Logs attached, all instructions followed and a question

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Dallas Vette, Oct 14, 2014.

  1. Dallas Vette

    Dallas Vette Private E-2

    The Instructions specifically state to not eradicate any malware brought up in Hitman. Then later on you ask if the computer has any problems or not. How the heck is it not gonna have problems when you tell us specifically not to clean the problems?

    Anyways I followed all the instructions....
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes, we just mean explain exactly what issues you are still having. Don't worry about it at any rate... I'll review the logs. Please attach the log from Hitman Pro!!
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Mobogenie <<< Uninstall this please.



    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\Updater.exe -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | NextLive : C:\Windows\SysWOW64\rundll32.exe "C:\Users\aarmendariz\AppData\Roaming\newnext.me\nengine.dll",EntryPoint -m l -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | SDP : C:\Users\aarmendariz\AppData\Local\FilesFrog Update Checker\update_checker.exe /auto -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | GenieoUpdaterService : "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe" -wait 5 -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | GenieoSystemTray : "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe" -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\updater.exe -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | NextLive : C:\Windows\SysWOW64\rundll32.exe "C:\Users\aarmendariz\AppData\Roaming\newnext.me\nengine.dll",EntryPoint -m l -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | SDP : C:\Users\aarmendariz\AppData\Local\FilesFrog Update Checker\update_checker.exe /auto -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | GenieoUpdaterService : "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe" -wait 5 -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | GenieoSystemTray : "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe" -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\Run | Updater : C:\ProgramData\Updater\updater.exe -> Found
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce | WSE_Astromenda : wscript /E:vbscript /B "C:\Users\AARMEN~1\AppData\Roaming\WSE_Astromenda\UpdateProc\bkup.dat" -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce | WSE_Astromenda : wscript /E:vbscript /B "C:\Users\AARMEN~1\AppData\Roaming\WSE_Astromenda\UpdateProc\bkup.dat" -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\InternetUpdater ("C:\ProgramData\InternetUpdater\InternetUpdaterService.exe") -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\InternetUpdater ("C:\ProgramData\InternetUpdater\InternetUpdaterService.exe") -> Found
    • [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://astromenda.com/?f=1&a=ast_dn...tGyE0Ezz0F0A0BtA0B0CtCzyyC2Q&cr=769382687&ir= -> Found
    • [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://astromenda.com/?f=1&a=ast_dn...tGyE0Ezz0F0A0BtA0B0CtCzyyC2Q&cr=769382687&ir= -> Found
    • [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 209.18.47.61 209.18.47.62 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these entries on the Tasks tab please...

    • [Suspicious.Path] C__Users_AARMEN~1_AppData_Local_Temp_qs_02f36360_VideoBuzz_installer.exe.job -- C:\Users\AARMEN~1\AppData\Local\Temp\qs_02f36360\VideoBuzz_installer.exe (/exenoupdates /exelang 0 /prereqs "0" /qn) -> Found
    • [Suspicious.Path] WSE_Astromenda.job -- C:\Users\AARMEN~1\AppData\Roaming\WSE_AS~1\UPDATE~1\UPDATE~1.EXE (/Check) -> Found
    • [Suspicious.Path] \\VisualBeeRecovery -- C:\Users\aarmendariz\AppData\Local\VisualBeeExe\VisualBeeRecovery.exe (/s) -> Found
    • [Suspicious.Path] \\WSE_Astromenda -- C:\Users\AARMEN~1\AppData\Roaming\WSE_AS~1\UPDATE~1\UPDATE~1.EXE (/Check) -> Found

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • R3 - URLSearchHook: (no name) - {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
    • O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file)
    • O4 - HKLM\..\Run: [mobilegeni daemon] C:\Program Files (x86)\Mobogenie\DaemonProcess.exe
    • O4 - HKLM\..\Run: [BrowserSafeguard] "C:\Program Files (x86)\Browsersafeguard\BrowserSafeguard.exe"
    • O4 - HKCU\..\Run: [GenieoUpdaterService] "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe" -wait 5
    • O4 - HKCU\..\Run: [GenieoSystemTray] "C:\Users\aarmendariz\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe"
    • O15 - Trusted Zone: http://search.genieo.com
    • O15 - Trusted IP range: 127.0.0.1

