Most PC repair technicians (if not all) always start their cleanup process by emptying the temp folders before running any removal tools. It makes sense because temp folders are common places for malware installers to lurk and removing all the junk also cuts down the removal tools scanning time. With this known info, malware writers created rogues that move files to that directory.
So now we have rogue software that will move user's files to the %temp%\smtmp folder.
Infected with this malware, you must NOT empty your temp folders nor run CCleaner or any temp file cleaners until you have fully removed the rogue and everything is back to normal.
So far, the Windows Recovery and Windows Restore rogues are the culprits but there could be other variants that do the same thing.
These rogues hide files and move desktop shortcuts and Programs startmenu shortcuts into this folder --> %temp%\
, it then creates 4 subdirectories:
=> Allusers Start Menu
=> Allusers Quick Launch
=> Quick Launch\User Pinned\TaskBar
=> AllUsers Desktop
If you did not empty your temp folder you can just retrieve those files from there. Or using restoresm.zip which will restore all the missing shortcuts.
Extract the file, open the restoresm folder and doubleclick on restoresm.bat to run it.
Grinler at Bleepingcomputer wrote an excellent tutorial for the removal of this infection, check it out here.
The tools mentioned below also work for most of the family of rogues not just for the rogues that hides files.
Tools needed: (If unable to download tools, use another PC to download into a USB or burn to a CD).
– executables are blocked so you need to run this registry fix so programs will launch.
– run this to kill malware processes (to be sure, use the renamed RKill "iexplore.exe" or other renamed RKill)
– this is another alternative you can use to kill malware processes before running MalwareBytes.
- this is the scanner that removes the infection.
– use this tool to remove the hidden flags of files as this infection hides files on your computer from being seen. The drawback of running unhide.exe is, it unhides ALL files even windows system files with default hidden attributes.
- run this tool if google searches are redirected as this is often bundled with TDSS rootkits.
NOTE: Do Not reboot after running RKill or RogueKiller
otherwise the malware processes will start up again. Straight after killing the malware processes, you need to immediately run MalwareBytes to remove the infection.
If file association is borked after the removal of the infection, you can use these fixes:
Dougknox XP .exe file association fix.
Vista – File association fixes.
Windows 7 file association fixes
*** UPDATE ***
Instead of running all the above-mentioned tools(with the exception of MalwareBytes and TDSSKiller) you could also just run "TheKiller".
Download TheKiller by maliprog
Note that "TheKiller" is renamed as explorer.exe
Double click on it (If running Vista or Windows 7, right click on it and select "Run as an Administrator")
Press OK when the program finished.
Do not restart your system after this step. You then run other tools like MalwareBytes, TDSSKiller or ComboFix.
NOTE: If malware blocks TheKiller from running please try to run it again.
So you used CCleaner and the %temp%\smtmp folder is gone, what now?
If the temp folder has been cleaned and the shortcuts are gone, all is not lost, you can recover those default shortcuts using Ramesh Srinivasan's fixes, or manually restore all by using Noviciate’s
(scroll down to post #30).
* To Restore Accessories Program Files Menu
, unzip, doubleclick on AccRestore.exe to run it and click the "Restore" button.
* To Restore Admin Tools Program Files Menu
, unzip and doubleclick on "Restore Administrative Tools items" button.
* To Restore each program shortcut, the
by Noviciate works. The extracted repair.vbs when run produces needed shortcut links which you can then cut and paste into your start menu folder.
* In Windows 7 - How to restore missing startmenu default shortcuts
* In Vista - How to restore missing startmenu default shortcuts
For XP tutorial images of the above, go to this link below.
If you need assistance removing this infection, post a question in the Virus & Spyware zone or post a comment here and I will try to help if I can.
Hope you find this article helpful.