Logs assessment, possible resident malware, help needed

Discussion in 'Malware Help (A Specialist Will Reply)' started by zeriab, Apr 8, 2014.

  1. zeriab

    zeriab Private E-2


    hi,
    Can you please drop an eye on these, my old 2Ghz vista box is nerve-rakingly slow, while displaying a 100kbits/s of internet activity while waiting for a right-click on a file to operate.

    than you for your time
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcomet to Major Geeks!

    You need to attach the logs from our malware cleaning process in order for us to help you. ;)
     
  3. zeriab

    zeriab Private E-2

    sorry, thought i did..
    now the attachment icon is inactive: should i start another thread?
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You shouldn't have to start another thread, no! :) Just try again, on the "manage attachments" button, or use another browser.
     
  5. zeriab

    zeriab Private E-2

    hope this works, thank you
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below programs. If you do not find them or they will not uninstall, just keep going.
    Ad-Aware Browsing Protection
    Vuze Remote Toolbar

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.ask.com/?l=dis&o=40010&gct=hp
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R3 - URLSearchHook: (no name) - {ba14329e-9550-4989-b3f2-9732e92d17cc} - (no file)
    R3 - URLSearchHook: (no name) - *{CFBFAE00-17A6-11D0-99CB-00C04FD64497} - (no file)
    O2 - BHO: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - (no file)
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

    After clicking Fix, exit HJT.

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    
    :Services
    gupdate1c9d7a823cf5e40
    gupdatem
    IAWHKV
    PUBZUSUR
    QQDNN
    StarOpen
    STOWSAWTJQ
    UAGZDEQXAB
     
    :Files
    C:\Program Files\Conduit]
    C:\Users\pc-de-user\AppData\Local\APN
    C:\Users\pc-de-user\AppData\Local\OpenCandy
    C:\Users\pc-de-user\AppData\Roaming\OpenCandy
    C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2816352959-2530670269-2212174382-1001Core.job
    C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2816352959-2530670269-2212174382-1001UA.job
    C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
    C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
    C:\Users\pc-de-user\AppData\Roaming\Ad-Aware Antivirus
    C:\Users\pc-de-user\AppData\Roaming\OpenCandy
    C:\Users\pc-de-user\AppData\Local\Temp\*.*
    
    :Reg
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentVersion\Run]
    "QuickTime Task"=-
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
    "QuickTime Task"=-
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\QuickTime Task]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\WinampAgent]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460d-9366-D71CDEDA3179}]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Conduit]
    [-HKEY_USERS\.DEFAULT\Software\AppDataLow\Software\AskToolbar]
    [-HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{D4027C7F-154A-4066-A1AD-4243D8127440}]
    [-HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}]
    [-HKEY_USERS\S-1-5-18\Software\AppDataLow\Software\AskToolbar]
    [-HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{D4027C7F-154A-4066-A1AD-4243D8127440}]
    [-HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D4027C7F-154A-4066-A1AD-4243D8127440}]
    [-HKEY_USERS\S-1-5-21-2816352959-2530670269-2212174382-1000\Software\AppDataLow\Software\Conduit]
    [-HKEY_USERS\S-1-5-21-2816352959-2530670269-2212174382-1000\Software\Conduit]
    [-HKEY_USERS\S-1-5-21-2816352959-2530670269-2212174382-1000\Software\Microsoft\Internet Explorer\MAIN\Start Page]
    [-HKEY_USERS\S-1-5-21-2816352959-2530670269-2212174382-1000\Software\Softonic]
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A057A204-BACC-4D26-9990-79A187E2698E}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{80781AC8-4412-43AB-86DE-B16C2DEDE408}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{80781AC8-4412-43AB-86DE-B16C2DEDE408}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{CCC7A320-B3CA-4199-B1A6-9F516DD69829}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  7. zeriab

    zeriab Private E-2

    Thank you Chaslang for your time.

    I booted an admin session on the box, failed to remove Ad-Aware Browsing protection.
    (think I've uninstalled it, all there is related to it is an empty folder named adawaretb in C:\Program Files.)

    Vuze Remote Toolbar is also nowhere to be found, should I un-install Vuze altogether then maybe re-install it further on, without the remote Toolbar plug-in?

    Ok so:
    I disabled User Account Control, shut down Webroot protection as instructed in your Using MGtools page, then launched MGTools_exe from C:\

    it went fine then stopped at:
    NwkTst.bak Checking Local Loopback Ping

    (in one attempt it went further to NwkTst.bak Checking Google IP Ping)

    here's where i'm at for the time after 5-6 attempts

    Thank you
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Personally I would not reinstall it at all but if you do then be sure to not allow it to install this 3rd party junkware otherwise you will be back in the same boat again. It may even install things without asking you.

    Sounds to me like your protection software ( possibly firewall ) is blocking the use of ping.exe You need to unblock it to allow NwkTst.bat ( not bak ) to run. Otherwise just shutdown your protection software and this includes your firewall so that you can run GetLogs.bat properly. Do not run MGtools.exe anymore. You do not need it.
     
  9. zeriab

    zeriab Private E-2

    the MGtools\analyse.exe failed to display the
    R3 {ba14329....17cc} and
    O2 - BHO... lines
    i clicked Fix after selecting the remaining 5 lines and quit.

    after a reboot, and uninstalling Vuze, JRT went on uneventfully and produced the log attached.

    The MGtool GetLogs.bat stopped again at pinging google IP, although i shut down Webroot and disabled windows firewall through "netsh firewall set opmode disable" at the cmd prompt.

    thank you for your help and precious time
     

    Attached Files:

  10. zeriab

    zeriab Private E-2

    another precision, as i connect through a home adsl router, i suspected it to block outgoing pings requests, so i disabled wi-fi and connected through a 3G dongle to no avail.
    thought it can be useful
    thank you
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Don't worry about the ping test. We do not need that info anyway since you are not having connection problems.

    How are things working? Your logs are pretty clean now.
     
  12. zeriab

    zeriab Private E-2

    Everything is ok by now, the box is faster and working as it's meant to be, thank you for your time and your help, great site (I first visited in 1999 maybe..), nice and generous people who know their stuff. keep it up
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome and thanks.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
    Last edited by a moderator: Apr 19, 2014
  14. zeriab

    zeriab Private E-2

    Thank you Chaslang, to me everything is fine, I read only now the Read and Run Me part of your instructions, and I have to confess I skipped the cd-emulation step: it looks like everything is to be done again from scratch to ascertain no malware/rootkit has escaped detection..
    please say it ain't so, i'm no afraid of going through it one more time, it's about how to bear the shame of wasting your precious time!
     
  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Don't worry, you won't have to go through it all again just for that one missed step. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds