Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


svchost is being hijacked

  • This topic is locked This topic is locked
3 replies to this topic

#1 animus6


  • Members
  • 1 posts
  • Local time:10:36 AM

Posted 29 June 2011 - 01:22 AM

A few minutes after start-up one of the svchosts will start using a huge chunk of my cpu. I end the process, and some minutes later it will start back up again. In addition, clicking web-page links will sometimes redirect, sometimes not. There seems to be no rhyme or reason to it, but more often than not I will get redirected. The sites I'm redirected to are always random. The svchost problem was running while the gmer program did its thing. I'm not sure if that matters but I didn't think it safe to quit it till after gmer was done. I'm pretty sure that whatever is infecting my computer is attaching itself to a real svchost, because when I use end process to kill it the toolbar on the bottom of my screen, the start button, and sometimes my windows, revert to a more basic format. Like going from the xp style windows back to 98. Other times there are just chunks of missing color. Thanks in advance! And I wish I had cleared up my cookies and temp. internet files before I ran gmer...it took forever!

DDS (Ver_2011-06-23.01) - NTFSx86
Internet Explorer: 6.0.2900.5512 BrowserJavaVersion: 1.6.0_22
Run by Animus at 15:47:04 on 2011-06-28
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.1279.660 [GMT -4:00]
AV: AntiVir Desktop *Disabled/Outdated* {AD166499-45F9-482A-A743-FDD3350758C7}
============== Running Processes ===============
E:\Program Files\Avira\AntiVir Desktop\avguard.exe
E:\Program Files\Avira\AntiVir Desktop\avshadow.exe
E:\WINDOWS\system32\svchost -k DcomLaunch
E:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
E:\Program Files\Avira\AntiVir Desktop\sched.exe
e:\Program Files\Zune\ZuneBusEnum.exe
E:\Program Files\Zune\ZuneLauncher.exe
E:\Program Files\Avira\AntiVir Desktop\avgnt.exe
E:\Program Files\AIM\aim.exe
E:\Program Files\Windows NT\Accessories\WORDPAD.EXE
E:\WINDOWS\system32\svchost.exe -k netsvcs
============== Pseudo HJT Report ===============
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - e:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - e:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - e:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
uRun: [ctfmon.exe] e:\windows\system32\ctfmon.exe
mRun: [Zune Launcher] "e:\program files\zune\ZuneLauncher.exe"
mRun: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
mRun: [Adobe Reader Speed Launcher] "c:\programs\reader\Reader_sl.exe"
mRun: [Adobe ARM] "e:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [SunJavaUpdateSched] "e:\program files\common files\java\java update\jusched.exe"
mRun: [avgnt] "e:\program files\avira\antivir desktop\avgnt.exe" /min
dRunOnce: [RunNarrator] Narrator.exe
uPolicies-explorer: NoInstrumentation = 1 (0x1)
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - e:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
TCP: DhcpNameServer =
TCP: Interfaces\{7F3A8115-741B-4B5A-984A-11D3E52C40BB} : DhcpNameServer =
Notify: Antiwpa - antiwpa.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - e:\windows\system32\WPDShServiceObj.dll
Hosts: www.spywareinfo.com
================= FIREFOX ===================
FF - ProfilePath - e:\documents and settings\animus\application data\mozilla\firefox\profiles\ourzsb9w.default\
FF - prefs.js: browser.startup.homepage - www.google.com
FF - prefs.js: keyword.URL - hxxp://www.bing.com/search?pc=ZUGO&form=ZGAADF&q=
FF - plugin: c:\programs\plugins\npdeployJava1.dll
FF - plugin: c:\programs\reader\browser\nppdf32.dll
FF - plugin: e:\program files\java\jre6\bin\new_plugin\npdeployJava1.dll
FF - user.js: network.protocol-handler.warn-external.dnupdate - false
============= SERVICES / DRIVERS ===============
R1 avgio;avgio;e:\program files\avira\antivir desktop\avgio.sys [2011-6-25 11608]
R2 AntiVirSchedulerService;Avira AntiVir Scheduler;e:\program files\avira\antivir desktop\sched.exe [2011-6-25 136360]
R2 AntiVirService;Avira AntiVir Guard;e:\program files\avira\antivir desktop\avguard.exe [2011-6-25 269480]
R2 avgntflt;avgntflt;e:\windows\system32\drivers\avgntflt.sys [2011-6-25 61960]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;e:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 iiphziq;Windows Monitor;e:\windows\system32\svchost.exe -k netsvcs [2008-4-14 14336]
S2 zgwwn;Support Manager;e:\windows\system32\svchost.exe -k netsvcs [2008-4-14 14336]
S3 WMZuneComm;Zune Windows Mobile Connectivity Service;e:\program files\zune\WMZuneComm.exe [2010-11-11 268528]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache;e:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
=============== File Associations ===============
=============== Created Last 30 ================
2011-06-28 18:44:32 -------- d-----w- e:\windows\system32\NtmsData
2011-06-28 04:26:57 -------- d-----w- e:\documents and settings\animus\local settings\application data\Microsoft Help
2011-06-25 23:35:39 -------- d-----w- e:\program files\CCleaner
2011-06-25 23:35:05 -------- d-----w- e:\documents and settings\animus\application data\Avira
2011-06-25 23:28:10 61960 ----a-w- e:\windows\system32\drivers\avgntflt.sys
2011-06-25 23:28:09 -------- d-----w- e:\program files\Avira
2011-06-25 23:28:09 -------- d-----w- e:\documents and settings\all users\application data\Avira
2011-06-25 22:52:58 388096 ----a-r- e:\documents and settings\animus\application data\microsoft\installer\{45a66726-69bc-466b-a7a4-12fcba4883d7}\HiJackThis.exe
2011-06-25 22:52:57 -------- d-----w- e:\program files\Trend Micro
2011-06-14 15:22:39 -------- d-----w- e:\documents and settings\animus\application data\vmntemplate
2011-06-11 22:03:45 404640 ----a-w- e:\windows\system32\FlashPlayerCPLApp.cpl
2011-06-11 21:51:24 -------- d-----w- e:\documents and settings\animus\local settings\application data\FLVService
2011-06-07 16:11:43 73728 ----a-w- e:\windows\system32\javacpl.cpl
2011-06-07 16:11:43 472808 ----a-w- e:\windows\system32\deployJava1.dll
2011-06-07 15:22:29 331776 ----a-r- e:\documents and settings\animus\application data\microsoft\installer\{41536d42-c529-4d14-8ee7-57b92c1ef9d7}\OneClickJoiner.exe1_41536D42C5294D148EE757B92C1EF9D7.exe
2011-06-07 15:22:29 331776 ----a-r- e:\documents and settings\animus\application data\microsoft\installer\{41536d42-c529-4d14-8ee7-57b92c1ef9d7}\OneClickJoiner.exe_41536D42C5294D148EE757B92C1EF9D7.exe
2011-06-07 15:22:29 -------- d-----w- e:\program files\CheshireCat
2011-06-07 15:06:26 -------- d-----w- e:\documents and settings\animus\local settings\application data\Welltek_Software
2011-06-07 15:06:10 -------- d-----w- e:\program files\001 File Joiner and Splitter 4.0
2011-06-06 20:02:52 74072 ----a-w- e:\windows\system32\XAPOFX1_4.dll
2011-06-06 20:02:52 528216 ----a-w- e:\windows\system32\XAudio2_6.dll
2011-06-06 20:02:51 238936 ----a-w- e:\windows\system32\xactengine3_6.dll
2011-06-06 20:02:51 22360 ----a-w- e:\windows\system32\X3DAudio1_7.dll
2011-06-06 20:02:49 4178264 ----a-w- e:\windows\system32\D3DX9_41.dll
2011-06-06 20:02:48 81768 ----a-w- e:\windows\system32\xinput1_3.dll
2011-06-06 20:02:39 3495784 ----a-w- e:\windows\system32\d3dx9_33.dll
2011-06-06 20:02:38 -------- d-----w- e:\windows\Logs
2011-06-06 20:02:35 -------- d-----w- e:\program files\Microsoft XNA
==================== Find3M ====================
2011-05-20 20:23:13 126976 --sha-r- e:\windows\system32\ckcnv0.exe
2011-05-02 23:05:10 3661824 ----a-w- e:\windows\system32\ffdshow.ax
2011-05-02 22:30:50 1144147 ----a-w- e:\windows\system32\ffmpegmt.dll
2011-05-02 22:27:54 3935545 ----a-w- e:\windows\system32\ffmpeg.dll
2011-05-02 20:23:46 324096 ----a-w- e:\windows\system32\TomsMoComp_ff.dll
2011-05-02 20:19:34 100352 ----a-w- e:\windows\system32\ff_wmv9.dll
2011-05-02 20:19:20 80896 ----a-w- e:\windows\system32\ff_vfw.dll
2011-04-09 21:30:46 6814952 ----a-w- e:\windows\system32\SpoonUninstall.exe
=================== ROOTKIT ====================
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, http://www.gmer.net
Windows 5.1.2600 Disk: Maxtor_2F040J0 rev.VAM51JJ0 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
device: opened successfully
user: MBR read successfully
Disk trace:
called modules: ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll >>UNKNOWN [0x896DC4F0]<<
_asm { PUSH EBP; MOV EBP, ESP; PUSH ECX; MOV EAX, [EBP+0x8]; CMP EAX, [0x896e27d0]; MOV EAX, [0x896e284c]; PUSH EBX; PUSH ESI; MOV ESI, [EBP+0xc]; MOV EBX, [ESI+0x60]; PUSH EDI; JNZ 0x20; MOV [EBP+0x8], EAX; }
1 nt!IofCallDriver[0x804E37C5] -> \Device\Harddisk0\DR0[0x89730AB8]
3 CLASSPNP[0xF7637FD7] -> nt!IofCallDriver[0x804E37C5] -> \Device\00000057[0x897A28A8]
5 ACPI[0xF75AE620] -> nt!IofCallDriver[0x804E37C5] -> [0x896F0D98]
\Driver\atapi[0x89766C00] -> IRP_MJ_CREATE -> 0x896DC4F0
error: Read A device attached to the system is not functioning.
kernel: MBR read successfully
_asm { XOR AX, AX; MOV SS, AX; MOV SP, 0x7c00; STI ; PUSH AX; POP ES; PUSH AX; POP DS; CLD ; MOV SI, 0x7c1b; MOV DI, 0x61b; PUSH AX; PUSH DI; MOV CX, 0x1e5; REP MOVSB ; RETF ; MOV BP, 0x7be; MOV CL, 0x4; CMP [BP+0x0], CH; JL 0x2e; JNZ 0x3a; }
detected disk devices:
detected hooks:
\Driver\atapi DriverStartIo -> 0x896DC33B
user & kernel MBR OK
Warning: possible TDL3 rootkit infection !
============= FINISH: 15:48:02.60 ===============

Attached Files

BC AdBot (Login to Remove)


#2 SweetTech


    Agent ST

  • Members
  • 13,421 posts
  • Gender:Male
  • Location:Antarctica
  • Local time:11:36 AM

Posted 02 July 2011 - 12:10 PM

Hello and welcome to the forums!

My secret agent name on the forums is SweetTech (you can call me ST for short), it's a pleasure to meet you. :)

I am very sorry for the delay in responding, but as you can see we are at the moment being flooded with logs which, when paired with the never-ending shortage of helpers, resulted in the delayed responding to your thread.

I would be glad to take a look at your log and help you with solving any malware problems.

If you have since resolved the issues you were originally experiencing, or have received help elsewhere, please inform me so that this topic can be closed.

If you have not, please adhere to the guidelines below and then follow instructions as outlined further below:

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forums.
  • Please make sure to carefully read any instruction that I give you. Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
  • If you're not sure, or if something unexpected happens, do NOT continue! Stop and ask!
  • In Windows Vista and Windows 7, all tools need to be started by right clicking and selecting Run as Administrator!
  • If I instruct you to download a specific tool in which you already have, please delete the copy that you have and re-download the tool. The reason I ask you to do this is because these tools are updated fairly regularly.
  • Do not do things I do not ask for, such as running a spyware scan on your computer. The one thing that you should always do, is to make sure sure that your anti-virus definitions are up-to-date!
  • Please do not use the Attachment feature for any log file. Do a Copy/Paste of the entire contents of the log file and submit it inside your post.
  • I am going to stick with you until ALL malware is gone from your system. I would appreciate it if you would do the same. From this point, we're in this together ;)
    Because of this, you must reply within three days
    failure to reply will result in the topic being closed!
  • Lastly, I am no magician. I will try very hard to fix your issues, but no promises can be made. Also be aware that some infections are so severe that you might need to resort to reformatting and reinstalling your operating system.
    Don't worry, this only happens in severe cases, but it sadly does happen. Be prepared to back up your data. Have means of backing up your data available.


Rootkit UnHooker (RkU)
Please download Rootkit Unhooker from one of the following links and save it to your desktop.
Link 1 (.exe file)
Link 2 (zipped file)
Link 3 (.rar file)In order to use this tool if you downloaded from either of the second two links, you will need to extract the RKUnhookerLE.exe file using a program capable of extracing ZIP and RAR compressed files. If you don't have an extraction program, you can downlaod, install and use the free 7-zip utility.

  • Double-click on RKUnhookerLE.exe to start the program.
    Vista/Windows 7 users right-click and select Run As Administrator.
  • Click the Report tab, then click Scan.
  • Check Drivers, Stealth Code, and uncheck the rest.
  • Click OK.
  • Wait until it's finished and then go to File > Save Report.
  • Save the report to your Desktop.
  • Copy and paste the contents of the report into your next reply.
-- Note: You may get this warning...just ignore it, click OK and continue: "Rootkit Unhooker has detected a parasite inside itself! It is recommended to remove parasite, okay?".


Running OTL

We need to create a FULL OTL Report
  • Please download OTL from here:
  • Save it to your desktop.
  • Double click on the Posted Image icon on your desktop.
  • Click the "Scan All Users" checkbox.
  • Change the "Extra Registry" option to "SafeList"
  • Push the Posted Image button.
  • Two reports will open, copy and paste them in a reply here:
    • OTL.txt <-- Will be opened
    • Extras.txt <-- Will be minimized


Please provide an update on how things are running in your next reply.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image

The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.

#3 SweetTech


    Agent ST

  • Members
  • 13,421 posts
  • Gender:Male
  • Location:Antarctica
  • Local time:11:36 AM

Posted 05 July 2011 - 02:41 PM


It's been several days since I last posted instructions for you to complete. Do you still require assistance in getting your computer cleaned up?

Please Note: Unless notified in advance, threads with no response in 3 days get closed.

If for any reason you cannot complete instructions within that time, that's fine, just put a post here so that I know you're still here. We get a lot of people who simply leave & if there is no contact for that amount of time I will have to assume you have abandoned your topic.


Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image

The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.

#4 SweetTech


    Agent ST

  • Members
  • 13,421 posts
  • Gender:Male
  • Location:Antarctica
  • Local time:11:36 AM

Posted 09 July 2011 - 12:40 PM

Due to lack of feedback this thread will now be closed. If you still require assistance, and would like to have your thread re-opened, please feel free to send me a Private Message (PM) being sure to include a link to your topic, and I'd be happy to re-open it.

Have I helped you? If you'd like to assist in the fight against malware, click here Posted Image

The instructions seen in this post have been specifically tailored to this user and the issues they are experiencing with their computer. If you think you have a similar problem, please first read this topic, and then begin your own, new thread. I do not offer private support via Private Message.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users