    After clicking Fix exit HJT.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\aarmendariz\AppData\Local\VisualBeeExe
    C:\Users\aarmendariz\Desktop\Genieo.lnk
    C:\Users\aarmendariz\Desktop\Mobogenie.lnk
    C:\ProgramData\Updater
    C:\Program Files (x86)\Conduit
    C:\Program Files (x86)\iSafe
    C:\Program Files (x86)\Mobogenie
    C:\Program Files (x86)\MyPC Backup
    C:\Program Files (x86)\Uninstall Information
    C:\Windows\tasks\C__Users_AARMEN~1_AppData_Local_Temp_qs_02f36360_VideoBuzz_installer.exe.job
    C:\Program Files (x86)\WSE_Astromenda
    
    :reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Driver Support"=-
    "GenieoUpdaterService"=-
    "GenieoSystemTray"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "mobilegeni daemon"=-
    "BrowserSafeguard"=-
    [HKEY_USERS\S-1-5-21-1004797205-3859406545-1018031846-1001\Software\Microsoft\Windows\CurrentVersion\run]
    "Driver Support"=-
    "GenieoUpdaterService"=-
    "GenieoSystemTray"=-
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2006BC23-3741-42FF-B03D-CF49C8B0D82B}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2E00D31D-D171-423D-836D-1A4D7EA7F1A9}]
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Re run RogueKiller (just a scan) and attach new log.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  4. Dallas Vette

    Dallas Vette Private E-2

    The txt file was like >700kb so it didn't upload. I zipped it. Thanks :)
     

    Attached Files:

  5. Dallas Vette

    Dallas Vette Private E-2

    I ran OTM but I couldn't get the code to paste into the website. in IE, the paste option is grayed out, and there is no paste option in chrome. Am I doing something wrong? I know there is something in the clipboard as I am able to paste in notepad etc.
     

    Attached Files:

  6. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You need to "Copy" the script Kes prepared in the Code box from your browser window, then "Paste" it into the OTM.exe pane that says " Paste Instructions for items..." that is on your Desktop. Now continue with the remaining steps.
     
  7. Dallas Vette

    Dallas Vette Private E-2

    Holy crap check this out. God this is so stupid. If you go to this thread's "Show Printable Version" in Thread Tools drop down it shows the buttons as websites, not png files. I took the printout to where the affected computer is and lost an hour of my life trying to figure out WTF I was doing wrong rolleyes
     
  8. Dallas Vette

    Dallas Vette Private E-2

    All new uploads including Hitman, see next post for 2 more uploads
     

    Attached Files:

  9. Dallas Vette

    Dallas Vette Private E-2

    ...other two uploads
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi. Just wanted to let you know I'm here, not forgotton about you. I need to dash off for a visit with my Dad. Soon as I return home, I'll get back to you with a response. :)
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Hitman and allow it to remove what it finds. Then explain how things are running.
     
  12. Dallas Vette

    Dallas Vette Private E-2

    Seems all is well now. Eradicated a couple Browser extensions by hand to finish it all. I used to do virus cleaning years ago but I want to get back into it. Where did you get the code from that is copied into OTM?
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    By code you mean all the files? I found them in the MGlogs.zip.

    Commands we use in the script are all well known to malware helpers like us.

    Ready for final steps at this stage, then? :)
     
  14. Dallas Vette

    Dallas Vette Private E-2

    all ready to wrap it up here...
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  16. Dallas Vette

    Dallas Vette Private E-2

    I thought I already replied to this once..I said that I was ready to go ahead & finish up, reinstate the UAC etc
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I already posted final steps. Post # 15. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds