Requesting Help with Malware Infestation

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by phlash45, Feb 23, 2015.

  1. phlash45

    phlash45 Private E-2

    Hello,

    (Note: First post ever)

    Am running windows 8, 64 bit and seemed to have been infected. Especially noticeable using Internet Explorer. Browser gets redirected and freezes, inviting me to call a number for the quick and easy solution to my issue.

    Have run through the thorough steps prescribed in the Malware Forum and have not cleaned anything yet...am simply posting the log files resulting from scans.

    Thanks in advance for assistance.

    -phlash45
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Welcome to MG's. Give me a few and I will check your logs. ;)
     
  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You have one of the "infected" Lenovo computers.

    Run this tool:

    http://www.majorgeeks.com/files/details/superfish_removal_tool.html

    Once done, rerun Hitman and have it fix everything it finds.


    Did you allow MBAM to fix all it found? IF not, do so now.


    Then rerun RogueKiller and fix these items:
    Code:
     ¤¤¤ Registry : 16 ¤¤¤
    [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{26B19FA4-E8A1-4A1B-A163-1A1E46F830DD} (C:\Program Files (x86)\Amazon\Amazon1ButtonApp\AmazonAppIE64.dll) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | RtsFT : RTFTrack.exe  -> Found
    [PUP] (X64) HKEY_USERS\S-1-5-21-1098202308-15746016-1223531854-1002\Software\Microsoft\Windows\CurrentVersion\Run | Pokki : "%LOCALAPPDATA%\Pokki\Engine\HostAppServiceUpdater.exe" /LOGON  -> Found
    [PUP] (X86) HKEY_USERS\S-1-5-21-1098202308-15746016-1223531854-1002\Software\Microsoft\Windows\CurrentVersion\Run | Pokki : "%LOCALAPPDATA%\Pokki\Engine\HostAppServiceUpdater.exe" /LOGON  -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\0087761424721353mcinstcleanup (C:\windows\TEMP\008776~1.EXE -cleanup -nolog) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CltMngSvc (C:\PROGRA~2\LenovoBrowserGuard\Main\bin\CltMngSvc.exe) -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0087761424721353mcinstcleanup (C:\windows\TEMP\008776~1.EXE -cleanup -nolog) -> Found
    [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CltMngSvc (C:\PROGRA~2\LenovoBrowserGuard\Main\bin\CltMngSvc.exe) -> Found
    Reboot and rescan with both RogueKiller and Hitman and attach the new logs.
     
  4. phlash45

    phlash45 Private E-2

    Hi Tim,

    Ran the Lenovo tool as downloaded from MG... The tool found and removed a number of superfish registry entries and files but claimed the application wasn't found and no action was required.

    I followed up with Hitman, MBAM, and RogueKiller and fixed all issues found.

    Also downloaded Iobit's Advanced system care to use the Uninstaller. Couldn't find a superfish app or toolbar although I did find a few quite suspicious toolbar plugins which I removed.

    Please see requested resultant logs from RogueKiller and Hitman.

    Will be testing the operation but I am optimistic. THANKS for all your help.

    -phlash45
     

    Attached Files:

  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Logs look good. Let me know how things are running.
     
  6. phlash45

    phlash45 Private E-2

    TimW,
    Been a few days and looking good. Will pick up the readme file process to complete.
    Thanks again,
    Phlash45
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.'

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds