VBS:Ramnit.B infection logs attached

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by heyyou123, Aug 18, 2011.

  1. heyyou123

    heyyou123 Private E-2

    Hi,

    I have a windows 7 laptop. MSE detected VBS:Ramnit.B and it looks like it's been removed.

    I want to be sure that my computer is completely clean so I have run all the scans in READ & RUN ME FIRST can someone take a look at my attached logs?


    Thanks in advance for your help

    Sorry, It looks like I did not attach the logs in my previous post, I hope I did it right this time
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please run back to back eSet scans. Reboot after each scan and attach the logs. Do it three times, or until they show no infection.

    eSet Online Scan.
     
  3. heyyou123

    heyyou123 Private E-2

    Thanks a lot for your response. I've run ESET scan twice, the second time it did not show any infection.

    I'm attaching the log

    I've noticed that a homegroup icon was created in my desktop, I cannot move or delete this icon...
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below log:

    • C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  5. heyyou123

    heyyou123 Private E-2

    Thanks ! Here's the log

    Everything looks fine right now, but I want to be really sure... :)
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It looks like you were very fortunate to have caught this in time. Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real time protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.We recommend them for doing backup scans when you suspect a malware infection.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.


    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.

    10. After doing the above, you should work thru the below link:


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0

    Help Support MajorGeeks
    Buy Discounted Software @ Majorgeeks Store. Giveaways Too!

    Majorgeeks Geek Wear. Hats, T-Shirts, Hoodies

    MajorGeeks on FaceBook
     
  7. heyyou123

    heyyou123 Private E-2

    Thank you very much for your help ! Everything looks ok right now, if a bit slower than before I run the final steps.

    I'm waiting a while before I back up my files to my external HD again. I want to make sure nothing strange happens

    Thanks again ! :)
     
  8. heyyou123

    heyyou123 Private E-2

    Just one question, I have read in another threads that with this kind of infection it is safer to do a clean reinstall,

    I have a recent back up of all my files, but the recovery DVDs that I made (before the infection) are not working, I tried with another disks to see if my computer could reboot from them and they worked.

    Do you think It's safe to run the recovery from the recovery partition in my computer? :confused
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If that is what you wish to do, then yes, you can run the recovery from the recovery partition.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds