UKASH Malware Help (First Steps Done)

Discussion in 'Malware Help (A Specialist Will Reply)' started by Andrew L, Dec 17, 2012.

  1. Andrew L

    Andrew L Private E-2

    Hi everyone,

    First, I just want to say you people are awesome for helping out complete strangers with their malware problems.

    Second, that’s exactly why I’m here. I got the UKASH virus/malware on my laptop.

    I looked through other threads with people who had the same problem and did the following things:

    1) I downloaded the Farbar Recovery Scan Tool x64 and put it on a flash drive. I rebooted and went into Advanced Boot Options and selected Repair your computer. I went to the command prompt and ran the program. I’ve attached the log file.

    2) I went to the Read & Run Me First Malware Removal Guide and followed the steps in that thread in order.
    a) I ran CCleaner.
    b) I turned off User Account Control.
    c) I ran RogueKiller (and I have attached the RKreport file).
    d) I ran Malwarebytes Anti-Malware and followed the full instructions (and I have attached the log file).
    e) I ran TDSSKiller and followed the instructions on this site (and I have attached the log file).
    f) I ran HitmanPro, ignored the detections, and have attached the log file.
    g) I ran MGtools and followed the instructions on this site. I cannot attached the log file due to there being a maximum of 5 attachments on a post, so I will wait until someone replies before I post again with the last log file.

    3) I rebooted my laptop, and I’m still getting the same problem: My screen goes white, the laptop attempts to take my photo, and I get a request to pay money to have my computer released. I am only able to run these programs by booting into safe mode with command prompt.

    I am running Windows 7 64-bit.

    Any help anyone here can give me is greatly appreciated.

    Andrew L.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please attach the C:\MGLogs.zip.
     
  3. Andrew L

    Andrew L Private E-2

    Here is the MGLogs.zip.

    Thanks,

    Andrew L.
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Run CCleaner and clean out your temp files.

    See if you can't run in normal mode.

    Please download ComboFix to your desktop. Turn off any AV software you have before you run it. Attach the log when finished. Do not do anything while it is running or it may stall the program.
     
  5. Andrew L

    Andrew L Private E-2

    I definitely can't run in normal mode. I get the white screen and can't see my desktop at all.

    When I try to boot into safe mode, it automatically reboots into normal mode as soon as the desktop comes up.

    The only thing that works is Safe Mode with Command Prompt.

    I'll run CCleaner again. I'll have to run ComboFix from a USB key, though. I'll post again when it's done.

    Thanks,

    Andrew
     
  6. Andrew L

    Andrew L Private E-2

    Okay, I ran ComboFix, and I've attached the log file.

    Thanks,

    Andrew L.
     

    Attached Files:

    • log.txt
      File size:
      29.2 KB
      Views:
      2
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [RUN][PREVRUN] HKLM\[...]\Run : NVHotkey (rundll32.exe C:\Windows\system32\nvHotkey.dll,Start) -> FOUND
      [SHELL][Rans.Gendarm] HKCU\[...]\Winlogon : shell (explorer.exe,C:\Users\Andrew\AppData\Roaming\skype.dat) -> FOUND
      [SHELL][Rans.Gendarm] HKUS\S-1-5-21-3130441058-4254743683-2888987115-1001[...]\Winlogon : shell (explorer.exe,C:\Users\Andrew\AppData\Roaming\skype.dat) -> FOUND
    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Reboot and try to get into normal mode.
     
  8. Andrew L

    Andrew L Private E-2

    I'm now able to run in normal Windows mode, so I disabled my Norton Antivirus completely and ran RogueKiller as admin and did the scan.

    When the scan was done, I located the first item and deleted it:
    [RUN][PREVRUN] HKLM\[...]\Run : NVHotkey (rundll32.exe C:\Windows\system32\nvHotkey.dll,Start) -> FOUND

    Neither of the other two items you listed showed up on the scan, however.

    I ran the scan again to make sure, and none of those three items showed up (since the first was now deleted, I assume).

    I've attached the last scan I ran.

    Thanks,

    Andrew L.
     

    Attached Files:

  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks like that got rid of it. Are you having any additional issues?
     
  10. Andrew L

    Andrew L Private E-2

    I tried it last night and everything appears to be running normally again.

    Thank you so much for your help. You saved me many hours of reinstalling everything.

    I'll definitely have to buy some Major Geek stuff to support the site.

    --Andrew
     
  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link
    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds