Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser.exe.... Oh Yay!


  • This topic is locked This topic is locked
8 replies to this topic

#1 keller34

keller34

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:52 PM

Posted 28 August 2014 - 04:46 PM

I seem to have posted in the wrong area the first time...oops sorry. Here is the post:

 

Yep My wife got it.  It is new to me.  It is on her corp PC that she was using for Snag-a-Job and it hit her...LOL

 

Anyway, I deal with this stuff all the time but this has me a little puzzled on how it is working.  I ran RogueKiller, TM Anti-Rootkit, TDss Killer, AdwCleaner, looked at the Hijack this logs, ran FRST and collected logs.  I managed to kill the processes with RKill.

 

I have not ran Mbam yet. I was going to look at the other logs but I have too much going on right at this moment to scan through them.  So any help would be great!

 

I have some logs ready when you are and TIA for the person that helps.

Attached Files



BC AdBot (Login to Remove)

 


#2 keller34

keller34
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:52 PM

Posted 28 August 2014 - 04:51 PM

I think this is one of the issues: 

 

HKU\S-1-5-21-3987490726-4177353190-2268510570-87310\...\Run: [CalculatorJoint] => C:\WINDOWS\system32\rundll32.exe "C:\Users\e5007408\AppData\Local\CalculatorJoint\CalculatorJoint.dll",DllRegisterServer



#3 aharonov

aharonov

  • Malware Response Team
  • 2,441 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:52 AM

Posted 28 August 2014 - 04:55 PM

Yes I share your diagnosis.
I see that RogueKiller was run after FRST. So please run FRST again now so we get an up-to-date log:


Start FRST with administator privileges.
  • Press the Scan button.
  • When finished, FRST will produce a log (FRST.txt) in the same directory the tool was run from.
    Please copy and paste this log in your next reply.


#4 keller34

keller34
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:52 PM

Posted 28 August 2014 - 05:30 PM

OK so I looked at it and it looks like it was removed but the remnants were still there and I removed them manually and rebooted, ran FRST and got a new log that looks clean.  The process is not running either.

Attached Files



#5 aharonov

aharonov

  • Malware Response Team
  • 2,441 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:52 AM

Posted 28 August 2014 - 05:36 PM

Indeed, RogueKiller had deleted the entry that was responsible for the malware startup. That's why I asked for a fresh FRST log to confirm that it's gone.
The log looks good now. Is the computer running fine or are there other problems that are still present?
Let's do a final check up to see if anything else shows up:


Please download the ESET Online Scanner and save it to your Desktop.
  • Disable the realtime-protection of your antivirus and anti-malware programs because they might interfere with the scan.
  • Start esetsmartinstaller_enu.exe with administartor privileges.
  • Select the option Yes, I accept the Terms of Use and click on Start.
  • Make sure that the option Remove found threats is NOT checked, and the option Scan archives is checked.
  • Now click on Advanced Settings and select the following:
    • Scan for potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
  • Click on Start. The virus signature database will begin to download. This may take some time.
  • When completed the Online Scan will begin automatically.
    Note: This scan might take a long time! Please be patient.
  • When completed select Uninstall application on close if you so wish, but make sure you copy the logfile first!
  • Now click on Finish
  • A log file is created at C:\Program Files\ESET\EsetOnlineScanner\log.txt.
    Copy and paste the content of this log file in your next reply.
Note: Do not forget to re-enable your antivirus application after running the above scan!

#6 aharonov

aharonov

  • Malware Response Team
  • 2,441 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:52 AM

Posted 19 September 2014 - 02:36 PM

Do you still need help?

#7 keller34

keller34
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:08:52 PM

Posted 19 September 2014 - 02:57 PM

Sorry, I have been slammed at work.  Everything is working fine now and no more traces of the infection.  Thank you for the help.



#8 aharonov

aharonov

  • Malware Response Team
  • 2,441 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:52 AM

Posted 19 September 2014 - 03:00 PM

Alright.

That's it! Your logs look clean to me at the moment.
We're gonna clean up everything now, close security holes on your computer and in the end I'll provide you with a list of security tips so you hopefully will not need our help anymore in the future.


My help is free for everybody.
If you want to support me fighting against malware or buy me a beer for the assistance you received, then you can consider a donation: btn_donate_SM.gif.
Thank you!



Clean Up

Now we remove all the tools we used (including their logs and quarantine folders), restore your settings and delete old and infected system restorepoints:
  • You can uninstall programs that you had to install (e.g. MBAM or ESET Onlinescanner) in the control panel if you so wish.
  • Download DelFix (by Xplode) and save it to your Desktop.
    • Close all running programs and start delfix.exe.
    • Make sure that all available options are checked.
    • Click on Run
    • DelFix should remove all our tools and delete itself afterwards. I don't need the log file.
  • If there is still something left you can delete it manually.


Closing security holes

Many infections happen via drive-by downloads that run unnoticed in the background while the user visits an infected website. To achieve this malware exploits security holes in installed software (e.g. browser or its plugins). Older versions of such software often have lots of known exploitable holes. Therefore it's very important to always keep your software up-to-date.
The following software is outdated. Make sure you remove all old versions and install the current one instead if you need the program:

Adobe Flash Player 14
Java™ 6 Update 26
Internet Explorer Version 8




Tips

I recommend to read and follow the "16 simple and easy ways to keep your computer safe and secure on the Internet" (Link) by Lawrence Abrams.

#9 aharonov

aharonov

  • Malware Response Team
  • 2,441 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:52 AM

Posted 29 September 2014 - 09:18 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users