Jump to content

Please help! Infected with malware, maskVPN, need help reverting registry


Go to solution Solved by kevinf80,

Recommended Posts

Hello,

due to my own stupidity, I was infected with malware recently. The notable .exes that I remember are weather.exe (adware?), and maskVPN, along with many changes to my windows task folder.
I also dug around and see what folders and files were added/modified at the time of the attack.
I followed some of the steps mentioned in similar scenarios, by first doing a malwarebyte scan including rootkit, and then adwcleaner, followed by Farbar Recovery Scan Tool. I will attach some of the files down below.


Sorry I am not technological sound but after the scans were completed here are the files I did not recognize that still exist, I made sure that they were created around the same time the malware was installed:
In my System32/Tasks folder, I noticed many windows task files randomly named. Examples are "godfathers" "titans" "stir" "odorous_gears"
A folder named maskVPN was found somewhere which I deleted.
A folder created during the time of attack named Python was found somewhere which I deleted.
A folder containing weather.exe was found and deleted. (This was what caught my attention initially, as when I tried clicking the uninstall.exe in this unknown program, led to some audio adware)
A folder named "CLR Security Config" and security.config.cch inside it, under AppData/Roaming/Microsoft
Among those folders, there were also many "intermission.exe" scattered around.

 

Even after the scans, I still see a folder located in my System32/DriverStore/FileRepository called oemvista.inf_amd64_a572b7f20c402d28 was created during the attack. Inside contained "oemvista.PNF" "oemvista.inf" "tap0901.sys" 
But I could not delete it because "You require permission from SYSTEM to make changes to this folder"

This folder above is related to maskVPN I believe because in Windows>INF, setupapi.dev.log, I found a log of when maskVPN device installed, and it created/altered folders above. I will attach that part of the log below. Please check!

I also noticed that when I checked my windows defender, in App and browser control, the setting "Check apps and files" is greyed out and selected at "Off" out of the three "Block" "Warn" "Off". I could not change it to "Block" due to "This setting is managed by your administrator"

I'm afraid that it had made many changes to my PC including the registry.
I've attached 2 Malwarebyte scans because the first I closed before it was properly finished. I also attached adwCleaner logs and FRST and Addition.

 

Any help will GREATLY be appreciated, thank you so much in advance!

First Malwarebyte Scan.txt Second malwarebyte scan.txt AdwCleaner[S00].txt AdwCleaner[C00].txt setupapi.dev.log.txt FRST.txt Addition.txt

Link to post
Share on other sites

Hello cucumberwhite123120 and welcome to Malwarebytes,

Continue:

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.

NOTE. It's important that both files, FRST or FRSTEnglish, and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed.

The following directories are emptied:
 
  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin


Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

user posted image

The system will be rebooted after the fix has run.

Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.

If your security alerts to this scan either accept the alert or turn off your security to allow Sophos to run and complete.....

Please Do Not use your PC whilst the scan is in progress.... This scan is very thorough so may take several hours...
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....



The Virus Removal Tool scans the following areas of your computer:
  • Memory, including system memory on 32-bit (x86) versions of Windows
  • The Windows registry
  • All local hard drives, fixed and removable
  • Mapped network drives are not scanned.


Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.

Saved logs are found here: C:\ProgramData\Sophos\Sophos Virus Removal Tool\Logs

Let me see those logs in your reply...

Thank you,

Kevin.

fixlist.txt

  • Like 1
Link to post
Share on other sites

Hiya cucumberwhite123120,

Thanks for those logs, Good to hear Sophos log was clean.. I`d like you to run FRST again, see if there are any remnants we may have missed.

Run FRST one more time, ensure all boxes are checkmarked under "Whitelist" but only Addition.txt under "Optional scan" Select scan, when done post the new logs. "FRST.txt" and "Addition.txt"

user posted image
 
Thank you,
 
Kevin..
  • Like 1
Link to post
Share on other sites

Thanks for those logs, continue:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

user posted image
 
Let me see that log in your next reply....

fixlist.txt

Edited by kevinf80
  • Like 1
Link to post
Share on other sites

  • Solution

Hiya cucumberwhite123120

I would recommend that you change any passwords that you use on this PC, specifically any with a financial impact. The last FRST logs did not show any malware or infection, the fix was only removing inert remnants.... Unless you have any more concerns we can finish up:

Uninstall the following program (unless you prefer to keep it):

Sophos AV

http://www.askvg.com/how-to-completely-uninstall-remove-a-software-program-in-windows-without-using-3rd-party-software/

Also delete this folder if still present: C:\ProgramData\Sophos

Next,

Right click on FRST here: C:\Users\Eddy\Desktop\FRST\FRST.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator"

If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST to uninstall

That action will remove FRST and all created files and folders...

Next,

Remove all System Restore Points: https://www.tenforums.com/tutorials/33593-delete-system-restore-points-windows-10-a.html#option2

Create clean fresh Restore Point: http://www.thewindowsclub.com/create-system-restore-point

Run Windows Disk Clean Up Utility - https://neosmart.net/wiki/disk-cleanup/

Condsider the following:

Malwarebytes Browser Guard (Free) for Firefox: https://addons.mozilla.org/en-GB/firefox/addon/malwarebytes/

Malwarebytes Browser Guard (Free) for Chrome: https://chrome.google.com/webstore/detail/malwarebytes-browser-guar/ihcjicgdanjaechkgeegckofjjedodee

PatchMyPC, keep all your software upto date - https://patchmypc.com/home-updater#download

From there you should be good to go...

Next,

Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Kevin... user posted image
  • Like 1
Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you

 

 

  • Like 1
Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.