Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

spoolvs.exe writing to FP00001.SPL and ntvdm.exe cpu usage high


  • Please log in to reply
1 reply to this topic

#1 prioris

prioris

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:02:35 PM

Posted 28 August 2009 - 05:01 PM

hi

seems like i got a virus on my computer

i did a search for similar problem but found no clarity in any answers



Environment:

XP

single computer connected to cable modem


I ran McAfee antivirus and antispyware



Problem:

ntvdm.exe starts up.

cpu usage pushes near 100%.

Printer LPT1 has one job with "No Document Name"

spoolvs.exe writing to FP00001.SPL.

FP00001.SPL grows very large.


Temporary Solution

Killed ntvdm.exe

but eventually starts back up some days later

and spoolsv writes to file


********************************
****** excerpt from FILE MONITOR LOG *******
********************************


8:33:46 PM spoolsv.exe:520 IRP_MJ_CLEANUP C:\WINDOWS\system32\spool\PRINTERS\FP00001.SPL SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLOSE C:\WINDOWS\system32\spool\PRINTERS\FP00001.SPL SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLEANUP C:\WINDOWS\system32\spool\PRINTERS\FP00001.SPL SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLOSE C:\WINDOWS\system32\spool\PRINTERS\FP00001.SPL SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLEANUP C:\WINDOWS\System32\spool\PRINTERS\FP00001.SHD SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLOSE C:\WINDOWS\System32\spool\PRINTERS\FP00001.SHD SUCCESS
8:33:46 PM spoolsv.exe:520 IRP_MJ_CREATE C:\WINDOWS\System32\spool\PRINTERS\FP00001.SPL SUCCESS Options: Open Access: 00010080
8:33:46 PM spoolsv.exe:520 IRP_MJ_QUERY_INFORMATION C:\WINDOWS\System32\spool\PRINTERS\FP00001.SPL SUCCESS FileAttributeTagInformation
8:33:46 PM spoolsv.exe:520 IRP_MJ_SET_INFORMATION C:\WINDOWS\System32\spool\PRINTERS\FP00001.SPL SUCCESS Delete
8:33:46 PM spoolsv.exe:520 IRP_MJ_CLEANUP C:\WINDOWS\System32\spool\PRINTERS\FP00001.SPL SUCCESS





********************************
****** excerpts below from procexp LOG ****
********************************

Process PID CPU Description Company Name
svchost.exe 1544 Generic Host Process for Win32 Services Microsoft Corporation
ntvdm.exe 3580 25 NTVDM.EXE Microsoft Corporation



********************************
Process: ntvdm.exe Pid: 3580
********************************


Type Name
Directory \BaseNamedObjects
Event \BaseNamedObjects\DINPUTWINMM
Desktop \Default
File \Device\NamedPipe\Spooler\LPT1
KeyedEvent \KernelObjects\CritSecOutOfMemoryEvent
Directory \KnownDlls
Directory \Windows
WindowStation \Windows\WindowStations\WinSta0
WindowStation \Windows\WindowStations\WinSta0
File C:\WINDOWS\system32
Key HKLM
Key HKLM\HARDWARE\DESCRIPTION\System
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32
Thread ntvdm.exe(3580): 1228
Thread ntvdm.exe(3580): 1988
Thread ntvdm.exe(3580): 1988
Thread ntvdm.exe(3580): 2328







********************************
Process: svchost.exe Pid: 1544
********************************


Type Name
Directory \BaseNamedObjects
Mutant \BaseNamedObjects\_!MSFTHISTORY!_
Mutant \BaseNamedObjects\c:!documents and settings!localservice!cookies!
Mutant \BaseNamedObjects\c:!documents and settings!localservice!local settings!history!history.ie5!
Mutant \BaseNamedObjects\c:!documents and settings!localservice!local settings!temporary internet files!content.ie5!
Section \BaseNamedObjects\C:_Documents and Settings_LocalService_Cookies_index.dat_16384
Section \BaseNamedObjects\C:_Documents and Settings_LocalService_Local Settings_History_History.IE5_index.dat_16384
Section \BaseNamedObjects\C:_Documents and Settings_LocalService_Local Settings_Temporary Internet Files_Content.IE5_index.dat_32768
Event \BaseNamedObjects\crypt32LogoffEvent
Event \BaseNamedObjects\DINPUTWINMM
Mutant \BaseNamedObjects\RasPbFile
Section \BaseNamedObjects\SENS Information Cache
Semaphore \BaseNamedObjects\shell.{210A4BA0-3AEA-1069-A2D9-08002B30309D}
Semaphore \BaseNamedObjects\shell.{7CB834F0-527B-11D2-9D1F-0000F805CA57}
Semaphore \BaseNamedObjects\shell.{A48F1A32-A340-11D1-BC6B-00A0C90312E1}
Semaphore \BaseNamedObjects\shell.{A48F1A32-A340-11D1-BC6B-00A0C90312E1}
Mutant \BaseNamedObjects\ShimCacheMutex
Mutant \BaseNamedObjects\SHIMLIB_LOG_MUTEX
Section \BaseNamedObjects\ShimSharedMemory
Section \BaseNamedObjects\UrlZonesSM_SYSTEM
Event \BaseNamedObjects\userenv: User Profile setup event
Mutant \BaseNamedObjects\WininetProxyRegistryMutex
Mutant \BaseNamedObjects\WininetStartupMutex
Mutant \BaseNamedObjects\ZonesCacheCounterMutex
Mutant \BaseNamedObjects\ZonesCounterMutex
Mutant \BaseNamedObjects\ZonesLockedCacheCounterMutex
Desktop \Default
File \Device\Afd\AsyncConnectHlp
File \Device\Afd\Endpoint
File \Device\Ip
File \Device\Ip
File \Device\Ip
File \Device\KsecDD
File \Device\NamedPipe\net\NtControlPipe14
File \Device\NetBT_Tcpip_{F0D15B12-FE8D-4276-865B-AF0CC766BE6C}
File \Device\NetBT_Tcpip_{F9914F5D-C1E7-4A5A-BD9B-A2B3278BE716}
File \Device\Tcp
File \Device\Tcp
File \Device\Udp
KeyedEvent \KernelObjects\CritSecOutOfMemoryEvent
Directory \KnownDlls
Directory \Windows
WindowStation \Windows\WindowStations\WinSta0
WindowStation \Windows\WindowStations\WinSta0
File C:\Documents and Settings\LocalService\Cookies\index.dat
File C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat
File C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat
File C:\WINDOWS\system32
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03
File C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR
Key HKCR\CLSID
Key HKCR\CLSID
Key HKLM
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\COM3
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32
Key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32
Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Blocked
Key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Key HKLM\SYSTEM\ControlSet001\Hardware Profiles\0001
Key HKLM\SYSTEM\ControlSet001\Services\NetBT\Parameters
Key HKLM\SYSTEM\ControlSet001\Services\NetBT\Parameters\Interfaces
Key HKLM\SYSTEM\ControlSet001\Services\Tcpip\Linkage
Key HKLM\SYSTEM\ControlSet001\Services\Tcpip\Parameters
Key HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5
Key HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9
Key HKU
Key HKU
Key HKU
Key HKU
Key HKU\.DEFAULT
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Blocked
Key HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Key HKU\.DEFAULT\Software\Microsoft\Windows\ShellNoRoam
Key HKU\.DEFAULT\Software\Microsoft\Windows\ShellNoRoam\MUICache
Token NT AUTHORITY\SYSTEM
Thread svchost.exe(1544): 1548
Thread svchost.exe(1544): 1652
Thread svchost.exe(1544): 1652
Thread svchost.exe(1544): 4068
Thread svchost.exe(1544): 4068
Thread svchost.exe(1544): 4068
Thread svchost.exe(1544): 4076

BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 16 September 2009 - 09:20 AM

Hi,

Let's take a deeper look. :thumbsup:

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users