Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Suspicious Random MS Processes Under dllhost.exe


  • This topic is locked This topic is locked
8 replies to this topic

#1 j0ram

j0ram

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:27 AM

Posted 04 August 2016 - 08:43 PM

Hello! Long time lurker, first time poster.

 

Having some small experience with dealing with troublesome computers, a friend asked me to take a look at his, after reporting that it's been acting very sluggish. It runs Webroot SecureAnywhere, which scans clean. The first thing I did was run MBAM, which also came up clean. But after the scan, I noticed that the real time website protection in MBAM was tossing up tons and tons of warnings of Microsoft processes trying to access various websites.

 

I loaded up Process Explorer and saw that said processes were being launched under dllhost.exe. It would have one process at a time, that would run for a minute or two, trying to access said websites. Then it would kill it, and another MS verified process would start up. If I manually killed the process, yet another one would start up within a minute or so.

 

A few of the processes it runs are:

 

rundll32.exe
systray.exe
logagent.exe
netstat.exe
dplaysvr.exe
ctfmon.exe
wextract.exe
 
And a sample of the websites it tries to access are:
 
195.2.240.67
a020f0.com
9400d3.com
 
I'm not spotting anything else suspicious.
 
There's also MASSIVE activity in appdata\local\temp, with hundreds of directories being created every day.
 
Hopefully I've included everything I should have. Thanks in advance for your help.

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:27 AM

Posted 06 August 2016 - 07:43 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Press the windows key Windows_Logo_key.gif+ r on your keyboard at the same time. This will open the RUN BOX.
Type Notepad and and click the OK key.
Please copy the entire contents of the code box below to the a new file.
 
start


CreateRestorePoint:
EmptyTemp:
CloseProcesses:

HKU\S-1-5-21-3306580011-4053643636-40677765-1000\...\Policies\Explorer\Run: [EagleSoft] => C:\Users\admin\AppData\Roaming\cvsgbasf\sisubhsc.exe
HKU\S-1-5-21-3306580011-4053643636-40677765-1000\...A8F59079A8D5}\localserver32: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 239 more characters). <==== Poweliks!
CHR HKLM\SOFTWARE\Policies\Google: Restriction <======= ATTENTION
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Restriction <======= ATTENTION
BHO-x32: No Name -> {02478D38-C3F9-4efb-9B51-7695ECA05670} -> No File
Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} -  No File
FF Plugin: @mcafee.com/MSC,version=10 -> c:\PROGRA~1\mcafee\msc\NPMCSN~1.DLL [No File]
FF Plugin: @microsoft.com/GENUINE -> disabled [No File]
FF Plugin-x32: @mcafee.com/MSC,version=10 -> c:\PROGRA~2\mcafee\msc\NPMCSN~1.DLL [No File]
FF Plugin-x32: @microsoft.com/GENUINE -> disabled [No File]
CHR Extension: (Chrome Web Store Payments) - C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-04-11]
S4 McAWFwk; c:\PROGRA~1\COMMON~1\mcafee\actwiz\mcawfwk.exe [X]
S4 McOobeSv2; "C:\Program Files\Common Files\mcafee\platform\McSvcHost\McSvHost.exe" /McCoreSvc [X]
S4 LMIRfsClientNP; no ImagePath
S4 BCM42RLY; system32\drivers\BCM42RLY.sys [X]
U0 SR; no ImagePath
U2 srservice; no ImagePath
C:\Users\admin\AppData\Roaming\cvsgbasf
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda
CustomCLSID: HKU\S-1-5-21-3306580011-4053643636-40677765-1000_Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\localserver32 -> rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";eval("epdvnfou/xsjuf)(=tdsjqu!mbohvbhf>ktds (the data entry has 250 more characters). <==== Poweliks?
CustomCLSID: HKU\S-1-5-21-3306580011-4053643636-40677765-1000_Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}\InprocServer32 -> C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\acledit.dll => No File <==== ATTENTION
HKU\.DEFAULT\Software\Classes\exefile: "%1" %* <===== ATTENTION
HKU\.DEFAULT\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION
HKU\S-1-5-21-3306580011-4053643636-40677765-1000\Software\Classes\exefile: "%1" %* <===== ATTENTION
HKU\S-1-5-21-3306580011-4053643636-40677765-1000\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION

End
Save the file as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

Restart the computer normally to reset the registry.

The tool will create a log (Fixlog.txt) please post it to your reply.
===

Reset Chrome...
Open Google Chrome, click on menu icon google-chrome-setting-icon.png which is located right side top of the google chrome.
 
Click "Settings" then "Show advanced settings" at the bottom of the screen.
 
Click "Reset browser settings" button.
 
Clear your cache and cookies
https://support.google.com/chromebook/answer/183083?hl=en

Restart Chrome.
====

Your version of Java is outdated and needs to be updated to take advantage of fixes that have eliminated security vulnerabilities.

You can manually check your present version and update as recommended.
https://www.java.com/en/download/installed.jsp

Be careful not to install malware posing as Java update!
Important read this blog.
http://blog.trendmicro.com/trendlabs-security-intelligence/malware-poses-as-an-update-for-java-0-day-fix/

Quoted from the page.
"In light of the recent events surrounding Java, users must seriously consider their use of Java. Do they really need it? If yes, make sure that users follow the steps we recommended and get the security update directly from the official oracle website." at:
http://www.oracle.com/technetwork/java/javase/downloads/index.html

How to disable Java in your browsers
http://www.infoworld.com/t/web-browsers/how-disable-java-in-your-browsers-210882

If still present after the update you can remove the old version(s) of Java via the Control Panel > Programs and Features.
Java™ 7 Update 5 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F86417005FF}) (Version: 7.0.50 - Oracle)

Please postd the log and let me know what problem persists.

#3 j0ram

j0ram
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:27 AM

Posted 10 August 2016 - 09:45 PM

Thanks for the response! Been a hectic week. I'll give this a try come the weekend.



#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:27 AM

Posted 17 August 2016 - 08:36 AM

Are you still with me?

#5 j0ram

j0ram
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:27 AM

Posted 17 August 2016 - 08:39 AM

I am! I apologize for the delays, and hope to get to this soon. Have you ever had one of those months where not a thing goes right? Hah. Thank you for your patience.



#6 j0ram

j0ram
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:27 AM

Posted 18 August 2016 - 09:24 PM

All steps run, log attached.

 

No noted odd behavior off the bat. I will check users\admin\appdata\local\temp in a couple of days to see if any new odd directories have appeared.

 

Thanks for your help thus far!

Attached Files



#7 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:27 AM

Posted 24 August 2016 - 09:45 AM

If all is well.

To learn more about how to protect yourself while on the internet read this little guide best security practices keep safe.
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/

#8 j0ram

j0ram
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:10:27 AM

Posted 27 August 2016 - 06:08 PM

No more hundreds of temp directories showing up, and everything appears clean.

 

Thanks so much for your help!



#9 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:05:27 AM

Posted 28 August 2016 - 08:40 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users