Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help with Malware


  • Please log in to reply
15 replies to this topic

#1 funkastic

funkastic

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 22 March 2009 - 04:26 AM

Hi,

This is my first post on BleepingComputer.com -- so apologize if may not have posted in the right section. Lately, my PC has been infected with malware (i believe i got it from facebook), and I can't seem to get rid of it inspite of repeated efforts.

Everytime I turn ON my computer, I get the following RUNDLL error -- "Error loading zikewapo.dll. The specific module cannot be found". Also my Internet explorer also continues to crash everytime I turn it ON.

I am posting the Malwarebytes log file... there were ~ 30 infections before, most of which get removed once i run Malwarebytes. However, the below 3 infections continue to be there everytime I restart the machine. Also, the number of infections increase as soon as I access the internet, and then I again get ~ 30 infections. How do I get these to be eliminated from my system? I have also run the ATF cleaner as well. Please assist.

Malwarebytes' Anti-Malware 1.34
Database version: 1749
Windows 5.1.2600 Service Pack 3

3/22/2009 4:18:01 AM
mbam-log-2009-03-22 (04-18-01).txt

Scan type: Quick Scan
Objects scanned: 75515
Time elapsed: 7 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 1
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0e862a02-6265-46a2-82a4-ee65dc7f2620} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0e862a02-6265-46a2-82a4-ee65dc7f2620} (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jiregayili (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

BC AdBot (Login to Remove)

 


#2 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 22 March 2009 - 05:30 AM

The best option would be to disconnect that computer from the internet and use a clean computer to download tools and updates to and then transfer to the infected computer with a immunized usb drive

To do that, start with the clean computer and the usb drive

Please download Flash_Disinfector.exe by sUBs and save it to your desktop.
  • Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
  • The utility may ask you to insert your flash drive and/or other removable drives. Please do so and allow the utility to clean up those drives as well.
  • Hold down the Shift key when inserting the drive until Windows detects it to keep autorun.inf from executing if it is present.
  • Wait until it has finished scanning and then exit the program.
  • Reboot your computer when done.
Note: As part of its routine, Flash_Disinfector will create a hidden folder named autorun.inf in each partition and every USB drive that was plugged in when you ran it. Do not delete this folder...it will help protect your drives from future infection by keeping the autorun file from being installed on the root drive and running other malicious files.


Our first step would be to update MBAM, from within the program itself or by downloading and transfering this file

http://www.gt500.org/malwarebytes/database.jsp

Even this version is quite old
Chewy

No. Try not. Do... or do not. There is no try.

#3 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 22 March 2009 - 03:40 PM

Hi
Followed the instructions and updated Malwarebytes version. Here is the latest Malwarebytes log.

Malwarebytes' Anti-Malware 1.34
Database version: 1884
Windows 5.1.2600 Service Pack 3

3/22/2009 3:31:25 PM
mbam-log-2009-03-22 (15-31-25).txt

Scan type: Quick Scan
Objects scanned: 80450
Time elapsed: 6 minute(s), 59 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 2
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0e862a02-6265-46a2-82a4-ee65dc7f2620} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{0e862a02-6265-46a2-82a4-ee65dc7f2620} (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\000000af (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jiregayili (Trojan.Vundo.H) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 22 March 2009 - 05:17 PM

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

Chewy

No. Try not. Do... or do not. There is no try.

#5 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 25 March 2009 - 08:16 PM

Hi DaChew, I ran SuperAntispyware but when I click to remove all these infections, it shuts down my system and gives me a blue screen that states the follows:

STOP: c000021a {Fatal System Error}

The Windows Logon Process System terminated unexpectedly with a status of 0x000000000 (0x000000000 0x000000000}
The system has been shut down

I ran it twice, and had the same issue. Here is the SuperAntispyware log...




SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/25/2009 at 01:49 AM

Application Version : 4.25.1014

Core Rules Database Version : 3811
Trace Rules Database Version: 1765

Scan type : Complete Scan
Total Scan Time : 06:55:08

Memory items scanned : 253
Memory threats detected : 4
Registry items scanned : 7439
Registry threats detected : 16
File items scanned : 100518
File threats detected : 46

Adware.Vundo/Variant-EC
C:\WINDOWS\SYSTEM32\TALOGEVI.DLL
C:\WINDOWS\SYSTEM32\TALOGEVI.DLL
C:\WINDOWS\SYSTEM32\BIHORUGI.DLL
C:\WINDOWS\SYSTEM32\BIHORUGI.DLL

Trojan.Downloader-NewJuan/VM
C:\WINDOWS\SYSTEM32\BYXCCW.DLL
C:\WINDOWS\SYSTEM32\BYXCCW.DLL
C:\WINDOWS\SYSTEM32\QXEPNL.DLL
C:\WINDOWS\SYSTEM32\QXEPNL.DLL

Adware.Vundo Variant
HKLM\Software\Classes\CLSID\{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}\InprocServer32#ThreadingModel
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{EC43E3FD-5C60-46a6-97D7-E0B85DBDD6C4}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#SSODL
HKCR\CLSID\{EC43E3FD-5C60-46A6-97D7-E0B85DBDD6C4}

Rogue.Installer/Trace
C:\WINDOWS\system32\tremir.bin

Adware.Vundo Variant/Rel
HKLM\SOFTWARE\Microsoft\contim
HKLM\SOFTWARE\Microsoft\contim#SysShell
HKLM\SOFTWARE\Microsoft\MS Track System
HKLM\SOFTWARE\Microsoft\MS Track System#Uid
HKLM\SOFTWARE\Microsoft\rdfa
HKLM\SOFTWARE\Microsoft\rdfa#F
HKLM\SOFTWARE\Microsoft\rdfa#N

Rogue.Component/Trace
HKU\S-1-5-21-2250136303-3865853353-3641131392-1005\Software\Microsoft\FIAS4051
HKU\S-1-5-21-2250136303-3865853353-3641131392-1005\Software\Microsoft\FIAS4052N

Trojan.NewDotNet-Installer
C:\PROGRAM FILES\THEMEXP\NNWDAB638.EXE

Adware.Vundo/Variant-ACE
C:\WINDOWS\SYSTEM32\AZDUTW.DLL
C:\WINDOWS\SYSTEM32\RODOKX.DLL

Trojan.Agent/Gen-VundoDropper
C:\WINDOWS\SYSTEM32\BIDUBITI.DLL
C:\WINDOWS\SYSTEM32\GADIBURE.DLL
C:\WINDOWS\SYSTEM32\SURUJESU.DLL
C:\WINDOWS\SYSTEM32\ZIDEKEBE.DLL
C:\WINDOWS\SYSTEM32\ZYNLEL.DLL

Adware.Vundo/Variant-StatsReader
C:\WINDOWS\SYSTEM32\BUNIDUPA.DLL
C:\WINDOWS\SYSTEM32\DAHOGEMU.DLL
C:\WINDOWS\SYSTEM32\DEMOAM.DLL
C:\WINDOWS\SYSTEM32\FXNOFW.DLL
C:\WINDOWS\SYSTEM32\GEHUFIDU.DLL
C:\WINDOWS\SYSTEM32\GGBDOS.DLL
C:\WINDOWS\SYSTEM32\HEFIHIRU.DLL
C:\WINDOWS\SYSTEM32\HICZLV.DLL
C:\WINDOWS\SYSTEM32\HUWUNIVA.DLL
C:\WINDOWS\SYSTEM32\JINUWAYI.DLL
C:\WINDOWS\SYSTEM32\KERIJOPU.DLL
C:\WINDOWS\SYSTEM32\KOVIHIHI.DLL
C:\WINDOWS\SYSTEM32\LKGVGG.DLL
C:\WINDOWS\SYSTEM32\LUWURUZE.DLL
C:\WINDOWS\SYSTEM32\MAJIRIHO.DLL
C:\WINDOWS\SYSTEM32\MEBOZIHI.DLL
C:\WINDOWS\SYSTEM32\NOKAMIDO.DLL
C:\WINDOWS\SYSTEM32\PIGOYITA.DLL
C:\WINDOWS\SYSTEM32\QICAEE.DLL
C:\WINDOWS\SYSTEM32\SULEVUVU.DLL
C:\WINDOWS\SYSTEM32\TOBSIJ.DLL
C:\WINDOWS\SYSTEM32\UMHDSI.DLL
C:\WINDOWS\SYSTEM32\WIBAKIHI.DLL
C:\WINDOWS\SYSTEM32\WOJIFIZI.DLL
C:\WINDOWS\SYSTEM32\WUDEPUVE.DLL
C:\WINDOWS\SYSTEM32\YIBABOFI.DLL
C:\WINDOWS\SYSTEM32\ZDNMXM.DLL
C:\WINDOWS\SYSTEM32\ZELOKORE.DLL

Adware.Vundo Variant/ACE
C:\WINDOWS\SYSTEM32\DOMEROHA.DLL
C:\WINDOWS\SYSTEM32\PEDEWOVO.DLL
C:\WINDOWS\SYSTEM32\TEBUSUKA.DLL
C:\WINDOWS\SYSTEM32\TUBIWEWA.DLL

Rootkit.TDSServ-Trace
C:\WINDOWS\SYSTEM32\TDSSORVD.DAT

#6 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 25 March 2009 - 08:22 PM

Before we start fixing anything you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.

Please download DrWeb-CureIt and save it to your desktop. DO NOT perform a scan yet.

Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with Dr.Web CureIt as follows:
  • Double-click on launch.exe to open the program and click Start. (There is no need to update if you just downloaded the most current version
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All.
  • When complete, click Select All, then choose Cure > Move incurable.
    (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • Now put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and UNcheck "Heuristic analysis" under the "Scanning" tab, then click Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • When the scan is complete, a message will be displayed at the bottom indicating if any viruses were found.
  • Click "Yes to all" if asked to cure or move the file(s) and select "Move incurable".
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the log from Dr.Web in your next reply. (You can use Notepad to open the DrWeb.cvs report)

Chewy

No. Try not. Do... or do not. There is no try.

#7 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 26 March 2009 - 11:47 PM

Hi DaChew,

Followed the instructions -- here is the DrWeb log

byxccw.dll;c:\windows\system32;Trojan.Juan.84;Deleted.;
gtdownde_110.ocx;c:\windows\system32;Probably DLOADER.Trojan;Incurable.Moved.;
talogevi.dll;c:\windows\system32;Trojan.Virtumod.1636;Deleted.;
09D00000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Virtumod.1635;Deleted.;
09D00002.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.39;Deleted.;
0A180001.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Packed.365;Deleted.;
0A180002.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.30;Deleted.;
0A340000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Virtumod.1635;Deleted.;
0A380000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Virtumod.1649;Deleted.;
0A400000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.21;Deleted.;
0A4C0000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.30;Deleted.;
0A500000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.30;Deleted.;
0A500001.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.29;Deleted.;
0A5C0000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;BackDoor.Tdss.29;Deleted.;
0AA00000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Juan.82;Deleted.;
0AA80000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Juan.82;Deleted.;
0ACC0000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Juan.82;Deleted.;
0AD40000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Juan.82;Deleted.;
0CC00000.VBN;C:\Documents and Settings\All Users\Application Data\Symantec\Norton AntiVirus Corporate Edition\7.5\Quarantine;Trojan.Virtumod.1635;Deleted.;
{1A5E9052-59B6-4B11-995D-844C9D51E402};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-24-20;Adware.NewDotNet;;
{74B2AC28-0F73-4EAB-B45C-8BAE01BB9E19};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-24-20;Trojan.Virtumod.1636;Deleted.;
{8D0A5C6E-7752-461F-BC66-63CEFDAECC63};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-24-20;Trojan.Virtumod.1636;Deleted.;
{F4D15611-3AA1-4DE6-AD4F-6B8378489B14};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-24-20;Trojan.Juan.84;Deleted.;
{F6ADE0A0-4FC6-4BB2-A9F5-E19EF598E4F0};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-24-20;Trojan.Juan.84;Deleted.;
{098AFA48-0E92-4847-B65C-5E7EB67E91D1};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-25-20;Trojan.Juan.84;Deleted.;
{8597A2C5-4217-4B03-90DD-E72960255993};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-25-20;Trojan.Virtumod.1636;Deleted.;
{C6686A3F-873F-4623-96E8-CD2012D75EBB};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-25-20;Trojan.Juan.84;Deleted.;
{F693D7F9-991C-4964-9F6B-645F84289116};C:\Documents and Settings\My_PC\Application Data\SUPERAntiSpyware.com\SUPERAntiSpyware\Quarantine\Quarantine - 03-25-20;Trojan.Virtumod.1636;Deleted.;
xolox1.57.exe\data004;C:\Documents and Settings\My_PC\My Documents\My Downloaded files\xolox1.57.exe;Adware.SaveNow;;
xolox1.57.exe;C:\Documents and Settings\My_PC\My Documents\My Downloaded files;Archive contains infected objects;Moved.;
drip10dragnet.exe/data007\srvany.exe;C:\Documents and Settings\My_PC\My Documents\My Downloaded files\Dragnet\drip10dragnet.exe/data007;Program.SrvAny;;
data007;C:\Documents and Settings\My_PC\My Documents\My Downloaded files\Dragnet;Archive contains infected objects;;
drip10dragnet.exe;C:\Documents and Settings\My_PC\My Documents\My Downloaded files\Dragnet;Archive contains infected objects;Moved.;
173891.exe\data018;C:\Documents and Settings\My_PC\My Documents\XP Theme\173891.exe;Adware.NewDotNet;;
173891.exe\data020;C:\Documents and Settings\My_PC\My Documents\XP Theme\173891.exe;Adware.SaveNow;;
173891.exe\data025;C:\Documents and Settings\My_PC\My Documents\XP Theme\173891.exe;Adware.Relevant;;
173891.exe;C:\Documents and Settings\My_PC\My Documents\XP Theme;Archive contains infected objects;Moved.;
3 Months Free NetZero.exe;C:\Program Files\Dell\Launcher\files;Trojan.Click.1487;Deleted.;
delfolder.exe;C:\Program Files\DellSupport\GTCoach;Trojan.MulDrop.30652;Deleted.;
NNWDAB638.EXE;C:\Program Files\themexp;Adware.NewDotNet;;
A0006501.exe;C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP10;Trojan.Click.1487;Deleted.;
A0006502.exe;C:\System Volume Information\_restore{129201FA-B0AC-49B3-96B2-DEB8B91E727B}\RP10;Trojan.MulDrop.30652;Deleted.;
azdutw.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
bunidupa.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
byxccw.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
dahogemu.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
demoam.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
domeroha.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
fxnofw.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
gadibure.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
gehufidu.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
ggbdos.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
hiczlv.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
huwuniva.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
jinuwayi.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
kerijopu.dll;C:\WINDOWS\system32;Trojan.Virtumod.1635;Deleted.;
kovihihi.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
lkgvgg.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
luwuruze.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
majiriho.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
mebozihi.dll;C:\WINDOWS\system32;Trojan.Juan.82;Deleted.;
nokamido.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
pedewovo.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
pigoyita.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
qicaee.dll;C:\WINDOWS\system32;Trojan.Juan.82;Deleted.;
rodokx.dll;C:\WINDOWS\system32;Trojan.Juan.85;Deleted.;
sulevuvu.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
surujesu.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
talogevi.dll;C:\WINDOWS\system32;Trojan.Virtumod.1636;Deleted.;
tebusuka.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
tobsij.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
tubiwewa.dll;C:\WINDOWS\system32;Trojan.Juan.85;Deleted.;
umhdsi.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
wibakihi.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
wojifizi.dll;C:\WINDOWS\system32;Trojan.Virtumod.1643;Deleted.;
wudepuve.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
yibabofi.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
zdnmxm.dll;C:\WINDOWS\system32;Trojan.Juan.84;Deleted.;
zelokore.dll;C:\WINDOWS\system32;Trojan.Virtumod.1639;Deleted.;
zidekebe.dll;C:\WINDOWS\system32;Trojan.Juan.85;Deleted.;

Edited by funkastic, 26 March 2009 - 11:50 PM.


#8 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 27 March 2009 - 05:08 AM

Run Drwebcureit in normal mode with heuristics enabled
Chewy

No. Try not. Do... or do not. There is no try.

#9 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 27 March 2009 - 07:20 PM

When I double click on DrWEb Cureit -- it now gives me the error message that "setup.exe has encounted a problem and needs to close. We are sorry for the inconvenience" and the application closes :thumbsup:

When I ran it in safe mode -- not sure what it removed.

#10 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 27 March 2009 - 10:33 PM

Is this computer still connected to the internet?
Chewy

No. Try not. Do... or do not. There is no try.

#11 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 30 March 2009 - 07:35 PM

Nope, this isn't connected to internet. Basically, I can still open the Drwebcureit application in safe mode, but when I try to open it in 'normal" mode -- it gives that error "setup.exe has encounted a problem and needs to close. We are sorry for the inconvenience" and then the Drwebit application closes.

#12 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 30 March 2009 - 07:43 PM

Would you rename drweb-cureit.exe to cure.com
Chewy

No. Try not. Do... or do not. There is no try.

#13 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 30 March 2009 - 10:39 PM

You mean, rename the set up file? Yes I renamed the setup file to cure.com and then double clicked to try and open it. Same message...I clicked on ' what data the error report containts" link.

Error Signature -- Appname. setup.exe.
ModName: setup.exe
Modver: 0.0.0.0
Offset: 00066fc1

#14 DaChew

DaChew

    Visiting Alien


  • BC Advisor
  • 10,317 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:millenium falcon and rockytop
  • Local time:10:45 PM

Posted 30 March 2009 - 11:05 PM

ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

Try downloading it to another computer and rename there before transfering?
Chewy

No. Try not. Do... or do not. There is no try.

#15 funkastic

funkastic
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:09:45 PM

Posted 03 April 2009 - 10:27 PM

Same error. It continues to work in safe mode, but cannot install in normal mode. Continue to get setup.exe has encountered an error message.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users