Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: UKASH Virus .....again :(


30 Mar 2013   #1

windows 7 64 bit
 
 
UKASH Virus .....again :(

Hi there

I have the dreaded Ukash virus again, exactly as per last time and last time I was kindly helped in this thread:
http://www.sevenforums.com/system-se...pleeeaase.html

Can you advise what I need to do to remove it as I guess the script in the previous thread is no longer current?

Thanks so much in advance

Darren

My System SpecsSystem Spec
.

30 Mar 2013   #2

Windows 7 Home Premium
 
 

darrenj1471,

Let's use HitmanPro.Kickstart to access your computer, scan it for malware, and remove this infection. The program targets this ransomware.

Also, you may want to print these instructions, so they are available to follow.

Now, load a USB flash drive with HitmanPro.Kickstart as follows...
Note: the contents of the USB flash drive are erased during this process!

Use a clean (non-infected) computer, and download:
HitmanPro.Kickstart - Anti ransomware, politievirus, bundestrojaner, Reveton, BKA, GVU - SurfRight

Under Download (on the right) select the program applicable to the system: 64-bit

When HitmanPro opens, click the KickStart icon at the bottom of the screen.

>>Plug in the USB flash drive.

When the USB flash drive is detected, a selection screen is presented.
Select the USB flash drive from the choices, and press: Install Kickstart
A warning that all contents of the selected flash drive will erase is presented.
Press: Yes

As the HitmanPro.Kickstart files are loaded, a progress indicator is shown on the screen.
Once the process is completed a screen is presented with the contents of HitmanPro.Kickstart

Remove the USB flash drive from the clean computer and press: Close


Now, with the ransomed computer shut down, plug the USB flash drive into a USB port, and turn on the power.

When the computer starts, press the key that brings up the Boot Menu. (On some machines its F12, F10, or F2)
From there, select to boot from the USB drive. (It may say 'Removable Drive' in the options.)
Info: How to Remove Ransomware - Select Real Security

Once you select the USB flash drive to boot from, press: Enter

A Kickstart prompt with USB boot options appears.
Select: 1 (Bypass the Master Boot Record (Default))

The system continues to boot from the hard drive and starts Windows.
If you get a message stating that Windows failed to start, etc., just select: Start Windows Normally

When Windows boots, you either get a logon screen, or the Desktop is started.
If you see a logon screen with your User name, logon with it.

In the next prompt that appears, to start the program without installing to the local hard disk, select the option to do a one-time scan to check the computer.

To start scanning for malware press: Next

If malware is detected, the program shows what malware is present on the system using a red framed screen.

Select Next to quarantine the malware into a secure storage where it can no longer start.

At the next screen, activate the 30-day free license.

After successful activation (30 days), press: Next

A screen indicating that the malware was successfully disabled or removed is presented.
Press: Next

To obtain a report of the scan results, press: Save log
>>Save the Notepad log to the Desktop<<
It has a name such as: HitmanPro_xxxxxxxx_xxxx

Remove the USB drive, and press: Reboot
If no malware is found, press: Close

After HitmanPro.Kickstart is done, you should be back into normal Windows.

Please post the HitmanPro log in your reply.


~~~~
To remove any remnant malicious files of the ransomware...

Download RogueKiller:
Tlcharger RogueKiller (Site Officiel)

When you get to the website, go to where it says:
(Download link) Lien de téléchargement:

Select the version that applies to your system: x64
Click the dark-blue button to download.
Save to the Desktop.

Close all windows and browsers.
Right-click and select: Run as Administrator

At the program console, wait for the prescan to finish. (Under Status, it says: Prescan finished.)

Press: SCAN

When done, a report opens on the Desktop: RKreport.txt

Please provide the RKreport.txt (Mode: Scan) in your reply.
My System SpecsSystem Spec
30 Mar 2013   #3

Windows 7 Ultimate 32-Bit & Windows 7 Ultimate 64-Bit
 
 

Darren

you are in good hands here .

His specs say he has a x64-bit OS .
My System SpecsSystem Spec
.


31 Mar 2013   #4

windows 7 64 bit
 
 

thanks I will give this a go....as soon as I can get hold of a usb pen drive as all I have is my external hard drive and I do not want to wipe whats on there. Sadly no stores are open today but thanks thus far
My System SpecsSystem Spec
31 Mar 2013   #5

Windows 7 64 / Windows 8 64
 
 

For quicker alternative, check if you can boot to safe mode with networking. Some versions of ukash virus will allow just that, and it is enough to run the scan or stop it from launching on normal reboot.
My System SpecsSystem Spec
31 Mar 2013   #6

windows 7 64 bit
 
 

Ive done the steps outlined and......YOU RULE. I can boot my infected laptop. Below is the Hitman pro log:

Code:
HitmanPro 3.7.3.192
www.hitmanpro.com
   Computer name . . . . : DARREN-PC
   Windows . . . . . . . : 6.1.1.7601.X64/4
   User name . . . . . . : NT AUTHORITY\SYSTEM
   UAC . . . . . . . . . : Disabled
   License . . . . . . . : Trial (30 days left)
   Scan date . . . . . . : 2013-03-31 20:14:14
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 8m 13s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : Yes
   Threats . . . . . . . : 2
   Traces  . . . . . . . : 3
   Objects scanned . . . : 2,106,709
   Files scanned . . . . : 32,506
   Remnants scanned  . . : 396,254 files / 1,677,949 keys
Malware _____________________________________________________________________
   C:\Users\darren\AppData\Local\Temp\taskmanger.exe -> Quarantined
      Size . . . . . . . : 94,208 bytes
      Age  . . . . . . . : 1.0 days (2013-03-30 20:57:53)
      Entropy  . . . . . : 6.6
      SHA-256  . . . . . : DFCC5DEEF13154F3CA4D11D2D98A26A980E593A4E9C2CB0230E4DB1A209BAB7C
    > G Data . . . . . . : Trojan.Generic.KDZ.12441 (Engine A)
      Fuzzy  . . . . . . : 108.0
   C:\Users\darren\AppData\Roaming\skype.dat -> Quarantined
      Size . . . . . . . : 94,208 bytes
      Age  . . . . . . . : 1.0 days (2013-03-30 20:58:06)
      Entropy  . . . . . : 6.6
      SHA-256  . . . . . : DFCC5DEEF13154F3CA4D11D2D98A26A980E593A4E9C2CB0230E4DB1A209BAB7C
    > G Data . . . . . . : Trojan.Generic.KDZ.12441 (Engine A)
      Fuzzy  . . . . . . : 154.0
         One or more antivirus vendors have indicated that the file is malicious.
         Substitutes Explorer.exe as the default shell. Malware tends to start this way.
         This file was most recently added as automatic startup.
         The file name extension of this program is not common.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program starts automatically without user intervention.
         Time indicates that the file appeared recently on this computer.
      Startup
         HKU\S-1-5-21-3471356370-426161678-982001811-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
My System SpecsSystem Spec
31 Mar 2013   #7

windows 7 64 bit
 
 

However I cannot see the link you mean on the RogueKiller website??
My System SpecsSystem Spec
31 Mar 2013   #8

windows 7 64 bit
 
 

Found it Report below:

RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : RogueKiller - Geeks to Go Forums
Website : Download RogueKiller (Official website)
Blog : tigzy-RK
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : darren [Admin rights]
Mode : Scan -- Date : 03/31/2013 20:40:54
| ARK || FAK || MBR |
¤¤¤ Bad processes : 0 ¤¤¤
¤¤¤ Registry Entries : 4 ¤¤¤
[TASK][SUSP PATH] ROC_REG_JAN_DELETE.job : C:\ProgramData\AVG January 2013 Campaign\ROC.exe /DELETE_FROM_SYSTEM=1 [7] -> FOUND
[TASK][SUSP PATH] ROC_REG_JAN_DELETE : C:\ProgramData\AVG January 2013 Campaign\ROC.exe /DELETE_FROM_SYSTEM=1 [7] -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
¤¤¤ Particular Files / Folders: ¤¤¤
¤¤¤ Driver : [NOT LOADED] ¤¤¤
¤¤¤ HOSTS File: ¤¤¤
--> C:\windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤
+++++ PhysicalDrive0: Hitachi HTS543232A7A384 +++++
--- User ---
[MBR] ab024c489fd8af2cec7a6456c3a19adf
[BSP] 9b4c2391edd45ea6bfd8c60ec31c089c : KIWI Image system MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 113664 Mo
2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 232990720 | Size: 169800 Mo
3 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 580741120 | Size: 21678 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Finished : << RKreport[1]_S_03312013_02d2040.txt >>
RKreport[1]_S_03312013_02d2040.txt
My System SpecsSystem Spec
31 Mar 2013   #9

windows 7 64 bit
 
 

do i delete the entries found by roguekiller?
My System SpecsSystem Spec
31 Mar 2013   #10

Windows 7 Home Premium
 
 

The entries showing on RogueKiller are of no consequence.

Let's take an additional step...you never know what else comes along with ransomware.



Please download Malwarebytes : Malwarebytes Anti-Rootkit

Save to the Desktop (easy to find)

Right-click the file and select: Extract here... (to the Desktop)



Run the program and follow ithe Usage Instructions on the website from Step 3 to Step 6.
For now, please stop at Step 6.



When the program is done, two reports are created in the mbar folder:
1. system-log.txt
2. mbar-log-2013-02-18 (20-13-32).txt (corresponds to mbar-log-year-month-day (hour-minute-second).txt)



Please provide the mbar-log containing information on what was detected and removed.
My System SpecsSystem Spec
Reply

 UKASH Virus .....again :(




Thread Tools



Similar help and support threads for2: UKASH Virus .....again :(
Thread Forum
explorer will not start after having ukash virus System Security
Help with the Ukash Virus Please System Security
HELP > ukash virus :( System Security
Ukash virus simply won't go away - help pleeeaase System Security
ukash infection System Security
Solved I need help removing Ukash virus please! System Security
UKASH virus System Security

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 11:11 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33