Trojan.Gen.SMH removal assistance. Logs attached

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by JReesh, Sep 20, 2014.

  1. JReesh

    JReesh Private E-2

    Malwarebytes ran and discovered suspicious items. I allowed it to do what it suggested, but when I attempted to save a log it crashed. I ran it again, but it came up as clean. I see a log in the history, but it is an .xml file and you asked not to attache those so that is why I do not have a Malwarebytes log attached.

    I am requesting help b/c my Symantec keeps detecting the trojan and I need help getting rid of it b/c Symantec just quarantines the created files and doesn't seem to be able to find the originating culprit.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi and welcome! :)

    May I begin by asking you if you are deliberately set up to use a proxy or not?
     
  3. JReesh

    JReesh Private E-2

    Yes, I use privateinternetaccess.com 's proxy for secure browsing.
     
  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    @JReesh
     
  5. JReesh

    JReesh Private E-2

    Ok, I followed the instructions and EVERY time I try to save a .txt file, the program crashes. I even attempted to "save to clipboard" and it crashed. The only option that worked was saving to an .xml file. I have attached it hoping that it is better than nothing, but I can't get a .txt from the program.

    Ok, so I am unable to upload an .xml file to this site so I simply changed it to a .txt by renaming it. It probably totally screwed up the file, but I don't know what else to try. My apologies.
     

    Attached Files:

    • mwb.txt
      File size:
      13.3 KB
      Views:
      1
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Hj.Name|Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-407668556-3109764396-3965425102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows | Load : C:\Users\JASONR~1\AppData\Local\Temp\csrss.exe -> FOUND
    • [Hj.Name|Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-407668556-3109764396-3965425102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows | Load : C:\Users\JASONR~1\AppData\Local\Temp\csrss.exe -> FOUND
    • [RegVal.Brok] (X64) HKEY_CLASSES_ROOT\.exe\shell\open\command | : No Data ->
    • [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-407668556-3109764396-3965425102-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.yahoo.com/?type=937811&fr=spigot-yhp-ie -> FOUND
    • [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-407668556-3109764396-3965425102-1000\Software\Microsoft\Internet Explorer\Main | Start Page : http://search.yahoo.com/?type=937811&fr=spigot-yhp-ie -> FOUND


    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and do the same on the Tasks tab for these entries:

    • [Suspicious.Path] \\65c4673c -- C:\Users\JASONR~1\AppData\Local\Temp\\setup1571283496.exe -> FOUND
    • [Suspicious.Path] \\IHUninstallTrackingTASK -- CMD (/C DEL C:\Users\JASONR~1\AppData\Local\Temp\IHU36C8.tmp.exe) -> FOUND
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please re run Hitman Pro and have it remove all that it finds.


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Windows\SysNative\drivers\xqyrj.sys
    C:\Users\JASONR~1\AppData\Local\Temp\csrss.exe
    C:\Users\JASONR~1\AppData\Local\Temp\setup1571283496.exe
    C:\Users\JASONR~1\AppData\Local\Temp\IHU36C8.tmp.exe
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.





    Download Cleano 0.61

    Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)

    View attachment 148092
    Click clean now and exit the program.



    Now re run RogueKiller (just a scan) and attach log.
    Same for Hitman.


    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  7. JReesh

    JReesh Private E-2

    On a positive note, all subsequent scans with malwarebytes turn up no malicious items.
     
  8. JReesh

    JReesh Private E-2

    Everything went well. I wasn't able to find a couple of those keys to delete, but the rest went well. I am attaching all the files.
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good morning. :) How are things running at this point?
     
  10. JReesh

    JReesh Private E-2

    I came home to a Symantec Endpoint Protection window stating it has quarantined about 30 more iterations of the Trojan.Gen.SMH infection. They have names like dwh73fe.exe, dwh8695.exe, etc. It appears they are all spawning from the same folder C:\Users\Jason Richard\AppData\Local\Temp\

    As I'm writing this, more are popping up and being quarantined by Symantec.

    Any advice?
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

  12. JReesh

    JReesh Private E-2

    Symantec's window is constantly open now. Every time I close it, it opens again with another file quarantined. I re-ran CCleaner and it still keeps happening. Malwarebytes occasionally pops up stating it has blocked access to a website and the program identified is rubyw.exe
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Private Internet Access Support Files is installed. This is why MBAM alerts you to rubyw.exe.

    I would like to see a log from Symantec please showing what it finds.
     
  14. JReesh

    JReesh Private E-2

    I attempted to upload a log. I converted the .csv to a .txt and get this message when I upload.

    "Your submission could not be processed because a security token was missing.

    If this occurred unexpectedly, please inform the administrator and describe the action you performed before you received this error."
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Sigh. Then just simply jot down EXACTLY the name of a few files, and their exact file paths please.
     
  16. JReesh

    JReesh Private E-2

    The new files all start with dwh and then change from there. dwhc037.exe Original location: C:\Users\Jason Richard\AppData\Local\Temp\

    They are all in the same folder:
    dwh63f5.exe
    dwh2d5c.exe
    dwh87a7.exe

    These are just a few examples. There are several hundred when I got home today that had been quarantined by Symantec.
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Could you please zip up a couple and attach them here for me to look at.
     
  18. JReesh

    JReesh Private E-2

    I have no idea how to do this. I can't access the quarantined files from Symantec, other than to delete them permanently. When I go to the Quarantine folder, the files in there end in .vbn and are only around 7kb in size. I can't find the original .exe files that were quarantined.
     
  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    How do you feel about temporarily disabling your AV for a little while? Then perhaps you can take a look into the temp folder where those files were reported and see if they then exist to zip up and attach here. I'll explain how once you let me know there are any.

    Otherwise there's this which looks complicated.

    http://support.moonpoint.com/security/antivirus/symantec/quarantine-vbn.php
     
  20. JReesh

    JReesh Private E-2

    Ok, I caught a couple of them, but they morph quickly. If I didn't get them zipped up quick enough, they changed from a .exe file to a .tmp file. The folder keeps filling up with a bunch of .tmp files with the names the .exe files had.
     

    Attached Files:

  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Right, I downloaded those to my desktop. My antivirus did not alert. And when I studied the files, I can see they relate to adaware antivirus or browsing protection. Which brings up exclamation marks (sorry I did not notice before) You should NOT be using more than one antivirus!! This is why there's a problem, and why symantec keeps quarantining. They are both fighting for control over files and such as. Clashing with each other.

    Uninstall Adware Antivirus now if Symantec is paid for.
     
  22. JReesh

    JReesh Private E-2

    Ok, so Adaware is gone, but the files are still popping up.
     
  23. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You uninstalled both? :confused

    • Ad-Aware Antivirus
    • Ad-Aware Browsing Protection
     
  24. JReesh

    JReesh Private E-2

    No, i only "uninstalled" Ad Aware. I put it in quotes b/c it wouldn't uninstall via windows uninstall. It kept giving me an error when I tried to uninstall it, so I deleted the folder and files manually, with some difficulty I might add. As you probably already guessed, that won't do it. I had to download and re-install Ad Aware from scratch, THEN I was able to uninstall it (I turned off Symantec while installing and uninstalling Ad Aware).

    So now I'm an hour or so post uninstall of Ad Aware and Symantec has not popped up any windows yet. I am tentatively hopeful that the problem is solved. If it pops up any more windows again, I will respond to this thread and let you know.

    Thank you for the help.:)
     
  25. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You are most welcome. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds