Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infection with malware posing as iexplore.exe


  • This topic is locked This topic is locked
13 replies to this topic

#1 bonzilla

bonzilla

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 07 February 2009 - 12:30 PM

Hi,

My pc is currently infected with some sort of malware posing as iexplore.exe as an randomly activating process in the Task Manager window. When iexplore.exe starts , it manifests itself in two basic ways:

1. False Adware ads poping up every 3-4 minuets. Mostly for anti virus fixers, but also a litany of b grade product ads.

2.Starts a false explorer window (even though I'm running Firefox), and continues to rapidly open multiple explorer windows until the browser is locked and the memory is exhausted.

My scan is attatched. I have also downloaded "Hijack This" if you want me to run that as well.

Thanks in advance! Look forward to your email.

bonzilla




DDS (Ver_09-02-01.01) - NTFSx86
Run by Owner at 11:35:44.73 on Sat 02/07/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.511.170 [GMT -5:00]

AV: Norton Internet Security *On-access scanning enabled* (Updated)
FW: Norton Internet Security *enabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Ontrack\Internet Cleanup\icserv.exe
C:\Program Files\Norton Internet Security\Engine\16.2.0.7\ccSvcHst.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\Program Files\Norton Internet Security\Engine\16.2.0.7\ccSvcHst.exe
C:\WINDOWS\Explorer.EXE
C:\windows\system\hpsysdrv.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Samsung\Samsung Media Studio 5\SMSTray.exe
C:\Program Files\MarkAny\ContentSafer\MAAgent.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\System32\svchost.exe -k HTTPFilter
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Owner\My Documents\HTML\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = hxxp://us8.hpwis.com/
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: {6196eae9-47e9-31ba-6b94-966adc7e7da5}: {5ad7e7cd-a669-49b6-ab13-9e749eae6916} - c:\windows\system32\fgfvrn.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton internet security\engine\16.2.0.7\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton internet security\engine\16.2.0.7\IPSBHO.DLL
BHO: {71770780-e60c-4c29-99a9-559fe6eaddaf} - c:\windows\system32\zasukaje.dll
TB: hp toolkit: {b2847e28-5d7d-4deb-8b67-05d28bcf79f5} - c:\hp\explorebar\HPTOOLKT.DLL
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton internet security\engine\16.2.0.7\coIEPlg.dll
TB: {55301211-8C9B-4981-ACED-7DCA7A81CD2A} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
uRun: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
uRun: [foxFRkJtS] mciad1.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [hpsysdrv] c:\windows\system\hpsysdrv.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
mRun: [uFEP3ql] dfsdmgr.exe
mRun: [AlcxMonitor] ALCXMNTR.EXE
mRun: [TkBellExe] "realsched.exe" -osboot
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [SMSTray] c:\program files\samsung\samsung media studio 5\SMSTray.exe
mRun: [MAAgent] c:\program files\markany\contentsafer\MAAgent.exe
mRun: [siteyewama] Rundll32.exe "c:\windows\system32\yuvewole.dll",s
mRun: [CPM7bbb9987] Rundll32.exe "c:\windows\system32\puzihajo.dll",a
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
IE: {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - res://c:\program files\iespell\iespell.dll/SPELLCHECK.HTM
IE: {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - res://c:\program files\iespell\iespell.dll/SPELLOPTION.HTM
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: c:\windows\system32\betsp.dll
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {00000EF1-0786-4633-87C6-1AA7A44296DA} - hxxp://www.addictivetechnologies.net/DM0/cab/WreckIt.cab
DPF: {018B7EC3-EECA-11D3-8E71-0000E82C6C0D} - hxxp://www.negativebeats.com/mp3.plugin.exe
DPF: {0335A685-ED24-4F7B-A08E-3BD15D84E668} - hxxp://dl.filekicker.com/send/file/128985-NZIL/PhPSetup.cab
DPF: {10000273-8230-4DD4-BE4F-6889D1E74167} - hxxp://download.abetterinternet.com/download/cabs/TURB8105/turbo.cab
DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - hxxp://www.2nd-thought.com/files/install032.exe
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {26E8361F-BCE7-4F75-A347-98C88B418322} - hxxp://dst.trafficsyndicate.com/Dnl/T_50023/QDow.cab
DPF: {44990301-3C9D-426D-81DF-AAB636FA4345} - hxxps://www-secure.symantec.com/techsupp/asa/ss/sa/sa_cabs/tgctlsr.cab
DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} - hxxp://tools.ebayimg.com/eps/wl/activex/eBay_Enhanced_Picture_Control_v1-0-3-36.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://by101fd.bay101.hotmail.msn.com/resources/MsnPUpld.cab
DPF: {5EDB10D9-7E95-4833-A218-62F375DAFCF1} - hxxps://ohclewras01.nationalcity.com/postauthI/epi.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1188303337343
DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} - hxxps://webdl.symantec.com/activex/symdlmgr.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1188303304718
DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - hxxp://www.nick.com/common/groove/gx/GrooveAX28.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/1.4/jinstall-14_02-windows-i586.cab
DPF: {8FCDF9D9-A28B-480F-8C3D-581F119A8AB8} - hxxp://static.zangocash.com/cab/Seekmo/ie/bridge-c567.cab
DPF: {C7B05B62-C8D7-438C-840B-4994DAAA8EEE} - hxxp://webpdp.gator.com/v3/download/pdpplugin5094_hd3ptdmgainads.cab
DPF: {CAFEEFAC-0014-0001-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/1.4/jinstall-14_02-windows-i586.cab
DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} - hxxp://www.live365.com/players/play365.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {D9EC0A76-03BF-11D4-A509-0090270F86E3} - hxxp://download.spywarelabs.com/install/1203030306/VBouncerOuter1203.EXE
DPF: {DECEAAA2-370A-49BB-9362-68C3A58DDC62} - hxxp://static.zangocash.com/cab/Seekmo/ie/bridge-c18.cab?21595a55bcee9e87edbc49d34614c0b550c9fbe341f06435b5679f367af25f7d532a4ca9c2ed59d9dc488aec24dcc5a5ba1e1fb10f8e34f82eba6f77b8d60c7f73d695c54c:584e34bcf0567f47bece5b5b666353a7
Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton internet security\engine\16.2.0.7\CoIEPlg.dll
Notify: igfxcui - igfxsrvc.dll
AppInit_DLLs: c:\windows\system32\mekijoru.dll c:\windows\system32\feyajute.dll c:\windows\system32\piyejiko.dll c:\windows\system32\fufupage.dll oagzvr.dll c:\windows\system32\falanasi.dll fgfvrn.dll c:\windows\system32\puzihajo.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SSODL: SSODL - {EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4} - c:\windows\system32\puzihajo.dll
STS: STS: {ec43e3fd-5c60-46a6-97d7-e0b85dbdd6c4} - c:\windows\system32\puzihajo.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, digeste.dll
LSA: Notification Packages = scecli c:\windows\system32\falanasi.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\owner\applic~1\mozilla\firefox\profiles\yy117dkm.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - component: c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\coffplgn\components\coFFPlgn.dll
FF - component: c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\ipsffplgn\components\IPSFFPl.dll
FF - plugin: c:\documents and settings\owner\application data\mozilla\firefox\profiles\yy117dkm.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp07076007.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava11.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava12.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava13.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava32.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJPI141_02.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPOJI610.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - plugin: c:\program files\opera 10 preview\program\plugins\npdsplay.dll
FF - plugin: c:\program files\opera 10 preview\program\plugins\npwmsdrm.dll

============= SERVICES / DRIVERS ===============

R0 SymEFA;Symantec Extended File Attributes;\SystemRoot\\SystemRoot\System32\Drivers\NIS\1002000.007\SYMEFA.SYS --> \SystemRoot\\SystemRoot\System32\Drivers\NIS\1002000.007\SYMEFA.SYS [?]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\nis\1002000.007\BHDrvx86.sys [2008-12-28 255536]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nis\1002000.007\cchpx86.sys [2008-12-28 362544]
R1 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20090129.005\IDSxpx86.sys [2009-1-29 276344]
R2 icservice;icservice;c:\program files\ontrack\internet cleanup\icserv.exe [2001-5-17 77824]
R2 Norton Internet Security;Norton Internet Security;c:\program files\norton internet security\engine\16.2.0.7\ccSvcHst.exe [2008-12-28 115560]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-1-11 24652]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-1-21 99376]
R3 NAVENG;NAVENG;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20090206.057\NAVENG.SYS [2009-2-7 89104]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20090206.057\NAVEX15.SYS [2009-2-7 876112]
S2 mrtRate;mrtRate; [x]
S2 ptssvc;ptssvc;c:\program files\kodak\kodak picture transfer software\ptssvc.exe --> c:\program files\kodak\kodak picture transfer software\PTSsvc.exe [?]
S3 cmo_bus;Data Modem @ CDMA Composite Device driver (WDM);c:\windows\system32\drivers\cmo_bus.sys [2007-10-4 58352]
S3 cmo_mdfl;Data Modem @ CDMA Filter;c:\windows\system32\drivers\cmo_mdfl.sys [2007-10-4 8304]
S3 cmo_mdm;Data Modem @ CDMA Drivers;c:\windows\system32\drivers\cmo_mdm.sys [2007-10-4 93904]
S3 cmo_serd;Data Modem @ CDMA Diagnostic Serial Port (WDM);c:\windows\system32\drivers\cmo_serd.sys [2007-10-4 73696]
S3 DPCNET5U;Satellite USB Driver;c:\windows\system32\drivers\dpcnet5u.sys --> c:\windows\system32\drivers\dpcnet5u.sys [?]
S3 oUltraf;oUltraf;\??\c:\docume~1\owner\locals~1\temp\oultraf.sys --> c:\docume~1\owner\locals~1\temp\oUltraf.sys [?]

=============== Created Last 30 ================

2009-02-07 09:23 1,625,547 ---sh--- c:\windows\system32\etivaven.ini
2009-02-07 09:21 140,384 a--sh--- c:\windows\system32\fgfvrn.dll
2009-02-06 21:21 1,635,633 ---sh--- c:\windows\system32\imapowol.ini
2009-02-06 21:20 140,423 a--sh--- c:\windows\system32\hzhgms.dll
2009-02-05 21:26 142,617 a------- c:\windows\system32\ieiyiv.dll
2009-02-05 21:20 1,640,369 ---sh--- c:\windows\system32\ujogodid.ini
2009-02-05 09:20 2,713 ---sh--- c:\windows\system32\kidohili.dll
2009-02-05 09:20 1,624,720 ---sh--- c:\windows\system32\emurolov.ini
2009-02-04 21:21 2,713 ---sh--- c:\windows\system32\dasoyuwa.dll
2009-02-04 21:20 1,602,957 ---sh--- c:\windows\system32\evefuyet.ini
2009-02-04 21:19 142,600 a--sh--- c:\windows\system32\mvdvgn.dll
2009-02-04 09:20 1,592,538 ---sh--- c:\windows\system32\udurihen.ini
2009-02-03 15:08 0 a------- C:\LOG20.tmp
2009-02-03 07:19 1,588,364 ---sh--- c:\windows\system32\etugofew.ini
2009-01-30 12:15 1,463,187 ---sh--- c:\windows\system32\emozevaj.ini
2009-01-30 00:14 1,463,190 ---sh--- c:\windows\system32\oduzovud.ini
2009-01-29 12:14 1,463,190 ---sh--- c:\windows\system32\alusuzar.ini
2009-01-29 00:13 1,463,190 ---sh--- c:\windows\system32\arafifez.ini
2009-01-28 23:32 <DIR> --d----- c:\program files\Trend Micro
2009-01-28 12:58 1,464,346 ---sh--- c:\windows\system32\igafujin.ini
2009-01-28 00:13 1,464,346 ---sh--- c:\windows\system32\anekoyan.ini
2009-01-27 12:13 2,713 ---sh--- c:\windows\system32\nifodiyu.dll
2009-01-27 12:13 1,463,449 ---sh--- c:\windows\system32\apataruw.ini
2009-01-27 00:30 1,462,525 ---sh--- c:\windows\system32\elojanom.ini
2009-01-27 00:12 2,713 ---sh--- c:\windows\system32\garetuso.dll
2009-01-26 12:13 2,713 ---sh--- c:\windows\system32\tezejito.dll
2009-01-26 12:13 1,462,525 ---sh--- c:\windows\system32\ukilumam.ini
2009-01-25 14:28 <DIR> --d----- c:\program files\Defraggler
2009-01-25 13:12 <DIR> --d----- c:\program files\CCleaner
2009-01-24 17:05 1,384,694 a--sh--- c:\windows\system32\iyozoriy.ini
2009-01-24 10:44 1,384,694 ---sh--- c:\windows\system32\iyozoriy.ini2
2009-01-24 10:44 1,384,676 ---sh--- c:\windows\system32\iyozoriy.tmp
2009-01-24 10:11 9,755 a--sh--- c:\windows\system32\mejiyuwo.dll
2009-01-22 19:48 1,384,649 ---sh--- c:\windows\system32\ahemegus.ini
2009-01-21 23:25 <DIR> --d----- c:\program files\Opera 10 Preview
2009-01-21 15:49 1,385,531 ---sh--- c:\windows\system32\otoliyef.ini
2009-01-20 07:44 1,385,522 ---sh--- c:\windows\system32\ewumadog.ini
2009-01-19 21:59 0 a------- C:\LOGE03.tmp
2009-01-19 17:41 1,358,191 ---sh--- c:\windows\system32\ezihebak.ini
2009-01-19 16:35 1,358,191 ---sh--- c:\windows\system32\egohobeb.ini
2009-01-19 08:54 <DIR> --d----- c:\program files\Norton Support
2009-01-19 02:35 1,354,509 ---sh--- c:\windows\system32\ukuzigeh.ini
2009-01-18 17:09 1,354,509 ---sh--- c:\windows\system32\ezukarib.ini
2009-01-17 14:33 1,354,508 ---sh--- c:\windows\system32\ufuzezus.ini
2009-01-17 02:45 1,354,487 ---sh--- c:\windows\system32\elukiyal.ini
2009-01-16 14:39 1,354,487 ---sh--- c:\windows\system32\ujobevel.ini
2009-01-16 02:38 1,327,740 ---sh--- c:\windows\system32\egayifed.ini
2009-01-15 14:37 1,327,740 ---sh--- c:\windows\system32\etadopun.tmp
2009-01-15 13:32 1,327,740 ---sh--- c:\windows\system32\ovokulaf.ini
2009-01-15 08:38 120 ---sh--- c:\windows\system32\ujeyewiv.ini
2009-01-14 13:38 0 a------- C:\LOGE.tmp
2009-01-13 17:07 0 a------- C:\LOGC.tmp
2009-01-13 12:03 1,302,218 ---sh--- c:\windows\system32\ukujabay.ini
2009-01-13 00:06 1,225,140 ---sh--- c:\windows\system32\arazuzed.ini
2009-01-12 23:01 1,225,140 ---sh--- c:\windows\system32\uhiyozey.ini
2009-01-11 16:14 1,212,876 ---sh--- c:\windows\system32\ovezopaw.ini
2009-01-11 15:38 0 a------- C:\LOG9.tmp
2009-01-11 15:26 0 a------- C:\LOG257.tmp
2009-01-10 10:13 1,212,876 ---sh--- c:\windows\system32\ozomorar.ini

==================== Find3M ====================

2009-02-07 09:21 140,384 a--sh--- c:\windows\system32\renenafo.dll
2009-02-07 09:21 108,321 a--sh--- c:\windows\system32\puzihajo.dll
2009-02-07 09:20 103,111 a--sh--- c:\windows\system32\nevavite.dll
2009-02-06 21:20 140,423 a--sh--- c:\windows\system32\hopuvujo.dll
2009-02-06 21:20 107,832 a--sh--- c:\windows\system32\lafitihi.dll
2009-02-06 21:20 103,116 -------- c:\windows\system32\lowopami.dll
2009-02-06 09:20 109,258 a--sh--- c:\windows\system32\viruyuno.dll
2009-02-05 21:26 142,617 a------- c:\windows\system32\lenipuna.dll
2009-02-05 09:19 107,740 a--sh--- c:\windows\system32\gunowini.dll
2009-02-04 21:19 142,600 a--sh--- c:\windows\system32\wozupeva.dll
2009-02-04 21:19 107,848 a--sh--- c:\windows\system32\vativise.dll
2009-02-04 09:19 109,145 a--sh--- c:\windows\system32\saduyome.dll
2009-02-03 21:19 99,948 a--sh--- c:\windows\system32\jifetahi.dll
2009-02-02 18:17 64,124 a--sh--- c:\windows\system32\yolevebi.dll
2009-02-01 00:16 100,528 a--sh--- c:\windows\system32\rakupijo.dll
2009-01-31 12:15 100,565 a--sh--- c:\windows\system32\yolufeta.dll
2009-01-28 00:13 64,777 a--sh--- c:\windows\system32\fetutupi.dll
2009-01-25 11:12 63,768 a--sh--- c:\windows\system32\dorizala.dll
2009-01-06 09:49 4,205 a--sh--- c:\windows\system32\sezerabo.dll
2009-01-02 09:42 98,090 a--sh--- c:\windows\system32\lekunide.dll
2009-01-01 21:42 97,908 a--sh--- c:\windows\system32\sinodisi.dll
2008-12-30 13:04 59,478 a--sh--- c:\windows\system32\gafuyowo.dll
2008-12-28 17:12 124,464 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2008-12-28 17:12 60,808 a------- c:\windows\system32\S32EVNT1.DLL
2008-12-28 17:12 10,635 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2008-12-28 17:12 806 a------- c:\windows\system32\drivers\SYMEVENT.INF
2008-12-25 09:08 2,713 a--sh--- c:\windows\system32\likegene.exe
2008-12-11 22:28 36,272 a----r-- c:\windows\system32\drivers\SymIM.sys
2008-07-23 18:42 1,600 a------- c:\program files\ALLTEL Internet Accelerator Client setup.log
2006-09-19 08:26 6,596 a------- c:\program files\install.log
2006-09-19 07:37 2,983 a------- c:\program files\install_wizard.log
2006-09-19 07:37 1,406 a------- c:\program files\install_status.log
2004-06-05 10:59 168,725 a------- c:\docume~1\owner\applic~1\tvmknwrd.dll
2003-07-08 23:23 770,048 a------- c:\program files\winmx331.exe
2003-06-30 13:40 3,120,872 a------- c:\program files\Install_AIM.exe
2007-12-15 23:09 445,881 a--sh--- c:\windows\system32\accdd.ini2
0000-00-00 00:00 64,124 a--sh--- c:\windows\system32\falanasi.dll
2007-12-14 09:37 18,935 a--sh--- c:\windows\system32\ggjlm.ini2
2008-09-30 12:05 64,512 a--sh--- c:\windows\system32\hesudobu.dll
0000-00-00 00:00 71,597 a--sh--- c:\windows\system32\joliyusi.dll
0000-00-00 00:00 64,512 a--sh--- c:\windows\system32\kilatape.dll
0000-00-00 00:00 77,824 a--sh--- c:\windows\system32\kisijegu.dll
0000-00-00 00:00 33,792 a--sh--- c:\windows\system32\lisepeyo.dll
2008-01-10 20:45 440,055 a--sh--- c:\windows\system32\onnmp.ini2
0000-00-00 00:00 70,656 a--sh--- c:\windows\system32\remebeyi.dll
0000-00-00 00:00 46,080 a--sh--- c:\windows\system32\ruyebana.dll
2008-09-30 12:05 64,512 a--sh--- c:\windows\system32\sawupima.dll
0000-00-00 00:00 64,124 a--sh--- c:\windows\system32\yuvewole.dll
0000-00-00 00:00 64,124 a--sh--- c:\windows\system32\zasukaje.dll

============= FINISH: 11:37:56.78 ===============

Attached Files


Edited by bonzilla, 07 February 2009 - 12:37 PM.


BC AdBot (Login to Remove)

 


#2 KoanYorel

KoanYorel

    Bleepin' Conundrum


  • Members
  • 19,461 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:65 miles due East of the &quot;Logic Free Zone&quot;, in Md, USA
  • Local time:09:26 PM

Posted 19 February 2009 - 11:49 AM

Hello and welcome to Bleeping Computer

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine. If you have not done so, include a description of your problem, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

R,
K
The only easy day was yesterday.

...some do, some don't; some will, some won't (WR)

#3 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 20 February 2009 - 04:47 AM

No problem waiting! Thanks for your assistance. here are the DDS notepad files:

DDS (Ver_09-02-01.01) - NTFSx86
Run by Owner at 4:33:21.20 on Fri 02/20/2009
Internet Explorer: 7.0.5730.11
Microsoft Windows XP Home Edition 5.1.2600.3.1252.1.1033.18.511.99 [GMT -5:00]

AV: Norton Internet Security *On-access scanning enabled* (Updated)
FW: Norton Internet Security *enabled*

============== Running Processes ===============

C:\WINDOWS\system32\svchost -k DcomLaunch
svchost.exe
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
svchost.exe
svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Ontrack\Internet Cleanup\icserv.exe
C:\Program Files\Norton Internet Security\Engine\16.2.0.7\ccSvcHst.exe
C:\Program Files\Viewpoint\Common\ViewpointService.exe
C:\windows\system\hpsysdrv.exe
C:\WINDOWS\ALCXMNTR.EXE
C:\WINDOWS\System32\DLA\DLACTRLW.EXE
C:\Program Files\Samsung\Samsung Media Studio 5\SMSTray.exe
C:\Program Files\MarkAny\ContentSafer\MAAgent.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\Norton Internet Security\Engine\16.2.0.7\ccSvcHst.exe
C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Owner\My Documents\HTML\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://google.com/
uInternet Connection Wizard,ShellNext = hxxp://us8.hpwis.com/
uInternet Settings,ProxyOverride = *.local
BHO: Adobe PDF Reader Link Helper: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: DriveLetterAccess: {5ca3d70e-1895-11cf-8e15-001234567890} - c:\windows\system32\dla\DLASHX_W.DLL
BHO: Symantec NCO BHO: {602adb0e-4aff-4217-8aa1-95dac4dfa408} - c:\program files\norton internet security\engine\16.2.0.7\coIEPlg.dll
BHO: Symantec Intrusion Prevention: {6d53ec84-6aae-4787-aeee-f4628f01010c} - c:\program files\norton internet security\engine\16.2.0.7\IPSBHO.DLL
BHO: {71770780-e60c-4c29-99a9-559fe6eaddaf} - c:\windows\system32\lutazipu.dll
TB: hp toolkit: {b2847e28-5d7d-4deb-8b67-05d28bcf79f5} - c:\hp\explorebar\HPTOOLKT.DLL
TB: Norton Toolbar: {7febefe3-6b19-4349-98d2-ffb09d4b49ca} - c:\program files\norton internet security\engine\16.2.0.7\coIEPlg.dll
TB: {55301211-8C9B-4981-ACED-7DCA7A81CD2A} - No File
TB: {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - No File
uRun: [NVIEW] rundll32.exe nview.dll,nViewLoadHook
uRun: [foxFRkJtS] mciad1.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [hpsysdrv] c:\windows\system\hpsysdrv.exe
mRun: [NvCplDaemon] RUNDLL32.EXE c:\windows\system32\NvCpl.dll,NvStartup
mRun: [nwiz] nwiz.exe /install
mRun: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
mRun: [uFEP3ql] dfsdmgr.exe
mRun: [AlcxMonitor] ALCXMNTR.EXE
mRun: [TkBellExe] "realsched.exe" -osboot
mRun: [DLA] c:\windows\system32\dla\DLACTRLW.EXE
mRun: [SMSTray] c:\program files\samsung\samsung media studio 5\SMSTray.exe
mRun: [MAAgent] c:\program files\markany\contentsafer\MAAgent.exe
mRun: [siteyewama] Rundll32.exe "c:\windows\system32\razifazi.dll",s
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\adober~1.lnk - c:\program files\adobe\acrobat 7.0\reader\reader_sl.exe
StartupFolder: c:\docume~1\alluse~1\startm~1\programs\startup\micros~1.lnk - c:\program files\microsoft office\office\OSA9.EXE
IE: {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - res://c:\program files\iespell\iespell.dll/SPELLCHECK.HTM
IE: {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - res://c:\program files\iespell\iespell.dll/SPELLOPTION.HTM
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: c:\windows\system32\betsp.dll
DPF: DirectAnimation Java Classes - file://c:\windows\java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {00000EF1-0786-4633-87C6-1AA7A44296DA} - hxxp://www.addictivetechnologies.net/DM0/cab/WreckIt.cab
DPF: {018B7EC3-EECA-11D3-8E71-0000E82C6C0D} - hxxp://www.negativebeats.com/mp3.plugin.exe
DPF: {0335A685-ED24-4F7B-A08E-3BD15D84E668} - hxxp://dl.filekicker.com/send/file/128985-NZIL/PhPSetup.cab
DPF: {10000273-8230-4DD4-BE4F-6889D1E74167} - hxxp://download.abetterinternet.com/download/cabs/TURB8105/turbo.cab
DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - hxxp://www.2nd-thought.com/files/install032.exe
DPF: {166B1BCA-3F9C-11CF-8075-444553540000} - hxxp://fpdownload.macromedia.com/pub/shockwave/cabs/director/sw.cab
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://go.microsoft.com/fwlink/?linkid=39204
DPF: {26E8361F-BCE7-4F75-A347-98C88B418322} - hxxp://dst.trafficsyndicate.com/Dnl/T_50023/QDow.cab
DPF: {44990301-3C9D-426D-81DF-AAB636FA4345} - hxxps://www-secure.symantec.com/techsupp/asa/ss/sa/sa_cabs/tgctlsr.cab
DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} - hxxp://tools.ebayimg.com/eps/wl/activex/eBay_Enhanced_Picture_Control_v1-0-3-36.cab
DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} - hxxp://by101fd.bay101.hotmail.msn.com/resources/MsnPUpld.cab
DPF: {5EDB10D9-7E95-4833-A218-62F375DAFCF1} - hxxps://ohclewras01.nationalcity.com/postauthI/epi.cab
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1188303337343
DPF: {6A344D34-5231-452A-8A57-D064AC9B7862} - hxxps://webdl.symantec.com/activex/symdlmgr.cab
DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} - hxxp://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1188303304718
DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - hxxp://www.nick.com/common/groove/gx/GrooveAX28.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/products/plugin/1.4/jinstall-14_02-windows-i586.cab
DPF: {8FCDF9D9-A28B-480F-8C3D-581F119A8AB8} - hxxp://static.zangocash.com/cab/Seekmo/ie/bridge-c567.cab
DPF: {C7B05B62-C8D7-438C-840B-4994DAAA8EEE} - hxxp://webpdp.gator.com/v3/download/pdpplugin5094_hd3ptdmgainads.cab
DPF: {CAFEEFAC-0014-0001-0002-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/1.4/jinstall-14_02-windows-i586.cab
DPF: {CC05BC12-2AA2-4AC7-AC81-0E40F83B1ADF} - hxxp://www.live365.com/players/play365.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/flashplayer/current/swflash.cab
DPF: {D9EC0A76-03BF-11D4-A509-0090270F86E3} - hxxp://download.spywarelabs.com/install/1203030306/VBouncerOuter1203.EXE
DPF: {DECEAAA2-370A-49BB-9362-68C3A58DDC62} - hxxp://static.zangocash.com/cab/Seekmo/ie/bridge-c18.cab?21595a55bcee9e87edbc49d34614c0b550c9fbe341f06435b5679f367af25f7d532a4ca9c2ed59d9dc488aec24dcc5a5ba1e1fb10f8e34f82eba6f77b8d60c7f73d695c54c:584e34bcf0567f47bece5b5b666353a7
Handler: symres - {AA1061FE-6C41-421f-9344-69640C9732AB} - c:\program files\norton internet security\engine\16.2.0.7\CoIEPlg.dll
Notify: igfxcui - igfxsrvc.dll
AppInit_DLLs: c:\windows\system32\mekijoru.dll c:\windows\system32\feyajute.dll c:\windows\system32\piyejiko.dll c:\windows\system32\fufupage.dll oagzvr.dll c:\windows\system32\fidezeta.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, digeste.dll
LSA: Notification Packages = scecli c:\windows\system32\fidezeta.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\owner\applic~1\mozilla\firefox\profiles\yy117dkm.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - component: c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\coffplgn\components\coFFPlgn.dll
FF - component: c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\ipsffplgn\components\IPSFFPl.dll
FF - plugin: c:\documents and settings\owner\application data\mozilla\firefox\profiles\yy117dkm.default\extensions\moveplayer@movenetworks.com\platform\winnt_x86-msvc\plugins\npmnqmp07076007.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava11.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava12.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava13.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJava32.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPJPI141_02.dll
FF - plugin: c:\program files\java\j2re1.4.1_02\bin\NPOJI610.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npmozax.dll
FF - plugin: c:\program files\opera 10 preview\program\plugins\npdsplay.dll
FF - plugin: c:\program files\opera 10 preview\program\plugins\npwmsdrm.dll

============= SERVICES / DRIVERS ===============

R0 SymEFA;Symantec Extended File Attributes;\SystemRoot\\SystemRoot\System32\Drivers\NIS\1002000.007\SYMEFA.SYS --> \SystemRoot\\SystemRoot\System32\Drivers\NIS\1002000.007\SYMEFA.SYS [?]
R1 BHDrvx86;Symantec Heuristics Driver;c:\windows\system32\drivers\nis\1002000.007\BHDrvx86.sys [2008-12-28 255536]
R1 ccHP;Symantec Hash Provider;c:\windows\system32\drivers\nis\1002000.007\cchpx86.sys [2008-12-28 362544]
R1 IDSxpx86;IDSxpx86;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\ipsdefs\20090217.002\IDSxpx86.sys [2009-2-20 276344]
R2 icservice;icservice;c:\program files\ontrack\internet cleanup\icserv.exe [2001-5-17 77824]
R2 Norton Internet Security;Norton Internet Security;c:\program files\norton internet security\engine\16.2.0.7\ccSvcHst.exe [2008-12-28 115560]
R2 Viewpoint Manager Service;Viewpoint Manager Service;c:\program files\viewpoint\common\ViewpointService.exe [2007-1-11 24652]
R3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\common files\symantec shared\eengine\EraserUtilRebootDrv.sys [2009-1-21 99376]
R3 NAVENG;NAVENG;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20090219.048\NAVENG.SYS [2009-2-20 89104]
R3 NAVEX15;NAVEX15;c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\norton\definitions\virusdefs\20090219.048\NAVEX15.SYS [2009-2-20 876144]
S2 mrtRate;mrtRate; [x]
S2 ptssvc;ptssvc;c:\program files\kodak\kodak picture transfer software\ptssvc.exe --> c:\program files\kodak\kodak picture transfer software\PTSsvc.exe [?]
S3 cmo_bus;Data Modem @ CDMA Composite Device driver (WDM);c:\windows\system32\drivers\cmo_bus.sys [2007-10-4 58352]
S3 cmo_mdfl;Data Modem @ CDMA Filter;c:\windows\system32\drivers\cmo_mdfl.sys [2007-10-4 8304]
S3 cmo_mdm;Data Modem @ CDMA Drivers;c:\windows\system32\drivers\cmo_mdm.sys [2007-10-4 93904]
S3 cmo_serd;Data Modem @ CDMA Diagnostic Serial Port (WDM);c:\windows\system32\drivers\cmo_serd.sys [2007-10-4 73696]
S3 DPCNET5U;Satellite USB Driver;c:\windows\system32\drivers\dpcnet5u.sys --> c:\windows\system32\drivers\dpcnet5u.sys [?]
S3 oUltraf;oUltraf;\??\c:\docume~1\owner\locals~1\temp\oultraf.sys --> c:\docume~1\owner\locals~1\temp\oUltraf.sys [?]

=============== Created Last 30 ================

2009-02-19 22:39 2,713 ---sh--- c:\windows\system32\gezibaju.dll
2009-02-19 10:39 2,713 ---sh--- c:\windows\system32\gibijayu.dll
2009-02-18 19:28 2,713 ---sh--- c:\windows\system32\wetudave.dll
2009-02-18 19:27 1,539,076 ---sh--- c:\windows\system32\uzewasuk.ini
2009-02-18 07:27 2,713 ---sh--- c:\windows\system32\nupejote.dll
2009-02-18 07:27 1,536,803 ---sh--- c:\windows\system32\asizowuv.ini
2009-02-17 19:27 1,531,186 ---sh--- c:\windows\system32\iveyenut.ini
2009-02-16 10:09 1,517,544 ---sh--- c:\windows\system32\ujogisey.ini
2009-02-12 17:28 1,516,964 ---sh--- c:\windows\system32\ideseyud.ini
2009-02-12 03:36 2,713 ---sh--- c:\windows\system32\burawote.exe
2009-02-10 19:26 1,648,533 ---sh--- c:\windows\system32\ehaborur.ini
2009-02-10 07:14 2,713 ---sh--- c:\windows\system32\puwaduvu.exe
2009-02-09 13:16 1,648,524 ---sh--- c:\windows\system32\idufatap.ini
2009-02-08 21:21 1,634,246 ---sh--- c:\windows\system32\uzikatuw.ini
2009-02-07 22:20 1,634,237 ---sh--- c:\windows\system32\uzamemor.ini
2009-02-07 21:21 2,713 ---sh--- c:\windows\system32\sobipore.dll
2009-02-07 09:23 1,625,547 ---sh--- c:\windows\system32\etivaven.ini
2009-02-06 21:21 1,635,633 ---sh--- c:\windows\system32\imapowol.ini
2009-02-05 21:20 1,640,369 ---sh--- c:\windows\system32\ujogodid.ini
2009-02-05 09:20 2,713 ---sh--- c:\windows\system32\kidohili.dll
2009-02-05 09:20 1,624,720 ---sh--- c:\windows\system32\emurolov.ini
2009-02-04 21:21 2,713 ---sh--- c:\windows\system32\dasoyuwa.dll
2009-02-04 21:20 1,602,957 ---sh--- c:\windows\system32\evefuyet.ini
2009-02-04 09:20 1,592,538 ---sh--- c:\windows\system32\udurihen.ini
2009-02-03 15:08 0 a------- C:\LOG20.tmp
2009-02-03 07:19 1,588,364 ---sh--- c:\windows\system32\etugofew.ini
2009-01-30 12:15 1,463,187 ---sh--- c:\windows\system32\emozevaj.ini
2009-01-30 00:14 1,463,190 ---sh--- c:\windows\system32\oduzovud.ini
2009-01-29 12:14 1,463,190 ---sh--- c:\windows\system32\alusuzar.ini
2009-01-29 00:13 1,463,190 ---sh--- c:\windows\system32\arafifez.ini
2009-01-28 23:32 <DIR> --d----- c:\program files\Trend Micro
2009-01-28 12:58 1,464,346 ---sh--- c:\windows\system32\igafujin.ini
2009-01-28 00:13 1,464,346 ---sh--- c:\windows\system32\anekoyan.ini
2009-01-27 12:13 2,713 ---sh--- c:\windows\system32\nifodiyu.dll
2009-01-27 12:13 1,463,449 ---sh--- c:\windows\system32\apataruw.ini
2009-01-27 00:30 1,462,525 ---sh--- c:\windows\system32\elojanom.ini
2009-01-27 00:12 2,713 ---sh--- c:\windows\system32\garetuso.dll
2009-01-26 12:13 2,713 ---sh--- c:\windows\system32\tezejito.dll
2009-01-26 12:13 1,462,525 ---sh--- c:\windows\system32\ukilumam.ini
2009-01-25 14:28 <DIR> --d----- c:\program files\Defraggler
2009-01-25 13:12 <DIR> --d----- c:\program files\CCleaner
2009-01-24 17:05 1,384,694 a--sh--- c:\windows\system32\iyozoriy.ini
2009-01-24 10:44 1,384,694 ---sh--- c:\windows\system32\iyozoriy.ini2
2009-01-24 10:44 1,384,676 ---sh--- c:\windows\system32\iyozoriy.tmp
2009-01-24 10:11 9,755 a--sh--- c:\windows\system32\mejiyuwo.dll
2009-01-22 19:48 1,384,649 ---sh--- c:\windows\system32\ahemegus.ini
2009-01-21 23:25 <DIR> --d----- c:\program files\Opera 10 Preview
2009-01-21 15:49 1,385,531 ---sh--- c:\windows\system32\otoliyef.ini

==================== Find3M ====================

2009-02-12 16:36 109,639 a--sh--- c:\windows\system32\jejobadi.dll
2009-02-09 13:16 74,311 a------- c:\windows\system32\pedisasa.dll
2009-01-15 14:37 1,327,740 ---sh--- c:\windows\system32\etadopun.tmp
2009-01-06 09:49 4,205 a--sh--- c:\windows\system32\sezerabo.dll
2009-01-02 09:42 98,090 a--sh--- c:\windows\system32\lekunide.dll
2009-01-01 21:42 97,908 a--sh--- c:\windows\system32\sinodisi.dll
2008-12-30 13:04 59,478 a--sh--- c:\windows\system32\gafuyowo.dll
2008-12-28 17:12 124,464 a------- c:\windows\system32\drivers\SYMEVENT.SYS
2008-12-28 17:12 60,808 a------- c:\windows\system32\S32EVNT1.DLL
2008-12-28 17:12 10,635 a------- c:\windows\system32\drivers\SYMEVENT.CAT
2008-12-28 17:12 806 a------- c:\windows\system32\drivers\SYMEVENT.INF
2008-12-25 09:08 2,713 a--sh--- c:\windows\system32\likegene.exe
2008-07-23 18:42 1,600 a------- c:\program files\ALLTEL Internet Accelerator Client setup.log
2006-09-19 08:26 6,596 a------- c:\program files\install.log
2006-09-19 07:37 2,983 a------- c:\program files\install_wizard.log
2006-09-19 07:37 1,406 a------- c:\program files\install_status.log
2004-06-05 10:59 168,725 a------- c:\docume~1\owner\applic~1\tvmknwrd.dll
2003-07-08 23:23 770,048 a------- c:\program files\winmx331.exe
2003-06-30 13:40 3,120,872 a------- c:\program files\Install_AIM.exe
2007-12-15 23:09 445,881 a--sh--- c:\windows\system32\accdd.ini2
0000-00-00 00:00 74,311 a--sh--- c:\windows\system32\fidezeta.dll
2007-12-14 09:37 18,935 a--sh--- c:\windows\system32\ggjlm.ini2
0000-00-00 00:00 11,264 a--sh--- c:\windows\system32\hajifagu.dll
2008-09-30 12:05 64,512 a--sh--- c:\windows\system32\hesudobu.dll
0000-00-00 00:00 71,597 a--sh--- c:\windows\system32\joliyusi.dll
0000-00-00 00:00 11,264 a--sh--- c:\windows\system32\kikavezo.dll
0000-00-00 00:00 64,512 a--sh--- c:\windows\system32\kilatape.dll
0000-00-00 00:00 77,824 a--sh--- c:\windows\system32\kisijegu.dll
0000-00-00 00:00 33,792 a--sh--- c:\windows\system32\lisepeyo.dll
0000-00-00 00:00 74,311 a--sh--- c:\windows\system32\lutazipu.dll
2008-01-10 20:45 440,055 a--sh--- c:\windows\system32\onnmp.ini2
0000-00-00 00:00 4,096 a--sh--- c:\windows\system32\pihenedo.dll
0000-00-00 00:00 74,311 a--sh--- c:\windows\system32\razifazi.dll
0000-00-00 00:00 70,656 a--sh--- c:\windows\system32\remebeyi.dll
0000-00-00 00:00 46,080 a--sh--- c:\windows\system32\ruyebana.dll
2008-09-30 12:05 64,512 a--sh--- c:\windows\system32\sawupima.dll
0000-00-00 00:00 78,573 a--sh--- c:\windows\system32\yinazeku.dll

============= FINISH: 4:35:00.78 ===============

Attached Files



#4 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 20 February 2009 - 04:20 PM

Howdy, my name is Hoov, and I will be helping you with your dilemma.

Please make sure you watch this thread for responses. If you click the options tab at the top of your first post, you can select to track this thread.

Here is what I am asking you to do during the repair of your computer

*Tell me everything that you have done, if anything, to try and fix this problem.

*Please only use 1 forum to help clear up your problem. Posting on more than 1 and following instructions from more than 1 forum will cause those helping you to pull out thier hair.

*Follow my instructions - If you can't for some reason, or if you don't understand something, please tell me. If you deviate from my instructions, tell me, it may make a difference on where we go. Don't install anything, even other programs that have nothing to do with security or malware, it could cause things to change, and I would never know it.

*Have faith. I will do all I can to get your computer working, and if I can't - someone else here will know something else to try.

*Stick with me to the end. My aim is to fix your problems, and give you the tools and knowledge to keep this from happening again.

Now onto trying to fix your computer.

If I am helping you and you don't hear from me for 24Hrs, send me a PM Please!

Do you have a problem with Google or Yahoo searches going astray?

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.
  • Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#5 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 21 February 2009 - 12:14 PM

Thank you Hoov!

Tell me everything that you have done, if anything, to try and fix this problem.


I have done nothing as yet. I wanted o wait for someonr more knowledgeable to help me.


Do you have a problem with Google or Yahoo searches going astray?

The Mal ware/Ad ware starts occurring randomly about every 3 - 10 minuets. I don't notice that it especially engages when I preform a Google search.

Three other things that may be helpful to you:

1. If I have the the Task Manager window open, I can see that the function "iexplore.exe" appear just before the Mal ware displays. When I terminate "iexplore.exe" the Mal ware goes away immediately. "iexplore.exe" then reappears in 3-10 minuets and starts another cycle.

2. Another thing the Mal ware creates is an faux Explorer start up page (when I'm runnung Firefox), and continues to open additional windows until the pc locks up.

3. Norton finds 8-10 "Trojan-Vundo" invasions almost every day. It "fixes" them, but they continue to be present.

Thank you again,

bonzilla



Malwarebytes' Anti-Malware 1.34
Database version: 1783
Windows 5.1.2600 Service Pack 3

2/21/2009 10:08:17 AM
mbam-log-2009-02-21 (10-08-17).txt

Scan type: Quick Scan
Objects scanned: 69396
Time elapsed: 10 minute(s), 36 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 3
Registry Keys Infected: 24
Registry Values Infected: 1
Registry Data Items Infected: 3
Folders Infected: 16
Files Infected: 29

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\fidezeta.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\lutazipu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\razifazi.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{71770780-e60c-4c29-99a9-559fe6eaddaf} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{71770780-e60c-4c29-99a9-559fe6eaddaf} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{71770780-e60c-4c29-99a9-559fe6eaddaf} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{10125c2d-6821-4070-b24e-2e992501ad55} (Adware.Iwon) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{10125c2f-6821-4070-b24e-2e992501ad55} (Adware.Iwon) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{277e1fe0-cf65-11d3-b377-0800460222f0} (Adware.Iwon) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{6d54a7c0-c379-11d3-b377-0800460222f0} (Adware.Iwon) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{a4730ebe-43a6-443e-9776-36915d323ad3} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{78429873-f771-11d3-ae1d-0050dac24e8f} (Adware.Iwon) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{8e3fbde2-7dbd-4040-85d9-29bbc559c129} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{018b7ec3-eeca-11d3-8e71-0000e82c6c0d} (Adware.ISTBar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{13197ace-6851-45c3-a7ff-c281324d5489} (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8fcdf9d9-a28b-480f-8c3d-581f119a8ab8} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{deceaaa2-370a-49bb-9362-68c3a58ddc62} (Adware.180Solutions) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\icheck (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\GetModule (Adware.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\WR (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\siteyewama (Trojan.Vundo.H) -> Delete on reboot.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\fidezeta.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\fidezeta.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\fidezeta.dll -> Delete on reboot.

Folders Infected:
C:\Program Files\iWon (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\setups (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar\1.bin (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar\History (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar\Settings (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\gadcom (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\GetModule (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\iCheck (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\GetModule (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\VBouncer (Adware.VBouncer) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\razifazi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\lutazipu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\fidezeta.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\Program Files\iWon\iWonBar\1.bin\IWONBAR.DLL (Adware.Iwon) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hajifagu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jejobadi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\joliyusi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kikavezo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pedisasa.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\01A9DEE3 (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\01A9EE35 (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\01A9F365 (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\01A9F922 (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\01AA0140 (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\Installr\Cache\files.ini (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar\History\search (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\iWon\iWonBar\Settings\prevcfg.htm (Adware.iWon) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History\allowed (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\PopSwatr\History\notallow (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\iCheck\Uninstall.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\cookies.ini (Malware.Trace) -> Quarantined and deleted successfully.
C:\Documents and Settings\Owner\Application Data\tvmknwrd.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\nifodiyu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yinazeku.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gibijayu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hesudobu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sinodisi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gezibaju.dll (Trojan.Vundo) -> Quarantined and deleted successfully.

#6 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 21 February 2009 - 12:24 PM

OK, If you didn't after the scan, reboot your computer and do an update in Malwarebytes' Anti-Malware (a new update just came out) and run a scan again, this time do a full scan and not a quick scan, I want to make sure the items marked for delete on reboot, actually got deleted, and that there is nothing lurking in the background.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#7 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 21 February 2009 - 03:28 PM

Here you go Hoov, 4 found:


Malwarebytes' Anti-Malware 1.34
Database version: 1785
Windows 5.1.2600 Service Pack 3

2/21/2009 3:25:58 PM
mbam-log-2009-02-21 (15-25-58).txt

Scan type: Full Scan (A:\|C:\|D:\|E:\|F:\|H:\|I:\|J:\|K:\|)
Objects scanned: 297655
Time elapsed: 2 hour(s), 47 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{F20DC6C2-5212-4F33-8959-AB7D05D4CDB6}\RP513\A0084212.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F20DC6C2-5212-4F33-8959-AB7D05D4CDB6}\RP513\A0084214.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{F20DC6C2-5212-4F33-8959-AB7D05D4CDB6}\RP513\A0084215.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\$NtServicePackUninstall$\wextract.exe (Backdoor.Bot) -> Quarantined and deleted successfully.

#8 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 21 February 2009 - 04:16 PM

How is the computer doing now? Also update Norton and run a full scan with it and see if anything new pops up. If it does, post the log, if not just let me know.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#9 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 22 February 2009 - 06:23 PM

Everything is runnin' smooth Hoov!

I ran the full Norton scan and there were 0 infections.

#10 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 22 February 2009 - 07:53 PM

Good. Go ahead and run the computer for a day or two, and make sure you reboot a couple times at least. Then update Malwarebytes' Anti-Malware and run another full scan. If it finds anything post the log back here. If it finds nothing, then you are good to go.

Now there are something's you need to do to fully clean your system and keep it secure.


Cleaning out Temporary Files etc. There are several different products that you can use for this. You can go thru the Internet Options in the windows Control Panel. There are several programs that also do the job better than windows does it, in my opinion. There is System Security Suite, EasyCleaner, Ccleaner. Also sometimes other program sometimes do it as well as what you originally got it for like ZoneAlarm Security Suite. Just make sure to keep them updated and use them regularly.

Disable and Enable System Restore.
If you are using Windows Vista or XP, then I recommend you turn off System restore, and then turn it back on so that you will not be able to restore your problems to a clean computer.

Here are some good tutorials for that.
Windows Vista Restore Guide
or
Windows XP System Restore Guide
Reboot
Re-enable system restore with instructions from tutorial above

Create a System Restore Point
Go to all programs, then to accessories, then to system tools, then to system restore. Check the box for create restore point (not select a restore point), then click next and follow the instructions.

Make your Internet Explorer more secure - This can be done by following these simple instructions: (unless you are using ZoneAlarm Security Suite or something similar, then you would secure the browser thru the firewall).

From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt
Change the Download unsigned ActiveX controls to Disable
Change the Initialize and script ActiveX controls not marked as safe to Disable
Change the Installation of desktop items to Prompt
Change the Launching programs and files in an IFRAME to Prompt
Change the Navigate sub-frames across different domains to Prompt
When all these settings have been made, click on the OK button.
If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.
Also see the following: Securing Your Web Browser
Working with Internet Explorer 6 Security

Use a different browser other than IE (most exploits are pointed towards IE). One of them is
Firefox.
It is also worth trying Thunderbird for controlling spam in your e-mail.


Always use an UPDATED anti-virus program Make sure you update this at least weekly, if not more often. This is one thing that may Ave you more than anything else.

Run malware scanners. Three free ones are Spybot Search and Destroy, and AdAware and Malwarebytes' Anti-Malware


Always use a firewall.
Any firewall is better than none, and you should pick a firewall that you will use, as even the best firewall is worthless if you turn it off.

Learn how to use your firewall Only programs that need it should have access to the net. But these are specific to the firewall you use, so you will need to learn how. Several firewalls have support forums here. My page will help you with ZoneAlarm if that is what you choose.


Never run two Antivirus programs or two Firewalls at the same time. They can interfere with each other and cause problems. Some people swear that more protection is provided, but the reverse is true. They tend to argue amongst themselves and end up leaving holes. Now I have more than 1 AV installed on my computer, and I keep them up to date. I only run one at a time, but each program has weakness's, so I keep a backup in case my computer starts acting up.


MOST IMPORTANT : Windows and IE, and whatever other software that you have that connects to the net, needs to be kept updated. The reason is, these programs connect to the net, and if there is an internal security problem, you have already told your firewall to allow the communication, and thus you will have allowed a hole. UPDATES are important. I suggest that you make sure that Windows Updates and the updates for your antivirus and antimalware programs are set for automatic updates.

Don't ever use P2P or filesharing software Even the safest P2P file sharing programs that do not contain bundled spyware, still expose you to risks because of the very nature of the P2P file sharing process. By default, most P2P file sharing programs are configured to automatically launch at startup. They are also configured to allow other P2P users on the same network open access to a shared directory on your computer. The reason for this is simple. File sharing relies on its members giving and gaining unfettered access to computers across the P2P network. However, this practice can make you vulnerable to data and identity theft. Even if you change those risky default settings to a safer configuration, the act of downloading files from an anonymous source greatly increases your exposure to infection. That is because the files you are downloading may actually contain a disguised threat. Many very malicious worms and trojans, such as the Storm Worm, target and spread across P2P files sharing networks because of their known vulnerabilities.

Before using any malware detection / removal software Check with Rogue/Suspect Spyware List and Rogue Applications List That way you will know if the program you are looking at is on the up and up. If you want to know how it stacks up against other programs check out SpywareWarrior

We have a good guide here at Spyware Hammer on how to prevent Malware in the Future. You might want to peruse this and follow the recommendations in there.
PLEASE READ IT AND FOLLOW THE RECOMMENDATIONS TO PROTECT YOURSELF.

Let us know if you have any more problems, either new or old.
Have a good time surfing the net, but stay safe.
If you have no more problems, let me know and I will mark this as resolved. Or if you have more questions, ask away, that is why I am here.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#11 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 25 February 2009 - 11:37 AM

HI Hoov,

Didn't want to leave you hanging... I have not had time to complete all of the tasks you instructed above, and probably will not get a chance until this weekend.

If you could please leave the thread open, I will try and finish up by next Monday.

Thank you so much for your help!

Sparky

#12 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 25 February 2009 - 12:00 PM

No worries.
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image

#13 bonzilla

bonzilla
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:08:26 PM

Posted 01 March 2009 - 10:43 PM

Hoov! You did it!

Everything checked out 100%.

I can't thank you enough for you time, patience, an expert analysis. Thanks again, you do great work.

bonzilla

#14 Hoov

Hoov

  • Malware Response Team
  • 3,519 posts
  • OFFLINE
  •  
  • Location:Mikado Michigan
  • Local time:09:26 PM

Posted 01 March 2009 - 11:02 PM

You are welcome!
Visiting From SpywareHammer.com and DonHoover.net

Tilting at windmills hurts you more than the windmills.
-From the Notebooks of Lazarus Long
Senior of the Howard Families

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users