Author Topic: FixDrive.exe trojan/virus shortcut virus  (Read 10353 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
Re: FixDrive.exe trojan/virus shortcut virus
« Reply #15 on: August 21, 2016, 11:42:31 AM »
FRST

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37699
Re: FixDrive.exe trojan/virus shortcut virus
« Reply #16 on: August 21, 2016, 11:43:34 AM »
as i said, post link to VT result.
 
There is lots of additional file info behind the extra tabs that we cant see when you copy and paste

Found it using MD5 search
https://virustotal.com/en/file/53ded0c3da41ecacb88815f781512995a1780697540966a9d9dda55f93aef392/analysis/


@dbrisendine will assit you when back online




« Last Edit: August 21, 2016, 11:48:43 AM by Pondus »


Offline dbrisendine

  • Malware Fighter
  • Avast Evangelist
  • Super Poster
  • ***
  • Posts: 1258
Re: FixDrive.exe trojan/virus shortcut virus
« Reply #18 on: August 22, 2016, 05:53:55 AM »
Is this a business machine that is part of a domain?  Some of the settings may not be able to be changed except by the Domain Administrator.



FIRST >>>>

Did you know that System Restore is disabled?

If you did not do this intentionally, please check the following:

Go to Start and type System in the search box.

Click on System (under Control Panel or Settings) and then on System Protection.

Click on Configure and then select Turn on system protection.

Click Apply and then OK.

In the System Protection screen, is Protection now On for the drive?


SECOND >>>>

Please go to START (Windows Orb) >> Control Panel >> Uninstall a Program or Programs and Features and remove the following (if listed):

QuickTime

To do so, left clicking on the name once and then click Uninstall/Change at the bar above the list window. 

Follow the prompts of the uninstaller BUT please read carefully any questions it asks before answering; some uninstallers will try and deceive you into keeping the software.


THIRD >>>>

Open notepad by pressing the Windows Key + R Key, typing in Notepad in the Run dialog and then pressing Enter.  Please copy the contents of the Code box below.  To do this highlight the contents of the box by clicking [Select] next to Code: , then right click on any of the highlighted text and select copy.  Paste this into the open notepad. Save it to your desktop as fixlist.txt
 
Code: [Select]
Start
CreateRestorePoint:
CloseProcesses:
HKLM\...\Run: [b] => wscript.exe //B "C:\Users\ADMINI~1\AppData\Roaming\winsc32\b.vbs"
C:\Users\ADMINI~1\AppData\Roaming\winsc32
HKLM-x32\...\Run: [] => [X]
HKLM-x32\...\Run: [Infoclient] => [X]
HKLM\Software\Policies\Microsoft\Windows NT\SystemRestore: [DisableSR/DisableConfig]  <===== ATTENTION
HKU\S-1-5-21-3459921781-3051252704-3355898513-500\...\Run: [b] => wscript.exe //B "C:\Users\ADMINI~1\AppData\Roaming\winsc32\b.vbs"
Startup: C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update Explorer.lnk [2016-08-21]
BHO-x32: No Name -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> No File
BHO-x32: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll => No File
Toolbar: HKU\S-1-5-21-3459921781-3051252704-3355898513-500 -> No Name - {47833539-D0C5-4125-9FA8-0819E2EAAC93} -  No File
CHR Extension: (Google Search) - C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2016-02-02]
CHR Extension: (Chrome Web Store Payments) - C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-08-21]
S3 e1express; system32\DRIVERS\e1e6232e.sys [X]
S3 e1yexpress; system32\DRIVERS\e1y62x64.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X]
C:\Windows\system32\DRIVERS\e1e6232e.sys
C:\Windows\system32\DRIVERS\e1y62x64.sys
C:\Windows\System32\drivers\rdvgkmd.sys
cmd: ipconfig /flushdns
cmd: netsh advfirewall reset
cmd: netsh advfirewall set allprofiles state on
Reg: reg delete HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
Reg: reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local /f
CMD: bitsadmin /reset /allusers
RemoveProxy:
EmptyTemp:
Reboot:
end

NOTE. It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 by right clicking on the FRST64.exe file, selecting "Run as Administrator..".  The User Account Control may open up; if it does, select Yes to continue to let FRST open and load. 

The tool will check for an updated version of itself every time it loads; please allow it to do this and the program will either inform you it is downloading an updated copy (and to wait until it is safe to continue) or show nothing (meaning there is no update found) and you can continue on.  Press the Fix button just once and wait.  The tool will create a restore point, process the script and ask for a restart of your system.



If for some reason the tool needs a restart, please make sure you let the system restart normally. After that let the tool complete its run.

When finished FRST will generate a log on the Desktop (Fixlog.txt). Please attach it to your reply post.  Also, tell me how your system is running now.
Win7 x32 Ult. SP1, Brain 2.0 / Win10 x64, Brain2.5
My help is always free but if you would like to help encourage me or show your thanks -----> DONATE