mbam finds Trojan.Poweliks.B

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by idssteve, Feb 26, 2015.

  1. idssteve

    idssteve Private E-2

    mbam finds Trojan.Poweliks.B

    RogueKiller quits mid-scan... no RK log

    MSE still reports "Behavior:Win32/Powessere.D"

    Thanks in advance.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. Only the correct version will work.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  3. idssteve

    idssteve Private E-2

    Thanks Kestrel, here they are.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)


    Please re run Malware Bytes and be sure to let it remove what it finds. Attach a log showing this, or attach a clean log showing nothing afterwards.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    • Try and run RogueKiller again and attach log if sucessful.
    • Explain how things are running.
     

    Attached Files:

  5. idssteve

    idssteve Private E-2

    Hi Kestrel, sorry for taking so long with this. Not sure if it makes a difference but rebooting into System Recovery Options i found C: drive to be assigned to this laptop's SD card drive, D: was assigned to what i call Win7 "main" drive. The System reserved partition was assigned as X: If fixlist.txt was looking for C: drive for anything, it found an SD card.... if that make any difference??

    Removing that SD card and then rebooting into System Recovery Options, C: was then the "main windows drive" as i'd normally expect. Not sure what it means but i resisted the temptation to re-run FRST/fixlist.txt with SD card removed... should i?

    I then ran mbam and it found and quarantined "Trojan.Poweliks.B" after telling it to clean.

    RK still disappears before completing. MSE still quarantines "Behavior:Win32/Powessere.D".

    I then took it on myself to re-run mbam and it found "Trojan:poweliks.B" again. :( I didn't let mbam clean this second time for fear of messing with your troubleshooting process.

    Maybe i should re-run everything with that SD card removed so that C: is the "main windows drive"... ???

    Thanks again.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Try that yes.
     
  7. idssteve

    idssteve Private E-2

    Hi Kestrel, with sd card removed and rebooted into command prompt through System Recovery Options, C: appears to be part of system reserved partition. X: appears to be the other part of system reserved partition. D: is assigned to what i'd normally consider to be C: while in Windows. I have next to no experience with Win7 System Recovery but checking my other Win7 machines seems to indicate this as "normal" configuration??

    With that in mind, i re-ran the scans. Please see logs.

    FRST/fixlog attached.

    Malwarebytes found "Trojan.Poweliks.B" and cleaned as directed.

    JRT log attached. Per instructions i turned off MSE's realtime protection but did not un-instal. Also, this time, i shut down mbam while running JRT. Windows firewall was still enabled while running JRT.

    RK still disappears mid scan. It was scanning a file with one of those hexadecimal names when it quit. Mse still quarantines new "Behavior:Win32/Powessere.D". I did NOT disable MSE before running RK... should i?

    Re-running mbam again re-found "Trojan.Poweliks.B" again.

    Not so worried about RK but mbam's warnings are worrisome.

    Thanks for your time on this.

    Steve
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi. :) The logs did not attach.
     
  9. idssteve

    idssteve Private E-2

    Ooops... Sorry about that. :-o
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do you feel comfortable going into the Windows Registry and deleting the bold key?

    • HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\CLASSES\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}
     
  11. idssteve

    idssteve Private E-2

    regedit "find" found {AB8902B4-09CA-4bb6-B78D-A8F59079A8D5} in HKEY_CLASSES_ROOT\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}

    Is that the right one? Wanna be sure ;)
     
  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes kill it. Also run this:

    SystemLook

    Please download SystemLook from one of the links below appropriate for your operating system and save it to your Desktop.
    Download 32 Bit
    Download 64 Bit

    • Double-click SystemLook.exe to run it.
    • Copy the content of the following codebox into the main textfield:
      Code:
      :regfind
      AB8902B4-09CA-4bb6-B78D-A8F59079A8D5
    • Click the Look button to start the scan.
    • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
    Note: The log can also be found on your Desktop entitled SystemLook.txt
     
  13. idssteve

    idssteve Private E-2

    Good morning Kestrel.

    Succeeded to delete HKEY_CLASSES_ROOT\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5} Had a brief permissions battle but got it. :)

    SystemLook.txt is attached this time.. hopefully. lol ;)
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK now that you have deleted that one key, rescan with Malware Bytes and let's see if it crops up again.
     
  15. idssteve

    idssteve Private E-2

    Well, looks like it's back. Stubborn critter. :(

    I've not yet permitted mbam to quarantine. Should I?
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    @Kestrel13!

    You are not supposed to be running the fix for Poweliks from System Recovery Mode. You must use normal boot mode just like when you ran the scan.
     
  18. idssteve

    idssteve Private E-2

    Hi Kestrel, looks like mbam still finds Poweliks.B after running Symantec's FixPoweliks and reboot. Stubborn bug. :(

    I'm very grateful for your patience on this. Your wish is my command. :)
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    • Double-click to run FRST.exe When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  20. idssteve

    idssteve Private E-2

    :) See attached.
     

    Attached Files:

  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Thankyou Chaslang.

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download Fixlist.txt (From POST NUMBER 4)

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.
    Also at this point, I want to double check the status of Poweliks by having you run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs.
     
  22. idssteve

    idssteve Private E-2

    OK, first two scans.

    FRST didn't reboot after displaying fixlog.txt I took it on myself to manually re-boot before running GetLogs.bat Hope that's ok?

    remaining logs next post.
     

    Attached Files:

  23. idssteve

    idssteve Private E-2

    FRST scan logs. Fingers crossed... ;)
     

    Attached Files:

  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, what Malware Bytes saying? :)
     
  25. idssteve

    idssteve Private E-2

    Looking good! Mbam reports no threats! Yay!!! :) It did, however, lock up on first scan. Seemed to stop about the same location in mbam's Heuristic Analysis where the "Detected Object" used to show up... object # 341400 if that's any use. ?? Had to pull the battery on the laptop and reboot and rescan and the second scan completed mostly normally but experienced several minutes hour glass pause right at the end. Attached log is the result.

    Should i try a new install of mbam?
     

    Attached Files:

  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you want to, yes.

    Do this one more time:

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
  27. idssteve

    idssteve Private E-2

    MGlogs attached. Downloading fresh mbam next, JFI. I won't let mbam clean anything, if anything found, until checking with you.
     

    Attached Files:

  28. idssteve

    idssteve Private E-2

    Here's a fresh mbam log. Mbam runs and ends smoothly now. All seems good.

    On a whim, hope it's ok, i tried RogueKiller and it finally completed! RK log also attached. RK directed my browser to "www.adlice.com/kernelmode-rootkits-part-3-kernel-filters/" apparently complaining of a "kernalmode rootkit" ??? Maybe an FP?? Naturally, i didn't permit anything to be removed.
     

    Attached Files:

  29. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    No rootkits, you're safe :)

    Ready for final steps at this point?
     
  30. idssteve

    idssteve Private E-2

    Yes, let's clean up. Thank you! :)
     
  31. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds