dllhost.exe *32 - Tr.Poweliks

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by GhostfaceKillah, Oct 24, 2014.

  1. GhostfaceKillah

    GhostfaceKillah Private E-2

    I appear to have been infected with the poweliks rootkit. The following has been my problems:

    Over the past 6 days, my internet speed has decreased significantly. I used to have no issues with my ping and internet speed. Now, youtube and online games have been rendered on playable. When using the command prompt to ping websites, the average ping is about 400 ms, ranging anywhere from 250 ms up to 700 ms. My download speed has been reduced from it's normal ~125 kb/sec to 10kb/ sec.

    This slow internet speed has not just infected this computer, but all computers in my network. I have tried reseating my modem and my router, but neither of these methods worked.

    I scanned my computer using both MSE and Malewarebytes, but neither turned up anything. However, upon examining the detected items history in MSE, I discovered that a Trojan horse, JS/Krypterade.A, had been detected on my PC 24 hours ago. There was no warning of this last night; no notifications popped up. This Trojan horse is supposed to be ransomware, but my PC has never been locked up and money has never been solicited from me via fake threats. Yet, task manager is showing multiple dllhost.exe *32 processes (up to 10) that are consistent with this virus. Network iControl is showing that this dllhost.exe is taking up around 100KBps of bandwith. I am beginning to suspect that I have a virus on this PC.

    Due to the fact that downloads are excruciatingly slow and I don't have any other anti-virus software on my hands, is there anything else I can do before downloading new software? If it does come down to me being forced to download something, which programs should I get? Thanks in advance.

    I would like to add that Internet Explorer has stopped saving my information when I ask for websites to remember my log-in information. Furthermore, every time I restart Internet Explorer, file downloads are set to disable. I am an unable to download any useful files; all files are downloaded in a useless format that doesn't allow me to open them and use them.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows | AppInit_DLLs : gpcloud.dll -> Found
    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-4237216898-264680874-324243060-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.

    Code:
    :Files
    C:\Windows\System32\gpcloud.dll
    
    :reg
    [-HKLM\SOFTWARE\Wow6432Node\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}]
    [-HKU\S-1-5-21-4237216898-264680874-324243060-1000\Software\AppDataLow\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}]
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
    "AppInit_DLLs"=""
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.






    Download Cleano 0.61

    Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)

    View attachment 148092
    Click clean now and exit the program.



    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    • Re run RogueKiller (just a scan) and attach that log too please.
    • Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  3. GhostfaceKillah

    GhostfaceKillah Private E-2

    I had no issues running the downloads, but it seems that the infection is still on my computer. Dllhost.exe *32 surrogate processes are still running, my internet settings are still being changed, and as you will see in the 2nd RogueKiller report, Poweliks is still showing up on my PC.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Navigate to this folder and edit > select all > delete as many of the temp files as possible.
    • C:\Users\Renegade\AppData\Local\Temp


    [​IMG] Fix item using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate this detection:

    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-4237216898-264680874-324243060-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Place a checkmark next to this item, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.


    Re run RogueKiller and attach the log.
     
  5. GhostfaceKillah

    GhostfaceKillah Private E-2

    I have had some progress: I can now download .exe files. However, the dllhost processes are still running and RogueKiller is still finding powerliks.

    I was able to remove most of the Temp files.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please download Combofix to your desktop. Please refer to these instructions prior to running. Attach log once done.
     
  7. GhostfaceKillah

    GhostfaceKillah Private E-2

    Combofix has been run.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try repeating the RogueKiller fix in safe mode. Then rerun in normal mode (just a scan) and attach that log too.
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Also run this please:

    [​IMG] For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  10. GhostfaceKillah

    GhostfaceKillah Private E-2

    I believe that Poweliks is finally gone. There are no more dllhost processes running, my internet speed is back to normal, and my download settings are not being changed any more.
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)
     

    Attached Files:

  12. GhostfaceKillah

    GhostfaceKillah Private E-2

    I ran FRST.
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, I'm off to bed (UK time) post back here tomorrow and if all is still well, I will post final steps! :)
     
  14. GhostfaceKillah

    GhostfaceKillah Private E-2

    Everything seems to going well thus far. There doesn't appear to be any obvious signs of the infections left. Thank you for your help.
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. Well, update me tomorrow and hopefully we've nailed it. :)
     
  16. GhostfaceKillah

    GhostfaceKillah Private E-2

    There doesn't appear to be any further problems.
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Excellent. :)



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key [​IMG] and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    4. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    5. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    8. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    9. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  18. GhostfaceKillah

    GhostfaceKillah Private E-2

    I have done everything on that list. Thanks once again for your help.
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. Safe surfing! :)
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hello there. I don't normally dig up old threads, but I wondered if everything was still running okay? This infection is quite difficult to remove, but we have figured a nicer method now, and it was not included in your fix. Come back and let me know if you want to run further tests. :)
     
  21. GhostfaceKillah

    GhostfaceKillah Private E-2

    I haven't had any further issues. However, I would be interested in further tests if it would make me that much more sure that my PC is clean.
     
  22. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :) Happy to hear all is well still, but also glad you want to allow us to run further scans.

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. The wrong version will not run.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  23. GhostfaceKillah

    GhostfaceKillah Private E-2

    Logs are attached.
     

    Attached Files:

  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Poweliks was definately removed. Not seeing any signs of it. We can use FRST to do some clean up however.

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download Fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)

    Then attach the below log:

    Fixlog.txt
     

    Attached Files:

  25. GhostfaceKillah

    GhostfaceKillah Private E-2

    Log is attached.
     

    Attached Files:

  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there. :)

    You can now delete FRST and any log files it created.
     
  27. GhostfaceKillah

    GhostfaceKillah Private E-2

    OK, thanks once again for your help.
     
  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Most welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds