Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan in svchost.exe


  • This topic is locked This topic is locked
7 replies to this topic

#1 Shqdowolves

Shqdowolves

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 20 March 2013 - 07:27 PM

My computer has a Trojan in the memory files. I have read so many other forum topics while trying to get it fixed but nothing has worked so far. I have Roguekiller and ComboFix on my computer now. Roguekiller doesn't seem to pick up the virus in its scan. Malwarebytes detects it but can't delete it. Whenever I try ComboFix in normal or safe mode the computer shuts down part way through the scan. Does anyone know of a program that can find and delete this Trojan?

BC AdBot (Login to Remove)

 


#2 Shqdowolves

Shqdowolves
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 20 March 2013 - 07:53 PM

Here is the log from the last time I ran rougekiller

 

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7600 ) 64 bits version
Started in : Normal mode
User : Becca [Admin rights]
Mode : Scan -- Date : 03/20/2013 20:16:50
| ARK || FAK || MBR |

¤¤¤ Bad processes : 4 ¤¤¤
[SVCHOST] svchost.exe -- C:\Windows\\svchost.exe [x] -> KILLED [TermProc]
[SUSP PATH] CurseClient.exe -- C:\Users\Becca\AppData\Local\Apps\2.0\EE0CJ5MH.J2Z\22DWCEWP.X73\curs..tion_eee711038731a406_0004.0000_d322ecea565577c8\CurseClient.exe [-] -> KILLED [TermProc]
[DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : C:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_124a28e3 [x] -> KILLED [TermProc]
[DLL] rundll32.exe -- C:\Windows\System32\rundll32.exe : C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_pctsSvc.exe_8c1cd2a35fc239a942f2a3a47941e596da88f144_1ae2b7d9 [x] -> KILLED [TermProc]

¤¤¤ Registry Entries : 1 ¤¤¤
[PROXY IE] HKCU\[...]\Internet Settings : ProxyEnable (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9500420AS +++++
--- User ---
[MBR] f2b33db980d4c98fe3098b61c7853f38
[BSP] 049f5f9581af124a161436e2dc1a8e91 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 457747 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 937875456 | Size: 18889 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 976560128 | Size: 103 Mo
User != LL1 ... KO!
--- LL1 ---
[MBR] e279ad569e6411627b5242db6ac79729
[BSP] 049f5f9581af124a161436e2dc1a8e91 : Windows Vista/7/8 MBR Code
Partition table:
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 457747 Mo
3 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 937875456 | Size: 18889 Mo
User != LL2 ... KO!
--- LL2 ---
[MBR] e279ad569e6411627b5242db6ac79729
[BSP] 049f5f9581af124a161436e2dc1a8e91 : Windows Vista/7/8 MBR Code
Partition table:
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 457747 Mo
3 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 937875456 | Size: 18889 Mo

Finished : << RKreport[3]_S_03202013_02d2016.txt >>
RKreport[1]_S_03202013_02d1127.txt ; RKreport[2]_D_03202013_02d1132.txt ; RKreport[3]_S_03202013_02d2016.txt


 



#3 Shqdowolves

Shqdowolves
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 20 March 2013 - 08:03 PM

Also here is the malwarebytes log but it does not remove the Trojan even though it says it did.

 

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.03.16.03

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Becca :: BECCA-PC [administrator]

3/20/2013 8:54:41 PM
mbam-log-2013-03-20 (20-54-41).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 212927
Time elapsed: 6 minute(s), 55 second(s)

Memory Processes Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> 6528 -> Delete on reboot.

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 1
C:\Windows\svchost.exe (Trojan.Agent) -> Delete on reboot.

(end)
 



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:42 AM

Posted 20 March 2013 - 08:03 PM

Hello please repost these logs with a DDS log in a new topic.

We should get a deeper look. Please follow this Preparation Guide and post in a new topic.
Let me know if all went well.


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Shqdowolves

Shqdowolves
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 20 March 2013 - 08:34 PM

I have the DDS logs should I attach or post them?

Edited by Shqdowolves, 20 March 2013 - 08:34 PM.


#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:42 AM

Posted 20 March 2013 - 08:42 PM

Post them in the new topic.


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 Shqdowolves

Shqdowolves
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:02:42 PM

Posted 20 March 2013 - 08:47 PM

okay. Thanks I posted it all in a new topic.



#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,924 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:09:42 AM

Posted 20 March 2013 - 10:26 PM

Thank you

 

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.

The current wait time is 1 - 2 days and ALL logs are answered.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

To avoid confusion, I am closing this topic.


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users