Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Intel PC on a stick being remotely accessed sys32 files being replaced

  • This topic is locked This topic is locked
1 reply to this topic

#1 Nickp71


  • Members
  • 9 posts
  • Gender:Male
  • Local time:06:02 PM

Posted 21 July 2017 - 02:14 PM

HI There, I have some really strange behaviour going on at the moment - firstly, my Surface Pro 4 just BSOD and wouldn't o up again so after being on the phone to MS support they are replacing the whole device . I noticed that my network was very slow so I reset my router / flashed nd added a TPLIBK R600 VPN router with SPI firewall runing and Im currently using an Intel PC on a stick STK1AW32SC that Ive now reloaded windows 3 times as it too is behaving in a manner that is not at all logical or normal Even typing now it is missing words out and I only have one browser window open! Im running ESET Internet Security with some pretty tight rules in place however, the machine is showing outbound TCP & UDP connections on a whole array of ports from 61000-65923 (System Process) 49666-49669 (svchost) and the 'system'PID 4 has a local IP connected of when my local IP range is to Services that I keep disabling are re-inabling by themself and the mouse will even move by itself even though I check and it states im running in console 0. I compltely formatted the drive and ran a freshly downloaded copy of Win 10 Home from a fresh USB drive. Yet it still created a hidden directory called $SYSReset that has some log files and a directory called 'scratch' that has a csrss.exe in it. There are many other strange things going on and I wold really appreciate some assistance resolving this issue. I am convinced that the attack happens on the internal network first before going out to the internet letting whomever know that Im here and ready to be pissed off again... Ive locked down the 4 routers ive gone through over the past 12 months so strongly that it has to be occuring internally....we do have 3 Sony TV's connected to the network - 2 are the older type Bravia's with somesort of Linux distro running on them and the other one is Andriod - ive re-set the Andriod and disbaled things like bluetooth and wireless (all cable connections) but I have noticed that it does have alot of traffic on the port its on the switch even when its in standby mode. When I was looking at open ports on the PC Stick tonight I saw the Android IP address come up a couple of times ...not sure what it was doing. I have bound all the MAC addresses of the networked devices via ARP binding but as soon as I disconnect a device something else with a spoofed MAC address will get the device I have removed IP address and when I connect the device again it gets a totally different IP address. I am desperate for some help with working out what is going on.....thanks heaps


PS...To add to this actual executables like eset.exe are changing names to dllhost.exe - ICMP redirect is also switched on by itself.


Another thing that is occuring - when I have disabled Bluetooth in Bios and do a full power down and boot pressing F4 (which is to get into Bios Recovery) some yellow text appears before anything else that says 'Pairing with Bluetooth Device' - this is even before the BIOS settings load....


I ran HiJack This and below is the startuplist tool:


StartupList report, 22/07/2017, 3:54:29 AM
StartupList version: 1.52.2
Started from : C:\HiJackthis\HijackThis.EXE
Detected: Unknown Windows (WinNT 6.02.1008)
Detected: Internet Explorer v11.0 (11.00.15063.0000)
* Using default options
* Showing rarely important sections

Running processes:

C:\Program Files\ESET\ESET Security\egui.exe
C:\Program Files\Windows Defender\MSASCuiL.exe
C:\Program Files\Zemana AntiMalware\ZAM.exe
C:\Program Files\Tweaking.com\Technicians Toolbox\Technicians_Toolbox.exe
C:\Program Files\Tweaking.com\Windows Repair (All in One)\WR_Tray_Icon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\WindowsApps\Microsoft.WindowsStore_11705.1001.21.0_x86__8wekyb3d8bbwe\WinStore.App.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera_crashreporter.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Opera\46.0.2597.57\opera.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe


Checking Windows NT UserInit:

[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
UserInit = C:\WINDOWS\system32\userinit.exe,


Autorun entries from Registry:

ZAM = "C:\Program Files\Zemana AntiMalware\ZAM.exe" /minimized


File association entry for .HTA:

(Default) = C:\Windows\System32\mshta.exe "%1" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}%U{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} %*


Enumerating Active Setup stub paths:
HKLM\Software\Microsoft\Active Setup\Installed Components
(* = disabled by HKCU twin)

StubPath = %SystemRoot%\system32\unregmp2.exe /ShowWMP

[{2C7339CF-2B09-4501-B3F3-F3508C9228ED}] *
StubPath = /UserInstall

[{44BBA840-CC51-11CF-AAFA-00AA00B6015C}] *
StubPath = "%ProgramFiles%\Windows Mail\WinMail.exe" OCInstallUserConfigOE

[{6BF52A52-394A-11d3-B153-00C04F79FAA6}] *
StubPath = %SystemRoot%\system32\unregmp2.exe /FirstLogon

[{89820200-ECBD-11cf-8B85-00AA005B4340}] *
StubPath = U

[{89820200-ECBD-11cf-8B85-00AA005B4383}] *
StubPath = C:\Windows\System32\ie4uinit.exe -UserConfig

[{89B4C1CD-B018-4511-B0A1-5476DBF70820}] *
StubPath = C:\Windows\System32\Rundll32.exe C:\Windows\System32\mscories.dll,Install


Load/Run keys from C:\WINDOWS\WIN.INI:

load=*INI section not found*
run=*INI section not found*

Load/Run keys from Registry:

HKLM\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKLM\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKLM\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKCU\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKCU\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\Windows: load=
HKCU\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: AppInit_DLLs=C:\PROGRA~1\KEYCRY~1\KEYCRY~3.DLL


Shell & screensaver key from C:\WINDOWS\SYSTEM.INI:

Shell=*INI section not found*
SCRNSAVE.EXE=*INI section not found*
drivers=*INI section not found*

Shell & screensaver key from Registry:

SCRNSAVE.EXE=*Registry value not found*
drivers=*Registry value not found*

Policies Shell key:

HKCU\..\Policies: Shell=*Registry key not found*
HKLM\..\Policies: Shell=*Registry value not found*


Checking for EXPLORER.EXE instances:

C:\WINDOWS\Explorer.exe: PRESENT!

C:\Explorer.exe: not present
C:\WINDOWS\Explorer\Explorer.exe: not present
C:\WINDOWS\System\Explorer.exe: not present
C:\WINDOWS\System32\Explorer.exe: not present
C:\WINDOWS\Command\Explorer.exe: not present
C:\WINDOWS\Fonts\Explorer.exe: not present


Checking for superhidden extensions:

.lnk: HIDDEN! (arrow overlay: yes)
.pif: HIDDEN! (arrow overlay: yes)
.exe: not hidden
.com: not hidden
.bat: not hidden
.hta: not hidden
.scr: not hidden
.shs: *Registry key not found*
.shb: *Registry key not found*
.vbs: not hidden
.vbe: not hidden
.wsh: not hidden
.scf: HIDDEN! (arrow overlay: NO!)
.url: HIDDEN! (arrow overlay: yes)
.js: not hidden
.jse: not hidden


Verifying REGEDIT.EXE integrity:

- Regedit.exe found in C:\WINDOWS
- .reg open command is normal (regedit.exe %1)
- Company name OK: 'Microsoft Corporation'
- Original filename NOT OK: 'REGEDIT.EXE.MUI'
- File description: 'Registry Editor'

Registry check failed!


Enumerating Winsock LSP files:

NameSpace #1: C:\WINDOWS\system32\napinsp.dll
NameSpace #2: C:\WINDOWS\system32\pnrpnsp.dll
NameSpace #3: C:\WINDOWS\system32\pnrpnsp.dll
NameSpace #4: C:\WINDOWS\system32\NLAapi.dll
NameSpace #7: C:\WINDOWS\System32\wshbth.dll


Enumerating Windows NT/2000/XP services

@%SystemRoot%\system32\AudioEndpointBuilder.dll,-204: %SystemRoot%\System32\svchost.exe -k LocalSystemNetworkRestricted (autostart)
@%SystemRoot%\system32\audiosrv.dll,-200: %SystemRoot%\System32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
@%SystemRoot%\system32\bfe.dll,-1001: %systemroot%\system32\svchost.exe -k LocalServiceNoNetwork (autostart)
@%windir%\system32\bisrv.dll,-100: %SystemRoot%\system32\svchost.exe -k DcomLaunch (autostart)
@%SystemRoot%\system32\cdpsvc.dll,-100: %SystemRoot%\system32\svchost.exe -k LocalService (autostart)
@%SystemRoot%\system32\cdpusersvc.dll,-100: %SystemRoot%\system32\svchost.exe -k UnistackSvcGroup (autostart)
Connected Devices Platform User Service_2a265: C:\WINDOWS\system32\svchost.exe -k UnistackSvcGroup (autostart)
Windows Cloud Files Filter Driver: system32\drivers\cldflt.sys (autostart)
@%SystemRoot%\system32\drivers\registry.sys,-100: \SystemRoot\System32\drivers\registry.sys (autostart)
@%SystemRoot%\system32\coremessaging.dll,-1: %SystemRoot%\system32\svchost.exe -k LocalServiceNoNetwork (autostart)
@%SystemRoot%\system32\cryptsvc.dll,-1001: %SystemRoot%\system32\svchost.exe -k NetworkService (autostart)
@combase.dll,-5012: %SystemRoot%\system32\svchost.exe -k DcomLaunch (autostart)
@%SystemRoot%\system32\dhcpcore.dll,-100: %SystemRoot%\system32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
@%SystemRoot%\system32\diagtrack.dll,-3001: %SystemRoot%\System32\svchost.exe -k utcsvc (autostart)
@%SystemRoot%\System32\dnsapi.dll,-101: %SystemRoot%\system32\svchost.exe -k NetworkService (autostart)
@%systemroot%\system32\dosvc.dll,-100: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
@%systemroot%\system32\dps.dll,-500: %SystemRoot%\System32\svchost.exe -k LocalServiceNoNetwork (autostart)
@%SystemRoot%\System32\dusmsvc.dll,-1: %SystemRoot%\System32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
ekbdflt: \SystemRoot\system32\DRIVERS\ekbdflt.sys (autostart)
ESET Service: "C:\Program Files\ESET\ESET Security\ekrn.exe" (autostart)
@%SystemRoot%\system32\wevtsvc.dll,-200: %SystemRoot%\System32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
@comres.dll,-2450: %SystemRoot%\system32\svchost.exe -k LocalService (autostart)
@%systemroot%\system32\FntCache.dll,-100: %SystemRoot%\system32\svchost.exe -k LocalService (autostart)
@gpapi.dll,-112: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
Intel® HD Graphics Control Panel Service: %SystemRoot%\system32\igfxCUIService.exe (autostart)
@%SystemRoot%\system32\iphlpsvc.dll,-500: %SystemRoot%\System32\svchost.exe -k NetSvcs (autostart)
@%systemroot%\system32\wkssvc.dll,-100: %SystemRoot%\System32\svchost.exe -k NetworkService (autostart)
@%SystemRoot%\system32\lltdres.dll,-6: system32\drivers\lltdio.sys (autostart)
@%windir%\system32\lsm.dll,-1001: %SystemRoot%\system32\svchost.exe -k DcomLaunch (autostart)
@%systemroot%\system32\drivers\luafv.sys,-100: \SystemRoot\system32\drivers\luafv.sys (autostart)
@%SystemRoot%\System32\moshost.dll,-100: %SystemRoot%\System32\svchost.exe -k NetworkService (autostart)
@%systemroot%\system32\drivers\mmcss.sys,-100: \SystemRoot\system32\drivers\mmcss.sys (autostart)
@%SystemRoot%\system32\FirewallAPI.dll,-23090: %SystemRoot%\system32\svchost.exe -k LocalServiceNoNetwork (autostart)
@%SystemRoot%\system32\drivers\mslldp.sys,-200: system32\drivers\mslldp.sys (autostart)
@%SystemRoot%\system32\drivers\Ndu.sys,-10001: system32\drivers\Ndu.sys (autostart)
@%SystemRoot%\System32\nlasvc.dll,-1: %SystemRoot%\System32\svchost.exe -k NetworkService (autostart)
@%SystemRoot%\system32\nsisvc.dll,-200: %systemroot%\system32\svchost.exe -k LocalService (autostart)
@%SystemRoot%\system32\APHostRes.dll,-10002: %SystemRoot%\system32\svchost.exe -k UnistackSvcGroup (autostart)
Sync Host_2a265: C:\WINDOWS\system32\svchost.exe -k UnistackSvcGroup (autostart)
Parvdm: \SystemRoot\System32\drivers\parvdm.sys (autostart)
PEAUTH: system32\drivers\peauth.sys (autostart)
@%SystemRoot%\system32\umpo.dll,-100: %SystemRoot%\system32\svchost.exe -k DcomLaunch (autostart)
@%systemroot%\system32\profsvc.dll,-300: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
@%windir%\system32\RpcEpMap.dll,-1001: %SystemRoot%\system32\svchost.exe -k RPCSS (autostart)
@combase.dll,-5010: %SystemRoot%\system32\svchost.exe -k rpcss (autostart)
@%SystemRoot%\system32\lltdres.dll,-5: system32\drivers\rspndr.sys (autostart)
@%SystemRoot%\system32\samsrv.dll,-1: %SystemRoot%\system32\lsass.exe (autostart)
@%SystemRoot%\system32\schedsvc.dll,-100: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
@%systemroot%\system32\SecurityHealthAgent.dll,-1002: %SystemRoot%\system32\SecurityHealthService.exe (autostart)
@%SystemRoot%\system32\Sens.dll,-200: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
@%SystemRoot%\System32\shsvcs.dll,-12288: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
@%systemroot%\system32\spoolsv.exe,-1: %SystemRoot%\System32\spoolsv.exe (autostart)
@%SystemRoot%\system32\sppsvc.exe,-101: %SystemRoot%\system32\sppsvc.exe (autostart)
@%SystemRoot%\System32\drivers\storqosflt.sys,-101: system32\drivers\storqosflt.sys (autostart)
@%SystemRoot%\system32\sysmain.dll,-1000: %systemroot%\system32\svchost.exe -k LocalSystemNetworkRestricted (autostart)
@%windir%\system32\SystemEventsBrokerServer.dll,-1001: %SystemRoot%\system32\svchost.exe -k DcomLaunch (autostart)
TCP/IP Registry Compatibility: System32\drivers\tcpipreg.sys (autostart)
@%SystemRoot%\System32\themeservice.dll,-8192: %SystemRoot%\System32\svchost.exe -k netsvcs (autostart)
@%SystemRoot%\system32\tileobjserver.dll,-1: %systemroot%\system32\svchost.exe -k appmodel (autostart)
@%SystemRoot%\system32\trkwks.dll,-1: %SystemRoot%\System32\svchost.exe -k LocalSystemNetworkRestricted (autostart)
@%systemroot%\system32\usermgr.dll,-100: %SystemRoot%\system32\svchost.exe -k netsvcs (autostart)
@%systemroot%\system32\mprmsg.dll,-32011: System32\DRIVERS\wanarp.sys (autostart)
@%systemroot%\system32\drivers\wcifs.sys,-100: \SystemRoot\system32\drivers\wcifs.sys (autostart)
@%SystemRoot%\System32\wcmsvc.dll,-4097: %SystemRoot%\system32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
@%Systemroot%\system32\wbem\wmisvc.dll,-205: %systemroot%\system32\svchost.exe -k netsvcs (autostart)
@%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101: "%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe" (autostart)
@%SystemRoot%\system32\WpnUserService.dll,-1: %SystemRoot%\system32\svchost.exe -k UnistackSvcGroup (autostart)
Windows Push Notifications User Service_2a265: C:\WINDOWS\system32\svchost.exe -k UnistackSvcGroup (autostart)
@%SystemRoot%\System32\wscsvc.dll,-200: %SystemRoot%\System32\svchost.exe -k LocalServiceNetworkRestricted (autostart)
ZAM Controller Service: "C:\Program Files\Zemana AntiMalware\ZAM.exe" /service (autostart)


Enumerating ShellServiceObjectDelayLoad items:

WebCheck: *Registry key not found*

End of report, 14,914 bytes
Report generated in 0.282 seconds

Command line options:
   /verbose  - to add additional info on each section
   /complete - to include empty sections and unsuspicious data
   /full     - to include several rarely-important sections
   /force9x  - to include Win9x-only startups even if running on WinNT
   /forcent  - to include WinNT-only startups even if running on Win9x
   /forceall - to include all Win9x and WinNT startups, regardless of platform
   /history  - to list version history only

Edited by Nickp71, 21 July 2017 - 03:08 PM.

BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,566 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:05:02 AM

Posted 21 July 2017 - 03:55 PM

Now that you are properly posted here....


you should NOT make further changes to your computer[/color][/b] (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.
Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.
The current wait time is 1 - 3 days and ALL logs are answered.
If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.
To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users