Results 1 to 5 of 5

Thread: "Freshbind" problem (?)

  1. #1
    Junior Member
    Join Date
    Oct 2005
    Location
    roaming - Malaysia, Thailand
    Posts
    8

    Red face "Freshbind" problem (?)

    Writing time: 6:33 AM 10-Feb-07
    To: Safer Networking Forums

    Specs: DELL Optiplex GX110, Intel Pentium III 800 megahertz ; 64MB RAM; Win98SE

    Re: "Freshbind"

    Question: Can anyone tell me for sure that IRSETUP.LGC is a malware file
    that I should allow Spybot to "fix"? It doesn't look malicious to me and I'm
    afraid it might be some kind of required valid file. Looks like a log.


    Note: I note the latest update list at Forum mentions "Win32.IRCBot.yh".
    Has this anything to do with "IRSETUP.LGC" or "IRSETUP.EXE"?


    Just a while ago I updated and then ran Spybot. It reported a bot by name
    of "Freshbind". The explanation in the right pane was unclear and ambiguous
    to me. It did not help me decide what to do next. I'm not too 'up' on this and
    was reluctant to "repair" anything, lest this was a false alert which might
    cause me to possibly delete some required files in Windows. Happened before.

    Please see attached "SpybotResult10Feb07.doc" file. Since I couldn't "copy &
    paste" anything from the Spybot results window, I took a screen shot, saved
    & split into 2 parts & enlarged each for better read, in Word. In case it's not
    possible to attach, the below is a summary of content:

    The first part shows the Spybot scan result, which was:

    Freshbind
    Log file
    C:\WINDOWS\APPLOG\IRSETUP.EXE

    Autorun settings
    C:\WINDOWS\WININIT.INI

    The 2nd part defines the Freshbind bot thing and is rather long:

    Company: EvilEyeSoftware
    Product: Freshbind2.01
    Threat: Malware

    Functionality: Freshbind 2.0 is a file binder which U can use to
    combine 2 or more files into one executable... etc., etc. ...


    Later I first checked out the implicated files via my old XTREE GOLD, XTREE
    viewer. This allowed me to view the guts of these files passively for clues
    as to their true nature and origin, before attempting a Spybot 'repair' :


    In: "c:\windows\wininit.ini" (implicated by Spybot) I found only this entry :

    [Rename]
    NUL=C:\WINDOWS\TEMP\irsetup.exe


    NOTE:
    As I had not yet asked Spybot to repair anything, I think the entry may have
    been made by some earlier 'anti-malware' or 'cleaner' I may have run just
    prior. In any case, Spybot implicated this entry. I think maybe wininit.ini was
    to be deleted on reboot automatically by Windows. Is Spybot just trying to
    speed up the inevitable? Perhaps I should have rebooted before I ran it.

    ---------------------

    In c:\windows\applog I found some files which may be related to the
    Spybot report on the "Freshbind" find:

    1 API_IRIS.LGC
    2 IRSETUP.LGC (file date:10-Feb-07) <--- implicated by Spybot
    3 ISIGNUP.LGC

    NOTE:
    I could not find any data in these files which revealed their origin or purpose.
    I left them in place as is.

    --------------------

    I've been using XTREE on this old Win 98 comp for years and never had any
    problems. Now, I was experiencing some problems and could not escape out
    of a pane, as usual, by pressing the "Esc" key. This had never happened
    before and appeared to have started only after I ran the "just-updated" Spybot.

    Currently I still don't know whether it was just a 'puter glitch or Spybot related. Probably a glitch in the old box.

    Afterwards, I re-booted to see how this would change the wininit.ini content
    and if this fixed my XTREE DOS File Manager.

    --------------------
    After re-boot:

    XTREE back to normal
    wininit.ini was gone

    NOTE: I FORGOT TO LOOK INTO C:\WINDOWS\TEMP initially but now it did not have the file "irsetup.exe" in it any more.

    --------------------

    Really appreciate any info on this from anyone at this forum. I especially
    don't understand the 'Freshbind' thing.

    Thank you,

    Jed...

  2. #2
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Hello Jed and welcome to the forum. You said Windows 98 and that creates issues since Microsoft no longer supports that Operating System and most of the tools we use will not run on it, but I will still do what I can to help, if you will do a few thngs for me.

    Look up at the top of the forum where you posted and you will see important Pinned information, especially this:
    "BEFORE you POST" -Preliminary Steps
    http://forums.spybot.info/showthread.php?t=288
    Read and follow directions and post the antivirus scan report and the HJT log using Post Reply to stay in this topic. I will be notified when you post and respond as soon as possible after that.

    I also used http://www.google.com/ for you if it helps:
    http://www.google.com/search?hl=en&q...nd&btnG=Search

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  3. #3
    Junior Member
    Join Date
    Oct 2005
    Location
    roaming - Malaysia, Thailand
    Posts
    8

    Red face "Freshbind" problem

    To: pskelly

    Thanx yr response. Appreciate. Sorry late. Bad connect
    here - daily 4 past cple wks. Not get thru to this & many other sites.
    Take yr advice soon as get to site w/post.

    --------

    Not think anytin seriously amiss w/system - except the
    usual attrition due to old age, etc. - but no viri to be
    found. Still mystery.

    Am really urious abt this 'irsetup' & 'freshbind' thing,
    which looking more like a false alarm to me.

    All my AV 'scans' effectively negative. Nutin to report. Spybot
    no any log I can find - just old 'Status' report, w/entries ALL
    dated 30 Dec 99. These latter, past history & look fairly benign.

    Ran HijackThis (v 1.99). Log at bottom of post. Also benign.

    -----------

    Did, as U hinted, some Google research & got thru to few places.
    Some interesting extracts below - which may help some other
    visitors here.

    Looks like Spybot telling me I been 'trojaned'. Seems to base
    this on file "irsetup.LGC", a copy of which held in zip in it's
    Recovery folder:

    C:\Windows\Application Data\Spybot - Search & Destroy\Recovery\ freshbind.zip.

    Freshbind.zip holds these 2:

    - IRSETUP.LGC
    - sbRecovery.ini

    The orig'l IRSETUP.LGC file is still in the C:\Windows\applog folder
    as I not yet rqst repair. This is not an executable. No real danger
    there. Full of lines w/ nr's and few ref's to DLL's & such. There's
    nothing in it that that might give a clue as to the log's purpose.
    Maybe should look inside some of the DLL's, etc., it refers to...
    but probly just an install log. I put a piece of it at end for ref.

    NOTE: Latest 'AVG-free' & 'TrojanHunter' scans found no
    "IRSETUP" infections. I now know, after Google, that "IRSETUP.EXE"
    has been an issue since at least 2003. All very interesting.

    From my earlier post, you may note that Spybot implicates
    IRSETUP.EXE, also - which was at that time in:

    C:\WINDOWS\APPLOG\IRSETUP.EXE (now gone)
    and was the only thing listed in
    C:\WINDOWS\WININIT.INI

    wininit.ini content was: "NUL=C:\WINDOWS\TEMP\irsetup.exe"

    which meant 'irsetup.exe' was slated for deletion at next boot.
    From the research I reckon the file was actually an "installer",
    which, on completion of job, normally commits filicide.

    Looks like Spybot was set up to ID IRSETUP.EXE as a 'trojan'.
    Not so, as the below extracts will aim to show. Yet, I suppose
    it is possible IRSETUP.EXE was infected by 'freshbind' and may
    have internally been a 'bound' file w/malicious payload.

    Or, the above may have happened sometime in
    distant past & ever since the tag has stuck. Then again,
    maybe somebody has been creating malicious programs
    using that already extant file name.

    To be sure, as the .exe file was already slated for
    deletion, this should have ended the 'threat'
    (if any) on reboot. Believe that the real Spybot target should
    have been the malicious files (if any) which irsetup.exe may
    have delivered; but my AV not detect any either. Back to
    square 1.

    But how would Spybot have determined this. My guess is that
    alarm bells rang when it came across the base term "IRSETUP",
    or, it assumed this from the presence of "IRSETUP.LGC",
    which I haven't been able to find much info on. But it is just a
    log file; and neither AVG nor TrojanHunter took any notice of it.

    Think the file may have been a left over from an installation I
    may have made between the last & current AVG run, so AVG
    never checked it. I'll never now because it was deleted & I've
    also cleaned out history, etc., via DOS & ccleaner - few times.

    The event, whatever it was, must have occurred on 13 Feb 07,
    which is the creation date of the log file. Oddly enough, the
    only reference within the log file which refers directly to a
    program, is the path in Program Files to WinPatrol - and Win
    Patrol History itself lists a RUN_ONCE alert on that day.

    BTW, from what I gather, many other anti-virus & similar aps
    make same 'assumption' on IRSETUP.EXE being a Trojan. From
    what I been reading, this could be one of those snowballing
    false assumptions. Maybe nobody stopped to check yet.

    Since the start I've wondered abt this being a possible
    false alert, which is why I hesitated on the 'repair'. There
    just didn't seem to be enuf clear, un-ambiguous info in the
    sidebar on the issue for my poor brain to make a decision.

    I would suggest that if there really is a malicious file by
    name of 'irsetup.exe' making the rounds, it might be
    an idea to also mention in side bar:

    ***
    "Use caution. Confirm file status w/ AV before deleting.
    A valid program by this name also exists. Check on
    'Setup Factory 6.0' at www.indigorose.com"

    ***
    - or somtin to that effect.

    The below extracts from net (in particular from 'indigorose')
    seem to affirm that IRSETUP.EXE, anyway, is NOT itself a trojan
    nor malicious. Since its gone now, I wonder where and what is
    the threat (if still any) to my system.

    Altho IRSETUP.EXE is no longer, a 2nd Spybot scan still insists
    that IRSETUP.LGC (a simple log file) is a 'threat'. I suppose it
    could be if some trojan lurking in my system needs to reference
    it; but can't find anything.

    -----------

    From Google:

    http://www.indigorose.com/forums/showthread.php?t=9337

    Jed Note 1:
    The following is an extract from a 2003 indigorose forum thread.
    Several indigorose threads on the issue stretch thru 2006 but
    no one seems to have gotten to the root of the matter. One has
    to read all the posts in these threads to get a handle on this.
    Here's just 1 of the posts:

    ------
    Ted Sullivan's Avatar
    Indigo Rose Staff
    Join Date: Oct 2003
    Posts: 731

    irsetup.exe is the main Setup Factory 6.0 setup program. It is extracted to a
    temporary folder when you run the setup.exe file and handles all of the actual
    installation of your software. It is deleted after the installation or on system
    reboot at the latest.

    It is definitely not "adware" and I have no idea why download.com would say
    that it is. We have literally millions and millions of setup.exe's out there
    created with Setup Factory 6.0 by many thousands of different companies.

    I can't speak for what is contained in your product or anyone else's, but
    the idea that irsetup.exe is adware is definitely incorrect. There must be
    something else going on there. You can have them contact Indigo Rose
    directly for clarification - I don't know what "tools" they are using to assess their submissions, but that is completely wrong and an obviously simplistic.

    ---------

    Jed Note 2: Note that the "ir" in "irsetup.exe" stands for "indigo rose".

