Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

svchost.exe constantly uses 50% CPU; resource monitor says winrscmde


  • This topic is locked This topic is locked
10 replies to this topic

#1 kikkomang

kikkomang

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:37 PM

Posted 28 December 2012 - 01:30 PM

I'm trying to fix my mother's PC and the first thing I noticed was that the fan was always on implying high CPU use. Windows task manager is always reporting at least 70% CPU usage even if none of the processes are reporting that high of a usage. Going into resource manager shows some svchost process with a description of winrscmde as taking the brunt of that cpu use. In addition, windows action center reports a recent removal of blacolaref. I have since installed the appropriate java update.


Thank you for your help!


DDS (Ver_2012-11-20.01) - NTFS_AMD64
Internet Explorer: 9.0.8112.16457 BrowserJavaVersion: 10.7.2
Run by j at 12:16:53 on 2012-12-28
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.2811.878 [GMT -6:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {B140BF4E-23BB-4198-90AB-A51A4C60A69C}
SP: Microsoft Security Essentials *Enabled/Updated* {0A215EAA-0581-4E16-AA1B-9E6837E7EC21}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\Windows\system32\atiesrxx.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\atieclxx.exe
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskhost.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Realtek\Audio\HDA\AERTSr64.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Windows\system32\SearchIndexer.exe
c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
c:\Program Files\Microsoft Security Client\NisSrv.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
C:\Windows\system32\wuauclt.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\PROGRA~2\MICROS~1\OFFICE11\OUTLOOK.EXE
C:\Program Files (x86)\Internet Explorer\iexplore.exe
C:\Windows\System32\perfmon.exe
\\.\globalroot\systemroot\svchost.exe -netsvcs
C:\Windows\system32\taskmgr.exe
C:\Program Files (x86)\Mozilla Firefox\firefox.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Users\j\Downloads\asdf.exe
C:\Windows\system32\msiexec.exe
C:\Windows\system32\vssvc.exe
C:\Windows\System32\svchost.exe -k swprv
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\msiexec.exe
C:\Windows\system32\MsiExec.exe
C:\Windows\System32\cscript.exe
.
============== Pseudo HJT Report ===============
.
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll
uRun: [{68A81D02-2D4E-7D86-46C8-67A54F1D37C7}] C:\Users\j\AppData\Roaming\Fautt\poca.exe
mRun: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
mRun: [StartCCC] "c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
mPolicies-Explorer: NoActiveDesktop = dword:1
mPolicies-Explorer: NoActiveDesktopChanges = dword:1
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - C:\PROGRA~2\MICROS~1\OFFICE11\EXCEL.EXE/3000
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{7989D811-F97D-4B80-835F-5C61F93EDBB1} : DHCPNameServer = 192.168.1.1
SSODL: WebCheck - <orphaned>
x64-Run: [SynTPEnh] C:\Program Files (x86)\Synaptics\SynTP\SynTPEnh.exe
x64-Run: [RTHDVCPL] C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe -s
x64-Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
x64-SSODL: WebCheck - <orphaned>
.
================= FIREFOX ===================
.
FF - ProfilePath - C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - plugin: C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll
FF - plugin: C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll
FF - plugin: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_5_502_135.dll
FF - plugin: C:\Windows\SysWOW64\npDeployJava1.dll
FF - plugin: C:\Windows\SysWOW64\npmproxy.dll
FF - ExtSQL: 2012-11-27 22:25; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
.
---- FIREFOX POLICIES ----
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
============= SERVICES / DRIVERS ===============
.
R0 amd_sata;amd_sata;C:\Windows\System32\drivers\amd_sata.sys [2010-5-14 73856]
R0 amd_xata;amd_xata;C:\Windows\System32\drivers\amd_xata.sys [2010-5-14 28800]
R0 MpFilter;Microsoft Malware Protection Driver;C:\Windows\System32\drivers\MpFilter.sys [2012-8-30 228768]
R2 NisDrv;Microsoft Network Inspection System;C:\Windows\System32\drivers\NisDrvWFP.sys [2012-8-30 128456]
R3 RTL8167;Realtek 8167 NT Driver;C:\Windows\System32\drivers\Rt64win7.sys [2009-6-10 187392]
R3 usbfilter;AMD USB Filter Driver;C:\Windows\System32\drivers\usbfilter.sys [2012-10-13 38528]
S3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;C:\Windows\System32\drivers\RtsUStor.sys [2012-10-13 245792]
S3 WDC_SAM;WD SCSI Pass Thru driver;C:\Windows\System32\drivers\wdcsam64.sys [2008-5-6 14464]
.
=============== Created Last 30 ================
.
2012-12-28 18:19:53 108008 ----a-w- C:\Windows\System32\WindowsAccessBridge-64.dll
2012-12-28 11:04:41 9125352 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{39F24234-0FD7-4151-8ADE-6156A8150C05}\mpengine.dll
2012-12-27 05:03:08 9125352 ------w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-12-22 10:38:44 46080 ----a-w- C:\Windows\System32\atmlib.dll
2012-12-22 10:38:44 34304 ----a-w- C:\Windows\SysWow64\atmlib.dll
2012-12-22 10:38:40 367616 ----a-w- C:\Windows\System32\atmfd.dll
2012-12-22 10:38:39 295424 ----a-w- C:\Windows\SysWow64\atmfd.dll
2012-12-12 02:19:47 2048 ----a-w- C:\Windows\SysWow64\tzres.dll
2012-12-12 02:18:51 478208 ----a-w- C:\Windows\System32\dpnet.dll
2012-12-12 02:18:49 376832 ----a-w- C:\Windows\SysWow64\dpnet.dll
2012-12-12 02:18:47 295792 ----a-w- C:\Windows\System32\drivers\volsnap.sys
.
==================== Find3M ====================
.
2012-12-28 18:18:48 959976 ----a-w- C:\Windows\System32\deployJava1.dll
2012-12-28 18:18:48 1081320 ----a-w- C:\Windows\System32\npDeployJava1.dll
2012-12-22 17:30:36 73656 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-22 17:30:36 697272 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
2012-11-22 08:20:36 3147264 ----a-w- C:\Windows\System32\win32k.sys
2012-11-14 06:11:44 2312704 ----a-w- C:\Windows\System32\jscript9.dll
2012-11-14 06:04:11 1392128 ----a-w- C:\Windows\System32\wininet.dll
2012-11-14 06:02:49 1494528 ----a-w- C:\Windows\System32\inetcpl.cpl
2012-11-14 05:57:46 599040 ----a-w- C:\Windows\System32\vbscript.dll
2012-11-14 05:57:35 173056 ----a-w- C:\Windows\System32\ieUnatt.exe
2012-11-14 05:52:40 2382848 ----a-w- C:\Windows\System32\mshtml.tlb
2012-11-14 02:09:22 1800704 ----a-w- C:\Windows\SysWow64\jscript9.dll
2012-11-14 01:58:15 1427968 ----a-w- C:\Windows\SysWow64\inetcpl.cpl
2012-11-14 01:57:37 1129472 ----a-w- C:\Windows\SysWow64\wininet.dll
2012-11-14 01:49:25 142848 ----a-w- C:\Windows\SysWow64\ieUnatt.exe
2012-11-14 01:48:27 420864 ----a-w- C:\Windows\SysWow64\vbscript.dll
2012-11-14 01:44:42 2382848 ----a-w- C:\Windows\SysWow64\mshtml.tlb
2012-11-09 05:34:27 2048 ----a-w- C:\Windows\System32\tzres.dll
2012-10-16 21:20:49 135168 ----a-w- C:\Windows\apppatch\AppPatch64\AcXtrnal.dll
2012-10-16 21:20:46 347648 ----a-w- C:\Windows\apppatch\AppPatch64\AcLayers.dll
2012-10-16 20:34:37 559104 ----a-w- C:\Windows\apppatch\AcLayers.dll
2012-10-14 00:11:27 0 ----a-w- C:\Windows\ativpsrm.bin
2012-10-13 23:40:08 95208 ----a-w- C:\Windows\SysWow64\WindowsAccessBridge-32.dll
2012-10-13 23:40:07 821736 ----a-w- C:\Windows\SysWow64\npDeployJava1.dll
2012-10-13 23:40:07 746984 ----a-w- C:\Windows\SysWow64\deployJava1.dll
2012-10-04 17:38:56 362496 ----a-w- C:\Windows\System32\wow64win.dll
2012-10-04 17:38:56 243200 ----a-w- C:\Windows\System32\wow64.dll
2012-10-04 17:38:56 13312 ----a-w- C:\Windows\System32\wow64cpu.dll
2012-10-04 17:38:24 215040 ----a-w- C:\Windows\System32\winsrv.dll
2012-10-04 17:35:22 16384 ----a-w- C:\Windows\System32\ntvdm64.dll
2012-10-04 17:32:16 425984 ----a-w- C:\Windows\System32\KernelBase.dll
2012-10-04 16:54:18 5120 ----a-w- C:\Windows\SysWow64\wow32.dll
2012-10-04 16:54:17 274944 ----a-w- C:\Windows\SysWow64\KernelBase.dll
2012-10-04 15:19:57 338432 ----a-w- C:\Windows\System32\conhost.exe
2012-10-04 14:49:27 25600 ----a-w- C:\Windows\SysWow64\setup16.exe
2012-10-04 14:49:24 7680 ----a-w- C:\Windows\SysWow64\instnm.exe
2012-10-04 14:49:22 2048 ----a-w- C:\Windows\SysWow64\user.exe
2012-10-04 14:49:22 14336 ----a-w- C:\Windows\SysWow64\ntvdm64.dll
2012-10-04 14:44:29 6144 ---ha-w- C:\Windows\SysWow64\api-ms-win-security-base-l1-1-0.dll
2012-10-04 14:44:29 4608 ---ha-w- C:\Windows\SysWow64\api-ms-win-core-threadpool-l1-1-0.dll
2012-10-04 14:44:29 3584 ---ha-w- C:\Windows\SysWow64\api-ms-win-core-xstate-l1-1-0.dll
2012-10-04 14:44:29 3072 ---ha-w- C:\Windows\SysWow64\api-ms-win-core-util-l1-1-0.dll
2012-09-30 00:54:26 25928 ----a-w- C:\Windows\System32\drivers\mbam.sys
.
============= FINISH: 12:24:28.41 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 28 December 2012 - 04:01 PM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

-AdwCleaner-

  • Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 kikkomang

kikkomang
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:37 PM

Posted 28 December 2012 - 04:51 PM

Thank you for replying to my post! I first used SecurityCheck and then AdwCleaner. After reboot from AdwCleaner, the computer is still running with high CPU use and the svchost.exe winrscmde process is still using by far the most CPU and memory. Also, this problem persisted after running RogueKiller as well.



Results of screen317's Security Check version 0.99.56
Windows 7 x64 (UAC is enabled)
Out of date service pack!!
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Microsoft Security Essentials
Antivirus up to date!
`````````Anti-malware/Other Utilities Check:`````````
Malwarebytes Anti-Malware version 1.70.0.1100
Java 7 Update 7
Java version out of Date!
Adobe Flash Player 11.5.502.135
Adobe Reader 10.1.4 Adobe Reader out of Date!
Mozilla Firefox (17.0.1)
````````Process Check: objlist.exe by Laurent````````
Microsoft Security Essentials MSMpEng.exe
Microsoft Security Essentials msseces.exe
j Desktop antivirus stuff RogueKiller.exe
j Desktop antivirus stuff SecurityCheck.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````






# AdwCleaner v2.103 - Logfile created 12/28/2012 at 15:17:54
# Updated 25/12/2012 by Xplode
# Operating system : Windows 7 Ultimate (64 bits)
# User : j - J-PC
# Boot Mode : Normal
# Running from : C:\Users\j\Desktop\antivirus stuff\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16457

[OK] Registry is clean.

-\\ Mozilla Firefox v17.0.1 (en-US)

File : C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\2rvkglby.default\prefs.js

[OK] File is clean.

File : C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fce6t46i.defaultSAds\prefs.js

[OK] File is clean.

File : C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\prefs.js

C:\Users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\user.js ... Deleted !

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [1004 octets] - [28/12/2012 15:17:29]
AdwCleaner[S1].txt - [1031 octets] - [28/12/2012 15:17:54]

########## EOF - C:\AdwCleaner[S1].txt - [1091 octets] ##########










RogueKiller V8.4.1 [Dec 28 2012] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User : j [Admin rights]
Mode : Scan -- Date : 12/28/2012 15:27:07

Bad processes : 1
[SVCHOST] svchost.exe -- \\.\globalroot\systemroot\svchost.exe -> KILLED [TermProc]

Registry Entries : 3
[HJPOL] HKCU\[...]\System : disableregistrytools (0) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

Particular Files / Folders:

Driver : [NOT LOADED]

HOSTS File:
--> C:\Windows\system32\drivers\etc\hosts



MBR Check:

+++++ PhysicalDrive0: WDC WD32 00BEVT-60A23T0 SATA Disk Device +++++
--- User ---
[MBR] dab737ec28309001a04d197d15ad9f5b
[BSP] cfad58d932d50b7a8f910a4b4814992e : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 287179 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 588552192 | Size: 17762 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 624928768 | Size: 103 Mo
User = LL1 ... OK!
User != LL2 ... KO!
--- LL2 ---
[MBR] bab95170c4dd25bd78382f53bc178844
[BSP] 254dd57fc886b767657535bf210e1e23 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 287179 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 588552192 | Size: 17762 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 624928768 | Size: 103 Mo

Finished : << RKreport[1]_S_12282012_02d1527.txt >>
RKreport[1]_S_12282012_02d1527.txt

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 28 December 2012 - 05:21 PM

Hello

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 kikkomang

kikkomang
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:37 PM

Posted 28 December 2012 - 06:02 PM

Here is the log from combofix. I had no problems using combofix. However, the computer is still running at least 50% CPU and the svchost.exe is still using around 1.3 gigabytes of memory.




ComboFix 12-12-28.02 - j 12/28/2012 16:31:26.1.2 - x64
Microsoft Windows 7 Ultimate 6.1.7600.0.1252.1.1033.18.2811.1907 [GMT -6:00]
Running from: c:\users\j\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {B140BF4E-23BB-4198-90AB-A51A4C60A69C}
SP: Microsoft Security Essentials *Disabled/Updated* {0A215EAA-0581-4E16-AA1B-9E6837E7EC21}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\programdata\Microsoft\Windows\DRM\6E03.tmp
c:\programdata\Microsoft\Windows\DRM\6E62.tmp
c:\windows\svchost.exe
.
.
((((((((((((((((((((((((( Files Created from 2012-11-28 to 2012-12-28 )))))))))))))))))))))))))))))))
.
.
2012-12-28 22:39 . 2012-12-28 22:39 -------- d-----w- c:\users\Public\AppData\Local\temp
2012-12-28 22:39 . 2012-12-28 22:39 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-12-28 21:20 . 2012-12-28 21:20 76232 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{39F24234-0FD7-4151-8ADE-6156A8150C05}\offreg.dll
2012-12-28 21:19 . 2012-12-28 21:19 35664 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{39F24234-0FD7-4151-8ADE-6156A8150C05}\MpKsl3a6fbd89.sys
2012-12-28 19:54 . 2012-12-28 19:54 -------- d-----w- c:\users\j\AppData\Local\Programs
2012-12-28 18:20 . 2012-12-28 18:18 308200 ----a-w- c:\windows\system32\javaws.exe
2012-12-28 18:19 . 2012-12-28 18:18 108008 ----a-w- c:\windows\system32\WindowsAccessBridge-64.dll
2012-12-28 18:19 . 2012-12-28 18:18 188392 ----a-w- c:\windows\system32\javaw.exe
2012-12-28 18:19 . 2012-12-28 18:18 188392 ----a-w- c:\windows\system32\java.exe
2012-12-28 18:18 . 2012-12-28 18:18 -------- d-----w- c:\program files\Java
2012-12-28 11:04 . 2012-11-08 17:24 9125352 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{39F24234-0FD7-4151-8ADE-6156A8150C05}\mpengine.dll
2012-12-27 05:03 . 2012-11-08 17:24 9125352 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-12-22 10:38 . 2012-12-16 16:52 46080 ----a-w- c:\windows\system32\atmlib.dll
2012-12-22 10:38 . 2012-12-16 14:25 34304 ----a-w- c:\windows\SysWow64\atmlib.dll
2012-12-22 10:38 . 2012-12-16 14:40 367616 ----a-w- c:\windows\system32\atmfd.dll
2012-12-22 10:38 . 2012-12-16 14:25 295424 ----a-w- c:\windows\SysWow64\atmfd.dll
2012-12-12 02:19 . 2012-11-09 05:34 2048 ----a-w- c:\windows\system32\tzres.dll
2012-12-12 02:18 . 2012-11-02 05:27 478208 ----a-w- c:\windows\system32\dpnet.dll
2012-12-12 02:18 . 2012-11-02 04:48 376832 ----a-w- c:\windows\SysWow64\dpnet.dll
2012-12-12 02:18 . 2012-09-06 17:38 295792 ----a-w- c:\windows\system32\drivers\volsnap.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-12-28 18:18 . 2012-10-13 23:47 959976 ----a-w- c:\windows\system32\deployJava1.dll
2012-12-28 18:18 . 2012-10-13 23:47 1081320 ----a-w- c:\windows\system32\npDeployJava1.dll
2012-12-22 17:30 . 2012-10-13 23:20 73656 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-12-22 17:30 . 2012-10-13 23:20 697272 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2012-12-14 22:49 . 2012-10-19 03:46 24176 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-12-12 10:35 . 2012-10-19 05:18 67413224 ----a-w- c:\windows\system32\MRT.exe
2012-11-28 12:13 . 2012-11-28 12:18 972264 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{40A8C847-EA68-4C24-BC30-E7388FFD126E}\gapaengine.dll
2012-10-19 06:31 . 2012-10-20 13:32 972192 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\NISBackup\gapaengine.dll
2012-10-16 21:20 . 2012-11-28 12:18 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll
2012-10-16 21:20 . 2012-11-28 12:18 347648 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll
2012-10-16 20:34 . 2012-11-28 12:18 559104 ----a-w- c:\windows\apppatch\AcLayers.dll
2012-10-14 14:54 . 2012-10-14 14:54 74752 ----a-w- c:\windows\SysWow64\RegisterIEPKEYs.exe
2012-10-14 14:54 . 2012-10-14 14:54 161792 ----a-w- c:\windows\SysWow64\msls31.dll
2012-10-14 14:54 . 2012-10-14 14:54 86528 ----a-w- c:\windows\SysWow64\iesysprep.dll
2012-10-14 14:54 . 2012-10-14 14:54 76800 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
2012-10-14 14:54 . 2012-10-14 14:54 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
2012-10-14 14:54 . 2012-10-14 14:54 110592 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
2012-10-14 14:54 . 2012-10-14 14:54 63488 ----a-w- c:\windows\SysWow64\tdc.ocx
2012-10-14 14:54 . 2012-10-14 14:54 367104 ----a-w- c:\windows\SysWow64\html.iec
2012-10-14 14:54 . 2012-10-14 14:54 74752 ----a-w- c:\windows\SysWow64\iesetup.dll
2012-10-14 14:54 . 2012-10-14 14:54 23552 ----a-w- c:\windows\SysWow64\licmgr10.dll
2012-10-14 14:54 . 2012-10-14 14:54 152064 ----a-w- c:\windows\SysWow64\wextract.exe
2012-10-14 14:54 . 2012-10-14 14:54 150528 ----a-w- c:\windows\SysWow64\iexpress.exe
2012-10-14 14:54 . 2012-10-14 14:54 35840 ----a-w- c:\windows\SysWow64\imgutil.dll
2012-10-14 14:54 . 2012-10-14 14:54 11776 ----a-w- c:\windows\SysWow64\mshta.exe
2012-10-14 14:54 . 2012-10-14 14:54 101888 ----a-w- c:\windows\SysWow64\admparse.dll
2012-10-14 14:54 . 2012-10-14 14:54 89088 ----a-w- c:\windows\system32\RegisterIEPKEYs.exe
2012-10-14 14:54 . 2012-10-14 14:54 222208 ----a-w- c:\windows\system32\msls31.dll
2012-10-14 14:54 . 2012-10-14 14:54 197120 ----a-w- c:\windows\system32\msrating.dll
2012-10-14 14:54 . 2012-10-14 14:54 65024 ----a-w- c:\windows\system32\pngfilt.dll
2012-10-14 14:54 . 2012-10-14 14:54 267776 ----a-w- c:\windows\system32\ieaksie.dll
2012-10-14 14:54 . 2012-10-14 14:54 163840 ----a-w- c:\windows\system32\ieakui.dll
2012-10-14 14:54 . 2012-10-14 14:54 149504 ----a-w- c:\windows\system32\occache.dll
2012-10-14 14:54 . 2012-10-14 14:54 12288 ----a-w- c:\windows\system32\mshta.exe
2012-10-14 14:54 . 2012-10-14 14:54 114176 ----a-w- c:\windows\system32\admparse.dll
2012-10-14 14:54 . 2012-10-14 14:54 91648 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2012-10-14 14:54 . 2012-10-14 14:54 55296 ----a-w- c:\windows\system32\msfeedsbs.dll
2012-10-14 14:54 . 2012-10-14 14:54 49664 ----a-w- c:\windows\system32\imgutil.dll
2012-10-14 14:54 . 2012-10-14 14:54 48640 ----a-w- c:\windows\system32\mshtmler.dll
2012-10-14 14:54 . 2012-10-14 14:54 160256 ----a-w- c:\windows\system32\ieakeng.dll
2012-10-14 14:54 . 2012-10-14 14:54 145920 ----a-w- c:\windows\system32\iepeers.dll
2012-10-14 14:54 . 2012-10-14 14:54 135168 ----a-w- c:\windows\system32\IEAdvpack.dll
2012-10-14 14:54 . 2012-10-14 14:54 111616 ----a-w- c:\windows\system32\iesysprep.dll
2012-10-14 14:54 . 2012-10-14 14:54 10752 ----a-w- c:\windows\system32\msfeedssync.exe
2012-10-14 14:54 . 2012-10-14 14:54 89088 ----a-w- c:\windows\system32\ie4uinit.exe
2012-10-14 14:54 . 2012-10-14 14:54 82432 ----a-w- c:\windows\system32\icardie.dll
2012-10-14 14:54 . 2012-10-14 14:54 76800 ----a-w- c:\windows\system32\tdc.ocx
2012-10-14 14:54 . 2012-10-14 14:54 534528 ----a-w- c:\windows\system32\ieapfltr.dll
2012-10-14 14:54 . 2012-10-14 14:54 452608 ----a-w- c:\windows\system32\dxtmsft.dll
2012-10-14 14:54 . 2012-10-14 14:54 448512 ----a-w- c:\windows\system32\html.iec
2012-10-14 14:54 . 2012-10-14 14:54 39936 ----a-w- c:\windows\system32\iernonce.dll
2012-10-14 14:54 . 2012-10-14 14:54 3695416 ----a-w- c:\windows\system32\ieapfltr.dat
2012-10-14 14:54 . 2012-10-14 14:54 282112 ----a-w- c:\windows\system32\dxtrans.dll
2012-10-14 14:54 . 2012-10-14 14:54 85504 ----a-w- c:\windows\system32\iesetup.dll
2012-10-14 14:54 . 2012-10-14 14:54 403248 ----a-w- c:\windows\system32\iedkcs32.dll
2012-10-14 14:54 . 2012-10-14 14:54 30720 ----a-w- c:\windows\system32\licmgr10.dll
2012-10-14 14:54 . 2012-10-14 14:54 249344 ----a-w- c:\windows\system32\webcheck.dll
2012-10-14 14:54 . 2012-10-14 14:54 103936 ----a-w- c:\windows\system32\inseng.dll
2012-10-14 14:54 . 2012-10-14 14:54 165888 ----a-w- c:\windows\system32\iexpress.exe
2012-10-14 14:54 . 2012-10-14 14:54 160256 ----a-w- c:\windows\system32\wextract.exe
2012-10-13 23:40 . 2012-10-13 23:40 95208 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll
2012-10-13 23:40 . 2012-10-13 23:40 821736 ----a-w- c:\windows\SysWow64\npDeployJava1.dll
2012-10-13 23:40 . 2012-10-13 23:40 746984 ----a-w- c:\windows\SysWow64\deployJava1.dll
2012-10-04 16:45 . 2012-12-12 02:19 44032 ----a-w- c:\windows\apppatch\acwow64.dll
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-09-30 98304]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
R1 fphcfids;fphcfids;c:\windows\system32\drivers\fphcfids.sys [x]
R1 gjjsjdat;gjjsjdat;c:\windows\system32\drivers\gjjsjdat.sys [x]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2012-08-31 128456]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2012-09-13 368896]
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2010-05-07 245792]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-10-14 1255736]
R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam64.sys [2008-05-06 14464]
S0 amd_sata;amd_sata;c:\windows\system32\DRIVERS\amd_sata.sys [2010-05-14 73856]
S0 amd_xata;amd_xata;c:\windows\system32\DRIVERS\amd_xata.sys [2010-05-14 28800]
S1 MpKsl3a6fbd89;MpKsl3a6fbd89;c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{39F24234-0FD7-4151-8ADE-6156A8150C05}\MpKsl3a6fbd89.sys [2012-12-28 35664]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-17 98208]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-09-30 203264]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2009-06-10 187392]
S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys [2010-04-29 38528]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MPKSL3A6FBD89
.
Contents of the 'Scheduled Tasks' folder
.
2012-12-28 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-10-13 17:30]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2010-09-21 6489704]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-09-13 1289704]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~1\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - ExtSQL: 2012-11-27 22:25; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\users\j\AppData\Roaming\Mozilla\Firefox\Profiles\fukb43tp.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:49,29,7e,8e,17,b5,cd,01
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_135_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_5_502_135_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_5_502_135_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_135.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_135.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_135.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_5_502_135.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2012-12-28 16:43:30
ComboFix-quarantined-files.txt 2012-12-28 22:43
ComboFix2.txt 2012-10-19 00:19
ComboFix3.txt 2012-03-16 05:53
.
Pre-Run: 215,701,123,072 bytes free
Post-Run: 217,163,038,720 bytes free
.
- - End Of File - - A16837E8E6896F6591B4DB648DC3AEEA

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 28 December 2012 - 06:08 PM

Greetings

I want you to run these next,

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.



Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 kikkomang

kikkomang
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:37 PM

Posted 28 December 2012 - 07:01 PM

TDSSKiller generated 4 logs within 5-6 minutes. After using TDSSKiller, the computer no longer has the ridiculous svchost process anymore. The computer runs quietly now and idles at around 0-1% CPU usage.

Unfortunately I was not able to post all of the TDSSKiller logs do to post size restrictions. I was able to post the 1st, 2nd, and 4th generated logs. I attached the 3rd generated log to this post. It is by far the largest at 343 kb.

I am able to post the aswMBR log though.


17:17:59.0020 3184 TDSS rootkit removing tool 2.8.15.0 Oct 31 2012 21:47:35
17:17:59.0438 3184 ============================================================
17:17:59.0438 3184 Current date / time: 2012/12/28 17:17:59.0438
17:17:59.0438 3184 SystemInfo:
17:17:59.0438 3184
17:17:59.0438 3184 OS Version: 6.1.7600 ServicePack: 0.0
17:17:59.0438 3184 Product type: Workstation
17:17:59.0438 3184 ComputerName: J-PC
17:17:59.0438 3184 UserName: j
17:17:59.0438 3184 Windows directory: C:\Windows
17:17:59.0438 3184 System windows directory: C:\Windows
17:17:59.0438 3184 Running under WOW64
17:17:59.0438 3184 Processor architecture: Intel x64
17:17:59.0438 3184 Number of processors: 2
17:17:59.0438 3184 Page size: 0x1000
17:17:59.0438 3184 Boot type: Normal boot
17:17:59.0438 3184 ============================================================
17:18:01.0600 3184 Drive \Device\Harddisk0\DR0 - Size: 0x4A85D56000 (298.09 Gb), SectorSize: 0x200, Cylinders: 0x9801, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
17:18:01.0600 3184 ============================================================
17:18:01.0600 3184 \Device\Harddisk0\DR0:
17:18:01.0600 3184 MBR partitions:
17:18:01.0600 3184 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x63800
17:18:01.0600 3184 \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x64000, BlocksNum 0x230E5800
17:18:01.0600 3184 \Device\Harddisk0\DR0\Partition3: MBR, Type 0x7, StartLBA 0x23149800, BlocksNum 0x22B1000
17:18:01.0600 3184 ============================================================
17:18:01.0640 3184 C: <-> \Device\Harddisk0\DR0\Partition2
17:18:01.0700 3184 D: <-> \Device\Harddisk0\DR0\Partition3
17:18:01.0700 3184 ============================================================
17:18:01.0700 3184 Initialize success
17:18:01.0700 3184 ============================================================
17:18:04.0350 3156 Deinitialize success

17:18:43.0678 5104 TDSS rootkit removing tool 2.8.15.0 Oct 31 2012 21:47:35
17:18:44.0200 5104 ============================================================
17:18:44.0200 5104 Current date / time: 2012/12/28 17:18:44.0200
17:18:44.0200 5104 SystemInfo:
17:18:44.0200 5104
17:18:44.0200 5104 OS Version: 6.1.7600 ServicePack: 0.0
17:18:44.0200 5104 Product type: Workstation
17:18:44.0200 5104 ComputerName: J-PC
17:18:44.0200 5104 UserName: j
17:18:44.0200 5104 Windows directory: C:\Windows
17:18:44.0200 5104 System windows directory: C:\Windows
17:18:44.0200 5104 Running under WOW64
17:18:44.0200 5104 Processor architecture: Intel x64
17:18:44.0200 5104 Number of processors: 2
17:18:44.0200 5104 Page size: 0x1000
17:18:44.0200 5104 Boot type: Normal boot
17:18:44.0200 5104 ============================================================
17:18:45.0804 5104 Drive \Device\Harddisk0\DR0 - Size: 0x4A85D56000 (298.09 Gb), SectorSize: 0x200, Cylinders: 0x9801, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
17:18:45.0814 5104 ============================================================
17:18:45.0814 5104 \Device\Harddisk0\DR0:
17:18:45.0814 5104 MBR partitions:
17:18:45.0814 5104 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x63800
17:18:45.0814 5104 \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x64000, BlocksNum 0x230E5800
17:18:45.0814 5104 \Device\Harddisk0\DR0\Partition3: MBR, Type 0x7, StartLBA 0x23149800, BlocksNum 0x22B1000
17:18:45.0814 5104 ============================================================
17:18:45.0844 5104 C: <-> \Device\Harddisk0\DR0\Partition2
17:18:45.0904 5104 D: <-> \Device\Harddisk0\DR0\Partition3
17:18:45.0904 5104 ============================================================
17:18:45.0904 5104 Initialize success
17:18:45.0904 5104 ============================================================
17:19:11.0008 0712 Deinitialize success

17:25:50.0363 2428 TDSS rootkit removing tool 2.8.15.0 Oct 31 2012 21:47:35
17:25:51.0158 2428 ============================================================
17:25:51.0158 2428 Current date / time: 2012/12/28 17:25:51.0158
17:25:51.0158 2428 SystemInfo:
17:25:51.0158 2428
17:25:51.0158 2428 OS Version: 6.1.7600 ServicePack: 0.0
17:25:51.0158 2428 Product type: Workstation
17:25:51.0158 2428 ComputerName: J-PC
17:25:51.0158 2428 UserName: j
17:25:51.0158 2428 Windows directory: C:\Windows
17:25:51.0158 2428 System windows directory: C:\Windows
17:25:51.0158 2428 Running under WOW64
17:25:51.0158 2428 Processor architecture: Intel x64
17:25:51.0158 2428 Number of processors: 2
17:25:51.0158 2428 Page size: 0x1000
17:25:51.0158 2428 Boot type: Normal boot
17:25:51.0158 2428 ============================================================
17:25:54.0322 2428 BG loaded
17:25:54.0762 2428 Drive \Device\Harddisk0\DR0 - Size: 0x4A85D56000 (298.09 Gb), SectorSize: 0x200, Cylinders: 0x9801, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
17:25:54.0762 2428 ============================================================
17:25:54.0762 2428 \Device\Harddisk0\DR0:
17:25:54.0772 2428 MBR partitions:
17:25:54.0772 2428 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x800, BlocksNum 0x63800
17:25:54.0772 2428 \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x64000, BlocksNum 0x230E5800
17:25:54.0772 2428 \Device\Harddisk0\DR0\Partition3: MBR, Type 0x7, StartLBA 0x23149800, BlocksNum 0x22B1000
17:25:54.0772 2428 \Device\Harddisk0\DR0\Partition4: MBR, Type 0xC, StartLBA 0x253FA800, BlocksNum 0x33AB0
17:25:54.0772 2428 ============================================================
17:25:54.0832 2428 C: <-> \Device\Harddisk0\DR0\Partition2
17:25:54.0932 2428 D: <-> \Device\Harddisk0\DR0\Partition3
17:25:54.0952 2428 G: <-> \Device\Harddisk0\DR0\Partition4
17:25:54.0952 2428 ============================================================
17:25:54.0952 2428 Initialize success
17:25:54.0952 2428 ============================================================
17:26:46.0684 2392 Deinitialize success



aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software
Run date: 2012-12-28 17:29:43
-----------------------------
17:29:43.576 OS Version: Windows x64 6.1.7600
17:29:43.576 Number of processors: 2 586 0x603
17:29:43.576 ComputerName: J-PC UserName: j
17:29:44.496 Initialze error C000010E - driver not loaded
17:31:36.956 AVAST engine defs: 12122800
17:31:51.058 Service scanning
17:32:48.794 Modules scanning
17:32:48.794 Disk 0 trace - called modules:
17:32:48.794
17:32:50.323 AVAST engine scan C:\Windows
17:32:54.270 AVAST engine scan C:\Windows\system32
17:37:14.775 AVAST engine scan C:\Windows\system32\drivers
17:37:29.470 AVAST engine scan C:\Users\j
17:38:26.987 AVAST engine scan C:\ProgramData
17:39:05.535 Scan finished successfully
17:51:52.479 The log file has been saved successfully to "C:\Users\j\Desktop\antivirus stuff\aswMBR.txt"

Attached Files



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 28 December 2012 - 08:43 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 31 December 2012 - 01:24 AM

Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 03 January 2013 - 12:29 AM

Hello

48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:37 PM

Posted 06 January 2013 - 05:58 AM

Due to the lack of feedback, this topic is now closed.In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days. Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users