Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with rootkit


  • Please log in to reply
7 replies to this topic

#1 mreynolds83

mreynolds83

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:35 AM

Posted 23 April 2017 - 05:42 AM

Hello everyone,

 

I'm running Windows 10 64bit and I downloaded and ran Malwarebytes Anti-rootkit program and it found 6 registry keys associated with MRT.exe, MsMpEng.exe and svchost.exe.  These were located in WOW6432NODE and IMAGE FILE EXECUTION OPTIONS folders.  After a Google search, it led me here where someone else had posted about Windows Defender being compromised.  I had Malwarebytes Anti-rootkit remove the entries and they are no longer on scan, what else should I do to make sure my system is clean?



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,130 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:05:35 AM

Posted 23 April 2017 - 03:18 PM

Welcome to BC....

 

If you can...please submit MRT.exe  and MsMpEng.exe (NOT just the file names...the contents of those files) to be scanned by numerous security programs at VirusTotal - Free Online Virus and Malware Scan

It may be possible to do that if the files were quarantined and not deleted by MBAM or you.

 

Did you have any symptoms of malware or adware before running the MBAM Ant-rootkit scan? If so, use the programs below to clean, remove adware and remove malware.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 mreynolds83

mreynolds83
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:35 AM

Posted 24 April 2017 - 11:19 PM

 

# AdwCleaner v6.046 - Logfile created 24/04/2017 at 18:27:51

# Updated on 24/04/2017 by Malwarebytes
# Database : 2017-04-24.1 [Server]
# Operating System : Windows 10 Enterprise N 2015 LTSB  (X64)
# Username : Matt - MATTGOODPC
# Running from : C:\Users\Matt\Downloads\adwcleaner_6.046.exe
# Mode: Clean
 
 
 
***** [ Services ] *****
 
 
 
***** [ Folders ] *****
 
 
 
***** [ Files ] *****
 
 
 
***** [ DLL ] *****
 
 
 
***** [ WMI ] *****
 
 
 
***** [ Shortcuts ] *****
 
 
 
***** [ Scheduled Tasks ] *****
 
 
 
***** [ Registry ] *****
 
[-] Key deleted: HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\geekbuddyrsp
[#] Key deleted on reboot: [x64] HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\geekbuddyrsp
[-] Key deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PokerStars.net
 
 
***** [ Web browsers ] *****
 
[-] [C:\Users\Matt\AppData\Local\Google\Chrome\User Data\Default] [startup_urls] Deleted: hxxp://search.conduit.com/?ctid=CT3294791&SearchSource=48&CUI=UN32707134311550586&UM=2
 
 
*************************
 
:: "Tracing" keys deleted
:: Winsock settings cleared
 
*************************
 
C:\AdwCleaner\AdwCleaner[C0].txt - [1232 Bytes] - [24/04/2017 18:27:51]
C:\AdwCleaner\AdwCleaner[S0].txt - [1528 Bytes] - [24/04/2017 18:25:33]
 
########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt - [1378 Bytes] ##########
 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.3 (04.10.2017)
Operating System: Windows 10 Enterprise N 2015 LTSB x64 
Ran by Matt (Administrator) on Mon 04/24/2017 at 18:32:42.65
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 1 
 
Successfully deleted: C:\Windows\wininit.ini (File) 
 
 
 
Registry: 0 
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 04/24/2017 at 18:34:35.28
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

 

ESET didn't find anything so there wasn't a log.

 

I wasn't able to upload the only MRT.exe I could find on my system because it was over 128mb, which was located in C:\Windows\System32.  I found 3 MsMpEng.exe, two of them were in folders in C:\Windows\WinSXS\amd64_windows-defender-service_31bf3856... with many characters after that.  The other was located in C:\Program Files\Windows Defender.  All of them came back clean on the Virus Total site.

 

Here is the MBAR log from when I ran it the other night:

 

 

Malwarebytes Anti-Rootkit BETA 1.9.3.1001

www.malwarebytes.org
 
Database version:
  main:    v2014.11.18.05
  rootkit: v2014.11.12.01
 
Windows 10 x64 NTFS
Internet Explorer 11.0.10240.17354
Matt :: MATTGOODPC [administrator]
 
4/23/2017 5:50:37 AM
mbar-log-2017-04-23 (05-50-37).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 392483
Time elapsed: 11 minute(s), 23 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 6
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MRT.exe (Trojan.Agent) -> Delete on reboot. [92aba39a63191b1ba12ce311719218e8]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MsMpEng.exe (Security.Hijack) -> Delete on reboot. [bd80c07da9d3c6702fb7a054e71cc23e]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\svchost.exe (Security.Hijack) -> Delete on reboot. [112cea53ea92b086d82ec4330ef51ee2]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MRT.exe (Trojan.Agent) -> Delete on reboot. [2a132e0f4b31eb4bceff767eec17dd23]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MsMpEng.exe (Security.Hijack) -> Delete on reboot. [7bc20637c1bb44f24f97589c0cf7629e]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\svchost.exe (Security.Hijack) -> Delete on reboot. [162785b8384482b44abcca2def1427d9]
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)
 

 

 

I haven't noticed anything strange, was talking to a friend who I am helping alpha test some software and he asked if I was trying to hack his server and I told him no.  He said my user auth token was being used to try to get into the server and he mentioned I may have a rootkit so that's why I downloaded MBAR.



#4 buddy215

buddy215

  • Moderator
  • 13,130 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:05:35 AM

Posted 25 April 2017 - 05:21 AM

  • Please download Security Check by glax24 and save the file to the Desktop
  • Run the tool by accepting all the Security prompts
  • when complete the tool will produce a log file C:\SecurityCheck\SecurityCheck.txt and also copy the contents to the Clipboard
  • Simply Paste the log to your reply

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#5 mreynolds83

mreynolds83
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:35 AM

Posted 27 April 2017 - 06:03 PM


 

SecurityCheck by glax24 & Severnyj v.1.4.0.49 [15.04.17]

WebSite: www.safezone.cc
DateLog: 27.04.2017 18:57:33
Path starting: C:\Users\Matt\AppData\Local\Temp\SecurityCheck\SecurityCheck.exe
Log directory: C:\SecurityCheck\
IsAdmin: True
User: Matt
VersionXML: 4.14is-23.04.2017
___________________________________________________________________________
 
Windows 10(6.3.10240) (x64) EnterpriseSN Lang: English(0409)
Installation date OS: 01.03.2016 18:26:58
LicenseStatus: Windows®, EnterpriseSN edition Volume activation will expire : 259058 minutes
Boot Mode: Normal
Default Browser: C:\Program Files\Internet Explorer\iexplore.exe
SystemDrive: C: FS: [NTFS] Capacity: [232.4 Gb] Used: [109.6 Gb] Free: [122.8 Gb]
------------------------------- [ Windows ] -------------------------------
Extended support has ended Warning! Download Update
Internet Explorer 11.0.10240.17354 Warning! Download Update
Online installation. Last version available when Windows update is enabled throught the Internet.
 
User Account Control enabled
Windows Update (wuauserv) - The service has stopped
Security Center (wscsvc) - The service is running
Remote Registry (RemoteRegistry) - The service has stopped
SSDP Discovery (SSDPSRV) - The service is running
Remote Desktop Services (TermService) - The service is running
Windows Remote Management (WS-Management) (WinRM) - The service has stopped
---------------------------- [ Antivirus_WMI ] ----------------------------
Avast Antivirus (enabled and up to date)
Windows Defender (disabled and up to date)
---------------------------- [ Firewall_WMI ] -----------------------------
COMODO Firewall (enabled)
--------------------------- [ AntiSpyware_WMI ] ---------------------------
Windows Defender (disabled and up to date)
Avast Antivirus (enabled and up to date)
---------------------- [ AntiVirusFirewallInstall ] -----------------------
COMODO Firewall v.10.0.1.6223
Avast Free Antivirus v.17.3.2291
Internet Security Essentials v.1.1.413499.43
-------------------------- [ SecurityUtilities ] --------------------------
PeerBlock 1.2 (r693) v.1.2.0.693
Malwarebytes Anti-Malware version 2.2.1.1043 v.2.2.1.1043
--------------------------- [ OtherUtilities ] ----------------------------
7-Zip 15.14 (x64) v.15.14 Warning! Download Update
 
Uninstall old version and install new one.
TeamViewer 11 v.11.0.76421 Warning! Download Update
 
VLC media player v.2.2.2 Warning! Download Update
 
TeamViewer 11 (TeamViewer) - The service is running
--------------------------------- [ IM ] ----------------------------------
WhatsApp v.0.2.3572
-------------------------------- [ Java ] ---------------------------------
Java 8 Update 121 (64-bit) v.8.0.1210.13 Warning! 
 
 
Uninstall old version and install new one (jre-8u131-windows-x64.exe).
Java SE Development Kit 8 Update 121 (64-bit) v.8.0.1210.13 Warning! 
 
 
Uninstall old version and install new one (jdk-8u131-windows-x64.exe).
Java 8 Update 121 v.8.0.1210.13 Warning! 
 
 
Uninstall old version and install new one (jre-8u131-windows-i586.exe).
--------------------------- [ AdobeProduction ] ---------------------------
Adobe Flash Player 10 Plugin v.10.3.183.90 Warning! 
 
 
Adobe Acrobat Reader DC v.17.009.20044
------------------------------- [ Browser ] -------------------------------
Epic Privacy Browser v.48.0.2553.0
Comodo Dragon v.55.0.2883.59
Google Chrome v.58.0.3029.81
--------------------------- [ RunningProcess ] ----------------------------
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe v.58.0.3029.81
------------------ [ AntivirusFirewallProcessServices ] -------------------
Avast Antivirus (avast! Antivirus) - The service is running
C:\Program Files\AVAST Software\Avast\AvastSvc.exe v.17.3.3443.0
aswbIDSAgent (aswbIDSAgent) - The service is running
C:\Program Files\AVAST Software\Avast\AvastUI.exe v.17.3.3443.0
COMODO Internet Security Helper Service (CmdAgent) - The service is running
C:\Program Files\COMODO\COMODO Internet Security\cmdagent.exe v.10.0.1.6223
COMODO Virtual Service Manager (cmdvirth) - The service has stopped
C:\Program Files\COMODO\COMODO Internet Security\cistray.exe v.10.0.1.6223
C:\Program Files\COMODO\COMODO Internet Security\cis.exe v.10.0.1.6223
C:\Program Files\COMODO\COMODO Internet Security\cavwp.exe v.10.0.1.6223
Windows Defender Service (WinDefend) - The service has stopped
Windows Defender Network Inspection Service (WdNisSvc) - The service has stopped
----------------------------- [ End of Log ] ------------------------------
 


#6 buddy215

buddy215

  • Moderator
  • 13,130 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:05:35 AM

Posted 27 April 2017 - 07:33 PM

Comodo may have installed Comodo Dragon browser. I suggest if it is in your list of installed programs to uninstall it.

 

Old Flash programs are serious malware magnets.

 

Most users don't need or use Java. If you are not sure if you need it then I suggest you uninstall all Java programs mentioned in

the report and not install unless a website or program you use notifies you it is necessary.

 

I don't know for certain if what MBAM removed were false positives or not. But since you use Avast and no problems exist then

I think you are good to go.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#7 mreynolds83

mreynolds83
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:06:35 AM

Posted 27 April 2017 - 08:26 PM

I made sure to not install the Comodo Browser.  Thank you for all your help!  Just wanted to make sure I'm clean as can be!  :bananas:



#8 buddy215

buddy215

  • Moderator
  • 13,130 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:05:35 AM

Posted 28 April 2017 - 05:51 AM

You're welcome....happy surfin'


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users