Followed READ & RUN ME FIRST step by step but...

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by 0gnerf, Aug 13, 2015.

  1. 0gnerf

    0gnerf Private E-2

    ...still displaying the same 2 major issues as of day one:

    1. browser/search engine redirection/hijacking (only using Firefox);

    and most importantly

    2. all OS files (Win 7) are hidden: system files, personal stuff, start menu, desktop...everything is hidden (except for files downloaded/created/put after infection took place).

    Note that i'm living with the malware for a few years now, simply putting hidden files in show mode and adopting another browser free of any infection. But finally i've decided to get rid of it.

    Of course this post comes with the required log files attached.

    Thanks for your help
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Activate the 30 day free trial for Hitman Pro and have it remove all that it finds.


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Hj.Name|Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Hj.Name|Suspicious.Path] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Cisvc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\cisvc.exe /waitservice [x][x] -> Trovato
    • [Hj.Name|Suspicious.Path] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\ADMINI~1\AppData\Local\Temp\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | MstInit : C:\Users\ADMINI~1\AppData\Roaming\mstinit.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Cisvc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\cisvc.exe /waitservice [x][x] -> Trovato
    • [Hj.Name|Suspicious.Path] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\ADMINI~1\AppData\Local\Temp\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | MstInit : C:\Users\ADMINI~1\AppData\Roaming\mstinit.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | CmSTP : C:\Users\Administrator\LOCALS~1\APPLIC~1\cmstp.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | ClipSrv : C:\Users\ADMINI~1\AppData\Roaming\clipsrv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Mstsc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\mstsc.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Logman : C:\Users\Administrator\LOCALS~1\APPLIC~1\logman.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Esent Utl : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\esentutl.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | SessMgr : C:\Users\Administrator\LOCALS~1\APPLIC~1\sessmgr.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | CmSTP : C:\Users\Administrator\LOCALS~1\APPLIC~1\cmstp.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | ClipSrv : C:\Users\ADMINI~1\AppData\Roaming\clipsrv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Mstsc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\mstsc.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Logman : C:\Users\Administrator\LOCALS~1\APPLIC~1\logman.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Esent Utl : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\esentutl.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-36665569-3227605645-3185345254-500\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | SessMgr : C:\Users\Administrator\LOCALS~1\APPLIC~1\sessmgr.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Cisvc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\cisvc.exe /waitservice [x][x] -> Trovato
    • [Hj.Name|Suspicious.Path] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\ADMINI~1\AppData\Local\Temp\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | MstInit : C:\Users\ADMINI~1\AppData\Roaming\mstinit.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Cisvc : C:\Users\Administrator\LOCALS~1\APPLIC~1\MICROS~1\cisvc.exe /waitservice [x][x] -> Trovato
    • [Hj.Name|Suspicious.Path] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | Spool : C:\Users\ADMINI~1\AppData\Local\Temp\spoolsv.exe /waitservice [x][x] -> Trovato
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | MstInit : C:\Users\ADMINI~1\AppData\Roaming\mstinit.exe /waitservice [x][x] -> Trovato

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.


    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    • Re run Hitman (just a scan) and attach new log.
    • Re run Malware Bytes and let it remove anything else it may find. Attach a new log.
    • Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  3. 0gnerf

    0gnerf Private E-2

    Sorry but, regarding RogueKiller, i didn't find any of the registry entries you pointed out. Perhaps they were just removed by HitmanPro previous scan.

    I attach log of RK scan after Hitman intervention.

    Should i proceed to the next step?
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes please. :)
     
  5. 0gnerf

    0gnerf Private E-2

    OK all scans done.

    Here are the new log files
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, run Ccleaner (not the registry scanner, just the cleaner itself) to be rid of a chunk of temp files.

    Explain how things are running. The logs look good. :)
     
  7. 0gnerf

    0gnerf Private E-2

    CCleaner run ok. Reboot machine.

    Files are still hidden. Firefox still opens unwanted pages.
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  9. 0gnerf

    0gnerf Private E-2

    Unhide.exe run OK.

    Reset Mozilla Firefox to defaults OK.

    Everything looks now restored! I can see all my files again and Firefox no longer opens annoying tabs.

    Thanks for your priceless help! :)
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I am so pleased to hear all is running well again :)

    Are there any other issues or would you like me to post final steps?
     
  11. 0gnerf

    0gnerf Private E-2

    No other issues. You can proceed with final steps.
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds