I need virus help please!

Discussion in 'Malware Help (A Specialist Will Reply)' started by mhkwan, May 8, 2013.

  1. mhkwan

    mhkwan Private E-2

    Hello,

    My computer has been having virus problems for a few weeks already....and I finally decided to try to get it fixed as it has been getting steadily worse. I first noticed a problem when my Microsoft Security Essentials detected and was "cleaning" some stuff including what's called trojan:win32/redyms.a.

    I thought I removed it when I used the removal tool in the program until every day or few days more and more things started to be detected by the Microsoft Security Essentials including trojan:win32/alureon.gd and trojan:js/iframeref.k among others....not only were there different ones, but multiple detections from each of the same types of trojan would show up....and my computer started heating up and shutting down a lot where I would get crashes and the blue screen saying that there was a crash dump and problem has been detected, etc.

    Please help me take back control of my computer....I haven't had a problem like this in years, if at all. thanks!

    P.S. Attached are 5 of my results due to the scans as requested in Step 3....I will also be attaching results from google redirection steps that I followed in next post since I had those problems as well.
     

    Attached Files:

  2. mhkwan

    mhkwan Private E-2

    Attached are the 3 log files for the google redirection steps that I followed....I did these BEFORE the scan log files that I posted in my initial post. thx!
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Uninstall the below programs
    Anti-phishing Domain Advisor
    Blekko search bar
    Java(TM) 6 Update 37

    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Please download OTM by Old Timer and save it to your Desktop.
    • Run it by double clicking on it (Note: if using Vista, Win7, or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    C:\Program Files (x86)\PC Speed Maximizer
    C:\Users\User\AppData\Local\Diagnostics\Mozilla\vzonhcsvo.dll
    C:\Users\User\AppData\Local\Broadcom\nbiirxjg.dll
    C:\Users\User\AppData\Roaming\8a66e9ef-b34c-4d32-bf5c-6188e5ea2031ad\aeefbcdbfceeaad.exe
    C:\Users\User\AppData\Local\gamesleapSA\bin\1.0.11.0\GamesLeapSA.exe
    C:\Users\User\AppData\Local\gamesleapSA
    C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_mpfapcdfbbledbojijcbcclmlieaoogk_0
    C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\6cl6z5ed.default\extensions\crossriderapp2258@crossrider.com
    C:\Program Files (x86)\Yontoo
    C:\Users\User\AppData\LocalLow\blekkotb_019
    C:\ProgramData\Anti-phishing Domain Advisor
    C:\ProgramData\blekko toolbars
    C:\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
    C:\Users\User\AppData\Local\Broadcom\nbiirxjg.dll
    C:\Users\User\AppData\Roaming\rwbjsajw\icthuhrr.exe
    C:\Windows\TEMP\*.*
    C:\Users\User\AppData\Local\Temp\*.*
    
    :Reg
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Broadcom]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ODBC]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550055225558}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660066226658}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{77777777-7777-7777-7777-770077227758}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Cr_Installer\2258]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\YontooIEClient.Layers.1]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Classes\YontooIEClient.Layers]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\YontooIEClient.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\YontooIEClient.DLL]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7E84186E-B5DE-4226-8A66-6E49C6B511B4}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{80922ee0-8a76-46ae-95d5-bd3c3fe0708d}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{99066096-8989-4612-841F-621A01D54AD7}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{99079a25-328f-4bd4-be04-00955acaa0a7}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\YontooIEClient.Api.1]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\YontooIEClient.Api]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\YontooIEClient.Layers.1]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\YontooIEClient.Layers]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\DataMngr]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{8D8654CD-7FBC-4C7E-84E9-371BFA8DB04E}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{9307081B-7444-494C-8CF6-2FA7C0E92BFB}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{9D9785E5-3424-40B6-A287-BA143AD53109}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{A8F0AD53-1AEE-447E-89CD-71C325796F84}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{B6783DFA-B8C8-4CB6-AB9F-EF1A1F7F7AE8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Components\{F5F971A9-DBF8-4EEC-81E3-5F1660573E6C}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Tarma Installer\Products\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Anti-phishing Domain Advisor]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Datamngr]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{9D717F81-9148-4f12-8568-69135F087DB0}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{99079A25-328F-4BD4-BE04-00955ACAA0A7}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes]
    "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2406}]
    
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    "SPMTray"=-
    "ODBC"=-
    "Adobe CSx Manager"=-
    "Mozilla"=-
    "Broadcom"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "Anti-phishing Domain Advisor"=-
    [HKEY_LOCAL_MACHINE\software\Wow6432Node\microsoft\windows\currentVersion\Run]
    "Anti-phishing Domain Advisor"=-
    [HKEY_USERS\S-1-5-21-383793815-397827578-1440177876-1000\Software\Microsoft\Windows\CurrentVersion\run]
    "SPMTray"=-
    "ODBC"=-
    "Adobe CSx Manager"=-
    "Mozilla"=-
    "Broadcom"=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}]
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\AboutURLs]
    "Tabs"="res://ieframe.dll/tabswelcome.htm"
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXTlog
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  4. mhkwan

    mhkwan Private E-2

    thanks for helping me out chaslang.

    I did what you told me to do and have attached the 3 files you requested. I can definitely start seeing improvement as my google searches don't seem to get redirected to some weird site anymore. I still get the "related searches" bar to the right of my screen everytime I go to a different site....is that supposed to be there?
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
    With Firefox? Can you show me a snapshot of what you are seeing?

    We do have one more fix to do though.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
     
  6. mhkwan

    mhkwan Private E-2

    Thanks,

    See attached for log file.

    Regarding the snapshot....I tried to take a screenshot and save to word document, but when I tried to add as an attachment...it said that "Your file of 305.0 KB bytes exceeds the forum's limit of 97.7 KB for this filetype. "

    I also noticed besides the "related searches" bar I get on the right side of the screen that I also get one of those bar ads at the entire bottom of my screen for certain sites as well (i.e. lose 20 lbs in in 4 weeks) such as fly.com....again, unfor I can show it because of the large file type.

    thanks,

    Matthew
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just to make sure it is not due to a Firefox addon, do the below.

    Reset Firefox to Defaults

    Word docs are not good attachments. JPG files are best. Using a snapshot tool that allows you to capture sections of the screen is a much better way to do it too because if you take a full screen they wind up being unreadable. A tool like below is much better:

    http://www.faststone.org/FSCaptureDetail.htm

    But we may not need it if the reset of Firefox works.
     
  8. mhkwan

    mhkwan Private E-2

    thanks, the 2 side bars have disappeared after resetting to default firefox!

    thanks for all your help....am i pretty much done? i remember doing a few different scans under the initial "Read me first..." post which said NOT to remove any of the threats the scan results posted, but instead to ignore and post the log....do i need to re-scan and delete threats or have they already been taken care of?
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    We removed them in the fixes I gave you. We tell you not to fix anything with RogueKiller and HitmanPro because quite a few things they will show are not problems at all.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Go back to step 4 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove, you can delete these files now.
    7. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    8. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  10. mhkwan

    mhkwan Private E-2

    Hi chaslang,

    I followed your steps below (incl deleting most scan programs and enabling uac) until I reached "toggle system restore" in step 6 as it told me to wait a few days to make sure there was no more malware.

    Unfortunately, just a couple minutes ago, my microsoft security essentials program detected and "cleaned" (which really is not happening) a trojan, specifically called trojan:win32/alureon.gd. It's right now under their "quarantine items" and "detected items"....should I remove it now? What else should I do?

    thanks,

    matthew
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It is very likely that all MSE found is what we already quarantined or what is left over in system restore from the infections. Toggle System Restore now and then tell me if you have any more problems. Also if MSE finds a problem, we need to know exactly where it is finding the problem. Names of infections can be helpful but it is more important to know where. Like, full path filenames and/or registry keys.
     
  12. mhkwan

    mhkwan Private E-2

    thanks.

    I did toggle system restore as you said (as well as removed the trojan from both "quarantine" and "detected" items) and will continue monitoring if any other trojans get detected by MSE.

    Fyi, the specific trojan I was referring to was found under "
    containerfile:C:\Users\User\AppData\LocalLow\6517.tmp.dat
    file:C:\Users\User\AppData\LocalLow\6517.tmp.dat->[Obfuscator.PN]" as pointed out by MSE.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that may or may not have been a problem. Some malware does hide things in folders like this but you have no other active malware. Thus if this was a malware file, it was just an inactive leftover. Since MSE removed it, I would not worry about it anymore.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds