Hitman flashdrive Kickstart boot for Ransom virus didn't work!

johnjoebow

New Member
Thread author
Jul 30, 2013
9
laptop blocked with Met Police fake site
Laptop won't boot up in safe/ safe network/safe prompt.
Keeps closing down safe boot and rebooting normally - then shows ransom screen again.
Tried to create Hitman flashdrive kickstart boot - but comp wouldn't boot from flashdrive with downloaded Hitman pro 3 software from surfright.
After instructing laptop to boot from USB device - following notice came up - "No bootable partition in table".
So can't get into computer to send back to restore point and run malware cleaner. Please anyone help? Getting desperate.
Thanks
P.S. As I can't get into the computer at all I can't do any mandatory scans - but as rules say I cant create post without it I've just ticked one of the squares
 

Fiery

Level 1
Jan 11, 2011
2,007
Hi and welcome to MalwareTips! :)

I'm Fiery and I would gladly assist you in removing the malware on your computer.

PLEASE NOTE: The first 3 posts of ALL new members require approval by mods/admins. Please be patient if you don't see your post immediately after submitting it.

Before we start:
  • Note that the removal process is not immediate. Depending on the severity of your infection, it could take a long time.
  • Malware removal can be dangerous. I cannot guarantee the safety of your system as malware can be unpredictable. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system. Therefore, I would advise you to backup all your important files before we start.
  • Please be patient and stay with me until I give you the green lights and inform you that your PC is clean.
  • Some tools may be flagged by your antivirus as harmful. Rest assure that ALL the tools we use are safe, the detections are false positives.
  • The absence of symptoms does not mean your PC is fully disinfected.
  • If you are unclear about the instructions, please stop and ask. Following the steps in the order that I post them in is vital.
  • Lastly, if you have requested help on other sites, that will delay and hinder the removal process. Please only stick to one site.

<hr>
Download Farbar Recovery Scan Tool from the below link:
<ul><li>For 64 bit systems download <a title="External link" href="http://download.bleepingcomputer.com/farbar/FRST64.exe" rel="nofollow external"><>Farbar Recovery Scan Tool x64</></a> and save it to a USB/flash drive.</li>

<li>Plug the flashdrive into the infected PC.</li>

<li>Enter <>System Recovery Options</>.</li>

<>To enter System Recovery Options from the Advanced Boot Options:</>
<ul>
<li>Restart the computer.</li>
<li>As soon as the BIOS is loaded begin tapping the<> F8</> key until Advanced Boot Options appears.</li>
<li>Use the arrow keys to select the <>Repair your computer</> menu item.</li>
<li>Select <>US</> as the keyboard language settings, and then click <>Next</>.</li>
<li>Select the operating system you want to repair, and then click <>Next</>.</li>
<li>Select your user account an click <>Next</>.</li>
</ul>

<li>On the System Recovery Options menu you will get the following options:</span>
<pre>Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt</pre>
<ol>
<li>Select <>Command Prompt</></li>
<li>In the command window type in <>notepad</> and press <>Enter</>.</li>
<li>The notepad opens. Under File menu select <>Open</>.</li>
<li>Select "Computer" and find your flash drive letter and close the notepad.</li>
<li>In the command window type <><span style="color: #ff0000;">e</span>:\frst64</> and press <>Enter</>
<>Note:</><span style="color: #ff0000;"> Replace letter <>e</> with the drive letter of your flash drive.</span></li>
<li>The tool will start to run.</li>
<li>When the tool opens click <>Yes</> to disclaimer.</li>
<li>Press <>Scan</> button.</li>
<li><>FRST</> will let you know when the scan is complete and has written the <>FRST.txt</> to file, close the message.
<li>Type exit</li>
<li>Please copy and paste FRST.txt in your next reply</li></li>
</ol>
</ul>
 
Last edited by a moderator:

johnjoebow

New Member
Thread author
Jul 30, 2013
9
I'm due to catch a plane soon. Please bear with me as I shall not be able to continue following your instructions till I get back on 9th August. Thanks
 

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Fiery said:
Ok, have a safe trip :)

Hi I'm back from my trip. I followed your instructions and now have the FRST.txt file on notepad on my infected computer after the scan.
But how do I copy it and send to you in my next reply to you from this spare uninfected computer I am using to contact you. Sorry if this paints me as a bit of an idiot - but tech wise, I am!
Not sure what I can do on the infected computer - so am afraid to try anything, except with guidance. Please would you be so good as to guide me. Thanks.
 

Fiery

Level 1
Jan 11, 2011
2,007
Hi,

Do you have a USB or flash drive? You can transfer the FRST.txt file from your infected PC to the USB and then to your spare computer. If not, please visit: http://pastebin.com/ and paste the frst.txt log there. Click Submit and post the link/URL in your next reply.
 

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Hi. Sorry for appearing a bit of a plonker, but here is the FRST file
 

Attachments

  • FRST.txt
    28.2 KB · Views: 171

Fiery

Level 1
Jan 11, 2011
2,007
Hello :)

On your spare PC, Open notepad and copy & paste the following:

start
HKU\john\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] - C:\Users\john\AppData\Local\Temp\rnmmqfbwlpwcltsqa.exe [56320 2013-07-30] () <===== ATTENTION
HKU\john\...\Winlogon: [Shell] cmd.exe [345088 2010-11-20] (Microsoft Corporation) <==== ATTENTION
HKU\john\...\Command Processor: "C:\Users\john\AppData\Local\Temp\rnmmqfbwlpwcltsqa.exe" <===== ATTENTION!
2013-07-30 07:35 - 2013-07-30 07:35 - 01038437 _____ C:\ProgramData\2433f433
2013-07-30 07:35 - 2013-07-30 07:35 - 01038383 _____ C:\Users\john\AppData\Roaming\2433f433
2013-07-30 07:35 - 2013-07-30 07:35 - 01038373 _____ C:\Users\john\AppData\Local\2433f433
C:\Users\john\AppData\Local\Temp\rnmmqfbwlpwcltsqa.exe
end

and save it as fixlist.txt onto your flash drive.

Then, boot to system recovery, plug in your flash drive, open FRST and click fix. Post the generated log.

Then attempt to boot the infected PC normally. If successful,

Download Malwarebytes Anti-Rootkit from here to your Desktop
  • Unzip the contents to a folder on your Desktop.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Make sure there is a check next to Create Restore Point and click the Cleanup button to remove any threats. Reboot if prompted to do so.
  • After the reboot, perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If there are threats, click Cleanup once more and reboot.
  • When done, please post the two logs in the MBAR folder(mbar-log.txt and system-log.txt)

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool(For Vista or Windows 7, right-click and select Run as Administrator to start)
  • Click delete
  • Please post the content of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt

Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select Run as Administrator to start
  • Wait until Prescan has finished, then click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • Click delete and wait until it saids deleting finished
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
    Exit/Close RogueKiller+
 

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Hi and thanks a lot. Your solutions worked a treat and my laptop is apparently back to normal. Here are the requested logs from the various fixes. And once again THANK YOU!
 

Attachments

  • mbar-log-2013-08-11 (11-16-18).txt
    2.2 KB · Views: 91
  • mbar-log-2013-08-11 (12-48-38).txt
    2 KB · Views: 89
  • system-log.txt
    46.1 KB · Views: 113
  • Fixlog2.txt
    806 bytes · Views: 109
  • AdwCleaner[S1].txt
    2 KB · Views: 123
  • RKreport[0]_S_08112013_141749.txt
    3.1 KB · Views: 93
  • RKreport[0]_D_08112013_141841.txt
    3.3 KB · Views: 92

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Hi; I've been looking all over the site to leave good feedback for you but I can't find where I go. Can you advise as you deserve a few gold stars - at least!
Thanks.
 

Fiery

Level 1
Jan 11, 2011
2,007
Good to hear all is well :) If you like, you can hit the Kudos button right under this reply.

We will run a few more scans just to be sure your PC is clean. Then we will clean up and delete the quarantined files for good.

Please download Malwarebytes' Anti-Malware from here to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • When it prompts you to try their 30-day trail, click decline
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Run Eset NOD32 Online AntiVirus here

Note: You will need to use Internet Explorer for this scan.
Vista / 7 users: You will need to to right-click on the Internet Explorer icon and select Run as Administrator
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Disable your current antivirus software. You can usually do this with its Notfication Tray icon near the clock.
  • Make sure that the option "Remove found threats" is Un-checked, and the following Advance Settings are Checked
    • Scan unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click Scan
  • Wait for the scan to finish
  • When the scan is done, if it shows a screen that says "Threats found!", then click "List of found threats", and then click "Export to text file..."
  • Save that text file on your desktop. Copy and paste the contents of that log in your next reply to this topic.
  • The log can also be found in logfile located at C:\Program Files\ESET\Eset Online Scanner\log.txt
 

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Hi
I've done these two latest scans and the logs are attached.
The only odd thing about my computer (before these scans) is a warning about "Windows Security Centre Service" There's a red cross against the security flag (bottom right) and when I click the flag it says "WINDOWS SECURITY CENTRE CAN'T BE STARTED" When opened up, the Network Access Protection Agent Service is "OFF" and can't be switched back on (no connection to internet) even though my internet is working fine.
Is this a problem?
Otherwise everything is working well.

P.S. Also - When scanning with Malwarebytes' Anti-Malware, I think I didn't click decline when offered a 30 day trial. Will this be a problem?
 

