GT500

Emsisoft Employee
  • Content Count

    13481
  • Joined

  • Days Won

    420

Posts posted by GT500


  1. I don't see any evidence of those entries in that log either. I assume that the detections listed in your screenshot in your first post have already been deleted?

    I'm also not seeing any signs of infection, so lets get a third-party opinion with an online virus scan. Please run an online virus scan through ESET by following the steps below:

    1. Turn off your anti-virus software.
    2. Click on this link.
    3. Click on the ESET Online Scanner button.
    4. Put a check in the box that says YES, I accept the Terms of Use.
    5. Click the 'Start' button just to the right of the checkbox.
    6. Uncheck the box that says Remove found threats (this is very important).
    7. Click on Advanced settings.
    8. Put a check in the box that says Scan for potentially unsafe applications.
    9. Verify that Scan for potentially unwanted applications is also checked.
    10. Verify that Enable Anti-Stealth technology is also checked.
    11. Click the Start button in the lower-right corner of the page, and it will begin downloading it's database, and then it will start scanning.
    12. When the scan is done, if it shows a screen that says Threats found!, then click List of found threats, and then click Export to text file... (if nothing was found, then just let me know that no threats were found).
    13. Save that text file on your desktop, and then attach it to a reply (using the More Reply Options button in the lower-right corner of this forum topic) for me.
    14. Close the ESET online scan.

    I will take a look at the log, and let you know if anything needs removed.


  2. That log isn't showing anything major. Just a few trojans on another partition (sda6 should be the 6th partition on your primary hard drive, although Windows partitions hard drives in an odd way, so you may not actually have 6 partitions). Everything else in the log is either errors or detections of the files backed up in TDSSKiller's quarantine.

    I do recommend that you delete the following files, assuming that the Avira AntiVir Rescue System hasn't already done so, as they may be infected with something (due to the way Linux maps hard drives, I can't be certain what drive you will find these files on in Windows):

    /reset/seminar jafar.exe.exe/comprise interface.DT3.exe/h.exe/itl.exe <<< Is the Trojan horse TR/Crypt.CFI.Gen [renamed]
    /reset/seminar jafar.exe.exe/comprise interface.DT3.exe/seminar jafar.exe.exe <<< Is the Trojan horse TR/Crypt.CFI.Gen [renamed]
    /reset/seminar jafar.exe.exe/comprise interface.DT3.exe/Temp.exe <<< Is the Trojan horse TR/Crypt.CFI.Gen [renamed]
    /reset/seminar jafar.exe.exe/D=0.5d Test problem.exe <<< Is the Trojan horse TR/Crypt.CFI.Gen [renamed]
    /D/1/1/1/star them hossein/Blazing Colors/Setup.exe <<< Is the Trojan horse TR/Dropper.Gen [renamed]
    /D/1/1/1/star them hossein/Color Cubes/Setup.exe <<< Is the Trojan horse TR/Dropper.Gen [renamed]
    /D/1/1/1/star them hossein/Pulsing Colors/Setup.exe <<< Is the Trojan horse TR/Dropper.Gen [renamed]


  3. This is a persistent infection. We're going to have to try something else. Make sure you run Rkill before proceeding with the following instructions.

    Please run a scan with Malwarebytes' Anti-Malware by following the instructions below:

    1. Please download and install Malwarebytes' Anti-Malware from one of the three mirrors listed below (beware of excessive advertising on some of the download pages):

    [*] When first running Malwarebytes' Anti-Malware, it will ask you if you want to operate it in a free trial mode. You can say no to this (the trial can be unlocked again at a later time if you want to try it).

    [*] Make sure to go to the Update tab and click the Check for Updates button to get the latest database.

    [*] Switch back to the Scanner tab and run a Quick Scan.

    [*] When it is done, remove anything it finds.

    [*] Whether or not it finds anything, you should be presented with a log in Notepad, which you should save to your desktop.

    [*] Attach the log you saved on your desktop to a reply for me to take a look at. You can attach files to a reply by clicking the More Reply Options to the lower-right of where you type in your reply. When the page loads, there will be a button right below the box to type in (on the left side) that says Choose Files... which will allow you to select the log file to attach it.


  4. OK, ComboFix isn't deleting part if the infection, so we need to try a different utility. Here are some new instructions:

    1. Please download The Avenger from this link, and make sure to save it on your Desktop.

    • Right click on the Avenger.zip folder and select "Extract All..."
    • Follow the prompts and extract the avenger folder to your desktop

    2. Copy all the text contained in the CODE box below, and it will be pasted into The Avenger in a later step (if you do not know how to copy and paste, then there are instructions at this link):

    Folders to delete:
    c:\documents and settings\LocalService\Local Settings\Application Data\dbwsqsdv

    Note: the above code was created specifically for the person requesting assistance in this forum topic, and it is based entirely on the logs they supplied from their computer. No one else should attempt to run The Avenger with this script, as it may damage their computer!

    3. Now, open the avenger folder on your desktop and start The Avenger program by double-clicking on its icon.

    • Please paste the contents of the CODE box above (which you should have already copied) into the white box in The Avenger (see example picture below).
    • Click on the Execute button in the low-right corner (see example picture below).
      paste_script_into_avenger.png
    • Answer "Yes" twice when prompted.

    4. The Avenger will automatically do the following:

    • It will Restart your computer. ( In cases where the code to execute contains "Drivers to Delete", The Avenger will actually restart your system twice.)
    • On reboot, it will briefly open a black command window on your desktop, this is normal.
    • After the restart, it creates a log file that should open with the results of Avenger’s actions. This log file will be located at C:\avenger.txt
    • The Avenger will also have backed up all the files, etc., that you asked it to delete, and will have zipped them and moved the zip archives to C:\avenger\backup.zip.

    5. Please copy/paste the content of c:\avenger.txt into your reply, and we will go from there.


  5. The only Image File Execution Options oddities that OTL showed in the log were the following:

    O27 - HKLM IFEO\asc.exe: Debugger - C:\Program Files\TuneUp Utilities 2012\TUAutoReactivator32.exe (TuneUp Software)
    O27 - HKLM IFEO\suc12_uninstal.exe: Debugger - C:\Program Files\TuneUp Utilities 2012\TUAutoReactivator32.exe (TuneUp Software)
    O27 - HKLM IFEO\toolbox.exe: Debugger - C:\Program Files\TuneUp Utilities 2012\TUAutoReactivator32.exe (TuneUp Software)
    O27 - HKLM IFEO\turboboost.exe: Debugger - C:\Program Files\TuneUp Utilities 2012\TUAutoReactivator32.exe (TuneUp Software)
    O27 - HKLM IFEO\unins000.exe: Debugger - C:\Program Files\TuneUp Utilities 2012\TUAutoReactivator32.exe (TuneUp Software)

    As you can see, they are all related to TuneUp Utilities 2012, which is a legitimate utility.

    Lets get a registry export of the keys from your screenshot:

    For 32-bit Windows, please download MiniRegTool.zip and unzip it.

    For 64-bit Windows, please download MiniRegTool64.zip and unzip it.

    1. Run the MiniRegTool download.
    2. Copy and paste the following into the rectangular white box in MiniRegTool:
      [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options]


    3. Check Export keys radio button.
    4. Press Go button and post the result.


  6. OK, we're going to need to try another CFScript. Here are instructions again on what to do with the script:

    1. Turn off your Anti-Virus software.
    2. Run Rkill just to make sure that nothing interferes with ComboFix while it runs the script. Go ahead and run all three of the ones in the ZIP file I attach to a post earlier, just in case.
    3. Click your Start button, go to All Programs (or just Programs on Vista and Windows 7), go to Accessories, and then open Notepad.
    4. Please copy and paste the contents of the box below into Notepad (here is a link to instructions if you do not know how to copy and paste):
      http://support.emsisoft.com/topic/7475-my-pc-is-infected-and-i-cant-run-otl/
      
      KillAll::
      
      Collect::
      c:\documents and settings\Bunny\Start Menu\Programs\Startup\lhofbvjm.exe
      c:\documents and settings\LocalService\Local Settings\Application Data\dbwsqsdv\lhofbvjm.exe
      c:\windows\Temp\dmjadxlsslpxqsmp.exe
      
      Folder::
      c:\documents and settings\LocalService\Local Settings\Application Data\dbwsqsdv
      
      Registry::
      [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
      "Userinit"="C:\WINDOWS\system32\userinit.exe,"
      [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
      "LhoFbvjm"=-


    5. Save this as a Text Document named CFScript in the same location as ComboFix (which should be on your desktop).
    6. Close Notepad and verify that the CFScript file is saved on your desktop.
    7. Referring to the animated picture below, click the left mouse button on top of the CFScript icon on your desktop, then holding the mouse button down drag the CFScript icon on your desktop onto the ComboFix icon, and then drop it (let go of the mouse button) on top of the ComboFix icon:
      CFScriptB-4.gif

    **NOTE**
    If ComboFix wants to update, then please allow it to do so.

    When finished, it will display a new log in Notepad. Please attach that log to a reply the same way you did before. If you prefer, you can save the log on your desktop to make it easier to find.


  7. Looks like that was a pretty bad infection. From that log, it looks like Safe Mode is broken, and we'll need to fix it after we finish some more cleanup.

    I have written a script that will tell ComboFix how to delete some stuff I saw in your log. Here are instructions on what to do with the script:

    1. Turn off your Anti-Virus software.
    2. Click your Start button, go to All Programs (or just Programs on Vista and Windows 7), go to Accessories, and then open Notepad.
    3. Please copy and paste the contents of the box below into Notepad (here is a link to instructions if you do not know how to copy and paste):
      http://support.emsisoft.com/topic/7475-my-pc-is-infected-and-i-cant-run-otl/
      
      KillAll::
      
      Collect::
      C:\lhofbvjm.exe
      c:\documents and settings\LocalService\Local Settings\Application Data\dbwsqsdv\lhofbvjm.exe
      
      Suspect::
      c:\program files\11201111240856.bat
      c:\program files\08201113562048.bat
      c:\program files\08201118561918.bat
      
      Folder::
      c:\documents and settings\LocalService\Local Settings\Application Data\dbwsqsdv
      c:\documents and settings\Bunny\Local Settings\Application Data\dbwsqsdv
      
      Registry::
      [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
      "Userinit"="C:\WINDOWS\system32\userinit.exe,"


    4. Save this as a Text Document named CFScript in the same location as ComboFix (which should be on your desktop).
    5. Close Notepad and verify that the CFScript file is saved on your desktop.
    6. Referring to the animated picture below, click the left mouse button on top of the CFScript icon on your desktop, then holding the mouse button down drag the CFScript icon on your desktop onto the ComboFix icon, and then drop it (let go of the mouse button) on top of the ComboFix icon:
      CFScriptB-4.gif

    When finished, it will display a new log in Notepad. Please attach that log to a reply the same way you did before. If you prefer, you can save the log on your desktop to make it easier to find.


  8. Please run an online virus scan through ESET by following the steps below:

    1. Turn off your anti-virus software.
    2. Click on this link.
    3. Click on the ESET Online Scanner button.
    4. Put a check in the box that says YES, I accept the Terms of Use.
    5. Click the 'Start' button just to the right of the checkbox.
    6. Uncheck the box that says Remove found threats (this is very important).
    7. Click on Advanced settings.
    8. Put a check in the box that says Scan for potentially unsafe applications.
    9. Verify that Scan for potentially unwanted applications is also checked.
    10. Verify that Enable Anti-Stealth technology is also checked.
    11. Click the Start button in the lower-right corner of the page, and it will begin downloading it's database, and then it will start scanning.
    12. When the scan is done, if it shows a screen that says Threats found!, then click List of found threats, and then click Export to text file... (if nothing was found, then just let me know that no threats were found).
    13. Save that text file on your desktop, and then attach it to a reply (using the More Reply Options button in the lower-right corner of this forum topic) for me.
    14. Close the ESET online scan.

    I will take a look at the log, and let you know if anything needs removed.


  9. Please download Emsiclean from this link (be sure to save it on your desktop), and follow the instructions below to get me a log:

    1. Run the Emsiclean download that you saved on your desktop.
    2. Read the disclaimer. Note that you must agree to it in order to proceed.
    3. Once the scan is finished, simply exit Emsiclean, and do not remove anything.
    4. A new file will be saved on your desktop with a log of what was detected. Please attach that to a reply by using the More Reply Options button to the lower-right of where you type in your reply.