Jump to content

Help with possible infection


Recommended Posts

Hi, I have been silly and used illegitimate ways to download a game. I have cleared this from my PC now.

During the process I did a scan and it flagged a .exe in appdata-local-temp folder, I scanned this file with VirusTotal, which shows what it does in a virtual environment: https://www.virustotal.com/gui/file/1575afb3fdf7c9ea0a1042c4c625d3e800d01ed449225e8e0f4544a16f04a65f/behavior/C2AE

It set lots of registry keys and deleted a few. I really have no idea what these do and how bad this might be.

Would really appreciate any advice. I have done a full regular scan and nothing came up after I cut off the process (which removed the temp folder).

Registry Keys Set

HKLM\Software\Microsoft\WBEM\CIMOM\ConfigValueEssNeedsLoading
HKLM\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces
HKLM\SYSTEM\ControlSet001\Control\BackupRestore\FilesNotToBackup\BITS_LOG
HKLM\SYSTEM\ControlSet001\Control\BackupRestore\FilesNotToBackup\BITS_BAK
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS\StateIndex
HKLM\SOFTWARE\Microsoft\WBEM\PROVIDERS\Performance\Performance Refresh
HKLM\SOFTWARE\Microsoft\WBEM\PROVIDERS\Performance\Performance Refreshed
HKLM\SOFTWARE\Microsoft\WBEM\PROVIDERS\Performance\Performance Data
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\Last Counter
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\Last Help
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\Updating
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\ndis.sys[MofResourceName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\System32\Drivers\portcls.SYS[PortclsMof]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\en-US\ACPI.sys.mui[ACPIMOFResource]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\DRIVERS\HDAudBus.sys[HDAudioMofName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\System32\Drivers\en-US\portcls.SYS.mui[PortclsMof]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\advapi32.dll[MofResourceName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\en-US\advapi32.dll.mui[MofResourceName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\en-US\mssmbios.sys.mui[MofResource]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\DRIVERS\en-US\HDAudBus.sys.mui[HDAudioMofName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\en-US\ndis.sys.mui[MofResourceName]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\DRIVERS\en-US\intelppm.sys.mui[PROCESSORWMI]
HKLM\Software\Microsoft\WBEM\WDM\IDE\DiskAMDX_HARDDISK___________________________2.5+____\5&2770a7af&0&0.0.0_0-{05901221-D566-11d1-B2F0-00A0C9062910}
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\DRIVERS\intelppm.sys[PROCESSORWMI]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\ACPI.sys[ACPIMOFResource]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\DRIVERS\monitor.sys[MonitorWMI]
HKLM\Software\Microsoft\WBEM\WDM\%windir%\system32\drivers\mssmbios.sys[MofResource]
HKLM\SYSTEM\ControlSet001\Control\Nsi\{eb004a03-9b1a-11d4-9123-0050047759bc}\22\(Default)
HKLM\SYSTEM\ControlSet001\Control\Nsi\{eb004a03-9b1a-11d4-9123-0050047759bc}\24\ffffffffffffffffffffffffffffff00
HKLM\SYSTEM\ControlSet001\Control\Nsi\{eb004a03-9b1a-11d4-9123-0050047759bc}\24\ffffffffffffffffffffffffffffff01
HKLM\SYSTEM\ControlSet001\Control\Nsi\{eb004a03-9b1a-11d4-9123-0050047759bc}\24\ffffffffffffffffffffffffffffff02
HKLM\SYSTEM\ControlSet001\Control\Nsi\{eb004a03-9b1a-11d4-9123-0050047759bc}\24\ffffffffffffffffffffffffffffff03
HKLM\SYSTEM\ControlSet001\Services\BITS\Performance\PerfMMFileName

Registry Keys Deleted

  •  
    HKLM\SYSTEM\ControlSet001\Services\WmiApRpl\Performance\First Counter
  •  
  •  
    HKLM\SYSTEM\ControlSet001\Services\WmiApRpl\Performance\Last Counter
  •  
  •  
    HKLM\SYSTEM\ControlSet001\Services\WmiApRpl\Performance\First Help
  •  
  •  
    HKLM\SYSTEM\ControlSet001\Services\WmiApRpl\Performance\Last Help
  •  
  •  
    HKLM\SYSTEM\ControlSet001\Services\WmiApRpl\Performance\Object List

Process And Service Actions

 

Shell Commands

  •  
    %SAMPLEPATH%

Processes Terminated

  •  
    %CONHOST% "-1230411195-13664695151764431745-227346051-2115165067-1050118476-436604680-1762009480
  •  
  •  
    %SAMPLEPATH%
  •  
  •  
    wmiadap.exe /F /T /R

Processes Tree

 2656 - %SAMPLEPATH%


 

Link to post
Share on other sites

  • Root Admin

Hello @Tom1028734

 

Please run the following and we'll see about getting you cleaned up.

 

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

Thank you for this, I've attached all documents, the Tencent folder deleted by AdwClearer I am nearly 100% certain is not related.

After my post, I started a full custom scan, this took very, very long though. After 6.5 hours I cancelled it and quarantined one item
I've also attached a ('clean') threat scan fMalwareBytes Full scan (stopped after 6.5 hours, 1 result quarantined).txtrom after that.

MalwareBytes Threat scan (after full scan, no results).txt AdwCleaner scan, one item quarantined.txt FRST.txt Addition.txt

Link to post
Share on other sites

  • Root Admin

The logs show that you have Kaspersky antivirus installed. Please update Kaspersky and do a full scan with that and let me know if it finds anything or not.

I don't see any obvious threats in the logs

Your CPUZ should not be installed in a Temp folder. I'd uninstall those and if wanted install to a non Temp folder.

S3 cpuz149; \??\C:\WINDOWS\temp\cpuz149\cpuz149_x64.sys [X]
S3 cpuz152; \??\C:\WINDOWS\temp\cpuz152\cpuz152_x64.sys [X]

 

Link to post
Share on other sites

I have looked into it, appearantly a program I use from Corsair called 'iCue' uses the CPUZ to monitor temperatures, it seems to be intended.

Kaspersky did not detect anything (full scan). Does this mean my PC is clean or it is never guaranteed?

I think the FRST log might contain some confidential information, could you close this thread to the public (if it is not already)?

Thank you very much for the swift and knowledgeable replies.

Link to post
Share on other sites

  • Root Admin

No harm in using CPUZ it's just the location. NO Service should run from there period. It is an increased risk to security as well as data there is designed to be temporary and deleted at any time.

Between the logs and a clean bill from Kaspersky, I'd say yes the computer appears to be clean at this time.

 

 

 

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
    https://www.howtogeek.com/240255/password-managers-compared-lastpass-vs-keepass-vs-dashlane-vs-1password/
  2. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  3. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  4. Install a content blocker for your browser. Malwarebytes Browser Guard (Free)
    Firefoxhttps://addons.mozilla.org/en-GB/firefox/addon/malwarebytes/  
    Chrome: https://chrome.google.com/webstore/detail/malwarebytes-browser-guar/ihcjicgdanjaechkgeegckofjjedodee 
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 

 

Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes

 

Link to post
Share on other sites

Ah I misunderstood, weirdly enough the folders are no longer in C:\WINDOWS\temp\ 

They seem to have dissappeared, or perhaps they weren't there in the first place, I only looked it up online..

If this is not suspicious (temp deletes itself maybe or the \??\ indicates something went wrong in the scan?), then thank you very much and I hope you have a lovely day :)

Link to post
Share on other sites

  • 3 months later...
  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following to help you better protect your computer and privacy Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.