Solved Please help with 213.163.89.106.80 virus

Status
Not open for further replies.

NeoDag

Posts: 6   +0
Hello,

I also am a victim of this dreadful virus. My NOD32 did not prevent his virus from entering my system and I cannot get rid of it since it cannot find it.

As seen in similar threads about this virus/rootkit/etc. I had to make a new thread so you experts could check out my logs and help me to solve this.

The thing is that when I use my internet browser (Internet Explorer 8) and Firefox, I seem to get ESET popup telling me that access to an URL has been denied, namely 213.163.89.106:80. Another thing I get is some errors regarding a stack overflow error (in my current IE8 tab). I'm running Windows 7.

I followed instructions as per https://www.techspot.com/community/...lware-removal-preliminary-instructions.58138/ and I got no problems getting the logs.

I hope you can help me with the information provided.

Also I had already run NOD and Malwarebytes Anti-Malware before finding this helpful forum and found and deleted infected files that I had been detected.

Kind regards,

NeoDag.
 

Attachments

  • Attach.txt
    4.9 KB · Views: 4
  • Attach[1].txt
    5.9 KB · Views: 2
  • DDS.txt
    15.5 KB · Views: 3
  • GMER.log
    10.5 KB · Views: 2
Please download ComboFix from Here or Here to your Desktop.

**Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved directly to your desktop**
  1. Please, never rename Combofix unless instructed.
  2. Close any open browsers.
  3. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
    • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
    • Click on this link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
    NOTE1. If Combofix asks you to install Recovery Console, please allow it.
    NOTE 2. If Combofix asks you to update the program, always do so.
    • Close any open browsers.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
    • Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
    • If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
  4. Double click on combofix.exe & follow the prompts.
  5. When finished, it will produce a report for you.
  6. Please post the "C:\ComboFix.txt" .
**Note: Do not mouseclick combofix's window while it's running. That may cause it to stall**

Make sure, you re-enable your security programs, when you're done with Combofix.

DO NOT make any other changes to your computer (like installing programs, using other cleaning tools, etc.), until it's officially declared clean!!!
 
Thank You for the quick response.

Here is the ComboFix Log
 

Attachments

  • ComboFix log.txt
    11.9 KB · Views: 12
Is Eset still complaining?

1. Please open Notepad
  • Click Start , then Run
  • Type notepad .exe in the Run Box.

2. Now copy/paste the entire content of the codebox below into the Notepad window:

Code:
File::
c:\windows\system32\drivers\lvuvc.hs


Folder::

Driver::

Registry::

RegLockDel::


3. Save the above as CFScript.txt

4. Then drag the CFScript.txt into ComboFix.exe as depicted in the animation below. This will start ComboFix again.

CFScript.gif



5. After reboot, (in case it asks to reboot), please post the following reports/logs into your next reply:
  • Combofix.txt
 
Eset isn't complaining any more. does this mean that im am now completely free of this virus?
 

Attachments

  • Combofix.txt
    12.4 KB · Views: 4
We'll double check :)

Uninstall Combofix:
Go Start > Run [Vista users, go Start>"Start search"]
Type in:
Combofix /Uninstall
Note the space between the "Combofix" and the "/Uninstall"
Click OK (Vista users - press Enter).
Restart computer.

=========================================================================

1. Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.


2. Go to Kaspersky website and perform an online antivirus scan.

1. Disable your active antivirus program.
2. Read through the requirements and privacy statement and click on Accept button.
3. It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
4. When the downloads have finished, click on Settings.
5. Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:

  • Spyware, Adware, Dialers, and other potentially dangerous programs
    [*] Archives
    [*] Mail databases
6. Click on My Computer under Scan.
7. Once the scan is complete, it will display the results. Click on View Scan Report.
8. You will see a list of infected items there. Click on Save Report As....
9. Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button. Then post it here.


Download HijackThis:
http://free.antivirus.com/hijackthis/
by clicking on Installer under Version 2.0.4
Install, and run it.
Post HijackTHis log.
Do NOT attempt to fix anything!

NOTE. If you're using Vista, or 7, right click on HijackThis, and click Run as Administrator
 
Hi Broni,
First of all, thank you for all your help so far.
There were 2 threats found and 3 infected objects found that are in the KasperskyOnlineLog.
 

Attachments

  • KasperskyOnlineLog.txt
    1 KB · Views: 5
  • hijackthis.log
    6.3 KB · Views: 2
Please download OTM

  • Save it to your desktop.
  • Please double-click OTM to run it. (Note: If you are running on Vista, right-click on the file and choose Run As Administrator).
  • Copy the lines in the codebox below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose Copy):

Code:
:Processes

:Services

:Reg

:Files
C:\Windows\winsxs\x86_microsoft-windows-partitionmanager_31bf3856ad364e35_6.1.7600.16385_none_e17269af1bc32604\partmgr.sys	
D:\Downloads\Rar Password Unlocker v3.0.rar
      
:Commands
[purity]
[resethosts]
[emptytemp]
[Reboot]

  • Return to OTM, right click in the Paste Instructions for Items to be Movedwindow (under the yellow bar) and choose Paste.
  • Click the red Moveit! button.
  • Copy everything in the Results window (under the green bar) to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy), and paste it in your next reply.
  • Close OTM and reboot your PC.

Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTMoveIt\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
 
Here is the log from OTM.



All processes killed
========== PROCESSES ==========
========== SERVICES/DRIVERS ==========
========== REGISTRY ==========
========== FILES ==========
C:\Windows\winsxs\x86_microsoft-windows-partitionmanager_31bf3856ad364e35_6.1.7600.16385_none_e17269af1bc32604\partmgr.sys moved successfully.
D:\Downloads\Rar Password Unlocker v3.0.rar moved successfully.
========== COMMANDS ==========
C:\Windows\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully

[EMPTYTEMP]

User: All Users

User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Neo
->Temp folder emptied: 111595115 bytes
->Temporary Internet Files folder emptied: 26950829 bytes
->Java cache emptied: 128094 bytes
->FireFox cache emptied: 49421930 bytes
->Flash cache emptied: 2091 bytes

User: Public
->Temp folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 110570 bytes
RecycleBin emptied: 1643798369 bytes

Total Files Cleaned = 1,747.00 mb


OTM by OldTimer - Version 3.1.12.0 log created on 05292010_104352

Files moved on Reboot...
File C:\Users\Neo\AppData\Local\Temp\Low\hsperfdata_Neo\2532 not found!
File C:\Users\Neo\AppData\Local\Temp\~DF0D003572C2245668.TMP not found!
File C:\Users\Neo\AppData\Local\Temp\~DF1C1D3B18E38D90C9.TMP not found!
File C:\Users\Neo\AppData\Local\Temp\~DF5BCAA13BB2B8ECD1.TMP not found!
File C:\Users\Neo\AppData\Local\Temp\~DF6869AE9879D79C69.TMP not found!
File C:\Users\Neo\AppData\Local\Temp\~DF914FB66D5AB758BB.TMP not found!
File C:\Users\Neo\AppData\Local\Temp\~DFD98579F743C9D57B.TMP not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\ads[4].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\can-it-be-built-s01e01-s01e02-fqm[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\info[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\irfree_com[2].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\menu28[4].html moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\searchTrack[1].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\searchTrack[2].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\showbanner[4].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\showbanner[5].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\someones-knocking-at-the-door-2009-dvdrip-xvid-vision[1].htm moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\st[3] not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\st[4] not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\st[5] not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\st[6] not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XQIMN16I\topic147538[1].html moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\iframe3[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\pngbehavior[1].htc moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\searchTrack[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\searchTrack[2].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\searchTrack[3].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\sh18[1].html moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\showbanner[4].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\showbanner[5].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\showbanner[6].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\st[1] moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\st[2] not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\QFEKHFI2\st[5] moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\ads[1].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\ads[3].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\national-geographic-somali-pirates-fighting-back-720p-hdtv-x264-dich[1].htm moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\searchTrack[2].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\searchTrack[3].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\searchTrack[4].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\searchTrack[5].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\searchTrack[6].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\showbanner[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\showbanner[2].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\showbanner[3].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\showbanner[4].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\skatd2009-xvid-vision.part1[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\st[3] moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\E15H0GJV\topic147655[4].html moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\ads[1].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\ads[2].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\ads[4].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\afr[1].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\searchTrack[1].htm moved successfully.
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\searchTrack[2].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\searchTrack[3].htm not found!
File C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\searchTrack[4].htm not found!
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\showbanner[3].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\showbanner[4].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\showbanner[5].htm moved successfully.
C:\Users\Neo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\2MW07IWL\topic147648[1].html moved successfully.
File move failed. C:\Windows\temp\logishrd\LVPrcInj01.dll scheduled to be moved on reboot.

Registry entries deleted on Reboot...
 
Please download OTC to your desktop. It'll remove most tools and logs we used so far. If any tool, file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

  • Double-click OTC.exe to run it. (Vista and 7 users, please right click on OTC and select "Run as an Administrator")
  • Click on the CleanUp! button and follow the prompts.
  • You will be asked to reboot the machine to finish the Cleanup process, choose Yes. If it doesn't ask you to reboot, restart computer manually.
  • After the reboot all the tools we used should be gone.
  • The tool will delete itself once it finishes.


Your computer is clean

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point.

Turn off System Restore:

- Windows XP:
1. Click Start.
2. Right-click the My Computer icon, and then click Properties.
3. Click the System Restore tab.
4. Check "Turn off System Restore".
5. Click Apply.
6. When turning off System Restore, the existing restore points will be deleted. Click Yes to do this.
7. Click OK.
- Windows Vista and 7:
1. Click Start.
2. Right-click the Computer icon, and then click Properties.
3. Click on System Protection under the Tasks column on the left side
4. Click on Continue on the "User Account Control" window that pops up
5. Under the System Protection tab, find Available Disks
6. Uncheck the box for any drive you wish to disable system restore on (in most cases, drive "C:")
7. When turning off System Restore, the existing restore points will be deleted. Click "Turn System Restore Off" on the popup window to do this.
8. Click OK

2. Restart computer.

3. Turn System Restore on.

4. Make sure, Windows Updates are current.

5. If any Trojan was listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

7. Run defrag at your convenience.

8. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

9. Please, let me know, how is your computer doing.
 
Thanks Brodi for all your help, You made it so easy to follow your instructions and get my pc virus free.
It's so nice to get competent help from professionals, and you do it for free and ask for nothing in return.
You Guys Rock!

oh and my pc seems to be fine, I'll keep a much closer eye on it now.

Thanks Heaps Again
NeoDag.
 
Status
Not open for further replies.
Back