Jump to content

CLB Driver Infection

Recommended Posts


I have attempted to follow directions to no avail. I am unable to identify any of the file types listed after running rootrepeal. The saved file follows:

ROOTREPEAL © AD, 2007-2009


Scan Start Time: 2010/11/19 16:49

Program Version: Version

Windows Version: Windows XP Media Center Edition SP3


Hidden/Locked Files


Path: C:\hiberfil.sys

Status: Locked to the Windows API!

Path: C:\Program Files\Yahoo! Games\Samantha Swift and the Golden Touch\Samantha Swift and the Golden Touch.exe:{CFEEF813-0A6E-7F2E-E2C1-655124DD9F75}

Status: Visible to the Windows API, but not on disk.


Hope you can give me some suggestions. This infection will not allow me to follow links or even open some websites or pages. Very frustrating. I have to copy all links in order to accomplish any web activity. Thanks!

Link to post
Share on other sites

Hello dixielee! Welcome to Malwarebytes' Anti-Malware Forums!

My name is Borislav and I will be glad to help you solve your problems with malware. Before we begin, please note the following:

  • The process of cleaning your system may take some time, so please be patient.
  • Follow my instructions step by step if there is a problem somewhere, stop and tell me.
  • Stay with the thread until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • If you don't know or can't understand something please ask.
  • Do not install or uninstall any software or hardware, while work on.
  • Keep me informed about any changes.

They are legitimate files, so this log can't help us.

Step 1

Download DDS and save it to your desktop from here or here or here.

Double click dds.scr to run the tool.

  • When done, DDS will open two (2) logs:
    1. DDS.txt
    2. Attach.txt

    [*]Save both reports to your desktop. Post them back to your topic.

Step 2

Please download Rootkit Unhooker and save it to your desktop.

  • Double-click RKUnhookerLE.exe to run it.
  • Click the Report tab, then click Scan
  • Check Drivers, Stealth Code, Files, and Code Hooks
  • Uncheck the rest, then click OK
  • When prompted to Select Disks for Scan, make sure C:\ is checked and click OK
  • Wait till the scanner has finished then go File > Save Report
  • Save the report somewhere you can find it, typically your desktop. Click Close
  • Copy the entire contents of the report and paste it in your next reply.

Note - You may get this warning it is ok, just ignore it."Rootkit Unhooker has detected a parasite inside itself!

It is recommended to remove parasite, okay?"

In your next reply, please include these log(s):

  1. DDS log with Attach.txt
  2. Rootkit Unhooker log

Link to post
Share on other sites

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.