Jump to content

Virus has given hacker remote access to my server


1nf3ct3d
 Share

Recommended Posts

I have a server that is known to have been infected by a virus.  I have run malwarebytes and it removed multiple viruses but I still have an issue.  The virus or its operator created several user accounts (e.g. qqqqq, Mingserver, Bluebird, etc...) in Active Directory (this is a stand alone domain controller) and given them administrator rights.  Security logs show these users logging in remotely from China.  I was even logged off by the remote user once while I was trying to troubleshoot, to find moments later that my admin account had been deleted, as well as user accounts for staff.  I have manually deleted all unknown users, verified that only authorized administrators are in the Administrators and Remote Desktop Users group, but every time I do it, two accounts are restored and have administrative rights.  I have modified the firewall to block the default RDP port, which appears to be the remote access vector used when the hacker deleted user accounts.  I have not had any accounts deleted since and the security log only shows ME logging in at times when I was actually logged in, but the two undesired accounts keep reappearing.  The first fully updated Malwarebytes scan found multiple infections which I permitted it to clean, but a new one seems to pop up every day or two, the latest after malwarebytes did a database update.  Logs follow:

 

 

Link to post
Share on other sites

Some of the names in the log have been masked due to privacy concerns, 

 

FRST Log:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 21-11-2014
Ran by 1nf3ct3d (administrator) on G0 on 21-11-2014 19:50:16
Running from C:\Documents and Settings\1nf3ct3d\My Documents\Downloads
Loaded Profiles: 2ndAdmin & 1nf3ct3d & 3rdAdmin & 4thAdmin & Administrator & Guest &  (Available profiles: 2ndAdmin & 1nf3ct3d & 3rdAdmin & 4thAdmin & Administrator & Guest)
Platform: Microsoft® Windows® Server 2003, Standard Edition Service Pack 2 (X86) OS Language: English (United States)
Internet Explorer Version 8
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: http://www.wireshark.org)
Yosemite Backup for Dell (HKLM\...\Yosemite Backup for Dell) (Version: 8.10-sp6 (Build 42849) - Yosemite Technologies, Inc.)
 
==================== Custom CLSID (selected items): ==========================
 
(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)
 
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-1105_Classes\CLSID\D1D02A1F-5A34-48FA-B94C-1119394363BA\InprocServer32 -> C:\WINDOWS\system32\kernel32.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\D1D02A1F-5A34-48FA-B94C-1119394363BA\InprocServer32 -> C:\WINDOWS\system32\kernel32.dll (Microsoft Corporation)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{022105BD-948A-40C9-AB42-A3300DDF097F}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\GoogleUpdate.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{035FBE31-3755-450A-A775-5E6BBD43D344}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{095A2EEC-F7FE-42E8-96FB-C20E53081908}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 29 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{22181302-A8A6-4F84-A541-E5CBFC70CC43}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\GoogleUpdateOnDemand.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{2F0E2680-9FF5-43C0-B76E-114A56E93598}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\GoogleUpdateOnDemand.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{320F0FDB-BE0A-4648-9D18-4A2C3448C007}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 29 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{51F9E8EF-59D7-475B-A106-C7EA6F30C119}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\GoogleUpdateOnDemand.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{5C65F4B0-3651-4514-B207-D10CB699B14B}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Chrome\Application\38.0.2125.122\delegate_execute.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{62A0D750-DED9-448C-B693-406B34BB0892}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{6D7374DE-63AA-473C-8C02-60D9CDCD84C5}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 29 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{A45426FB-E444-42B2-AA56-419F8FBEEC61}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 28 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{A54D478D-4F70-4F72-9A74-17C9986E35AB}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{C3101A8B-0EE1-4612-BFE9-41FFC1A3C19D}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\npGoogleUpdate3.dll (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{C442AC41-9200-4770-8CC0-7CDB4F245C55}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\npGoogleUpdate3.dll (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{C5A2122B-A05B-4FD8-AE49-91990AE10998}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{D0336C0B-7919-4C04-8CCE-2EBAE2ECE8C9}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\psuser.dll (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{E67BE843-BBBE-4484-95FB-05271AE86750}\localserver32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\GoogleUpdateOnDemand.exe (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{E8CF3E55-F919-49D9-ABC0-948E6CB34B9F}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\1.3.25.11\psuser.dll (Google Inc.)
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{EB06378B-ABB6-4B3C-9B40-D488DD8A6E93}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 28 more characters).
CustomCLSID: HKU\S-1-5-21-1552972464-3606855926-3832228978-500_Classes\CLSID\{FB994D36-B312-46CE-A40B-CF63980641F9}\InprocServer32 -> C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update (the data entry has 30 more characters).
 
==================== Restore Points  =========================
 
Could not list Restore Points. Check "winmgmt" service or repair WMI.
 
 
==================== Hosts content: ==========================
 
(If needed Hosts: directive could be included in the fixlist to reset Hosts.)
 
2010-02-16 08:18 - 2010-02-16 08:18 - 00000734 ____N C:\WINDOWS\system32\Drivers\etc\hosts
127.0.0.1       localhost
 
==================== Scheduled Tasks (whitelisted) =============
 
(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)
 
 
(If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.)
 
Task: C:\WINDOWS\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\WINDOWS\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files\Google\Update\GoogleUpdate.exe
Task: C:\WINDOWS\Tasks\GoogleUpdateTaskUserS-1-5-21-1552972464-3606855926-3832228978-500Core.job => C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
Task: C:\WINDOWS\Tasks\GoogleUpdateTaskUserS-1-5-21-1552972464-3606855926-3832228978-500UA.job => C:\Documents and Settings\Administrator.TEMPNAMESERVER\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
Task: C:\WINDOWS\Tasks\reboot.job => ?
Task: C:\WINDOWS\Tasks\replMcPhersonDB.job => ?
Task: C:\WINDOWS\Tasks\replSDB.job => ?
 
==================== Loaded Modules (whitelisted) =============
 
 
==================== Alternate Data Streams (whitelisted) =========
 
(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)
 
 
==================== Safe Mode (whitelisted) ===================
 
(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)
 
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\wd.sys => ""="Driver"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys => ""="Driver"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\LMIRescueUA_574006 => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\LMIRescue_a2793676-2b27-4c24-9099-9e2eca64f0f2 => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\UploadMgr => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Wdf01000.sys => ""="Driver"
 
==================== EXE Association (whitelisted) =============
 
(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)
 
 
==================== MSCONFIG/TASK MANAGER disabled items =========
 
(Currently there is no automatic fix for this section.)
 
 
========================= Accounts: ==========================
 
Administrator (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
Guest (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
krbtgt (0 - Limited - Disabled) => %systemroot%\system32\config\systemprofile
2ndAdmin (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
1nf3ct3d (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
3rdAdmin (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
P (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
Front Office (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
h (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
4thAdmin (0 - Administrator - Disabled) => %systemroot%\system32\config\systemprofile
k (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
t (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
ts (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
e (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
rj (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
m (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
tm (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
ks (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
ew (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
Hes (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
tm (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
IWAM_IIS_WPGO (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
SUPPORT_388945a0 (0 - Administrator - Enabled) => %systemroot%\system32\config\systemprofile
G0$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
RM2$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
302$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
301$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
300$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
RM3$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
RM1$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
303$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
GBACKOFFICE$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
RM4$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
RM5$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
SDomain$ (0 - Limited - Enabled) => %systemroot%\system32\config\systemprofile
 
==================== Faulty Device Manager Devices =============
 
Name: Broadcom BCM5716C NetXtreme II GigE (NDIS VBD Client)
Description: Broadcom BCM5716C NetXtreme II GigE (NDIS VBD Client)
Class Guid: {4D36E972-E325-11CE-BFC1-08002BE10318}
Manufacturer: Broadcom Corporation
Service: l2nd
Problem: : This device is disabled. (Code 22)
Resolution: In Device Manager, click "Action", and then click "Enable Device". This starts the Enable Device wizard. Follow the instructions.
 
 
==================== Event log errors: =========================
 
Application errors:
==================
Error: (11/21/2014 07:45:03 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application PCloudCleaner.exe, version 1.0.0.1533, faulting module msvcr100.dll, version 10.0.30319.1, fault address 0x0008ae6e.
Processing media-specific event for [PCloudCleaner.exe!ws!]
 
Error: (11/21/2014 07:39:28 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application PCloudCleaner.exe, version 1.0.0.1533, faulting module msvcr100.dll, version 10.0.30319.1, fault address 0x0008ae6e.
Processing media-specific event for [PCloudCleaner.exe!ws!]
 
Error: (11/21/2014 07:33:09 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application PCloudCleaner.exe, version 1.0.0.1533, faulting module msvcr100.dll, version 10.0.30319.1, fault address 0x0008ae6e.
Processing media-specific event for [PCloudCleaner.exe!ws!]
 
Error: (11/21/2014 07:24:51 PM) (Source: crypt32) (EventID: 11) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab>with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
 
Error: (11/21/2014 07:24:51 PM) (Source: crypt32) (EventID: 11) (User: )
Description: Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab>with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
 
Error: (11/21/2014 07:18:00 PM) (Source: Application Error) (EventID: 1000) (User: )
Description: Faulting application pbeagent.exe, version 8.0.1.109, faulting module unknown, version 0.0.0.0, fault address 0x00000000.
Processing media-specific event for [pbeagent.exe!ws!]
 
Error: (11/21/2014 07:17:55 PM) (Source: APCPBEAgent) (EventID: 0) (User: )
Description: Error: 6, SetServiceStatus
 
Error: (11/21/2014 07:17:54 PM) (Source: APCPBEAgent) (EventID: 101) (User: )
Description: Error: 0, Time out 90 seconds. Service start operation canceled.
 
Error: (11/21/2014 07:17:00 PM) (Source: Yosemite Backup for Dell) (EventID: 1) (User: )
Description: Summary
Error: Error 92: The software evaluation date has expired
 
Objects
Machine: Network\S0
Datastream Driver: Network\S0\System Drivers\Microsoft SQL Server Agent
 
Description
The evaluation period for the software has ended. Please contact your reseller to purchase a licensed copy.
 
Error: (11/21/2014 07:16:48 PM) (Source: SQLSERVERAGENT) (EventID: 103) (User: )
Description: SQLServerAgent could not be started (reason: Unable to connect to server '(local)'; SQLServerAgent cannot start).
 
 
System errors:
=============
Error: (11/21/2014 07:23:06 PM) (Source: TermServDevices) (EventID: 1111) (User: )
Description: Driver Black Ice TIFF Driver required for printer Black Ice TIFF is unknown. Contact the administrator to install the driver before you log in again.
 
Error: (11/21/2014 07:23:06 PM) (Source: TermServDevices) (EventID: 1111) (User: )
Description: Driver LAN-Fax M11 required for printer LAN-Fax Ricoh 161 is unknown. Contact the administrator to install the driver before you log in again.
 
Error: (11/21/2014 07:23:04 PM) (Source: TermServDevices) (EventID: 1111) (User: )
Description: Driver RICOH Aficio MP 161 PCL 6 required for printer RICOH Aficio MP 161 is unknown. Contact the administrator to install the driver before you log in again.
 
Error: (11/21/2014 07:19:15 PM) (Source: Service Control Manager) (EventID: 7026) (User: )
Description: The following boot-start or system-start driver(s) failed to load: 
crcdisk
 
Error: (11/21/2014 07:19:15 PM) (Source: Service Control Manager) (EventID: 7022) (User: )
Description: The SQL Server Reporting Services (MSSQLSERVER) service hung on starting.
 
Error: (11/21/2014 07:17:55 PM) (Source: Service Control Manager) (EventID: 7024) (User: )
Description: The APC PBE Agent service terminated with service-specific error 0 (0x0).
 
Error: (11/21/2014 07:17:10 PM) (Source: Server Administrator) (EventID: 2048) (User: )
Description: Device failed:  Battery 0 Controller 0
Device failed:  Battery 0 Controller 0
 
Error: (11/21/2014 07:17:10 PM) (Source: Server Administrator) (EventID: 2169) (User: )
Description: The controller battery needs to be replaced.:  Battery 0 Controller 0
 
Error: (11/21/2014 07:17:04 PM) (Source: 0) (EventID: 1) (User: )
Description: \Device\Scsi\iScsiPort0
 
Error: (11/21/2014 07:16:49 PM) (Source: 0) (EventID: 1) (User: )
Description: \Device\Scsi\iScsiPort0
 
 
Microsoft Office Sessions:
=========================
 
==================== Memory info =========================== 
 
Processor: Intel® Xeon® CPU E5530 @ 2.40GHz
Percentage of memory in use: 41%
Total physical RAM: 4085.91 MB
Available physical RAM: 2395.68 MB
Total Pagefile: 5964.61 MB
Available Pagefile: 4307.9 MB
Total Virtual: 2047.88 MB
Available Virtual: 1958.39 MB
 
==================== Drives ================================
 
Drive c: () (Fixed) (Total:36 GB) (Free:5.42 GB) NTFS
Drive d: (Data) (Fixed) (Total:236.25 GB) (Free:130.28 GB) NTFS
Drive g: (FreeAgent GoFlex Drive) (Fixed) (Total:931.51 GB) (Free:726.73 GB) NTFS
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 1 (MBR Code: Windows XP) (Size: 272.3 GB) (Disk ID: 51A5C712)
Partition 1: (Active) - (Size=36 GB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=236.2 GB) - (Type=07 NTFS)
 
========================================================
Disk: 2 (Size: 931.5 GB) (Disk ID: B402FFD1)
Partition 1: (Not Active) - (Size=931.5 GB) - (Type=07 NTFS)
 
==================== End Of Log ============================
Link to post
Share on other sites

  • 2 weeks later...
  • 1 month later...
  • Root Admin

Sorry for the delay.

 

As this is a Server often many tools are not designed to run on it. I will try to assist you as best I can to clean the  system but it's possible we may not be able to. In most cases when a Server is infected depending on the infection it's best to format the drive recover from backup.

 

 

Hello and :welcome:

Please read the following and post back the logs when ready and we'll see about getting you cleaned up.

General P2P/Piracy Warning:
 
 

 
If you're using
Peer 2 Peer
software such as
uTorrent, BitTorrent
or similar you must either fully uninstall them or completely disable them from running while being assisted here.

Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.

If you have
illegal/cracked software, cracks, keygens etc
. on the system, please remove or uninstall them now and read the policy on
Piracy
.



 
Before we proceed further, please read all of the following instructions carefully.
If there is anything that you do not understand kindly ask before proceeding.
If needed please print out these instructions.
  • Please do not post logs using CODE, QUOTE, or FONT tags. Just paste them as direct text.
  • If the log is too large then you can use attachments by clicking on the More Reply Options button.
  • Please enable your system to show hidden files: How to see hidden files in Windows
  • Make sure you're subscribed to this topic:
    • Click on the Follow This Topic Button (at the top right of this page), make sure that the Receive notification box is checked and that it is set to Instantly

    [*]Removing malware can be unpredictable...It is unlikely but things can go very wrong! Please make sure you Backup all files that cannot be replaced if something were to happen. You can copy them to a CD/DVD, external drive or a pen drive [*]Please don't run any other scans, download, install or uninstall any programs unless requested by me while I'm working with you. [*]The removal of malware is not instantaneous, please be patient. Often we are also on a different Time Zone. [*]Perform everything in the correct order. Sometimes one step requires the previous one. [*]If you have any problems while following my instructions, Stop there and tell me the exact nature of the issue. [*]You can check here if you're not sure if your computer is 32-bit or 64-bit [*]Please disable your antivirus while running any requested scanners so that they do not interfere with the scanners. [*]When we are done, I'll give you instructions on how to cleanup all the tools and logs [*]Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that. [*]Your topic will be closed if you haven't replied within 3 days [*](If I have not responded within 24 hours, please send me a Private Message as a reminder)


 
STEP 0
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes
so that your normal security software can then run and clean your computer of infections.
When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies
that stop us from using certain tools. When finished it will display a log file that shows the processes that were
terminated while the program was running.

As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot
your computer as any malware processes that are configured to start automatically will just be started again.
Instead, after running RKill you should immediately scan your computer using the requested scans I've included.

Please download Rkill by Grinler from one of the links below and save it to your desktop.
 


Link 2

  • On Windows XP double-click on the Rkill desktop icon to run the tool.
  • On Windows Vista/Windows 7 or 8, right-click on the Rkill desktop icon and select Run As Administrator
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
  • Do not reboot the computer, you will need to run the application again.

STEP 01
Backup the Registry:
Modifying the Registry can create unforeseen problems, so it always wise to create a backup before doing so.
  • Please download ERUNT from one of the following links: Link1 | Link2 | Link3
  • ERUNT (Emergency Recovery Utility NT) is a free program that allows you to keep a complete backup of your registry and restore it when needed.
  • Double click on erunt-setup.exe to Install ERUNT by following the prompts.
  • NOTE: Do not choose to allow ERUNT to add an Entry to the Startup folder. Click NO.
  • Start ERUNT either by double clicking on the desktop icon or choosing to start the program at the end of the setup process.
  • Choose a location for the backup.
    • Note: the default location is C:\Windows\ERDNT which is acceptable.

    [*]Make sure that at least the first two check boxes are selected. [*]Click on OK [*]Then click on YES to create the folder. [*]Note: if it is necessary to restore the registry, open the backup folder and start ERDNT.exe


STEP 02
Please run a Threat Scan with MBAM.  If you're unable to run or complete the scan as shown below please see the following:  MBAM Clean Removal Process 2x
When reinstalling the program please try the latest version.

Right click and choose "Run as administrator" to open Malwarebytes Anti-Malware and from the Dashboard please Check for Updates by clicking the Update Now... link
Open up Malwarebytes > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.
Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.
 
 
 

Link to post
Share on other sites

  • 3 months later...
  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.