    ---------

    From: http://www.oeone.net/spyware-removal/Irsetup-exe.html

    Irsetup.exe

    he file IRSETUP.EXE is not adware. It is actually
    part of the extremely common Setup Factory 6.0 installer builder product
    by Indigo Rose Software (www.indigorose.com). It is extracted to a temp
    folder when running a setup.exe created by Setup Factory 6.0 and used
    to handle the main installation tasks. It is deleted at the end of the
    installation process or at the next system reboot at the latest. Setup
    Factory 6.0 is used by *millions* of setup.exe's and many thousands of
    companies. The IRSETUP.EXE file itself is definitely not adware. The
    same filename is Related to the ...

    ------

    Another link:

    http://servicestage.symantec.com/avc...ile.threat.htm

    Jed Note 3:
    Symantec isn't too in-depth on the issue either but its summary does
    seem to corroborate the indigorose statement that "irsetup.exe" is
    not malware. It does exactly what it is supposed to do & deposits
    itself in the temp folder after end installation, ready for auto-destruct
    on re-boot.

    Nothing wrong with that. Should be no reason for ANY anti-malware
    to make an issue of it - unless it's basing its analysis purely on a
    'file name' - rather than a 'file scan'.

    ----------

    FRESHBIND

    Here's what little I found so far:
    (I note your link leads same places)

    eTrust Spyware Encyclopedia - FreshBind 1.1

    A tool that combines two or more files into a single file, usually for
    the purpose of hiding one of them. A binder compiles the list of files
    that you ...

    (Note the word "usually" .... jed...)

    www3.ca.com/securityadvisor/pest/pest.aspx?id=453075424 - 25k -

    -------


    from: http://www.spywaredb.com/remove-troj...reshbind-11-a/

    Name: TrojanDropper.Win32.FreshBind.11.a
    Category: Dropper
    Date: 2003-12-25
    Author: Fresh
    Dangerous: Yes

    TrojanDropper.Win32.FreshBind.11.a belongs to Dropper spyware category.
    It's presense means that your computer is infected with malicious software
    and is insecure.

    This Dropper is also known as:
    •Trojan Horse - named by Panda.
    • Win32.Fresh.11 - named by Computer Associates.
    • Win32/FreshBind.11!Trojan - named by Computer Associates.

    Below listed processes files are part of this spyware. To manually get rid
    of it, follow these instructions (at your own risk).
    TrojanDropper.Win32.FreshBind.11.a Removal Instructions:

    Kill the following processes

    freshbind.exe, stub.exe
    Remove the following files
    freshbind.exe, readme.txt, stub.exe.

    ------

    from: http://www.pestpatrol.com/zks/pestin...shbind_1_1.asp

    FreshBind 1.1

    From the doc: 'Features: - Stub is 21kb uncompressed (12k compressed
    with UPX 1.23) - Binds and executes up to 9 files - Use any type of files
    (not just exe) - Configurable name after extraction - Each file can be
    extracted to the temp, windows, system or current directory - Choose
    Visible, hidden, or no execution.

    Note: a file instructed to run with the hidden execution function will not
    always execute hidden. This is not a bug in the program, it's simply the
    way windows works.'

    Alias:

    Trojan Horse [Panda], TrojanDropper.Win32.FreshBind.11.b [Kaspersky],
    Win32.Fresh.11.B [Computer Associates], Win32/Fresh.11.B!Trojan
    [Computer Associates]

    Category:

    Binder: A tool that combines two or more files into a single file, usually
    for the purpose of hiding one of them. A binder compiles the list of files
    that you select into one host file, which you can rename. A host file is a
    simple custom compiled program that will decompress and launch the
    source programs. When you start the host, the embedded files in it are
    automatically decompressed and launched. When a trojan is bound
    with Notepad, for instance, the result will appear to be Notepad, and
    appear to run like Notepad, but the Trojan will also be run.

    Dropper: In viruses and trojans, the dropper is the part of the program
    that installs the hostile code onto the system.

    Trojan: Any program with a hidden intent. Trojans are one of the leading
    causes of breaking into machines. If you pull down a program from a
    chat room, new group, or even from unsolicited e-mail, then the program
    is likely trojaned with some subversive purpose. The word Trojan can
    be used as a verb: To trojan a program is to add subversive functionality
    to an existing program. For example, a trojaned login program might be
    programmed to accept a certain password for any user's account that
    the hacker can use to log back into the system at any time. Rootkits
    often contain a suite of such trojaned programs.

    Date of Origin: March, 2003
    Storage Required: # FreshBind 1.1: at least 273 KB

    Manual Removal:

    Follow these steps to remove FreshBind 1.1 from your machine.
    Begin by backing up your registry and your system, and/or setting a
    Restore Point, to prevent trouble if you make a mistake.

    Kill these running processes with Task Manager:
    freshbind.exe stub.exe

    Remove these files (if present) with Windows Explorer:
    freshbind.exe readme.txt stub.exe

    Research By: # PestPatrol's Pest Research Center
    Last Revised: April 03, 2005

    ====

    Remarks:

    There's no 'runnig task/process' nor any file on my system, called
    "stub.exe", "fresbind.exe" or freshbind.anythingelse (the only
    place the term "freshbind" is found is in the Spybot Recovery
    folder).

    There were no rootkits, malware, virus, etc., found by other aps
    I ran, either. (For the rootkit check I ran only RootkitRevealer).

    As I said, t's possible a trojan got 'bound in' with 'irsetup.exe' -
    but latter file long gone; and there's no other evidence.

    Another possibility is that since irsetup.exe is an 'installer', it
    may inherently be a 'binder' - and being such (which, by
    convention at some distant past, was tagged as 'malicious'
    software), irsetup.exe was automatically put on the list.
    ---------

    Am wondering if you or Spybot staff might be able to shed
    some more light on the issue or perhaps checkas to
    how it got on the list - or explain why it belongs there when
    owner of the file is a legit, longstanding software enterprise,
    or so it appears. This just might tie up some loose ends.
    ---------

    Here is my HijackThis log:

    Logfile of HijackThis v1.99.1
    Scan saved at 04:20:07, on 19-Feb-07
    Platform: Windows 98 SE (Win9x 4.10.2222A)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    NOTE:
    Am fairly comfortable w/the below - except maybe the
    "O2 - BHO: (no name) ... " - but think it been
    around long time... I'm not going to delete unless i
    get firm evidence of what it is. jed...


    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\WINDOWS\AGRSMMSG.EXE <--- (Agere Systems Modem)
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\EXPLORER.EXE
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\PROGRAM FILES\BILLP STUDIOS\WINPATROL\WINPATROL.EXE
    C:\PROGRAM FILES\GRISOFT\AVG FREE\AVGCC.EXE
    C:\WINDOWS\TASKMON.EXE
    C:\WINDOWS\SYSTEM\STIMON.EXE
    C:\PROGRAM FILES\GRISOFT\AVG FREE\AVGEMC.EXE
    C:\PROGRAM FILES\TROJANHUNTER 4.6\THGUARD.EXE
    C:\WINDOWS\RunDLL.exe
    C:\PROGRAM FILES\GRAB TEXT\OCR.EXE
    C:\PROGRAM FILES\WORDWEB\WWEB32.EXE
    C:\WINDOWS\NOTEPAD.EXE
    C:\WINDOWS\DESKTOP\TMPSTORE\X-APS\HIJACKTHIS\HIJACKTHIS.EXE

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - <--- not sure yet C:\PROGRA~1\SPYBOT~1\SDHELPER.DLL
    O2 - BHO: (no name) - {089FD14D-132B-48FC-8861-0048AE113215} - C:\PROGRAM FILES\SITEADVISOR\SAIE.DLL
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 6.0\READER\ACTIVEX\ACROIEHELPER.DLL
    O3 - Toolbar: SiteAdvisor - {0BF43445-2F28-4351-9252-17FE6E806AA0} - C:\PROGRAM FILES\SITEADVISOR\SAIE.DLL
    O4 - HKLM\..\Run: [WinPatrol] C:\Program Files\BillP Studios\WinPatrol\WinPatrol.exe
    O4 - HKLM\..\Run: [TaskMonitor] c:\windows\taskmon.exe
    O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
    O4 - HKLM\..\Run: [AVG7_EMC] C:\PROGRA~1\GRISOFT\AVGFRE~1\AVGEMC.EXE
    O4 - HKLM\..\Run: [THGuard] "C:\PROGRAM FILES\TROJANHUNTER 4.6\THGUARD.EXE"
    O4 - HKLM\..\RunServices: [KB891711] c:\WINDOWS\SYSTEM\KB891711\KB891711.EXE
    O4 - HKCU\..\Run: [Grab Text] C:\PROGRAM FILES\GRAB TEXT\OCR.EXE
    O4 - Startup: GOLARM.PIF = C:\GOLARM.BAT
    O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: Dell Home - {53E21C00-F654-11D4-9FE8-00B0D0ACF629} - http://www.dellnet.com (file missing) (HKCU)
    O12 - Plugin for .mpeg: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin4.dll
    O16 - DPF: {CAFEEFAC-0014-0000-0003-ABCDEFFEDCBA} (Java Runtime Environment 1.4.0_03) -
    O16 - DPF: {CAFEEFAC-0014-0001-0002-ABCDEFFEDCBA} (Java Runtime Environment 1.4.1_02) -
    O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://acs.pandasoftware.com/actives...ree/asinst.cab
    O16 - DPF: {F04A8AE2-A59D-11D2-8792-00C04F8EF29D} (Hotmail Attachments Control) - http://by17fd.bay17.hotmail.msn.com/...x/HMAtchmt.ocx
    O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (a-squared Scanner) - http://ax.emsisoft.com/asquared.cab
    O16 - DPF: {C946EF6D-296D-4907-A6E1-ED0E8E5AF024} (LycosMail Upload Control) - http://mail.lycos.com/hanmail-ax/AttachMail.cab
    O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204

    ------------------------------------------------------------------

    Here's top portion of 'irsetup.lgc':

    {
    o ce9ba6f0 62000 "C:\WINDOWS\TEMP\IRSETUP.EXE"
    R ce9ba6f0 0 40
    R ce9ba6f0 e8 f8
    R ce9ba6f0 e8 198
    R ce9ba6f0 5a000 1000
    R ce9ba6f0 50000 1000
    R ce9ba6f0 51000 1000
    R ce9ba6f0 52000 600
    o c1739410 2b000 "C:\WINDOWS\SYSTEM\COMDLG32.DLL"
    R c1739410 1b000 1000
    R c1739410 1c000 1000
    o c1604740 63e00 "C:\WINDOWS\SYSTEM\SHLWAPI.DLL"
    R c1604740 59400 1000
    o c1604990 47035 "C:\WINDOWS\SYSTEM\MSVCRT.DLL"
    R c1604990 3a000 1000

    -------

    Here's FROM: http://www.auditmypc.com/process/irsetup.asp

    irsetup.exe - Here is the scoop on lolok trojan as it pertains to computer
    network security. The big question: what is irsetup.exe and is it spyware,
    a trojan and if so, how do I get rid of lolok trojan?

    If irsetup.exe is running on your pc, your pc may be infected with a trojan
    that goes by the name of lolok.

    irsetup.exe is considered to be a security risk, not only because antivirus
    programs flag lolok trojan as a trojan, but also because other sites consider
    it a Trojan as well.

    lolok trojan is likely a Trojan and as such, presents a serious vulnerability which should be fixed immediately! Delaying the removal of irsetup.exe
    may cause serious harm to your system and will likely cause a number of
    problems, loss of data, loss of control or leaking private information.

    You should visit our free spyware removal page to make sure your system
    does not have other programs like irsetup.exe.
    IRSETUP.EXE - Disclaimer

    Every attempt has been made to provide you with the correct information
    for irsetup.exe or LOLOK TROJAN. Many spyware/malware programs use
    filenames of usual, non-malware programs. If we have included information about irsetup.exe that is inaccurate, we would greatly appreciate your help
    by updating the spy bot database and we'll promptly correct it.

    You should verify the accuracy of information we provided about irsetup.exe. lolok trojan may have had a status change since this page was published.

    © AuditMyPC.com . Network Security - Access Code For Wednesday,
    February 14, 2007 is xtiCsjxHqq.

    -----

    OK, that it. Thanx. Will read what U told me & do accordingly, soon as
    get back into this forum but 1st post this, while have chance.

    Jed...

    ====

    PS. OK. Just got in and read all. Got gist of it. Digest later
    some more. Think am on the right track, tho. Got to post this
    b4 another crash or acct runs dry... (had to trim 2.5K off here)

  4. #4
    In Memoriam -Always in our heart pskelley's Avatar
    Join Date
    Oct 2005
    Location
    Clearwater, Florida
    Posts
    20,247

    Default

    Well Jeb, there is no way I can read everything you posted without being lost for the rest of the day. I can't allow that to happen because around 50 other folks are depending on me.

    Here are my suggestions after a quick glance:

    1) I have a Compaq 7360 with Windows98SE that I dearly love since it was my first computer. It runs like new (reformat) but I take it out for a Sunday drive two or three times a year, and I am well protected, just update my programs and put it back in the garage.

    2) If you have questions that relate to how Spybot S&D handle anything (best freeware in existance, ask me) please post those here:
    http://forums.spybot.info/forumdisplay.php?f=4

    3) If you have questions for me that I may or may not be able to answer dealing with malware, please post them.

    4) Logfile of HijackThis v1.99.1 Scan saved at 04:20:07, on 19-Feb-07

    Unless you set this, you can use HJT to remove it:
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHELPER.DLL
    This is the marker for Spybot Search & Destroy and is safe. You should be running V1.4, have it updated and run it often.

    C:\PROGRAM FILES\TROJANHUNTER 4.6\THGUARD.EXE: If this is the trial version uninstall it. Using resources Win98 needs badly as you know.

    C:\PROGRAM FILES\GRAB TEXT\OCR.EXE <<< appears ok as long as you know it.

    O4 - Startup: GOLARM.PIF = C:\GOLARM.BAT <<< no idea what that is?

    C:\Program Files\Java\jre1.5.0_04\ <<< out of date and very unsafe, update to the newest version and uninstall all old versions in Add Remove programs. Se this:
    http://forums.spybot.info/showpost.p...80&postcount=2

    I see nothing that is obviously malware in this HJT log.

    IRSETUP.EXE <<< first it in a Temp folder, you can always delete anything in a Temp folder. Second a-squared whom I trust indicates it may be from an old Avast! install? Did you install Avast at some point? One way or another delete all the files in that
    C:\WINDOWS\TEMP\ <<< delete the contents, NOT THE FOLDER.
    http://www.hijackfree.com/en/processdetails/?id=610 and the Google:
    http://www.google.com/search?sourcei...=IRSETUP%2eEXE

    Thanks
    MS-MVP Consumer Security 2007-08-09
    Proud Member ASAP
    UNITE Member 2006

  5. #5
    Member of Team Spybot tashi's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    30,964

    Default

    This topic has been closed to prevent others with similar issues posting in it.

    If you need it re-opened please send me a private message (pm) and provide a link to the thread. Applies only to the original poster, anyone else with similar problems please start a new topic.
    Microsoft MVP Reconnect 2018-
    Windows Insider MVP 2016-2018
    Microsoft Consumer Security MVP 2006-2016

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •