. However, the only way I was able to recover the laptop from the virus was by installing the privatefirewall. It is running but I'm afraid the virus is hidden somewhere in the laptop. Please help me. I'm attaching the reports.

    Thank you!
    monita
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [RUN][ZeroAccess] HKCU\[...]\Run : Google Update ("C:\Users\Alan\AppData\Local\Google\Desktop\Install\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\?��?��?��\?��?��?��\???ﯹ๛\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\GoogleUpdate.exe" >) -> FOUND
      [RUN][ZeroAccess] HKUS\S-1-5-21-26721678-784977105-1970670289-1000\[...]\Run : Google Update ("C:\Users\Alan\AppData\Local\Google\Desktop\Install\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\?��?��?��\?��?��?��\???ﯹ๛\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\GoogleUpdate.exe" >) -> FOUND
      [RUN][SUSP PATH] HKLM\[...]\Wow6432Node\[...]\Run : DisplaySwitch ("C:\Users\Alan\AppData\Roaming\Microsoft\Windows\Templates\securitywindrv.exe" [-]) -> FOUND
      [SERVICE][ZeroAccess] HKLM\[...]\CCSet\[...]\Services : ???etadpug ("C:\Program Files (x86)\Google\Desktop\Install\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\ \...\???ﯹ๛\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\GoogleUpdate.exe" < [x]) -> FOUND
      [SERVICE][ZeroAccess] HKLM\[...]\CS001\[...]\Services : ???etadpug ("C:\Program Files (x86)\Google\Desktop\Install\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\ \...\???ﯹ๛\{3329dffd-f3f1-5768-ddbe-f6efec66dca6}\GoogleUpdate.exe" < [x]) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    Now click the Files/folders tab and locate these detections:


    • [ZeroAccess][File] Desktop.ini : C:\Windows\assembly\GAC_32\Desktop.ini [-] --> FOUND
      [ZeroAccess][File] Desktop.ini : C:\Windows\assembly\GAC_64\Desktop.ini [-] --> FOUND
      [ZeroAccess][Junction] MpClient.dll : C:\Program Files\Microsoft Security Client\MpClient.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] MpCmdRun.exe : C:\Program Files\Microsoft Security Client\MpCmdRun.exe >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] MpCommu.dll : C:\Program Files\Microsoft Security Client\MpCommu.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] MpRTP.dll : C:\Program Files\Microsoft Security Client\MpRTP.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] MpSvc.dll : C:\Program Files\Microsoft Security Client\MpSvc.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] MsMpEng.exe : C:\Program Files\Microsoft Security Client\MsMpEng.exe >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] NisIpsPlugin.dll : C:\Program Files\Microsoft Security Client\NisIpsPlugin.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] NisLog.dll : C:\Program Files\Microsoft Security Client\NisLog.dll >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Junction] NisSrv.exe : C:\Program Files\Microsoft Security Client\NisSrv.exe >> \systemroot\system32\config [-] --> FOUND
      [ZeroAccess][Folder] Install : C:\Users\Alan\AppData\Local\Google\Desktop\Install [-] --> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Now rerun Hitman and have it delete everything except C:\MGTools.exe.

    Reboot and rescan with both RogueKiller and Hitman and attach both of those logs as well.
     
  3. monita

    monita Private E-2

    I clicked on scan (roguekiller). When the scan finished it took me to a webside. I got out of that.
    under Registry it shows:
    Status Key Type Global
    found HJ Pol HKEY_CURRENT_USER
    FOUND HJ POL HKEY_LOCAL_MACHINE - this appear 6 times, then
    FOUND HJ SMENU HKEY_CURRENT _USER
    FOUND HJ DESK HKEY_LOCAL_MACHINE

    ZERO ACCESS IS BLINKING ON STATUS AREA.

    Nothing else is showing
     
  4. monita

    monita Private E-2

    Dear TimW,
    I tried again running the RogueKiller scan and under Registry I am still getting the same type of files I mentioned to you last night. When I clicked on the File tab I did see a folder "C:\Users\Alan\AppData\Local\Google\Desktop\Install"
    Please let me know how should I proceed.

    I appreciate your help.
    Thanks,
    monita
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    • Exit any programs that you may have started. Shutdown protection software too.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • Rerun RogueKiller ( if running Vista,Win7, or Win8 user right-click and select Run as Administrator to run ) for WinXP and Win 2K just double click to run
    • Wait until Prescan has finished
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and attach the content of the Notepad into your next reply.
    • The log should be found in a new RKreport[x].txt on your Desktop
    • Exit/Close RogueKiller and reboot your PC.


    Rerun RogueKiller and Hitman and attach those logs as well.
     
  6. monita

    monita Private E-2

    Dear TimW,

    Thank you so much for your instructions. Attached please find requested reports.

    I'm very grateful for your help.

    monita
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Use windows explorer to find and delete:
    C:\Users\Alan\AppData\LocalLow\AskToolbar\ (AskBar)
    C:\Users\Alan\AppData\LocalLow\AskToolbar\osearch.xml

    Tell me how things are running now.
     
  8. monita

    monita Private E-2

    Dear TimW,

    Thank you again. I followed the instructions and deleted the record. Everything seems to be working fine. Is there anything else I need to do?

    Thanks

    monita
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You're welcome.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     
  10. monita

    monita Private E-2

    Dear TimW,

    Thanks again for your help and instructions. However, I couldn't follow steps 4 and 5 because I couldn't find those files in the MGtools folder. Prior to following this last set of instructions, while on the MSN page of the internet, I got a blue screen and had to turn the computer off and on again. Something about a driver. However, the computer is up to date with all microsoft updates.

    Thanks,
    monita
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are most welcome. Any other issues should be addressed in the software forum. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds