Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Dropbox.exe virus/rootkit?


  • This topic is locked This topic is locked
2 replies to this topic

#1 srwmay

srwmay

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:08:01 AM

Posted 23 February 2015 - 02:12 PM

I have been experiencing network issues while gaming recently and searched for potential issues. I found out about GMER through google and this is the results I am seeing:
 

GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2015-02-23 16:12:02
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T1L0-3 SAMSUNG_HD103SJ rev.1AJ10001 931.51GB
Running: 0twuuob2.exe; Driver: C:\Users\Antec\AppData\Local\Temp\pglorpow.sys


---- Threads - GMER 2.1 ----

Thread   C:\Windows\system32\svchost.exe [792:4236]                                                                                                                                                                                                                000007fef5492154
Thread   C:\Windows\System32\spoolsv.exe [1544:2512]                                                                                                                                                                                                               000007fef82210c8
Thread   C:\Windows\System32\spoolsv.exe [1544:2516]                                                                                                                                                                                                               000007fef81e6144
Thread   C:\Windows\System32\spoolsv.exe [1544:2520]                                                                                                                                                                                                               000007fef8a15fd0
Thread   C:\Windows\System32\spoolsv.exe [1544:2524]                                                                                                                                                                                                               000007fef8a03438
Thread   C:\Windows\System32\spoolsv.exe [1544:2528]                                                                                                                                                                                                               000007fef8a163ec
Thread   C:\Windows\System32\spoolsv.exe [1544:2536]                                                                                                                                                                                                               000007fef8465e5c
Thread   C:\Windows\System32\spoolsv.exe [1544:2576]                                                                                                                                                                                                               000007fef8278760
Thread   C:\Windows\System32\svchost.exe [2936:488]                                                                                                                                                                                                                000007fef5ae9688
Thread   C:\Program Files\Windows Media Player\wmpnetwk.exe [2984:3056]                                                                                                                                                                                            000007fefbc22bf8
---- Processes - GMER 2.1 ----

Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Widgets.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:28)        000000006e320000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Gui.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)            000000006e010000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\libGLESv2.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452](2015-02-10 21:00:30)                                                                                        000000006df50000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Core.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)           000000006d8f0000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\icuin52.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (ICU I18N DLL/The ICU Project)(2015-02-10 21:00:30)                                                           000000004a900000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\icuuc52.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (ICU Common DLL/The ICU Project)(2015-02-10 21:00:30)                                                         0000000004390000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\icudt52.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (ICU Data DLL/The ICU Project)(2015-02-10 21:00:30)                                                           000000004ad00000
Library  c:\users\antec\appdata\local\temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpd2hxpz.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452](2015-02-23 23:07:57)                                       0000000003ed0000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Network.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)        000000006d340000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5WebKit.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:26)         000000006c350000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Quick.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)          000000006c130000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Qml.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)            000000006bed0000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5Sql.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)            000000006be90000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\libEGL.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452](2015-02-10 21:00:30)                                                                                           000000006be80000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5WebKitWidgets.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:26)  000000006bdb0000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5OpenGL.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)         000000006bd60000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\Qt5PrintSupport.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452] (C++ application development framework./Digia Plc and/or its subsidiary(-ies))(2015-02-10 21:00:24)   000000006bd10000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\plugins\platforms\qwindows.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452](2015-02-10 21:00:28)                                                                       000000006bc30000
Library  C:\Users\Antec\AppData\Roaming\Dropbox\bin\plugins\imageformats\qjpeg.dll (*** suspicious ***) @ C:\Users\Antec\AppData\Roaming\Dropbox\bin\Dropbox.exe [3452](2015-02-10 21:00:28)                                                                       000000006bb60000

---- EOF - GMER 2.1 ----

 
Can someone make some recommendations to remove this if it is indeed foul?

Edited by Queen-Evie, 23 February 2015 - 07:31 PM.
moved from Am I Infected to Malware Removal Logs


BC AdBot (Login to Remove)

 


m

#2 nasdaq

nasdaq

  • Malware Response Team
  • 38,254 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:01 AM

Posted 28 February 2015 - 10:48 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Lets strat from the beginning.

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
POST THE LOG FOR MY REVIEW.

Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

How is the computer running?

Wait for further instructions.

#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,254 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:10:01 AM

Posted 06 March 2015 - 09:21 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users