Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

adware/unknown network traffic; possible botnet, suspected remote changes


  • This topic is locked This topic is locked
4 replies to this topic

#1 Dacflem

Dacflem

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:49 AM

Posted 30 June 2014 - 01:35 AM

I am running a desktop computer with Windows vista x32 SP2. I believe my home network is all infected with some sort of adware that is communicating with a botnet. I am constantly watching my computers get slower and slower, and I notice tons of suspicious events that the task scheduler seems to randomly schedule. An example is my attempt to clean my laptop with ESET nod32 antivirus in offline mode, and after plugging my router back in suddenly my laptop starts up on its own.

 

 

In particular, the computer I am posting from, has 4 removable drives/attached devices which exist in My Computer, and gmer is picking this up as rootkit/malware activity. I ran process explorer and it came up with three possible malware/trojans detected via virustotal (may or may not be applicable, because only 1/50 antivirus software detected these):

  • Troj.W32.Autoit
  • W32.HfsReno.4be9
  • W32.HfsReno.2b06

 

DDS is not working on my desktop right now. I have 3 computers running on my home network, along with my smart-phone. I have wireshark logs showing suspicious network activity upon opening a program and leaving it idle, including intranetwork communication and user account changes via netBIOS but not limited to secure socket layer connections and TLSv1 server logons... most of the time there isn't a program tied to the network activity (svchost more than not), and suspicious traffic actually starts before the logon screen is presented, but doesn't pick up speed until I run an internet browser or program that uses the internet. HELP ME PLX!


Edited by Dacflem, 30 June 2014 - 02:02 AM.


BC AdBot (Login to Remove)

 


m

#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,549 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:49 AM

Posted 05 July 2014 - 01:40 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/539475 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 Dacflem

Dacflem
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:49 AM

Posted 05 July 2014 - 11:22 PM

Here's the DDS.

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 9.0.8112.16555
Run by Owner at 22:07:43 on 2014-07-05
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1022.313 [GMT -6:00]
.
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: COMODO Antivirus *Disabled/Outdated* {0C2D2636-923D-EE52-2A83-E643204A8275}
FW: COMODO Firewall *Enabled* {8F7746F7-FE68-E084-3B6C-7404A51E8FB3}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\SLsvc.exe
C:\Program Files\NVIDIA Corporation\Display\nvxdsync.exe
C:\Windows\system32\nvvsvc.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\snmp.exe
C:\Windows\system32\SearchIndexer.exe
C:\WINDOWS\RtHDVCpl.exe
C:\Program Files\BillP Studios\WinPatrol\WinPatrol.exe
C:\Windows\System32\WUDFHost.exe
C:\Windows\System32\mobsync.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\NVIDIA Corporation\Display\nvtray.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\BillP Studios\WinPatrol\WinPatrolEx.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k apphost
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\svchost.exe -k iissvcs
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
.
============== Pseudo HJT Report ===============
.
uStart Page = about:blank
uSearch Bar = hxxp://my.netzero.net/s/search?r=minisearch
uSearch Page = hxxp://my.netzero.net/s/search?r=minisearch
mStart Page = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=desktop
mSearch Page = hxxp://my.netzero.net/s/search?r=minisearch
mDefault_Page_URL = hxxp://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=71&bd=Pavilion&pf=desktop
mDefault_Search_URL = hxxp://my.netzero.net/s/search?r=minisearch
uSearchURL,(Default) = hxxp://my.netzero.net/s/search?r=minisearch
mSearchAssistant = hxxp://my.netzero.net/s/search?r=minisearch
uURLSearchHooks: URLSearchHook Class: {37D2CDBF-2AF4-44AA-8113-BD0D2DA3C2B8} - c:\program files\netzero\SearchEnh1.dll
BHO: {02478D38-C3F9-4EFB-9B51-7695ECA05670} - <orphaned>
BHO: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - <orphaned>
BHO: {AA58ED58-01DD-4d91-8333-CF10577473F7} - <orphaned>
BHO: {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - <orphaned>
TB: ZeroBar: {F5735C15-1FB2-41FE-BA12-242757E69DDE} - c:\program files\netzero\Toolbar.dll
uRun: [CCleaner] "c:\program files\ccleaner\CCleaner.exe" /AUTO
uRun: [WinPatrol] c:\program files\billp studios\winpatrol\winpatrol.exe -expressboot
mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide
mRun: [RtHDVCpl] RtHDVCpl.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
Trusted Zone: netzero.com
Trusted Zone: netzero.net
TCP: NameServer = 10.10.10.254
TCP: Interfaces\{06F87E5D-809C-4B55-A142-0E592B1B1B69} : NameServer = 156.154.70.22,156.154.71.22
TCP: Interfaces\{06F87E5D-809C-4B55-A142-0E592B1B1B69} : DHCPNameServer = 10.10.10.254
TCP: Interfaces\{6E38A697-9AD9-4EA1-A462-B243E77C666E} : NameServer = 156.154.70.22,156.154.71.22
TCP: Interfaces\{6E38A697-9AD9-4EA1-A462-B243E77C666E} : DHCPNameServer = 10.10.10.254
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\35.0.1916.153\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\owner\appdata\roaming\mozilla\firefox\profiles\moc2lel0.default\
FF - prefs.js: browser.search.selectedEngine - Ask
FF - prefs.js: browser.startup.homepage - hxxp://www.ask.com/?o=101760&l=dis
FF - prefs.js: keyword.URL - hxxp://toolbar.ask.com/toolbarv/askRedirect?o=101757&gct=&gc=1&q=
FF - plugin: c:\program files\google\update\1.3.24.15\npGoogleUpdate3.dll
FF - ExtSQL: 2014-05-25 21:07; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\microsoft.net\framework\v3.5\windows presentation foundation\DotNetAssistantExtension
.
============= SERVICES / DRIVERS ===============
.
R1 cmderd;COMODO Internet Security Eradication Driver;c:\windows\system32\drivers\cmderd.sys [2014-4-16 20072]
R1 cmdGuard;COMODO Internet Security Sandbox Driver;c:\windows\system32\drivers\cmdguard.sys [2014-4-16 607680]
R1 cmdHlp;COMODO Internet Security Helper Driver;c:\windows\system32\drivers\cmdhlp.sys [2014-4-16 43216]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2014-5-25 21504]
R2 NPF;NetGroup Packet Filter Driver;c:\windows\system32\drivers\npf.sys [2013-2-28 36600]
R3 rt61x86;RT61 Wireless Driver for Windows Vista;c:\windows\system32\drivers\netr61.sys [2008-11-26 333824]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
S3 cmdvirth;COMODO Virtual Service Manager;c:\program files\comodo\comodo internet security\cmdvirth.exe [2014-3-25 1663192]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2013-9-11 770168]
.
=============== File Associations ===============
.
FileExt: .inf: inffile=c:\windows\system32\NOTEPAD.EXE %1 [UserChoice]
.
=============== Created Last 30 ================
.
2014-06-30 06:13:45    --------    d-----w-    C:\Command-line
2014-06-24 22:12:38    --------    d-----w-    c:\users\owner\appdata\roaming\Comodo
2014-06-24 05:42:16    915392    ----a-w-    c:\windows\system32\drivers\tcpip.sys
2014-06-24 05:42:16    31232    ----a-w-    c:\windows\system32\drivers\tcpipreg.sys
2014-06-24 04:44:13    502784    ----a-w-    c:\windows\system32\usp10.dll
2014-06-24 04:08:42    --------    d--h--w-    C:\VTRoot
2014-06-24 04:08:24    87624    ----a-w-    c:\windows\system32\drivers\fvstore.dat
2014-06-22 11:50:14    --------    d-----w-    C:\CCE_Quarantine
2014-06-22 10:21:53    --------    d-----w-    c:\program files\Wireshark
2014-06-22 09:03:53    --------    d-s---w-    c:\programdata\Shared Space
2014-06-22 08:28:28    1700352    ----a-w-    c:\windows\system32\gdiplus.dll
2014-06-22 08:23:58    --------    d-----w-    c:\programdata\Adtrustmedia
2014-06-22 08:22:13    --------    d-----w-    c:\program files\Comodo
2014-06-22 08:22:00    --------    d-----w-    c:\programdata\Comodo Downloader
2014-06-22 08:21:34    --------    d-----w-    c:\programdata\Comodo
2014-06-22 01:52:32    8140904    ----a-w-    c:\programdata\microsoft\windows defender\definition updates\{3e261ca3-7668-45e4-afae-7774790feaab}\mpengine.dll
2014-06-15 17:55:30    --------    d-----w-    C:\TDSSKiller_Quarantine
2014-06-11 16:39:18    --------    d-----w-    C:\2b5265ae5777df45589f419f
2014-06-08 09:09:50    --------    d-----w-    c:\users\owner\.zenmap
.
==================== Find3M  ====================
.
2014-05-28 16:39:36    1810432    ----a-w-    c:\windows\system32\jscript9.dll
2014-05-28 16:32:59    1129472    ----a-w-    c:\windows\system32\wininet.dll
2014-05-28 16:32:25    1427968    ----a-w-    c:\windows\system32\inetcpl.cpl
2014-05-28 16:30:53    421376    ----a-w-    c:\windows\system32\vbscript.dll
2014-05-28 16:30:53    142848    ----a-w-    c:\windows\system32\ieUnatt.exe
2014-05-28 16:29:31    2382848    ----a-w-    c:\windows\system32\mshtml.tlb
2014-05-28 16:29:27    11776    ----a-w-    c:\windows\system32\mshta.exe
2014-05-26 03:03:10    979456    ----a-w-    c:\windows\system32\MFH264Dec.dll
2014-05-26 03:01:51    519680    ----a-w-    c:\windows\system32\d3d11.dll
2014-05-26 03:01:51    4096    ----a-w-    c:\windows\system32\drivers\en-us\dxgkrnl.sys.mui
2014-05-26 03:01:51    369664    ----a-w-    c:\windows\system32\WMPhoto.dll
2014-05-26 03:01:51    252928    ----a-w-    c:\windows\system32\dxdiag.exe
2014-05-26 03:01:51    195584    ----a-w-    c:\windows\system32\dxdiagn.dll
2014-05-26 03:01:50    974848    ----a-w-    c:\windows\system32\WindowsCodecs.dll
2014-05-26 03:01:50    321024    ----a-w-    c:\windows\system32\PhotoMetadataHandler.dll
2014-05-26 03:01:50    189440    ----a-w-    c:\windows\system32\WindowsCodecsExt.dll
2014-05-25 08:48:46    101888    ----a-w-    c:\windows\system32\ifxcardm.dll
2014-05-25 08:48:35    82432    ----a-w-    c:\windows\system32\axaltocm.dll
2014-04-17 04:12:52    607680    ----a-w-    c:\windows\system32\drivers\cmdguard.sys
2014-04-17 04:12:52    43216    ----a-w-    c:\windows\system32\drivers\cmdhlp.sys
2014-04-17 04:12:50    20072    ----a-w-    c:\windows\system32\drivers\cmderd.sys
2007-10-18 17:21:38    1221632    ----a-w-    c:\program files\eChat.exe
2001-11-05 17:30:50    165376    ----a-w-    c:\program files\UNWISE.EXE
.
============= FINISH: 22:10:22.24 ===============
 



#4 nasdaq

nasdaq

  • Malware Response Team
  • 38,242 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:49 AM

Posted 07 July 2014 - 06:59 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Download the correct version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

Let me know what problem persists.

p.s.
If the other computers are connected to the router and have similar problems it might just be that the router has been compromised.

How to Reset a Router Back to the Factory Default Settings
http://www.ehow.com/how_2110924_reset-back-factory-default-settings.html

Then, please reconfigure it back to your preferred setting.. Below is the list of default username and password, should you don't know it ;)

http://www.routerpasswords.com/
http://www.phenoelit-us.org/dpl/dpl.html
===

Reset for Linksys, Netgear, D-Link and Belkin Routers
http://www.techsupportforum.com/2763-reset-for-linksys-netgear-d-link-and-belkin-routers/

How to Secure Your Wireless Router
http://www.ehow.com/how_2253625_secure-wireless-router.html


How To Set Up a Network Router
http://compnetworking.about.com/od/homenetworking/ht/routerconfigure.htm

#5 nasdaq

nasdaq

  • Malware Response Team
  • 38,242 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:49 AM

Posted 13 July 2014 - 07:35 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users