Trojan.Powelik & Trojan.AdClicker - can't get rid of

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by dandw2, Nov 3, 2014.

  1. dandw2

    dandw2 Private E-2

    hello - I've read the read me, and have run all the solutions - the Rouge Killer sees the powelik issue, and kills it, only to have it re-appear/rejuvenate again through many of the dllhost ext *32 COM Surrogate process.

    Initially, before turning here, I, of course ran the Norton 360 scan - which didn't turn anything up. I also ran the Norton registry cleaner, which worked for a couple of hours or so.

    So, I've attached 4 of the 5 logs - I couldn't get a log for malwarebytes - it's the newest version, and couldn't seem to find a log on that one.

    had to zip the TDSSKiller log, as it was to big for text file

    thank you for any help you can provide.
    Dave
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Give me a few moment to check your logs and come up with a fix. ;)
     
  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am not seeing it in your logs.

    You can find your MBAM log here:
    C:\Users\Dave & Wendi\AppData\Roaming\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-2011-08-01 (21-59-54).txt

    Download OTM by Old Timer and save it to your Desktop.


    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :files
    C:\Windows\TEMP\*.*
    C:\Users\Dave & Wendi\AppData\Local\Temp\*.*
    
    :reg
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{110a9ea2-8810-4c04-b916-cfd4e9427fec}]
    
    :Commands
    [purity]
    [ResetHosts]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).Make sure that you watch for the license agreement for TrendMicro HijackThis and click on the Accept button TWICE to accept ( yes twice ).

    Then attach the below logs:

    * MBAM
    * C:\MGlogs.zip
    *OTM log

    Be sure you tell me what is happening and what is reporting the issue.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It shows in RogueKiller, Tim.

    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2401385381-857618056-900010069-1001\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found
     
  5. dandw2

    dandw2 Private E-2

    thank you - that malwarebytes log is actually from 2011, so not applicable to this time around. I'll try and run it again and see what I can come up with. in the mean time I'll download and run the OTM. Thank you for your help
     
  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Somehow, I didn't see it.

    Rerun RogueKiller and have it fix this item:

    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2401385381-857618056-900010069-1001\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found


    Reboot and rescan with RogueKiller and attach the new log.
     
  7. dandw2

    dandw2 Private E-2

    I remembered what the problem with malwarebyte's report is - it's XML, not text, and I know you don't want the XML version. So, that's the issue with that.

    I've attached the other logs. Unfortunately, I thought the MG would overwrite, or otherwise create a separate instance, but it has the old scan info as well as the new scan info. If you need me to delete the zip file and re-run it I will certainly do that.

    I had to reboot at some point in there, and Norton ID'd the powelik and ad.clicker as well as a new one that just popped up - some sort of exploit for website. Norton has a whole host of attacks blocked in history, too.

    Thanks
    Dave
     

    Attached Files:

  8. dandw2

    dandw2 Private E-2

    will do! wanted to say, I've done that a couple of times yesterday evening, forgot about that at first. will do it again now, though
     
    Last edited: Nov 3, 2014
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    MBAM should give you the choice to save as TXT. If not, copy and paste into notepad. Tell me if it finds the issue.

    Also rerun RogueKiller and attach the new log.
     
  10. dandw2

    dandw2 Private E-2

    ok, did that (Rogue Killer actually has a window open to their website when deleting this). it came back again after reboot - I've attached that report here. I don't believe mawarebytes saw the issue, but I'll run that again a little later and past the XML file data into notepad
    thanks!
    Dave
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.


    Code:
    :Processes
    explorer.exe
    
    :reg
    [-HKEY_USERS\S-1-5-21-2401385381-857618056-900010069-1001\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32]
    
    :Commands
    [purity]
    [ResetHosts]
    [start explorer]
    [Reboot]

    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.


    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach this log file to your next message.
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Let's head in a different direction:

    Please do the below so that we can boot to System Recovery Options to run a scan. There will be two options to choose from. One if you do not have your Windows 7 boot DVD and another when you have your DVD.

    For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Option1: Enter System Recovery Options from the Advanced Boot Options:

    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    Option2: Enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    We may have to have you run FRST a slightly different way, but for now let's just leave it at what's been laid out for you.
     
  14. dandw2

    dandw2 Private E-2

    OK, I will do as Tim asks...
    this'll be fun.

    I have a partition and the recovery is on the other partition, so that should work, right?
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Kestrel13! is correct about FRST not working this way for this infection. You need to run FRST as I instruct below.

    Please download the latest version of FRST the below link.
    Farbar Recovery Scan Tool and save it to your Desktop.


    Note: Make sure you download the proper version ( 32 bit or 64 bit ) for your PC. Only one will run, the correct one. So it you make a mistake and download the wrong one, go back and get the other.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  16. dandw2

    dandw2 Private E-2

    I ran it the way TimW requested, so I might as well post it here now... I'll run it the way chaslang says next.
     

    Attached Files:

  17. dandw2

    dandw2 Private E-2

    OK, ran it again using this method - oddly enough Norton 360 wasn't allowing the download of the program, it kept deleting it, so I disabled Norton, and disconnected from the internet, and was able to copy it over from the flash drive and run it. anyway, logs are attached.
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay it appears that some of the Poweliks infection was either blocked or already removed. Let's continue with the rest.


    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download this >> View attachment fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.
    Also at this point, I want to double check the status of Poweliks by having you run another scan with FRST like in my last message and attach the new FRST.txt log.

    Also tell me how things are running?
     
  19. dandw2

    dandw2 Private E-2

    Hello, Attached are the two logs you are looking for, next I will run the FRST again and attach them.

    The laptop seems to be running about as well as an old WIN7 machine can :) In reality, I didn't see the COM Surrogate populate the process explorer in the last 12 hours or so. that is a good thing. Also on reboot, Norton isn't indicating an attack, so another indication things are going in the right direction.
     

    Attached Files:

  20. dandw2

    dandw2 Private E-2

    Hello - here are both logs from the rerunning of the FRST.
    Thanks!
    Dave
     

    Attached Files:

  21. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks good now.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  22. dandw2

    dandw2 Private E-2

    thank you for all your help! I've completed the last steps. Appreciate it for sure.
    Dave
     
  23. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds