Win 7 infected

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Mcdave, Oct 29, 2014.

  1. Mcdave

    Mcdave Private E-2

    I have done all the scans you suggest ,I may have screwed up the Hitman because I thought I was set to ignore but I accidently cleaned I hope that will not screw me up . Any help would be great here are my scan files
     

    Attached Files:

  2. Mcdave

    Mcdave Private E-2

    I post this kinda late last night so I did'nt put in much detail . I notice about week ago my Harddrive was running all the time , Avg was finding some virus's so I ran spybot ,ccleaner , maleware bytes and did all the removal it suggested. There was still no change on the harddrive running all the time ,so I disconnected from the internet and eventually the hardrive stopped . My logs are attached on previous post . Thanks for your help .
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi and welcome. :)

    You will need to check that everything is running program wise and that nothing is broken.


    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-2776914327-2920130146-558806851-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows | Load : C:\Users\MOM&DA~1\LOCALS~1\Temp\msafuaixu.exe -> Found
    • [Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-2776914327-2920130146-558806851-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows | Load : C:\Users\MOM&DA~1\LOCALS~1\Temp\msafuaixu.exe -> Found
    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2776914327-2920130146-558806851-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.


    Go into this folder and delete as many of the temp files/folders as it let's you:

    • C:\Users\Mom & Dads\AppData\Local\Temp


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\ProgramData\@system2.att
    
    :reg
    [-HKEY_USERS\S-1-5-21-2776914327-2920130146-558806851-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Now re run RogueKiller (just a scan) and attach log.

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  4. Mcdave

    Mcdave Private E-2

    Here is where I'm at so far , Ran programs in the order you listed roguekiller I only saw the last item on your list (tr.poweliks) and deleted it I rebooted the computer and on reboot Avg found Trojan horse msil5.anut I put it in the vault. I then disabled Avg and ran junkware removal tool but it never created a log ? As far as how the computer is performing the hdd is not going as crazy as before seems to be back to the way it was .Let me know if you think I have any other problems .or need to run any other scan .Do I need to change any setting or program to stop this happening .

    Thanks Dave
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  6. Mcdave

    Mcdave Private E-2

    Scan result of Farbar Recovery Scan Tool.

    Thanks McDave
     

    Attached Files:

  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)



    Reboot into normal mode and also re run RogueKiller, and re run FRST like you did the very first time, attaching both logs once done.
     

    Attached Files:

  8. Mcdave

    Mcdave Private E-2

    Quick question , I download the fixlist .txt it shows up as a php some kind of a photo parade program is this correct ?
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I thought something went wrong, when I created the text file and saved it, I got a message about ANSI code or something similar, I've attached a new one which should be good. It's in a zipped file.
     

    Attached Files:

  10. Mcdave

    Mcdave Private E-2

    still associated with php ( ph parade program ) ?
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I don't understand... open up the text file and edit it to remove these two entries (which are not malware anyway, just clean up)
    • HKLM-x32\...\Run: [] => [X]
    • HKU\Mom & Dads\...\Run: [AdobeBridge] => [X]

    Then see if it is okay. Let me know. (I'm sorry about this, I always have a fixlist.txt on my desktop. I edit it each time I need it for a new thread. I hit save and it warned me about ANSI code or similar, but I saved anyway thinking it should be ok. Never had it happen before)
     
  12. Mcdave

    Mcdave Private E-2

    I was able to turn the original into a txt file by right clicking it and opening with notepad then resaving it as fixlist.txt should I use that one or the one with the lines you had me remove? both are saved to desktop right now with different names I will change to the right name for the scan .
     
  13. Mcdave

    Mcdave Private E-2

    next set of scans
     
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes. :)
     
  15. Mcdave

    Mcdave Private E-2

    I ran the file last night but I must of attached them wrong . Here are the files
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Are you still having any malware problems?
     
  17. Mcdave

    Mcdave Private E-2

    Well these are file of my last scans .I think he needed to review them . As far as my computer running slow ( more the hdd running all the time ) that is much better . AVG virus scan are finding some things when it scans I included a cut and paste of the report log if you want to take a look .
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    RogueKiller still shows Tr.Poweliks.

    Re run RogueKiller in SAFE MODE
    Have it fix this entry:

    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2776914327-2920130146-558806851-1000\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Then re run RK in NORMAL mode (just a scan) and attach new log too.
     
  19. Mcdave

    Mcdave Private E-2

    Ran in safe mode and deleted , ran scan only after reboot notice it is still there ? Here is the log .
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I want to get another scan log from FRST and also some additional logs. To be sure we have the most recent version, let's download it again.

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.




    Note: Make sure you download the 64 bit version for your PC.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
    • Next please re-run FRST again and type the following in the edit box after Search: dllhost.exe
    • Click the Search button
    • It will make a log (Search.txt)- please attach it to your next reply.
    Now please click Start Menu > All Programs > Accessories, right click on Command Prompt and select "Run as administrator".

    Copy/paste the following text at the command prompt and press enter after each line:

    sfc /verifyonly

    findstr /c:"[SR]" %windir%\Logs\CBS\CBS.log >"%userprofile%\Desktop\sfcdetails.txt"

    A txt file named sfcdetails.txt should appear on the desktop.

    Attach it to your next reply.n If it is too large to attach then compress it into a ZIP file and attach that.
     
    Last edited: Oct 31, 2014
  21. Mcdave

    Mcdave Private E-2

    here are the scans expect the scfdetails.txt which never showed up on desktop . Also my hdd started running all the time again so I'm on a different computer and have the infected one off line, and use a thumb drive to transfer logs or programs
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please start by uninstalling Spybot right now before continuing.


    Download this >> View attachment fixlist.txt


    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now boot into normal Windows and continue with the below.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!

    Also at this point, I want you to run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs. You don't have to run the Search again nor do you need do anything with SFC.
     
  23. Mcdave

    Mcdave Private E-2

    scan files
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you run the fix? Where is the Fixlog.txt? I needed you to run the new fix before running those other new scans.
     
  25. Mcdave

    Mcdave Private E-2

    fixlog scan
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.

    Okay we are going to run a new fixlist.txt script ( make aure that you redownload it ) but this time instead of running it from he System Recovery Options menu, I want you to save fixlist.txt directly on your Desktop right where FRST64.exe is also saved.

    Download this >> View attachment fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.

    Also at this point, I want to double check the status of Poweliks by having you run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs.
     
  27. Mcdave

    Mcdave Private E-2

    first 2 logs
     

    Attached Files:

  28. Mcdave

    Mcdave Private E-2

    other two logs
     

    Attached Files:

  29. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks better. How is it running? Any problems?
     
  30. Mcdave

    Mcdave Private E-2

    Seem to be running ok. I just put it back on line and the HDD is normal I will go back to my normal routine & let you know if anything weird starts up again ,is there anything I should be doing or add to my computer to help protect this from happening? Also should I reload spybot or is that not a recommended program . Thank you so much for your help !!!!!!:-D
     
  31. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I would not waste the system resources on Spybot. You have AVG installed just get the most recent version and updates. It has antivirus and antispyware built-in. Note that no protection programs are 100% and none of them ( not even paid programs from Norton and McAfee ) stop this Poweliks infection.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds