Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Potential Malware; not able to login to Laptop


  • This topic is locked This topic is locked
3 replies to this topic

#1 SN001

SN001

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:28 PM

Posted 23 December 2013 - 11:34 AM

Hi,

 

I believe I have malware that seemed to get activated suddenly while on an International news website and resulted in the Microsoft blue screen of death.

 

Since then, I am not able to login successfully to my Windows 7 Enterprise laptop.  After entering my login information, it always gives me the Blue screen listing some addresses.  At least once, it has given me IRQL_NOT_LESS_OR_EQUAL. 

 

I have been able to login in Safe Mode or Safe Mode with Networking mode.

I ran Eset Online Scanner (which I run about once a month).  It quarantined and possibly deleted 5 files (listed below).

But reboot still gave the Blue screen.

Next, restored to the 'Automatic Restore Point' as of 12/20/13 (3 days back).

But reboot gave same the Blue Screen again.

 

5 files quarantined/deleted by ESet Online Scanner:

C:\Program Files\PDFCreator\Toolbar\pdfforge Toolbar-4_4_0_setup.exe Win32/Toolbar.Widgi application cleaned by deleting - quarantined
C:\Users\snayak\AppData\Local\temp\hqvkjnoepltienksgkh.exe a variant of Win32/Injector.AUCE trojan cleaned by deleting - quarantined
C:\Users\snayak\AppData\Local\temp\rldpygnk.exe a variant of Win32/Injector.AUCE trojan cleaned by deleting - quarantined
C:\Users\snayak\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19\b9843d3-1436f72c a variant of Win32/Injector.AUCE trojan cleaned by deleting - quarantined
C:\Users\snayak\AppData\Roaming\Mozilla\Firefox\Profiles\79znsqch.default\extensions\{395C2BBF-B747-D57B-B4FD-5DD52EB9E787}\components\VUIFormatLoaderAVClass.js Win32/Boaxxe.BE trojan cleaned by deleting - quarantined

 

 



BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:28 PM

Posted 23 December 2013 - 02:45 PM

Hello SN001

These are injector Trojans They try to remote Command and Control centers every few minutes and receives additional instructions.

Probably protected and we need a deeper look to find it.

Please follow this Preparation Guide, do steps 6,7 and 8 and post in a new topic.
Let me know if all went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 SN001

SN001
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:28 PM

Posted 23 December 2013 - 03:20 PM

Hi Boopme,

 

Thanks for your assistance.

I could complete the steps as mentioned in the Preparation Guide, and will be posting a new topic in a few minutes.

 

Thanks again!



#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:28 PM

Posted 23 December 2013 - 06:42 PM

Thank you

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.
From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.
Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRL Team member is already assisting you and not open the thread to respond.
The current wait time is 1 - 2 days and ALL logs are answered.
If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.
To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users