Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with a CoinMiner Trojan - Spreading Rapidly Across Domain


  • This topic is locked This topic is locked
7 replies to this topic

#1 cash4

cash4

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:47 AM

Posted 11 May 2017 - 06:19 AM

Hello All,

 

It appears we have been hit by some sort of Coin mining trojan. It seems to be creating quite a few files in C:\Windows\Temp that are different variations of "sw_filelock_*.yaml" (often ending in an IP address of another machine on our network). There is also a "sw_filelock_bootstrap.txt". We did see in a .log file in Temp that they were reaching out to the domain xmr.crypto-pool.fr on port 443, so we have attempted to block outbound on 443 to that domain as a precaution. Below is the FRST.txt:

 

 

 

 

 

 Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 08-05-2017

Ran by Administrator (administrator) on MRI-SNOOPY (11-05-2017 06:59:31)
Running from C:\Users\Administrator\Downloads
Loaded Profiles: Administrator (Available Profiles: jschuch & bwilde & cash & cash-admin & Administrator)
Platform: Windows Server 2008 R2 Standard Service Pack 1 (X64) Language: English (United States)
Internet Explorer Version 11 (Default browser: IE)
Boot Mode: Normal
 
==================== Processes (Whitelisted) =================
 
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
 
(Microsoft Corporation) C:\Windows\System32\LogonUI.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\httpd.exe
(ESET) C:\Program Files\ESET\RemoteAdministrator\Agent\ERAAgent.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\rotatelogs.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\httpd.exe
(ESET) C:\Program Files\ESET\Rogue Detection Sensor\RDSensor.exe
(Microsoft Corporation) C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\sqlservr.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\rotatelogs.exe
(Spiceworks, Inc.) C:\Program Files (x86)\Spiceworks\bin\spiceworks.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe
(Microsoft Corporation) C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
(Apache Software Foundation) C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7.exe
(VMware, Inc.) C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
(Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Microsoft Corporation) C:\Windows\System32\rdpclip.exe
(VMware, Inc.) C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
(Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe
(Apache Software Foundation) C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7w.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(ESET) C:\Program Files\ESET\RemoteAdministrator\Server\ERAServer.exe
(Apache Software Foundation) C:\Program Files (x86)\Spiceworks\httpd\bin\spiceworks-httpd.exe
(Apache Software Foundation) C:\Program Files (x86)\Spiceworks\httpd\bin\spiceworks-httpd.exe
(Microsoft Corporation) C:\Windows\System32\taskmgr.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
 
==================== Registry (Whitelisted) ====================
 
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
 
HKLM\...\Run: [VMware User Process] => C:\Program Files\VMware\VMware Tools\vmtoolsd.exe [74456 2014-08-22] (VMware, Inc.)
HKLM\...\Run: [Malwarebytes TrayApp] => C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\mbamtray.exe [2780112 2017-01-20] (Malwarebytes)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [587288 2016-09-22] (Oracle Corporation)
HKLM\...\Policies\Explorer: [ShowSuperHidden] 1
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\...\Run: [ApacheTomcatMonitor7.0_Tomcat7] => C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7w.exe [110208 2016-06-15] (Apache Software Foundation)
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\...\MountPoints2: {c74612c8-7f5a-11e4-8ca8-806e6f6e6963} - D:\setup64.exe
Lsa: [Notification Packages] scecli rassfm
GroupPolicyScripts: Restriction <======= ATTENTION
 
==================== Internet (Whitelisted) ====================
 
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
 
HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local: [ActivePolicy] SOFTWARE\Policies\Microsoft\Windows\IPSEC\Policy\Local\ipsecPolicy{ad68d919-0698-48a9-8d75-bb62408eecdd} <======= ATTENTION (Restriction - IP)
Tcpip\..\Interfaces\{53A2A791-43E5-4BD6-A895-776A52774BBB}: [NameServer] 192.168.220.44,192.168.254.21
 
Internet Explorer:
==================
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://www.msn.com/?ocid=iehp
BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\ssv.dll [2016-12-05] (Oracle Corporation)
BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\jp2ssv.dll [2016-12-05] (Oracle Corporation)
 
FireFox:
========
FF Plugin-x32: @java.com/DTPlugin,version=11.111.2 -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\dtplugin\npDeployJava1.dll [2016-12-05] (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=11.111.2 -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\plugin2\npjp2.dll [2016-12-05] (Oracle Corporation)
 
==================== Services (Whitelisted) ====================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
R2 ApacheHttpProxy; C:\Program Files\Apache HTTP Proxy\bin\httpd.exe [22528 2016-08-22] (Apache Software Foundation) [File not signed]
R2 EraAgentSvc; C:\Program Files\ESET\RemoteAdministrator\Agent\ERAAgent.exe [1708192 2016-07-01] (ESET)
R2 EraRDSensorSvc; C:\Program Files\ESET\Rogue Detection Sensor\RDSensor.exe [4387016 2016-06-10] (ESET)
R2 EraServerSvc; C:\Program Files\ESET\RemoteAdministrator\Server\ERAServer.exe [1642624 2016-07-14] (ESET)
S3 FCRegSvc; C:\Windows\system32\FCRegSvc.dll [25600 2009-07-13] (Microsoft Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe [4355024 2017-01-20] (Malwarebytes)
R2 MSSQL$ERASQL; C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\sqlservr.exe [370368 2014-02-21] (Microsoft Corporation)
S3 RSoPProv; C:\Windows\system32\RSoPProv.exe [91648 2009-07-13] (Microsoft Corporation)
S3 sacsvr; C:\Windows\system32\sacsvr.dll [14848 2009-07-13] (Microsoft Corporation)
R2 spiceworks; C:\Program Files (x86)\Spiceworks\bin\spiceworks.exe [48128 2016-09-15] (Spiceworks, Inc.)
S4 SQLAgent$ERASQL; C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\SQLAGENT.EXE [613056 2014-02-21] (Microsoft Corporation)
R2 Tomcat7; C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7.exe [86656 2016-06-15] (Apache Software Foundation)
U2 clr_optimization_v4.0.30339; C:\Windows\Fonts\sppsrv.exe --server [X]
 
===================== Drivers (Whitelisted) ======================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
R1 ESProtectionDriver; C:\Windows\system32\drivers\mbae64.sys [77440 2017-03-22] ()
S3 ioatdma; C:\Windows\System32\Drivers\qd260x64.sys [35328 2009-06-10] (Intel Corporation)
R2 MBAMChameleon; C:\Windows\system32\drivers\MBAMChameleon.sys [186304 2017-05-10] (Malwarebytes)
R3 MBAMFarflt; C:\Windows\system32\drivers\farflt.sys [111544 2017-05-11] (Malwarebytes)
R3 MBAMProtection; C:\Windows\system32\drivers\mbam.sys [43968 2017-05-11] (Malwarebytes)
R0 MBAMSwissArmy; C:\Windows\System32\drivers\MBAMSwissArmy.sys [251832 2017-05-11] (Malwarebytes)
R3 MBAMWebProtection; C:\Windows\system32\drivers\mwac.sys [82720 2017-05-11] (Malwarebytes)
R2 npf; C:\Windows\System32\drivers\npf.sys [35344 2012-05-03] (CACE Technologies, Inc.)
S4 RsFx0300; C:\Windows\System32\DRIVERS\RsFx0300.sys [247488 2014-02-21] (Microsoft Corporation)
S0 sacdrv; C:\Windows\System32\DRIVERS\sacdrv.sys [96320 2009-07-13] (Microsoft Corporation)
U3 TrueSight; C:\Windows\System32\drivers\TrueSight.sys [28272 2017-05-10] ()
R2 VMMEMCTL; C:\Program Files\Common Files\VMware\Drivers\memctl\vmmemctl.sys [22744 2014-08-22] (VMware, Inc.)
S3 vmxnet3ndis6; C:\Windows\System32\DRIVERS\vmxnet3n61x64.sys [82000 2014-08-22] (VMware, Inc.)
R0 vsock; C:\Windows\System32\drivers\vsock.sys [73944 2014-02-10] (VMware, Inc.)
 
==================== NetSvcs (Whitelisted) ===================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
NETSVC: sacsvr -> C:\Windows\system32\sacsvr.dll (Microsoft Corporation)
 
==================== One Month Created files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2017-05-11 06:59 - 2017-05-11 07:00 - 00008920 _____ C:\Users\Administrator\Downloads\FRST.txt
2017-05-11 06:59 - 2017-05-11 06:59 - 00000000 ____D C:\FRST
2017-05-11 06:58 - 2017-05-11 06:58 - 02429440 _____ (Farbar) C:\Users\Administrator\Downloads\FRST64.exe
2017-05-11 06:40 - 2017-05-11 07:00 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\2
2017-05-11 06:31 - 2017-05-11 06:37 - 00000000 ____D C:\ProgramData\HitmanPro
2017-05-11 06:31 - 2017-05-11 06:32 - 11583584 _____ (SurfRight B.V.) C:\Users\Administrator\Desktop\hitmanpro_x64.exe
2017-05-10 16:23 - 2017-05-10 16:23 - 00998270 _____ C:\Users\Administrator\Downloads\ProcessMonitor.zip
2017-05-10 15:54 - 2017-05-10 15:54 - 00028272 _____ C:\Windows\system32\Drivers\TrueSight.sys
2017-05-10 15:54 - 2017-05-10 15:54 - 00000858 _____ C:\Users\Public\Desktop\RogueKiller.lnk
2017-05-10 15:54 - 2017-05-10 15:54 - 00000000 ____D C:\ProgramData\RogueKiller
2017-05-10 15:54 - 2017-05-10 15:54 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RogueKiller
2017-05-10 15:54 - 2017-05-10 15:54 - 00000000 ____D C:\Program Files\RogueKiller
2017-05-10 14:17 - 2017-05-11 06:45 - 00082720 _____ (Malwarebytes) C:\Windows\system32\Drivers\mwac.sys
2017-05-10 14:17 - 2017-05-11 06:38 - 00251832 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2017-05-10 14:17 - 2017-05-11 06:38 - 00111544 _____ (Malwarebytes) C:\Windows\system32\Drivers\farflt.sys
2017-05-10 14:17 - 2017-05-11 06:38 - 00043968 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbam.sys
2017-05-10 14:17 - 2017-05-10 14:17 - 00186304 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMChameleon.sys
2017-05-10 14:17 - 2017-05-10 14:17 - 00001867 _____ C:\Users\Public\Desktop\Malwarebytes.lnk
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\ProgramData\Malwarebytes
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\Program Files\Malwarebytes
2017-05-10 14:17 - 2017-03-22 11:02 - 00077440 _____ C:\Windows\system32\Drivers\mbae64.sys
 
==================== One Month Modified files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2017-05-11 06:48 - 2009-07-14 00:49 - 00021328 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2017-05-11 06:48 - 2009-07-14 00:49 - 00021328 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2017-05-11 06:41 - 2014-12-08 16:38 - 00000200 _____ C:\Windows\system32\config\netlogon.ftl
2017-05-11 06:41 - 2009-07-14 01:06 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2017-05-11 06:38 - 2009-07-13 23:20 - 00000000 ____D C:\Windows\Registration
2017-05-10 14:42 - 2009-07-14 01:06 - 00012420 _____ C:\Windows\Tasks\SCHEDLGU.TXT
 
==================== Files in the root of some directories =======
 
2014-12-09 00:30 - 2014-12-09 00:30 - 0415130 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistMSI2C11.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0421596 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistMSI2C38.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0011706 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistUI2C11.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0011658 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistUI2C38.txt
 
==================== Bamital & volsnap ======================
 
(There is no automatic fix for files that do not pass verification.)
 
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\dnsapi.dll => File is digitally signed
C:\Windows\SysWOW64\dnsapi.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed
 
LastRegBack: 2017-05-03 00:41
 
==================== End of FRST.txt ============================
 
 
 
 
 
 
We are in a Windows domain, running mostly Server 2008R2 (also, mostly all VMWare). Thanks for taking that time to help us.
 
 
Respectfully,
 
Corey

Attached Files



BC AdBot (Login to Remove)

 


#2 cash4

cash4
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:47 AM

Posted 11 May 2017 - 08:59 AM

Just as a bit more information, below is the content of the Miner file (s160._Miner_.log):

 

[2017-05-11 08:51:07] Using JSON-RPC 2.0
[2017-05-11 08:51:07] Starting Stratum on stratum+tcp://xmr.crypto-pool.fr:443
[2017-05-11 08:51:07] 1 miner threads started, using 'cryptonight' algorithm.
[2017-05-11 08:51:08] Pool set diff to 18000
[2017-05-11 08:51:08] Stratum detected new block
[2017-05-11 08:40:07] Stratum detected new block
[2017-05-11 08:42:07] Stratum connection timed out
[2017-05-11 08:42:07] Stratum connection interrupted
[2017-05-11 08:42:07] Stratum detected new block
[2017-05-11 08:42:31] accepted: 1/1 (100.00%), 47.38 H/s at diff 18000 (yay!!!)
[2017-05-11 08:44:04] Stratum detected new block
[2017-05-11 08:45:50] accepted: 2/2 (100.00%), 45.79 H/s at diff 18000 (yay!!!)
[2017-05-11 08:46:40] Stratum detected new block
[2017-05-11 08:48:22] Stratum detected new block
[2017-05-11 08:49:03] Stratum detected new block
[2017-05-11 08:49:56] Stratum detected new block
[2017-05-11 08:50:23] Stratum detected new block
[2017-05-11 08:50:33] Stratum detected new block
[2017-05-11 08:52:15] Stratum detected new block
[2017-05-11 08:53:08] Stratum detected new block
[2017-05-11 08:53:24] Stratum detected new block
[2017-05-11 08:54:56] accepted: 3/3 (100.00%), 44.95 H/s at diff 18000 (yay!!!)
[2017-05-11 08:56:56] Stratum connection timed out
[2017-05-11 08:56:56] Stratum connection interrupted
[2017-05-11 08:56:56] Stratum detected new block
[2017-05-11 08:57:02] Stratum detected new block
[2017-05-11 08:57:44] accepted: 4/4 (100.00%), 64.10 H/s at diff 18000 (yay!!!)
[2017-05-11 08:59:44] Stratum connection timed out
[2017-05-11 08:59:44] Stratum connection interrupted
[2017-05-11 08:59:59] Stratum detected new block
[2017-05-11 09:00:29] accepted: 5/5 (100.00%), 46.30 H/s at diff 18000 (yay!!!)
[2017-05-11 09:01:16] Stratum detected new block
[2017-05-11 09:03:16] Stratum connection timed out
[2017-05-11 09:03:16] Stratum connection interrupted
[2017-05-11 09:03:31] Stratum detected new block
[2017-05-11 09:05:31] Stratum detected new block
[2017-05-11 09:05:52] Stratum detected new block
[2017-05-11 09:07:52] Stratum connection timed out
[2017-05-11 09:07:52] Stratum connection interrupted
[2017-05-11 09:08:07] Stratum detected new block
[2017-05-11 09:10:07] Stratum connection timed out
[2017-05-11 09:10:07] Stratum connection interrupted
[2017-05-11 09:10:22] Stratum detected new block
[2017-05-11 09:10:49] Stratum detected new block
[2017-05-11 09:12:10] accepted: 6/6 (100.00%), 46.15 H/s at diff 18000 (yay!!!)
[2017-05-11 09:12:22] Stratum detected new block
[2017-05-11 09:14:22] Stratum connection timed out
[2017-05-11 09:14:22] Stratum connection interrupted
[2017-05-11 09:14:37] Stratum detected new block
[2017-05-11 09:14:40] Stratum detected new block
[2017-05-11 09:16:40] Stratum connection timed out
[2017-05-11 09:16:40] Stratum connection interrupted
[2017-05-11 09:16:55] Stratum detected new block
[2017-05-11 09:17:15] Stratum detected new block
[2017-05-11 09:18:06] Stratum detected new block
[2017-05-11 09:18:38] Stratum detected new block
[2017-05-11 09:19:03] Stratum detected new block
[2017-05-11 09:19:54] accepted: 7/7 (100.00%), 46.20 H/s at diff 18000 (yay!!!)
[2017-05-11 09:20:06] Stratum detected new block
[2017-05-11 09:21:18] accepted: 8/8 (100.00%), 45.83 H/s at diff 18000 (yay!!!)
[2017-05-11 09:23:18] Stratum connection timed out
[2017-05-11 09:23:18] Stratum connection interrupted
[2017-05-11 09:23:33] Stratum detected new block
[2017-05-11 09:24:23] accepted: 9/9 (100.00%), 45.81 H/s at diff 18000 (yay!!!)
[2017-05-11 09:26:23] Stratum connection timed out
[2017-05-11 09:26:23] Stratum connection interrupted
[2017-05-11 09:26:38] Stratum detected new block
[2017-05-11 09:26:58] Stratum detected new block
[2017-05-11 09:28:58] Stratum connection timed out
[2017-05-11 09:28:58] Stratum connection interrupted
[2017-05-11 09:28:58] Stratum detected new block
[2017-05-11 09:30:44] Stratum detected new block
[2017-05-11 09:31:23] accepted: 10/10 (100.00%), 44.97 H/s at diff 18000 (yay!!!)
[2017-05-11 09:33:08] accepted: 11/11 (100.00%), 45.97 H/s at diff 18000 (yay!!!)
[2017-05-11 09:33:25] Stratum detected new block
[2017-05-11 09:34:03] accepted: 12/12 (100.00%), 44.58 H/s at diff 18000 (yay!!!)
[2017-05-11 09:35:12] Stratum detected new block
[2017-05-11 09:37:12] Stratum connection timed out
[2017-05-11 09:37:12] Stratum connection interrupted
[2017-05-11 09:37:13] Stratum detected new block
[2017-05-11 09:37:39] Stratum detected new block
[2017-05-11 09:39:39] Stratum connection timed out
[2017-05-11 09:39:39] Stratum connection interrupted
[2017-05-11 09:39:39] Stratum detected new block
[2017-05-11 09:39:57] Stratum detected new block
[2017-05-11 09:40:45] Stratum detected new block
[2017-05-11 09:41:29] Stratum detected new block
[2017-05-11 09:43:29] Stratum connection timed out
[2017-05-11 09:43:29] Stratum connection interrupted
[2017-05-11 09:43:29] Stratum detected new block
[2017-05-11 09:45:29] Stratum detected new block
[2017-05-11 09:47:28] Stratum connection timed out
[2017-05-11 09:47:28] Stratum connection interrupted
[2017-05-11 09:47:32] Stratum detected new block
[2017-05-11 09:49:21] Stratum detected new block
[2017-05-11 09:51:02] Stratum detected new block
[2017-05-11 09:51:42] Stratum detected new block
[2017-05-11 09:53:42] Stratum connection timed out
[2017-05-11 09:53:42] Stratum connection interrupted
[2017-05-11 09:53:44] Stratum detected new block
[2017-05-11 09:55:36] stratum_recv_line failed
[2017-05-11 09:55:36] Stratum connection interrupted
[2017-05-11 09:55:36] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:55:36] ...retry after 10 seconds
[2017-05-11 09:55:46] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:55:46] ...retry after 10 seconds
[2017-05-11 09:55:56] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:55:56] ...retry after 10 seconds
[2017-05-11 09:56:06] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:06] ...retry after 10 seconds
[2017-05-11 09:56:16] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:16] ...retry after 10 seconds
[2017-05-11 09:56:26] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:26] ...retry after 10 seconds
[2017-05-11 09:56:36] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:36] ...retry after 10 seconds
[2017-05-11 09:56:46] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:46] ...retry after 10 seconds
[2017-05-11 09:56:56] Stratum connection failed: Couldn't resolve host 'xmr.crypto-pool.fr'
[2017-05-11 09:56:56] ...retry after 10 seconds
 
 
Thanks again.


#3 cash4

cash4
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:47 AM

Posted 11 May 2017 - 02:59 PM

Another update. I just realized the "sw_*" files are from Spiceworks (which this server is running). That doesn't change the rest of the post though. Sorry for the confusion. Thanks.



#4 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,665 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:47 AM

Posted 16 May 2017 - 06:20 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> https://www.bleepingcomputer.com/logreply/646362 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new FRST log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download FRST by Farbar from the following link if you no longer have it available and save it to your destop.

    FRST Download Link

  • When you go to the above page, there will be 32-bit and 64-bit downloads available. Please click on the appropriate one for your version of Windows. If you are unsure as to whether your Windows is 32-bit or 64-bit, please see this tutorial.
  • Double click on the FRST icon and allow it to run.
  • Agree to the usage agreement and FRST will open. Do not make any changes and click on the Scan button.
  • Notepad will open with the results.
  • Post the new logs as explained in the prep guide.
  • Close the program window, and delete the program from your desktop.


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#5 cash4

cash4
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:04:47 AM

Posted 16 May 2017 - 06:52 AM

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
    • The original description was not quite accurate, but my follow-on replies should have cleared it up a bit.
    • From the first FRST.txt, I noticed that this trojan creates an IPSec connection as well as the files/executable's in the Temp folder.
  • new FRST log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Will be pasted at the end.
  • Please tell us if you have your original Windows CD/DVD available. 
    • I do have an original install ISO for this VM
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.
    • Thanks

 

 

 

 

 

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 08-05-2017
Ran by Administrator (administrator) on MRI-SNOOPY (16-05-2017 07:32:19)
Running from C:\Users\Administrator\Downloads
Loaded Profiles: Administrator (Available Profiles: Administrator)
Platform: Windows Server 2008 R2 Standard Service Pack 1 (X64) Language: English (United States)
Internet Explorer Version 11 (Default browser: IE)
Boot Mode: Normal
 
==================== Processes (Whitelisted) =================
 
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
 
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\httpd.exe
(ESET) C:\Program Files\ESET\RemoteAdministrator\Agent\ERAAgent.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\rotatelogs.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\httpd.exe
(ESET) C:\Program Files\ESET\Rogue Detection Sensor\RDSensor.exe
(Microsoft Corporation) C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\sqlservr.exe
(Apache Software Foundation) C:\Program Files\Apache HTTP Proxy\bin\rotatelogs.exe
(Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe
(Microsoft Corporation) C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
(Apache Software Foundation) C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7.exe
(VMware, Inc.) C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
(Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(VMware, Inc.) C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
(Malwarebytes) C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe
(Apache Software Foundation) C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7w.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(ESET) C:\Program Files\ESET\RemoteAdministrator\Server\ERAServer.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
 
==================== Registry (Whitelisted) ====================
 
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
 
HKLM\...\Run: [VMware User Process] => C:\Program Files\VMware\VMware Tools\vmtoolsd.exe [74456 2014-08-22] (VMware, Inc.)
HKLM\...\Run: [Malwarebytes TrayApp] => C:\PROGRAM FILES\MALWAREBYTES\ANTI-MALWARE\mbamtray.exe [2780112 2017-01-20] (Malwarebytes)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [587288 2016-09-22] (Oracle Corporation)
HKLM\...\Policies\Explorer: [ShowSuperHidden] 1
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\...\Run: [ApacheTomcatMonitor7.0_Tomcat7] => C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7w.exe [110208 2016-06-15] (Apache Software Foundation)
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\...\MountPoints2: {c74612c8-7f5a-11e4-8ca8-806e6f6e6963} - D:\setup64.exe
Lsa: [Notification Packages] scecli rassfm
GroupPolicyScripts: Restriction <======= ATTENTION
 
==================== Internet (Whitelisted) ====================
 
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
 
HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local: [ActivePolicy] SOFTWARE\Policies\Microsoft\Windows\IPSEC\Policy\Local\ipsecPolicy{ad68d919-0698-48a9-8d75-bb62408eecdd} <======= ATTENTION (Restriction - IP)
Tcpip\..\Interfaces\{53A2A791-43E5-4BD6-A895-776A52774BBB}: [NameServer] 192.168.220.44,192.168.254.21
 
Internet Explorer:
==================
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKU\S-1-5-21-3438914506-1603790579-2876071530-500\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://www.msn.com/?ocid=iehp
BHO-x32: Java™ Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\ssv.dll [2016-12-05] (Oracle Corporation)
BHO-x32: Java™ Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\jp2ssv.dll [2016-12-05] (Oracle Corporation)
 
FireFox:
========
FF Plugin-x32: @java.com/DTPlugin,version=11.111.2 -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\dtplugin\npDeployJava1.dll [2016-12-05] (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=11.111.2 -> C:\Program Files (x86)\Java\jre1.8.0_111\bin\plugin2\npjp2.dll [2016-12-05] (Oracle Corporation)
 
==================== Services (Whitelisted) ====================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
R2 ApacheHttpProxy; C:\Program Files\Apache HTTP Proxy\bin\httpd.exe [22528 2016-08-22] (Apache Software Foundation) [File not signed]
R2 EraAgentSvc; C:\Program Files\ESET\RemoteAdministrator\Agent\ERAAgent.exe [1708192 2016-07-01] (ESET)
R2 EraRDSensorSvc; C:\Program Files\ESET\Rogue Detection Sensor\RDSensor.exe [4387016 2016-06-10] (ESET)
R2 EraServerSvc; C:\Program Files\ESET\RemoteAdministrator\Server\ERAServer.exe [1642624 2016-07-14] (ESET)
S3 FCRegSvc; C:\Windows\system32\FCRegSvc.dll [25600 2009-07-13] (Microsoft Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe [4355024 2017-01-20] (Malwarebytes)
R2 MSSQL$ERASQL; C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\sqlservr.exe [370368 2014-02-21] (Microsoft Corporation)
S3 RSoPProv; C:\Windows\system32\RSoPProv.exe [91648 2009-07-13] (Microsoft Corporation)
S3 sacsvr; C:\Windows\system32\sacsvr.dll [14848 2009-07-13] (Microsoft Corporation)
S4 spiceworks; C:\Program Files (x86)\Spiceworks\bin\spiceworks.exe [48128 2016-09-15] (Spiceworks, Inc.)
S4 SQLAgent$ERASQL; C:\Program Files\Microsoft SQL Server\MSSQL12.ERASQLINSTANCEID\MSSQL\Binn\SQLAGENT.EXE [613056 2014-02-21] (Microsoft Corporation)
R2 Tomcat7; C:\Program Files (x86)\Apache Software Foundation\Tomcat 7.0\bin\Tomcat7.exe [86656 2016-06-15] (Apache Software Foundation)
U2 clr_optimization_v4.0.30339; C:\Windows\Fonts\sppsrv.exe --server [X]
S3 rpcapd; "%ProgramFiles(x86)%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles(x86)%\WinPcap\rpcapd.ini" [X]
 
===================== Drivers (Whitelisted) ======================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
R1 ESProtectionDriver; C:\Windows\system32\drivers\mbae64.sys [77440 2017-03-22] ()
S3 ioatdma; C:\Windows\System32\Drivers\qd260x64.sys [35328 2009-06-10] (Intel Corporation)
R2 MBAMChameleon; C:\Windows\system32\drivers\MBAMChameleon.sys [186304 2017-05-10] (Malwarebytes)
R3 MBAMFarflt; C:\Windows\system32\drivers\farflt.sys [111544 2017-05-16] (Malwarebytes)
R3 MBAMProtection; C:\Windows\system32\drivers\mbam.sys [43968 2017-05-16] (Malwarebytes)
R0 MBAMSwissArmy; C:\Windows\System32\drivers\MBAMSwissArmy.sys [251832 2017-05-16] (Malwarebytes)
R3 MBAMWebProtection; C:\Windows\system32\drivers\mwac.sys [82720 2017-05-16] (Malwarebytes)
S4 RsFx0300; C:\Windows\System32\DRIVERS\RsFx0300.sys [247488 2014-02-21] (Microsoft Corporation)
S0 sacdrv; C:\Windows\System32\DRIVERS\sacdrv.sys [96320 2009-07-13] (Microsoft Corporation)
U3 TrueSight; C:\Windows\System32\drivers\TrueSight.sys [28272 2017-05-11] ()
R2 VMMEMCTL; C:\Program Files\Common Files\VMware\Drivers\memctl\vmmemctl.sys [22744 2014-08-22] (VMware, Inc.)
S3 vmxnet3ndis6; C:\Windows\System32\DRIVERS\vmxnet3n61x64.sys [82000 2014-08-22] (VMware, Inc.)
R0 vsock; C:\Windows\System32\drivers\vsock.sys [73944 2014-02-10] (VMware, Inc.)
 
==================== NetSvcs (Whitelisted) ===================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
NETSVC: sacsvr -> C:\Windows\system32\sacsvr.dll (Microsoft Corporation)
 
==================== One Month Created files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2017-05-11 14:08 - 2017-05-11 14:09 - 00002058 _____ C:\Users\Administrator\Desktop\Rkill.txt
2017-05-11 14:08 - 2017-05-11 14:08 - 02030536 _____ (Bleeping Computer, LLC) C:\Users\Administrator\Downloads\rkill.exe
2017-05-11 14:04 - 2017-05-16 07:32 - 00000000 ____D C:\Users\Administrator\AppData\Local\Temp\1
2017-05-11 14:02 - 2017-05-11 14:06 - 00000000 ____D C:\AdwCleaner
2017-05-11 14:00 - 2017-05-11 14:00 - 00003268 _____ C:\Users\Administrator\Desktop\JRT.txt
2017-05-11 13:58 - 2017-05-11 13:58 - 01663672 _____ (Malwarebytes) C:\Users\Administrator\Downloads\JRT.exe
2017-05-11 12:59 - 2017-05-11 12:59 - 00001786 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wireshark.lnk
2017-05-11 12:57 - 2017-05-11 12:59 - 00000000 ____D C:\Program Files\Wireshark
2017-05-11 12:57 - 2017-05-11 12:57 - 00001613 _____ C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Wireshark Legacy.lnk
2017-05-11 12:53 - 2017-05-11 12:53 - 49385272 _____ (Wireshark development team) C:\Users\Administrator\Downloads\Wireshark-win64-2.2.6.exe
2017-05-11 12:53 - 2017-05-11 12:53 - 00000000 ____D C:\Users\Administrator\AppData\Roaming\Wireshark
2017-05-11 12:51 - 2017-05-11 12:51 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap
2017-05-11 12:49 - 2017-05-11 12:49 - 00000000 ____D C:\ProgramData\Package Cache
2017-05-11 08:42 - 2017-05-11 08:42 - 00001413 _____ C:\Users\cash-admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
2017-05-11 08:07 - 2017-05-11 08:07 - 00003942 _____ C:\Users\Administrator\Documents\bad.reg
2017-05-11 07:00 - 2017-05-11 07:00 - 00026444 _____ C:\Users\Administrator\Downloads\Addition.txt
2017-05-11 06:59 - 2017-05-16 07:32 - 00008388 _____ C:\Users\Administrator\Downloads\FRST.txt
2017-05-11 06:59 - 2017-05-16 07:32 - 00000000 ____D C:\FRST
2017-05-11 06:58 - 2017-05-11 06:58 - 02429440 _____ (Farbar) C:\Users\Administrator\Downloads\FRST64.exe
2017-05-11 06:31 - 2017-05-11 06:37 - 00000000 ____D C:\ProgramData\HitmanPro
2017-05-11 06:31 - 2017-05-11 06:32 - 11583584 _____ (SurfRight B.V.) C:\Users\Administrator\Desktop\hitmanpro_x64.exe
2017-05-10 16:23 - 2017-05-10 16:23 - 00998270 _____ C:\Users\Administrator\Downloads\ProcessMonitor.zip
2017-05-10 15:54 - 2017-05-11 08:52 - 00028272 _____ C:\Windows\system32\Drivers\TrueSight.sys
2017-05-10 15:54 - 2017-05-11 08:26 - 00000000 ____D C:\ProgramData\RogueKiller
2017-05-10 15:54 - 2017-05-10 15:54 - 00000858 _____ C:\Users\Public\Desktop\RogueKiller.lnk
2017-05-10 15:54 - 2017-05-10 15:54 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RogueKiller
2017-05-10 15:54 - 2017-05-10 15:54 - 00000000 ____D C:\Program Files\RogueKiller
2017-05-10 14:17 - 2017-05-16 07:27 - 00251832 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2017-05-10 14:17 - 2017-05-16 07:27 - 00111544 _____ (Malwarebytes) C:\Windows\system32\Drivers\farflt.sys
2017-05-10 14:17 - 2017-05-16 07:27 - 00082720 _____ (Malwarebytes) C:\Windows\system32\Drivers\mwac.sys
2017-05-10 14:17 - 2017-05-16 07:27 - 00043968 _____ (Malwarebytes) C:\Windows\system32\Drivers\mbam.sys
2017-05-10 14:17 - 2017-05-10 14:17 - 00186304 _____ (Malwarebytes) C:\Windows\system32\Drivers\MBAMChameleon.sys
2017-05-10 14:17 - 2017-05-10 14:17 - 00001867 _____ C:\Users\Public\Desktop\Malwarebytes.lnk
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\ProgramData\Malwarebytes
2017-05-10 14:17 - 2017-05-10 14:17 - 00000000 ____D C:\Program Files\Malwarebytes
2017-05-10 14:17 - 2017-03-22 11:02 - 00077440 _____ C:\Windows\system32\Drivers\mbae64.sys
 
==================== One Month Modified files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2017-05-16 07:27 - 2009-07-14 01:06 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2017-05-16 07:27 - 2009-07-13 23:20 - 00000000 ____D C:\Windows\Registration
2017-05-11 14:58 - 2009-07-14 00:49 - 00021328 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2017-05-11 14:58 - 2009-07-14 00:49 - 00021328 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2017-05-11 14:07 - 2014-12-08 16:38 - 00000200 _____ C:\Windows\system32\config\netlogon.ftl
2017-05-11 12:59 - 2014-12-08 17:53 - 00000000 ____D C:\Program Files\WinPcap
2017-05-11 08:42 - 2015-10-08 08:26 - 00000000 ____D C:\Users\cash-admin
2017-05-11 08:17 - 2009-07-14 01:42 - 00067584 ____S C:\Windows\bootstat_bad.dat
2017-05-10 14:42 - 2009-07-14 01:06 - 00013670 _____ C:\Windows\Tasks\SCHEDLGU.TXT
 
==================== Files in the root of some directories =======
 
2014-12-09 00:30 - 2014-12-09 00:30 - 0415130 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistMSI2C11.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0421596 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistMSI2C38.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0011706 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistUI2C11.txt
2014-12-09 00:30 - 2014-12-09 00:30 - 0011658 _____ () C:\Users\Administrator\AppData\Local\dd_vcredistUI2C38.txt
 
Some files in TEMP:
====================
2017-05-11 14:46 - 2017-05-11 14:46 - 1165984 ____H (Sysinternals - www.sysinternals.com) C:\Users\Administrator\AppData\Local\Temp\1\Procmon64.exe
 
==================== Bamital & volsnap ======================
 
(There is no automatic fix for files that do not pass verification.)
 
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\dnsapi.dll => File is digitally signed
C:\Windows\SysWOW64\dnsapi.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed
 
LastRegBack: 2017-05-03 00:41
 

 

==================== End of FRST.txt ============================

Attached Files



#6 Tenis

Tenis

    Bleepin' FX


  • Malware Study Hall Senior
  • 1,219 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:02:17 PM

Posted 29 May 2017 - 10:08 AM

Hi cash4,

 

Sorry for delay in response.

 

Do you still need help? If yes,

Please post fresh FRST log.

 

Farbar's Recovery Scan Tool

--------------------------------

  • Double click on FRST.exe.
  • Make sure Addition.txt is checked.Then press the Scan button
  • When completed tool will create a log on same directory as FRST.exe called FRST.txt & Addition.txt. Please copy and paste the contents of the file in your reply.


#7 Tenis

Tenis

    Bleepin' FX


  • Malware Study Hall Senior
  • 1,219 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:02:17 PM

Posted 04 June 2017 - 10:14 AM

It's been long time.

If we don't get reply within 24 hours,this topic will be closed.



#8 Machiavelli

Machiavelli

    Agent 007


  • Malware Response Instructor
  • 4,011 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Germany
  • Local time:03:47 AM

Posted 06 June 2017 - 02:38 PM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

~Machiavelli

If I don't reply within 24 hours please PM me!

  • Every topic with no replies within 5 days will be closed.
  • If you like my help here please give me feedback.

unite_blue.png
 
 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users