malware removal help

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by xthor244, Jun 10, 2015.

  1. xthor244

    xthor244 Private E-2

    Hi, I went through the steps and I am still having issues. There is still multiple pop-ups and ads being spammed at me whenever I use any browser. I followed the steps including the junkremover for browser hijacking and this is still occurring.
    It has been happening for the past 3 days when my girlfriend brought here computer from work home to work at home. She tried to download software she needed for work from a source that was less than legit.


    I was unable to upload the hitmanpro log as it exceeded the maximum allowed file size.

    Also, the correct malwarebytes log did not make it to my flash drive, so I will have to retrieve the copy and upload it later tonight.
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Zip the Hitman log or split it into two parts and attach it that way. Also attack the MBAM log.
     
  3. xthor244

    xthor244 Private E-2

    sorry for delay. here are the hitman and malwarebytes logs
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Rerun Hitman and have it fix everything it finds.

    Rerun RogueKiller and fix these items:
    Code:
    ¤¤¤ Registry : 15 ¤¤¤
    [PUP] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4efb-9B51-7695ECA05670} -> Found
    [Suspicious.Path|VT.Gen:Variant.Mikey.14573] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\azaivluz ("C:\ProgramData\VabnhGazib\bhgeaero.exe" /ts2=1) -> Found
    [Suspicious.Path|VT.Gen:Variant.Graftor.192551] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bolgebsusc ("C:\ProgramData\VabnhGazib\bhgewero.exe" -cms) -> Found
    [Suspicious.Path|VT.Gen:Variant.Kazy.631029] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CaamtPugreg ("C:\ProgramData\VabnhGazib\NufkNypwe.exe" -cmd) -> Found
    [Suspicious.Path|VT.Trojan-Downloader.Win32.Agent.abdee] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\maeq (c:\windows\maeq.exe) -> Found
    [Suspicious.Path|VT.Gen:Variant.Mikey.14573] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\azaivluz ("C:\ProgramData\VabnhGazib\bhgeaero.exe" /ts2=1) -> Found
    [Suspicious.Path|VT.Gen:Variant.Graftor.192551] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\bolgebsusc ("C:\ProgramData\VabnhGazib\bhgewero.exe" -cms) -> Found
    [Suspicious.Path|VT.Gen:Variant.Kazy.631029] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\CaamtPugreg ("C:\ProgramData\VabnhGazib\NufkNypwe.exe" -cmd) -> Found
    [Suspicious.Path|VT.Trojan-Downloader.Win32.Agent.abdee] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\maeq (c:\windows\maeq.exe) -> Found
    [Suspicious.Path|VT.Gen:Variant.Mikey.14573] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\azaivluz ("C:\ProgramData\VabnhGazib\bhgeaero.exe" /ts2=1) -> Found
    [Suspicious.Path|VT.Gen:Variant.Graftor.192551] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\bolgebsusc ("C:\ProgramData\VabnhGazib\bhgewero.exe" -cms) -> Found
    [Suspicious.Path|VT.Gen:Variant.Kazy.631029] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\CaamtPugreg ("C:\ProgramData\VabnhGazib\NufkNypwe.exe" -cmd) -> Found
    [Suspicious.Path|VT.Trojan-Downloader.Win32.Agent.abdee] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\maeq (c:\windows\maeq.exe) -> Found
    Now go to the tasks tab and fix these items:
    Code:
    ¤¤¤ Tasks : 9 ¤¤¤
    [Suspicious.Path] SM7i1xzViNp0eBzxxvMUB.job -- C:\Users\james\AppData\Roaming\SM7i1xzViNp0eBzxxvMUB.exe (--c=hbH+TXRbfhzcFxqSCYeVZIbohDEwGeKyvgEvSD8h+nloh4JPQ7/aKVNlZX99HKpQFMe3OELOmmZLpB1leWSX0uxMRQkdN3k34+kUx/P+whOiwplXSg1WfBhi5wHZ36RvcrlQ4EBcXM+zS1DsNu9reN3lm1lQzeqVN1ME8wwDl2oEbDSjPemMgxZx7XMO4J5xjXCjoANtkAS1yINQvx8BYvNDEtnJ3XTwpktnf2cwG87HaljZQEPAPZRtbIVhJClISAmf003mKbGleQQu2uCaEaKC3HR9FY5Hka8MUZcgbwgTPrwh9ufj/eXNYMex93AOTzS7rlm7aKxsaBKH9gc+8w==) -> Found
    [Suspicious.Path] XdHxuInoIZAMVPysQ1UnHf.job -- C:\Users\james\AppData\Roaming\XdHxuInoIZAMVPysQ1UnHf.exe (--c=kz3i6MzK9OJs6842+QyQYjdHShl80ojzE2zM9naFjTffS4iW/476kS8fEdbo0tfA14JQTm9Rw6rCFBEfDChUfG4SeFf+kwQ4ez+rJvNlWWLCAZpWFuO1mgiPCJcvJmokAiuj3W04Cs34wrbHiJsYRt3acaqpiu5atQMk9JK3V3kJHy/IknASb4M/fMlzAipemh77rbV7NoLgAqaVrC29x3M2mqD7rX+hdJAwy2F9Y2EXj0cpEh8WVqoyOp1SeY5fLSPGwn/lCodXRAKPKyP8JAdvXTI27zk2NVdFurA6gIltP/W3cd4dO4LJrF+Z3uL5rNTLL+IVLCKWDVABSOoC/Q==) -> Found
    [Suspicious.Path] \\SM7i1xzViNp0eBzxxvMUB -- C:\Users\james\AppData\Roaming\SM7i1xzViNp0eBzxxvMUB.exe (--c=hbH+TXRbfhzcFxqSCYeVZIbohDEwGeKyvgEvSD8h+nloh4JPQ7/aKVNlZX99HKpQFMe3OELOmmZLpB1leWSX0uxMRQkdN3k34+kUx/P+whOiwplXSg1WfBhi5wHZ36RvcrlQ4EBcXM+zS1DsNu9reN3lm1lQzeqVN1ME8wwDl2oEbDSjPemMgxZx7XMO4J5xjXCjoANtkAS1yINQvx8BYvNDEtnJ3XTwpktnf2cwG87HaljZQEPAPZRtbIVhJClISAmf003mKbGleQQu2uCaEaKC3HR9FY5Hka8MUZcgbwgTPrwh9ufj/eXNYMex93AOTzS7rlm7aKxsaBKH9gc+8w==) -> Found
    [Suspicious.Path] \\Vnesasidudo -- "C:\ProgramData\Vnesasidudo\1.0.1.0\mnaalxlo.exe" ("/e=L3A9MjEwODAxXi91PThiNzM3M2JiMjllYzQ2ODM4Yzk1MDczZTZlNzY0ODIwXi9kPXRyYWNrYnJlYWtpbmduZXdzLmNvbV4vbj1ORVdTXi9hPUJyZWFraW5nTmV3c0FsZXJ0Xi90") -> Found
    [Suspicious.Path] \\Web Tool Runner -- %LOCALAPPDATA%\5F8DE425-EB88-194D-80D0-B4ADFEA8986F\Runner.exe -> Found
    [Suspicious.Path] \\XdHxuInoIZAMVPysQ1UnHf -- C:\Users\james\AppData\Roaming\XdHxuInoIZAMVPysQ1UnHf.exe (--c=kz3i6MzK9OJs6842+QyQYjdHShl80ojzE2zM9naFjTffS4iW/476kS8fEdbo0tfA14JQTm9Rw6rCFBEfDChUfG4SeFf+kwQ4ez+rJvNlWWLCAZpWFuO1mgiPCJcvJmokAiuj3W04Cs34wrbHiJsYRt3acaqpiu5atQMk9JK3V3kJHy/IknASb4M/fMlzAipemh77rbV7NoLgAqaVrC29x3M2mqD7rX+hdJAwy2F9Y2EXj0cpEh8WVqoyOp1SeY5fLSPGwn/lCodXRAKPKyP8JAdvXTI27zk2NVdFurA6gIltP/W3cd4dO4LJrF+Z3uL5rNTLL+IVLCKWDVABSOoC/Q==) -> Found

    Download OTM by Old Timer and save it to your Desktop.


    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :Services
    azaivluz
    bolgebsusc
    CaamtPugreg
    
    :files
    C:\ProgramData\VabnhGazib\bhgewero.exe
    C:\ProgramData\VabnhGazib\NufkNypwe.exe
    C:\Windows\system32\tasks\SM7i1xzViNp0eBzxxvMUB
    C:\Windows\system32\tasks\Vnesasidudo
    C:\Windows\system32\tasks\XdHxuInoIZAMVPysQ1UnHf
    C:\ProgramData\12db864551ae4c578eb17db1a9f5d3cf
    C:\ProgramData\20NG56.dat
    C:\ProgramData\28341ff220e0446c9fff27c4493d622e
    C:\ProgramData\88790380000132b
    C:\ProgramData\VabnhGazib
    C:\Windows\TEMP\*.*
    C:\Users\james\AppData\Local\Temp\*.*
    
    :Commands
    [emptytemp]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.


    Reboot and rescan with RogueKiller and Hitman and attach the new logs as well.
     
    Last edited: Jun 12, 2015
  5. xthor244

    xthor244 Private E-2

    the computer is acting a lot better as of now, thank you for the help.

    here are the attached logs aside from the results under the green area in the OTM scan, i was unable to copy/paste these results prior to the reboot.

    also could you possibly recommend an active type protection which may help avoid this situation again(either free or of lower cost) and preferably a software package that doesn't use much system resources.

    again thanks for all the help and support!:)
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Good to know.

    If you are not having any other malware problems, it is time to do our final steps:

    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.

    8. After doing the above, you should work thru the below link:

     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds