1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

winsvchost.exe virus is on my pc (winrscmde)

Discussion in 'Malware Removal' started by mustangman, Aug 1, 2012.

  1. mustangman

    mustangman Private E-2

    the winrscmde virus that poses as svchost.exe is on my pc and I've never had such difficulty removing a virus before. I need your help please.
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I want you to run TDSSKiller so refer to the below for how to do so. (DO NOT just quit after running TDSSKiller and MBRCheck, there is MUCH more to do, scroll further down and follow the Read and Run Me First Malware removal procedures link.)

    TDSSkiller - How to run


    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.




    Now do not stop, please continue on with the below instructions too! :)

    v
    V
    V
    V
    READ & RUN ME FIRST. Malware Removal Guide
     
  3. mustangman

    mustangman Private E-2

    Ok, Ive uploaded the logs.

    Update of my PC, I think I got rid of the winrscmde svchost.exe virus using tdss. But I now have this trojan horse dropper generic virus affecting the services.exe file.

    P.S. One of the threats the scanners detected is actually a program I made in Basic C. Its called Change.exe. That is not and should not be a virus unless the current virus infected it.
     

    Attached Files:

  4. mustangman

    mustangman Private E-2

    Here are the other logs.
     

    Attached Files:

  5. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You have a zeroaccess infection.

    Yuk, did you let TDSSKiller quarantine everything it found?! If so you need to do a system restore to a time before that occurred. :(

    Once you have, run the below.

    [​IMG] For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  6. mustangman

    mustangman Private E-2

    The virus wasnt even detected by tdss, it was detected by freeavg.

    Will the process you're telling me to do affect my personal files in anyway(deleting them)?
     
  7. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You let TDSSKiller quarantine the below items: (All of which are LEGIT)

    That is what I am trying to tell you. And yes, some elements of the infection HAVE been found by TDSSKiller actually. You did the right thing by selecting the below.

    And yes, what I am asking you to run is important, and no it will not wipe out files. So do you want to system restore to get all those items you wiped out back again? :)
     
  8. mustangman

    mustangman Private E-2

    Scanned as directed. Attached is the Log Sheet.
     

    Attached Files:

  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    And I shall have to ask before we begin (You should have let me know really) Did you run system restore yet?
     
  10. mustangman

    mustangman Private E-2

    I can't run system restore. When I last reinstalled the OS, I never setup or enabled system restore. There are no restore points for my system. I already backed up my files to an external.
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Delete this file: C:\Users\Master Alex\AppData\Roaming\Microsoft\Windows\Templates\5r81vx0m35t668

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    -------------------------------

    • Now re-run RogueKiller - no fix just a scan and attach the log.
    • Re-run FRST - no fix, just a scan and attach the log.
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know how things are running at this point.
     

    Attached Files:

    Last edited: Aug 4, 2012
  12. mustangman

    mustangman Private E-2

    Ok. I did the steps you requested. Attached are the logs. It looks like it's gone. I scanned my computer again using AVGFree, and it picked up the infection, but it shows it's been quarantined by FRST. So it's now located in the FRST Folder. How do I get rid of it and what's the next step?

    P.S. You guys have been so helpful. I thank you for sparing me the trouble of having to get my Adobe software mailed over to me from my house if I had to reinstall the OS.
     

    Attached Files:

    Last edited: Aug 4, 2012
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You need to run frst correctly

     
  14. mustangman

    mustangman Private E-2

    I did go into recovery mode and ran FRST. Not sure what I did wrong there.
     
  15. mustangman

    mustangman Private E-2

    Whoops. I didnt realize you were referring to when scanning it for the second time. I'll do that now and post the updated log from the scan.
     
  16. mustangman

    mustangman Private E-2

    Ok, here is the updated log. Sorry again for the misunderstanding.
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ah, don't worry about it. ;) OK you're looking to be in good shape now. Little bit of miscellaneous stuff to take care of.


    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now attempt to boot normally.

    Everything running as it should do now? :)
     

    Attached Files:

  18. mustangman

    mustangman Private E-2

    It's running fine. I haven't noticed a difference even when I still had the infection. But I'm glad it's not detecting it anymore (Just detecting it in the quarantine folder of frst64).

    I started getting the infections I couldn't delete on my own ever since I've been using my hotel's wifi and using job boards like career builder to apply for jobs. These aren't your average infections you normally get from pirated sites (Those usually are either easy trojans to delete or the annoying fake anti-virus programs that restrict certain actions on your computer until you delete it or buy it.

    You guys are awesome. If you're not already working as anti-virus programmers for a living, you should give it a try. You definitely have more knowledge and experience than your average Microsoft or anti-virus programmer.
     

    Attached Files:

  19. mustangman

    mustangman Private E-2

    Now the last thing left to do is repair the microsoft firewall that's been damaged.
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    After reboot, check to see if your firewall is working.
     

Share This Page

MajorGeeks.Com Menu

MajorGeeks.Com \ All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ NEW! PC Games \ System Tools \ Macintosh \ Demonews.Com \ Top Downloads

MajorGeeks.Com \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds