Malware Issue - Logs Attached

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by happydude99, Nov 6, 2012.

  1. happydude99

    happydude99 Private E-2

    Howdy,

    Roughly a week ago I began having issues with my computer.

    My Avira began noting it was having issues with two files (qeavc.dll & lilese.dll). It also began throwing numerous warnings (40 - 50 at a time) when the machine would first boot up that a malicious file (Medfos.A.2242) had been detected and denied access.

    In the last two days, booting up will be perpetually delayed at the "Loading Personal Settings" screen. With a hard restart it will then boot properly and throw the warnings listed above.

    I've also noted occasional issues with Google re-directs/hijacks in IE and ran through the appropriate process on the site.

    I'm running Windows XP (32-bit).

    Any help you can provide would be greatly appreciated!

    Logs attached.
     

    Attached Files:

    Last edited: Nov 6, 2012
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Run this Disable/Remove Windows Messenger to remove Windows Messenger. Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.

    Uninstall the below old versions of software:
    Java(TM) 6 Update 24
    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Documents and Settings\Owner\Application Data\lilese.dll
    C:\Documents and Settings\Owner\Application Data\qeavc.dll
    C:\Documents and Settings\Owner\Templates\1246605887
    C:\ab_1.gif
    C:\ComboFix.txt
    C:\del_1.gif
    C:\dir.bmp
    C:\edu.bmp
    C:\flk2.gif
    C:\hj_1.gif
    C:\mov_1.gif
    C:\srch_1.gif
    C:\srch_ans_1.gif
    C:\srch_aud_1.gif
    C:\srch_img_1.gif
    C:\srch_loc_1.gif
    C:\srch_map_1.gif
    C:\srch_nws_1.gif
    C:\srch_sh_1.gif
    C:\srch_stk_1.gif
    C:\srch_site_1.gif
    C:\srch_vid_1.gif
    C:\StubInstaller.exe
    C:\trav_1.gif
    
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}]
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "MSMSGS"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "qeavc"=-
    "lilese"=-
    [HKEY_USERS\S-1-5-21-854245398-1614895754-682003330-1003\Software\Microsoft\Windows\CurrentVersion\run]
    "MSMSGS"=-
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. happydude99

    happydude99 Private E-2

    Thanks very much for the swift reply.

    Attached are the requisite logs from the procedure you recommended.

    I received additional Avira warnings during the Java uninstall and OTM "Move It!" process. These warnings were associated with Medfos.A.2242, as well as some sort of Crypt.gen.

    Once the entire process was complete I restarted the computer a couple times and am not receiving the same flurry of Avira warnings.

    I notice in the OTM log that the qeavc.dll and lilese.dll files are still being noted and causing some issue.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    No! They were removed okay. They are now in the OTM quarantine folder.

    Logs look good now.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  5. happydude99

    happydude99 Private E-2

    Well, looks like the malware issues have stopped!

    Appreciate your help!
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     
  7. happydude99

    happydude99 Private E-2

    Since starting this thread, I haven't used my computer very much though the errors it was repeatedly throwing had stopped. The last couple days though a series of warnings have come up from Avira again regarding a few files, namely:
    • lmdsfx - Midhos.xku
    • roasdl - Crypt.ZPACK.Gen8
    • hlp.dat - Agent.36999 Exploit

    I went through the cleaning procedure again and have attached logs to this message.

    I haven't yet repeated the OTM step as I figured it may change based on assessment.

    Thanks.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have some how managed to pick up the same infection again. Different file names but the same infection. Not sure where you are surfing, what you are downloading/doing but you need to be more careful. This was all cleaned up, and now it is back.

    Also it appears that you never completed my previous final instructions which not a good thing to ignore!

    Rerun RogueKiller and run a scan. After it finishes the scan, select the Registry tab and then select any of the below that exist and then click the Delete button.

    Then immediately reboot your PC.

    After reboot, run a new scan with RogueKiller and save a log as in original instructions and attach the new log.

