1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Solved Windows 7 Explorer fails on startup & wow.dll error message

Discussion in 'Malware and Virus Removal Archive' started by Woodstock1780, 2013/06/12.

  1. 2013/06/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Please, run F-Secure Online Scanner

    • Disable your Antivirus program.
    • Checkmark I have read and accepted the license terms.
    • Click on Run Check button.
    • Quick scan (recommended) option will come pre-checked. Don't change it.
    • Click on Start button.
    • When scan is done, in Step 3: Clean the files, leave all settings as they're.
    • Click Next button.
    • Click Full report... button.
    • Copy report's content and paste it into your next reply.
     
  2. 2013/06/13
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    broni...get to the initialzation part and goes no further...tried 3 X
     

  3. to hide this advert.

  4. 2013/06/13
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    4th time is a charm

    did not find anything...did not generate a log. It looks like you have resolved this problem...you are my hero!! I have to pack it in for the night...been up since 5am...need some sleep. Will check back in the morning.
     
    Last edited: 2013/06/13
  5. 2013/06/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    1. Update your Java version here: http://www.java.com/en/download/installed.jsp

    Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

    Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

    2. Now, we need to remove old Java version and its remnants...

    Download JavaRa to your desktop and unzip it.
    • Run JavaRa.exe (Vista and 7 users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
    • Accept any prompts.
    • Do NOT post JavaRa log.

    ====================================

    Your computer is clean [​IMG]

    1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

    Run OTL

    • Under the Custom Scans/Fixes box at the bottom, paste in the following:

    Code:
    :OTL
    :Commands
    [purity]
    [emptytemp]
    [EMPTYFLASH]
    [emptyjava]
    [CLEARALLRESTOREPOINTS]
    [Reboot]
    • Then click the Run Fix button at the top
    • Let the program run unhindered, reboot the PC when it is done
    • Post resulting log.

    2. Now, we'll remove all tools, we used during our cleaning process

    Clean up with OTL:

    • Double-click OTL.exe to start the program.
    • Close all other programs apart from OTL as this step will require a reboot
    • On the OTL main screen, press the CLEANUP button
    • Say Yes to the prompt and then allow the program to reboot your computer.

    If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

    3. Make sure Windows Updates are current.

    4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

    5. Check if your browser plugins are up to date.
    Firefox - https://www.mozilla.org/en-US/plugincheck/
    other browsers: https://browsercheck.qualys.com/ (click on "Launch a quick scan now" link)

    6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

    7. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

    8. Run Temporary File Cleaner (TFC) weekly.

    9. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

    10. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
    The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

    11. (Windows XP only) Run defrag at your convenience.

    12. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

    13. Read:
    How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
    Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

    14. Please, let me know, how your computer is doing.
     
  6. 2013/06/13
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    otl log

    All processes killed
    ========== OTL ==========
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: Administrator
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: All Users

    User: David Lee Volz
    ->Temp folder emptied: 16768863 bytes
    ->Temporary Internet Files folder emptied: 24574500 bytes
    ->Java cache emptied: 37820 bytes
    ->Google Chrome cache emptied: 0 bytes
    ->Flash cache emptied: 740 bytes

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: DefaultAppPool
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes
    ->Flash cache emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 0 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 0 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33170 bytes
    RecycleBin emptied: 901755 bytes

    Total Files Cleaned = 40.00 mb


    [EMPTYFLASH]
     
  7. 2013/06/13
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    Thank you broni

    I think you have done it!! Many thanks to you. I am going to pack it in and hope that when I start up in the morning all will be well and I can finish up the last couple of steps (already changed my critical passwords).
     
  8. 2013/06/13
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Way to go!! [​IMG]
    Good luck and stay safe :)
     
  9. 2013/06/14
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    Thanks & a ?

    Broni, once again, thanks. All is well and I will follow the closing intructions to help keep my pc clean. I used to use CCleaner and Malware Bytes on a regular basis, but something slipped through. Can you tell me what I was infected with? I have gone over a lot of the lines of the logs, but cannot find what caused the problems. Also, my son told me before we started on this to do a repair install of Windows 7 to solve this problem. IYO, would that have worked?

    thanks,

    David
     
  10. 2013/06/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
  11. 2013/06/14
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    Rootkit detector

    Broni, should I download the sophos software and run a regular rootkit search & remove?
     
  12. 2013/06/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    I'd say no.
    The reason is that rootkits are rather tricky to remove and if you try to do it by yourself you can make situation even worse.
    If anything like that happens it's better to come back here and we'll help you out.
    In any case rootkit infection doesn't happen every other day :)
     
  13. 2013/06/14
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    Thanks again, Broni & have a great weekend!
     
  14. 2013/06/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Same to you :)
     
  15. 2013/06/15
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    same rootkit file caught by Malware Bytes

    broni, I ran a quick scan with MB and the exact same rootkit file was picked up. It was deleted, but now I am very concerned about all of this starting all over. is there any way to find out where/how I am being attacked??????
     
  16. 2013/06/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Can you post the log?
     
  17. 2013/06/15
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    log

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2013.06.15.02

    Windows 7 Service Pack 1 x64 NTFS
    Internet Explorer 9.0.8112.16421
    David Lee Volz :: DAVIDLEEVOLZ-HP [administrator]

    6/15/2013 7:50:11 AM
    mbam-log-2013-06-15 (07-50-11).txt

    Scan type: Quick scan
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 271792
    Time elapsed: 2 minute(s), 42 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 1
    C:\Users\David Lee Volz\AppData\Local\Temp\spqvjee\sfrxyqq\wow.dll (Rootkit.TDSS) -> Quarantined and deleted successfully.
     
  18. 2013/06/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Hmmm...we better double check....

    Download TDSSKiller and save it to your desktop.
    • Extract (unzip) its contents to your desktop.
    • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
    • If an infected file is detected, the default action will be Cure, click on Continue.
    • If a suspicious file is detected, the default action will be Skip, click on Continue.
    • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
    • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
    • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.
     
  19. 2013/06/15
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    TDSSKiller

    broni, ran it...found nothing, no report. Looks like MBAM caught it. I am now running MBAM in real time.
     
  20. 2013/06/15
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    When done re-run RogueKiller...

    Download RogueKiller for 32bit or Roguekiller for 64bit to your Desktop.
    • Close all the running programs
    • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
    • Otherwise just double-click on RogueKiller.exe
    • Pre-scan will start. Let it finish.
    • Click on SCAN button.
    • Wait until the Status box shows Scan Finished
    • Click on Delete.
    • Wait until the Status box shows Deleting Finished.
    • Click on Report and copy/paste the content of the Notepad into your next reply.
    • RKreport.txt could also be found on your desktop.
    • If more than one log is produced post all logs.
    • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again
     
  21. 2013/06/15
    Woodstock1780

    Woodstock1780 Inactive Thread Starter

    Joined:
    2013/06/12
    Messages:
    57
    Likes Received:
    0
    RK log

    RogueKiller V8.6.0 _x64_ [Jun 15 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
    Website : http://tigzy.geekstogo.com/roguekiller.php
    Blog : http://tigzyrk.blogspot.com/

    Operating System : Windows 7
    Started in : Normal mode
    User : David Lee Volz [Admin rights]
    Mode : Remove -- Date : 06/15/2013 20:45:19
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 0 ¤¤¤

    ¤¤¤ Registry Entries : 7 ¤¤¤
    [HJ POL] HKCU\[...]\System : DisableTaskMgr (0) -> DELETED
    [HJ POL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
    [HJ POL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
    [HJ POL] HKLM\[...]\System : DisableRegistryTools (0) -> [0x2] The system cannot find the file specified.
    [HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

    ¤¤¤ Scheduled tasks : 0 ¤¤¤

    ¤¤¤ Startup Entries : 0 ¤¤¤

    ¤¤¤ Web browsers : 0 ¤¤¤

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [NOT LOADED] ¤¤¤

    ¤¤¤ External Hives: ¤¤¤

    ¤¤¤ Infection : ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> %SystemRoot%\System32\drivers\etc\hosts


    127.0.0.1 localhost


    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: Hitachi HDS721075CLA332 +++++
    --- User ---
    [MBR] 48e7fc41314d6f02a8834c22c83136cd
    [BSP] 7422a751bf65e32119784e28e190adf9 : Windows Vista/7/8 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 702597 Mo
    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 1439125504 | Size: 12705 Mo
    User = LL1 ... OK!
    User = LL2 ... OK!

    Finished : << RKreport[1]_D_06152013_204519.txt >>
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.