Hi again,
I'd like to add some details.
First the attachment is the apihooks plugin output log and second:
# vol idt | grep UNKNOWN
Volatility Foundation Volatility Framework 2.3.1
     0      2       0x58 0x00000000 UNKNOWN
     0      8       0x50 0x00000000 UNKNOWN
     0     20        0x8 0x00000000 UNKNOWN
     0     21        0x8 0x00000000 UNKNOWN
     0     22        0x8 0x00000000 UNKNOWN
     0     23        0x8 0x00000000 UNKNOWN
     0     24        0x8 0x00000000 UNKNOWN
     0     25        0x8 0x00000000 UNKNOWN
     0     26        0x8 0x00000000 UNKNOWN
     0     27        0x8 0x00000000 UNKNOWN
     0     28        0x8 0x00000000 UNKNOWN
     0     29        0x8 0x00000000 UNKNOWN
     0     51        0x8 0x89af9bec UNKNOWN
     0     52        0x8 0x89b25044 UNKNOWN
     0     72        0x8 0x89f32bec UNKNOWN
     0     93        0x8 0x89c0f8bc UNKNOWN
     0     A2        0x8 0x89b01044 UNKNOWN
     0     A3        0x8 0x89f3fbec UNKNOWN
     0     B1        0x8 0x89f688bc UNKNOWN
     0     B3        0x8 0x89b262fc UNKNOWN
     1      2       0x58 0x00000000 UNKNOWN
     1      8       0x50 0x00000000 UNKNOWN
     1     20        0x8 0x00000000 UNKNOWN
     1     21        0x8 0x00000000 UNKNOWN
     1     22        0x8 0x00000000 UNKNOWN
     1     23        0x8 0x00000000 UNKNOWN
     1     24        0x8 0x00000000 UNKNOWN
     1     25        0x8 0x00000000 UNKNOWN
     1     26        0x8 0x00000000 UNKNOWN
     1     27        0x8 0x00000000 UNKNOWN
     1     28        0x8 0x00000000 UNKNOWN
     1     29        0x8 0x00000000 UNKNOWN
     1     51        0x8 0x89af9e54 UNKNOWN
     1     52        0x8 0x89b252ac UNKNOWN
     1     72        0x8 0x89f32e54 UNKNOWN
     1     93        0x8 0x89c0fb24 UNKNOWN
     1     A2        0x8 0x89b012ac UNKNOWN
     1     A3        0x8 0x89f3fe54 UNKNOWN
     1     B1        0x8 0x89f68b24 UNKNOWN
     1     B3        0x8 0x89b26564 UNKNOWN
This should not be normal, right ?
Thank you
2014-04-04 20:28 GMT+00:00 mediomen27 <mediomen27(a)gmail.com>:
  Hi Michael,
 yes, the server has installed Kaspersky AV.
 and here u can see that it should be kaspersky component:
 
http://www.shouldiblockit.com/klogon.dll-41922.aspx
 I have tried to dump the dll but I have got the following error:
 # vol dlldump -r klogon -D /root/dump/
 Volatility Foundation Volatility Framework 2.3.1
 Process(V) Name                 Module Base Module Name          Result
 ---------- -------------------- ----------- -------------------- ------
 0x8967d158 winlogon.exe         0x010000000 klogon.dll           Error:
 DllBase is paged
 Also, I have tried the following:
 # vol dlldump -b 0x10000000 -D /root/dump/
 and the dumped files are all *clean*.
 and the follwoing looks clean:
 # vol dlldump -r winlogon -D /root/dump/
 Volatility Foundation Volatility Framework 2.3.1
 Process(V) Name                 Module Base Module Name          Result
 ---------- -------------------- ----------- -------------------- ------
 0x8967d158 winlogon.exe         0x001000000 winlogon.exe         OK:
 module.412.967d158.1000000.dll
 0x88ea0918 winlogon.exe         0x001000000 winlogon.exe         OK:
 module.9088.8ea0918.1000000.dll
 and here I have done (vol psscan |grep k):
 0x090e2a98 adskflex.exe       4992   2200 0x434f3000 2013-10-04 17:33:14
 UTC+0000
 0x09463d88 klnagent.exe      12352    468 0x32385000 2013-06-26 00:01:15
 UTC+0000   2013-06-26 09:15:42 UTC+0000
 0x09b5bb08 klserver.exe      10004    460 0x677a3000 2013-10-24 00:01:19
 UTC+0000
 0x09bcdaf0 jucheck.exe         884   2596 0x660cb000 2013-02-08 18:01:52
 UTC+0000   2013-02-08 18:09:58 UTC+0000
 0x09d95d88 adskflex.exe       2448   2200 0x62e6f000 2013-06-26 09:16:31
 UTC+0000   2013-10-04 17:33:10 UTC+0000
 and the PIDs 10004,4992 are clean  (virustotal).
 the 2448 is paged
 and the pid 12352 cannot give me any dump with
 $ vol procexedump -u -p 12352 -D /root/dump/
 But maybe now I have found something:
 # vol modules|grep -i pdf
 0x8987a688 pdfsd.sys            0xb9770000    0x11000
 \SystemRoot\system32\drivers\pdfsd.sys
 # vol moddump -r pdf -D /root/dump/
 Module Base Module Name          Result
 ----------- -------------------- ------
 0x0b9770000 pdfsd.sys            OK: driver.b9770000.sys
 # sha256sum /root/dump/driver.b9770000.sys
 09fd121fd79ebbda9dcd8fe259d3e57028ef5e908250ab91d1371282611a3926
 /root/dump/driver.b9770000.sys
https://www.virustotal.com/en/file/09fd121fd79ebbda9dcd8fe259d3e57028ef5e90…
 virustotal says Trojan/Win32.Genome..
 and now ?
 2014-04-01 5:23 GMT+00:00 Michael Ligh <michael.ligh(a)mnin.org>:
 What about the klogon.dll looks like Kaspersky? Is Kaspersky installed on
  the system? If you upload klogon.dll to
VirusTotal, does it get any hits? I
 would do the same thing with the winlogon executables. I can't see the
 names of the hooked API functions from your gmer screenshot, they're
 truncated, so can't give any advice there. You can run the apihooks plugin
 in Volatility and see where the hooks are pointing.
 HTH,
 MHL
 --------------------------------------------------
 Michael Ligh (@iMHLv2)
 GPG: 
http://mnin.org/gpg.pubkey.txt
 Blog: 
http://volatility-labs.blogspot.com
 On Mar 29, 2014, at 7:19 PM, mediomen27 <mediomen27(a)gmail.com> wrote:
 Hi,
 gmer has found something of suspicious. I have a screenshot of partial
 logs, here:
 
http://postimg.org/image/bgx0u5xt9/
  Now the server looks mysteriously clean thus the only clues I have are
 that screenshot and the vmware snapshot.
 Anyone could help me to investigate more deeply ?
 The following is what I have done alone:
 # vol pslist|grep logon
 Volatility Foundation Volatility Framework 2.3.1
 0x8967d158 winlogon.exe            412    332     18      535      0
 0 2013-06-26 09:16:14 UTC+0000
 0x88ea0918 winlogon.exe           9088    332     19      258      1
 0 2013-10-30 14:33:34 UTC+0000
 # vol dlllist -p 412|grep -i klogon
 0x10000000    0x36000        0x1 C:\WINDOWS\system32\klogon.dll
 klogon looks a kaspersky logon module
 # vol dlldump -b 0x10000000 -D /root/dumpprocess/
 and the dumped dll looks really something about kaspersky..
 # vol filescan|grep VC80
 Volatility Foundation Volatility Framework 2.3.1
 0x08d295d8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x08e684f0      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x08f0b920      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x0905a530      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x090822d0      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09175a90      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x09181e50      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09496250      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09509cc8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09555808      1      0 R--r-d
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\msvcr80.dll
 0x0958f860      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x095cd168      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x095f76a0      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x0960b668      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x0961d9d8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x0961e6c8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x096cda10      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x096f1db0      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x096f2d10      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x097c52d0      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x097fbb10      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09809e90      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09836350      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09843c68      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x0985aa50      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09872738      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x0987b340      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09a0fea8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x09a3ada8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x09a82f90      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x09bf9ef8      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86
 0x09d95428      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 0x09dadd18      1      1 R--rw-
\Device\HarddiskVolume1\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6229_x-ww_449d3952
 Thanks for any help.
  _______________________________________________
 Vol-users mailing list
 Vol-users(a)volatilityfoundation.org
 
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users