    Also please download OTL by OldTimer.
    • Save it to your desktop.
    • Right mouse click on the OTL icon on your desktop and select Run as Administrator
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      drives
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  9. happydude99

    happydude99 Private E-2

    Appreciate the reply.

    Followed the instructions outlined in your message and have attached the appropriate logs.

    One item found during the

    Throughout the OldTimer scan the computer threw about a half dozen warnings, largely regarding Crypt.ZPACK.Gen8 and Agent.36999 Exploit.

    One item found during the RogueKiller search was deleted.
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Now shut down your protection software (antivirus, antispyware...etc) to avoid possible conflicts.
    • Double-click OTL.exe to run. (Vista/7 right-click and select Run as Administrator)
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
    Code:
    :OTL
    [2012/11/18 14:54:48 | 000,519,168 | ---- | M] () -- C:\Documents and Settings\Owner\Application Data\roasdl.dll
    [2011/03/03 23:34:50 | 000,013,700 | -HS- | C] () -- C:\Documents and Settings\Owner\Local Settings\Application Data\1246605887
    [2011/03/03 23:34:50 | 000,013,700 | -HS- | C] () -- C:\Documents and Settings\All Users\Application Data\1246605887
     
    :Files
    C:\Documents and Settings\Guest\Local Settings\Application Data\AskToolbar
    C:\Documents and Settings\Guest\Local Settings\Application Data\AskToolbar\cache.dat
    C:\Documents and Settings\Guest\Local Settings\Application Data\AskToolbar\config.xml
    C:\Documents and Settings\Owner\Application Data\lmdsfx.dll
    C:\Documents and Settings\Owner\Application Data\roasdl.dll
    C:\Documents and Settings\Owner\Local Settings\Application Data\chromeupdate.crx
    C:\bar.emf
    C:\cayas2.ico
    C:\D2XP_IX86_112a_113c.mpq
     
    :Reg
    [-HKEY_USERS\S-1-5-21-854245398-1614895754-682003330-1003\Software\Softonic]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}]
    :Commands
    [PURITY]
    [EMPTYTEMP] 
    [EMPTYFLASH]
    
    [REBOOT]
    • Now click the [​IMG] button.
    • If the fix needed a reboot please do it.
    • Click the OK button (upon reboot).
    • When OTL is finished, Notepad will open. Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (See: How to attach)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the log from OTL
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  11. happydude99

    happydude99 Private E-2

    I carried out the requisite tasks and have uploaded the two logs requested.

    The computer has stopped throwing the dozens of warnings upon startup that it had been.

    Yesterday evening going through some of the previous steps, as well as allowing it to sit idle, the occasional warning was thrown, particularly in respect to Crypt.ZPACK.Gen8 and Agent.36999 Exploit, but not Midhos.

    Having undertaken this recent process, I'll use it for a few hours, as well as allow it to sit, and see if it continues to toss out warnings or if these appear resolved.

    For now, things look positive.

    Thanks.
     

    Attached Files:

  12. happydude99

    happydude99 Private E-2

    **UPDATE**

    As an update, I have the following warning being thrown by my Avira anti-virus software (taken from "event" log).

    Virus or unwanted program 'TR/Trash.Gen [trojan]'
    detected in file 'C:\System Volume Information\_restore{7B4E927D-922C-4AF8-B09E-5389497F4609}\RP14\A0003241.dll.
    Action performed: Deny access


    These get thrown at irregular intervals (once every 30 - 45 minutes) and seem to occur predominantly when the computer is sitting idle. They began last night and have continued this morning.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Complete my final instructions below and this will be gone.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    8. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  14. happydude99

    happydude99 Private E-2

    Thanks.

    Keeping Malwarebytes for future scanning. Also removed a number of the tools and ran MGclean.

    Went through the System Restore process outlined in the steps and am so far free of warnings.

    Appreciate the help and will run the computer more today to verify it's free and clear.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds