Malware logs

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by TELME, Sep 25, 2014.

  1. TELME

    TELME Private E-2

    Hi Guys,

    I have been experiencing some sluggishness, and activity on screen that I did not initiate, as well as changes in start up and shut down. I feel my computer is being remotely accessed or hijacked somehow.

    Thanks in advance for any help!
     

    Attached Files:

  2. TELME

    TELME Private E-2

    There is also a tiny icon on the desktop that appeared from out of nowhere. I can't capture a screenshot of it, but it's like a little football shaped bug w/ 6 partitions. It's very small, and blends in w the background.
     
  3. TELME

    TELME Private E-2

    Sorry for multiple posts, but I just remembered that in pc settings/ network/ workplace there is an option to turn on device manager so that the IT admin can manage device that I continually turn off and yet it always is on when I check again.
     
  4. TELME

    TELME Private E-2

    Re: Malware logs/Trojan.Gen@2@1

    I alos saw this on Comodo, and am concerned that it is a false positive, but not sure. Can someone have a look and help me out?
     
  5. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Re: Malware logs/Trojan.Gen@2@1

    Are you referring to Trojan.Gen@2@1? What filename and pathway is being detected?
    I'm not sure that is malware related.

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    • O2 - BHO: (no name) - {9D974C8C-6D92-44FB-BEAF-B45A1C0CF17F} - (no file)

    After clicking Fix, exit HJT.

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of the code box
    Code:
    :Files
    C:\ProgramData\Adtrustmedia
    C:\Program Files (x86)\AdTrustMedia
    C:\Windows\0
    C:\Windows\Temp\*.*
    C:\Users\Te'\AppData\Local\Temp\*.*
    :Reg
    [-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4AA46D49-459F-4358-B4D1-169048547C23}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Make sure to shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Next download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
    • Now click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • Look over the log especially under Files/Folders for any program you want to save.
    • If there's a program you may want to save, just uncheck it from AdwCleaner.
    • If you're not sure, post the log for review. (all items found are either adware/spyware/foistware)
    • If you're ready to clean it all up.....click the Clean button.
    • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
    • Attach that logfile to your next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which are created when running the tool.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    • C:\MGlogs.zip
    • AdwCleaner[R#].txt
    Make sure you tell me how things are working now!
     
  6. TELME

    TELME Private E-2

    This is really HijackThis (select Do a system scan only) and select the following lines

    Hi, I don't see how to do this. Where do I select scan option from? I only have the program on the desktop, as it would not allow me to download to c.
     
  7. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    This HijackThis Tutorial gives screen captures of the GUI's I spoke of.
    Your logs from the initial run of MGTools.exe shows that you do have the C:\MGtools folder....open that folder, locate analyse.exe and follow the instructions I gave.
     
  8. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    rolleyes

    re: Turn off device management for IT admin in windows 8
    So, this is a business machine? Also answer my other question -
     
  9. TELME

    TELME Private E-2

    I FIGURED out how to run the program, but I finished the first 2 steps the hijacker intercepted my ability to complete the rest. Do you have any sugges if not connected to the internet. Any suggestions??________tions that would allow me to get around this? He is disconnecting me from the servers, as well as blocking me from downloading and running programs. He can tell when the computer is on even if not connected to the internet.
     
  10. TELME

    TELME Private E-2

    It won't allow me to open. It was saying I didn't have admin rights. I pasted it in the browser and then followed the instructions. Was that as good? This about the hijack this analyzer issue.
     
  11. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You answered none of my questions!
    Who is "he"?
     
  12. TELME

    TELME Private E-2

    Sorry about crazy msg. I'm having tech difficulties. I was saying I couldn't finish the steps and would appreciate any suggestions you have. He is blocking things and controlling my computer. Even w/o being on the internet he is still there bothering things. I think he uses some kind of boot merge, and that is why I was asking about turning off IT admin device management. I am using someone else's device for this msg.
     
  13. TELME

    TELME Private E-2

    HE is the person that is hacking into my comp. You have to forgive me, as I am having a hard time reading and responding, because I am not on my computer.
     
  14. TELME

    TELME Private E-2

    As far as Trojan gen thing, I don't know. I saw it on comodo but it was gone before I could see it good.
     
  15. TELME

    TELME Private E-2

    Thanks Dr. Moriarty for your help, I have performed the steps and attached the logs, per your request. Unfortunately I received an error message (invalid file) and was unable to upload the get logs bat file. I can't say for sure if everything is okay or not. I will post back if I see any curious activity. Thanks again!
     

    Attached Files:

  16. TELME

    TELME Private E-2

    I am sorry, I didn't even see this. No, this is not a business machine. This is my personal computer. This feature is in Windows 8.1. I think it allows you to connect with your workplace if you choose. This is inapplicable to me. I notice it is turning on where it says automatically detect server address. I was trying to turn it off permanently, as I worry it is an open door to a hacker.
     
  17. TELME

    TELME Private E-2

    your logs from the initial run of MGTools.exe shows that you do have the C:\MGtools folder....open that folder, locate analyse.exe and follow the instructions I gave.[/QUOTE]

    I was unable to access these prior to running the steps.you outlined.
     
  18. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hello, TELME - you're welcome.
    No, you can't upload that file format type as an attachment. Below is exactly how I want you to produce the MGlogs.zip file.
    Please attach the MGlogs.zip file to your next reply.
     
  19. TELME

    TELME Private E-2

    I am so sorry, I'm not normally this goofy!
     

    Attached Files:

  20. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    No worries!

    I'll review the latest logs and post back late tonight.
     
  21. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Everything is looking good sofar.

    Now run the following online scan - please be patient as it can take over 1 hour to complete.
    Using ESET's Online Scanner


    Attach the ESETScan.txt log, please
     
  22. TELME

    TELME Private E-2

    Thanks, I've been experiencing lots of freezing and hangs, as well as programs not closing. Everything is going slower than usual. I am not sure that means anything though. Anyway I'll look for your observations tomorrow.
     
  23. TELME

    TELME Private E-2

    Hi Dr. Moriarty, I ran the scan and it took almost 2 hours, now it is frozen. What do I do? It says 100 percent complete, it found a threat that is listed twice (Win32prcview) and the sign says scan in process step 3 of 4, but no movement.
     
  24. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hi!

    Wait awhile longer (maybe 1/2hr) for it to finish and produce a log.
     
  25. TELME

    TELME Private E-2

    Hi, I waited as long as I could, then I had to go. I ran it today and I didn't have an option to export txt file. It also no longer showed a threat. The only thing in the list of quarantined items was MGItools.
     
  26. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    :) How is the machine running, now that is clean?
     
  27. TELME

    TELME Private E-2

    Thanx Dr. Moriarty! I can"t say right now, but I will let you know.
     
  28. TELME

    TELME Private E-2

    I copied the C\Windows\Sys WOW64\lookup.exe files to the desktop and suddenly the screen started flashing and the icons disappeared and reappeared three times. Then desktop got really small and went back to it's normal appearance. I was looking there, because spy shelter added something in there to the blacklist and I saw something about malware associated with it.

    I also found the file you were asking about. It was the CloudscannerTrojanGen@2@1
    C/program files x86openoffice4\program\office.bin. I already uninstalled the program, but the file was quarantined in Comodo.

    I was wondering if the ESET scan deleted the threat it found even though it froze and didn't complete properly.
     
  29. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    I don't understand why you copied a system file to your desktop.
    "SpyShelter finding something and I saw something about malware" gives me no useful information.

    If there had been a keylogger present I think ESET would have found it, since you ran it twice.
    You can find several more online scanning tools listed in the thread Alternative Scans to run if you want.

    __________________________

    It is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase it, it provide no protection. It do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. Go back to step 6 of the READ ME and re-enable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista, Win 7/8 - it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7/8, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work through the below link:
    Safe surfing! [​IMG]
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds