UKASH Virus .....again :(

Page 1 of 8 123 ... LastLast

  1. Posts : 75
    windows 7 64 bit
       #1

    UKASH Virus .....again :(


    Hi there

    I have the dreaded Ukash virus again, exactly as per last time and last time I was kindly helped in this thread:
    Ukash virus simply won't go away - help pleeeaase

    Can you advise what I need to do to remove it as I guess the script in the previous thread is no longer current?

    Thanks so much in advance

    Darren
      My Computer


  2. Posts : 2,470
    Windows 7 Home Premium
       #2

    darrenj1471,

    Let's use HitmanPro.Kickstart to access your computer, scan it for malware, and remove this infection. The program targets this ransomware.

    Also, you may want to print these instructions, so they are available to follow.

    Now, load a USB flash drive with HitmanPro.Kickstart as follows...
    Note: the contents of the USB flash drive are erased during this process!

    Use a clean (non-infected) computer, and download:
    HitmanPro.Kickstart - Anti ransomware, politievirus, bundestrojaner, Reveton, BKA, GVU - SurfRight

    Under Download (on the right) select the program applicable to the system: 64-bit

    When HitmanPro opens, click the KickStart icon at the bottom of the screen.

    >>Plug in the USB flash drive.

    When the USB flash drive is detected, a selection screen is presented.
    Select the USB flash drive from the choices, and press: Install Kickstart
    A warning that all contents of the selected flash drive will erase is presented.
    Press: Yes

    As the HitmanPro.Kickstart files are loaded, a progress indicator is shown on the screen.
    Once the process is completed a screen is presented with the contents of HitmanPro.Kickstart

    Remove the USB flash drive from the clean computer and press: Close


    Now, with the ransomed computer shut down, plug the USB flash drive into a USB port, and turn on the power.

    When the computer starts, press the key that brings up the Boot Menu. (On some machines its F12, F10, or F2)
    From there, select to boot from the USB drive. (It may say 'Removable Drive' in the options.)
    Info: How to Remove Ransomware - Select Real Security

    Once you select the USB flash drive to boot from, press: Enter

    A Kickstart prompt with USB boot options appears.
    Select: 1 (Bypass the Master Boot Record (Default))

    The system continues to boot from the hard drive and starts Windows.
    If you get a message stating that Windows failed to start, etc., just select: Start Windows Normally

    When Windows boots, you either get a logon screen, or the Desktop is started.
    If you see a logon screen with your User name, logon with it.

    In the next prompt that appears, to start the program without installing to the local hard disk, select the option to do a one-time scan to check the computer.

    To start scanning for malware press: Next

    If malware is detected, the program shows what malware is present on the system using a red framed screen.

    Select Next to quarantine the malware into a secure storage where it can no longer start.

    At the next screen, activate the 30-day free license.

    After successful activation (30 days), press: Next

    A screen indicating that the malware was successfully disabled or removed is presented.
    Press: Next

    To obtain a report of the scan results, press: Save log
    >>Save the Notepad log to the Desktop<<
    It has a name such as: HitmanPro_xxxxxxxx_xxxx

    Remove the USB drive, and press: Reboot
    If no malware is found, press: Close

    After HitmanPro.Kickstart is done, you should be back into normal Windows.

    Please post the HitmanPro log in your reply.


    ~~~~
    To remove any remnant malicious files of the ransomware...

    Download RogueKiller:
    Tlcharger RogueKiller (Site Officiel)

    When you get to the website, go to where it says:
    (Download link) Lien de téléchargement:

    Select the version that applies to your system: x64
    Click the dark-blue button to download.
    Save to the Desktop.

    Close all windows and browsers.
    Right-click and select: Run as Administrator

    At the program console, wait for the prescan to finish. (Under Status, it says: Prescan finished.)

    Press: SCAN

    When done, a report opens on the Desktop: RKreport.txt

    Please provide the RKreport.txt (Mode: Scan) in your reply.
      My Computer


  3. Posts : 6,830
    Windows 7 Ultimate 32-Bit & Windows 7 Ultimate 64-Bit
       #3

    Darren

    you are in good hands here .

    His specs say he has a x64-bit OS .
      My Computer


  4. Posts : 75
    windows 7 64 bit
    Thread Starter
       #4

    thanks I will give this a go....as soon as I can get hold of a usb pen drive as all I have is my external hard drive and I do not want to wipe whats on there. Sadly no stores are open today but thanks thus far
      My Computer


  5. Posts : 35
    Windows 7 64 / Windows 8 64
       #5

    For quicker alternative, check if you can boot to safe mode with networking. Some versions of ukash virus will allow just that, and it is enough to run the scan or stop it from launching on normal reboot.
      My Computer


  6. Posts : 75
    windows 7 64 bit
    Thread Starter
       #6

    Ive done the steps outlined and......YOU RULE. I can boot my infected laptop. Below is the Hitman pro log:

    Code:
    HitmanPro 3.7.3.192
    www.hitmanpro.com
       Computer name . . . . : DARREN-PC
       Windows . . . . . . . : 6.1.1.7601.X64/4
       User name . . . . . . : NT AUTHORITY\SYSTEM
       UAC . . . . . . . . . : Disabled
       License . . . . . . . : Trial (30 days left)
       Scan date . . . . . . : 2013-03-31 20:14:14
       Scan mode . . . . . . : Normal
       Scan duration . . . . : 8m 13s
       Disk access mode  . . : Direct disk access (SRB)
       Cloud . . . . . . . . : Internet
       Reboot  . . . . . . . : Yes
       Threats . . . . . . . : 2
       Traces  . . . . . . . : 3
       Objects scanned . . . : 2,106,709
       Files scanned . . . . : 32,506
       Remnants scanned  . . : 396,254 files / 1,677,949 keys
    Malware _____________________________________________________________________
       C:\Users\darren\AppData\Local\Temp\taskmanger.exe -> Quarantined
          Size . . . . . . . : 94,208 bytes
          Age  . . . . . . . : 1.0 days (2013-03-30 20:57:53)
          Entropy  . . . . . : 6.6
          SHA-256  . . . . . : DFCC5DEEF13154F3CA4D11D2D98A26A980E593A4E9C2CB0230E4DB1A209BAB7C
        > G Data . . . . . . : Trojan.Generic.KDZ.12441 (Engine A)
          Fuzzy  . . . . . . : 108.0
       C:\Users\darren\AppData\Roaming\skype.dat -> Quarantined
          Size . . . . . . . : 94,208 bytes
          Age  . . . . . . . : 1.0 days (2013-03-30 20:58:06)
          Entropy  . . . . . : 6.6
          SHA-256  . . . . . : DFCC5DEEF13154F3CA4D11D2D98A26A980E593A4E9C2CB0230E4DB1A209BAB7C
        > G Data . . . . . . : Trojan.Generic.KDZ.12441 (Engine A)
          Fuzzy  . . . . . . : 154.0
             One or more antivirus vendors have indicated that the file is malicious.
             Substitutes Explorer.exe as the default shell. Malware tends to start this way.
             This file was most recently added as automatic startup.
             The file name extension of this program is not common.
             Authors name is missing in version info. This is not common to most programs.
             Version control is missing. This file is probably created by an individual. This is not typical for most programs.
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
          Startup
             HKU\S-1-5-21-3471356370-426161678-982001811-1001\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
      My Computer


  7. Posts : 75
    windows 7 64 bit
    Thread Starter
       #7

    However I cannot see the link you mean on the RogueKiller website??
      My Computer


  8. Posts : 75
    windows 7 64 bit
    Thread Starter
       #8

    Found it :) Report below:

    RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : RogueKiller - Geeks to Go Forums
    Website : Download RogueKiller (Official website)
    Blog : tigzy-RK
    Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
    Started in : Normal mode
    User : darren [Admin rights]
    Mode : Scan -- Date : 03/31/2013 20:40:54
    | ARK || FAK || MBR |
    ¤¤¤ Bad processes : 0 ¤¤¤
    ¤¤¤ Registry Entries : 4 ¤¤¤
    [TASK][SUSP PATH] ROC_REG_JAN_DELETE.job : C:\ProgramData\AVG January 2013 Campaign\ROC.exe /DELETE_FROM_SYSTEM=1 [7] -> FOUND
    [TASK][SUSP PATH] ROC_REG_JAN_DELETE : C:\ProgramData\AVG January 2013 Campaign\ROC.exe /DELETE_FROM_SYSTEM=1 [7] -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
    ¤¤¤ Particular Files / Folders: ¤¤¤
    ¤¤¤ Driver : [NOT LOADED] ¤¤¤
    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\windows\system32\drivers\etc\hosts

    ¤¤¤ MBR Check: ¤¤¤
    +++++ PhysicalDrive0: Hitachi HTS543232A7A384 +++++
    --- User ---
    [MBR] ab024c489fd8af2cec7a6456c3a19adf
    [BSP] 9b4c2391edd45ea6bfd8c60ec31c089c : KIWI Image system MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 113664 Mo
    2 - [XXXXXX] EXTEN-LBA (0x0f) [VISIBLE] Offset (sectors): 232990720 | Size: 169800 Mo
    3 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 580741120 | Size: 21678 Mo
    User = LL1 ... OK!
    User = LL2 ... OK!
    Finished : << RKreport[1]_S_03312013_02d2040.txt >>
    RKreport[1]_S_03312013_02d2040.txt
      My Computer


  9. Posts : 75
    windows 7 64 bit
    Thread Starter
       #9

    do i delete the entries found by roguekiller?
      My Computer


  10. Posts : 2,470
    Windows 7 Home Premium
       #10

    The entries showing on RogueKiller are of no consequence.

    Let's take an additional step...you never know what else comes along with ransomware.



    Please download Malwarebytes : Malwarebytes Anti-Rootkit

    Save to the Desktop (easy to find)

    Right-click the file and select: Extract here... (to the Desktop)



    Run the program and follow ithe Usage Instructions on the website from Step 3 to Step 6.
    For now, please stop at Step 6.



    When the program is done, two reports are created in the mbar folder:
    1. system-log.txt
    2. mbar-log-2013-02-18 (20-13-32).txt (corresponds to mbar-log-year-month-day (hour-minute-second).txt)



    Please provide the mbar-log containing information on what was detected and removed.
      My Computer


 
Page 1 of 8 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 03:29.
Find Us