Jump to content
Qu1ck

svchost.exe shows in 6 different locations

Recommended Posts

Hello, so honestly, I've found out this problem quite recently,

About a year ago I registered a server, which in the past few weeks has been getting port scanned, now I, frustrated, registered a new one, and the moment I did, it started getting the same type of attack (I checked the login attempts log), anyway, this behaviour is strange to me, so I decided to netstat -b and net-stat -nao and found some random IPs which I searched on the internet and found were reported for malicious action. netstat -b is showing my computer is connecting through svchost.exe and so I decided to search on my file explorer where svchost.exe might be (It is supposed to be in System32 only), now, I've got 6 instances and oddly enough, after 5 Malwarebytes Threat scan, Custom scan (on all the hard drives) and Hyper Scan, I've got no threats detected.

I would love to have some help to figure out which svchost.exe are indeed malicious and if there's a way to remove them.

Thanks a lot,

Dan (Qu1ck)

Capture.PNG

Capture.PNG

Share this post


Link to post
Share on other sites
Just now, Qu1ck said:

Hello, so honestly, I've found out this problem quite recently,

About a year ago I registered a server, which in the past few weeks has been getting port scanned, now I, frustrated, registered a new one, and the moment I did, it started getting the same type of attack (I checked the login attempts log), anyway, this behaviour is strange to me, so I decided to netstat -b and net-stat -nao and found some random IPs which I searched on the internet and found were reported for malicious action. netstat -b is showing my computer is connecting through svchost.exe and so I decided to search on my file explorer where svchost.exe might be (It is supposed to be in System32 only), now, I've got 6 instances and oddly enough, after 5 Malwarebytes Threat scan, Custom scan (on all the hard drives) and Hyper Scan, I've got no threats detected.

I would love to have some help to figure out which svchost.exe are indeed malicious and if there's a way to remove them.

Thanks a lot,

Dan (Qu1ck)

Capture.PNG

Capture.PNG

I would like to add this, which shows it is the svchost.exe file making the connection

Capture.PNG

Share this post


Link to post
Share on other sites

At first glance, this does not look like malware but actually rather normal. When you starting digging under the hood of Windows internals, things can get very complex. There are multiple legit instances of svchost.exe that will return if you do a search due to how Windows stores and services/updates critical OS files. Plus, you'll have versions for native 64-bit (amd64) and native 32-bit (wow64).

For example, the instances in the WinSxS folders (aka the Windows Component Based Servicing Store) are the original versions in their component package folder. Your going to have the two architecture versions plus multiple releases depending on Windows Updates that are installed. The ones in the System32 and SysWoW64 folders are actually just NTFS hard links to "current version" ones stored in WinSxS.

If you want to get a true second set of eyes on it, get us the full path to all instances (the full WinSxS path is very useful). If possible, the SHA-1 or MD5 hash of those files would be helpful too.

Share this post


Link to post
Share on other sites

Hello @Qu1ck  and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready and we'll see if we can find anything wrong.

NOTE: It is very normal to have systems open to the Internet to get port scanned. There are many bots and users looking for methods of exploit to gain access. Using your firewall is the best way to block port scans. Only allow the minimum required ports to be available.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, please click Clean & Repair.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Share this post


Link to post
Share on other sites
51 minutes ago, AlexSmith said:

At first glance, this does not look like malware but actually rather normal. When you starting digging under the hood of Windows internals, things can get very complex. There are multiple legit instances of svchost.exe that will return if you do a search due to how Windows stores and services/updates critical OS files. Plus, you'll have versions for native 64-bit (amd64) and native 32-bit (wow64).

For example, the instances in the WinSxS folders (aka the Windows Component Based Servicing Store) are the original versions in their component package folder. Your going to have the two architecture versions plus multiple releases depending on Windows Updates that are installed. The ones in the System32 and SysWoW64 folders are actually just NTFS hard links to "current version" ones stored in WinSxS.

If you want to get a true second set of eyes on it, get us the full path to all instances (the full WinSxS path is very useful). If possible, the SHA-1 or MD5 hash of those files would be helpful too.

C:\Windows\WinSxS\wow64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.1_none_a590904aa2d8e5ca

C:\Windows\WinSxS\amd64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.1_none_9b3be5f86e7823cf

C:\Windows\SysWOW64

C:\Windows\WinSxS\wow64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.556_none_a1b08abc8fc86a8f

C:\Windows\System32

C:\Windows\WinSxS\amd64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.556_none_975be06a5b67a894

 

I don't know how to get the hashes of these files.

It does seem as if these files were modified nearly the same time (except for the first file), in 9th of January 2019, is it possible to check if these were downloaded by a Windows update? Is there a way I can check my update history for Windows (to make sure these files are indeed Window's)?

The files I've listed are in the same order of the files in the screenshot.

 

Capture.PNG

Share this post


Link to post
Share on other sites
Posted (edited)

I've attached the log from Malwarebytes, and I'll upload FRST.txt and Addition.txt in a seperate reply

hi.txt

Edited by AdvancedSetup
removed unneeded quotes

Share this post


Link to post
Share on other sites
Posted (edited)

Here's the AdwCleaner log

# -------------------------------
# Malwarebytes AdwCleaner 7.4.0.0
# -------------------------------
# Build:    07-23-2019
# Database: 2019-07-22.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Clean
# -------------------------------
# Start:    08-01-2019
# Duration: 00:00:16
# OS:       Windows 10 Home
# Cleaned:  63
# Failed:   0


***** [ Services ] *****

No malicious services cleaned.

***** [ Folders ] *****

Deleted       C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare
Deleted       C:\Program Files (x86)\IObit\Advanced SystemCare
Deleted       C:\ProgramData\IOBIT\Driver Booster
Deleted       C:\ProgramData\IObit\Advanced SystemCare

***** [ Files ] *****

Deleted       C:\END

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks cleaned.

***** [ Registry ] *****

Deleted       HKCU\Software\PRODUCTSETUP
Deleted       HKCU\Software\csastats
Deleted       HKCU\Software\win
Deleted       HKLM\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted       HKLM\SOFTWARE\CLASSES\DRIVE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted       HKLM\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted       HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Advanced SystemCare
Deleted       HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{0ABF4A2D-DDE7-4C4F-870E-D54DA3C63F3D}
Deleted       HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{83753F64-57A0-42F0-BDED-BA7AD322BC27}
Deleted       HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{B2D122A3-1599-41E6-B85A-9EE046ACFE16}
Deleted       HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{BCF53B02-86DD-4A5E-964F-A5D6880A5F48}
Deleted       HKLM\Software\Classes\CLSID\{2803063F-4B8D-4dc6-8874-D1802487FE2D}
Deleted       HKLM\Software\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
Deleted       HKLM\Software\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}
Deleted       HKLM\Software\Wow6432Node\IOBIT\ASC
Deleted       HKLM\Software\Wow6432Node\IObit\Advanced SystemCare
Deleted       HKLM\Software\Wow6432Node\IObit\Driver Booster
Deleted       HKLM\Software\Wow6432Node\IObit\RealTimeProtector
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries cleaned.

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries cleaned.

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.

***** [ Preinstalled Software ] *****

Deleted       Preinstalled.CyberLinkShellExtension
Deleted       Preinstalled.LenovoCCSDK
Deleted       Preinstalled.LenovoExperienceImprovement
Deleted       Preinstalled.LenovoIMController
Deleted       Preinstalled.LenovoPhotoMaster
Deleted       Preinstalled.LenovoPower2Go
Deleted       Preinstalled.LenovoPowerDVD
Deleted       Preinstalled.LenovoQuickOptimizer
Deleted       Preinstalled.LenovoREACHit
Deleted       Preinstalled.LenovoSHAREit
Deleted       Preinstalled.LenovoSolutionCenter
Deleted       Preinstalled.LenovoUtility


*************************

[+] Delete Tracing Keys
[+] Reset Winsock

*************************

AdwCleaner[S00].txt - [4102 octets] - [01/08/2019 01:35:05]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########
 

Edited by AdvancedSetup
removed unneeded quotes

Share this post


Link to post
Share on other sites
Posted (edited)

Here are the results from step 3. I'm sorry that these are in polish, my operating system is in polish.

Addition.txt FRST.txt

Edited by AdvancedSetup
removed unneeded quote

Share this post


Link to post
Share on other sites

No problem. Please do the following for me.

Please go to Control Panel, Programs. Add/Remove and uninstall all versions of Java (unless you're writing Java applications yourself that require old compromised versions of Java) Java should always be using the latest versions due to ongoing attempts at exploiting it.

Java 8 Update 151
Java 8 Update 162
Java 8 Update 172
Java 8 Update 181
Java SE Development Kit 8 Update 162

 

Next, follow the directions from the topic below and reset your Google Chrome.

 

 

Ron

 

Share this post


Link to post
Share on other sites
1 hour ago, Qu1ck said:

C:\Windows\WinSxS\wow64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.1_none_a590904aa2d8e5ca

C:\Windows\WinSxS\amd64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.1_none_9b3be5f86e7823cf

C:\Windows\SysWOW64

C:\Windows\WinSxS\wow64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.556_none_a1b08abc8fc86a8f

C:\Windows\System32

C:\Windows\WinSxS\amd64_microsoft-windows-services-svchost_31bf3856ad364e35_10.0.17134.556_none_975be06a5b67a894

 

I don't know how to get the hashes of these files.

It does seem as if these files were modified nearly the same time (except for the first file), in 9th of January 2019, is it possible to check if these were downloaded by a Windows update? Is there a way I can check my update history for Windows (to make sure these files are indeed Window's)?

The files I've listed are in the same order of the files in the screenshot.

 

Capture.PNG

Thanks for posting this. Those are all legit and not an issue, so stick with working with Ron on digging in to other areas to resolve.

Here are the technical specifics in case you or anyone else is wondering...

The WinSxS ones with 10.0.17134.1 in the path are the versions that shipped with your OS and the ones with 10.0.17134.556 in the path are updated ones from the January Cumulative Update KB4480976: https://support.microsoft.com/en-us/help/4480976/windows-10-update-kb4480976

The ones in System32 and SysWoW64 are just hard links to the WinSxS 10.0.17134.556 versions.

Share this post


Link to post
Share on other sites
53 minutes ago, AdvancedSetup said:

No problem. Please do the following for me.

Please go to Control Panel, Programs. Add/Remove and uninstall all versions of Java (unless you're writing Java applications yourself that require old compromised versions of Java) Java should always be using the latest versions due to ongoing attempts at exploiting it.

Java 8 Update 151
Java 8 Update 162
Java 8 Update 172
Java 8 Update 181
Java SE Development Kit 8 Update 162

 

Next, follow the directions from the topic below and reset your Google Chrome.

 

 

Ron

 

Hi Ron,

So it as it turns out, I already have it turned off. I've also removed all the Java installations, just like you've asked, I used to be a Java developer, but since then moved to other programming languages.

Capture.PNG

Share this post


Link to post
Share on other sites

Also, I've got no detections from Malwarebytes

 

Capture.PNG

Share this post


Link to post
Share on other sites

Having Chrome Sync off is good (in my opinion) but there are other setting there that can help clean/reset Chrome.

When done, go ahead and reboot. Then get me new fresh FRST logs please.

Ron

 

Share this post


Link to post
Share on other sites

Bonjour looks to be acting up as well. Please temporarily uninstall it.

You're Intel Rapid Storage is also faulting on the system for some reason. Not malware related, just something you should look into fixing if possible.

Official Application:
==================
Error: (08/01/2019 03:11:19 AM) (Source: Application Error) (EventID: 1000) (User:)
Description: Faulting application name: IAStorDataMgrSvc.exe, version: 14.6.0.1029, time stamp: 0x55b5f9d3
Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
Exception code: 0xc0000005
Fault offset: 0x05e9ea05
Faulting process id: 0x1124
Faulting application start time: 0x01d547fda1f3d0d1
Faulting application path: C: \ Program Files \ Intel \ Intel (R) Rapid Storage Technology \ IAStorDataMgrSvc.exe
Faulting module path: unknown
Report Id: 2be0aeab-bc3d-447a-9204-f3847788345e
Faulting package full name:
Faulting package-relative application ID:

Error: (08/01/2019 03:11:19 AM) (Source: .NET Runtime) (EventID: 1026) (User:)
Description: Application: IAStorDataMgrSvc.exe
Architecture version: v4.0.30319
Description: the process was terminated due to an unhandled exception.
Information about the exception: System.NullReferenceException
   in IAStorUtil.SystemDataModelListener.ProcessSystemDataModelChanges ()
   in IAStorUtil.SystemDataModelListener.LoadSavedSystemState ()
   in IAStorDataMgr.EventRelay. <Start> b__0 (System.Object)
   in System.Threading.QueueUserWorkItemCallback.WaitCallback_Context (System.Object)
   in System.Threading.ExecutionContext.RunInternal (System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   in System.Threading.ExecutionContext.Run (System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
   in System.Threading.QueueUserWorkItemCallback.System.Threading.IThreadPoolWorkItem.ExecuteWorkItem ()
   in System.Threading.ThreadPoolWorkQueue.Dispatch ()
   in System.Threading._ThreadPoolWaitCallback.PerformWaitCallback ()

 

Are you aware of this entry? Do you recognize it, use it?

HKU\S-1-5-21-63895584-2819794538-2496726108-1001\...\RunOnce: [Application Restart #2] => C:\Program Files\Trend Micro\TMIDS\tower\PwmTower.exe  --user-data-dir="C:\Users\user\AppData\Local\DP_Tower_3.7" --disable-devtools --disable-password-generation --disable-single-click-autofill --js- (dane wartości zawierają 206 znaków więcej).


HKU\S-1-5-21-63895584-2819794538-2496726108-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-08012019030918521\...\RunOnce: [Application Restart #2] => C:\Program Files\Trend Micro\TMIDS\tower\PwmTower.exe  --user-data-dir="C:\Users\user\AppData\Local\DP_Tower_3.7" --disable-devtools --disable-password-generation --disable-single-click-autofill --js- (dane wartości zawierają 206 znaków więcej).

 

You have remnants of Trend Micro still installed on the system but I don't see the main installer showing in the logs. Are you still using Trend Micro for anything?

 

 

 

Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

Thanks

Ron

 

 

Share this post


Link to post
Share on other sites

I did use Trend Micro and yes I've uninstalled it because it was too outdated, was too lazy to reinstall it again.

Share this post


Link to post
Share on other sites
Posted (edited)

Ron, I've just got 1 question, what does the fixlist.txt program do?

Edited by AdvancedSetup
removed unneeded quote

Share this post


Link to post
Share on other sites

It cleans up and removes some minor items not needed, resets your IP, will run a disk check, clean your temp files, remove any proxies, create a system restore point, remove alternate data streams

 

Please visit the following site and locate their tool to remove left over elements of Trend Micro

https://esupport.trendmicro.com/en-us/home/pages/technical-support/1105809.aspx

 

Share this post


Link to post
Share on other sites

Also, Bonjour is an app or extension because I don't seem to find it on my Windows search bar

Share this post


Link to post
Share on other sites
Posted (edited)

 

Okay so I've just finished it, are we done?

Edited by AdvancedSetup
removed unneeded quotes

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.