Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected by malware/adware


  • This topic is locked This topic is locked
18 replies to this topic

#1 oceanandmountain

oceanandmountain

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 01 December 2009 - 10:07 AM

Hi,

I have a Dell laptop with Microsoft XP 2002 operating system.
I recently got infected alware/adware that made my computer ran so slowly. Would anyone please help me resolve this?
Please help me. Thanks.

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 01 December 2009 - 02:47 PM

Please download Malwarebytes Anti-Malware (v1.41) and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.

-- If Malwarebytes Anti-Malware results in any error messages, check the Help file's list of error codes within its program folder first. If you do not find any information, please refer to Common Issues, Questions, and their Solutions, Frequently Asked Questions. If the error you are receiving is not in the list, please report it here so the research team can investigate.


-- Some types of malware will disable Malwarebytes Anti-Malware and other security tools to keep them from running properly. If MBAM will not install, try renaming it first.
  • Right-click on the mbam-setup.exe file file and rename it to mysetup.exe. If that did not work, rename it explorer.exe.
  • Double-click on the renamed file to start the installation.
  • If that still did not work, then try changing the file extension. <- click this link if you do not see the file extension
    If using Windows Vista, refer to these instructions.
  • Right-click on explorer.exe and change the .exe extension to .scr, .com, .pif, or .bat.
  • Then double-click on explorer.com (or whatever extension you renamed it) to begin installation.
If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files.
  • Right-click on mbam.exe and rename it to wuauclt.exe.
  • Double-click on wuauclt.exe to launch the program.
  • If that did not work, then change the .exe extension in the same way as noted above.
  • Double-click on wuauclt.com (or whatever extension you renamed it) to launch the program.
Note: If installation coninues to fail in normal mode, try installing and performing a Quick Scan in "safe mode". Doing this is usually not advised as MBAM is designed to be at full power when running in normal mode and loses some effectiveness for detection & removal when used in safe mode. Further, scanning in safe mode prevents some types of malware from running so it may be missed during the detection process. For optimal removal, normal mode is recommended so it does not limit the abilities of MBAM. Therefore, after completing a safe mode scan, reboot normally, uninstall MBAM, then reinstall it and perform another Quick Scan.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 01 December 2009 - 06:50 PM

Hi there,

This is the log result.

Malwarebytes' Anti-Malware 1.41
Database version: 3270
Windows 5.1.2600 Service Pack 3

12/1/2009 5:34:07 PM
mbam-log-2009-12-01 (17-34-07).txt

Scan type: Quick Scan
Objects scanned: 109166
Time elapsed: 33 minute(s), 21 second(s)

Memory Processes Infected: 3
Memory Modules Infected: 5
Registry Keys Infected: 15
Registry Values Infected: 6
Registry Data Items Infected: 4
Folders Infected: 3
Files Infected: 34

Memory Processes Infected:
C:\Documents and Settings\USER1\Local Settings\Temp\b.exe (Trojan.Downloader) -> Unloaded process successfully.
C:\WINDOWS\system32\winscent.exe (Trojan.FakeAlert) -> Unloaded process successfully.
C:\Program Files\Personal Protector\personalprotector.exe (Trojan.FakeAlert) -> Unloaded process successfully.

Memory Modules Infected:
C:\WINDOWS\system32\duzileru.dll (Trojan.Vundo) -> Delete on reboot.
c:\WINDOWS\system32\holojoba.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\ccaeeacbfa.dll (Trojan.KillAV) -> Delete on reboot.
C:\WINDOWS\system32\gerabuse.dll (Trojan.Vundo) -> Delete on reboot.
C:\Documents and Settings\All Users\Microsoft PData\inetprovider.dll (Trojan.FakeAlert) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{072b8f8a-0b8e-4fb4-9051-e0ba9d9a7324} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ccaeeacbfa (Trojan.KillAV) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{dbfd4ba5-ccd5-4132-8c1e-89c670c3dc20} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Worm.Allaple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{7545d8c8-f53c-4e2f-8fa0-d248ef4a6e61} (Rogue.Installer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{67ee7798-f2a0-415c-9473-0f174bd5a8b8} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{67ee7798-f2a0-415c-9473-0f174bd5a8b8} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sshnas (Trojan.FakeAV) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sshnas (Trojan.FakeAV) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sshnas (Trojan.FakeAV) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\personal protector (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Somefox (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Handle (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\babirihut (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{072b8f8a-0b8e-4fb4-9051-e0ba9d9a7324} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\kogokobev (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\internetprovider (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\personalprotector (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mailblocker (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: c:\windows\system32\holojoba.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Vundo.H) -> Data: system32\holojoba.dll -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe logon.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\Personal Protector (Rogue.PersonalProtector) -> Delete on reboot.
C:\Program Files\Personal Protector\q (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Angle Interactive\RD2010 (Rogue.RegDefender) -> Quarantined and deleted successfully.

Files Infected:
c:\WINDOWS\system32\holojoba.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\duzileru.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\ccaeeacbfa.dll (Trojan.KillAV) -> Delete on reboot.
C:\WINDOWS\system32\gerabuse.dll (Trojan.Vundo) -> Delete on reboot.
C:\Documents and Settings\USER1\Local Settings\Temp\b.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winscent.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Microsoft PData\inetprovider.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\Program Files\Personal Protector\personalprotector.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pabuzili.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\royotago.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hebitupi.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sshnas.dll (Trojan.FakeAV) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\LOGON.EXE (Trojan.Downloader) -> Delete on reboot.
C:\Documents and Settings\USER1\Local Settings\Temp\n.exn (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\USER1\Local Settings\Temp\a.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\USER1\Local Settings\Temp\c.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\base.wdb (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\baseadd.wdb (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\conf.wcf (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\quarant.wdb (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\queue.wdb (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\Program Files\Personal Protector\un.exe (Rogue.PersonalProtector) -> Quarantined and deleted successfully.
C:\WINDOWS\certofSystem.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Explorers.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Microsoftdefend.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\regp.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\secureit.com (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\spoos.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\basojefo.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wutiporu.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\zipuhovo.dll (Trojan.Vundo.N) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Microsoft PData\track.wid (Trojan.FakeAlert) -> Quarantined and deleted successfully.


Please advice the next steps. Thanks so much.

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 01 December 2009 - 10:07 PM

Now rescan again with Malwarebytes Anti-Malware, but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.
Please download the Kaspersky Virus Removal Tool save to your Desktop.
Be sure to print out and read the instructions provided in How to use Kaspersky virus removal tool.
  • Double-click the setup file (i.e. setup_7.0.0.290_24.06.2009_12-58.exe) to install the utility.
  • If using Vista, right-click on it and Run As Administrator.
    If you receive a UAC prompt asking if you would like to continue running the program, you should press the Continue button.
    .
  • Click Next to continue.
  • It will install by default to your desktop folder. Click Next.
  • Click Ok at the prompt for scanning in Safe Mode if you booted into safe mode.
  • A box will open with a tab that says Automatic scan.
  • Under Automatic scan make sure these are checked.
  • System Memory
  • Startup Objects
  • Disk Boot Sectors
  • My Computer
  • Any other drives (except CD-ROM drives)
  • Click on the Scan button.
  • If malware is detected, place a checkmark in the Apply to all box, and click the Delete button (or Disinfect if the button is active).
  • After the scan finishes, if any threats are left unneutralized in the Scan window (Red exclamation point), click the Neutralize all button.
  • In the window that opens, place a checkmark in the Apply to all box, and click the Delete button (or Disinfect if the button is active).
  • If advised that a special disinfection procedure is required which demands system reboot, click the Ok button to close the window.
  • In the Scan window click the Reports button, name the report AVPT.txt and select Save to file.
  • This tool should uninstall when you close it so please save the report log before closing.
  • When done, close the Kaspersky Virus Removal Tool.
  • You will be prompted if you want to uninstall the program. Click Yes.
  • You will then be prompted that to complete the uninstallation, the computer must be restarted. Select Yes to restart the system.
  • Copy and paste only the first part of the report (Detected) in your next reply. Do not include the longer list marked Events.
If you cannot run the Kaspersky AVP Removal Tool in normal mode, then try using it in "safe mode".
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 02 December 2009 - 09:25 PM

Hi there,

I could not find a save to file button after I click the report button on the Kaspersky Virus Removal Tool . But I copied and saved the report on notepad, hope it'll help. Otherwise, I have to start the software again.


Autoscan: completed 5 minutes ago (events: 8, objects: 249303, time: 02:34:57)
12/2/2009 5:25:08 PM Task started
12/2/2009 5:28:49 PM Detected: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927
12/2/2009 5:28:49 PM Untreated: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927 Postponed
12/2/2009 7:10:20 PM Detected: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927
12/2/2009 7:10:20 PM Untreated: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927 Postponed
12/2/2009 7:56:39 PM Detected: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927
12/2/2009 8:00:05 PM Deleted: Packed.Win32.TDSS.aa C:\Documents and Settings\USER1\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Quarantine\QUAR1.24927
12/2/2009 8:00:07 PM Task completed

And this is for the Malwarebytes anti-malware log report.
Malwarebytes' Anti-Malware 1.41
Database version: 3279
Windows 5.1.2600 Service Pack 3

12/2/2009 1:35:08 PM
mbam-log-2009-12-02 (13-35-03).txt

Scan type: Full Scan (C:\|)
Objects scanned: 190101
Time elapsed: 1 hour(s), 3 minute(s), 11 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP449\A0125263.exe (Trojan.Downloader) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP449\A0125266.exe (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP449\A0125280.exe (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP449\A0125284.exe (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP450\A0125330.exe (Rogue.RegDefender) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP450\A0125332.exe (Rogue.RegDefender) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP451\A0126481.exe (Trojan.FakeAlert) -> No action taken.
C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP451\A0126492.exe (Trojan.FakeAlert) -> No action taken.


Please advice the next step. Thanks.

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 02 December 2009 - 11:12 PM

How is your computer running now? Are there any more reports/alerts, signs of infection or issues with your browser?
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 03 December 2009 - 12:12 AM

Hi there,

My system seems running fine now, it's not slow anymore.
However, sometimes the internet explorer still opens automatically and an ad is displayed. How can I stop that?
I have turned on the pop up blocker, not working. Thanks.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 03 December 2009 - 05:44 AM

What type of ad is opening?
Confirm your IE version.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 03 December 2009 - 10:49 AM

This is the example of the ad that is opening automatically:

hxxp ://www.shopathome.com/?id=54

When I search something on the search engine, it comes out with the links and when I clicked the link, it did not go to the web page I wanted but to the unfamiliar site like this one:
hxxp ://www.theclickcheck.com/?sub=16278410...253X2JyYW5kaW5n

hxxp ://www.allgive.com/alt/results.php?sea...08b&cid=BPO


The internet explorer version that I have: 8.0.6001.18702

Thanks.

Edited by quietman7, 03 December 2009 - 03:09 PM.


#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 03 December 2009 - 03:15 PM

I asked you what type of ads you were getting, not post active links as we don't know the source and they could lead to infection if someone reading this thread clicked on them. As such, I have disabled them.

Please perform a scan with Eset Online Antiivirus Scanner.
(Requires Internet Explorer to work. If given the option, choose "Quarantine" instead of delete.)
Vista users need to run Internet Explorer as Administrator. Right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run as Administrator from the context menu.
  • Click the green ESET Online Scanner button.
  • Read the End User License Agreement and check the box: YES, I accept the Terms of Use.
  • Click on the Start button next to it.
  • You may receive an alert on the address bar that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then click Insall ActiveX component.
  • A new window will appear asking "Do you want to install this software?"".
  • Answer Yes to download and install the ActiveX controls that allows the scan to run.
  • Click Start.
  • Check Remove found threats and Scan potentially unwanted applications.
  • Click Scan to start. (please be patient as the scan could take some time to complete)
  • If offered the option to get information or buy software. Just close the window.
  • When the scan has finished, a log.txt file will be created and automatically saved in the C:\Program Files\EsetOnlineScanner\ folder.
  • Click Posted Image > Run..., then type or copy and paste everything in the code box below into the Open dialogue box:

    C:\Program Files\EsetOnlineScanner\log.txt
  • Click Ok and the scan results will open in Notepad.
  • Copy and paste the contents of log.txt in your next reply.
Note: Some online scanners will detect existing anti-virus software and refuse to cooperate. You may have to disable the real-time protection components of your existing anti-virus and try running the scan again. If you do this, remember to turn them back on after you are finished.

Then perform a scan with Kaspersky Online Virus Scanner.
alternate link for scan
(Requires free Java Runtime Environment (JRE) to be installed before scanning for malware as ActiveX is no longer being used.)
  • Vista users: need to right-click either the IE or FF Start Menu or Quick Launch Bar icons and select Run As Administrator from the context menu.
  • Read the "Advantages - Requirements and Limitations" then press... the ACCEPT...button.
    The latest program and definition files will be downloaded. It takes time, please be patient, let it finish.
  • Once the files have been downloaded, click on the SETTINGS...button.
    In the scan settings make sure the following are selected:
    • Detect malicious programs of the following categories:
      Viruses, Worms, Trojan Horses, Rootkits
      Spyware, Adware, Dialers and other potentially dangerous programs
    • Scan compound files (doesn't apply to the File scan area):
      Archives
      Mail databases
      Note: By default the above items should already be checked.
    • Click the SAVE...button, if you made any changes.
  • Now under the Scan section on the left: Select My Computer
  • The scan will take a while so be patient and let it run.
  • Once the scan is complete it will display if your system has been infected.
  • Save the scan results as a .txt file and save it to your desktop.
  • Copy and paste the saved scan results file in your next reply.
Note: This scan will not remove any detected file threats but it will show where they are located so they can be cleaned with other tools.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 04 December 2009 - 07:42 PM

Hi there,

Using those 2 anti-virus scanners, there was no objects infected/virus/worms detected.
But the problem that I mentioned on the previous reply was still there in the internet explorer.
Should I just unistall my IE and download the IE again?
Thanks.

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 04 December 2009 - 10:05 PM

Malwarebytes Anti-Malware has been updated to v1.42. Please download and install the most current version from here.
You may have to reboot after updating in order to overwrite any "in use" protection module files.

Update the database through the program's interface (preferable method). Then perform a new Quick Scan in normal mode and check all items found for removal. Don't forgot to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#13 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 08 December 2009 - 01:06 PM

Hi,

I have performed the Malwarebytes scan again. Please find the log attached.
I still have problems with my Internet Explorer though, from the result of the search engine button, when I click it, it brings me to an unfamiliar site. I have to copy paste the web address instead of clicking it.

Malwarebytes' Anti-Malware 1.42
Database version: 3316
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/7/2009 11:38:58 PM
mbam-log-2009-12-07 (23-38-58).txt

Scan type: Quick Scan
Objects scanned: 112660
Time elapsed: 12 minute(s), 9 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 26

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\banijaze.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dadifulu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\delagowu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dimiyina.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dohonomu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fafahiko.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\feyuwaru.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\firiveme.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fivuriji.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gepatoka.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gihizuba.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\giwasora.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\gururalu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jizejaho.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jokiroyu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jonefede.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jowisuja.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\jufumeki.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\juneteyo.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\kotoyera.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\relozora.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rogiwunu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\toromuzi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vibuwizu.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wutejomi.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yonetaso.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.

#14 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,744 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:50 AM

Posted 08 December 2009 - 01:12 PM

Now rescan again with the updated version, but this time perform a Full Scan in normal mode and check all items found for removal. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Please download Sophos Anti-rootkit & save it to your desktop.
alternate download link
Note: If using the vendor's download site you will be asked to register with MySophos so an email containing an activation link can be sent to your email address.

Be sure to print out and read the Sophos Anti-Rookit User Manual and Release Notes.
  • Double-click sar_15_sfx.exe to begin the installation, read the license agreement and click Accept.
  • Allow the default location of C:\Program Files\Sophos\Sophos Anti-Rootkit and click Install.
  • A message will appear "Sophos Anti-Rootkit was successfully installed. Click 'yes' to start it now".
  • Click Yes and allow the driver and its randomly named .tmp file (i.e. F.tmp) to load if asked.
  • If the scan did not start automatically, make sure the following are checked:
    • Running processes
    • Windows Registry
    • Local Hard Drives
  • Click Start scan.
  • Sophos Anti-Rootkit will scan the selected areas and display any suspicious files in the upper panel.
  • When the scan is complete, a pop-up screen will appear with "Rootkit Scan Results". Click OK to continue.
  • Click on the suspicious file to display more information about it in the lower panel which also includes whether the item is recommended for removal.
    • Files tagged as Removable: No are not marked for removal and cannot be removed.
    • Files tagged as Removable: Yes (clean up recommended) are marked for removal by default.
    • Files tagged as Removable: Yes (but clean up not recommended) are not marked for removal because Sophos did not recognize them. These files will require further investigation.
  • Select only items recommended for removal, then click "Clean up checked items". You will be asked to confirm, click Yes.
  • A pop up window will appear advising the cleanup will finish when you restart your computer. Click Restart Now.
  • After reboot, a dialog box displays the files you selected for removal and the action taken.
  • Click Empty list and then click Continue to re-scan your computer a second time to ensure everything was cleaned.
  • When done, go to Posted Image > Run..., then copy and paste this command into the open box: %temp%\sarscan.log
  • This should open the log from the rootkit scan. Please post this log in your next reply. If you have a problem, you can find sarscan.log in C:\Documents and Settings\\Local Settings\Temp\.
Important: Before performing an anti-rootkit (ARK) scan it is recommended to do the following to ensure more accurate results and avoid common issues that may cause false detections.
  • Disconnect from the Internet or physically unplug you Internet cable connection.
  • Clean out your temporary files.
  • Close all open programs, scheduling/updating tasks and background processes that might activate during the scan including the screensaver.
  • Temporarily disable your anti-virus and real-time anti-spyware protection.
  • After starting the scan, do not use the computer until the scan has completed.
  • When finished, re-enable your anti-virus/anti-malware (or reboot) and then you can reconnect to the Internet.
Note: Not all hidden components detected by ARKs are malicious. It is normal for a Firewall, some Anti-virus and Anti-malware software (ProcessGuard, Prevx1, AVG AS), sandboxes, virtual machines and Host based Intrusion Prevention Systems (HIPS) to hook into the OS kernal/SSDT in order to protect your system. SSDT (System Service Descriptor Table) is a table that stores addresses of functions that are used by Windows. Both Legitimate programs and rootkits can hook into and alter this table. You should not be alarmed if you see any hidden entries created by legitimate programs after performing a scan.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#15 oceanandmountain

oceanandmountain
  • Topic Starter

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Local time:03:50 AM

Posted 09 December 2009 - 12:02 PM

Hi,

These are the results. Somehow there are no malicious objects detected but still the problem exist though sometimes it brings me to a right website, most of the time to an unfamiliar site.


Malwarebytes' Anti-Malware 1.42
Database version: 3325
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

12/8/2009 8:18:59 PM
mbam-log-2009-12-08 (20-18-59).txt

Scan type: Full Scan (C:\|)
Objects scanned: 197094
Time elapsed: 1 hour(s), 56 minute(s), 41 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)




Sophos Anti-Rootkit Version 1.5.0 © 2009 Sophos Plc
Started logging on 12/8/2009 at 23:57:13 PM
User "USER1" on computer "DELL"
Windows version 5.1 SP 3.0 Service Pack 3 build 2600 SM=0x100 PT=0x1 Win32
Info: Starting process scan.
Info: Starting registry scan.
Info: Starting disk scan of C: (NTFS).
Hidden: file C:\Program Files\Common Files\Microsoft Shared\Web Components\10\OWC10.DLL
Hidden: file C:\Program Files\ULEAD\Disc 1\ISSetup.dll
Hidden: file C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP447\A0124015.dll
Hidden: file C:\WINDOWS\$NtUninstallKB917734_WMP9$\wmp.dll
Hidden: file C:\Program Files\ULEAD\Disc 1\Crack\keygen.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\ISSetup.dll
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleDesktopSearch\GoogleDesktopSearchSetup_ja.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleDesktopSearch\GoogleDesktopSearchSetup_zh-cn.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleDesktopSearch\GoogleDesktopSearchSetup_zh-tw.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_da.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_de.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_en-GB.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_en.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_es.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_fi.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_fr.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_it.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_ja.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_ko.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_nl.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_no.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_pt-BR.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_ru.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_sv.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_zh-CN.exe
Hidden: file C:\Program Files\ULEAD\Disc 2\WinDVD8 Silver\3rdpartyapp\GoogleToolBar\GoogleToolbarInstaller_zh-TW.exe
Hidden: file C:\Program Files\Broderbund System Guard\TS\Update\TSUdt.exe
Hidden: file C:\Program Files\Adobe\Acrobat 7.0\Designer 7.0\FormDesigner.exe
Hidden: file C:\WINDOWS\$NtUninstallKB967715$\shell32.dll
Hidden: file C:\Program Files\InstallShield Installation Information\{F99F9E24-EE2F-47FD-AEB0-FDB82859B5C9}\ISSetup.dll
Hidden: file C:\Documents and Settings\USER1\Desktop\TFC.exe
Hidden: file C:\Documents and Settings\USER1\My Documents\avz4\avz.exe
Hidden: file C:\WINDOWS\Installer\$PatchCache$\Managed\9040110900063D11C8EF10054038389C\11.0.5614\OWC10.DLL
Hidden: file C:\Documents and Settings\USER1\Local Settings\Application Data\Microsoft\Messenger\martina_letitia@hotmail.com\SharingMetadata\ctan2@hotmail.com\DFSR\Staging\CS{D7165F94-D9A5-8DF7-94B1-202203E3804B}\01\17-{D7165F94-D9A5-8DF7-94B1-202203E3804B}-v1-{6E49E051-C990-4440-B73C-A8CC7277B4F6}-v17-Downloaded.frx
Hidden: file C:\Documents and Settings\USER1\Desktop\avz4\avz.exe
Hidden: file C:\Documents and Settings\USER1\Desktop\Modem Driver\SkypeSetup.exe
Hidden: file C:\Documents and Settings\USER1\Application Data\Mozilla\Firefox\Profiles\cnh8wmfl.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\chrome\content\getPlus_Helper.dll
Hidden: file C:\Documents and Settings\USER1\Application Data\Mozilla\Firefox\Profiles\cnh8wmfl.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\chrome\content\gp.ocx
Hidden: file C:\Documents and Settings\USER1\Application Data\Mozilla\Firefox\Profiles\cnh8wmfl.default\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}\plugins\np_gp.dll
Hidden: file C:\WINDOWS\ServicePackFiles\i386\shell32.dll
Hidden: file C:\WINDOWS\$hf_mig$\KB967715\SP3GDR\shell32.dll
Hidden: file C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP457\A0129051.exe
Hidden: file C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP457\A0129048.exe
Hidden: file C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP457\A0129031.exe
Hidden: file C:\WINDOWS\system32\dllcache\shell32.dll
Hidden: file C:\System Volume Information\_restore{FEA9CFCB-0225-4FCC-8EE5-D642F48C0BCD}\RP457\A0129045.exe
Hidden: file C:\WINDOWS\Installer\$PatchCache$\Managed\9040110900063D11C8EF10054038389C\11.0.8173\OWC10.DLL
Stopped logging on 12/9/2009 at 1:25:05 AM




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users