Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

c5.zedo browser popup problem


  • Please log in to reply
9 replies to this topic

#1 Gary W

Gary W

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 17 December 2008 - 01:10 AM

I've been battling the c5.zedo browser popup problem for 2 days now. Norton 360 and Spybot do not seem to have much effect on the problem. Today I followed the instructions on running ComboFix posted on bleepingcomputer.com and would like to have my ComboFx log examined. This seems to have fixed the problem but I would still like a professional opinion.

Thanks,

Gary W.

Edited by Orange Blossom, 17 December 2008 - 01:11 AM.
Move from HiJack This forum to Am I Infected as there are no logs. ~ OB


BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 17 December 2008 - 06:36 AM

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on Download_mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

#3 Gary W

Gary W
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  

Posted 19 December 2008 - 12:31 AM

Superbird,

Thanks for the advice, it appears to have done the trick. The third run using a full scan discovered multiple vundo.trojan files and wiped them out. I will probably be purchasing Malwarebytes in the near future. I also ran the Symantec vundo remover application and it found nothing remaining.

Thanks,

Gary W.

Malwarebytes Logs are as follows:

Malwarebytes' Anti-Malware 1.31
Database version: 1512
Windows 5.1.2600 Service Pack 3

12/17/2008 7:47:32 PM
mbam-log-2008-12-17 (19-47-32).txt

Scan type: Quick Scan
Objects scanned: 52178
Time elapsed: 4 minute(s), 8 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Program Files\Internet Explorer\Connection Wizard\libsvs.dll (Trojan.BHO) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{1cad29df-1d6d-41a2-8c55-eaa2c7edcdeb} (Trojan.BHO) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\libsvs (Trojan.BHO) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{1cad29df-1d6d-41a2-8c55-eaa2c7edcdeb} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1cad29df-1d6d-41a2-8c55-eaa2c7edcdeb} (Trojan.BHO) -> Delete on reboot.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\A360 (Rogue.A360Antivirus) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\Internet Explorer\Connection Wizard\libsvs.dll (Trojan.BHO) -> Delete on reboot.
C:\Documents and Settings\Gary\Application Data\Microsoft\Internet Explorer\Quick Launch\Antivirus 360.lnk (Rogue.A360Antivirus) -> Quarantined and deleted successfully.

Malwarebytes' Anti-Malware 1.31
Database version: 1512
Windows 5.1.2600 Service Pack 3

12/17/2008 7:55:17 PM
mbam-log-2008-12-17 (19-55-17).txt

Scan type: Quick Scan
Objects scanned: 51956
Time elapsed: 3 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1cad29df-1d6d-41a2-8c55-eaa2c7edcdeb} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Malwarebytes' Anti-Malware 1.31
Database version: 1512
Windows 5.1.2600 Service Pack 3

12/17/2008 8:57:36 PM
mbam-log-2008-12-17 (20-57-36).txt

Scan type: Full Scan (C:\|)
Objects scanned: 142371
Time elapsed: 57 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 20

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Qoobox\Quarantine\C\WINDOWS\system32\byXNdcyy.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\mxpepehq.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wpjjhwfn.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\wpv311229211116.cpx.vir (Adware.Agent) -> Quarantined and deleted successfully.
C:\Qoobox\Quarantine\C\WINDOWS\system32\yjgati.dll.vir (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP302\A0035208.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037019.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037020.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037021.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037022.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037023.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037026.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037027.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0036989.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP303\A0037717.dll (Adware.Shopper) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP305\A0037795.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP309\A0039176.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP309\A0039177.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP309\A0039178.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{3CEB65D7-D7F0-41B2-A741-ACA0C8770B47}\RP309\A0039179.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

Malwarebytes' Anti-Malware 1.31
Database version: 1512
Windows 5.1.2600 Service Pack 3

12/18/2008 8:20:58 PM
mbam-log-2008-12-18 (20-20-58).txt

Scan type: Full Scan (C:\|)
Objects scanned: 132957
Time elapsed: 50 minute(s), 34 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 19 December 2008 - 05:00 AM

Please use the Internet Explorer browser (or FireFox with IETab), and do an online scan with Kaspersky Online Scanner

Note: If you have used this particular scanner before, you MAY HAVE TO UNINSTALL the program through Add/Remove Programs before downloading the new ActiveX component

Click Yes, when prompted to install its ActiveX component.
(Note.. for Internet Explorer 7 users: If at any time you have trouble with the "Accept" button of the license, click on the "Zoom" tool located at the bottom right of the IE window and set the zoom to 75 %. Once the license has been accepted, reset to 100%.)
The program launches and downloads the latest definition files.
  • Once the files are downloaded click on Next
  • Click on Scan Settings and configure as follows:
    • Scan using the following Anti-Virus database:
      • Extended
    • Scan Options:Scan Archives
      Scan Mail Bases
  • Click OK and, under select a target to scan, select My Computer
When the scan is done, in the Scan is completed window (below), any infection is displayed.
There is no option to clean/disinfect, however, we need to analyze the information on the report.
Posted Image
Posted Image
To obtain the report:
Click on: Save Report As (above - red blinking arrow)
Next, in the Save as prompt, Save in area, select: Desktop
In the File name area, use KScan, or something similar
In Save as type, click the drop arrow and select: Text file [*.txt]
Then, click: Save
Please post the Kaspersky Online Scanner Report in your reply.

#5 Gary W

Gary W
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 20 December 2008 - 12:20 AM

Superbird,

I just ran Kaspersky which found several more infected files, as indicated in the scan report as follows:

Friday, December 19, 2008
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Friday, December 19, 2008 22:53:41
Records in database: 1489151
Scan settings
Scan using the following database extended
Scan archives yes
Scan mail databases yes
Scan area My Computer
A:\
C:\
D:\
Scan statistics
Files scanned 89582
Threat name 3
Infected objects 3
Suspicious objects 4
Duration of the scan 02:01:58

File name Threat name Threats count
C:\Archive\My Documents\DOWNLOAD\RealVNC\vnc-4_1_2-x86_win32_viewer.exe Infected: not-a-virus:RemoteAdmin.Win32.WinVNC.4 1
C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive.pst Suspicious: Trojan-Spy.HTML.Fraud.gen 3
C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive1.pst Infected: Trojan-Spy.HTML.Bankfraud.q 2
C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive1.pst Suspicious: Trojan-Spy.HTML.Fraud.gen 1


Thanks again for your time helping me.

Gary W.

#6 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 20 December 2008 - 06:13 AM

Open Notepad.
Copy this in the Notepad-file:

@ECHO OFF
IF EXIST log.txt DEL log.txt
ECHO Deleting files>>log.txt
FOR %%g in (
"C:\Archive\My Documents\DOWNLOAD\RealVNC\vnc-4_1_2-x86_win32_viewer.exe"
"C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive.pst"
"C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive1.pst") DO (
IF EXIST %%g (
ATTRIB -r -s -h %%g
DEL %%g
IF EXIST %%g (
ECHO %%g not deleted>>log.txt
) ELSE (
ECHO %%g deleted>>log.txt)
) ELSE (
ECHO %%g not found>>log.txt))
START NOTEPAD.EXE log.txt

Go to File - Save as...
Fill in the next values:
Location: Desktop
File name: del.bat
File type: All files (*.*).
Now, click Save.
Doubleclick del.bat.
Post the contents of the logfile that opens in your next reply.

#7 Gary W

Gary W
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  

Posted 20 December 2008 - 06:27 PM

Roger that. Log file copied as follows:

Deleting files
"C:\Archive\My Documents\DOWNLOAD\RealVNC\vnc-4_1_2-x86_win32_viewer.exe" deleted
"C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive.pst" deleted
"C:\Documents and Settings\Gary\Local Settings\Application Data\Microsoft\Outlook\archive1.pst" deleted

Gary

#8 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 21 December 2008 - 06:06 AM

Hi,

You can delete del.bat.
Do you still have problems? :thumbsup:

Edited by superbird, 21 December 2008 - 06:07 AM.


#9 Gary W

Gary W
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:09:29 PM

Posted 23 December 2008 - 10:54 AM

Superbird,

Thanks for you expert assistance. I think my machine is now clean.

Regards,

Gary W.

#10 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 23 December 2008 - 11:27 AM

Hi,

You're most welcome. :thumbsup:
Do this:

1. Now you should Set a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which sometimes can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Then go to Start > Run and type: Cleanmgr
  • Click "OK".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
2. Go to the Windows update site and download and install all available updates, so your computer is prtected against malware.

3. Read this page To prevent yourself against re-infection.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users