Command.exe & Multidropper and maybe others: Please Help

Discussion in 'Malware Help (A Specialist Will Reply)' started by Ronald_Young_At_RCAT, Jun 28, 2006.

  1. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Hi, I have never posted on a forum like this before, but I have recently got some viruses and spyware that I can't get rid of. I am usually good at preventing Malware to appear in my system and the stuff I have had before was fairly easy to get rid of, either by using programs such as Spybot or just by Googling around for solutions. Recently however, I have multiple viruses and spyware that I can't get rid of.

    I am going to paste my Hijackthis log and also the Pandasodt Activescan log

    Edit: Removed Inline log

    I have tried one other forum but no one bothered to help me.

    Hope you can help. Thank you.
     
    Last edited by a moderator: Jun 28, 2006
  2. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Hi and Welcome,

    We will endevour to help you rid your PC of this infestation but to proceed please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, running, and posting HijackThis logs as attachments.

    - Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support

    Make sure you check version numbers and get all updates.


    After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:

    Downloading, Installing, and Running HijackThis


    When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too (these scans are covered in steps 6 & 7 of the READ & RUN ME sticky)
    • Bitdefender
    • Panda Scan
    • HijackThis


    Please do take note of the instructions for installing and running HijackThis they are crucial steps to take.
     
  3. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Sorry for the long delay, I appreciate your attempt to help me but I've had a couple of problems.

    I can't run the Pandasoft online scan. I've tried on a few separate occasions and it keeps saying it's going to take over 75 hours to complete. I tried running in safe mode (which somebody on a different forum suggested to do) and I can't access the Internet even though I chose 'Safe Mode With Networking'.

    I've done everything else you asked but can you assist me without the Pandasoft information?

    Thanks.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! But did you run Bitdefender and save a log. I thought you originally posted your Panda log. Perhaps you meant to say that Bitdefender was going to take 75 hours and not Panda.

    Complete the instructions in step 7 of the READ ME and attach a new HJT log.
     
  5. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    I'm sorry, yes I meant the Bitdefender was the one I couldn't get to work, I got confused.

    Anyway, I have attached my Hijack This log.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your HJT log is clean. The only problems you show were in your Panda log.

    Boot into safe mode and use Windows Explorer to delete the below:

    C:\Program Files\Common Files\fzrm <--- the whole folder
    C:\Program Files\Common Files\System\EService <--- the whole folder
    C:\Program Files\Common Files\Microsoft Shared\MSInfo\cservice.exe
    C:\Program Files\Mozilla Firefox\plugins\npclntax.dll
    C:\WINDOWS\drddjh.exe
    C:\WINDOWS\drsmartload849a.exe
    C:\WINDOWS\Sk9OQVRIRU4gVElMQlJPT0s\m46ikplKlob0pH5gk5LjnXP.vbs
    C:\WINDOWS\system32\cmd.dll
     
  7. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Thank you for your reply. I have followed all the steps. However, there was no such file as drsmartload849a.exe or m46ikplKlob0pH5gk5LjnXP.vbs so I obviously couldn't remove those two.

    Plus Spybot is still finding Command Service when it scans for spyware. I have checked the folders and both cmd.dll and cservice.exe have stayed deleted.

    Is Spybot wrong or is there still a threat?

    Thanks again.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    This is an issue that Spybot finds but cannot clean for some reason. We typical need to edit the registry to fix this. Sometimes we can give you a patch that will work other time we will actual have you go into the registry to take ownership of registry keys so the malware can be removed. Let's see what you have! Attach a log from Spybot and we will go from there.
     
  9. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    I'm sorry but I don't know how to save a log in Spybot. I couldn't find the option.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    In the top menu Click Mode and select Advanced Mode.

    Then in the left column click the + next to Tools

    Then click View Report

    Then in the menu bar of the right pane click View previous report

    Then in the window that comes up select the log from your last run of Spybot. Just keep selecting one of the .txt or .log files until you locate one that has the info about command service in it! You can either copy and paste it from your Spybot window or you can select export to save it to another filename. This normally defaults to SpybotSD.Report.txt

    Either way (export to file or copy & paste) get me the log!
     
  11. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Thanks again for the reply.

    I have looked around and Spybot has never made any logs. I have clicked to view previous report and there are no logs.

    Any ideas?
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Then, let's create a new one! First, run a scan and fix with Spybot.

    When it finishes the scan, right click in the log windows and select Save full report to file. The default file name is SpybotSD.Results.txt and by default it will save it in Spybot's own log folder. You can save it anywhere you like to make it easy to find so you can upload it.
     
  13. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Wow! right click the window to find it. They couldn't have made the option to save logs more hidden if they tried.:)

    Anyway, thank you so much for all your help chaslang. I really appreciate all the effort you are going to to help me.

    I have attached my Spybot log (sorry for all the games junk in there, I have bought and installed hundreds of games over the years).
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You need to uninstall the below rogue tool!

    ScanSpyware v3.8.0.1


    The below fix for CmdService may or may not work but it is the simplier fix if it does. So let's try it first and see if it goes away.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
     
  15. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Hi, I uninstalled that ScanSpyware, and did the registry editing but Spybot is still displaying Command Service. I didn't restart after the fixme.reg, should I have done? I stil think Command Service is still on my machine though.
     
  16. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    OK I restarted and it's still there.
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That means that your registry has been modified so that you do not have permission to change the registry keys!

    Download and Install Registrar Lite

    Run Registrar Lite navigate to the following keys and take ownership of them (explained further down):

    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\cmdService
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdService
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cmdService

    To take ownership of teh key do the following:
    • Copy & Paste one registry key from above into the address bar of Registrar Lite and hit the enter key. This will bring you to the regitry key.
    • Click-on Security in the Menu
    • Select Take Ownership
    • Now right click on the registry key and select delete
    • Repeat for all three registry keys
    • Tell me the results. Any errors?
     
  18. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Hi, I followed all your steps but there was an error when trying to delete the final one.

    What should I do now? Should I try again in safe mode?

    Thanks
     
  19. Shadow_Puter_Dude

    Shadow_Puter_Dude MG Authorized Malware Fighter

    What was the error?
     
  20. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    I think it was in use and couldn't be deleted.
     
  21. Shadow_Puter_Dude

    Shadow_Puter_Dude MG Authorized Malware Fighter

    GIve me a fresh HijackThis log.
     
  22. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Here you are.
     

    Attached Files:

  23. Shadow_Puter_Dude

    Shadow_Puter_Dude MG Authorized Malware Fighter

    Download
    - Registry Search Tool

    Unzip to your Desktop and double click on regsrch.vbs
    (if you have script protection, please allow this to run)

    In the dialog that opens enter the following:

    Press 'OK'

    The search will run for a while then alert you when it is finished.

    Press 'OK' and copy the contents of the WordPad window and post in this thread
     
  24. Ronald_Young_At_RCAT

    Ronald_Young_At_RCAT Private E-2

    Sorry for the long delay in replying.

    Here it is:

    Edit by bjgarrick: Inline log attached!
     

    Attached Files:

    Last edited by a moderator: Aug 6, 2006
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay there were more registry keys than Spybot revealed. Try the below.

    Run Registrar Lite navigate to the following keys and take ownership of them (explained further down):


    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\cmdService]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE]

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\cmdService]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_CMDSERVICE]

    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\cmdService]
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_CMDSERVICE]

    To take ownership of teh key do the following:
    • Copy & Paste one registry key from above into the address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the Menu
    • Select Take Ownership
    • Now right click on the registry key and select delete
    • Repeat for all three registry keys
    • Tell me the results. Any errors??? If so, make sure you tell me the exact error message and exactly on which keys it occurs.
    • Then if there was an error, boot into safe mode and retry all of the above.
    • Again keep track of errors and give a report of the results.
    After trying the above, come back and let us know the results.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds