Powershell has stopped working + avast/mbam blocking malicious outbound urls

Hi all,
My mother in law’s computer is having some trouble. It is exhibiting the following symptoms:

  • “Powershell has stopped working” error messages
  • Malwarebytes blocking malicious websites… go.wvydeo, search.blinkxcore.com, some ip address. The process they originate from is c:\windows\syswow64\dllhost.exe
  • CPU utilization spikes and slow performance. Some processes I don’t recognize. clrss.exe, dvdupgrd.exe, others.

I suspect a trojan and/or malware. Ran FRST and Malwarebytes. Malwarebytes was clean. Tried running aswmbr.exe and it got stuck sitting on one file for 15 minutes and was not finishing, so I stopped it. Is there something else I should run? Thanks as always for your help.

Hi exzachtly1, :slight_smile:

My name is Valinorum and I will be the acolyte today. Before we proceed, please, acknowledge yourself the following(s):

[*]Please do not create any new threads on this while we are working on your system as it wastes another volunteer’s time. If you are being helped/have solved the issue/no longer wish to continue, notify me in your reply and I will quickly close this thread. Failing to comply will result in denial of future assistance.
[*]Please do not install any new software while we are working on this system as it may hinder our process.
[*]Malware removal is a complicated process so don’t stop following the steps even if the symptoms are not found. Keep up with me until I declare you clean.
[*]Please do not try to fix anything without being ask.
[*]Please do not attach your logs or put them inside code/quote tags. Do a Copy/Paste of the entire contents of the log file and submit it inside your post unless directed otherwise.
[*]Please print or save the instructions I give you for quick reference. We may be using Safe mode which will cut you off from internet and you will not always be able to access this thread.
[*]Back up your data. I will not knowingly suggest your any course that might damage your system but sometimes Malware infections are so severe that only option we have is to re-format and re-install the operating system.
[*]If you are confused about any instruction, stop and ask. Do not keep on going.
[*]Do not repeat the steps if you face any problems.
[*]I am not an omniscient. There are things even I cannot foresee. But what I know took years to learn and perfect the skill. This site is run by volunteers who help people in need in their own free time. I would ask you to respect their time and be patient as sometimes real life demands our time and replies to you can be delayed.
[*]Private Message(PM) if and only if I have not responded to your thread within three days or your query is offtopic and personal. Do not PM me under any other circumstances. Your thread is the only medium of communication.
[*]The fixes are for your system only. Please refrain from using these fixes on other system as it may do serious damage.


[*]Step #1 Fix with FRST
Make sure that you still have FRST.exe on your Desktop. If you do not have it, download the suitable version from here to your Desktop.
[*]Open Notepad.exe. Do not use any other text editor software;
[*]Copy and Paste the contents inside the code-box to your Notepad

Start
Closeprocesss:
Emptytemp:
CustomCLSID: HKU\S-1-5-21-2369866869-3976134651-3403731318-1000_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32 -> rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf> (the data entry has 251 more characters). <==== Poweliks?
HKLM-x32\...\Run: [] => [X]
HKU\S-1-5-21-2369866869-3976134651-3403731318-1000\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf> (the data entry has 243 more characters). <==== Poweliks!
CMD: netsh winsock reset 
CMD: bitsadmin /Reset /Allusers
End

[*]Click on File > Save as…
[list][*]Inside the File Name box type fixlist.txt
[*]From the Save as type drop down list, choose All Files
[*]Save the file to your Desktop;
[*]Re-run FRST.exe and click Fix;
[*]Note: If FRST advises there is a new updated version to be downloaded, do so/allow this.[]After the completion, a log will be produced;
[
]Attach the log in your next reply.[/list]


[*]Required Log(s):
[*]FRST Fix Log

Regards,
Valinorum

Thanks for your help valinorum. How long should I expect the FRST fix to take? It has been going for nearly 15 minutes and has not finished yet. Appears stuck based on what I see in Fixlog.txt. I attached what it has output so far, it is still running though and I’m about to have to go to work for the day. I’ll leave it running and check when I get home.

if you have lots of temp files it may take some time…

Nevermind - it just finished. Looks like it was emptying some temp data.

EmptyTemp: => Removed 7.3 GB temporary data. :wink:

Valinorum will be back and check logs later…

How is your PC?

Yeah, I was surprised at the amount of temp data it deleted as well :slight_smile:

I am at work now so I will have to check the computer later this evening.

I await your reply.

Just got home and have been monitoring the affected computer for about 10 minutes. So far CPU usage is normal, no more powershell errors, and no more outbound connection errors.

I think we might be in the clear, but last night it seemed normal for a while and then the issues suddenly started happening again… so I will continue to watch it. Is there another scan I should run to confirm that the offending virus was removed? I noticed that the fix you posted mentioned Poweliks, which I understand to be a trojan. What is the typical attack vector for this type of trojan? How should I advise my mother in law to avoid this in the future when I give her the computer back?

Thanks! You guys have helped me before and I definitely appreciate it. Would love to understand more details about how these viruses work.

Just an update, after a couple of hours of having resource monitor up and sorting by average CPU, I am not seeing anything suspicious at the top so I think we may be all set! Perfmon, taskmgr and WmiPrvSE are at the top, so looks normal.

Haven’t seen any more warnings from MBAM either. ;D

Perusing your logs, I see no infection currently present in your system. Unless you are having any issue(s), the machine appears to be Malware-free as we speak.


:clubs: Removal of Tools and Quarantined Files :clubs:


Despite the tools we have used are clean, they are powerful removal tools and made in a way so that they carry out any commands given to them without (most cases) asking for a confirmation. In the hands of an inept person, they can make the machine un-bootable – a scenario we do not wish to see. Also, we need to remove the quarantined files/folders from your system as a dormant malware can be as bad as an active one if given the proper environment. I shall now give you the guidelines to remove the tools and the quarantined files from your system.

[*]Cleanup with Delfix
Please download DelFix by Xplode to your Desktop.
Download Link
[*]Double-click to run the program;
[list][*]Note: Windows Vista/7/8 users right-click and choose Run as administrator[*]Make sure that all the boxes are checked;
[*]Click Run;
[*]A log will be opened after the operation is finished;
[*]Copy and Paste it in your next reply[/list]


:clubs: Prevention and Future Guidelines :clubs:


Prevention is better than cure – goes the old saying. As much as we love to see you visit our site, we do not want to see you having your PC infected by malwares again.

[*]Keep Windows up-to-date.
It is extremely important that you keep your operating system (Windows) updated when updates are made available. It is set to alert you, so be sure not to ignore these notices and to allow the updates to install. Many of these are critical security packages which could very possibly be the difference between your picking up a future infiltration and simply passing right by it unharmed.
[*]Run antivirus software and keep it up-to-date, too.
Antivirus software is your safety net if all other protections fail. The first line of defense is smart computing, of course, but everyone needs a backup. Once they’re installed, check periodically to ensure they have been successfully updating as well. An out-of-date antivirus is not a happy antivirus!
[*]Keep your web browser plugins and other programs updated also.
This tip is rarely shared by technicians and its importance is not widely recognized, but it’s absolutely critical. Programs such as Java, Adobe Flash Player and Adobe Reader, Internet Explorer, and myriad other such web-exposed items are deeply vulnerable to attack, which can quickly lead to a hopelessly infected system no matter what protection you currently have installed. The reason is that these programs are ubiquitous, but are also not perfect and are extremely complex… and as such, security vulnerabilities are discovered and exploited by hackers hoping to gain control over your machine. By performing every update for these programs as soon as it’s made available, you will greatly reduce your exposure to dangerous internet threats.

A great way to do this is to install the Filehippo Update Checker and run it regularly. Also, try not to ignore any notifications you receive regarding updates to programs already installed on your PC.

No scripts is an excellent security device too. I like it but it is not for everyone because it requires you to take action if you want to see some things (pop ups, banners etc.) on sites you visit.

Download NoSript by Giorgio Maone.

Note: Sometimes you will get a site telling you that you need to install Java when actually all you need to do is enable the site through the no script icon down on the right hand side of your computer.

[*]Watch out for new threat named CryptoLocker
CryptoLocker is a new type ransomware family malware that encrypts your important files and asks for a ransom to decrypt them. At the moment of posting this reply there are no tools that can undo the havoc this malware causes. We can help you to remove the malware from your system but the files that was encrypted cannot be recovered without the decryption key. So, I ask for your forbearance and practice constant vigilance. Please read the following article to acknowledge yourself about the safety measures.
How to prevent your computer from becoming infected by CryptoLocker.

[*]And last of all, surf smart.
It doesn’t matter how well the autopilot system works if the pilot keeps flying the plane into mountain ranges. Don’t forget that no matter how much you have protecting yourself, your security ultimately begins and ends with you. Don’t visit dangerous or questionable web sites, avoid suspicious links on Facebook and emails/email attachments you’re unsure about, and just generally keep your wits about you, and you’ll be much safer. Also, avoid illegal downloads, cracks, “warez”, and all other too-good-to-be-true internet offerings: they’re typically laden with malware. Be smart and you can avoid most threats lurking about the darker corners of the internet! And for even more tips, see our article, How Did I Get Infected in the First Place?

My help is free but if you feel like making my day you may donate any amount you wish by clicking the ‘donate’ button. I really appreciate your kindness.

https://www.paypalobjects.com/en_US/i/btn/btn_donate_SM.gif

Regards,
Valinorum

Thanks, I ran delfix and it removed everything successfully. Failed to copy the log before I closed it so I have nothing to paste here… sorry. Didn’t realize it would go away upon closing :slight_smile:

Surf safely. :slight_smile: