MG Tools

Discussion in 'Malware Help (A Specialist Will Reply)' started by fizkowie, Feb 8, 2014.

  1. fizkowie

    fizkowie Private First Class

    Hi,

    I'm trying to follow the procedures for the Read Me First thread for malware removal and am downloading my programs - however when I try to download the MGTools to my C: drive, it tell me that I don't have administrative rights to download to this location but this is my computer. It is Windows 7 and I'm using IE. When we set up the computer, it was pretty much just plug and play - we didn't set anyone as "administrator". Can you help me change this setting so I can download this to the correct drive? Thanks.
     
  2. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

  3. fizkowie

    fizkowie Private First Class

    Ok, I was able to get thru all of the steps and there were a few things listed in the Hitman logs and Malaware bytes got rid of a lot of things. Nothing was found in the Rootkill. Should I post the logs from the results? I want to make sure that this is clean before I restart the UAC. Thank you.
     
  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You are welcome. If you wish help cleaning your pc, then attach the logs from running our guide's procedure.

    dr.m
     
  5. fizkowie

    fizkowie Private First Class

    Attached are the logs from the scans run on Saturday. Thank you for all your help. TDS Killer did not find any threats. I can't find where the log from Malware bytes is located. Thank you again.:)
     

    Attached Files:

  6. fizkowie

    fizkowie Private First Class

    Hi,

    Sikvik told me where to find the log for malwarebytes - it is attached. If you need anything else, please let me know. Thank you.
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hello fizkowie, Dr Moriarty got delayed, so I will be taking over your thread and reviewing those logs. I'll post back in a little while with a response and a fix if necessary. :)
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [RUN][SUSP PATH] HKCU\[...]\Run : ConduitFloatingPlugin_lipgolpfajiadodbcbljdpmbmbdmfcil ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\RADEK1~1\AppData\Local\Temp\CT3306061\plugins\TBVerifier.dll",RunConduitFloatingPlugin lipgolpfajiadodbcbljdpmbmbdmfcil [7][x][x][x]) -> FOUND
    • [RUN][SUSP PATH] HKCU\[...]\Run : APISupport ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\Radek1992\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport [7][7][x]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3192997070-4047456054-176730348-1004\[...]\Run : ConduitFloatingPlugin_lipgolpfajiadodbcbljdpmbmbdmfcil ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\RADEK1~1\AppData\Local\Temp\CT3306061\plugins\TBVerifier.dll",RunConduitFloatingPlugin lipgolpfajiadodbcbljdpmbmbdmfcil [7][x][x][x]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3192997070-4047456054-176730348-1004\[...]\Run : APISupport ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\Radek1992\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport [7][7][x]) -> FOUND
    • [HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\n. [x]) -> FOUND
    • [V1][SUSP PATH] Dealply.job : C:\Users\RADEK1~1\AppData\Roaming\Dealply\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND
    • [V2][ROGUE ST] 4764 : wscript.exe - C:\Users\RADEK1~1\AppData\Local\Temp\launchie.vbs //B -> FOUND
    • [V2][SUSP PATH] Dealply : C:\Users\RADEK1~1\AppData\Roaming\Dealply\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND
    • [V2][SUSP PATH] Searchya : C:\Users\RADEK1~1\AppData\Roaming\Searchya\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND


    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for items on the file/folder tab please....

    • [ZeroAccess][File] @ : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\@ [-] --> FOUND
    • [ZeroAccess][Folder] U : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\U [-] --> FOUND
    • [ZeroAccess][Folder] L : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\L [-] --> FOUND


    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Re run Hitman and have it delete Malware, Malware remnants & Potential Unwanted Programs.


    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.



    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  9. fizkowie

    fizkowie Private First Class

    Thank you for looking at this for us. :cry OMG all that is scary. I will start working on it tonight. BTW - can you tell me what is Zero Access? Thanks.
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It is a kernal mode rootkit which has been circulating for a few years now.

    Don't be too worried, follow my instructions and everything should be just fine. :)
     
  11. fizkowie

    fizkowie Private First Class

    Hi,

    I started the process which you gave me and in RogueKiller, I only found the last three items on the first list?\4764; \Dealply; \Searchya? There are other items in the Registry tab but not the ones which you have listed. I deleted those. I also do not show a File/Folder tab. There is a files tab but when I click on it - it only shows me "DELETED" files.

    My AVG and Super Anti Spyware were on in my taskbar - should I have turned them off?

    I won't go any further until I hear back from you. 2 RK logs attached.
    Please advise.
     

    Attached Files:

    Last edited: Feb 15, 2014
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    All this still shows in your latest RogueKiller log. (You need to re fix, ensure your antivirus is disabled)

    Registry entries:

    • [RUN][SUSP PATH] HKCU\[...]\Run : ConduitFloatingPlugin_lipgolpfajiadodbcbljdpmbmbdmfcil ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\RADEK1~1\AppData\Local\Temp\CT3306061\plugins\TBVerifier.dll",RunConduitFloatingPlugin lipgolpfajiadodbcbljdpmbmbdmfcil [7][x][x][x]) -> FOUND
    • [RUN][SUSP PATH] HKCU\[...]\Run : APISupport ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\Radek1992\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport [7][7][x]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3192997070-4047456054-176730348-1004\[...]\Run : ConduitFloatingPlugin_lipgolpfajiadodbcbljdpmbmbdmfcil ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\RADEK1~1\AppData\Local\Temp\CT3306061\plugins\TBVerifier.dll",RunConduitFloatingPlugin lipgolpfajiadodbcbljdpmbmbdmfcil [7][x][x][x]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3192997070-4047456054-176730348-1004\[...]\Run : APISupport ("C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\Radek1992\AppData\Local\Conduit\APISupport\APISupport.dll",DLLRunAPISupport [7][7][x]) -> FOUND
    • [HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\n. [x]) -> FOUND
    • [V1][SUSP PATH] Dealply.job : C:\Users\RADEK1~1\AppData\Roaming\Dealply\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND
    • [V2][ROGUE ST] 4764 : wscript.exe - C:\Users\RADEK1~1\AppData\Local\Temp\launchie.vbs //B -> FOUND
    • [V2][SUSP PATH] Dealply : C:\Users\RADEK1~1\AppData\Roaming\Dealply\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND
    • [V2][SUSP PATH] Searchya : C:\Users\RADEK1~1\AppData\Roaming\Searchya\UPDATE~1\UPDATE~1.EXE - /Check [x] -> FOUND

    File/Folder entries:

    • [ZeroAccess][File] @ : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\@ [-] --> FOUND
    • [ZeroAccess][Folder] U : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\U [-] --> FOUND
    • [ZeroAccess][Folder] L : C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\L [-] --> FOUND
     
  13. fizkowie

    fizkowie Private First Class

    Hi,

    I did run a scan today and the results are the 2 files which I posted earlier. I re-ran it now and am attaching a file with the text NEW at the end - the files which you are mentioning are not there. Also, the only tab I have is a "files" tab and it is empty. If you like I can send you a screen shot. I'm getting a notification and an internet window is opening up telling me how to remove Zero Access but truly I don't see it anywhere - maybe I 'm looking in the wrong place but again, the log file is attached. Do I need to reinstall Roguekiller? Sorry that this is so difficult but I can't delete things that I can't see.
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes by all means send a screenshot, but the only entry I'm really concerned about now in the latest RK log is:

    [HJ INPROC][ZeroAccess] HKCR\[...]\InprocServer32 : (C:\Users\Radek1992\AppData\Local\{5ff93020-edca-61ef-7ff3-9dc66598fde6}\n. [x]) -> FOUND

    So, if you can find that to delete it would be great. It's supposed to be on the registry tab. :(
     
  15. fizkowie

    fizkowie Private First Class

    Hi,

    Ok, reran and found some of the other items. Not that good with computers so I wasn't expecting to find the names all concatenated just as in the email you sent but realized that I had to look in the Value and Data columns to find them. Attached is a new log with the text NEW2 at the end. (this is so I can keep track of them - I'm sure you would be fine).
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good morning. OK I want you to scan again with RogueKiller now (no fix, just a scan) and attach the very newest log for me please. :)
     
  17. fizkowie

    fizkowie Private First Class

    Good Morning (a very early one for you depending on where you are on this earth). Attached is the latest RK log. I appreciate all your time on this.
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Excellent. Now you can go back to my post #8 and continue on with the steps that come after the RogueKiller step. :)
     
  19. fizkowie

    fizkowie Private First Class

    Hi,

    I was able to finish the process and have attached the Hitman Pro log, the JRT.txt log and the MGlogs.zip. I did get a "successfully run" type message from merging the code in the notepad into the registry. I got an error message during the Getlogs.bat: Process Dll.exe Common Language Debugging Service, Process id=0x12dc(4828), Thread id=0xb78(2936). I tried to close it but that generated another message so I clicked "cancel".

    Phew!

    Ok, what's next?

    Good night.

    :zzz
     

    Attached Files:

  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. You only deleted certain items with Hitman, you need to re run it, and have it delete all it finds please. Then rescan with it and attach the fresh log.
     
  21. fizkowie

    fizkowie Private First Class

    Hi, Ok, sorry. In Hitman, the PUP's were defaulted to "Ignore" so I didn't know they were supposed to be deleted as well. You didn't mention Cookies originally either. I have rerun it (several times - sigh) and the log is attached. You must be getting tired of this or just wishing you could do it yourself :).

    Thanks again. Let me know what's next.
     

    Attached Files:

  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No, because cookies are not problems. It's just that it was much easier to tell you to delete everything in the end. ;)

    Not at all! Everything is just fine!:)

    You're most welcome. You need to explain how things are running at this point.
     
  23. fizkowie

    fizkowie Private First Class

    Hi,

    Well, this started as we didn't know that Yahoo had gone secure and we were on youtube and the computer froze - wouldn't play any videos and it was then that we noticed that what was http://yahoo.com was now https://yahoo.com and we couldn't change it back. That's when I decided to try the "READ and RUN ME FIRST".

    Also, every once in while, we would notice a small screen in the top right of the desktop - looked like the bar at the bottom of media player but there wasn't any picture- it was just blank. The scroll on the bottom would very quickly go from left to right and then it would disappear. We'll have to see if that comes back.

    We would get other random things like popups, ads, etc.

    This is actually my husband's computer - it's always getting "things" in it as he surfs the web alot. I have AVG and Super Anti Spyware but apparently they aren't helping. I use Malwarebytes but it wasn't getting everything either. Anything that you can suggest that will help "defend" this computer would be appreciated. Can I run Hitman and not worry about it deleting something it shouldn't? What about the other programs from the R&RMF? You've been great and so much help.

    Thank you.
     
  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi. :)

    You explained alot about how things WERE running, but I wanted to know how things currently are in present time.
    My final steps should cover that.
    Not advisable to do on your own. You had my guidance and we only deleted what we know was garbage. Sometimes Hitman picks on legit files. So ya have to be certain.

    Most welcome. :) Don't forget to explain how the computer is now.
     
  25. fizkowie

    fizkowie Private First Class

    Hello,

    Well by giving examples of how the computer was, I was trying to tell you that it wasn't very obvious that the computer had malware issues so, haven't seen that little screen in the top right but then again, had only seen it once before. Haven't gotten any popups but have only been running Hitman over and over again :). I guess we'll have to wait a while to see if there is anything out of the ordinary. So far it seems to run fine.
     
  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :)

    Well, it's been about a day now, so I shall post final steps below for you to follow if all is still well.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  27. fizkowie

    fizkowie Private First Class

    Hi,

    Sigh, I seemed to have skipped #4 on the list and now MGTools folder is gone...what do I do now?

    Thank you.

    Signed,

    inept in Pittsburgh
     
  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Don't worry about it if it's gone. :)
     
  29. fizkowie

    fizkowie Private First Class

    Hi,

    But I wasn't able to use it to reenable my UAC?
     
  30. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Go to start > type in "cmd"
    • Click on cmd.exe > and paste in the following:

    After you enable or disable UAC, you will have to reboot your computer for the changes to take effect.


    You should receive a success message saying: "The operation completed successfully"
     
  31. fizkowie

    fizkowie Private First Class

    Hi,

    Thanks. I'm guessing that I will not have to go back in an readjust the restore points after this as I have already done it (I completed the list with the exception of the fix you just gave me).
     
  32. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No, no need to readjust anything else. :)
     
  33. fizkowie

    fizkowie Private First Class

    Hi,

    I thought I'd be done already but when I type in cmd I get the cmd.exe window and it already has C:\Users\Radek1992>

    Do I paste over this or just where the cursor is at the end of it? I just don't want to screw this up. Thanks.

    Tammy
     
  34. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Juts click on the cmd.exe, yes ;)
     
  35. fizkowie

    fizkowie Private First Class

    HI,

    That is the problem - I don't have a cmd.exe to click on. I attached a screenshot for you to see.
     

    Attached Files:

  36. fizkowie

    fizkowie Private First Class

    Actually, just got this message on the computer. Attached as a screen shot.
     

    Attached Files:

  37. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK let's clear up all the confusion. The first screenshot you attached is just fine, you're where you are meant to be. You just need to copy, and paste in what I told you a few posts back. :) And that should be that.

    With the second screenshot, I need to know exactly WHERE and WHAT these threats are that it's finding. A generic name is of no use to me. I need file and file path of "threats" please. :)
     
  38. fizkowie

    fizkowie Private First Class

    Ok, so back to the 1st screen shot, do I paste in your text after (to the right of ) the ..Radek1992>HERE

    OR

    Do I overwrite the entire C:\Users\Radek1992> with your text????

    2nd. that was a popup - I have no idea where to find file and path of the threats.

    I hate to trouble you so much with this - probably would have been a better idea to take computer to geeksquad or something because if you haven't guessed, I'm a real novice at this.
     
  39. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes. :)

    Just run a full system scan with your antivirus and it should find and remove any threats. Let me know if it does or not.
     
  40. fizkowie

    fizkowie Private First Class

    No message
     
    Last edited: Mar 2, 2014
  41. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    All okay? :confused
     
  42. fizkowie

    fizkowie Private First Class

    Hi,

    Thanks for asking - yes. At first I couldn't get the text to paste in cmd using the ctrl +V. So, not using my noodle, I started a text to you and as soon as I sent it I went back and tried right click and paste and it worked. So I tried to delete my post but I couldn't so I tried erasing the content but you had to have at least 4 characters! I didn't want exactly what happened - to bother you when it wasn't necessary but you replied :). Thanks for checking - you're the best.
     
  43. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No problem. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds