I’ve been having this problem off and on for a while now. Sometimes my computer will boot to just a black screen and and a cursor and if I try to start explorer.exe from the task manager it will say “explorer.exe contains a virus”. I have to restart a few times to get a normal boot. Other times while the computer is running Avast will have a pop-up explorer.exe was stopped / FILEREPMALWARE.
Close all browser windows and refering to the picture above.
Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
ComboFix will will re-run. When finished, it will produce a log for you.
Attach the contents of the log in your next reply. (typical location: C:[b]ComboFix.txt[/b] )
Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them.
Only one of them will run on your system, that will be the right version.
[*]Double-click to run it. When the tool opens click Yes to disclaimer.
[*]Press Scan button.
[*]It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
[*]The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
Step#3
Once again we shall use FRST for additional checks. Re-run FRST/FRST64 by double-clicking:
[*]Type Torch* into the Search: field in FRST then click the Search Registry button.
[*]FRST will search your computer for files and when finished it will produce a log Search.txt in the same directory the tool is run.
[*]Please attach it to your reply.
Post back again the ComboFix report and attach the log here. It is located here C:\ComboFix.txt Same goes for FRST’s logs as they are where tool is run from, they should be located C:\Farbar
//Use Attachments and other options > Attach options for attaching the logs
Besides CF report, I would also like to see the GMER’s ARK (antirootkit) reports as FRST log shows the possible rootkit presence. GMER will help in determining the fix procedure …
Please download GMER, AntiRootkit tool from the link below and save it to your Desktop:
[*]Wait for initial scan to finish - if there is any query, click No;
[*]Click Scan button and wait until the full scan is complete;
[*]Click Save … - save the report to the Desktop (named ARK );
[*]Right-click wherever in the GMER’s window and select Options > 3rd party - click the Scan button;
[*]Please wait until the full scan is complete;
[*]Click Save … button and save report to Desktop (named 3rd party );
note: time scan for “3rd party” log may take some time
[*]Click the >>> and select Autostart card;
[*]After quick scan, click Copy button;
[*]Open notepad and Paste text. Save report to the Desktop (named autostart )
Attach here all Gmer logreports. (ARK; 3rd party and autostart)
Please note that this might be new infection, thats why we are diggin …
GMER’s 3rd party scan shall tell a lot. While GMER preforming the scan, coult you please re run FRST once again for additional file checks. Re-run FRST/FRST64 by double-clicking:
[*]Type Explorer.exe;User32.dll into the Search: field in FRST then click the Search File button.
[*]FRST will search your computer for files and when finished it will produce a log Search.txt in the same directory the tool is run.
[*]Please attach it to your reply.
This fix contains a a two-step. First, creating Fix.reg file. Second step is creating FixList for FRST tool and execution.
Temporarily disable your AntiVirus program, usually via a right click on the System Tray icon. They may interfere with this fix… If you are unsure how to do this please read this or this Instruction.
=> Step#1
Open Notepad and copy/paste the entire contents of the codebox below into Notepad(don’t forget to copy and paste REGEDIT4):
Save the file as fix.reg and choose to Save as type: - All Files then close the Notepad file.
Notice: Save fix.reg at [b]C:[/b] as it should be located in root of your system drive (full path: C:\fix.reg) as I shall tell FRST via FixList to search file at C:\fix.reg and execute the file only from there.
1. Open notepad and copy/paste the text present inside the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to the operating system
2. Save notepad as fixlist.txt to your Desktop. NOTE: => It’s important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
3. Run FRST/FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool completes its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply. Note: If the tool warned you about the outdated version please download and run the updated version.
Execute TDSSKiller.exe by doubleclicking on it. Confirm “End user Licence Agreement” and “KSN Statement” dialog box by clicking on Accept button.
[*] Press Start Scan
[*] If Suspicious object is detected, the default action will be Skip, click on Continue.
[*] If Malicious objects are found, select Cure.
Once complete, a log will be produced at the root drive which is typically C:\ ,for example, C:\TDSSKiller.<version_date_time>log.txt
Please post the contents of that log in your next reply.
… … …
Re-run ComboFix by duble-clicking and post me fresh created ComboFix.txt logreprot.
Bdw, tell me, do you see "“Test Mode Windows 7 Build 7600"” watermark in the lower right-hand corner?
Did you turn testsigning on? And do you have installation CD for Windows 7?
Ok, we might need to use it to repair some sistem files. Tell me, do you can access to normal mode?
No test mode just build 7601 service pack 1
We will remove this.
Try this FixList and tell me how is the thing after this fix:
1. Open notepad and copy/paste the text present inside the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to the operating system
Start
REPLACE: C:\Windows\winsxs\amd64_microsoft-windows-explorer_31bf3856ad364e35_6.1.7601.17514_none_afdaac81905bf900\explorer.exe C:\Windows\explorer.exe
REBOOT:
End
2. Save notepad as fixlist.txt to your Desktop. NOTE: => It’s important that both files, FRST and fixlist.txt are in the same location or the fix will not work.
3. Run FRST/FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool completes its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply. Note: If the tool warned you about the outdated version please download and run the updated version.