S.O.S. -- log, log, log

Discussion in 'Malware Help (A Specialist Will Reply)' started by marysmail, Jun 28, 2007.

  1. marysmail

    marysmail Private E-2

    hey guys... i'm working on a new computer and apparently, it's got a trojan or something...

    just finished all the steps and i'm attaching my logs to see if you could help me...

    thanks!

    Mar.-
     

    Attached Files:

  2. marysmail

    marysmail Private E-2

    for the past half hour i've been trying to attach the RunKeys and ShowNew logs, but it won't let me... i'll try in a while... but if needed, i have them... M.-
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You also need to attach the log from BitDefender Online scan requested in step 6 of the READ ME.

    Yes we need them so we can get started. Try again! Make sure you watch for any messages in the Manage Attachments window. The messages are not always so obvious. If necessary, put them into a ZIP file and attach the ZIP.

    You should also run this WareOut Removal and attach the log from it too.

    Question: Do you recognize any of the below services? The all look like malware to me. Possible a Trojan named Ceda.


    O23 - Service: Administración de aplicaciones AppMgmt Service (AppMgmt Service) - Unknown owner - C:\WINDOWS\system32\adsndsxd.exe
    O23 - Service: Audio de Windows AudioSrvWmi (AudioSrvWmi) - Unknown owner - C:\WINDOWS\system32\actmovied.exe (file missing)
    O23 - Service: Iniciador de procesos de servidor DCOM DcomLaunchdmadmin (DcomLaunchdmadmin) - Unknown owner - C:\WINDOWS\system32\3com_dmidt.exe (file missing)
    O23 - Service: Servicio del iPod (iPod Service) - Apple Inc. - C:\Archivos de programa\iPod\bin\iPodService.exe
    O23 - Service: Estación de trabajo lanmanworkstationERSvc (lanmanworkstationERSvc) - Unknown owner - C:\WINDOWS\system32\advpackd.exe
    O23 - Service: Windows Installer MSIServerWebClient (MSIServerWebClient) - Unknown owner - C:\WINDOWS\system32\admparsef.exe (file missing)
    O23 - Service: Administrador de conexión automática de acceso remoto RasAutoseclogon (RasAutoseclogon) - Unknown owner - C:\WINDOWS\system32\a3dr.exe (file missing)
    O23 - Service: Administrador de conexión automática de acceso remoto RasAutoseclogon RasAutoseclogonxmlprov (RasAutoseclogonxmlprov) - Unknown owner - C:\WINDOWS\system32\adsnwr.exe (file missing)
    O23 - Service: Inicio de sesión secundario seclogonEventSystem (seclogonEventSystem) - Unknown owner - C:\WINDOWS\system32\3com_dmid.exe (file missing)
    O23 - Service: Inicio de sesión secundario seclogonFastUserSwitchingCompatibility (seclogonFastUserSwitchingCompatibility) - Unknown owner - C:\WINDOWS\system32\admparseb.exe (file missing)
    O23 - Service: Registros y alertas de rendimiento SysmonLogBITS (SysmonLogBITS) - Unknown owner - C:\WINDOWS\system32\advapi32j.exe (file missing)
    O23 - Service: Temas ThemesNVSvc (ThemesNVSvc) - Unknown owner - C:\WINDOWS\system32\acctresl.exe (file missing)
    O23 - Service: Cliente de seguimiento de vinculos distribuidos TrkWksSwPrv (TrkWksSwPrv) - Unknown owner - C:\WINDOWS\system32\12520850n.exe (file missing)
    O23 - Service: Host de dispositivo Plug and Play universal upnphostEventlog (upnphostEventlog) - Unknown owner - C:\WINDOWS\system32\adsndsx.exe (file missing)
    O23 - Service: Instrumental de administración de Windows winmgmtDnscache (winmgmtDnscache) - Unknown owner - C:\WINDOWS\system32\actmovief.exe
     
  4. marysmail

    marysmail Private E-2

    eeeh!! i finally could attach the logs (zipped).

    besides from the iPod file... i don't recognize any of the files you posted.. and most of them say "file missing" ...should that be like that?

    i could not make bitdefender work, even after accepting and later disabeling the activex and everything... but i'll try again AND I'll run the WareOut Removal first thing in the morning when i get to that pc.


    thanks for your time, C.

    Mar.-
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You cannot always believe HijackThis when it says a file is missing. It has quite a few bugs and this is one of them. Sometimes the files are not really missing. However since some of these appear to be malware. I'm not really positive though due to the language difference. I don't want to start deleting these services is you need them for something. Are you absolutely sure that you don't know what any of these are for? Perhaps you should explain in a lot more detail what your malware problems are so that we can better decide what to do.


    You do need to uninstall this Messenger Plus! Live as requested in the READ ME. This is the cause of tens of thousands of people being infected with malware. Most recently it has been associated with people getting Virtumonde infections. Uninstall it now.
     
    Last edited: Jun 29, 2007
  6. marysmail

    marysmail Private E-2

    ok... msn plus is a goner then.

    i don´t recognize those files... for example: "Inicio de sesión secundario seclogonEventSystem"---> secondary session start seclogon Ev.. most don't make sense to me...

    the really important thing on that pc to the owner is that i don't mess around with his stupid World Of Warcraft... other than that, i can delete whatever i want... and there aren't many programs there either besides Win Office.

    i keep getting messages about one or more trojans on that pc... they're not keeping me awake, but i don't like the idea of them being around...
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    What program is giving you the messages and exactly what does it say?
     
  8. marysmail

    marysmail Private E-2

    there's no exact program that gives me the messages about the trojans. sometimes when trying to on log to my hotmail account or maybe just the antivirus guard make the "trojan messages" pop up.

    but nothing has come up for the past few days. maybe i cleaned it when running the whole "read & run me first" thing?

    if you haven't seen anything that caught your attention, maybe there's nothing there and i'm just wasting your time.... i reallly don't know... either way, thanks for your time, C.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You still need to run the WareOut Removal procedure I requested in message # 3 and then attach the log.

    Let's remove some of those unknown services and see what happens.
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Administrador de conexión automática de acceso remoto RasAutoseclogon
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now repeat the above to Stop and Disable the below two Services (if you do not find them or get any errors, just continue):
      • Administrador de conexión automática de acceso remoto RasAutoseclogon RasAutoseclogonxmlprov
      • Registros y alertas de rendimiento SysmonLogBITS
      • Temas ThemesNVSvc
      • Cliente de seguimiento de vinculos distribuidos TrkWksSwPrv
      • Audio de Windows AudioSrvWmi
      • Estación de trabajo lanmanworkstationERSvc
      • Instrumental de administración de Windows winmgmtDnscache
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste RasAutoseclogon into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now repeat the above to delete the below two Services (if you do not find them or get any errors, just continue):
      • RasAutoseclogonxmlprov
      • SysmonLogBITS
      • ThemesNVSvc
      • TrkWksSwPrv
      • AudioSrvWmi
      • lanmanworkstationERSvc
      • winmgmtDnscache
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://85.255.113.67/privacyWarning.php
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it
    double click it and allow it to merge with the registry.
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  10. marysmail

    marysmail Private E-2

    here's the log... sorry for the delay.

    i'm off to deleting all those things you said. i'll let you know if anything happens in a bit. thanks.
     

    Attached Files:

  11. marysmail

    marysmail Private E-2

    ok... I'm attaching the himqbiu.txt whick is the log HJT made, is that correct? And the NewFiles and RunKeys logs are the old ones. Or should I run them again? Sorry, got a bit lost.

    Besides that, I found all the files you named and deleted everything.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! All I needed the C:\avenger.txt log that was requested. But it appears that you receive an error while trying to run Avenger.

    You were not supposed to delete anything yourself. I wanted Avenger to be used to delete files because it would create backups incase the files are needed.

    No! I asked for new logs. Also I need a new HJT log.
     
  13. marysmail

    marysmail Private E-2

    i meant i let HJT do whatever it does...

    here are the new logs. i had to zip them, other way i get error messages when trying to upload the newfiles and the getkeys logs. + the avenger log.
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    So how are things working?

    I think we should remove those other services too since they were not in a previous HJT log you posted earlier in June.
     
  15. marysmail

    marysmail Private E-2

    everything seems to be working fine.

    you mean all the "023" services?
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The only ones I don't like are the below ones:

    These were all new since your earlier post in the malware forum and really thing we should fix this especially if you are sure you have no idea what they are for.
     
  17. marysmail

    marysmail Private E-2

    i don't recognize them, don't know what they are.

    should i take the same steps i did before? (i mean the services.msc, looking them up and disabling them and then going to HJT, etc?)
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Administración de aplicaciones AppMgmt Service
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now repeat the above to Stop and Disable the below two Services (if you do not find them or get any errors, just continue):
      • Iniciador de procesos de servidor DCOM DcomLaunchdmadmin
      • Windows Installer MSIServerWebClient
      • Inicio de sesión secundario seclogonEventSystem
      • Inicio de sesión secundario seclogonFastUserSwitchingCompatibility
      • Host de dispositivo Plug and Play universal upnphostEventlog
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste AppMgmt Service into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now repeat the above to delete the below two Services (if you do not find them or get any errors, just continue):
      • DcomLaunchdmadmin
      • MSIServerWebClient
      • seclogonEventSystem
      • seclogonFastUserSwitchingCompatibility
      • upnphostEventlog
    • Now exit HJT and reboot

    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  19. marysmail

    marysmail Private E-2

    i found all the files you named.

    i'm attaching the 3 logs.


    i haven't used it much still, but everything seems to be working just fine.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, C:\WINDOWS\nircmd.exe, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  21. marysmail

    marysmail Private E-2

    Done!

    Thanks C. for taking the time to help... and for standing up with me...

    Have a great day,

    Mar.-
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds