Multiple iexplore.exe running while Internet Explorer not in use

By Silohit
Jul 29, 2010
Topic Status:
Not open for further replies.
  1. Hello,

    I have been noticing my computer operating very slow and so checked Windows Task Manager to find up to 9 instances of iexplore.exe running even though I only use Firefox. Initially, I googled iexplore.exe and from the searches decided to download and scan my computer using SUPERAntiSpyware and Malwarebytes' Anti-Malware - which did confirm that I had trojans/viruses.

    I thought that my system was fine after the scans, but as of this writing I still notice at least 2-3 instances of iexplore.exe running after rebooting, and when I end the processes they come right back. Googling the subject again I came upon this site and so decided to sign up and hopefully get some help. I followed the 8-Step preliminary process and the required files are pasted (MBAM) & attached (GMER/DDS). Any help is greatly appreciated!


    === The MBAM Log ====

    Malwarebytes' Anti-Malware 1.46

    Database version: 4363

    Windows 6.0.6002 Service Pack 2
    Internet Explorer 8.0.6001.18928

    7/28/2010 4:56:55 PM
    mbam-log-2010-07-28 (16-56-55).txt

    Scan type: Quick scan
    Objects scanned: 132916
    Time elapsed: 12 minute(s), 42 second(s)

    Memory Processes Infected: 0
    Memory Modules Infected: 0
    Registry Keys Infected: 0
    Registry Values Infected: 0
    Registry Data Items Infected: 0
    Folders Infected: 0
    Files Infected: 0

    Memory Processes Infected:
    (No malicious items detected)

    Memory Modules Infected:
    (No malicious items detected)

    Registry Keys Infected:
    (No malicious items detected)

    Registry Values Infected:
    (No malicious items detected)

    Registry Data Items Infected:
    (No malicious items detected)

    Folders Infected:
    (No malicious items detected)

    Files Infected:
    (No malicious items detected)

    Attached Files:

  2. Bobbye

    Bobbye Helper on the Fringe Posts: 16,392   +32

    okay, thank you. Let' route out the problem. Please run the following and paste the logs into your next reply:

    Download Bootkit Remover and save to your Desktop
    1. You then need to extract the remover.exe file from the RAR using a program capable of extracting RAR compressed files. If you don't have an extraction program, you can use 7-Zip:
    2. After extracting remover.exe to your Desktop, double-click on remover.exe to run the program (Vista/7 users,right click on remover.exe and click Run As Administrator.
    3. You will see a Black screen with some data on it.
    4. Right click on the screen and click Select All.
    5. Press CTRL+C to Copy
    6. Open a Notepad and press CTRL+V to Paste.
    7. Include the report in your next post.
    Please download ComboFix from Here and save to your Desktop.

    • [1]. Do NOT rename Combofix unless instructed.
      [2].Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      [3].Close any open browsers.
      [4]. Double click combofix.exe & follow the prompts to run.
    • NOTE: Combofix will disconnect your machine from the Internet as soon as it starts. The connection is automatically restored before CF completes its run. If it does not, restart your computer to restore your connection.
      [5]. If Combofix asks you to install Recovery Console, please allow it.
      [6]. If Combofix asks you to update the program, always allow.
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      [7]. A report will be generated after the scan. Please paste the C:\ComboFix.txt in next reply.
    Note: Do not mouseclick combofix's window while it's running. That may cause it to stall.
    Note: Make sure you re-enable your security programs, when you're done with Combofix..
    Re-enable your Antivirus software.

    I would like to mention just for your information, that is can be normal to have multiple iexplore.ese processes with IE8. Unfortunately, malware can also 'hide' in the process name.

    Please do not use any other cleaning programs or scans while I'm helping you, unless I direct you to. Do not use a Registry cleaner or make any changes in the Registry.
  3. Silohit

    Silohit Newcomer, in training Topic Starter

    Hi Bobbye, thank you for helping me with this. Below are the logs you requested:

    Bootkit Remover
    (c) 2009 eSage Lab

    Program version:
    OS Version: Microsoft Windows Vista Business Edition Service Pack 2 (build 6002)
    , 32-bit

    System volume is \\.\C:
    \\.\C: -> \\.\PhysicalDrive0 at offset 0x00000001`6c100000
    Boot sector MD5 is: b19ee33a0168d5f0bb9afbe12e2bc035

    Size Device Name MBR Status
    111 GB \\.\PhysicalDrive0 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>

    Press any key to quit...

    ComboFix 10-07-28.04 - Sangpoknom 07/29/2010 9:57.1.2 - x86
    Microsoft® Windows Vista™ Business 6.0.6002.2.1252.1.1033.18.2046.1304 [GMT -7:00]
    Running from: c:\users\Sangpoknom\Desktop\ComboFix.exe
    SP: SUPERAntiSpyware *disabled* (Updated) {222A897C-5018-402e-943F-7E7AC8560DA7}
    SP: Windows Defender *enabled* (Updated) {D68DDC3A-831F-4FAE-9E44-DA132C1ACF46}

    ((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

    c:\windows\Downloaded Program Files\IDropPTB.dll

    MBR is infected with the Whistler Bootkit !!

    ((((((((((((((((((((((((( Files Created from 2010-06-28 to 2010-07-29 )))))))))))))))))))))))))))))))

    2010-07-29 17:15 . 2010-07-29 17:15 -------- d-----w- C:\A
    2010-07-29 17:09 . 2010-07-29 17:17 -------- d-----w- c:\users\Sangpoknom\AppData\Local\temp
    2010-07-29 17:09 . 2010-07-29 17:09 -------- d-----w- c:\users\Default\AppData\Local\temp
    2010-07-27 18:34 . 2010-03-05 14:01 420352 ----a-w- c:\windows\system32\vbscript.dll
    2010-07-27 18:00 . 2010-07-27 18:00 -------- d-----w- c:\users\Sangpoknom\AppData\Local\Mozilla
    2010-07-27 17:41 . 2010-07-27 17:41 -------- d-----w- c:\users\Sangpoknom\AppData\Local\ATI
    2010-07-27 17:40 . 2010-07-27 17:40 78496 ----a-w- c:\users\Sangpoknom\AppData\Local\GDIPFONTCACHEV1.DAT
    2010-07-27 17:37 . 2010-07-27 17:40 -------- d-----w- c:\users\Sangpoknom\AppData\Local\VirtualStore
    2010-07-27 07:10 . 2010-07-27 07:10 -------- d-----w- c:\users\Sangpoknom\AppData\Roaming\Malwarebytes
    2010-07-27 07:09 . 2010-04-29 22:39 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
    2010-07-27 07:09 . 2010-07-27 07:09 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
    2010-07-27 07:09 . 2010-07-27 07:09 -------- d-----w- c:\programdata\Malwarebytes
    2010-07-27 07:09 . 2010-04-29 22:39 20952 ----a-w- c:\windows\system32\drivers\mbam.sys
    2010-07-27 04:05 . 2010-07-27 04:05 -------- d-----w- c:\users\Sangpoknom\AppData\Roaming\
    2010-07-27 04:05 . 2010-07-27 04:05 -------- d-----w- c:\programdata\
    2010-07-27 04:04 . 2010-07-29 08:56 -------- d-----w- c:\program files\SUPERAntiSpyware
    2010-07-26 08:07 . 2010-07-26 08:07 -------- d-----w- c:\programdata\WindowsSearch
    2010-07-15 08:17 . 2010-07-15 08:17 -------- d-----w- c:\windows\system32\Client Security Solution
    2010-07-05 07:18 . 2009-11-08 17:55 99176 ----a-w- c:\windows\system32\PresentationHostProxy.dll
    2010-07-05 07:18 . 2009-11-08 17:55 49472 ----a-w- c:\windows\system32\netfxperf.dll
    2010-07-05 07:18 . 2009-11-08 17:55 297808 ----a-w- c:\windows\system32\mscoree.dll
    2010-07-05 07:18 . 2009-11-08 17:55 295264 ----a-w- c:\windows\system32\PresentationHost.exe
    2010-07-05 07:18 . 2009-11-08 17:55 1130824 ----a-w- c:\windows\system32\dfshim.dll
    2010-07-05 05:37 . 2010-04-16 16:43 28672 ----a-w- c:\windows\system32\Apphlpdm.dll
    2010-07-05 05:37 . 2010-04-16 14:39 4240384 ----a-w- c:\windows\system32\GameUXLegacyGDFs.dll
    2010-07-05 05:24 . 2010-04-05 17:01 67072 ----a-w- c:\windows\system32\asycfilt.dll
    2010-07-05 05:24 . 2010-05-26 14:47 289792 ----a-w- c:\windows\system32\atmfd.dll
    2010-07-05 05:24 . 2010-05-26 17:06 34304 ----a-w- c:\windows\system32\atmlib.dll
    2010-07-05 05:21 . 2010-05-01 14:13 2037248 ----a-w- c:\windows\system32\win32k.sys
    2010-07-05 04:59 . 2010-06-28 20:57 38848 ----a-w- c:\windows\avastSS.scr

    (((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
    2010-07-29 17:10 . 2008-11-16 04:42 12 ----a-w- c:\windows\bthservsdp.dat
    2010-07-14 10:07 . 2006-11-02 11:18 -------- d-----w- c:\program files\Windows Mail
    2010-06-28 20:57 . 2009-04-23 18:24 165032 ----a-w- c:\windows\system32\aswBoot.exe
    2010-06-28 20:37 . 2009-04-23 18:24 46672 ----a-w- c:\windows\system32\drivers\aswTdi.sys
    2010-06-28 20:37 . 2009-04-23 18:24 165456 ----a-w- c:\windows\system32\drivers\aswSP.sys
    2010-06-28 20:33 . 2009-04-23 18:24 23376 ----a-w- c:\windows\system32\drivers\aswRdr.sys
    2010-06-28 20:32 . 2009-04-23 18:24 50256 ----a-w- c:\windows\system32\drivers\aswMonFlt.sys
    2010-06-28 20:32 . 2009-04-23 18:24 17744 ----a-w- c:\windows\system32\drivers\aswFsBlk.sys
    2010-05-21 21:14 . 2009-10-02 18:23 221568 ------w- c:\windows\system32\MpSigStub.exe
    2010-05-04 05:59 . 2010-07-27 18:06 916480 ----a-w- c:\windows\system32\wininet.dll
    2010-05-04 05:55 . 2010-07-27 18:06 71680 ----a-w- c:\windows\system32\iesetup.dll
    2010-05-04 05:55 . 2010-07-27 18:06 109056 ----a-w- c:\windows\system32\iesysprep.dll
    2010-05-04 04:31 . 2010-07-27 18:06 133632 ----a-w- c:\windows\system32\ieUnatt.exe
    2006-05-03 10:06 . 2010-03-14 22:24 163328 --sh--r- c:\windows\System32\flvDX.dll
    2007-02-21 11:47 . 2010-03-14 22:24 31232 --sh--r- c:\windows\System32\msfDX.dll
    2008-03-16 13:30 . 2010-03-14 22:24 216064 --sh--r- c:\windows\System32\nbDX.dll

    ((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
    *Note* empty entries & legit default entries are not shown

    "WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]

    "Windows Defender"="c:\program files\Windows Defender\MSASCui.exe" [2008-01-19 1008184]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-11-22 820520]
    "TpShocks"="TpShocks.exe" [2006-12-26 181808]
    "EZEJMNAP"="c:\progra~1\ThinkPad\UTILIT~1\EzEjMnAp.Exe" [2006-11-28 243248]
    "PWMTRV"="c:\progra~1\ThinkPad\UTILIT~1\PWMTR32V.DLL" [2006-12-19 263728]
    "BLOG"="c:\progra~1\ThinkPad\UTILIT~1\BTVLogEx.DLL" [2006-12-19 214576]
    "LPManager"="c:\progra~1\THINKV~2\PrdCtr\LPMGR.exe" [2006-11-28 120368]
    "AMSG"="c:\program files\ThinkVantage\AMSG\Amsg.exe" [2006-12-21 468528]
    "AwaySch"="c:\program files\Lenovo\AwayTask\AwaySch.EXE" [2006-11-07 91688]
    "CanonSolutionMenu"="c:\program files\Canon\SolutionMenu\CNSLMAIN.exe" [2007-10-26 652624]
    "CanonMyPrinter"="c:\program files\Canon\MyPrinter\BJMyPrt.exe" [2007-09-14 1603152]
    "SoundMAXPnP"="c:\program files\Analog Devices\Core\smax4pnp.exe" [2007-07-10 1282048]
    "StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2009-09-30 61440]
    "TPHOTKEY"="c:\program files\Lenovo\HOTKEY\TPOSDSVC.exe" [2006-11-10 64128]
    "TPFNF7"="c:\program files\Lenovo\NPDIRECT\TPFNF7SP.exe" [2006-12-24 56368]
    "IBM Warranty Notification"="c:\program files\IBM\acp\ERTS0749\ERTS0749.exe" [2004-03-13 106496]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2010-06-17 40368]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-06-09 976832]
    "avast5"="c:\progra~1\ALWILS~1\Avast5\avastUI.exe" [2010-06-28 2837864]
    "TkBellExe"="c:\program files\Common Files\Real\Update_OB\realsched.exe" [2008-09-03 185896]

    "FlashPlayerUpdate"="c:\windows\system32\Macromed\Flash\FlashUtil10a.exe" [2008-10-05 235936]

    c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
    Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]

    "ConsentPromptBehaviorAdmin"= 0 (0x0)
    "DisableCAD"= 1 (0x1)
    "EnableUIADesktopToggle"= 0 (0x0)

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\psfus]
    2006-12-09 03:44 89600 ------w- c:\windows\System32\psqlpwd.dll

    Notification Packages REG_MULTI_SZ scecli psqlpwd


    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc]

    [HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-403156838-2247818533-1832388019-1000]

    R1 SABKUTIL;SABKUTIL;c:\program files\SUPERAntiSpyware\SABKUTIL.sys [x]
    R2 dualshock3;DUALSHOCK3 Controller HID Minidriver (USB) Beta;c:\windows\system32\DRIVERS\dualshock3.sys [2009-01-03 15616]
    R3 athrusb6;Atheros Wireless LAN USB device driver 6 Series;c:\windows\system32\DRIVERS\athru6.sys [2007-07-05 873472]
    R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\b57nd60x.sys [2006-11-02 167936]
    R3 CLPCIID;CLPCIID;c:\program files\CyberLink\PowerDVD\clpciid.sys [2002-02-08 24772]
    R3 MotioninJoyUSBFilter;MotioninJoy USB Filter Driver;c:\windows\system32\DRIVERS\MijUfilt.sys [x]
    R3 npggsvc;nProtect GameGuard Service;c:\windows\system32\GameMon.des [2009-12-03 3377880]
    R3 NUVision;Pinnacle LINX 2 Video;c:\windows\system32\DRIVERS\nuvvid2.sys [2001-12-03 155264]
    R3 tpflhlp;tpflhlp;c:\program files\Lenovo\System Update\session\7iuj13us\tpflhlp.sys [2008-05-30 13352]
    R3 XDva190;XDva190;c:\windows\system32\XDva190.sys [x]
    R4 sptd;sptd;c:\windows\system32\Drivers\sptd.sys [2008-10-26 716272]
    S0 TPDIGIMN;TPDIGIMN;c:\windows\System32\DRIVERS\ApsHM86.sys [2006-12-26 19760]
    S1 aswSP;aswSP; [x]
    S1 lenovo.smi;Lenovo System Interface Driver;c:\windows\system32\DRIVERS\smiif32.sys [2006-08-30 13744]
    S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [2010-02-17 12872]
    S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [2010-05-10 67656]
    S2 aswFsBlk;aswFsBlk; [x]
    S2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2010-06-28 50256]
    S2 libusbd;LibUsb-Win32 - Daemon, Version;c:\windows\system32\libusbd-nt.exe [2005-03-10 18944]
    S2 smihlp;SMI Helper Driver (smihlp);c:\program files\Common Files\ThinkVantage Fingerprint Software\Drivers\smihlp.sys [2006-12-09 11152]
    S2 TPHKSVC;On Screen Display;c:\program files\LENOVO\HOTKEY\TPHKSVC.exe [2006-10-13 55928]
    S2 TVT Backup Protection Service;TVT Backup Protection Service;c:\program files\Lenovo\Rescue and Recovery\rrpservice.exe [2006-12-14 569344]
    S3 libusb0;LibUsb-Win32 - Kernel Driver, Version;c:\windows\system32\drivers\libusb0.sys [2005-03-10 33792]
    S3 TVTI2C;Lenovo SM bus driver;c:\windows\system32\DRIVERS\Tvti2c.sys [2006-09-13 35264]

    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceNoNetwork REG_MULTI_SZ PLA DPS BFE mpssvc
    bthsvcs REG_MULTI_SZ BthServ
    LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
    ------- Supplementary Scan -------
    uStart Page = hxxp://
    IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\Office10\EXCEL.EXE/3000
    IE: Send image to &Bluetooth Device... - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie_ctx.htm
    IE: Send page to &Bluetooth Device... - c:\program files\ThinkPad\Bluetooth Software\btsendto_ie.htm
    FF - ProfilePath - c:\users\Sangpoknom\AppData\Roaming\Mozilla\Firefox\Profiles\6an39sqq.default\
    FF - prefs.js: - Wikipedia (en)
    FF - prefs.js: browser.startup.homepage - hxxp://
    FF - plugin: c:\program files\Mozilla Firefox\plugins\np-mswmp.dll
    FF - plugin: c:\program files\Mozilla Firefox\plugins\npijjiautoinstallpluginff.dll
    FF - plugin: c:\users\Sangpoknom\AppData\Roaming\Move Networks\plugins\npqmp071505000011.dll
    FF - plugin: c:\users\Sangpoknom\AppData\Roaming\Move Networks\plugins\npqmp071701000002.dll
    FF - plugin: c:\users\Sangpoknom\AppData\Roaming\Mozilla\Firefox\Profiles\6an39sqq.default\extensions\\platform\WINNT_x86-msvc\plugins\npBFHUpdater.dll
    FF - plugin: c:\users\Sangpoknom\AppData\Roaming\Mozilla\Firefox\Profiles\6an39sqq.default\extensions\\platform\WINNT_x86-msvc\plugins\npWARPVideoPlugin.dll
    FF - plugin: c:\users\Sangpoknom\AppData\Roaming\Vusion\npWARPVideoPlugin.360544.dll
    FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\

    ---- FIREFOX POLICIES ----
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbaam7a8h", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgberp4a5d4ar", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--p1ai", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("network.IDN.whitelist.xn--mgbayh7gpa", true);
    c:\program files\Mozilla Firefox\greprefs\all.js - pref("", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref", true);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.renego_unrestricted_hosts", "");
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.treat_unsafe_negotiation_as_broken", false);
    c:\program files\Mozilla Firefox\greprefs\security-prefs.js - pref("security.ssl.require_safe_negotiation", false);
    - - - - ORPHANS REMOVED - - - -

    HKCU-Run-RemoteControl - (no file)
    HKCU-Run-ISUSPM Startup - c:\progra~1\COMMON~1\INSTAL~1\UPDATE~1\isuspm.exe
    HKLM-Run-SunJavaUpdateSched - c:\program files\Java\jre1.6.0_07\bin\jusched.exe

    scanning hidden processes ...

    scanning hidden autostart entries ...

    scanning hidden files ...

    scan completed successfully
    hidden files:


    "ImagePath"="c:\windows\system32\GameMon.des -service"
    --------------------- LOCKED REGISTRY KEYS ---------------------

    [HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
    @Denied: (2) (LocalSystem)

    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)

    @Denied: (A) (Users)
    @Denied: (A) (Everyone)
    @Allowed: (B 1 2 3 4 5) (S-1-5-20)
    --------------------- DLLs Loaded Under Running Processes ---------------------

    - - - - - - - > 'lsass.exe'(736)
    c:\program files\ThinkVantage Fingerprint Software\homefus2.dll
    c:\program files\ThinkVantage Fingerprint Software\infra.dll

    - - - - - - - > 'Explorer.exe'(4252)
    ------------------------ Other Running Processes ------------------------
    c:\program files\ThinkVantage Fingerprint Software\upeksvr.exe
    c:\program files\Alwil Software\Avast5\AvastSvc.exe
    c:\program files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
    c:\program files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    c:\program files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
    c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
    c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
    c:\program files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
    c:\program files\Lenovo\Client Security Solution\tvttcsd.exe
    c:\program files\Lenovo\Rescue and Recovery\rrservice.exe
    c:\program files\Common Files\Lenovo\Scheduler\tvtsched.exe
    c:\program files\Lenovo\Rescue and Recovery\ADM\IUService.exe
    c:\program files\Common Files\Lenovo\Logger\logmon.exe
    c:\program files\ThinkPad\ConnectUtilities\AcSvc.exe
    c:\program files\Lenovo\System Update\SUService.exe
    c:\program files\ThinkPad\ConnectUtilities\SvcGuiHlpr.exe
    c:\program files\ThinkPad\Utilities\EZEJMNAP.EXE
    c:\program files\Synaptics\SynTP\SynTPLpr.exe
    c:\program files\ThinkVantage\PrdCtr\LPMGR.EXE
    c:\program files\Alwil Software\Avast5\AvastUI.exe
    c:\program files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
    c:\program files\Lenovo\HOTKEY\TPONSCR.exe
    c:\program files\Lenovo\Zoom\TpScrex.exe
    c:\program files\Windows Media Player\wmpnetwk.exe
    c:\program files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
    c:\program files\Internet Explorer\iexplore.exe
    c:\program files\Internet Explorer\iexplore.exe
    Completion time: 2010-07-29 10:30:51 - machine was rebooted
    ComboFix-quarantined-files.txt 2010-07-29 17:30

    Pre-Run: 37,961,555,968 bytes free
    Post-Run: 35,186,053,120 bytes free

    - - End Of File - - A5A6DE2D38F622A01C5CE0DFE7A785B2
  4. Bobbye

    Bobbye Helper on the Fringe Posts: 16,392   +32

    Okay- we're going to take some baby steps here:
    • Open Notepad
    • Copy and paste the text in the codebox into Notepad:
      @ECHO OFF
      remover.exe fix \\.\PhysicalDrive0
    • Go File > Save As
    • Save as Type choose All Files
    • For File Name type fix.bat
    • Save In> choose Desktop
    • Save
    • Double click to Run fix.bat
    (You may see a black box appear; this is normal.)

    Run remover.exe again and post its output.

    Do NOT reboot computer!

    Leave log for next baby step.
  5. Silohit

    Silohit Newcomer, in training Topic Starter

    This was shown when I ran fix.bat:

    Bootkit Remover
    (c) 2009 eSage Lab

    Program version:
    OS Version: Microsoft Windows Vista Business Edition Service Pack 2 (build 6002)
    , 32-bit

    Restoring boot code at \\.\PhysicalDrive0...
    ERROR: No standard boot code found for your OS.
    You can restore boot code only for Windows XP, Server 2003, Vista, Server 2008 a
    nd Windows 7

    Press any key to quit...

    and when I ran remover.exe this was shown:

    Bootkit Remover
    (c) 2009 eSage Lab

    Program version:
    OS Version: Microsoft Windows Vista Business Edition Service Pack 2 (build 6002)
    , 32-bit

    System volume is \\.\C:
    \\.\C: -> \\.\PhysicalDrive0 at offset 0x00000001`6c100000
    Boot sector MD5 is: b19ee33a0168d5f0bb9afbe12e2bc035

    Size Device Name MBR Status
    111 GB \\.\PhysicalDrive0 Unknown boot code

    Unknown boot code has been found on some of your physical disks.
    To inspect the boot code manually, dump the master boot sector:
    remover.exe dump <device_name> [output_file]
    To disinfect the master boot sector, use the following command:
    remover.exe fix <device_name>

    Press any key to quit...
  6. Bobbye

    Bobbye Helper on the Fringe Posts: 16,392   +32

    Okay, there is work to do. Broni has helped me with this:

    Credits in full to Broni
  7. Silohit

    Silohit Newcomer, in training Topic Starter

    Did as instructed and looks like the MBR is fixed. Ran the remover.exe to check and it output this:

    Bootkit Remover
    (c) 2009 eSage Lab

    Program version:
    OS Version: Microsoft Windows Vista Business Edition Service Pack 2 (build 6002)
    , 32-bit

    System volume is \\.\C:
    \\.\C: -> \\.\PhysicalDrive0 at offset 0x00000001`6c100000
    Boot sector MD5 is: 0ec6b2481fc707d1e901dc2a875f2826

    Size Device Name MBR Status
    111 GB \\.\PhysicalDrive0 OK (DOS/Win32 Boot code found)

    Press any key to quit...

    The iexplore.exe processes in task manager seems to have stopped, but I notice two processes with high cpu usage (svchost.exe using approx. 30% and logmon.exe using approx. 20%).
  8. Bobbye

    Bobbye Helper on the Fringe Posts: 16,392   +32

    You can use Process Explorer to identify what is running under svchost.exe.

    This entry is called 'Generic Host Process for Win32.' I run 7-9 of them in Processes- all clean. But they don't usually show anything in the CPU column. But malware can also run under this, so it needs to be checked.

    logmon.exe is a part of the IBM ThinkVantage suite application. I read the replies bandied around in the Thinkpad Forum. I'll let you check it out and decide for yourself:

    The only 2 things they agreed on was 1. It doesn't need to be running and 2. It is a high resource user!

    I'm finishing up some script for you to run in Combofix. Questions:
    1.What about the antivirus program? Installed programs show Avast. There are no restore points so I can't check it there. It doesn't show as Disabled in the Combofix header.The Services/Driver section in Combof show that two of it's drivers are either outdated or not being used. I see installed date of 2010-06-28.

    Did you set a policy to Disable CAD or are you aware that someone else did? I can remove it if it was a product of the malware. CAD=Ctrl/Alt/Del and would prevent doing that to open the Task Manager

    So see if you can ID the svchost.exe process and let me know about the AV program.
    Please run this online AV scan:

    Run Eset NOD32 Online AntiVirus scan HERE
    1. Tick the box next to YES, I accept the Terms of Use.
    2. Click Start
    3. When asked, allow the Active X control to install
    4. Disable your current Antivirus software. You can usually do this with its Notification Tray icon near the clock.
    5. Click Start
    6. Make sure that the option "Remove found threats" is Unchecked, and the option "Scan unwanted applications" is checked
    7. Click Scan
    8. Wait for the scan to finish
    9. Re-enable your Antivirus software.
    10. A logfile is created and located at C:\Program Files\EsetOnlineScanner\log.txt. Please include this on your post.
  9. Silohit

    Silohit Newcomer, in training Topic Starter

    Process Explorer shows audiodg.exe running under svchost.exe, yet when I ended the process for logmon.exe in task manager overall cpu usage went down to around 3%.

    I originally used AVG but switched to Avast sometime last year, and I have it autostart and update everytime I startup windows. I remember Avast needed to update to a newer edition, but I'm unsure when I did that (I'm assuming it was that date 2010-06-28). Before I ran Combofix I disabled Avast.

    I did not set a policy to disable CAD and was not aware of it, however I am still able to press ctrl+alt+del to gain access to the task manager.

    After running Eset NOD32 it showed no threats, and the log file shows this:

    ESETSmartInstaller@High as CAB hook log:
    OnlineScanner.ocx - registred OK

    I'm not sure if the log file is correct, because I left it to scan and when I got back the system was off. When I turned the system on it came out of hibernation mode and the only thing I saw was that the scan was completed and no threats were found.
  10. Bobbye

    Bobbye Helper on the Fringe Posts: 16,392   +32

    I'd like you to run the Eset online AV scan again please. That is not the full log.

    Custom CFScript

    • [1]. Close any open browsers.
      [2]. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      [3]. Open notepad and copy/paste the text in the code below into it:
    c:\program files\SUPERAntiSpyware\SABKUTIL.sys
    [HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
    Save this as CFScript.txt, in the same location as ComboFix.exe

    Referring to the picture above, drag CFScript into ComboFix.exe

    When finished, it will produce a log for you at C:\ComboFix.txt . Please attach to your next reply.
  11. Silohit

    Silohit Newcomer, in training Topic Starter

    I tried running Eset online AV again using Internet Explorer and it output the same log file, so I tried scanning with Firefox and it output this:

    ESETSmartInstaller@High as downloader log:
    all ok
    # version=7
    # OnlineScannerApp.exe=
    # OnlineScanner.ocx=
    # api_version=3.0.2
    # EOSSerial=cd57967fc413cb408e4ed513f28930d5
    # end=finished
    # remove_checked=false
    # archives_checked=false
    # unwanted_checked=true
    # unsafe_checked=false
    # antistealth_checked=true
    # utc_time=2010-08-04 06:46:38
    # local_time=2010-08-03 11:46:38 (-0800, Pacific Daylight Time)
    # country="United States"
    # lang=1033
    # osver=6.0.6002 NT Service Pack 2
    # compatibility_mode=768 16777215 100 0 12308497 12308497 0 0
    # compatibility_mode=5892 16776573 100 100 40920 117506896 0 0
    # compatibility_mode=8192 67108863 100 0 108666 108666 0 0
    # scanned=174297
    # found=0
    # cleaned=0
    # scan_time=5003

    and attached is the ComboFix log.

    Attached Files:

  12. Broni

    Broni Malware Annihilator Posts: 45,226   +243

    Message from Bobbye:


    How is computer doing at the moment?

    Uninstall Combofix:
    Go Start > Run [Vista users, go Start>"Start search"]
    Type in:
    Combofix /Uninstall
    Note the space between the "Combofix" and the "/Uninstall"
    Click OK (Vista users - press Enter).
    Restart computer.


    Download OTL to your Desktop.

    * Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    * Under the Custom Scan box paste this in:

    drivers32 /all
    %systemroot%\*. /mp /s
    %systemroot%\system32\*.dll /lockedfiles
    %systemroot%\Tasks\*.job /lockedfiles
    %systemroot%\system32\user32.dll /md5
    %systemroot%\system32\ws2_32.dll /md5
    %systemroot%\system32\ws2help.dll /md5
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs

    * Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows: OTL.txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them back here.
  13. Silohit

    Silohit Newcomer, in training Topic Starter

    Hi Broni, I really appreciate all the help you and Bobbye are providing on the forums.

    The computer now boots up and performs tasks very fast; before it would take quite a few minutes to load to desktop or launch Firefox. I tried to copy and paste the logs but there were too many characters, so I have attached them.

    Attached Files:

  14. Broni

    Broni Malware Annihilator Posts: 45,226   +243

    I'm glad to hear good news :)

    Update your Java version here:

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it to its own folder
    • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.


    Run OTL
    • Under the Custom Scans/Fixes box at the bottom, paste in the following

      O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
      O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} (Reg Error: Key error.)
      O28 - HKLM ShellExecuteHooks: {AEB6717E-7E19-11d0-97EE-00C04FD91972} - Reg Error: Key error. File not found
      [5 C:\Users\Sangpoknom\Desktop\*.tmp files -> C:\Users\Sangpoknom\Desktop\*.tmp -> ]
      [3 C:\ProgramData\*.tmp files -> C:\ProgramData\*.tmp -> ]
      [3 C:\ProgramData\*.tmp files -> C:\ProgramData\*.tmp -> ]
      @Alternate Data Stream - 119 bytes -> C:\ProgramData\TEMP:D06A4C76
      @Alternate Data Stream - 110 bytes -> C:\ProgramData\TEMP:888AFB86
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • You will get a log that shows the results of the fix. Please post it.
    • Open OTL again and click the Quick Scan button. Post the log it produces in your next reply.
  15. Silohit

    Silohit Newcomer, in training Topic Starter

    Please see below for the OTL Run Fix log, and the OTL Quick Scan log is attached.

    All processes killed
    ========== OTL ==========
    Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C255C8A-E604-49b4-9D64-90988571CECB}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5C255C8A-E604-49b4-9D64-90988571CECB}\ not found.
    Starting removal of ActiveX control {8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
    C:\Windows\Downloaded Program Files\erma.inf moved successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}\ not found.
    Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\\{AEB6717E-7E19-11d0-97EE-00C04FD91972} deleted successfully.
    Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{AEB6717E-7E19-11d0-97EE-00C04FD91972}\ not found.
    C:\Users\Sangpoknom\Desktop\~WRL2328.tmp deleted successfully.
    C:\Users\Sangpoknom\Desktop\~WRL2518.tmp deleted successfully.
    C:\Users\Sangpoknom\Desktop\~WRL2548.tmp deleted successfully.
    C:\Users\Sangpoknom\Desktop\~WRL2991.tmp deleted successfully.
    C:\Users\Sangpoknom\Desktop\~WRL4079.tmp deleted successfully.
    C:\ProgramData\xml72BF.tmp deleted successfully.
    C:\ProgramData\xml8141.tmp deleted successfully.
    C:\ProgramData\xml83A2.tmp deleted successfully.
    ADS C:\ProgramData\TEMP:D06A4C76 deleted successfully.
    ADS C:\ProgramData\TEMP:888AFB86 deleted successfully.
    ========== SERVICES/DRIVERS ==========
    ========== REGISTRY ==========
    ========== FILES ==========
    ========== COMMANDS ==========


    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    User: Sangpoknom
    ->Temp folder emptied: 19779482 bytes
    ->Temporary Internet Files folder emptied: 730302 bytes
    ->Java cache emptied: 2027 bytes
    ->FireFox cache emptied: 38735740 bytes
    ->Flash cache emptied: 13093 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 5670 bytes
    RecycleBin emptied: 0 bytes

    Total Files Cleaned = 57.00 mb


    User: All Users

    User: Default
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Flash cache emptied: 0 bytes

    User: Public

    User: Sangpoknom
    ->Flash cache emptied: 0 bytes

    Total Flash Files Cleaned = 0.00 mb

    OTL by OldTimer - Version log created on 08062010_131924

    Files\Folders moved on Reboot...
    File move failed. C:\Windows\temp\_avast5_\Webshlock.txt scheduled to be moved on reboot.

    Registry entries deleted on Reboot...

    Attached Files:

    • OTL.Txt
      File size:
      103.3 KB
  16. Broni

    Broni Malware Annihilator Posts: 45,226   +243

    Good :)

    Last steps....

    1. Download Security Check from HERE, and save it to your Desktop.
    • Double-click SecurityCheck.exe
    • Follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

    2. Download Temp File Cleaner (TFC)
    • Double click on TFC.exe to run the program.
    • Click on Start button to begin cleaning process.
    • TFC will close all running programs, and it may ask you to restart computer.

    3. Go to Kaspersky website and perform an online antivirus scan.

    • Disable your active antivirus program.
    • Read through the requirements and privacy statement and click on Accept button.
    • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
    • When the downloads have finished, click on Settings.
    • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
      • Spyware, Adware, Dialers, and other potentially dangerous programs
      • Archives
      • Mail databases
    • Click on My Computer under Scan.
    • Once the scan is complete, it will display the results. Click on View Scan Report.
    • You will see a list of infected items there. Click on Save Report As....
    • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.
  17. Silohit

    Silohit Newcomer, in training Topic Starter

    Please see below for requested logs:

    Results of screen317's Security Check version 0.99.5
    Windows Vista Service Pack 2 (UAC is enabled)
    Internet Explorer 8
    Antivirus/Firewall Check:

    Windows Firewall Enabled!
    avast! Free Antivirus
    WMI entry may not exist for antivirus; attempting automatic update.
    Anti-malware/Other Utilities Check:

    Malwarebytes' Anti-Malware
    Java(TM) 6 Update 21
    Adobe Flash Player
    Adobe Reader 8.2.3
    Korean Fonts Support For Adobe Reader 8
    Process Check:
    objlist.exe by Laurent

    Windows Defender MSASCui.exe
    Windows Defender MSASCui.exe
    Alwil Software Avast5 AvastSvc.exe
    Alwil Software Avast5 AvastUI.exe
    DNS Vulnerability Check:

    GREAT! (Not vulnerable to DNS cache poisoning)

    ``````````End of Log````````````

    KASPERSKY ONLINE SCANNER 7.0: scan report
    Friday, August 6, 2010
    Operating system: Microsoft Windows Vista Business Edition, 32-bit Service Pack 2 (build 6002)
    Kaspersky Online Scanner version:
    Last database update: Friday, August 06, 2010 18:25:52
    Records in database: 4135745

    Scan settings:
    scan using the following database: extended
    Scan archives: yes
    Scan e-mail databases: yes

    Scan area - My Computer:

    Scan statistics:
    Objects scanned: 171612
    Threats found: 0
    Infected objects found: 0
    Suspicious objects found: 0
    Scan duration: 03:51:15

    No threats found. Scanned area is clean.

    Selected area has been scanned.
  18. Broni

    Broni Malware Annihilator Posts: 45,226   +243

    Wonderful :)

    OTL Clean-Up
    Clean up with OTL:

    * Double-click OTL.exe to start the program.
    * Close all other programs apart from OTL as this step will require a reboot
    * On the OTL main screen, press the CLEANUP button
    * Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.


    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point.

    Turn off System Restore:

    - Windows XP:
    1. Click Start.
    2. Right-click the My Computer icon, and then click Properties.
    3. Click the System Restore tab.
    4. Check "Turn off System Restore".
    5. Click Apply.
    6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
    7. Click OK.
    - Windows Vista and 7:
    1. Click Start.
    2. Right-click the Computer icon, and then click Properties.
    3. Click on System Protection under the Tasks column on the left side
    4. Click on Continue on the "User Account Control" window that pops up
    5. Under the System Protection tab, find Available Disks
    6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
    7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
    8. Click OK

    2. Restart computer.

    3. Turn System Restore on.

    4. Make sure, Windows Updates are current.

    5. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    6. Download, and install WOT (Web OF Trust): It'll warn you (in most cases) about dangerous web sites.

    7. Run defrag at your convenience.

    8. Read How did I get infected?, With steps so it does not happen again!:

    9. Please, let me know, how is your computer doing.
  19. Silohit

    Silohit Newcomer, in training Topic Starter

    The computer is doing great; average cpu usage has decreased (less than 1% while idling) with fast load times of programs (it's now just as fast with windows aero theme turned back on). Thanks again to you and Bobbye for helping me rid this computer of malware :approve:
  20. Broni

    Broni Malware Annihilator Posts: 45,226   +243

    Way to go!! [​IMG]
    Good luck and stay safe :)
Topic Status:
Not open for further replies.

Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...

Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.