Malware / Trojans Still Present

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by soylentgrun, Jul 4, 2013.

  1. soylentgrun

    soylentgrun Private E-2

    So, I've gone through the steps in the Read & Run Me First Malware Removal Guide thread, as well as the Windows XP Malware Removal / Cleaning Procedure Thread (With the exception of Step 4) and in some of the instructional steps it said to NOT remove the files using that program, so it is my assumption that some trojans found through those (Namely HitManPro) are still present. Also, it is important to note that I downloaded CCleaner and ran a Registry Scan and Fix on the advice of a friend BEFORE finding this forum. Sorry for that. I wish I'd found this place sooner.

    What initially got me onto this thread was that multiple instances of iexplore.exe would show up in the Processes Tab in Task Manager and use a great deal of memory. As of right now, after going through the processes in the threads, they are NOT recurring.

    Otherwise, my PC has been fairly efficient even recently, but I have noticed that it is running at a maximum nearly all of the the time, even when I am not using it. (The fan is whirring at high speed, making quite a bit of noise, as if several processes are running in the background even though I am not actively using the thing and no applications are left open.) The only time the labored sounds it makes cease is when I am logged out or the PC is shut off, NOT when I have switched users.

    I've attached my logs for review. If there is still anything lingering, I would really like to get rid of it before taking the last step in the Windows XP Malware Removal / Cleaning Procedure thread where I toggle system restore.

    Any help would be greatly appreciated. :)
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:


    • [RUN][SUSP PATH] HKCU\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKCU\[...]\Run : AhnLab (RUNDLL32.EXE "C:\Documents and Settings\dan\Local Settings\Application Data\AhnLab\tedscjfk.dll",jmtvab [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKCU\[...]\Run : Huaweicfgcdrom (rundll32.exe "C:\Documents and Settings\dan\Application Data\Huaweicfgcdrom\Huaweicfgcdrom.dll",s32Mouse90 locDlg54 [x][-][x][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\.DEFAULT\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-19\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-20\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1812667914-3538318784-2396209619-1007\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1812667914-3538318784-2396209619-1007\[...]\Run : AhnLab (RUNDLL32.EXE "C:\Documents and Settings\dan\Local Settings\Application Data\AhnLab\tedscjfk.dll",jmtvab [x][-][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-21-1812667914-3538318784-2396209619-1007\[...]\Run : Huaweicfgcdrom (rundll32.exe "C:\Documents and Settings\dan\Application Data\Huaweicfgcdrom\Huaweicfgcdrom.dll",s32Mouse90 locDlg54 [x][-][x][x]) -> FOUND
      [RUN][SUSP PATH] HKUS\S-1-5-18\[...]\Run : Real (rundll32 "C:\Documents and Settings\dan\Local Settings\Application Data\PMB Files\Real\mfohaghf.dll",DllRegisterServer [x][-][x]) -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Do not reboot your computer yet.

    Now rerun Hitman and have it delete all it found.

    Reboot and rescan with both RogueKiller and Hitman and attach those logs as well.

    Be sure to tell me how things are running now.
     
  3. soylentgrun

    soylentgrun Private E-2

    [RUN][SUSP PATH] HKUS\S-1-5-21-1812667914-3538318784-2396209619-1007\[...]\Run : AhnLab (RUNDLL32.EXE "C:\Documents and Settings\dan\Local Settings\Application Data\AhnLab\tedscjfk.dll",jmtvab [x][-][x]) -> FOUND
    [RUN][SUSP PATH] HKCU\[...]\Run : AhnLab (RUNDLL32.EXE "C:\Documents and Settings\dan\Local Settings\Application Data\AhnLab\tedscjfk.dll",jmtvab [x][-][x]) -> FOUND

    These two are not showing up when I run RogueKiller's scan.

    Should I proceed as you initially directed, using RogueKiller to delete those that ARE showing, then attach that log?
     
  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Yes.
     
  5. soylentgrun

    soylentgrun Private E-2

    Alright. Logs!

    Followed actionable instructions but files didn't save as file names you specified, so I just renamed them with POST DELETION and POST REBOOT at the end.

    After the delete and reboot sequence, the computer seems to have no problems so far, though it was a tad laggy at startup with initiating the Taskbar and loading mini icons next to the clock. But it DID load. :)

    So far, no crazy whirring fan / noisy hard drive. But I also haven't tried to run anything too heavy duty.

    Also, no super-mysterious items appearing in Task Manager.
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Looks good.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. After doing the above, you should work thru the below link


    Malware removal from a National Chain = $149
    Malware removal from MajorGeeks = $0
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds