Jump to content

Trojan.Bitcoinminer found in svchost.exe


Recommended Posts

Hi,

I've found a Bitcoin miner trojan in my PC, as the title says. It is located in svchost.exe and it opens a process that uses 50% of my CPU and 90-100% of my GPU. Even if I kill the process, the GPU keeps getting hot and being used at 100%.

I've tried to remove the malware with MBAR, but it crashes when scanning registers and directories, so it isn't able to start the cleanup process.

I've also tried using MBAM, but after it eliminates it and I reboot my PC, the malware is still there.

I don't know what to do, please help me.

I have attached to this post both the results of the Farbar scan.

Addition.txt FRST.txt

Link to post
Share on other sites

Hi Vortex36, :)

:welcome:

My name is Valinorum and I will be the acolyte today. Before we proceed, please, acknowledge yourself the following(s):

  • Please do not create any new threads on this while we are working on your system as it wastes another volunteer's time. If you are being helped/have solved the issue/no longer wish to continue, notify me in your reply and I will quickly close this thread. Failing to comply will result in denial of future assistance.
  • Please do not install any new software while we are working on this system as it may hinder our process.
  • Malware removal is a complicated process so don't stop following the steps even if the symptoms are not found. Keep up with me until I declare you clean.
  • Please do not try to fix anything without being ask.
  • Please do not attach your logs or put them inside code/quote tags. Do a Copy/Paste of the entire contents of the log file and submit it inside your post unless directed otherwise.
  • Please print or save the instructions I give you for quick reference. We may be using Safe mode which will cut you off from internet and you will not always be able to access this thread.
  • Back up your data. I will not knowingly suggest your any course that might damage your system but sometimes Malware infections are so severe that only option we have is to re-format and re-install the operating system.
  • If you are confused about any instruction, stop and ask. Do not keep on going.
  • Do not repeat the steps if you face any problems.
  • I am not an omniscient. There are things even I cannot foresee. But what I know took years to learn and perfect the skill. This site is run by volunteers who help people in need in their own free time. I would ask you to respect their time and be patient as sometimes real life demands our time and replies to you can be delayed.
  • Private Message(PM) if and only if I have not responded to your thread within three days or your query is offtopic and personal. Do not PM me under any other circumstances. Your thread is the only medium of communication.
  • The fixes are for your system only. Please refrain from using these fixes on other system as it may do serious damage.

Hack tool C:\Program Files\KMSpico\Service_KMS.exe has been detected on your system. Please note that piracy is not condone here and you are given a benefit of doubt to remove these tool(s). Further help will be denied if you choose to ignore this warning.


  • Step #1 Fix with FRST

    Make sure that you still have FRST.exe on your Desktop. If you do not have it, download the suitable version from here to your Desktop.

    • Open Notepad.exe. Do not use any other text editor software;
    • Copy and Paste the contents inside the code-box to your Notepad --

      StartCreateRestorePoint:CloseProcesses:EmptyTemp:C:\Windows\Temp\lsass.exeC:\Windows\Temp\svchost.exeHKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\Run: [NCsoft] => [X]HKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\Run: [] => [X]HKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\MountPoints2: D - D:\Launch.exeHKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\MountPoints2: {9479777c-5718-11e2-824c-50e549c946de} - F:\Startme.exeHKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\MountPoints2: {bfc962bd-b365-11e1-9928-50e549c946de} - G:\autorun.exeHKU\S-1-5-21-2410396615-1784987878-230670703-1000\...\MountPoints2: {c9fee86f-445f-11e2-aef1-50e549c946de} - E:\Setup.exeSearchScopes: HKLM-x32 -> DefaultScope {006ee092-9658-4fd6-bd8e-a21a348e59f5} URL = SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.startsearcher.com/?q={searchTerms}&src=IETBSearchScopes: HKU\S-1-5-21-2410396615-1784987878-230670703-1000 -> URL http://search.conduit.com/Results.aspx?ctid=CT3324774&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=4&UP=SPB717FAC2-E6C2-416A-A396-5C2016CF03B7&q={searchTerms}&SSPV=SearchScopes: HKU\S-1-5-21-2410396615-1784987878-230670703-1000 -> SuggestionsURL_JSON http://suggest.search.conduit.com/CSuggestJson.ashx?prefix={searchTerms}CHR HKU\S-1-5-21-2410396615-1784987878-230670703-1000\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [lmjegmlicamnimmfhcmpkclmigmmcbeh] - https://clients2.google.com/service/update2/crxCHR HKLM-x32\...\Chrome\Extension: [flliilndjeohchalpbbcdekjklbdgfkk] - https://clients2.google.com/service/update2/crxC:\Program Files\KMSpicoS2 Service KMSELDI; C:\Program Files\KMSpico\Service_KMS.exe [568320 2013-10-26] () [File not signed]2015-07-02 07:34 - 2014-03-14 00:28 - 00000000 ____D C:\Program Files (x86)\SearchProtect2015-07-01 15:59 - 2012-06-09 14:31 - 00000000 ____D C:\Users\Matt\AppData\Roaming\uTorrentTask: {023D2D74-8487-4B73-A987-AAC92372B195} - System32\Tasks\AutoPico Daily Restart => C:\Program Files\KMSpico\AutoPico.exe [2013-10-26] ()Task: {5371097A-783C-4472-AE94-C6A829418A75} - \DealPly No Task File <==== ATTENTIONTask: {7F2386FD-57AF-439A-9B0A-11954E23859A} - System32\Tasks\Origin => C:\Users\Matt\AppData\Roaming\Origin\update.vbe [2015-07-01] () <==== ATTENTION2015-07-02 08:29 - 2015-07-02 08:29 - 01591808 _____ () C:\Windows\Temp\lsass.exe2015-07-02 08:28 - 2015-07-02 08:29 - 01563136 _____ () C:\Windows\Temp\svchost.exeFirewallRules: [{3C3EF0C2-B4BA-4243-8962-4991FF318F5A}] => (Allow) C:\Program Files\KMSpico\KMSELDI.exeFirewallRules: [{C4753866-50F2-468C-A9B4-8B95D7AEE00D}] => (Allow) C:\Program Files\KMSpico\KMSELDI.exeFirewallRules: [{C42D6865-B853-42D2-BF0B-A9BAFF0A2EBD}] => (Allow) C:\Program Files\KMSpico\Service_KMS.exeFirewallRules: [{63CCBB11-A402-4403-A867-2605672428D7}] => (Allow) C:\Program Files\KMSpico\Service_KMS.exeEnd
    • Click on File > Save as...
      • Inside the File Name box type fixlist.txt;
      • From the Save as type drop down list, choose All Files
    • Save the file to your Desktop;
    • Re-run FRST.exe and click Fix;
      • Note: If FRST advises there is a new updated version to be downloaded, do so/allow this.
    • After the completion, a log will be produced;
    • Copy and Paste the contents of the log in your next reply.

  • Step #2 Scan with Malwarebytes' Anti-Malware
    • Download Malwarebytes' Anti-Malware from the suitable link below --
    • Double-click on mbam-setup-version-number.exe to install the application.
    • Before clicking Finish perform the following actions --
      • Un-check the box beside Enable free trial of Malwarebytes Anti-Malware Premium.
      • Check the box beside Launch Malwarebytes Anti-Malware
    • Once the program has loaded, The MBAM dashboard will appear with an alert to update - click the green button Update Now;
      • Navigate to the Settings tab Detection and Protection and check all the boxes under Detection Options
    • From the Dashboard click on Scan Now;
    • If threats are detected, make sure everything is set to Quarantine and click on Apply actions. If the program asks to reboot your PC, let it do so;
    • On completion of the scan click on History > Application Log. After that click on the top Scan Log > Export, select Text File and save the log to your Desktop;
    • Copy and Paste the contents of the log in your next reply.

  • Step #3 Fix with AdwCleaner
    • Download AdwCleaner by Xplode to your Desktop from the following link.
    • Right-click on AdwCleaner.exe and choose Run as administrator;
    • Click on Scan and let the program run unhindered;
    • When done, click on Clean and allow the system to reboot after it is done;
    • A log will be opened automatically after the restart;
    • Copy and Paste the contents of this log in your reply.

  • Required Log(s):
    • FRST Fix Log
    • Malwarebytes' Anti-Malware Log
    • AdwCleaner Log
Regards,

Valinorum

Link to post
Share on other sites

Hi, I've done everything that you told me, and it seems to have fixed the problem, however I'll attach all the logs so that you can confirm whether my pc is safe now.

About the hack tool, it looks like your fixlist did remove it, I apologize if it hasn't, if that's a problem I'll remove it immediately.

Thanks again for your help, I'll wait for further instructions.

AdwCleanerS0.txtFixlog.txtMBAM.txt

Link to post
Share on other sites

There was a little problem in your fix and one of the files was not removed. Regarding the hack tool, if your Windows is pirated, you may lose its activation and may have to re-activate or have to re-purchase.

  • Step #4 Fix with FRST

    Make sure that you still have FRST.exe on your Desktop. If you do not have it, download the suitable version from here to your Desktop.

    • Open Notepad.exe. Do not use any other text editor software;
    • Copy and Paste the contents inside the code-box to your Notepad --

      StartCreateRestorePoint:CloseProcesses:EmptyTemp:C:\Windows\Temp\lsass.exeC:\Windows\Temp\svchost.exeEnd
    • Click on File > Save as...
      • Inside the File Name box type fixlist.txt;
      • From the Save as type drop down list, choose All Files
    • Save the file to your Desktop;
    • Re-run FRST.exe and click Fix;
      • Note: If FRST advises there is a new updated version to be downloaded, do so/allow this.
    • After the completion, a log will be produced;
    • Copy and Paste the contents of the log in your next reply.

  • Required Log(s):
    • FRST Fix Log
Regards,

Valinorum

Link to post
Share on other sites

  • Step #5 ESET Online Scanner

    Disable your security programs which includes but not limited to anti-virus, anti-malware, anti-spyware et cetera. Peruse this for additional information.

    • Download esetsmartinstaller_enu.exe by clicking here.
    • Right-click on the program and choose Run as administrator.
    • Accept their terms and condition and proceed.
    • Install Add-On/Active X if prompted.
    • From the Computer Scan Setting check the following box --
      • Enable detection for potentially unwanted programs
    • Click on Advanced Setting --
      • Check the box beside Remove Found Threats;
      • Check the box beside Scan archives
      • Check the box beside Scan for potentially unsafe applications
      • Check the box beside Enable Anti-Stealth Technology
    • Click on Start and wait for the virus signature database to update.
    • The online scan will begin automatically and can take several hours.
      • Note: Do not touch either the Mouse or keyboard during the scan. Otherwise it may stall.
    • After the Scan finishes --
      • If no threats were found:
        • Put a checkmark in Uninstall application on close.
        • Close the program and report that nothing was found
      • If threats were found:
        • Open the file located in C:\Program Files\ESET\ESET Online Scanner\log.txt (32-bit) or C:\Program Files (x86)\ESET\ESET Online Scanner\log.txt (64-bit).
        • Copy and Paste contents of the log file in your next reply.
    Note: Enable your security programs afterwards.

Link to post
Share on other sites

Perusing your logs, I see no infection currently present in your system. Unless you are having any issue(s), the machine appears to be Malware-free as we speak.


♣ Removal of Tools and Quarantined Files ♣


Despite the tools we have used are clean, they are powerful removal tools and made in a way so that they carry out any commands given to them without (most cases) asking for a confirmation. In the hands of an inept person, they can make the machine un-bootable -- a scenario we do not wish to see. Also, we need to remove the quarantined files/folders from your system as a dormant malware can be as bad as an active one if given the proper environment. I shall now give you the guidelines to remove the tools and the quarantined files from your system.

  • Cleanup with Delfix

    Please download DelFix by Xplode to your Desktop.

    Download Link

    • Double-click to run the program;
      • Note: Windows Vista/7/8 users right-click and choose Run as administrator
    • Make sure that all the boxes are checked;
    • Click Run;
    • A log will be opened after the operation is finished;
    • Copy and Paste it in your next reply

♣ Prevention and Future Guidelines ♣


Prevention is better than cure -- goes the old saying. As much as we love to see you visit our site, we do not want to see you having your PC infected by malwares again.

  • Keep Windows up-to-date.

    It is extremely important that you keep your operating system (Windows) updated when updates are made available. It is set to alert you, so be sure not to ignore these notices and to allow the updates to install. Many of these are critical security packages which could very possibly be the difference between your picking up a future infiltration and simply passing right by it unharmed.

  • Run antivirus software and keep it up-to-date, too.

    Antivirus software is your safety net if all other protections fail. The first line of defense is smart computing, of course, but everyone needs a backup. I'd recommend Microsoft Security Essentials or avast!, both of which are excellent, as well as free. Once they're installed, check periodically to ensure they have been successfully updating as well. An out-of-date antivirus is not a happy antivirus!

  • Keep your web browser plugins and other programs updated also.

    This tip is rarely shared by technicians and its importance is not widely recognized, but it's absolutely critical. Programs such as Java, Adobe Flash Player and Adobe Reader, Internet Explorer, and myriad other such web-exposed items are deeply vulnerable to attack, which can quickly lead to a hopelessly infected system no matter what protection you currently have installed. The reason is that these programs are ubiquitous, but are also not perfect and are extremely complex... and as such, security vulnerabilities are discovered and exploited by hackers hoping to gain control over your machine. By performing every update for these programs as soon as it's made available, you will greatly reduce your exposure to dangerous internet threats.

    A great way to do this is to install the Filehippo Update Checker and run it regularly. Also, try not to ignore any notifications you receive regarding updates to programs already installed on your PC.

    No scripts is an excellent security device too. I like it but it is not for everyone because it requires you to take action if you want to see some things (pop ups, banners etc.) on sites you visit.

    Download NoSript by Giorgio Maone.

    Note: Sometimes you will get a site telling you that you need to install Java when actually all you need to do is enable the site through the no script icon down on the right hand side of your computer.

  • Watch out for new threat named CryptoLocker

    CryptoLocker is a new type ransomware family malware that encrypts your important files and asks for a ransom to decrypt them. At the moment of posting this reply there are no tools that can undo the havoc this malware causes. We can help you to remove the malware from your system but the files that was encrypted cannot be recovered without the decryption key. So, I ask for your forbearance and practice constant vigilance. Please read the following article to acknowledge yourself about the safety measures.

    How to prevent your computer from becoming infected by CryptoLocker.

  • And last of all, surf smart.

    It doesn't matter how well the autopilot system works if the pilot keeps flying the plane into mountain ranges. Don't forget that no matter how much you have protecting yourself, your security ultimately begins and ends with you. Don't visit dangerous or questionable web sites, avoid suspicious links on Facebook and emails/email attachments you're unsure about, and just generally keep your wits about you, and you'll be much safer. Also, avoid illegal downloads, cracks, "warez", and all other too-good-to-be-true internet offerings: they're typically laden with malware. Be smart and you can avoid most threats lurking about the darker corners of the internet! And for even more tips, see our article How Did I Get Infected in the First Place? and Keep Your Computer Safe Online.

Regards,

Valinorum

Link to post
Share on other sites

  • 4 months later...
  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.