Kryptik virus

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by jem_389, Nov 18, 2011.

  1. jem_389

    jem_389 Private E-2

    I picked up the Kryptik virus and ran through all the steps in your forums, included running Malwarebytes, SuperAntiSpyware, ComboFix and MGTools. I've attached the logs. My Windows desktop is still acting funny with alot of the icons still not there, and the "start" area not listing most of the programs I have. Also my ATI graphics software is not running correctly

    Log
     

    Attached Files:

  2. thisisu

    thisisu Malware Consultant

    Hi and welcome to Major Geeks, jem_389!

    Please attach the logs from the below scans as well:
    • Malwarebytes' Anti-Malware
    • SUPERAntiSpyware
     
  3. jem_389

    jem_389 Private E-2

    I did run both MalwareBytes and SuperAnti-Spyware, but I can't seem to find the log for either. Should I run them again even though they will be out of sequence?
     
  4. thisisu

    thisisu Malware Consultant

  5. jem_389

    jem_389 Private E-2

    Requested files attached. I was able to find the SuperAnit-Spyware file from yesterday, but I had to run a new Malwarebytes one today.
     

    Attached Files:

  6. thisisu

    thisisu Malware Consultant

    [​IMG] From Programs and Features (via Control Panel), please uninstall the below:
    • Driver Detective
    • Java(TM) 6 Update 26

    [​IMG]Please download OTL by Old Timer to your desktop.
    • See the download links under this icon: [​IMG]
    • Double-click OTL.exe to run (Vista and Win7 right-click and select Run as administrator)
    • When OTL opens, copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      [COLOR="DarkRed"]:processes[/COLOR]
      killallprocesses
      [COLOR="DarkRed"]:otl[/COLOR]
      [COLOR="DarkRed"]:services [/COLOR]
      is3srv
      szkg5
      [COLOR="DarkRed"]:files[/COLOR]
      C:\ProgramData\ldydMLZaQDlgUo
      C:\ProgramData\~ldydMLZaQDlgUo
      C:\ProgramData\~ldydMLZaQDlgUor
      c:\program files (x86)\STOPzilla!
      c:\programdata\STOPzilla!
      C:\Users\John\AppData\Local\{02888D91-7E4D-4EFB-9519-8F12A08A1B07}
      C:\Users\John\AppData\Local\{048F81DE-D76B-4885-BE9C-74999F8AFE2C}
      C:\Users\John\AppData\Local\{06D863C8-C731-427C-89C6-A8B322A3AECD}
      C:\Users\John\AppData\Local\{0B9FD011-4E59-4C11-9802-45427A2F541A}
      C:\Users\John\AppData\Local\{15811AF3-C970-4DFD-B4CB-C8E531C9DE21}
      C:\Users\John\AppData\Local\{218A6F2F-43EB-4D85-B217-171978CCC69F}
      C:\Users\John\AppData\Local\{22E0F4CD-D619-4749-A62E-30CAEDA2F742}
      C:\Users\John\AppData\Local\{27BF6067-44E0-4E69-A9B7-B8850F0C4C2A}
      C:\Users\John\AppData\Local\{2BAA83F0-CDE2-4106-867A-315BB32BEE10}
      C:\Users\John\AppData\Local\{2C8AB3CB-CB3C-4A27-B180-050F14330860}
      C:\Users\John\AppData\Local\{391A11F1-EDC8-41A0-A48A-44CD8076A93C}
      C:\Users\John\AppData\Local\{3B5689B5-0008-48D0-BE49-AF6D76D50C6C}
      C:\Users\John\AppData\Local\{3B72A8C8-D54B-4A96-9A02-46D0D5C8A2B9}
      C:\Users\John\AppData\Local\{3BC1B516-4656-47C0-A40D-9B3150D8EE62}
      C:\Users\John\AppData\Local\{3D11C24E-C16F-4B19-B3CB-AC9CE8E6BAF2}
      C:\Users\John\AppData\Local\{3ED93EE5-84C6-468C-8CB1-6A6FCC038147}
      C:\Users\John\AppData\Local\{3F09DB29-0FFF-4073-8D4F-F8767CFC8460}
      C:\Users\John\AppData\Local\{449F953B-6294-4355-B013-384CB0ECB078}
      C:\Users\John\AppData\Local\{4B7DCD6B-A617-4EC2-8BD2-71CEF93AB46D}
      C:\Users\John\AppData\Local\{5266501B-3D1D-4345-8001-BDB9750BE2E3}
      C:\Users\John\AppData\Local\{53244634-C68F-410F-9B53-2557382755C8}
      C:\Users\John\AppData\Local\{571ED4D2-FEFC-4EB0-AD69-53050F005D59}
      C:\Users\John\AppData\Local\{58AECE9B-8F51-42D2-B841-B36C8E73D64A}
      C:\Users\John\AppData\Local\{5BDD6D46-57D3-4090-A2D6-E08C7AA3B59F}
      C:\Users\John\AppData\Local\{60510C84-1FDD-4F2A-B2DA-B91229ADE48F}
      C:\Users\John\AppData\Local\{634B0FAD-12E2-4A2D-922B-E3932C8D9D93}
      C:\Users\John\AppData\Local\{68A55D96-5226-4542-A25F-90531DA9273F}
      C:\Users\John\AppData\Local\{6B71F2E3-EBE3-494E-9F4F-DAD2A8AC3114}
      C:\Users\John\AppData\Local\{6F70C99F-E896-464A-A00C-C9DE9B005FB7}
      C:\Users\John\AppData\Local\{751CD02B-4A3A-4F6C-AE6E-2B6487C3635E}
      C:\Users\John\AppData\Local\{7833A045-9D1A-4255-BD50-373E477D4918}
      C:\Users\John\AppData\Local\{7D5734A5-11A5-413E-AEC2-A65ED882D2AE}
      C:\Users\John\AppData\Local\{7E28E0C3-E552-4E65-905C-F6D4DC444A72}
      C:\Users\John\AppData\Local\{86581777-0282-40F8-ADA2-D012C5912BAD}
      C:\Users\John\AppData\Local\{89A91317-0F64-4941-8480-351502EA5DFD}
      C:\Users\John\AppData\Local\{8A01798A-934F-4E70-88B5-2A025491A1BB}
      C:\Users\John\AppData\Local\{8E03F01A-C4C1-4C78-9965-66618B1889EA}
      C:\Users\John\AppData\Local\{991982FA-C032-4BDA-8B3A-FB6CE9409458}
      C:\Users\John\AppData\Local\{9C1942A7-517E-45DF-A8B8-4E7B67965E02}
      C:\Users\John\AppData\Local\{9DD985DA-C4B1-4874-9F19-A3094742842F}
      C:\Users\John\AppData\Local\{A213EF61-2294-40F2-97A7-EB87B39CD600}
      C:\Users\John\AppData\Local\{A29EC9E7-1081-4C67-875C-8379506343B7}
      C:\Users\John\AppData\Local\{A99E74C0-283E-4983-B1A9-6D22F12F0DA9}
      C:\Users\John\AppData\Local\{AC5A3008-48EA-4926-B24F-2824C10F8196}
      C:\Users\John\AppData\Local\{ACEF20FE-26F9-4F6A-BBE7-C8D6CD72F95E}
      C:\Users\John\AppData\Local\{AE253BA1-3F3E-4BBF-BC27-52962C11BCB0}
      C:\Users\John\AppData\Local\{BDFD976F-9217-4AEC-A350-7E4F34094F7A}
      C:\Users\John\AppData\Local\{C1CD672B-8E71-4773-92BF-7DC9F23AF597}
      C:\Users\John\AppData\Local\{C220A1FF-75C1-40DC-8536-A2DDE7438EA8}
      C:\Users\John\AppData\Local\{C54784E4-77B6-443E-BF27-7DA69C626CDC}
      C:\Users\John\AppData\Local\{C89C66F2-2569-4C91-A557-B6663D58DC0A}
      C:\Users\John\AppData\Local\{C9D1C66F-5CCC-433D-8B8E-A12D53EAE959}
      C:\Users\John\AppData\Local\{C9FF2666-6846-41D9-82D0-5622E6A11E35}
      C:\Users\John\AppData\Local\{CA2DD9A5-B617-4079-AC70-2816BDB0D026}
      C:\Users\John\AppData\Local\{CD2ECA6C-36D3-4066-8FD6-87F96364F89A}
      C:\Users\John\AppData\Local\{CEE64860-DDD8-4ED6-833E-2F5609412C65}
      C:\Users\John\AppData\Local\{D5F61400-1476-4D9A-AC9B-F8F157D5CEFE}
      C:\Users\John\AppData\Local\{E0BB24B3-F647-4FAB-8E4A-6173A78C7350}
      C:\Users\John\AppData\Local\{EB08B755-650C-4256-9A4B-7E4AC2378670}
      C:\Users\John\AppData\Local\{EC98AC2E-DE4A-4F0C-A85D-76505F67DFB3}
      C:\Users\John\AppData\Local\{F581229A-F87F-4DC9-98F3-0CC9E95C5525}
      C:\Users\John\AppData\Local\{FA20939A-4EE3-4882-87AD-7E59FD912B83}
      C:\Users\John\AppData\Local\{FE0C61E6-8E55-42B9-A9BF-C0050EFB5242}
      C:\Users\John\AppData\Local\{FEE80828-7348-484F-8719-F12A18BF15FD}
      xcopy %temp%\smtmp\1 "%programdata%\start menu" /s /i /h /y /c
      xcopy %temp%\smtmp\2 "%appdata%\microsoft\internet explorer\quick launch" /s /i /h /y /c
      xcopy %temp%\smtmp\3 "%appdata%\microsoft\internet explorer\quick launch\user pinned\taskbar" /s /i /h /y /c
      xcopy %temp%\smtmp\4 "%programdata%\desktop" /s /i /h /y /c
      [COLOR="DarkRed"]:reg[/COLOR]
      [COLOR="DarkRed"]:commands[/COLOR]
      [purity]
      [emptyjava]
      [emptyflash]
      [resethosts]
      
    • Now click the [​IMG] button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • Click the OK button.
    • When complete, Notepad will open.
    • Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (How to attach items to your post)

    [​IMG] Please download RogueKiller by Tigzy to your desktop.
    • See the download links under this icon: [​IMG]
    • Double-click RogueKiller.exe to run it. (Vista and Win7 right-click and select Run as Administrator)
    • When it opens, press the number 6 and press ENTER.
    • This can some time, be patient. When it's finished a report will open in Notepad.
    • Attach RKreport[1].txt to your next message. (How to attach items to your post)
      Note: It will be at whichever location you ran RogueKiller from. I asked that you put it on your desktop, so it should be there.
    • You can now type the number 0 and press ENTER to exit RogueKiller.

    [​IMG] Now install the current version of Sun Java from: Sun Java Runtime Environment

    [​IMG] Now run C:\MGtools\GetLogs.bat by double-clicking it (Vista and Win7 right-click and select Run as Administrator)
    Then attach C:\MGlogs.zip to your next message. (How to attach items to your post)
    Note: This will automatically update all the logs inside MGlogs.zip

    LET ME KNOW HOW THE PC IS RUNNING AFTER YOU HAVE COMPLETED THESE STEPS
     
  7. jem_389

    jem_389 Private E-2

    When I download OTL it gives a virus threat message saying it's a Trojan horse Agent3.AXVV. And it won't let me run as administrator it says "Window cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."
     
  8. thisisu

    thisisu Malware Consultant

    That is a false positive. OTL is legit ;) Disable AVG and try again.
     
  9. jem_389

    jem_389 Private E-2

    Thankyou, all my program files are listed again in the start menu, and everything seems to be working fine. Attached are all the logs requested.

    One small issue that I can't seem to resolve. I have two monitors a 27" Asus and a 24"Acer (G245H) For some reason now the 24" when put in to 1920 X 1080 resolution it won't fill up the screen and I get about a 1" black border around the image on the screen. However before all this virus problems it was working fine in the higher resolution and the image filled up the screen.
    View attachment RKreport[1].txt

    View attachment MGlogs.zip

    View attachment 11232011_092712.log
     
  10. jem_389

    jem_389 Private E-2

    Ok, I may have spoke too soon. It did recreate the file folder structure in the "All Programs" part of the start menu but when I click on any of the file folder icons it just shows it as empty, even though the actual program is still on my hard drive.
     
  11. thisisu

    thisisu Malware Consultant

    Please uninstall Conduit Engine

    [​IMG] Please download Unhide by Grinler to your desktop.
    Double-click unhide.exe to run it (Vista and Win7 right-click and select Run as administrator)

    Question, did you run CCleaner recently?
     
  12. jem_389

    jem_389 Private E-2

    I haven't run CCleaner but I did run Advanced System Care.
     
  13. thisisu

    thisisu Malware Consultant

    Because running CCleaner would most likely ruin the chances of us restoring your shortcuts / start menu.

    I don't know much about Advanced System Care but I do not think they have a temp file cleaner built in.

    Run unhide.exe and let me know if you are still experiencing missing items.
     
  14. jem_389

    jem_389 Private E-2

    It didn't work, but I found that removing and re-installing the programs is working. I think that Advanced System Care does have temp file removal. No problem I've got all the original disks and can re-install the programs.
     
  15. thisisu

    thisisu Malware Consultant

    Ok, well the rest of your logs are clean. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis if it present
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work through the below link:
     
  16. jem_389

    jem_389 Private E-2

    Thanks, any thoughts on the monitor issue??
     
  17. thisisu

    thisisu Malware Consultant

    Unfortunately not. You may want to ask in the Hardware forum.

    Surf Safely!
     
  18. jem_389

    jem_389 Private E-2

    Ok, I'll check, thanks again.

    //john
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds