Virus causing numerous dllhost.exe processes

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by klarge, Nov 9, 2014.

  1. klarge

    klarge Private E-2

    My problem is very similar to an existing thread, however I am unable to resolve this issue on my machine.

    I have numerous instances of the dllhost.exe *32 COM surrogate slowing down my computer. Malwarebytes blocks several "malicious" websites. I have Norton 360 which gives messages about trojan.powelik activity.

    I followed the instructions in the thread to create the necessary log files to diagnose the problem.

    I was not able the create the MGtools log files. The tool starts, creates one log file for GetUnKey, then starts GRK64.bat. The tool just seems to stop there with the DOS window opened, but nothing happening.

    I would love some helpful advice to resolve this. Thanks!
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi and welcome. :)


    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. Only the correct version will work.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  3. klarge

    klarge Private E-2

    Thanks for the welcome and the quick response to my post. Attached are the requested files after running the farbar tool.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download this >> View attachment fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.

    Also at this point, I want to double check the status of Poweliks by having you run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs.
     
  5. klarge

    klarge Private E-2

    Hi again. I've attached the two files. Thanks.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Don't forget Chas said:
     
  7. klarge

    klarge Private E-2

    I did forget! The files created by the subsequent scan are attached.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download Fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)

    Then attach the below log:
    • Fixlog.txt
    Please attach the above two log first before you continue with the below.
    Also at this point, I want you to run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs.
     

    Attached Files:

  9. klarge

    klarge Private E-2

    Thanks for your help. The requested files are attached.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Hitman and have it remove all that it finds.


    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    Code:
    :Files
    C:\Windows\SysWOW64\00000791.tmp
    C:\Windows\SysWOW64\00000840.tmp
    C:\Windows\SysWOW64\00000877.tmp
    C:\Windows\SysWOW64\00001046.tmp
    C:\Windows\SysWOW64\00001361.tmp
    C:\Windows\SysWOW64\00001399.tmp
    C:\Windows\SysWOW64\00001524.tmp
    C:\Windows\SysWOW64\00001841.tmp
    C:\Windows\SysWOW64\00001852.tmp
    C:\Windows\SysWOW64\00002626.tmp
    C:\Windows\SysWOW64\00002659.tmp
    C:\Windows\SysWOW64\00002851.tmp
    C:\Windows\SysWOW64\00003187.tmp
    C:\Windows\SysWOW64\00003252.tmp
    C:\Windows\SysWOW64\00003370.tmp
    C:\Windows\SysWOW64\00003903.tmp
    C:\Windows\SysWOW64\00003917.tmp
    C:\Windows\SysWOW64\00003951.tmp
    C:\Windows\SysWOW64\00004039.tmp
    C:\Windows\SysWOW64\00004164.tmp
    C:\Windows\SysWOW64\00004419.tmp
    C:\Windows\SysWOW64\00004591.tmp
    C:\Windows\SysWOW64\00005601.tmp
    C:\Windows\SysWOW64\00005631.tmp
    C:\Windows\SysWOW64\00006527.tmp
    C:\Windows\SysWOW64\00007232.tmp
    C:\Windows\SysWOW64\00007393.tmp
    C:\Windows\SysWOW64\00007574.tmp
    C:\Windows\SysWOW64\00007673.tmp
    C:\Windows\SysWOW64\00007896.tmp
    C:\Windows\SysWOW64\00008400.tmp
    C:\Windows\SysWOW64\00008485.tmp
    C:\Windows\SysWOW64\00008624.tmp
    C:\Windows\SysWOW64\00009074.tmp
    C:\Windows\SysWOW64\00009259.tmp
    C:\Windows\SysWOW64\00009321.tmp
    C:\Windows\SysWOW64\00009683.tmp
    C:\Windows\SysWOW64\00009796.tmp
    C:\Windows\SysWOW64\00010601.tmp
    C:\Windows\SysWOW64\00010686.tmp
    C:\Windows\SysWOW64\00011392.tmp
    C:\Windows\SysWOW64\00012254.tmp
    C:\Windows\SysWOW64\00012678.tmp
    C:\Windows\SysWOW64\00012685.tmp
    C:\Windows\SysWOW64\00013197.tmp
    C:\Windows\SysWOW64\00013518.tmp
    C:\Windows\SysWOW64\00013651.tmp
    C:\Windows\SysWOW64\00014163.tmp
    C:\Windows\SysWOW64\00014226.tmp
    C:\Windows\SysWOW64\00015445.tmp
    C:\Windows\SysWOW64\00016067.tmp
    C:\Windows\SysWOW64\00016605.tmp
    C:\Windows\SysWOW64\00017278.tmp
    C:\Windows\SysWOW64\00017566.tmp
    C:\Windows\SysWOW64\00018110.tmp
    C:\Windows\SysWOW64\00018293.tmp
    C:\Windows\SysWOW64\00018390.tmp
    C:\Windows\SysWOW64\00018649.tmp
    C:\Windows\SysWOW64\00018700.tmp
    C:\Windows\SysWOW64\00018866.tmp
    C:\Windows\SysWOW64\00018962.tmp
    C:\Windows\SysWOW64\00019019.tmp
    C:\Windows\SysWOW64\00019287.tmp
    C:\Windows\SysWOW64\00019631.tmp
    C:\Windows\SysWOW64\00020300.tmp
    C:\Windows\SysWOW64\00020348.tmp
    C:\Windows\SysWOW64\00020564.tmp
    C:\Windows\SysWOW64\00020591.tmp
    C:\Windows\SysWOW64\00020902.tmp
    C:\Windows\SysWOW64\00021785.tmp
    C:\Windows\SysWOW64\00021799.tmp
    C:\Windows\SysWOW64\00021865.tmp
    C:\Windows\SysWOW64\00022011.tmp
    C:\Windows\SysWOW64\00022027.tmp
    C:\Windows\SysWOW64\00022072.tmp
    C:\Windows\SysWOW64\00022344.tmp
    C:\Windows\SysWOW64\00022634.tmp
    C:\Windows\SysWOW64\00022666.tmp
    C:\Windows\SysWOW64\00022900.tmp
    C:\Windows\SysWOW64\00023032.tmp
    C:\Windows\SysWOW64\00023319.tmp
    C:\Windows\SysWOW64\00023784.tmp
    C:\Windows\SysWOW64\00023950.tmp
    C:\Windows\SysWOW64\00023981.tmp
    C:\Windows\SysWOW64\00024147.tmp
    C:\Windows\SysWOW64\00024159.tmp
    C:\Windows\SysWOW64\00025116.tmp
    C:\Windows\SysWOW64\00025548.tmp
    C:\Windows\SysWOW64\00025621.tmp
    C:\Windows\SysWOW64\00025839.tmp
    C:\Windows\SysWOW64\00026352.tmp
    C:\Windows\SysWOW64\00026820.tmp
    C:\Windows\SysWOW64\00027301.tmp
    C:\Windows\SysWOW64\00027675.tmp
    C:\Windows\SysWOW64\00027798.tmp
    C:\Windows\SysWOW64\00028009.tmp
    C:\Windows\SysWOW64\00028103.tmp
    C:\Windows\SysWOW64\00028429.tmp
    C:\Windows\SysWOW64\00028609.tmp
    C:\Windows\SysWOW64\00028769.tmp
    C:\Windows\SysWOW64\00029489.tmp
    C:\Windows\SysWOW64\00029550.tmp
    C:\Windows\SysWOW64\00029630.tmp
    C:\Windows\SysWOW64\00029870.tmp
    C:\Windows\SysWOW64\00030431.tmp
    C:\Windows\SysWOW64\00030549.tmp
    C:\Windows\SysWOW64\00031188.tmp
    C:\Windows\SysWOW64\00031302.tmp
    C:\Windows\SysWOW64\00031499.tmp
    C:\Windows\SysWOW64\00032198.tmp
    C:\Windows\SysWOW64\00032342.tmp
    C:\Windows\SysWOW64\00032344.tmp
    
    :reg
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}]
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.


    http://imageshack.us/a/img841/7292/thisisujrt.gif Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.


    Please download AdwCleaner by Xplode and save to your Desktop.

    • Double click on AdwCleaner.exe to run the tool.
    • Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.


    Now re run Hitman and attach log.

    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    Let us know of any problems you may have encountered with the above instructions and also let us know how things are running!
     
  11. klarge

    klarge Private E-2

    I did not encounter any issues performing the steps. I have attached the logs created after running them. There aren't any programs in the AdwCleaner report that I need to keep. Things seem to be cleaned up, but I will post again tomorrow to let you know for sure. Thanks!
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Adwcleaner and have it remove all that it sees.


    Everything still running nicely?
     
  13. klarge

    klarge Private E-2

    There are no superfluous dllhost processes. I don't get any warnings from either Norton or Malwarebytes. Everything seems to be running fine for me now.

    Thank you very much for guiding me through this process to clean things up. The scripts helped and the instructions were very clear. Thanks again.
     
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:



    Download OTC
    • Close all programs.
    • Start OTC program.
    • Click the CleanUp! button.
    • Select Yes when asked "Begin cleanup process".
    • If you are asked to reboot, select Yes.
    • If any logs remain on the computer you can remove them.

    You can also delete any files and folders that Adwcleaner and JRT generated. :)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds