Results 1 to 7 of 7

Thread: bar311.exe virus not detected

  1. #1
    Member
    Join Date
    Jan 2006
    Posts
    44

    Default bar311.exe virus not detected

    In that I'd recently noticed odd behaviour on my laptop, where folder properties/options (for unhiding protected files and also listing known file's extensions) while they could be unticked/ticked and the folder view responded accordingly, the changes were restored to Windows default as soon as I either closed the folder or up-foldered and back folder-ed to that folder (i.e.; the once seen extensions were no longer listed).

    Also noticed that when I changed the options (to showing file extns and unhiding files, of course clicking apply and OK), even when I left folder open, as soon as I once again opened it's tools, foldervoptions and view, I found the tickables again 'default' ticked and unticked. Clearly something was wrong.

    Additionally, I noticed when I was in any Windows 'save-as' window and I tried using the back arrow to go back to a previously navigated to folder, I got nearly always (or recentl;y always was?) prompted that 'that feature was not installed, would I like to install it now'. I didn't just fall off the turnip truck (yesterday), so I never clicked'ok' or 'yes'.

    Also having recently noticed that one of my pen drive's refused to format (my usual means of assuring my pen drive's don't have any viruses, trojans or malware, because I don't absolutely reply solely on my well maintained and pretty good security softwares).

    So not ever recalling running into that, intent on formatting the pen drive and/or towards seeing what was on the drive that was running in other directories, first I tried cut-pasting all th drive's files (same no can do prompt).

    So I began cutting groups of the files for pasting and got down to tone file that was causing the prompts. I found a file ('autorun.inf') which file unlocker told me explorer and my AV prog were 'running in conjunction' with that file.

    Obviously one can't shut down explorer and then delete a file (as desktop icons all disappear and no means to access any of Windows's commands (unless one can use DOS, whatever). And neither was I going to shut down my AV so as to delete this bugger (suspect some users encountering the bugger might try that and really get into trouble, whatever).

    So I opened ProcessExplorer and it revealed 4 instances of a previously (and still) unknown executable running ("bar311.exe") and it was pretty well protected as I later discovered it's real name and icon seemed to have been masked under the assumed name ("autorun.inf" an otherwise legitimate file name) and I only discovered it's real name, etc., when I tried using 'file unlocker' on the 'autorun.inf' file.

    Of note when I looked for file unlocker's usual file option (i.e.; by right clicking any file, the menu is supposed to display things like SpyBot scan, AV scan and file unlocker), but only SpyBot was there. Hmmm.
    So I think I copied the suspect file and placed it into a desktop folder, then again I think it was when file unlocker appeared on the menu.

    When I used 'file unlocker' on the file, it first prompted that the file was in use (duh, I knew that), so I used file unlocker's initial option to kill that file's running processes, but file unlocker's built protection prompted me of the app/progs that this 'autorun.inf file was also running in, and it displayed why by what apps/progs were running w/'autorun.inf.

    So I used yet another of file unlocker options ('kill all running processes') and it was then that I saw the autorun.inf momentarily delete, replaced itself and both it's icon and name morphed into it's details (see below). Not sure, but I think it actually morphed again and back into the masked autorun.ink. Nevertheless, it was clear the file needed special handling.

    Wary that it's 227 MB's not only had a replicating script, it might well be capable of changing it's name and/or even it's location, so I left it alone and first disabled my system restore, then used ProcessExplorer to kill all running instances of bar311.exe and then found the 'autorun.inf' file was readily deleted from the pen drive.

    As SpyBot and my AV hadn't dealt with this bugger, moreover it had been running in both explorer and in my AV prog, that indicated it had slipped past their usual safeguards, so I chose to manually clean house rather than waiting for a week or more on others to post definitions update and a fix.

    Again w/system restore still off/disabled, simply deleted all temp files, Content IE, etc., etc., ran disk clean, then privacy mantra and simply re-booted. But still the folder options won’t stay as I set them.

    Note only thru a specific method of using 'file unlocker' was I made aware of the bugger. Accordingly, before even trying to delete the bugger, I then used ProcessExplorer to kill all four incidences of it's running.

    Note, not sure but apparently (at least on my machine) one of the effects of the virus is modifying the Windows's file properties window, as when viewing the file's properties, ref. window names "bar311.exe Properties", only one tab is displayed ("General") and it lists/listed a crudely fashioned icon, a 'typical' smiley (facing toward the viewer and shaded as if facing south at about 9AM).

    Detailed were; "Type of file: Application", "Location: Pcrtable Media Devices\Memory Stick (E", "Size: 221 KB 227,157 bytes)"* [note: my screenshot oddly captured that line's displayed text with only approx. 90% of the bottom-most detailed text, i.e.; the top '10%' of the entire text line was missing], "Files cannot be opened directly from this device. Please copy the file to a local folder and open copy.", an "OK" and a "Cancel" button.

    Note that before using ProcessExplorer's kill feature on all running instances of this bugger, ProcessExplorer's properties (for an instance of the running bugger was as follows:

    Path: C:\Windows\bar311.exe ("image probably packed")
    Command line: bar311.exe
    Directory: C:\Documents and Settings\My Name\
    Parent: winlogon.exe(648)
    User: My Machine's Name\My Name
    Started: 'current time and date'
    Comment: 'none'
    Data Execution Protection (DEP) Status: On

    Note, Windows Task Mgr's 'App's tab didn't list the bugger, but it's 'Processes' tab did list four extra processes running (I didn't note them before I used ProcessExplorer's kill feature on them).

    But before re-booting, sure glad I did, I Googled bar311.exe...

    http://hubpages.com/hub/winzip123 which has a pretty good looking post for fixing bar311.exe and/or winzip123

    ..that post, I followed and sure enough there were a couple of registry issues which I corrected and I also fashioned the post's 'bat' file and ran it, followed the re-boot prompt and on re-start, a check of the task mgr's listed processes, listed bat311.exe! Plus as expected, my folder options still wouldn't stay as I set them.

    Thinking maybe when I copied the script, that something might not have been posted/copied correctly (i.e.; some lines ended with an unused space, mid way thru the script, there was a double 'line break' and at the end of the script, there was another 'line break' along with an empty line, so I re-fashioned the scripted bat file (w/o the unused end of line spaces and less those two odd line breaks, and re-ran it.

    While a DOS window flashed once (as before), this time the restart computer prompt didn't appear, so I re-fashioned the bat file, this time exercising extreme caution in copying the script's text (my resulting pasted script didn't have the just the last line's 'line break'). Ran it and grrr, while the DOS window flashed, again no prompt to restart.

    So I went thru the posted article again, and once more I found several registry entries out of order, and once again I followed the recommended editing, but for one edit where it opted to either modify the key as mentioned or delete the autorun key entirely. I deleted it, re-booted and presto, all is back to normal (despite the snafu with my running the alternative bat files.

    What luck, seems the initial bat took and stuck, the others didn't do anything, and moreover what seemed to have done the trick was deleting the autorun key in my registry (the post's 'or delete autorun key', ref. as opposed to modifying it as was the other alternative I first tried).
    Last edited by urrguru; 2008-10-02 at 20:05. Reason: broke up last paragraph

  2. #2
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    urrguru:

    Quite frankly your post is too rambling to follow.

    re: The title of your post, "bar311.exe virus not detected". Firstly, Spybot is an anti-malware (anti-spyware product) and is not designed to detect viruses. If you feel that Spybot should have detected the "… bar311.exe virus …" then please post in the
    _____

    If you feel that you are infected with "bar311.exe virus…" and your anti-virus software (or Spybot) is not detecting/removing the problem, you can request assistance in the Malware Removal forum provided on this site and an experienced malware removal specialist will assist you.

    If you decide to have an experienced malware removal specialist assist you and decide to post in the Malware Removal forum, the instructions for posting in that forum are here:

    Those instructions require that you run several scans and then start your own thread in the Malware Removal forum, posting the HijackThis log from one of the required scans.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  3. #3
    Member
    Join Date
    Jan 2006
    Posts
    44

    Default Frankly

    Well since we're so critcial about other's, I just have to say that your opinion is your opinion and you're entitled to it, but I see the post, while lengthy, very well written, informative and contributing to the community.

    Point is, people come to a forum to constructively advise and share (that means having to read details rather than have to ask for them), not to be nit picked on by moderators or others who feel it necessary to comment on their view as to how well an post is written.

    Additionally, the virus is back and so far the only reply I got from my AV's feedback webmail was a form letter like response (ignoring the fact that I'd told them I'd deleted the file) advising me to zip the file, (I didn't have then), pword protect it and submit it, but failed to say how to do it, nor does the AV website or the software itself divulge how to do it.

    But thanks at least for replying w/the links.
    Last edited by urrguru; 2008-10-03 at 13:33.

  4. #4
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    urrguru:

    I'm sorry that you apparently took offence to my comment:

    Quote Originally Posted by md usa spybot fan View Post
    … Quite frankly your post is too rambling to follow. …
    I read your 1300 plus word post several times. Your post seemed to be well organized, broken into three (3) elements:
    • Symptoms
    • Discoveries (finding)
    • Resolution

    However, because of the title of the post "bar311.exe virus not detected" and that it seemed that you had resolved the problem on your own, I was confused by why your posted in the Spybot-S&D forum requesting support for the running Spybot as opposed to:

    Confused by the intent of your post in the Spybot-S&D forum, I may have written what seemed to you as an abrasive comment. However, my only intent was to provide the best advice I could and indicate that if you reposted in suggest forums, not to elongate your posts to distract from their indented purpose.

    _________

    It now seems that you may have not resolved the problems on your system:

    Quote Originally Posted by urrguru View Post
    … the virus is back and so far the only reply I got from my AV's feedback webmail was a form letter like response (ignoring the fact that I'd told them I'd deleted the file) …
    I will reiterate my suggestion:

    Quote Originally Posted by md usa spybot fan View Post
    … If you feel that you are infected with "bar311.exe virus…" and your anti-virus software (or Spybot) is not detecting/removing the problem, you can request assistance in the Malware Removal forum provided on this site and an experienced malware removal specialist will assist you.

    If you decide to have an experienced malware removal specialist assist you and decide to post in the Malware Removal forum, the instructions for posting in that forum are here:

    Those instructions require that you run several scans and then start your own thread in the Malware Removal forum, posting the HijackThis log from one of the required scans.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  5. #5
    Member
    Join Date
    Jan 2006
    Posts
    44

    Default I think I am so screwed.

    Appreciate reply and your explained intentions, but now after using TM's Housecall to clean house, the laptop starts to log onto Windows, then after I enter my password, says 'loading personal settings', then as soon as I hear the logon wav, another prompt appears and says 'logging off' and does so.

    Obliviously something's amuck w/registry and/or the virus is doing it's log off routine that's it's known for doing.

    Problem is I'm not real familiar with all the listed Windows modes of safe startups and none of them seem to be able to get me past the log on/log off routine.

    The one safe mode that actually tells me anything likely useful is when I use the 'directory Services restore - windows domain controllers only', it tells me that c&d drive check out, I get the resulting windows window titled 'booting in safe mode - directory services repair' which then it's pane fills in with text saying 'checking on file system D', and then says 'cannot determine file system of drive \??\volume {0n1b6f43fo-5a5b-11db-91e2-806d6172696f}.' and than says 'volume is clean.

    If that means anything which can be of help, great, but I'm just not experienced enough to know what to do w/that info.

    I'm missing something on anything for any of the other safe modes, I'd sure like to hear about it.

    I do have a set of recovery discs, but I believe they're only good for formatting and getting the system back up that way.

    Not sure if that will only affect programs, and doesn't affect document files, but I can't even say for sure I can get those discs to work as I had the laptop's optical drive removed and have been using an external one (so I'm uncertain if the BIOS will recognize that drive when I try using the discs).

    Running XPH/SP2 on a Sony VAIO.

    Needless to say, I last shutdown w/system restore disabled.

    Does anyone know for sure if I'm I screwed for sure?

  6. #6
    Member
    Join Date
    Jan 2006
    Posts
    44

    Default Not impressed with SBS&D or this forum

    Eventually w/o any help from anyone as all forums either bitched about mt posts or offered few to no answers I sought.

    My OS's BIOS (with it's onboard optical drive removed at time of infection) default detected my standalone optical drive and the recovery disks succeeded in formating the OS.

    Pretty simple and yet nowhere did I find such basic suggestion to resolve the issue.

    Trouble is too many people reply w/o answers and end up essentually 'burying' an otherwise useful means of resolving issues and sharing them.

  7. #7
    Senior Member Matt's Avatar
    Join Date
    Aug 2006
    Location
    Bavaria
    Posts
    1,169

    Default

    Hi urrguru,

    md usa spybot fan has already given you good suggestions a few month ago (for example: using help in the Malware Removal Forum), but it seems to me that you didn't follow his directions...

    Sometimes formatting is necessary, but it isn't always the easiest and best solution, if you have problems with Malware.

    Happy Safe Surfing for the future!
    Best regards - Beste Grüße,

    Matt

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •