Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

possible spyware or rootkit infection


  • This topic is locked This topic is locked
2 replies to this topic

#1 Elemental

Elemental

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:06 PM

Posted 26 April 2010 - 03:54 AM

Thanks in advance! this could get messy smile.gif

Hey guys, I'm a pretty avid gamer, and I'm getting some problems that are seriously troubling.

I play professionally so I do have a target painted.

By far the most troubling issue was what appeared to be remote input.

I believe there are a couple of script kiddies mucking around, due to the occasional mid-game firewall alert.

I'm not a network security expert so I'd like to run some logs past the pro's smile.gif

Tried Avast (commercial), GMER, SpyBot, MalwareBytes, HJT...

If there is something there i'm missing it.

My USB devices were infected a couple of formats ago with one of the Virtumonde (iirc) but were cleaned with a combination of ComboFix etc, since when I have not seen a single alert.

But! recently when I used a USB stick to transfer some files between home and work, the virus was detected on the usb stick (work has Sophos ^.^).

I believe all of my client side protection has been compromised.

Also had to boot up linux to download some applications from the internet without them corrupting. May just be a Google Chrome issue.

Computer Information:
i7 920, windows 7 32bit, Avast Commercial and ZoneAlarm Commercial.
Browser is Google Chrome, Mail is Windows Live Mail.

I will provide more information via PM

(edit: dllhost.exe cloaks itself in the task manager as well, but I'm unsure as to whether that is by design ;)

Going to go run DDS and GMER, i'll whack the logs up as soon as they finish.

NOTE: Ark.txt ended up being over 500kb, is there another way I can get it to your people?
Added as Ark.zip

-------------------------------------------------------------------------------------------
DDS.txt
-------------------------------------------------------------------------------------------


DDS (Ver_10-03-17.01) - NTFSx86
Run by Me at 19:50:30.16 on Mon 26/04/2010
Internet Explorer: 8.0.7600.16385
Microsoft Windows 7 Home Premium 6.1.7600.0.1252.61.1033.18.3063.2031 [GMT 10:00]


============== Running Processes ===============

C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\nvvsvc.exe
C:\Windows\System32\ZoneLabs\vsmon.exe
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\AEADISRV.EXE
C:\Windows\System32\ASDR.exe
C:\Program Files\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\ThreatFire\TFService.exe
C:\Windows\system32\vssvc.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Analog Devices\Core\smax4pnp.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\ThreatFire\TFTray.exe
C:\Program Files\NetWorx\networx.exe
C:\Windows\system32\WUDFHost.exe
C:\Program Files\ASUS\SmartDoctor\SmartDoctor.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\taskeng.exe
C:\Program Files\DAEMON Tools Lite\DTLite.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Users\Dave\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Dave\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\SearchFilterHost.exe
\\?\C:\Windows\system32\wbem\WMIADAP.EXE
C:\Windows\system32\wbem\wmiprvse.exe
C:\Users\Dave\Documents\Downloads\dds.scr
C:\Windows\system32\conhost.exe

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com.au/
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: Windows Live Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
TB: &NetWorx Desk Band: {feea54b4-d80f-41c7-87b9-dc08e6d3255f} - c:\progra~1\networx\deskband.dll
TB: {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - No File
uRun: [Steam] "c:\program files\steam\steam.exe" -silent
uRun: [Google Update] "c:\users\dave\appdata\local\google\update\GoogleUpdate.exe" /c
uRun: [DAEMON Tools Lite] "c:\program files\daemon tools lite\DTLite.exe" -autorun
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [ZoneAlarm Client] "c:\program files\zone labs\zonealarm\zlclient.exe"
mRun: [ThreatFire] c:\program files\threatfire\TFTray.exe
mRun: [NetWorx] "c:\program files\networx\networx.exe" /auto
mPolicies-system: ConsentPromptBehaviorAdmin = 5 (0x5)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: {BCC376DA-1DC1-4AE7-907A-97A140B093B9} = 61.9.133.193,61.9.134.49
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: LBTWlgn - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll

============= SERVICES / DRIVERS ===============

R0 TfFsMon;TfFsMon;c:\windows\system32\drivers\TfFsMon.sys [2010-4-26 51984]
R0 TfSysMon;TfSysMon;c:\windows\system32\drivers\TfSysMon.sys [2010-4-26 59664]
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2010-4-20 297552]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2010-4-20 162768]
R1 PSSDK42;PSSDK42;c:\windows\system32\drivers\pssdk42.sys [2010-4-26 38976]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2010-4-20 19024]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-4-20 51792]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2010-4-20 40384]
R2 cpuz133;cpuz133;c:\windows\system32\drivers\cpuz133_x32.sys [2010-4-9 20968]
R2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files\nvidia corporation\3d vision\nvSCPAPISvr.exe [2010-4-3 240232]
R2 ThreatFire;ThreatFire;c:\program files\threatfire\tfservice.exe service --> c:\program files\threatfire\TFService.exe service [?]
R3 avast! Mail Scanner;avast! Mail Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-4-20 40384]
R3 avast! Web Scanner;avast! Web Scanner;c:\program files\alwil software\avast5\AvastSvc.exe [2010-4-20 40384]
R3 TfNetMon;TfNetMon;c:\windows\system32\drivers\TfNetMon.sys [2010-4-26 33552]
R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\drivers\yk62x86.sys [2009-9-28 315392]
S2 gupdate;Google Update Service (gupdate);c:\program files\google\update\GoogleUpdate.exe [2010-3-30 136176]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-14 229888]
S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2010-2-27 1343400]

=============== Created Last 30 ================

2010-04-26 08:01:42 38976 ----a-w- c:\windows\system32\drivers\pssdk42.sys
2010-04-26 08:01:32 0 d-----w- c:\programdata\SoftPerfect
2010-04-26 08:01:32 0 d-----w- c:\program files\NetWorx
2010-04-26 07:00:06 0 d-sh--w- C:\$RECYCLE.BIN
2010-04-26 05:06:32 77312 ----a-w- c:\windows\MBR.exe
2010-04-26 05:06:32 261632 ----a-w- c:\windows\PEV.exe
2010-04-26 05:06:31 98816 ----a-w- c:\windows\sed.exe
2010-04-26 05:06:31 161792 ----a-w- c:\windows\SWREG.exe
2010-04-26 04:51:30 0 d-----w- c:\program files\SpywareBlaster
2010-04-26 04:31:11 59664 ----a-w- c:\windows\system32\drivers\TfSysMon.sys
2010-04-26 04:31:11 51984 ----a-w- c:\windows\system32\drivers\TfFsMon.sys
2010-04-26 04:31:11 33552 ----a-w- c:\windows\system32\drivers\TfNetMon.sys
2010-04-26 04:31:10 0 d-----w- c:\program files\ThreatFire
2010-04-26 04:25:28 0 d-----w- c:\programdata\PC Tools
2010-04-21 14:18:28 0 d-----w- c:\windows\system32\BattleHQ
2010-04-21 14:14:41 0 d-----w- c:\windows\Close Combat The Longest Day
2010-04-21 14:14:41 0 d-----w- C:\Matrix Games
2010-04-20 12:47:45 0 d-----w- c:\program files\dumps
2010-04-20 12:29:24 0 d-----w- c:\program files\Zone Labs
2010-04-20 12:25:17 297552 ----a-w- c:\windows\system32\drivers\aswSnx.sys
2010-04-20 12:25:12 51792 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
2010-04-19 08:39:26 0 d-----w- c:\program files\Microsoft Games
2010-04-19 08:34:48 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2010-04-19 08:34:30 0 d-----w- c:\program files\DAEMON Tools Lite
2010-04-19 05:46:11 0 d-----w- c:\program files\Elaborate Bytes
2010-04-19 05:08:49 0 d-----w- c:\users\dave\appdata\roaming\DAEMON Tools Lite
2010-04-19 05:08:42 0 d-----w- c:\programdata\DAEMON Tools Lite
2010-04-18 15:18:03 0 d-----w- c:\users\dave\appdata\roaming\BitTorrent
2010-04-14 17:20:49 427520 ----a-w- c:\windows\system32\vbscript.dll
2010-04-14 17:20:49 3954568 ----a-w- c:\windows\system32\ntkrnlpa.exe
2010-04-14 17:20:49 3899280 ----a-w- c:\windows\system32\ntoskrnl.exe
2010-04-14 17:20:45 95744 ----a-w- c:\windows\system32\drivers\mrxsmb20.sys
2010-04-14 17:20:45 221696 ----a-w- c:\windows\system32\drivers\mrxsmb10.sys
2010-04-14 17:20:45 123392 ----a-w- c:\windows\system32\drivers\mrxsmb.sys
2010-04-14 04:37:03 172032 ----a-w- c:\windows\system32\wintrust.dll
2010-04-14 04:37:03 132608 ----a-w- c:\windows\system32\cabview.dll
2010-04-09 13:59:10 11832 ----a-w- c:\windows\system32\drivers\AsInsHelp64.sys
2010-04-09 13:59:10 10216 ----a-w- c:\windows\system32\drivers\AsInsHelp32.sys
2010-04-09 13:59:07 1769 ----a-w- c:\windows\Language_trs.ini
2010-04-09 13:57:06 24576 ----a-w- c:\windows\system32\AsIO.dll
2010-04-09 13:57:06 11296 ----a-w- c:\windows\system32\drivers\AsIO.sys
2010-04-09 13:44:36 20968 ----a-w- c:\windows\system32\drivers\cpuz133_x32.sys
2010-04-09 13:44:36 0 d-----w- c:\program files\CPUID
2010-04-09 13:43:26 0 d-----w- c:\programdata\SonicFocus
2010-04-09 13:43:21 0 d-----w- c:\program files\Analog Devices
2010-04-09 13:36:33 215656 ----a-w- c:\windows\system32\nvcod1910.dll
2010-04-09 11:56:28 0 d-----w- c:\program files\MSXML 4.0
2010-04-08 13:56:38 2297552 ----a-w- c:\windows\system32\d3dx9_26.dll
2010-04-08 12:17:44 0 d-----w- c:\programdata\Sophos
2010-04-08 11:53:42 0 d-----w- C:\stdtsa
2010-04-08 10:17:42 0 d-----w- c:\programdata\EA Logs
2010-04-06 02:11:12 0 d--h--w- c:\programdata\CanonIJScan
2010-04-06 02:02:32 0 d-----w- c:\program files\Canon
2010-04-03 08:27:00 985704 ----a-w- c:\windows\system32\nvsvc.dll
2010-04-03 08:27:00 13683816 ----a-w- c:\windows\system32\nvcpl.dll
2010-04-03 08:27:00 129640 ----a-w- c:\windows\system32\nvvsvc.exe
2010-04-03 08:27:00 110696 ----a-w- c:\windows\system32\nvmctray.dll
2010-04-03 08:26:56 66714 ----a-w- c:\windows\system32\NvwsApps.xml
2010-04-03 08:26:56 276196 ----a-w- c:\windows\system32\NvApps.xml
2010-04-03 02:08:31 0 d-----w- c:\programdata\Spybot - Search & Destroy
2010-04-03 02:08:31 0 d-----w- c:\program files\Spybot - Search & Destroy
2010-04-03 01:51:42 0 d-----w- c:\program files\Safer Networking
2010-04-03 01:12:30 0 d---a-w- c:\programdata\TEMP
2010-04-03 01:12:30 0 d-----w- c:\programdata\PassMark
2010-04-03 01:12:11 0 d-----w- c:\program files\KeyboardTest
2010-03-31 00:08:59 0 d-----w- c:\windows\E4D153288C89484BB9AAF5BE9EA6D01C.TMP
2010-03-30 21:37:11 977920 ----a-w- c:\windows\system32\wininet.dll
2010-03-30 21:28:45 0 d-----w- C:\found.001
2010-03-28 06:53:14 0 d-----w- c:\users\dave\appdata\roaming\White Peak Software
2010-03-28 05:28:47 65536 --sha-w- c:\users\dave\ntuser.dat{bc172993-3a2a-11df-9bd9-d1786c8a3f4e}.TM.blf
2010-03-28 05:28:47 524288 --sha-w- c:\users\dave\ntuser.dat{bc172993-3a2a-11df-9bd9-d1786c8a3f4e}.TMContainer00000000000000000002.regtrans-ms
2010-03-28 05:28:47 524288 --sha-w- c:\users\dave\ntuser.dat{bc172993-3a2a-11df-9bd9-d1786c8a3f4e}.TMContainer00000000000000000001.regtrans-ms
2010-03-28 05:25:02 65536 --sha-w- c:\users\dave\ntuser.dat{30ee9652-3a2a-11df-9b47-00248c2a259d}.TM.blf
2010-03-28 05:25:02 524288 --sha-w- c:\users\dave\ntuser.dat{30ee9652-3a2a-11df-9b47-00248c2a259d}.TMContainer00000000000000000002.regtrans-ms
2010-03-28 05:25:02 524288 --sha-w- c:\users\dave\ntuser.dat{30ee9652-3a2a-11df-9b47-00248c2a259d}.TMContainer00000000000000000001.regtrans-ms

==================== Find3M ====================

2010-04-21 05:36:17 416370 ---ha-w- c:\windows\system32\drivers\vsconfig.xml
2010-04-19 08:41:34 2272 ----a-w- c:\windows\system32\w95inf16.dll
2010-04-19 08:41:33 4608 ----a-w- c:\windows\system32\w95inf32.dll
2010-04-09 13:56:42 13216 ----a-w- c:\windows\system32\drivers\ASACPI.sys
2010-03-24 09:10:20 1238408 ----a-w- c:\windows\system32\zpeng25.dll
2010-03-24 00:36:46 464072 ----a-w- c:\windows\system32\drivers\vsdatant.sys
2010-03-18 05:31:41 16400 ----a-w- c:\windows\system32\drivers\LNonPnP.sys
2010-03-15 08:37:44 22328 ----a-w- c:\users\dave\appdata\roaming\PnkBstrK.sys
2010-03-02 07:23:28 56 ---ha-w- c:\programdata\ezsidmv.dat
2010-02-27 11:29:14 14336 ----a-w- c:\windows\system32\drivers\EIO.sys
2010-02-27 10:14:07 0 ---ha-w- c:\windows\system32\drivers\Msft_User_WpdFs_01_09_00.Wdf
2010-02-24 00:16:06 181632 ------w- c:\windows\system32\MpSigStub.exe
2010-02-02 07:45:54 2048 ----a-w- c:\windows\system32\tzres.dll
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfd.dat
2009-07-14 04:56:42 31548 ----a-w- c:\windows\inf\perflib\0409\perfc.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfi.dat
2009-07-14 04:56:42 291294 ----a-w- c:\windows\inf\perflib\0409\perfh.dat
2009-07-14 04:41:57 174 --sha-w- c:\program files\desktop.ini
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfi.dat
2009-07-14 00:34:40 291294 ----a-w- c:\windows\inf\perflib\0000\perfh.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfd.dat
2009-07-14 00:34:38 31548 ----a-w- c:\windows\inf\perflib\0000\perfc.dat
2009-06-10 21:26:35 9633792 --sha-r- c:\windows\fonts\StaticCache.dat
2009-07-14 01:14:45 396800 --sha-w- c:\windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7600.16385_none_f12e83abb108c86c\WinMail.exe

============= FINISH: 19:52:08.92 ===============

Attached Files


Edited by Elemental, 26 April 2010 - 07:28 AM.


BC AdBot (Login to Remove)

 


#2 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:06 PM

Posted 30 April 2010 - 11:20 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#3 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:12:06 PM

Posted 03 May 2010 - 10:53 PM

Due to the lack of feedback, this topic is now closed.
If you need this topic reopened, please PM a staff member and we will reopen it for you (include the address of this thread in your request). This applies to the original topic starter only. Everyone else with similar problems, please start a new topic.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users