Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected - Popups - rumenite, telopezo.dll, gowoyisa.dll, AntiVirus2009


  • This topic is locked This topic is locked
2 replies to this topic

#1 wolfpack65

wolfpack65

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:49 PM

Posted 01 January 2009 - 09:54 PM

Seem to have gotten some viruses or malware or something. Getting random full screen popups. Some look like AntiVirus 2009. Also noticed rumenite.dll, telopezo.dll, gowoyisa.dll files in the HiJackThis log. Tried checking them and 'fixing' them but they keep coming back. Any help would be appreciated.

DDS.txt log below


DDS (Version 1.1.0) - NTFSx86
Run by Paul D at 21:41:52.73 on Thu 01/01/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_07
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.511.191 [GMT -5:00]


============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\Program Files\Windows Defender\MsMpEng.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe -k imgsvc
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WLService.exe
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\WUSB54Gv2.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe
C:\Program Files\Linksys Wireless-G USB Wireless Network Monitor\InfoMyCa.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Paul D\My Documents\Downloads\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.yahoo.com/
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
BHO: {9674f465-b2c8-4463-92bd-1b8ed02275d9} - c:\windows\system32\rumenite.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
TB: {DB87BFA2-A2E3-451E-8E5A-C89982D87CBF} - No File
EB: {4528BBE0-4E08-11D5-AD55-00010333D0AD} - No File
EB: {32683183-48a0-441b-a342-7c2a440a9478} - No File
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [Windows Defender] "c:\program files\windows defender\MSASCui.exe" -hide
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [NvMediaCenter] RUNDLL32.EXE c:\windows\system32\NvMcTray.dll,NvTaskbarInit
mRun: [SunJavaUpdateSched] "c:\program files\java\jre1.6.0_07\bin\jusched.exe"
mRun: [WUSB54Gv2] c:\program files\linksys wireless-g usb wireless network monitor\InvokeSvc3.exe
mRun: [CPM73ae3178] Rundll32.exe "c:\windows\system32\telopezo.dll",a
mRun: [hizuguleve] Rundll32.exe "c:\windows\system32\gowoyisa.dll",s
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
Trusted Zone: yahoo.com
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
AppInit_DLLs: c:\windows\system32\dofozeha.dll c:\windows\system32\telopezo.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\telopezo.dll
STS: STS: {ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} - c:\windows\system32\telopezo.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\window~4\MpShHook.dll
SEH: CShellExecuteHookImpl Object: {57b86673-276a-48b2-bae7-c6dbb3020eb8} - c:\program files\grisoft\avg anti-spyware 7.5\shellexecutehook.dll
LSA: Notification Packages = scecli c:\windows\system32\dofozeha.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\pauld~1\applic~1\mozilla\firefox\profiles\gjnllgs8.default\
FF - prefs.js: browser.startup.homepage - yahoo.com
FF - component: c:\documents and settings\paul d\application data\mozilla\firefox\profiles\gjnllgs8.default\extensions\{dd43485f-44cc-4452-a6c6-69356a7e33da}\platform\winnt_x86-msvc\components\ahWinUtils_32.dll
FF - component: c:\program files\mozilla firefox\\components\jar50.dll
FF - component: c:\program files\mozilla firefox\\components\jsd3250.dll
FF - component: c:\program files\mozilla firefox\\components\myspell.dll
FF - component: c:\program files\mozilla firefox\\components\spellchk.dll
FF - component: c:\program files\mozilla firefox\\components\xpinstal.dll

============= SERVICES / DRIVERS ===============

R2 WinDefend;Windows Defender;"c:\program files\windows defender\MsMpEng.exe" [2006-11-3 13592]
S1 AVG Anti-Spyware Driver;AVG Anti-Spyware Driver;\??\c:\program files\grisoft\avg anti-spyware 7.5\guard.sys []
S1 AvgAsCln;AVG Anti-Spyware Clean Driver;c:\windows\system32\drivers\AvgAsCln.sys []
S2 ousbehci;OrangeWare USB Enhanced Host Controller Service;c:\windows\system32\drivers\ousbehci.sys [2005-1-20 42752]
S3 jgameenp;jgameenp;\??\c:\docume~1\pauld~1\locals~1\temp\jgameenp.sys []
S3 ousb2hub;OrangeWare USB 2.0 Root Hub Support;c:\windows\system32\drivers\ousb2hub.sys [2005-1-20 55552]
S4 AVG Anti-Spyware Guard;AVG Anti-Spyware Guard;c:\program files\grisoft\avg anti-spyware 7.5\guard.exe []

=============== Created Last 30 ================

2009-01-01 13:12 <DIR> --d----- c:\program files\AVG
2009-01-01 12:45 <DIR> --d----- c:\program files\Trend Micro
2009-01-01 10:26 1,262,084 ---sh--- c:\windows\system32\irijopiv.ini
2008-12-31 08:54 <DIR> --d----- c:\windows\system32\scripting
2008-12-31 08:54 <DIR> --d----- c:\windows\l2schemas
2008-12-31 08:54 <DIR> --d----- c:\windows\system32\en
2008-12-31 01:05 276,992 -------- c:\windows\system32\wmphoto.dll
2008-12-31 01:03 193,024 -------- c:\windows\system32\napmontr.dll
2008-12-31 01:02 7,168 -------- c:\windows\system32\bitsprx4.dll
2008-12-31 01:02 233,472 -------- c:\windows\system32\azroles.dll
2008-12-31 01:02 136,192 -------- c:\windows\system32\aaclient.dll
2008-12-31 00:52 138,496 -c------ c:\windows\system32\dllcache\afd.sys
2008-12-31 00:51 333,824 -c------ c:\windows\system32\dllcache\srv.sys
2008-12-31 00:49 1,846,400 -c------ c:\windows\system32\dllcache\win32k.sys
2008-12-31 00:49 2,145,280 -c------ c:\windows\system32\dllcache\ntkrnlmp.exe
2008-12-31 00:49 2,189,184 -c------ c:\windows\system32\dllcache\ntoskrnl.exe
2008-12-31 00:49 2,066,048 -c------ c:\windows\system32\dllcache\ntkrnlpa.exe
2008-12-31 00:49 2,023,936 -c------ c:\windows\system32\dllcache\ntkrpamp.exe
2008-12-31 00:49 455,296 -c------ c:\windows\system32\dllcache\mrxsmb.sys
2008-12-31 00:47 337,408 -c------ c:\windows\system32\dllcache\netapi32.dll
2008-12-31 00:15 691,712 -c------ c:\windows\system32\dllcache\inetcomm.dll
2008-12-31 00:13 272,128 -c------ c:\windows\system32\dllcache\bthport.sys
2008-12-31 00:09 203,136 -c------ c:\windows\system32\dllcache\rmcast.sys
2008-12-31 00:07 331,776 -c------ c:\windows\system32\dllcache\msadce.dll
2008-12-30 23:52 <DIR> --d----- c:\program files\Linksys Wireless-G USB Wireless Network Monitor

==================== Find3M ====================

2009-01-01 10:26 96,445 a--sh--- c:\windows\system32\telopezo.dll
2009-01-01 10:26 86,205 a--sh--- c:\windows\system32\vipojiri.dll
2008-12-30 23:52 15,781 a------- c:\windows\system32\drivers\mdc8021x.sys
2008-10-23 07:36 286,720 a------- c:\windows\system32\gdi32.dll
2008-10-16 15:38 826,368 a------- c:\windows\system32\wininet.dll
2007-12-03 20:10 64,024 a------- c:\docume~1\pauld~1\applic~1\GDIPFONTCACHEV1.DAT
0000-00-00 00:00 61,440 a--sh--- c:\windows\system32\gowoyisa.dll

============= FINISH: 21:42:55.73 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 fenzodahl512

fenzodahl512

  • Members
  • 6,738 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 05 January 2009 - 03:29 AM

Please download Malwarebytes' Anti-Malware from HERE or HERE

Note: If you already have Malwarebytes' Anti-Malware, just run and update it.. Then do a "Perform Full Scan"

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Full Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.




NEXT


Please download RSIT by random/random and save it to your Desktop.
  • Double click on RSIT.exe to run RSIT
  • Before you click "Continue", make sure you change the List files/folders created or modified in the last 3 months
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt and info.txt in your next reply.



NEXT


Please download GMER and unzip it to your Desktop.
  • Open the program and click on the Rootkit tab.
  • Make sure all the boxes on the right of the screen are checked, EXCEPT for ‘Show All’.
  • Click on Scan.
  • When the scan has run click Copy and paste the results into a Notepad >> save it and attach in this thread.


Post me these logs in your next reply.. Post each log in separate post..

1. Malwarebytes'
2. RSIT log.txt
3. RSIT info.txt
4. Attach GMER result..

Keep calm, make it simple, use your brain, don't freak out, and you'll be just fine..
Awesomeness: When I get sad, I stop being sad and be awesome instead.. True story - Barney Stinson
Posted Image Posted Image
Its gonna be legen.. wait for it.. dary! Cherish the pain, it means you're still alive


#3 fenzodahl512

fenzodahl512

  • Members
  • 6,738 posts
  • OFFLINE
  •  
  • Local time:10:49 AM

Posted 12 January 2009 - 03:00 AM

Due to the lack of feedback this Topic is closed.

If you need this topic reopened, please request this by sending the moderating team a PM with the address of the thread. This applies only to the original topic starter.

Everyone else please begin a New Topic

Keep calm, make it simple, use your brain, don't freak out, and you'll be just fine..
Awesomeness: When I get sad, I stop being sad and be awesome instead.. True story - Barney Stinson
Posted Image Posted Image
Its gonna be legen.. wait for it.. dary! Cherish the pain, it means you're still alive





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users