Attachments

  • mbam-log-2013-08-12 (18-08-32).txt
    1.9 KB · Views: 93
  • Eset log txt.txt
    330 bytes · Views: 107

Fiery

Level 1
Jan 11, 2011
2,007
Hi,

Try the below and let me know the results. If it works, we will clean up your tools and i'll give you some recommendations.

Download and Run Windows Repair (all in one)

Download Windows Repair (all in one)

  • Install the program then run it.
  • Go to step 2 and allow it to run Disc check by clicking Do It
  • Go to step 3 and allow it to run SFC
  • Go to start repairs tab and click start.
  • Allow the program to create a system restore and backup registries when prompted.
  • Check the box next to "Restart/Shutdown system when finished" and ensure all the boxes are checked along with the default checks
  • Then click Start.
 

johnjoebow

New Member
Thread author
Jul 30, 2013
9
Hi,
The Windows Repair worked and my Windows Security Centre is now fully working. Thanks for that.

Can I just remind you that when I did the ESET scan, you asked me NOT TO "remove found threats".

So the 3 "threats" found, as logged in the ESET log.txt (Attached again for your convenience) are I presume still on my computer. Should I remove them - and if so - how?

Thanks a lot.
 

Attachments

  • Eset log txt.txt
    330 bytes · Views: 62

johnjoebow

New Member
Thread author
Jul 30, 2013
9
By the way - have you any views on speeding up my laptop. 3 year old dell. Recently (the last year) it seems to have slowed considerably. I've done all the first thoughts such as defrag/remove temp files. Just wondered whether there was some obvious stuff I'd missed.

Thanks again
 

Fiery

Level 1
Jan 11, 2011
2,007
Hi,

Good to hear the security center is working. The 3 threats found by ESET are either quarantined or not threats.

In regards to the speed, how much RAM does your laptop have? And how long have you been using McAfee? My experience with McAfee is that it slows down the PC somewhat. I recommend you change your antivirus to one listed below.

If you are no longer experiencing any other issues, your PC is now clean!

Download OTL by Old Timer from here and save it to your Desktop.
  • Double click on OTL to run it
    • Click on the Cleanup button at the top.
    • You will be asked to reboot the machine to finish the Cleanup process. Choose Yes
    • This will remove itself and other tools we may have used.

    Also, open adwCleaner and click Uninstall




    Now that your PC is clean, I recommend you to create a new System Restore point then purge the old ones after.

    For Windows 7
    Create a restore point
    Delete all but the most recent restore point - Click the Delete all but the most recent restore point link



    Keeping your programs (especially Adobe and Java products) updated is essential. Outdated programs make your PC more vulnerable to future malware threats. To help you:
    • Download and install Update Checker. It will notify you if any of your programs require an update.
    • Microsoft releases patches for Windows and Office products regularly to patch up Windows and Office product bugs and vulnerabilities.
    • Please ensure you update your system regularly and have automatic updates on. You can learn how to turn Automatic Updates on here


    I also recommend you to switch your antivirus program to a better one. Here are some suggestions:

    In addition to your antivirus, you need additional protection such as a firewall and behavioural blocker. However, adding one of these programs may slow down performance. It is for you to decide the trade off between more security and a faster PC.


    Other steps that you may want to do to further protect your system/files:
    • Sandboxie - "Quarantines" your browser so anything that you do in it will be isolated from your system.
    • Backup important files regulary to an external hard-drive or USB

    Here are only a few suggestions that will improve your system security. Should you wish to allow us to make full recommendations and set your PC up with maximum security, please start a thread here. Our community of PC enthusiasts and experts will give you feedback and help you secure your system from future malware infections.

    Should you want to try a product but don't know how it performs, here is a list of current reviews to help you decide.


    Internet Explorer may be the most popular browser but it's definitely not the most secure browser. Consider using other browsers with addition add-ons to safeguard your system while browsing the internet.

    Firefox is a more secure, faster browser than Internet Explorer. Firefox contains less vulnerabilities, reducing the risk of drive-by downloads. In addition, you can add the following add-ons to increase security.
    • KeyScramber - Encrypts your keystrokes to protect you against keyloggers that steals personal & banking information
    • AdBlock - Disable/blocks advertisements on websites so you won't accidentally click on a malicious ad.
    • NoScript - Disables Flash & Java contents to avoid exploits or drive-by attacks
    • Web of Trust - Shows the website rating by other users and blocks dangerous and poor-rated sites

    Google Chrome is another good browser that is faster and more secure than Internet Explorer by having a sandbox feature. Additionally, you can add the following add-on to Chrome to heighten security.


    Lastly, it is important to perform system maintenance on a regular basis. Here are a few tools and on-demand scanners that you should keep & use every 1-2 weeks to keep your system healthy.

    Other than that, stay safe out there! If you have any other questions or concerns, feel free to ask :)

    My virus removal help is always free. Should you wish to show your appreciation via a donation, it will be much appreciated.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top