Followed guide for removing trojan horse, still having problems.

Discussion in 'Malware Help (A Specialist Will Reply)' started by Muhammad95, Jan 4, 2013.

  1. Muhammad95

    Muhammad95 Private E-2

    Recently, my AVG (free version) notified me of multiple detections (2-3) of Trojan Horse Agent3.cpcf in c:\Windows\Systems32\lssasr.exe. I knew I got them from compulsively clicking a Facebook link (lesson learned). However, my AVG told me they were "successfully removed," so I thought the problem was solved.

    For the next few weeks, AVG would inform me that it had found 2-7 detections of the same virus. Likewise, it'd removed them all. It wasn't until I experienced the following problems that I took action:

    • Random shut downs in safe mode
    • Desktop icons and the start menu unresponsive to mouse (wouldn't highlight or do anything when clicked)
    • Desktop icons would be clicked and the mouse would show that they are loading. Then nothing happens.
    • Overall slow performance
    • After logging in, computer would freeze then only display the desktop background image.

    (Sometimes the computer would run smoothly.)

    I followed majorgeek's malware removal guide. In the few days waiting before toggling system restore (as the guide suggested) all seemed well. Then I got the same notification from AVG and the same problems began to occur again.

    Attached are my logs. Any help would be greatly appreciated!
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Your Malwarebytes log shows that -> No action taken. Please run it again and fix the problems it find this time. Make sure you save the logs after you fix not before. Otherwise it shows you took no action.

    Let's begin with uninstall some items you should never have installed. You appear to be a toolbar and browser helper collector which is not good.;)


    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://search.gboxapp.com/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;127.0.0.1:9421;<local>
    R3 - URLSearchHook: GagetBox - {3B81079D-2AC9-425f-A494-A1C7D93AFA3C} - C:\Program Files (x86)\GadgetBox\gadgetBoxTB.dll
    R3 - URLSearchHook: (no name) - {88c7f2aa-f93f-432c-8f0e-b7d85967a527} - (no file)
    R3 - URLSearchHook: Radio Bar 1.1 Toolbar - {a8938ed0-6c0c-4143-a80e-e12136c5c69a} - C:\Program Files (x86)\Radio_Bar_1.1\tbRadi.dll
    R3 - URLSearchHook: (no name) - - (no file)
    O2 - BHO: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll
    O2 - BHO: Search Toolbar - {9D425283-D487-4337-BAB6-AB8354A81457} - C:\Program Files (x86)\Search Toolbar\SearchToolbar.dll (file missing)
    O2 - BHO: Radio Bar 1.1 Toolbar - {a8938ed0-6c0c-4143-a80e-e12136c5c69a} - C:\Program Files (x86)\Radio_Bar_1.1\tbRadi.dll
    O2 - BHO: kikin Plugin - {E601996F-E400-41CA-804B-CD6373A7EEE2} - C:\Program Files (x86)\kikin\ie_kikin.dll
    O3 - Toolbar: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll
    O3 - Toolbar: Radio Bar 1.1 Toolbar - {a8938ed0-6c0c-4143-a80e-e12136c5c69a} - C:\Program Files (x86)\Radio_Bar_1.1\tbRadi.dll
    O3 - Toolbar: Search Toolbar - {9D425283-D487-4337-BAB6-AB8354A81457} - C:\Program Files (x86)\Search Toolbar\SearchToolbar.dll (file missing)
    O3 - Toolbar: GagetBox - {3B81079D-2AC9-425f-A494-A1C7D93AFA3C} - C:\Program Files (x86)\GadgetBox\gadgetBoxTB.dll
    O4 - HKLM\..\Run: [RegWork] "C:\Program Files (x86)\RegWork\RegWork.exe"
    O4 - HKCU\..\Run: [Pokki] "C:\Users\Muhammad\AppData\Local\Pokki\v0.260.8.396\pokki.exe"
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
    O9 - Extra button: (no name) - {0F7195C2-6713-4d93-A1BC-DA5FA33F0A65} - C:\Program Files (x86)\kikin\ie_kikin.dll
    O9 - Extra 'Tools' menuitem: My kikin - {0F7195C2-6713-4d93-A1BC-DA5FA33F0A65} - C:\Program Files (x86)\kikin\ie_kikin.dll

    After clicking Fix, exit HJT.


    Now Uninstall ALL of the below:
    Conduit Engine
    GadgetBox
    Java SE Development Kit 7 Update 5 (64-bit)
    Java(TM) 6 Update 29
    Java(TM) 7 Update 5 (64-bit)
    Java(TM) SE Development Kit 6 Update 14
    kikin plugin 2.8
    Radio Bar 1.1 Toolbar

    If you have a problem uninstalling any of the above, try using the below to uninstall them:

    Revo Uninstaller



    Now please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
     
    :Files
    C:\Program Files (x86)\Internet Saving Optimizer
    C:\Program Files (x86)\Media Access Startup
    C:\Program Files (x86)\GadgetBox
    C:\Program Files (x86)\Radio_Bar_1.1
    C:\Program Files (x86)\ConduitEngine
    C:\Program Files (x86)\Search Toolbar
    C:\Program Files (x86)\kikin
    C:\Users\Muhammad\AppData\Local\Pokki\v0.260.8.396\pokki.exe
    C:\Users\Muhammad\AppData\Local\Pokki
    C:\Program Files (x86)\RegWork
    C:\Users\Muhammad\AppData\Roaming\OpenCandy\OpenCandy_2A48D61B317744E086BBA5A8B24DA97A\LatestDLMgr.exe
    C:\Users\Muhammad\AppData\Roaming\OpenCandy
    C:\Program Files (x86)\Ask.com
    C:\Users\Muhammad\AppData\Local\Temp\*.*
    C:\Windows\tasks\Regwork.job
    :Reg
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "Search Protection"=-
    "YSearchProtection"=-
    "Pokki"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "YSearchProtection"=-
    "RegWork"=-
    [HKEY_USERS\S-1-5-21-3338409234-2134253920-2276315382-1000\Software\Microsoft\Windows\CurrentVersion\run]
    "Search Protection"=-
    "YSearchProtection"=-
    "Pokki"=-
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{B6A17F2D-9610-496F-AB33-4D4EB6635CEB}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AA74FE59-BC4C-4172-9AC4-73315F71CFFE}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AC129BF9-68BF-4bc4-A1DC-ECB62712FF99}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{AFBCB7E0-F91A-4951-9F31-58FEE57A25C4}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{B6A17F2D-9610-496F-AB33-4D4EB6635CEB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9D425283-D487-4337-BAB6-AB8354A81457}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a8938ed0-6c0c-4143-a80e-e12136c5c69a}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E601996F-E400-41CA-804B-CD6373A7EEE2}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{30F9B915-B755-4826-820B-08FBA6BD249D}"=-
    "{9D425283-D487-4337-BAB6-AB8354A81457}"=-
    "{a8938ed0-6c0c-4143-a80e-e12136c5c69a}"=-
    "{3B81079D-2AC9-425f-A494-A1C7D93AFA3C}"=-
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
     
    
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).



    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  3. Muhammad95

    Muhammad95 Private E-2

    Thank you for your reply! I did as instructed however tasks had to be done in multiple sittings. My AVG continued to detect the virus upon start up. By the end I noticed most problems going away and faster performance. However, today upon start up I received the same AVG notification again and, shortly after, the blue screen of death. I restarted my computer and then everything was fine.

    I'm not sure what it is I'm doing wrong /: I did notice that my UAC and firewall defaults to being turned off. I think turning on the UAC caused the blue screen. I hope I'm not stuck with this virus for too long.

    Side note: I'll have to re-install a jdk for my computer science class. I plan to major in it as a college freshman next fall :)
     

    Attached Files:

    Last edited: Jan 7, 2013
  4. Muhammad95

    Muhammad95 Private E-2

    I'm having difficulty attaching the other log. I sent the MovedFiles folder into a zipped folder and tried attaching that. I received the following message:
    "Your submission could not be processed because a security token was missing."
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    But why are you trying to ZIP the OTM folder. I just want the log. You cannot attach that folder as even if you ZIP it, it will be way too large and I don't want copies of all the items that were deleted. I just want the OTM log, but it looks like it did not get created based on MGlogs.zip. Did you have any problems running OTM? Was your antivirus disable. It looks like some of the fix worked and some did not.

    NOTE: UAC needs to remain disable until we are finished.

    Also a question! I had OTM delete the Pokki stuff because I believed it was malware. Do you know it to be something valid? If so, what?
     
    Last edited: Jan 9, 2013
  6. Muhammad95

    Muhammad95 Private E-2

    Sorry, I just assumed that was what you meant by C:\_OTM\MovedFiles. I believe this may be the log. It is in the format you mentioned. OTM ran without any errors and both my anti-virus and UAC are disabled.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your logs look pretty good now. Just do the below.


    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: (no name) - {3B81079D-2AC9-425f-A494-A1C7D93AFA3C} - (no file)
    R3 - URLSearchHook: (no name) - - (no file)]

    After clicking Fix, exit HJT.


    Also you did not answer my question about Pokki.
     
  8. Muhammad95

    Muhammad95 Private E-2

    Okay, I just did that. I made sure all browsing sessions were closed. I don't know what pokki is actually. I believe I've had it before the virus; it never gave me any problems.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay based on info I have it is related to OpenCandy which you don't want on your PC.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds