Thanks2all: Logs to check

Discussion in 'Malware Help (A Specialist Will Reply)' started by krishner, Nov 5, 2014.

  1. krishner

    krishner Private E-2

    Hi

    Logs to check as attached. Gotta feeling MGTools messed up but we'll see. Let me know what needs doing.

    Thanks for you time.

    Appreciated.

    JK
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :)

    I have a fix for you, I just want to ask, are you deliberately set up to use a proxy?
     
  3. krishner

    krishner Private E-2

    Not deliberately. I'm using a proxy server via my campus. Its a RADIUS proxyi server that is not the usual campus main server.

    If that helps.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Before we continue I would like for you to use MSConfig to put this machine back into normal start up mode, if you haven't done so already.

    Iminent <<< Uninstall this garbage.


    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [PUP] (X64) HKEY_CLASSES_ROOT\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52} -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DaemonEncondingJRE.exe (C:\Users\john gerreyn\AppData\Local\DaemonEncondingJRE\DaemonEncondingJRE.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\netfilter64 (system32\drivers\netfilter64.sys) -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\DaemonEncondingJRE.exe (C:\Users\john gerreyn\AppData\Local\DaemonEncondingJRE\DaemonEncondingJRE.exe) -> Found
    • [PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\netfilter64 (system32\drivers\netfilter64.sys) -> Found
    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Re run Hitman Pro and have it remove all that it finds.


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :Files
    C:\ProgramData\BoostSoftware
    C:\ProgramData\d775806c017ee32e
    C:\ProgramData\EnjoyCoupoon
    C:\ProgramData\EnnjOyCoupon
    C:\ProgramData\Fighters
    C:\ProgramData\Iminent
    C:\ProgramData\KNOWHOW
    C:\ProgramData\LowPricesApp
    C:\ProgramData\LuuCkYCooupoon
    C:\ProgramData\naokkpihpfpghaadamiipgjocemnacon
    C:\ProgramData\Norton
    C:\ProgramData\oqSjyfX
    C:\ProgramData\PrinceCouupoonn
    C:\ProgramData\QueeiNCouPuon
    C:\ProgramData\saVEro box
    C:\ProgramData\Systweak
    C:\ProgramData\TicTaCoupoN
    C:\Program Files (x86)\EnnjOyCoupon
    C:\Program Files (x86)\Fighters
    C:\Program Files (x86)\LuuCkYCooupoon
    C:\Program Files (x86)\predm
    C:\Program Files (x86)\PrinceCouupoonn
    C:\Program Files (x86)\Probit Software
    C:\Program Files (x86)\QueeiNCouPuon
    C:\Program Files (x86)\saVEro box
    C:\Program Files (x86)\TicTaCoupoN
    C:\awh157.tmp
    C:\awh2A35.tmp
    C:\awh306.tmp
    C:\awh3A9A.tmp
    C:\awh4263.tmp
    C:\awh4EC.tmp
    C:\awh6897.tmp
    C:\awh6DEF.tmp
    C:\awh92AD.tmp
    C:\awh9FFD.tmp
    C:\awhA10F.tmp
    C:\awhA1DF.tmp
    C:\awhA6AF.tmp
    C:\awhB0B9.tmp
    C:\awhB407.tmp
    C:\awhBC15.tmp
    C:\awhC43E.tmp
    C:\awhCB94.tmp
    C:\awhD8E9.tmp
    C:\awhDB0C.tmp
    C:\LIL9675.tmp
    C:\LIL9695.tmp
    C:\LIL96B4.tmp
    C:\LIL9760.tmp
    C:\LIL985A.tmp
    C:\Windows\Reimage.ini
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Give Ccleaner a run, no the registry scanner, just the cleaner itself to be rid of a chunk of temp files.


    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Please download AdwCleaner by Xplode and save to your Desktop.

    • Double click on AdwCleaner.exe to run the tool.
    • Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.



    • Now re run RogueKiller (just a scan) and attach log.
    • Same for Hitman Pro please.
    • Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  5. krishner

    krishner Private E-2

    Thx Kestrel13! Clean-up successful I think. You rock as ever...

    Logs attached.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Excellent. Those logs are clean. :)

    Before you follow final steps, allow adwcleaner to remove all it finds.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
    Last edited: Nov 7, 2014

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds