Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Please advise / help: Laptop hacked via Bluetooth Phone  (Read 12648 times)

0 Members and 1 Guest are viewing this topic.

SadLittleAcer

    Topic Starter


    Starter

    • Experience: Beginner
    • OS: Unknown
    Please advise / help: Laptop hacked via Bluetooth Phone
    « on: July 31, 2012, 01:18:21 AM »
    Before I lose the ability to log on to the web I want to post this on some forums and see if anyone can help me or sees anything
    in the log files that might be a clue?
    Also, thanks so much for Computerhope.com   I've learned so much from this site, you explain things in a simple way that a non it
    person can understand.

     I am a very tired, desperate woman about to lose my job over this.  Nothing I've found on the web seems to be related to the hack/rootkit that's become a private little *censored* for me.  I stay up half the night trying to figure it out,  and then go into work in the morning with my work unfinished because my only home computer (laptop) is messed up.
    I want to say: If this sounds like a hack with physical access to my laptop, it isn't.
    I live alone, no one has access to my phone or laptop, and they're always with me.

    LAPTOP 1:  I've been going through this since April.  It started when my Acer Aspire netbook / Win7 Starter (I'll call this "Laptop 1)  picked up a remote hacker/root kit (?).   (There were other things too, booting up was a daily adventure;  My laptop screen resolution changed to one for a large desktop monitor,  I lost all administrative power to a remote, nameless domain controller,  on and on.  My efforts to "takeown" and disable larger screen monitor resulted in that laptop being disabled.

    LAPTOP 2:  I have to have a laptop for work; I bought another one  (using money that I should have paid bills with - you knew I didn't have money or I wouldn't have been using an Acer to begin with, right?  In spite of following the letter to the rule (disabled remote access, file sharing, all those initial vulnerablities that Win7 is preloaded with.  Spent my last $60 on Norton Antivirus (which was the second thing I did when I finally felt like I was locked down enough to risk an internet connection (the first was MS Updates of course)
    Laptop 2 was infected within the first day.
    I assumed it was something in the MS Office Excel documents (that I need for work) and had to download via email.   

    ANDROID PHONE 1:      Then my phone, which had a great battery, began to drain within an hour or so.  (Android TMobile Comet).  The settings had been changed to "roaming"  and some kind of "extended Blue Tooth search" .   (I'm sorry, I can't remember the exact name of that original Bluetooth thing was) .  Anyway, I could not shut off (Not even with hard reset).  It also had a  voice recorder installed that could not be shut off, and in the logs these recordings were being streamed to a remote "Private Network".  I'd had this phone for a year, knew every setting on it.  The recorder, a second camera, the extended Bluetooth - none of these were on ever on my phone until then.

    ANDROID PHONE 2:  When I tried to disable the recorder, the phone stopped recognizing my T-Mobile SIM card.
    You can guess the solution they offered me a the T-Mobile store was can't you? They wanted me to buy a new phone.   I had to.  Galaxy Samsung II (or "Phone 2)

    Took laptop 2 in to a computer repair place and they recommended removing the mother board and doing a low reformat.  I disabled the internet adapters and took it home, planning to lock all the settings down before I connected to the internet.
    This was great, it was amazing to see a laptop that functioned normally.  It lasted about 4 hours - and then, without ever connecting to the internet - the rootkit / hacker reinstalled.
    How? I decided it had to be the repair shop, the must have reinstalled original drivers (containing script? Because I could see when the script / tasks for the remote domain had
    reinstalled in the event logs.)  They insisted they didn't.

    LAPTOP 3:   Now it's July.  I still haven't caught up with the unpaid June bills.  I have two disabled laptops, 1 disabled phone and another phone that's streaming audio / video to a remote hacker.   And - I'm going to lose my job because I can't do my work without a laptop.  On a borrowed credit card I buy a laptop.  I bring it home, I disable the adapters and begin securing the default remote access settings and ...    I get an error message that the connection to the remote server is lost.   My phone is sitting on the couch beside me, and I realize that the thing that made me notice it is that the backlight came back on. 

    I check the settings, Bluetooth (which I had disabled) is now on, and it's been reset to "Bluetooth Share".
    I'm typing this on LAPTOP 3.   Before I connected to the internet, I saved some logs (event logs and tasks) that show what happened. 

    A few of the programs that I've noticed seem to be used by this root/hacker:
    Windows Power Shell /Desktop InI files  /  Skype / Windows Live Messenger and Mesh/ Zune
    / Broadcom Netlink  / Bing Bar / Intell Trusted Connect Service Client

    I'm posting them here. 
    NOTE:  I am "TrustedInstaller" in these logs.    The logs are after a system repair / restore (laptop shut down and wouldn't boot on restart as I was trying to gather this info into txt files and onto a USB drive).   
    When I did the system restore from boot and had to choose a user name I tried "TrustedInstaller" and it allowed me to use the name.  I thought it might be some work-around for the admin privileges I can't keep.


    --------- EVENT LOG NEW ACCOUNT -------------
    Source:        Microsoft-Windows-Security-Auditing
    Date:          7/25/2012 8:56:41 PM
    Event ID:      4624
    Task Category: Logon
    Level:         Information
    Keywords:      Audit Success
    User:          N/A
    Computer:      5898OGardensDr
    Description:
    An account was successfully logged on.

    Subject:
       Security ID:      SYSTEM
       Account Name:      WIN-NRHRT7J9C9D$
       Account Domain:      WORKGROUP
       Logon ID:      0x3e7

    Logon Type:         5

    New Logon:
       Security ID:      SYSTEM
       Account Name:      SYSTEM
       Account Domain:      NT AUTHORITY
       Logon ID:      0x3e7
       Logon GUID:      {00000000-0000-0000-0000-000000000000}

    Process Information:
       Process ID:      0x240
       Process Name:      C:\Windows\System32\services.exe

    Network Information:
       Workstation Name:   
       Source Network Address:   -
       Source Port:      -

    Detailed Authentication Information:
       Logon Process:      Advapi 
       Authentication Package:   Negotiate
       Transited Services:   -
       Package Name (NTLM only):   -
       Key Length:      0

    This event is generated when a logon session is created. It is generated on the computer that was accessed.

    The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

    The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

    The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

    The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

    The authentication information fields provide detailed information about this specific logon request.
       - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
       - Transited services indicate which intermediate services have participated in this logon request.
       - Package name indicates which sub-protocol was used among the NTLM protocols.
       - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
        <EventID>4624</EventID>
        <Version>0</Version>
        <Level>0</Level>
        <Task>12544</Task>
        <Opcode>0</Opcode>
        <Keywords>0x8020000000000000</Keywords>
        <TimeCreated SystemTime="2012-07-26T03:56:41.697413900Z" />
        <EventRecordID>967</EventRecordID>
        <Correlation />
        <Execution ProcessID="600" ThreadID="3888" />
        <Channel>Security</Channel>
        <Computer>5898OGardensDr</Computer>
        <Security />
      </System>
      <EventData>
        <Data Name="SubjectUserSid">S-1-5-18</Data>
        <Data Name="SubjectUserName">WIN-NRHRT7J9C9D$</Data>
        <Data Name="SubjectDomainName">WORKGROUP</Data>
        <Data Name="SubjectLogonId">0x3e7</Data>
        <Data Name="TargetUserSid">S-1-5-18</Data>
        <Data Name="TargetUserName">SYSTEM</Data>
        <Data Name="TargetDomainName">NT AUTHORITY</Data>
        <Data Name="TargetLogonId">0x3e7</Data>
        <Data Name="LogonType">5</Data>
        <Data Name="LogonProcessName">Advapi  </Data>
        <Data Name="AuthenticationPackageName">Negotiate</Data>
        <Data Name="WorkstationName">
        </Data>
        <Data Name="LogonGuid">{00000000-0000-0000-0000-000000000000}</Data>
        <Data Name="TransmittedServices">-</Data>
        <Data Name="LmPackageName">-</Data>
        <Data Name="KeyLength">0</Data>
        <Data Name="ProcessId">0x240</Data>
        <Data Name="ProcessName">C:\Windows\System32\services.exe</Data>
        <Data Name="IpAddress">-</Data>
        <Data Name="IpPort">-</Data>
      </EventData>
    </Event>
    -------------
    Log Name:      Security
    Source:        Microsoft-Windows-Security-Auditing
    Date:          7/25/2012 8:56:41 PM
    Event ID:      4672
    Task Category: Special Logon
    Level:         Information
    Keywords:      Audit Success
    User:          N/A
    Computer:      5898OGardensDr
    Description:
    Special privileges assigned to new logon.

    Subject:
       Security ID:      SYSTEM
       Account Name:      SYSTEM
       Account Domain:      NT AUTHORITY
       Logon ID:      0x3e7

    Privileges:      SeAssignPrimaryTokenPrivilege
             SeTcbPrivilege
             SeSecurityPrivilege
             SeTakeOwnershipPrivilege
             SeLoadDriverPrivilege
             SeBackupPrivilege
             SeRestorePrivilege
             SeDebugPrivilege
             SeAuditPrivilege
             SeSystemEnvironmentPrivilege
             SeImpersonatePrivilege
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />
        <EventID>4672</EventID>
        <Version>0</Version>
        <Level>0</Level>
        <Task>12548</Task>
        <Opcode>0</Opcode>
        <Keywords>0x8020000000000000</Keywords>
        <TimeCreated SystemTime="2012-07-26T03:56:41.697413900Z" />
        <EventRecordID>968</EventRecordID>
        <Correlation />
        <Execution ProcessID="600" ThreadID="3888" />
        <Channel>Security</Channel>
        <Computer>5898OGardensDr</Computer>
        <Security />
      </System>
      <EventData>
        <Data Name="SubjectUserSid">S-1-5-18</Data>
        <Data Name="SubjectUserName">SYSTEM</Data>
        <Data Name="SubjectDomainName">NT AUTHORITY</Data>
        <Data Name="SubjectLogonId">0x3e7</Data>
        <Data Name="PrivilegeList">SeAssignPrimaryTokenPrivilege
             SeTcbPrivilege
             SeSecurityPrivilege
             SeTakeOwnershipPrivilege
             SeLoadDriverPrivilege
             SeBackupPrivilege
             SeRestorePrivilege
             SeDebugPrivilege
             SeAuditPrivilege
             SeSystemEnvironmentPrivilege
             SeImpersonatePrivilege</Data>
      </EventData>
    </Event>
    -------------------------------     TASK items related to remote server ----------------------------------
    Pref Track Background Config Surveyor Task:
    <?xml version="1.0" encoding="UTF-16"?>
    <Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
      <RegistrationInfo>
        <Author>Microsoft Corporation</Author>
        <Description>Performance Tracing Idle Task: Background configuration surveyor</Description>
        <URI>Microsoft\Windows\PerfTrack\BackgroundConfigSurveyor</URI>
        <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FA;;;LS)</SecurityDescriptor>
      </RegistrationInfo>
      <Triggers>
        <IdleTrigger>
          <Enabled>true</Enabled>
        </IdleTrigger>
        <CalendarTrigger>
          <StartBoundary>2008-05-30T03:00:00</StartBoundary>
          <Enabled>true</Enabled>
          <ScheduleByDay>
            <DaysInterval>1</DaysInterval>
          </ScheduleByDay>
        </CalendarTrigger>
      </Triggers>
      <Principals>
        <Principal id="LocalService">
          <UserId>S-1-5-19</UserId>
          <RunLevel>LeastPrivilege</RunLevel>
        </Principal>
      </Principals>
      <Settings>
        <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
        <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries>
        <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
        <AllowHardTerminate>false</AllowHardTerminate>
        <StartWhenAvailable>false</StartWhenAvailable>
        <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
        <IdleSettings>
          <StopOnIdleEnd>true</StopOnIdleEnd>
          <RestartOnIdle>false</RestartOnIdle>
        </IdleSettings>
        <AllowStartOnDemand>true</AllowStartOnDemand>
        <Enabled>false</Enabled>
        <Hidden>true</Hidden>
        <RunOnlyIfIdle>false</RunOnlyIfIdle>
        <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
        <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
        <WakeToRun>false</WakeToRun>
        <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
        <Priority>7</Priority>
      </Settings>
      <Actions Context="LocalService">
        <ComHandler>
          <ClassId>{EA9155A3-8A39-40B4-8963-D3C761B18371}</ClassId>
        </ComHandler>
      </Actions>
    </Task>
    -------------------------------
    Takes Control Task:
    <?xml version="1.0" encoding="UTF-16"?>
    <Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
      <RegistrationInfo>
        <Author>Microsoft Corporation</Author>
        <Version>1.0</Version>
        <Description>This task updates the cached list of folders and the security permissions on any new files in a user’s shared media library.</Description>
        <URI>Microsoft\Windows\Windows Media Sharing\UpdateLibrary</URI>
        <SecurityDescriptor>D:(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;AU)</SecurityDescriptor>
      </RegistrationInfo>
      <Triggers>
        <EventTrigger>
          <Enabled>true</Enabled>
          <Subscription>&lt;QueryList&gt;
                  &lt;Query
                      Id="0"
                      Path="System"
                      &gt;
                    &lt;Select Path="System"&gt;*[System[Provider[@Name='Microsoft-Windows-WMPNSS-Service'] and (EventID=14210)]]&lt;/Select&gt;
                  &lt;/Query&gt;
                &lt;/QueryList&gt;</Subscription>
        </EventTrigger>
      </Triggers>
      <Principals>
        <Principal id="AuthenticatedUsers">
          <GroupId>S-1-5-11</GroupId>
          <RunLevel>LeastPrivilege</RunLevel>
        </Principal>
      </Principals>
      <Settings>
        <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>
        <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
        <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
        <AllowHardTerminate>true</AllowHardTerminate>
        <StartWhenAvailable>true</StartWhenAvailable>
        <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
        <IdleSettings>
          <StopOnIdleEnd>true</StopOnIdleEnd>
          <RestartOnIdle>false</RestartOnIdle>
        </IdleSettings>
        <AllowStartOnDemand>true</AllowStartOnDemand>
        <Enabled>true</Enabled>
        <Hidden>false</Hidden>
        <RunOnlyIfIdle>false</RunOnlyIfIdle>
        <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
        <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
        <WakeToRun>false</WakeToRun>
        <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
        <Priority>7</Priority>
      </Settings>
      <Actions Context="AuthenticatedUsers">
        <Exec>
          <Command>"%ProgramFiles%\Windows Media Player\wmpnscfg.exe"</Command>
        </Exec>
      </Actions>
    </Task>
    ------------------
    Recording Restart Task:
        <Source>Microsoft Corporation</Source>
        <Date>1982-01-15T16:30:00-08:00</Date>
        <Description>Restarts recordings after a power failure.</Description>
        <URI>Microsoft\Windows\Media Center\RecordingRestart</URI>
        <SecurityDescriptor>D:(A;;FRFWSDWDWO;;;BA)(A;;FRFWSDWDWO;;;SY)(A;;FRFWFXDTDCSDWD;;;NS)(A;;FXFR;;;AU)</SecurityDescriptor>
      </RegistrationInfo>
      <Triggers>
        <BootTrigger>
          <Enabled>true</Enabled>
        </BootTrigger>
      </Triggers>
      <Principals>
        <Principal id="NetworkService">
          <UserId>S-1-5-20</UserId>
          <RunLevel>LeastPrivilege</RunLevel>
        </Principal>
      </Principals>
      <Settings>
        <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>
        <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
        <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>
        <AllowHardTerminate>true</AllowHardTerminate>
        <StartWhenAvailable>true</StartWhenAvailable>
        <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
        <IdleSettings>
          <StopOnIdleEnd>true</StopOnIdleEnd>
          <RestartOnIdle>false</RestartOnIdle>
        </IdleSettings>
        <AllowStartOnDemand>true</AllowStartOnDemand>
        <Enabled>false</Enabled>
        <Hidden>false</Hidden>
        <RunOnlyIfIdle>false</RunOnlyIfIdle>
        <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>
        <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>
        <WakeToRun>false</WakeToRun>
        <ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
        <Priority>6</Priority>
      </Settings>
      <Actions Context="NetworkService">
        <Exec>
          <Command>%SystemRoot%\ehome\ehrec</Command>
          <Arguments>/RestartRecording</Arguments>
        </Exec>
      </Actions>
    </Task>

    ---------------------------EVENT LOG POWER SHELL EVENTS------------------
    Level,Date and Time,Source,Event ID,Task Category
    Information,7/25/2012 8:55:57 PM,PowerShell,403,Engine Lifecycle,"Engine state is changed from Available to Stopped.

    Details:
       NewEngineState=Stopped
       PreviousEngineState=Available

       SequenceNumber=10

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=2.0
       RunspaceId=a3fefa91-1f9c-4aee-86da-a3cfbb1c9386
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:54 PM,PowerShell,400,Engine Lifecycle,"Engine state is changed from None to Available.

    Details:
       NewEngineState=Available
       PreviousEngineState=None

       SequenceNumber=9

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=2.0
       RunspaceId=a3fefa91-1f9c-4aee-86da-a3cfbb1c9386
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Certificate"" is Started.

    Details:
       ProviderName=Certificate
       NewProviderState=Started

       SequenceNumber=8

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Variable"" is Started.

    Details:
       ProviderName=Variable
       NewProviderState=Started

       SequenceNumber=7

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Registry"" is Started.

    Details:
       ProviderName=Registry
       NewProviderState=Started

       SequenceNumber=6

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Function"" is Started.

    Details:
       ProviderName=Function
       NewProviderState=Started

       SequenceNumber=5

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""FileSystem"" is Started.

    Details:
       ProviderName=FileSystem
       NewProviderState=Started

       SequenceNumber=4

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Environment"" is Started.

    Details:
       ProviderName=Environment
       NewProviderState=Started

       SequenceNumber=3

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""Alias"" is Started.

    Details:
       ProviderName=Alias
       NewProviderState=Started

       SequenceNumber=2

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="
    Information,7/25/2012 8:55:53 PM,PowerShell,600,Provider Lifecycle,"Provider ""WSMan"" is Started.

    Details:
       ProviderName=WSMan
       NewProviderState=Started

       SequenceNumber=1

       HostName=ConsoleHost
       HostVersion=2.0
       HostId=a0b19cdd-f141-427d-bfb7-7684b41f1d4c
       EngineVersion=
       RunspaceId=
       PipelineId=
       CommandName=
       CommandType=
       ScriptName=
       CommandPath=
       CommandLine="

    ------------------------------------- Command Prompt Info --------------------------
    C:\Windows\system32>IPCONFIG

    Windows IP Configuration


    Wireless LAN adapter Wireless Network Connection:

       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :

    Ethernet adapter Local Area Connection:

       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :

    Tunnel adapter isatap.{A48B0D30-C0EC-4443-BA28-EC95E44DB029}:

       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :

    Tunnel adapter Local Area Connection* 9:

       Media State . . . . . . . . . . . : Media disconnected
       Connection-specific DNS Suffix  . :

    C:\Windows\system32>NETSTAT -A

    Active Connections

      Proto  Local Address          Foreign Address        State
      TCP    0.0.0.0:135            5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:445            5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:49152          5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:49153          5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:49154          5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:49155          5898OGardensDr:0       LISTENING
      TCP    0.0.0.0:49157          5898OGardensDr:0       LISTENING
      TCP    [::]:135               5898OGardensDr:0       LISTENING
      TCP    [::]:445               5898OGardensDr:0       LISTENING
      TCP    [::]:49152             5898OGardensDr:0       LISTENING
      TCP    [::]:49153             5898OGardensDr:0       LISTENING
      TCP    [::]:49154             5898OGardensDr:0       LISTENING
      TCP    [::]:49155             5898OGardensDr:0       LISTENING
      TCP    [::]:49157             5898OGardensDr:0       LISTENING
      TCP    [::1]:49156            5898OGardensDr:0       LISTENING
      UDP    127.0.0.1:1900         *:*
      UDP    127.0.0.1:49153        *:*
      UDP    [::1]:1900             *:*
      UDP    [::1]:49152            *:*

    C:\Windows\system32>TASKLIST

    Image Name                     PID Session Name        Session#    Mem Usage
    ========================= ======== ================ =========== ============
    System Idle Process              0 Services                   0         24 K
    System                           4 Services                   0        304 K
    smss.exe                       260 Services                   0        816 K
    csrss.exe                      412 Services                   0      2,836 K
    csrss.exe                      472 Console                    1     23,088 K
    wininit.exe                    480 Services                   0      1,216 K
    winlogon.exe                   528 Console                    1      4,452 K
    services.exe                   576 Services                   0      6,352 K
    lsass.exe                      600 Services                   0      6,848 K
    lsm.exe                        608 Services                   0      3,064 K
    svchost.exe                    712 Services                   0      5,256 K
    svchost.exe                    788 Services                   0      6,172 K
    svchost.exe                    404 Services                   0     26,744 K
    svchost.exe                    564 Services                   0      8,612 K
    svchost.exe                   1096 Services                   0     92,960 K
    svchost.exe                   1144 Services                   0     15,112 K
    wlanext.exe                   1900 Services                   0      2,572 K
    conhost.exe                   1908 Services                   0        768 K
    svchost.exe                   1944 Services                   0     19,276 K
    MsMpEng.exe                    432 Services                   0     35,024 K
    spoolsv.exe                    708 Services                   0      6,008 K
    svchost.exe                    952 Services                   0      7,392 K
    armsvc.exe                     700 Services                   0      1,680 K
    dsiwmis.exe                   1360 Services                   0      4,004 K
    ePowerSvc.exe                 1512 Services                   0      3,472 K
    LMutilps32.exe                1524 Console                    1      4,596 K
    HeciServer.exe                1576 Services                   0      1,912 K
    Jhi_service.exe               1584 Services                   0      2,388 K
    UpdaterService.exe             440 Services                   0      2,100 K
    rpcnetp.exe                   1704 Services                   0      2,300 K
    Ath_WlanAgent.exe             2036 Services                   0      3,388 K
    SearchIndexer.exe             2284 Services                   0     20,684 K
    taskhost.exe                  2996 Console                    1      3,920 K
    dwm.exe                       3064 Console                    1     73,108 K
    explorer.exe                  1708 Console                    1     47,820 K
    SeaPort.EXE                   2960 Services                   0      2,560 K
    svchost.exe                   1504 Services                   0      4,548 K
    IAStorDataMgrSvc.exe          1448 Services                   0      8,756 K
    LMS.exe                       1816 Services                   0      2,444 K
    UNS.exe                       2340 Services                   0      4,684 K
    wmpnetwk.exe                  1912 Services                   0      2,496 K
    ZuneLauncher.exe              2504 Console                    1      3,364 K
    msseces.exe                   1600 Console                    1      6,912 K
    hkcmd.exe                      896 Console                    1      3,108 K
    igfxpers.exe                  2400 Console                    1      6,332 K
    RAVCpl64.exe                  2268 Console                    1      7,216 K
    igfxsrvc.exe                  1672 Console                    1      4,428 K
    ETDCtrl.exe                   3076 Console                    1      6,912 K
    ePowerTray.exe                3084 Console                    1      5,088 K
    igfxext.exe                   3368 Console                    1      2,788 K
    ETDCtrlHelper.exe             3440 Console                    1      2,668 K
    unsecapp.exe                  3448 Console                    1      3,480 K
    WmiPrvSE.exe                  3492 Services                   0      5,172 K
    ePowerEvent.exe               3552 Console                    1      1,836 K
    LManager.exe                  3772 Console                    1      7,448 K
    MMDx64Fx.exe                  3844 Console                    1      3,352 K
    LMworker.exe                  3896 Console                    1      2,616 K
    cmd.exe                       3036 Console                    1      2,964 K
    conhost.exe                   2720 Console                    1      8,604 K
    notepad.exe                   3668 Console                    1     20,696 K
    tasklist.exe                  3828 Console                    1      5,492 K
    WmiPrvSE.exe                  3892 Services                   0      6,036 K

     DisplayName= <display name>
     password= <password>

    C:\Windows\system32>sc config lanmanworkstation start= disabled
    [SC] ChangeServiceConfig SUCCESS


    wmic:root\cli>wmic.exe
    wmic.exe - Alias not found.
    wmic:root\cli>process get
    Caption               CommandLine                                                                                                                                                                                                                                                                                         CreationClassName  CreationDate               CSCreationClassName   CSName          Description           ExecutablePath
    System Idle Process                                                                                                                                                                                                                                                                                                       Win32_Process                                 Win32_ComputerSystem  5898OGARDENSDR  System Idle Process
    System                                                                                                                                                                                                                                                                                                                    Win32_Process      20120728110202.651205-420  Win32_ComputerSystem  5898OGARDENSDR  System
    smss.exe              \SystemRoot\System32\smss.exe                                                                                                                                                                                                                                                                       Win32_Process      20120728110202.760405-420  Win32_ComputerSystem  5898OGARDENSDR  smss.exe
    csrss.exe             %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16  Win32_Process      20120728110214.039225-420  Win32_ComputerSystem  5898OGARDENSDR  csrss.exe             C:\Windows\system32\csrss.exe
    csrss.exe             %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16  Win32_Process      20120728110215.942428-420  Win32_ComputerSystem  5898OGARDENSDR  csrss.exe             C:\Windows\system32\csrss.exe
    wininit.exe           wininit.exe                                                                                                                                                                                                                                                                                         Win32_Process      20120728110215.989228-420  Win32_ComputerSystem  5898OGARDENSDR  wininit.exe           C:\Windows\system32\wininit.exe
    winlogon.exe          winlogon.exe                                                                                                                                                                                                                                                                                        Win32_Process      20120728110216.504029-420  Win32_ComputerSystem  5898OGARDENSDR  winlogon.exe          C:\Windows\system32\winlogon.exe
    services.exe          C:\Windows\system32\services.exe                                                                                                                                                                                                                                                                    Win32_Process      20120728110217.455631-420  Win32_ComputerSystem  5898OGARDENSDR  services.exe          C:\Windows\system32\services.exe
    lsass.exe             C:\Windows\system32\lsass.exe                                                                                                                                                                                                                                                                       Win32_Process      20120728110217.861232-420  Win32_ComputerSystem  5898OGARDENSDR  lsass.exe             C:\Windows\system32\lsass.exe
    lsm.exe               C:\Windows\system32\lsm.exe                                                                                                                                                                                                                                                                         Win32_Process      20120728110217.923632-420  Win32_ComputerSystem  5898OGARDENSDR  lsm.exe               C:\Windows\system32\lsm.exe
    svchost.exe           C:\Windows\system32\svchost.exe -k DcomLaunch                                                                                                                                                                                                                                                       Win32_Process      20120728110220.794037-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\system32\svchost.exe
    svchost.exe           C:\Windows\system32\svchost.exe -k RPCSS                                                                                                                                                                                                                                                            Win32_Process      20120728110221.652038-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\system32\svchost.exe
    MsMpEng.exe           "C:\Program Files\Microsoft Security Client\MsMpEng.exe"                                                                                                                                                                                                                                            Win32_Process      20120728110221.854839-420  Win32_ComputerSystem  5898OGARDENSDR  MsMpEng.exe           C:\Program Files\Microsoft Security Client\MsMpEng.exe
    svchost.exe           C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted                                                                                                                                                                                                                                    Win32_Process      20120728110222.978041-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\System32\svchost.exe
    svchost.exe           C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted                                                                                                                                                                                                                                     Win32_Process      20120728110223.446042-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\System32\svchost.exe
    svchost.exe           C:\Windows\system32\svchost.exe -k netsvcs                                                                                                                                                                                                                                                          Win32_Process      20120728110223.461642-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\system32\svchost.exe
    svchost.exe           C:\Windows\system32\svchost.exe -k LocalService                                                                                                                                                                                                                                                     Win32_Process      20120728110225.255645-420  Win32_ComputerSystem  5898OGARDENSDR  svchost.exe           C:\Windows\sy

    SadLittleAcer

      Topic Starter


      Starter

      • Experience: Beginner
      • OS: Unknown
      Re: Please advise / help: Laptop hacked via Bluetooth Phone
      « Reply #1 on: July 31, 2012, 01:37:01 AM »
      On those cmds, in the middle of them, I disabled lanman (C:\Windows\system32>sc config lanmanworkstation start= disabled
      [SC] ChangeServiceConfig SUCCESS).  I should have done all the info cmds before I tried that sc config command, I was just anxious to
      see if it would work I guess. 
      I have the initial first time start up events on a USB drive.  I'm just concerned that if I plug it in to this laptop to copy / paste them
      into the forum I'll lose my laptop again.

      SuperDave

      • Malware Removal Specialist
      • Moderator


      • Genius
      • Thanked: 1020
      • Certifications: List
      • Experience: Expert
      • OS: Windows 10
      Re: Please advise / help: Laptop hacked via Bluetooth Phone
      « Reply #2 on: July 31, 2012, 06:05:55 PM »
      Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.

      1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
      2. The fixes are specific to your problem and should only be used for this issue on this machine.
      3. If you don't know or understand something, please don't hesitate to ask.
      4. Please DO NOT run any other tools or scans while I am helping you.
      5. It is important that you reply to this thread. Do not start a new topic.
      6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
      7. Absence of symptoms does not mean that everything is clear.

      If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
      *************************************************************************
      Please run these scans on one computer only. It will be too confusing to try to clean more than one at the same time.

      SUPERAntiSpyware

      If you already have SUPERAntiSpyware be sure to check for updates before scanning!


      Download SuperAntispyware Free Edition (SAS)
      * Double-click the icon on your desktop to run the installer.
      * When asked to Update the program definitions, click Yes
      * If you encounter any problems while downloading the updates, manually download and unzip them from here
      * Next click the Preferences button.

      •Under Start-Up Options uncheck Start SUPERAntiSpyware when Windows starts
      * Click the Scanning Control tab.
      * Under Scanner Options make sure only the following are checked:

      •Close browsers before scanning
      •Scan for tracking cookies
      •Terminate memory threats before quarantining
      Please leave the others unchecked

      •Click the Close button to leave the control center screen.

      * On the main screen click Scan your computer
      * On the left check the box for the drive you are scanning.
      * On the right choose Perform Complete Scan
      * Click Next to start the scan. Please be patient while it scans your computer.
      * After the scan is complete a summary box will appear. Click OK
      * Make sure everything in the white box has a check next to it, then click Next
      * It will quarantine what it found and if it asks if you want to reboot, click Yes

      •To retrieve the removal information please do the following:
      •After reboot, double-click the SUPERAntiSpyware icon on your desktop.
      •Click Preferences. Click the Statistics/Logs tab.

      •Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.

      •It will open in your default text editor (preferably Notepad).
      •Save the notepad file to your desktop by clicking (in notepad) File > Save As...

      * Save the log somewhere you can easily find it. (normally the desktop)
      * Click close and close again to exit the program.
      *Copy and Paste the log in your post.
      *********************************************
      Please download Malwarebytes Anti-Malware from here.
      Double Click mbam-setup.exe to install the application.
      • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
      • If an update is found, it will download and install the latest version.
      • Once the program has loaded, select "Perform Full Scan", then click Scan.
      • The scan may take some time to finish,so please be patient.
      • When the scan is complete, click OK, then Show Results to view the results.
      • Make sure that everything is checked, and click Remove Selected.
      • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
      • Please save the log to a location you will remember.
      • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
      • Copy and paste the entire report in your next reply.
      Extra Note:

      If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
      ********************************************************
      Please download aswMBR.exe ( 511KB ) to your desktop.

      Double click the aswMBR.exe to run it



      Click the "Scan" button to start scan

      Note: Do not take action against any **Rootkit** entries until I have reviewed the log. Often there are false positives



      On completion of the scan click save log, save it to your desktop and post in your next reply
      Windows 8 and Windows 10 dual boot with two SSD's

      SadLittleAcer

        Topic Starter


        Starter

        • Experience: Beginner
        • OS: Unknown
        Re: Please advise / help: Laptop hacked via Bluetooth Phone
        « Reply #3 on: August 01, 2012, 10:38:14 AM »
        Thank you so much for responding, your help means a lot to me.

        No much in the log (?)   Yesterday I noticed that the windows updates had not been installed to my computer, but instead to drives named   \\?\C:\OfflineUpdateHotfixToWOS\scratchdir   and \\?\E:\Windows\SoftwareDistribution Download.  I don't have anything hooked/mounted to the laptop, what is this?
        Here's the log
        SUPERAntiSpyware Scan Log
        http://www.superantispyware.com

        Generated 08/01/2012 at 09:14 AM

        Application Version : 5.5.1012

        Core Rules Database Version : 8990
        Trace Rules Database Version: 6802

        Scan type       : Complete Scan
        Total Scan Time : 00:59:22

        Operating System Information
        Windows 7 Home Premium 64-bit, Service Pack 1 (Build 6.01.7601)
        UAC On - Limited User

        Memory items scanned      : 523
        Memory threats detected   : 0
        Registry items scanned    : 63168
        Registry threats detected : 0
        File items scanned        : 99795
        File threats detected     : 13

        Adware.Tracking Cookie
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\FB3N4P1Y.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\BL0DOKP5.txt [ Cookie:[email protected]/accounts ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\QCIJJJH6.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\DQD0HFFA.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\NAUMEQ9P.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\BVHKFZW3.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\S6WYCV06.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\JJYSS7KP.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\6BPDF1F8.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\AY3XUHP3.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\JHHGXT8I.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\CN38M69B.txt [ Cookie:[email protected]/ ]
           C:\USERS\TRUSTEDINSTALLER\AppData\Roaming\Microsoft\Windows\Cookies\Low\DZIRARPE.txt [ Cookie:[email protected]/ ]

        SuperDave

        • Malware Removal Specialist
        • Moderator


        • Genius
        • Thanked: 1020
        • Certifications: List
        • Experience: Expert
        • OS: Windows 10
        Re: Please advise / help: Laptop hacked via Bluetooth Phone
        « Reply #4 on: August 01, 2012, 04:27:42 PM »
        I still need to see the MBAM and aswMBR.exe logs and also these two logs.

        Download DDS from HERE or HERE and save it to your desktop.

        Vista users right click on dds and select Run as administrator (you will receive a UAC prompt, please allow it)

        * XP users Double click on dds to run it.
        * If your antivirus or firewall try to block DDS then please allow it to run.
        * When finished DDS will open two (2) logs.
        * Save both reports to your desktop.
        * The instructions here ask you to attach the Attach.txt.



        1) DDS.txt
        2) Attach.txt
        Instead of attaching, please copy/past both logs into your Thread

        Note: DDS will instruct you to post the Attach.txt log as an attachment.
        Please just post it as you would any other log by copying and pasting it into the reply.

        •Close the program window, and delete the program from your desktop.

        Please note: You may have to disable any script protection running if the scan fails to run.
        After downloading the tool, disconnect from the internet and disable all antivirus protection.
        Run the scan, enable your A/V and reconnect to the internet.
        Information on A/V control HERE .Then post your DDS logs. (DDS.txt and Attach.txt )
        Windows 8 and Windows 10 dual boot with two SSD's

        SadLittleAcer

          Topic Starter


          Starter

          • Experience: Beginner
          • OS: Unknown
          Re: Please advise / help: Laptop hacked via Bluetooth Phone
          « Reply #5 on: August 02, 2012, 05:39:02 PM »
          Will do. Please don't close the topic on me, I just have to wait until Saturday in case it shuts the laptop down and I have to reinstall Windows again, I won't have time during this work week.

          Any thoughts on the Windows update thing? I noticed today there's a folder in my Android called "fakeidentd". I can't view the files inside it. Don't know if it's related ?

          SuperDave

          • Malware Removal Specialist
          • Moderator


          • Genius
          • Thanked: 1020
          • Certifications: List
          • Experience: Expert
          • OS: Windows 10
          Re: Please advise / help: Laptop hacked via Bluetooth Phone
          « Reply #6 on: August 02, 2012, 06:20:52 PM »
          Will do. Please don't close the topic on me, I just have to wait until Saturday in case it shuts the laptop down and I have to reinstall Windows again, I won't have time during this work week.

          Any thoughts on the Windows update thing? I noticed today there's a folder in my Android called "fakeidentd". I can't view the files inside it. Don't know if it's related ?
          This thread will remain open until we get this resolved. Don't reinstall Windows until we've explored all options. I have many tricks up my sleeve. As for the updates, we won't know until we run some scans.
          Windows 8 and Windows 10 dual boot with two SSD's