Hao123 Removal

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Evil Commissar, Aug 20, 2012.

  1. Evil Commissar

    Evil Commissar Private E-2

    Hi there!

    I'm new to the site and I've been having problems trying to get rid of Hao123 (xxp://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc=HP_ss&mntrId=0ea49b5a000000000000001e657f97c0 from my google chrome, internet explorer and mozilla firefox browser whenever I start them up.

    I've run some scanners such as malwarebytes and it doesn't seem to detect this problem so I hope someone here is kind enough to take the time to help me get rid of this problem.

    Thank you in advance!
     
    Last edited by a moderator: Aug 26, 2012
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please read ALL of this message including the notes before doing anything.

    Please follow the instructions in the below link:

    READ & RUN ME FIRST. Malware Removal Guide


    and attach the requested logs when you finish these instructions.
    • **** If something does not run, write down the info to explain to us later but keep on going. ****
    • Do not assume that because one step does not work that they all will not. MGtools will frequently run even when all other tools will not.

    • After completing the READ & RUN ME and attaching your logs, make sure that you tell us what problems still remain ( if any still do )!
    Helpful Notes:
    1. If you run into problems trying to run the READ & RUN ME or any of the scans in normal boot mode, you can run the steps in safe boot mode but make sure you tell us what you did later when you post logs. See the below if you do not know how to boot in safe mode:
    2. If you have problems downloading on the problem PC, download the tools and the manual updates for SUPERAntiSpyware and Malwarebytes ( links are given in the READ & RUN ME) onto another PC and then burn to a CD. Then copy them to the problem PC. You will have to skip getting updates if (and only if) your internet connection does not work. Yes you could use a flash drive too but flash drives are writeable and infections can spread to them.
    3. If you cannot seem to login to an infected user account, try using a different user account (if you have one) in either normal or safe boot mode and running only SUPERAntiSpyware and Malwarebytes while logged into this other user account. Then reboot and see if you can log into the problem user account. If you can then run SUPERAntiSpyware, Malwarebytes, ComboFix and MGtools on the infected account as requested in the instructions.
    4. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.
     
  3. Evil Commissar

    Evil Commissar Private E-2

    Hi,

    Thank you for the reply. I did the scans, and I've attached the results. I'm not sure about if the MGTools log is attached since I'm not sure that is the file you need.

    Cheers
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As stated in the READ & RUN ME FIRST, the log from MGtools is C:\MGlogs.zip
     
  5. Evil Commissar

    Evil Commissar Private E-2

    Hi,

    Sorry for not replying sooner.

    I've run MGtools again and I still cannot find any zip file that I can attach to this thread. There is only a zip.exe file that is invalid when I attach it here.

    Cheers
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You are looking in the MGtools folder which is not where the MGlogs.zip file is located. It is the root directory of the the C drive. Hence. C:\MGlogs.zip not C:\MGtools\MGlogs.zip
     
  7. Evil Commissar

    Evil Commissar Private E-2

    Oh actually I just noticed where the file is. It wasn't in C:\MGlogs.zip but in the actual C: Drive itself! My mistake and thank you for your patience!

    Here it is.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes this was where it is. This is the root folder of the C drive. C:\ is the folder ( the top level folder aka the root folder ). MGlogs.zip is the filename and the C:\ is the location. ;)
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Refer to the below link and use it to Reset Chrome to Default settings:

    http://browserland.com/featured/restore-google-chrome-default-settings/


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.



    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://isearch.claro-search.com/?af...iclro&mntrId=0ea49b5a000000000000001e657f97c0
    O2 - BHO: Babylon toolbar helper - {2EECD738-5844-4a99-B4B6-146BF802613B} - (no file)
    O3 - Toolbar: (no name) - {D0F4A166-B8D4-48b8-9D63-80849FE137CB} - (no file)
    O9 - Extra button: (no name) - {925DAB62-F9AC-4221-806A-057BFB1014AA} - (no file)

    After clicking Fix, exit HJT.

    Delete the below file:
    C:\Program Files (x86)\Mozilla Firefox\searchplugins\babylon.xml

    Please download OTL by OldTimer.
    • Save it to your desktop.
    • Right mouse click on the OTL icon on your desktop and select Run as Administrator
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  10. Evil Commissar

    Evil Commissar Private E-2

    Hi,

    I can't change to default settings on Chrome because I have the newest version I think. There is "no under the hood" option.

    I did the other parts and I attach the file with this post.

    Cheers
     

    Attached Files:

    • OTL.Txt
      File size:
      266.6 KB
      Views:
      3
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay the newer versions of Chrome removed this simple feature and made it more complex ( not too smart ). Try the below:

    http://www.tothepc.com/archives/reset-google-chrome-to-default-settings/


    Also do the below no matter what happens with the above.


    Now shut down your protection software (antivirus, antispyware...etc) to avoid possible conflicts.
    • Double-click OTL.exe to run. (Vista/7 right-click and select Run as Administrator)
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
    Code:
    :OTL
    IE - HKU\S-1-5-21-1740420664-793690064-2599254340-1000\SOFTWARE\Microsoft\Internet Explorer\Main,BrowserMngr Start Page = [URL]http://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc=HP_ss&mntrId=0ea49b5a000000000000001e657f97c0[/URL]
    FF - prefs.js..browser.search.defaultenginename: "Search the web (Babylon)"
    FF - prefs.js..browser.search.order.1: "Search the web (Babylon)"
    FF - prefs.js..browser.startup.homepage: "[URL]http://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc=HP_ss&mntrId=0ea49b5a000000000000001e657f97c0[/URL]"
    [2012/08/14 13:21:17 | 000,002,227 | ---- | M] () -- C:\Users\Evil Commissar\AppData\Roaming\Mozilla\Firefox\Profiles\80ppcp2a.default\searchplugins\BabylonMngr.xml
    CHR - homepage: [URL]http://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc=HP_ss&mntrId=0ea49b5a000000000000001e657f97c0[/URL]
    CHR - homepage: [URL]http://th.hao123.com/?tn=bbl_hp_hao123_th&babsrc=HP_ss&mntrId=0ea49b5a000000000000001e657f97c0[/URL]
    O2 - BHO: (no name) - {2EECD738-5844-4a99-B4B6-146BF802613B} - No CLSID value found.
    O3 - HKLM\..\Toolbar: (no name) - {D0F4A166-B8D4-48b8-9D63-80849FE137CB} - No CLSID value found.
    O3 - HKU\S-1-5-21-1740420664-793690064-2599254340-1000\..\Toolbar\WebBrowser: (no name) - {E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39} - No CLSID value found.
    O18:[b]64bit:[/b] - Protocol\Handler\grooveLocalGWS - No CLSID value found
    ActiveX:[b]64bit:[/b] {2179C5D3-EBFF-11CF-B6FD-00AA00B4E220} - 
    ActiveX:[b]64bit:[/b] {44BBA848-CC51-11CF-AAFA-00AA00B6015C} - 
    :Commands
    [PURITY]
    [EMPTYTEMP] 
    [EMPTYFLASH]
    [REBOOT]
    • Now click the [​IMG] button.
    • If the fix needed a reboot please do it.
    • Click the OK button (upon reboot).
    • When OTL is finished, Notepad will open. Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (See: How to attach)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the log from OTL
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
    Last edited: Aug 25, 2012
  12. Evil Commissar

    Evil Commissar Private E-2

    Hi,

    Yes finally hao123 is no longer being set as the default page. I attach the logs with this post.

    Thank you ever so much for your time and support!
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Just one more thing to do before final instructions.

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O3 - Toolbar: (no name) - {D0F4A166-B8D4-48b8-9D63-80849FE137CB} - (no file)
    O9 - Extra button: (no name) - {53F6FCCD-9E22-4d71-86EA-6E43136192AB} - (no file)
    O23 - Service: RelevantKnowledge - Unknown owner - C:\Program Files (x86)\RelevantKnowledge\rlservice.exe (file missing)

    And if you don't want ( I suspect you would not ) the below junk from Toshiba always loading. Fix these lines too
    O4 - HKUS\S-1-5-18\..\Run: [TOSHIBA Online Product Information] C:\Program Files (x86)\TOSHIBA\Toshiba Online Product Information\topi.exe (User 'SYSTEM')
    O4 - HKUS\.DEFAULT\..\Run: [TOSHIBA Online Product Information] C:\Program Files (x86)\TOSHIBA\Toshiba Online Product Information\topi.exe (User 'Default user')
    O4 - .DEFAULT User Startup: TRDCReminder.lnk = C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (User 'Default user')

    After clicking Fix, exit HJT.




    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    8. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds