hao123 Removal. Please help with the Logs

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Natt, Oct 4, 2012.

  1. Natt

    Natt Private E-2

    Hi everyone

    I found your site after many days of being irritated by the above malware. I have visited your link that led me to this point that was posted by Chesang. I have followed the instructions as listed and I have not been able to remove this hao123 which has affected both my Firefox and Internet Explorer browsers.

    It happened when I was on the internet to download one of the XAMP software. At the top of the screen there was a download button. I hit it thinkin git was the one leadign to XAMP and then the whole mess began. This downloaded Babylon together with a program known as software downloader. I managed to do away with Babylon and the Downloaded only to be left with this hao123.

    Is there any one that can help? Here in attached are the logs.

    On elast question, since I have not removed this hao123, can I enable my UAC?

    I will appreciate any help from the forum.

    Natt
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    You did not get all of Babylon removed. We will get remaining items below.

    Please run Malwarebytes again and make sure you fix the below two items you took no action on per your last log
    Code:
    Registry Keys Detected: 2
    HKLM\SOFTWARE\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> No action taken.
    HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk (PUP.GamesPlayLab) -> No action taken.
    
    Also run Hitman Pro and allow it to fix all those items related to I Want This shown in your previous log.

    Uninstall the below very old versions of software:
    Java(TM) 6 Update 35
    Java(TM) 6 Update 7

    Now install the current version of Sun Java from: Sun Java Runtime Environment


    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\ProgramData\Babylon
    C:\Windows\installer\{F69166F9-0171-49DA-8B63-6B8DD8279770}\KoEd71.exe
     
    :Reg
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\AboutURLs]
    "Tabs"="res://ieframe.dll/tabswelcome.htm"
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{0694A997-50D7-4581-A382-67B8160E12FA}]
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk]
    [-[-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550055225558}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660066226658}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77777777-7777-7777-7777-770077227758}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{66666666-6666-6666-6666-660066226658}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77777777-7777-7777-7777-770077227758}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\mpfapcdfbbledbojijcbcclmlieaoogk]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. Natt

    Natt Private E-2

    Hello;

    Thanks for the reply and sorry for this belated reply. I followed the steps as you advised me in the last post. However, when I start my web browser, this hao is still hanging in there. I have attached the files that you asked me to. Have a look.

    Natt
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not sure what you mean? Can you describe exactly what/where you are seeing this and with which browser ( try all of your browsers )?

    Also please download OTL by OldTimer.
    • Save it to your desktop.
    • Right mouse click on the OTL icon on your desktop and select Run as Administrator
    • Check the "Scan All Users" checkbox.
    • Check the "Standard Output".
    • Change the setting of "Drivers" and "Services" to "All"
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
      Code:
      activex
      netsvcs
      drives
      
    • Now click the [​IMG] button.
    • One report will be created:
      • OTL.txt <-- Will be opened
    • Attach OTL.txt to your next message. (How to attach)
     
  5. Natt

    Natt Private E-2

    Good afternoon Chaslang;

    Thank you so much for all the input you have made towards helping me remove this malware. As of today, after the latest procedure, I can see that in Internet Explorer, when I open a new tab, hao123 page has now disappeared - after i changed the default start page, which this malware had modified. Before, even if I changed the start page, it was hao123 that used to appear. Not now though. However, i still have problems with Firefox. When I click on a new tab, formerly - before the hao123 attack - the websites that I often visited used to appear in 9 boxes. Currently though when I open a new tab, it is the hao123 page that appears. That is the problem I need to resolve. I don't want to see the hao123 page. It is so irritating.

    I have attached the text files after running OTL as you instructed. Have a look and I will appreciate any advise on how I can resolve the Firefox hao123 problem. I hope that this gives you a clearer picture of what is happening on my side.

    Natt
     

    Attached Files:

    • OTL.Txt
      File size:
      261.8 KB
      Views:
      2
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes this gives me a much better idea. ;)


    Okay we do have another fix to run to clean up some left overs from Babylon. But first let's see if we can easily fix the issue with Hao on new tabs in Firefox.
    • Run Firefox and open a new tab
    • In the URL address box type in about:config and hit enter
    • You will have to click okay to the warning about being careful.
    • Then below the URL address line a Search: line/box will appear.
    • In this search box, type newtab and hit enter.
    • You should see probably two lines show below. The one we want is browser.newtab.url
    • Right click on the browser.newtab.url line and select Modify.
    • You should get a pop form where you can enter a string value for the field.
    • Type in about:newtab and then click OK.
    • Now try creating another new tab and see what happens.
    • If you wanted your new tabs to go somewhere specific ( like to Major Geeks main forum page ), instead of using about:newtab, you would use forums.majorgeeks.com.
    • Note that instead of using the Modify selection above with right click, you can also select Reset to set it back to Firefox default which should be about:newtab
    Did this fix the Hao123 issue?
     
  7. Natt

    Natt Private E-2

    Morning Chaslang;

    Thank you for the latest update. I have followed the steps and the original default page has been restored. I now feel very happy. However, I would like to know;

    1 - If this hao123 is still somewhere in my system and so if it might start interfering with something else that I may not easily see?

    2 - After tying about:newtab, I see that babylon is still listed in the 3rd and 4th lines. What is the effect of hao123 link being listed in line 4, as shown in the attached log.

    Thank you once again for your time.

    Natt
     

    Attached Files:

    • hao.txt
      File size:
      437 bytes
      Views:
      4
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Don't think so other than the below.

    This was what I meant where I said there is another fix to run in my last message.

    Now shut down your protection software (antivirus, antispyware...etc) to avoid possible conflicts.
    • Double-click OTL.exe to run. (Vista/7 right-click and select Run as Administrator)
    • Copy the text in the code box below and paste it into the [​IMG] text-field.
    Code:
    :OTL
    IE - HKU\S-1-5-21-2248239788-1811145513-964248133-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = [URL]http://jp.hao123.com/?tn=bbl_hp_hao123_jp&babsrc=HP_ss&mntrId=bb278c500000000000006480991703dd[/URL]
    FF - prefs.js..browser.search.defaultenginename: "Search the web (Babylon)"
    FF - prefs.js..browser.search.order.1: "Search the web (Babylon)"
    FF - prefs.js..keyword.URL: "[URL]http://search.babylon.com/?affID=110823&tt=3912_1&babsrc=KW_ss&mntrId=bb278c500000000000006480991703dd&q[/URL]="
    O3 - HKU\S-1-5-21-2248239788-1811145513-964248133-1001\..\Toolbar\WebBrowser: (no name) - {2095FB03-93B3-4613-82EC-6BFCD77C043B} - No CLSID value found.
    :Commands
    [PURITY]
    [EMPTYTEMP] 
    [EMPTYFLASH]
    [REBOOT]
    • Now click the [​IMG] button.
    • If the fix needed a reboot please do it.
    • Click the OK button (upon reboot).
    • When OTL is finished, Notepad will open. Close Notepad.
    • A log file will be located at C:\_OTL\MovedFiles\mmddyyyy_hhmmss.log, where mmddyyyy_hhmmss is the date of the tool run.
    • Attach this log to your next message. (See: How to attach)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the log from OTL
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  9. Natt

    Natt Private E-2

    Good afternoon Chaslang;

    Thank you for the latest procedures. I have implemented them and so far I have checked both IE and Foxpro browsers and everything seem to have reverted back to the settings before my comp was attacked by the hao123 malware.

    Here-in attached are the logs (Oops. OTL cant upload. Will send it again)

    Can I go ahead to step 5 (UAC)?

    I will monitor my system and keep you updated on how everything behaves.

    Thank you so much once again.

    Natt
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Just run a new OTL scan as with the instructions in message # 4 and then attach the new log.

    I will tell you when. Need to be sure we are finished.
     
  11. Natt

    Natt Private E-2

    Evening Chaslang;

    Thank you for getting back. I did the OTL scan but it just couldn't be uploaded together with the MGLogs. I have copied the content below as I just cant seem to be able to load this particular file. it is once again. Have a look and let me know the next steps.

    Regards.

    Natt
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes but this is the log from the fix. I wanted you to now rerun the scan once more. The same as in message # 4 and attach this new log.
     
  13. Natt

    Natt Private E-2

    Good evening Chaslang;

    Sorry. My mistake. Here is the OTL log. I hope that this time around I have selected the right log.

    Natt:-o
     

    Attached Files:

    • OTL.Txt
      File size:
      123 KB
      Views:
      3
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No problem. I just wanted to be sure everything was fixed that we attempted to fix which is why I needed a new scan log. And it is good we checked because one item from Babylon is still there. Let's see if we can fix this manually.
    • Run Firefox and open a new tab
    • In the URL address box type in about:config and hit enter
    • You will have to click okay to the warning about being careful.
    • Then below the URL address line a Search: line/box will appear.
    • In this search box, type keyword and hit enter.
    • You should see probably two lines or so below. The one we want is keyword.URL
    • Right click on the keyword.URL line and select Modify.
    • You should get a pop form where you can enter a string value for the field.
    • Just delete everything on this line to make it blank and then click OK.
    • If you close Firefox now and then reopen, check to see if it is really gone. If it is, you can move on with the below final instructions.



    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  15. Natt

    Natt Private E-2

    Hello Chaslang;

    Thank you for the reply. I have accomplished this step. However, as I was going through the list from about:config, I could see several list items in the form of

    extensions.BabylonTooldbar

    in the list I could see one link to hao123. I hope that this isnt threatening. Is it? If not I will go ahead and complete the rest of the steps.

    So far Firefox seems to be behaving nicely.

    Cheers

    Natt:)
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes that is a bunch of left over junk from Babylon that is more than likely in the user.js file.

    Let's try something. Run Firefox and click the Firefox pull down button on the top left and select Add-Ons. On the Add-ons Manager screen, click the Extensions option. See if these extension show up in the list. If so, select them and then click Remove.

    Then exit Firefox, and recheck to see if they are really gone.
     
  17. Natt

    Natt Private E-2

    Hi Chaslang;

    Thank you for the input. I have looked at the extension and none of the hao123 or Babylon appear in the extensions list. However, like you have said, in the about:config listing hao123 and babylon appear int he user-set (status) only.

    I hope these aren't threatening. So how do I proceed on from here?

    Regards.

    Natt
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Shutdown Firefox and use Windows Explorer to navigate to the below folder:

    C:\Users\Ambassah\AppData\Roaming\Mozilla\Firefox\Profiles

    There you should find your user profile name. It could just be something like b44aowbn.default where the first part before the . is random.

    Enter this folder and look for the pref.js file and also see if there is a user.js file. Put whatever you find into a ZIP file and attach it here.
     
  19. Natt

    Natt Private E-2

    Hello Once again;

    Here are the files that you talked about. Have a look and let me know if everything is in order.

    Regards.

    Natt
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay shutdown Firefox and use IE to do the download mentioned below

    • First completely delete your user.js file as it is all Babylon and is being used to keep restoring this junk to your prefs.js file
    • Now download the attached prefs.zip file that contains a new prefs.js file to use. Overwrite your old file with this new one.
    • Once you have done this, check Firefox out to make sure all the Babylon extensions are gone.
     

    Attached Files:

  21. Natt

    Natt Private E-2

    Good evening Chaslang;

    Thank you for the last step. I've just completed this step and checked using the about:config. I no longer see any of the babylon extensions. Thank you very much.

    How can I proceed on?

    Have a good weekend.

    Natt
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. I'll repeat final instructions. ;)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  23. Natt

    Natt Private E-2

    Good evening Chaslang;

    Thank you for the latest input. First I DELETED the files RogueKiller and HitManPro as they weren't installed but were rather executable files. I hope that that was the correct procedure.

    I have enabled the Disk Emulation software with Defogger as well as reenabling the UAC.

    I have hit a dead end in that I cannot find the program HighjackThis. When/what step did I install it? Or was it an executable application.

    Once I get this over I will proceed on with the rest of the steps.

    Please advice.

    Kind regards.

    Natt
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It was embedded in MGtools and normally creates an entry in Add/Remove programs to uninstall it. Don't worry about it. Just continue on.
     
  25. Natt

    Natt Private E-2

    Good afternoon Chaslang;

    I have gone all the way to the last step - I believe. Once again this is to thank you once again from the bottom of my heart for your deep insight regarding the problem I had and for the knowledge that I have gained in the process of interacting with you. I have learned a lot and I hope that I will continue learning more from you in the future.

    Thank you once again and I will continue monitoring the my system as well as taking precautions to protect myself.

    Natt
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds