Solved Infected by Sirefef.AB Sirefef.W and Sirefef Virus - cannot begin removal process

Here's the latest FSS Log:
[FONT=Courier New]Farbar Service Scanner Version: 06-08-2012[/FONT]
[FONT=Courier New]Ran by MichaelH (administrator) on 16-08-2012 at 10:20:16[/FONT]
[FONT=Courier New]Running from "X:\Virus repairs 8 14 2012"[/FONT]
[FONT=Courier New]Microsoft Windows 7 Professional Service Pack 1 (X64)[/FONT]
[FONT=Courier New]Boot Mode: Normal[/FONT]
[FONT=Courier New]****************************************************************[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Internet Services:[/FONT]
[FONT=Courier New]============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Connection Status:[/FONT]
[FONT=Courier New]==============[/FONT]
[FONT=Courier New]Localhost is accessible.[/FONT]
[FONT=Courier New]LAN connected.[/FONT]
[FONT=Courier New]Google IP is accessible.[/FONT]
[FONT=Courier New]Google.com is accessible.[/FONT]
[FONT=Courier New]Yahoo IP is accessible.[/FONT]
[FONT=Courier New]Yahoo.com is accessible.[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Windows Firewall:[/FONT]
[FONT=Courier New]=============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Firewall Disabled Policy: [/FONT]
[FONT=Courier New]==================[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]System Restore:[/FONT]
[FONT=Courier New]============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]System Restore Disabled Policy: [/FONT]
[FONT=Courier New]========================[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Action Center:[/FONT]
[FONT=Courier New]============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Windows Update:[/FONT]
[FONT=Courier New]============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Windows Autoupdate Disabled Policy: [/FONT]
[FONT=Courier New]============================[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Windows Defender:[/FONT]
[FONT=Courier New]==============[/FONT]
[FONT=Courier New]WinDefend Service is not running. Checking service configuration:[/FONT]
[FONT=Courier New]The start type of WinDefend service is set to Demand. The default start type is Auto.[/FONT]
[FONT=Courier New]The ImagePath of WinDefend service is OK.[/FONT]
[FONT=Courier New]The ServiceDll of WinDefend service is OK.[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Windows Defender Disabled Policy: [/FONT]
[FONT=Courier New]==========================[/FONT]
[FONT=Courier New][HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender][/FONT]
[FONT=Courier New]"DisableAntiSpyware"=DWORD:1[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]Other Services:[/FONT]
[FONT=Courier New]==============[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]File Check:[/FONT]
[FONT=Courier New]========[/FONT]
[FONT=Courier New]C:\Windows\System32\nsisvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\dhcpcore.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\drivers\afd.sys => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\drivers\tdx.sys => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\dnsrslvr.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\mpssvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\bfe.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\SDRSVC.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\vssvc.exe => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\wscsvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\wuaueng.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\qmgr.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\es.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\cryptsvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\svchost.exe => MD5 is legit[/FONT]
[FONT=Courier New]C:\Windows\System32\rpcss.dll => MD5 is legit[/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New] [/FONT]
[FONT=Courier New]**** End of log ****[/FONT]


Does this look clean?

MSE is now updating again, along with Windows Update. I will check with the other forum regarding the bootup issue, but it only started yesterday during the cleaning process, so wondering if sometihng got wiped out - small price to pay for a clean computer.
 
Your computer is clean

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

Run OTL

  • Under the Custom Scans/Fixes box at the bottom, paste in the following:

Code:
:OTL
:Commands
[purity]
[emptytemp]
[EMPTYFLASH]
[emptyjava]
[CLEARALLRESTOREPOINTS]
[Reboot]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Post resulting log.

2. Now, we'll remove all tools, we used during our cleaning process

Clean up with OTL:

  • Double-click OTL.exe to start the program.
  • Close all other programs apart from OTL as this step will require a reboot
  • On the OTL main screen, press the CLEANUP button
  • Say Yes to the prompt and then allow the program to reboot your computer.

If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

3. Make sure, Windows Updates are current.

4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

5. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

6. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

7. Run Temporary File Cleaner (TFC) weekly.

8. Download and install Secunia Personal Software Inspector (PSI): https://www.techspot.com/downloads/4898-secunia-personal-software-inspector-psi.html. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

9. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

10. (Windows XP only) Run defrag at your convenience.

11. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

12. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

13. Please, let me know, how your computer is doing.
 
Broni: I think I am all set at this point. Everything is running good except the bootup, but I will scoot on over to the other forum and see if they can figure that out (must be a corrupted file or something from the virus).

I do appreciate all your help and you patience - I sent you a donation as well as it was well deserved.

Regards, Michael
 
Back