PDA

View Full Version : Manual Removal Guide for MagicControl.Agent



Friday
2008-11-28, 17:42
The following instructions have been created to help you to get rid of "MagicControl.Agent" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
malware

Description:
Installs itself into the Windows directory (with some .dll-data and others). Operates as a backdoor. Stands in relation to the Smitfraud-C. malware.
Removal Instructions:

Autorun:

Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd), RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) or msconfig.exe to remove the following autorun entries.

Entries named "mslagent" and pointing to "<$WINDIR>\mslagent\mslagent.exe".
Entries named "mslagent".
Entries pointing to "mslagent\MSLAGENT.EXE".

Installed Software List:

You can try to uninstall products with the names listed below; for items identified by other properties or to avoid malware getting active again on uninstallation, use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) or RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) to locate and get rid of these entries.

Products that have a key or property named "mslagent".
Products that have a key or property named "mslagent".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$WINDIR>\mslagent\2_mslagent.dll".
The file at "<$WINDIR>\mslagent\mslagent.exe".
The file at "<$WINDIR>\mslagent\uninstall.exe".
The file at "<$WINDIR>\mslagent\2_mslagent.dll".
The file at "<$WINDIR>\mslagent\acknowledged.mc2".
The file at "<$WINDIR>\mslagent\CompManagerPersist.mc2".
The file at "<$WINDIR>\mslagent\mslagent.exe_1,0,3,2".
The file at "<$WINDIR>\mslagent\OrderPersist.mc2".
The file at "<$WINDIR>\mslagent\TimePersist".
The file at "<$SYSDIR>\msklive.dll".
The file at "<$WINDIR>\mslagent\2_mslagent.dll".
The file at "<$WINDIR>\mslagent\3_1,0,0,9_mslagent.dll".
The file at "<$WINDIR>\mslagent\4a_1,0,1,4_mslagent.dll".
The file at "<$WINDIR>\mslagent\4b_1,0,0,6_mslagent.dll".
The file at "<$WINDIR>\mslagent\acknowledged.mc2".
The file at "<$WINDIR>\mslagent\CompManagerPersist.mc2".
The file at "<$WINDIR>\mslagent\mslagent.exe".
The file at "<$WINDIR>\mslagent\NaviPersist.mc2".
The file at "<$WINDIR>\mslagent\NaviPromo.mc2".
The file at "<$WINDIR>\mslagent\OrderPersist.mc2".
The file at "<$WINDIR>\mslagent\TimePersist".
The file at "<$WINDIR>\mslagent\uninstall.exe".
The file at "<$SYSDIR>\msegcompid.dll".
Make sure you set your file manager to display hidden and system files. If MagicControl.Agent uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Folders:

Please use Windows Explorer or another file manager of your choice to locate and delete these folders.

The directory at "<$WINDIR>\mslagent".
Make sure you set your file manager to display hidden and system files. If MagicControl.Agent uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify folders!

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

Delete the registry key "{008DB894-99ED-445D-8547-0E7C9808898D}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{19068197-6F58-4E8A-8007-7155A68CA967}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{52BCFE5A-2015-4AB2-83F0-80903A38D9A6}" at "HKEY_CLASSES_ROOT\CLSID\".
A key in HKEY_CLASSES_ROOT\ named "mslagent.3.1", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "mslagent.8", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "mslagent.8.1", plus associated values.
Delete the registry key "{7ACD434E-3DBB-415F-9D04-0C4ED32DE403}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{D55589F7-2879-47E8-9C66-27DE6477A814}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry value "SA" at "HKEY_CURRENT_USER\Software\mc\".
A key in HKEY_CLASSES_ROOT\ named "NaviScoring.EGNaviScoring", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "mslagent.3", plus associated values.
Delete the registry key "{D7A82A12-05F5-42D8-B30D-6EF995075D2D}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{4A6FA2EB-F381-4503-87D0-BE4CC57DEB8E}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{75A603E7-8BB7-4272-ABBE-9846FF1241C1}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{DE614603-6320-4046-A7A7-6A69CEC26F14}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{1EF28CC5-8D97-4310-B71B-CA34EE15B897}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{43CDAD65-AA0D-4701-8108-117F86613B69}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{510C3373-4842-4944-8729-0AFF6725A132}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{6D3F48F4-B40A-4C3F-A95C-85E23C3A8A91}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{BA49BD6A-039C-428E-AF33-8C1288D75A7B}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{5630B768-1C09-4105-9E03-E35985E36B0B}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{82C0673C-F1D1-47BA-B904-AB0DE82300BC}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "{CA72BD3D-6044-4429-8C9A-76D90F4B29A8}" at "HKEY_CLASSES_ROOT\TypeLib\".
If MagicControl.Agent uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.