Jump to content

Recommended Posts

So i was checking my Task manager today and saw some weird foreign items. I decided to check my netstat and this popped up. Anything look suspicious to anyone?

 Proto  Local Address          Foreign Address        State
  TCP    127.0.0.1:49668        127.0.0.1:51484        ESTABLISHED
 [UserEdgeService.exe]
  TCP    127.0.0.1:51484        127.0.0.1:49668        ESTABLISHED
 [Haste.exe]
  TCP    127.0.0.1:59135        127.0.0.1:65001        ESTABLISHED
 [nvcontainer.exe]
  TCP    127.0.0.1:65001        127.0.0.1:59135        ESTABLISHED
 [nvcontainer.exe]
  TCP    192.168.1.33:51124     192.168.1.1:53         TIME_WAIT
  TCP    192.168.1.33:51125     40.101.121.34:443      ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:51126     72.21.91.29:80         ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:51452     34.232.149.233:5222    ESTABLISHED
 [System]
  TCP    192.168.1.33:51506     104.154.126.226:4070   ESTABLISHED
 [Spotify.exe]
  TCP    192.168.1.33:51529     35.186.224.47:443      ESTABLISHED
 [Spotify.exe]
  TCP    192.168.1.33:52063     52.242.211.89:443      ESTABLISHED
  WpnService
 [svchost.exe]
  TCP    192.168.1.33:52064     52.20.139.23:443       ESTABLISHED
 [System]
  TCP    192.168.1.33:52098     35.186.224.53:443      ESTABLISHED
 [Spotify.exe]
  TCP    192.168.1.33:52148     216.58.192.174:443     TIME_WAIT
  TCP    192.168.1.33:52157     192.168.1.188:8008     TIME_WAIT
  TCP    192.168.1.33:52197     192.168.1.188:8008     TIME_WAIT
  TCP    192.168.1.33:52200     52.230.222.68:443      ESTABLISHED
  WpnService
 [svchost.exe]
  TCP    192.168.1.33:52207     172.217.6.10:443       TIME_WAIT
  TCP    192.168.1.33:52209     52.84.64.84:443        TIME_WAIT
  TCP    192.168.1.33:52212     99.84.168.116:443      TIME_WAIT
  TCP    192.168.1.33:52218     216.58.192.174:443     TIME_WAIT
  TCP    192.168.1.33:52220     172.217.9.78:443       TIME_WAIT
  TCP    192.168.1.33:52227     13.249.134.79:443      TIME_WAIT
  TCP    192.168.1.33:52230     13.249.134.50:443      TIME_WAIT
  TCP    192.168.1.33:52231     34.95.92.78:443        TIME_WAIT
  TCP    192.168.1.33:52232     13.249.134.32:443      TIME_WAIT
  TCP    192.168.1.33:52233     13.249.134.32:443      TIME_WAIT
  TCP    192.168.1.33:52234     52.84.64.84:443        TIME_WAIT
  TCP    192.168.1.33:52256     54.87.31.36:443        TIME_WAIT
  TCP    192.168.1.33:52269     52.169.83.3:443        TIME_WAIT
  TCP    192.168.1.33:52301     40.69.216.129:443      TIME_WAIT
  TCP    192.168.1.33:52305     40.69.216.73:443       TIME_WAIT
  TCP    192.168.1.33:52308     40.69.222.109:443      TIME_WAIT
  TCP    192.168.1.33:52309     40.69.216.129:443      TIME_WAIT
  TCP    192.168.1.33:52310     40.69.223.198:443      TIME_WAIT
  TCP    192.168.1.33:52311     40.69.223.39:443       TIME_WAIT
  TCP    192.168.1.33:52314     52.169.82.131:443      TIME_WAIT
  TCP    192.168.1.33:52317     52.114.128.10:443      TIME_WAIT
  TCP    192.168.1.33:52321     157.240.2.35:443       TIME_WAIT
  TCP    192.168.1.33:52322     13.107.21.200:443      TIME_WAIT
  TCP    192.168.1.33:52323     13.90.95.14:443        TIME_WAIT
  TCP    192.168.1.33:52328     34.199.89.61:443       ESTABLISHED
 [System]
  TCP    192.168.1.33:52329     54.175.27.242:443      ESTABLISHED
 [System]
  TCP    192.168.1.33:52331     34.205.109.204:443     TIME_WAIT
  TCP    192.168.1.33:52332     52.31.122.12:443       CLOSE_WAIT
 [System]
  TCP    192.168.1.33:52333     52.0.195.152:443       CLOSE_WAIT
 [System]
  TCP    192.168.1.33:52334     52.21.102.187:443      ESTABLISHED
 [System]
  TCP    192.168.1.33:52335     204.79.197.200:443     ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52336     65.55.163.78:443       ESTABLISHED
  wlidsvc
 [svchost.exe]
  TCP    192.168.1.33:52337     65.55.163.78:443       ESTABLISHED
  wlidsvc
 [svchost.exe]
  TCP    192.168.1.33:52338     13.107.255.52:443      ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52339     13.107.255.51:443      ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52340     184.84.229.6:443       ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52341     204.79.197.222:443     ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52343     13.107.42.254:443      ESTABLISHED
 [SearchUI.exe]
  TCP    192.168.1.33:52344     72.21.81.200:443       ESTABLISHED
 [SearchUI.exe]

Share this post


Link to post
Share on other sites

Hi, 

My name is Maurice. I will be helping and guiding you, going forward on this case.

Task Manager displays is not a good way to make a judgement.

.

This Thread/topic is for member  navigations only.   If you are someone else, please do not use what follows.

 

We will start out here with a special run using the Malwarebytes anti-rootkit tool.

Please read all of these lines first so that it is all clear to you about our plan. I need a one time run of MBAR like listed here, please.

Please download Malwarebytes Anti-Rootkit (MBAR) from here this link

and save it to your desktop.

 

Doubleclick on the MBAR file and allow it to run.

•Click OK on the next screen, to allow the package to extract the contents of the file to its own folder named mbar.

•mbar.exe will launch automatically. On some systems, this may take a few extra seconds. Please be patient and wait for the program to open.

•After reading the Introduction, click 'Next' if you agree.

•On the Update Database screen, click on the 'Update' button.

•Once you see 'Success: Database was successfully updated' click on 'Next', then click the Scan button.

With some infections, you may see two messages boxes:

1.'Could not load protection driver'. Click 'OK'.
2.'Could not load DDA driver'. Click 'Yes' to this message, to allow the driver to load after a restart. Allow the computer to restart. Continue with the rest of these instructions.

•If malware is found, press the Cleanup button when the scan completes. .

Please attach the log it produces, you'll find the log in that mbar folder as MBAR-log-<date and time>***.txt . Please attach that to your next reply.
 

We will do more later.   As to your other Topic, we need to hold off on that.

Sincerely,

Maurice

Share this post


Link to post
Share on other sites

Thanks for the mbar log.  That is a fine clean result.  No I have yet to see anything odd.

Lets do a different scan.  This too should only take a few minutes.

Run a scan with Malwarebytes.
Start Malwarebytes from the Start menu.

Click Settings. Then click the Protection tab.
Scroll down and lets be sure the line in SCAN OPTIONs for "Scan for rootkits" is ON
Click it to get it ON


Click the SCAN button.
Select a Threat Scan ( which should be the default).

When the scan phase is done, if any items are tagged & shown, be real sure you Review and have all detected lines items check-marked on each line on the left. That too is very critical.

Then click on Quarantine selected.

 

Be sure all items were removed.


When that is completed, kindly send the report.
In Malwarebytes.
Click the Reports button ( on the left )
Look for the "Scan Report" that has the most recent Date and time.

When located, click the check box for it and click on View Report.
Then click the Export button at the bottom left.
Then select Text File (*.txt)

Put in a name for that file and remember where the file is created.

Then attach that file with your email. Thank you.

.

 

Share this post


Link to post
Share on other sites

I was just playing video games with my friend, and I checked my hidden icons menu to shut any backrounds progams off. When checking this I saw something called D3DProxyWindows and it seems like it is recording my voice. Wtf lol

Screenshot (9).png

Screenshot (10).png

Share this post


Link to post
Share on other sites

You did not say just where exactly you saw D3Dproxywindows.   Can you provide detail on that?

# 2, if you think your microphone is compromised, click the setting to OFF on the "acess to the microphoe"

# 3.  Please stop playing games.  Lets hold off on games, web surfing etc  until after we finish all tasks at hand.

# 4.  Lets please do the scan with Malwarbytes like I last suggested.

Share this post


Link to post
Share on other sites

Ok. I turned off my michrophone and am waiting for the scan results. I originally found the logo in the bottom right but since I turned off my michrophone it has since gone away. Was this an overreaction do you think? 

Share this post


Link to post
Share on other sites

Yes, it likely is a over reaction.  My main suggestion, as I stated, is to not use the computer for games and the likes.  I am trying to have you run checks to see if there is a infection.

Share this post


Link to post
Share on other sites

Thanks for the report.

This last scan shows no malware.  No P U P.   It seems the pc is good to go.  I see the Malwarebytes is a Trial mode one.  Having Malwarebytes Pfremium would provide it permanent real-time protections.

Now then, seeing that this pc runs Windows 10, you should be able to scan with Malwarebytes Windows Defender.

Windows 10 has the Microsoft Windows Defender which can run the Windows Defender Offline scan.
Windows Defender Offline in Windows 10 can be run directly from within Windows, without having to create bootable media.

Click the Windows Start menu button on the Taskbar, select Settings icon. Then choose Update and Security.
Then look on the right hand side and click on Windows Defender.
Then, scroll all the way down on the scroll bar, down to where you see "Windows Defender Offline"
Click on the button Scan Offline to start the process and let it scan the system.

Keep in mind that the design and what is scanned by Windows Defender is a whole different design from Malwarebytes. But do let me know how this scan goes and what the result is.

If this run finds no infections, we can plan to close this case.

Sincerely,

Maurice

Share this post


Link to post
Share on other sites

Thanks for the amazing help. I've just been so paranoid because this isn't the first time stuff like this has happened. Last questions before I go, was their a windows update today? Because all my shut down/sleep/restart setting looks very different.

Screenshot (11).png

Share this post


Link to post
Share on other sites

You are welcome.  We cant tell what Update you had without having you check on your own.

It is possible that your machine did get Build version 1903.

Press Windows-key and hold that key on keyboard & Tap the R key to get the RUN option mini-window.  Then type in

WINVER

and press Enter-key

 

Look at the information display  & report back the full display info  as to Version and Build numbers

Share this post


Link to post
Share on other sites

Hello,

To - date there has been no detected malware on this box.  I will be tagging this case for closure.

Has Malwarebytes for Windows reported a malware infection since last Friday into this week?

If yes, please provide a copy of the Malwarebytes scan report.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.