Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


[Spying] Trace Evidence

  • This topic is locked This topic is locked
1 reply to this topic

#1 AzureSkyy


  • Members
  • 26 posts
  • Local time:04:28 PM

Posted 12 March 2012 - 07:14 AM

Fairly certain there's an active cracker in my system, with either a backdoor slipped somewhere inside or mirroring my machine. Which, of course, is an uncomfortable situation.

Why do I think this?
(1) My hosts file changes every few days, adding addresses for security software updates. I keep a clean backup on a thumbdrive, manually replacing it in what is probably a futile manner every once in a while to update from safemode w/ networking.
(2) A folder, composed of about 40 chinese Kanji characters, sometimes appears in my Recent Folders list. I'm not chinese, I've never installed anything in any of the Chinese languages, and 3 different Mandarin-speaking friends say that the writing makes no sense to them. Also, given the list that it's on, this folder is clearly being used.
(3) On Mar 11, a shadow of a dialogue box got stuck on my taskbar, where one of the context options was "Download as hidden file". I cannot think of a clearer indication of [covert] infiltration. The box, stuck as it was, disappeared in segments upon mouse-over after reactivating the objects that are normally on the layer atop of the box. Screenshot of the half-present box inserted into message
(4) I am the only person who uses this computer, and no chinese-speaking friends have ever used it, much less created folder-producing programs on it. I speak only English and Italian.

Currently using ESET suite, Spybot S&D, Ad-Aware, CCleaner for registry and filewipes, Security TaskManager, and perhaps some others I am forgetting. Those are the most relevant. I attempted to install ZoneAlarm after AVG and MS Security Essentials both failed to detect a bitcoin mining attempt (3-ish months ago), but it had several errors which the ZA forum never responded to (2 months ago). I lacked any kind of real firewall other than Win7's built-in garbage one for a while. Silly of me, but got caught up in work and school. Am studying and working abroad, living in a hostel, and need to check my email & social networks, can't go dark while fixing the problem. :\

I have run:
-- Spybot S&D
-- Ad-Aware
-- AVG Free Anti-Vir (prior to removal and change to ESET)
-- ESET Anti-Vir
-- RKill

Any thoughts / suggestions? Note that some of my assumptions (method of attack, type of attack, source of files & folders) could be, of course, wrong.


Below are the paths of some more folders that appeared in my Recent Folders list just today. There has never been more than 1 strange folder in that list at a time. I assume that the person has noticed my attempts, and has increased activity. Why they've not fixed the Recent Items thing, I am not sure.

C:\Users\Haven\Desktop\㩘卜祫汹晩履楂獯桰牥履 浅楰楲慣慆瑣屳敓獮瑡潩獮彜嘠獩慵屬敆慭敬彜删獩畱履䑒屔ⴲ䙍䌭义ぅ⸱汦v.
C:\Users\Haven\Desktop\㩘卜祫汹晩履楂獯桰牥履 浅楰楲慣慆瑣屳敓獮瑡潩獮彜嘠獩慵屬敆慭敬彜删獩畱履䑒屔ⵘⵇ剏⹇汦v.
C:\Users\Haven\Desktop\㩘卜祫汹晩履楂獯桰牥履 浅楰楲慣慆瑣屳敓獮瑡潩獮彜嘠獩慵屬敆慭敬彜删獩畱履䑒屔ⵘⵇ啒卓⹏汦v4.
C:\Users\Haven\Desktop\㩘卜祫汹晩履楂獯桰牥履 浅楰楲慣慆瑣屳敓獮瑡潩獮彜嘠獩慵屬敆慭敬彜删獩畱履䑒屔ⵘⵇ䱐奁偁⹅灭4.

Posted Image
Posted Image
Posted Image

BC AdBot (Login to Remove)


#2 Animal


    Bleepin' Animinion

  • Members
  • 35,905 posts
  • Gender:Male
  • Location:Where You Least Expect Me To Be
  • Local time:01:28 PM

Posted 22 March 2012 - 09:28 PM

Now that your log is properly posted, here, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the logs you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Removal Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.

The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)

A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)

"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955)

Follow BleepingComputer on: Facebook | Twitter | Google+

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users