explorer.exe open a connection on 62.44.221.42:7544

  • Thread starter Thread starter David Romagnoli
  • Start date Start date
D

David Romagnoli

Hi,,

I'm getting crazy.... really

This is the situation:

WinXP SP1, fully patched for security issues

explorer.exe try to establish a connection to that IP (finnish ISP)

using:

NAV
AVAST
EWIDO
ANTIVIR
NOD32
ADAWARE
SPYBOT S&D
EXPLORER.EXE from c:\windows has been compared (binary) with the original
one


No programs are running in background
No DLL loaded with explorer

Someone could support me before I will format all?

D
 
David Romagnoli said:
Hi,,

I'm getting crazy.... really

This is the situation:

WinXP SP1, fully patched for security issues

explorer.exe try to establish a connection to that IP (finnish ISP)

using:

NAV
AVAST
EWIDO
ANTIVIR
NOD32
ADAWARE
SPYBOT S&D
EXPLORER.EXE from c:\windows has been compared (binary) with the
original
one


No programs are running in background
No DLL loaded with explorer

Someone could support me before I will format all?


Problem still occur if you use msconfig.exe to disable all startup
programs, reboot, and check then?
 
"_Vanguard_" news:[email protected]...
Problem still occur if you use msconfig.exe to disable all startup
programs, reboot, and check then?

Unfortunately ... YES


Watch on my cfg:

Running processes:

C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\TrueCryptService.exe
C:\WINDOWS\EXPLORER.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\dllhost.exe


Load/Run keys from C:\WINDOWS\WIN.INI:

load=*INI section not found*
run=*INI section not found*

Load/Run keys from Registry:

HKLM\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKLM\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKLM\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: load=*Registry value not found*
HKCU\..\Windows NT\CurrentVersion\WinLogon: run=*Registry value not found*
HKCU\..\Windows\CurrentVersion\WinLogon: load=*Registry key not found*
HKCU\..\Windows\CurrentVersion\WinLogon: run=*Registry key not found*
HKCU\..\Windows NT\CurrentVersion\Windows: load=
HKCU\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: load=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: run=*Registry value not found*
HKLM\..\Windows NT\CurrentVersion\Windows: AppInit_DLLs=

Shell & screensaver key from C:\WINDOWS\SYSTEM.INI:

Shell=*INI section not found*
SCRNSAVE.EXE=*INI section not found*
drivers=*INI section not found*

Shell & screensaver key from Registry:

Shell=Explorer.exe
SCRNSAVE.EXE=*Registry value not found*
drivers=*Registry value not found*

Policies Shell key:

HKCU\..\Policies: Shell=*Registry value not found*
HKLM\..\Policies: Shell=*Registry value not found*

--------------------------------------------------

Checking for EXPLORER.EXE instances:

C:\WINDOWS\Explorer.exe: PRESENT!

C:\Explorer.exe: not present
C:\WINDOWS\Explorer\Explorer.exe: not present
C:\WINDOWS\System\Explorer.exe: not present
C:\WINDOWS\System32\Explorer.exe: not present
C:\WINDOWS\Command\Explorer.exe: not present

--------------------------------------------------

Enumerating ShellServiceObjectDelayLoad items:

PostBootReminder: C:\WINDOWS\system32\SHELL32.dll
CDBurn: C:\WINDOWS\system32\SHELL32.dll
SysTray: C:\WINDOWS\System32\stobject.dll
 
On Tue, 30 Nov 2004 16:46:05 +0100, "David Romagnoli"

The IP 62.44.221.42 is a Finnish [A]DSL connection so I highly doubt
it is a legit request. Pop your Windows XP CD in the drive and run
"sfc /scannow" w/o the quotes from Start -> Run and see if it thinks
any system files have been replaced.
 
Ditoa said:
The IP 62.44.221.42 is a Finnish [A]DSL connection so I highly doubt
it is a legit request. Pop your Windows XP CD in the drive and run
"sfc /scannow" w/o the quotes from Start -> Run and see if it thinks
any system files have been replaced.

I will.....

thanks

D
 
_Vanguard_ said:
You might want to run HijackThis to see what it reports in its logfile.

Here we are...

I think nothing is to be highlited


----------------------------------------------
Logfile of HijackThis v1.98.2
Scan saved at 15.39.02, on 01/12/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\TrueCryptService.exe
C:\WINDOWS\EXPLORER.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\dllhost.exe
C:\Programmi\Internet Explorer\iexplore.exe
C:\PROGDVD\UTILITA\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext =
http://windowsupdate.microsoft.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
Collegamenti
R3 - Default URLSearchHook is missing
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} -
c:\programmi\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} -
c:\programmi\google\googletoolbar1.dll
O4 - Startup: Tcpview.exe.lnk = C:\PROGDVD\UTILITA\Tcpview.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel
present
O6 - HKCU\Software\Policies\Microsoft\Internet
Explorer\Toolbars\Restrictions present
O8 - Extra context menu item: &Google Search -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: Collegamenti a ritroso -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Pagine simili -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Versione cache della pagina -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmcache.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no
file)
O9 - Extra 'Tools' menuitem: Sun Java Console -
{08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O15 - Trusted Zone: http://www.babylon.com
O17 -
HKLM\System\CCS\Services\Tcpip\..\{16DA209F-B2A9-47E2-B802-347B5DD49857}:
NameServer =
151.99.125.6,151.99.125.5,151.99.125.1,1.253.128.11,1.253.128.10
---------------------------------------------
 
David Romagnoli said:
Logfile of HijackThis v1.98.2
Scan saved at 15.39.02, on 01/12/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

C:\WINDOWS\system32\TrueCryptService.exe

Some freebie Sourceforge encrypting service. If you don't need your
currently encrypted data right now during testing, disable this service
to make sure it isn't causing conflicts. You don't need something
sucking up memory to provide a convenience VDISK when you are trying to
solve problems.

Besides the startup programs you disabled in msconfig.exe to reboot
without them (but which apparently didn't help), make sure to go through
all the services to disable non-critical ones during testing.
C:\WINDOWS\System32\dllhost.exe
This usually gets left over from some poorly written COM+ object. No
big deal.
C:\Programmi\Internet Explorer\iexplore.exe

Were you actually running an instance of Internet Explorer when you ran
HijackThis? You need to kill all regular applications to get to as base
a state under which the problem occurs. Otherwise, this might've been a
remnant copy of IE left in memory; Windows still has problems forcing
programs to unload when they hang during their exit. Also, some malware
will open a "hidden" instance of IE (without a window) so they can run a
script with a timer to repeatedly inflict damage at intervals. You
close the browser that opened but the hidden parent copy of IE is still
loaded so it occurs again.

If you never opened IE (so that a script could load a hidden instance of
it) then some program is loading it. You could use a file monitor to
see who accesses the iexplore.exe file, like SysInternals' FileMon.
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName
=
Collegamenti
R3 - Default URLSearchHook is missing

This looks suspicious. Maybe it is some malware crap left over after
you used Spybot or Ad-Aware to attempt to eradicate it.
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} -
C:\WINDOWS\System32\msdxm.ocx

Windows Media Player 2 ActiveX Control.
O4 - Startup: Tcpview.exe.lnk = C:\PROGDVD\UTILITA\Tcpview.exe

Is this the TCPview utility from SysInternals? Why are you loading it
on startup?
O8 - Extra context menu item: Collegamenti a ritroso -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: Pagine simili -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: Versione cache della pagina -
res://C:\Programmi\Google\GoogleToolbar1.dll/cmcache.html

I don't read whatever language that is. Looks like the Collegamenti
thingie above might have to do with the Google toolbar.

Have you tried uninstalling all the extras that you tacked onto IE
(i.e., Google toolbar, any BHOs, etc.)? Use BHO Demon to see what BHOs
you have installed. Some, like the Acrobat Reader, can be disabled
through a configuration option within that program (rather than having
to uninstall it). Internet Options -> General tab -> Settings -> View
Objects will show you what AX controls are registered for integration
into IE; you can right-click on them to Remove them (but that only
removes that AX control and not the parent software for it; e.g., Sun
installs its control to provide a JVM for IE but I suspect removing it
does not remove all of Sun's Java RT and you'll have to rerun their
install program to put it all back).

I don't which firewall software you are running on your problematic
host. Some will let you know when an unauthorized program attempts to
use an authorized program to make an Internet connection. For example,
there is a tooleaky test that will show an never authorized program can
use IE (a previously authorized program) to make a connection. Norton
Internet Security has some buried option to watch for this. I recall
the Sygate Personal Firewall also had this feature. Don't know about
other firewalls. Then you could see if it was IE that was attempting to
make the connection or if something was hiding behind it.
 
Some freebie Sourceforge encrypting service. If you don't need your
currently encrypted data right now during testing, disable this service
to make sure it isn't causing conflicts. You don't need something
sucking up memory to provide a convenience VDISK when you are trying to
solve problems.

Besides the startup programs you disabled in msconfig.exe to reboot
without them (but which apparently didn't help), make sure to go through
all the services to disable non-critical ones during testing.

if they are using this for full OS OTFE that would be a bad idea
as it would make their system un-useable if it's disabled



~~~~~~~~~~~~~~~~~~~~~
This message was posted via one or more anonymous remailing services.
The original sender is unknown. Any address shown in the From header
is unverified. You need a valid hashcash token to post to groups other
than alt.test and alt.anonymous.messages. Visit www.panta-rhei.dyndns.org
for abuse and hashcash info.
 
if they are using this for full OS OTFE that would be a bad idea
as it would make their system un-useable if it's disabled

No problem with this...
I can disable the service without problem.

anyway, I'we got the problem (not at all just a part).

A file called "svkp.sys" is a part of the problem.

deleting this file I get back an error but nothing appen for connection
issue.
Using PREVX Home it reports me this message:
---------------------------------
Prevx has prevented USERINIT.EXE[1348] from accessing a protected system
file.

Process: USERINIT.EXE
Path: C:\WINDOWS\SYSTEM32\USERINIT.EXE
Pid: 1348
Parentprocess: WINLOGON.EXE
Parentpath: C:\WINDOWS\SYSTEM32\WINLOGON.EXE
Pid: 452

Tried file: C:\WINDOWS\SYSTEM32\SVKP.SYS
AccessFlags: [0x12019f] READ_DATA, WRITE_DATA, APPEND_DATA, READ_EA,
WRITE_EA, READ_ATTRIBUTES, WRITE_ATTRIBUTES
ParentAccess: 0x1000
CreateDisposition: [0x2] CREATE
Policy causing this event: SYS Files (Systems Areas)
The action has been allowed
 
Virus found on a crack for HL2.....

http://www.sophos.com/virusinfo/analyses/trojafxroote.html


This is the report of the scanning done over "userinit.exe" file that
VirusTotal processed on 12/28/2004 at 13:39:45.
Antivirus Version Update Result
AntiVir 6.29.0.5 12.28.2004 -
BitDefender 7.0 12.27.2004 -
ClamAV devel-20041205 12.28.2004 -
DrWeb 4.32b 12.28.2004 -
eTrust-Iris 7.1.194.0 12.28.2004 -
eTrust-Vet 11.7.0.0 12.24.2004 -
F-Prot 3.16a 12.27.2004 -
Kaspersky 4.0.2.24 12.28.2004 -
NOD32v2 1.959 12.27.2004 Win32/SKVP.A
Norman 5.70.10 12.27.2004 -
Panda 8.02.00 12.28.2004 W32/Prosti.A
Sybari 7.5.1314 12.28.2004 Troj/Afxroot-E
Symantec 8.0 12.27.2004 -



VirusTotal is a free service offered by Hispasec Sistemas. There are no
guarantees about abailability and continuity of this service. Even when the
detection rate given by the use of multiple antivirus engines is far
superior to the one offered by only one product, this results DO NOT
guarantee the harmlessness of a file. There is no such a solution that can
offer a 100% rate of efectiveness recognizing virus and malware.> Go to:
Home Contact En Español
 
Back
Top