Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

hazikubu.dll (rundll32.exe)


  • This topic is locked This topic is locked
9 replies to this topic

#1 Sashacat

Sashacat

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 05 February 2010 - 08:44 AM

Win XP (Home) SP2.

On Saturday 01-30-10, I noticed the laptop was slower than usual.
Task Mngr listed rundll32.exe, which led me to run an msconfig, where I found entries that didn't belong in Startup.
A search of the file names revealed those several .dll's are indicative of Vundo.

This occurred while I was using AVG Antivirus (free version) and Zone Alarm Firewall (free version).
I was unable to do a System Restore.

Initially AVG found nothing.
I used:
SUPERAntiSpyware,
a-squared Free 4.5,
WinPatrol,
and changed to a-squared Free's firewall (Online Armor).
I was unable to install Malwarebyte's Anti-Malware.

SUPERAntiSpyware found and quarantined:
C:\WINDOWS\SYSTEM32\SEKANAWO.DLL
C:\WINDOWS\SYSTEM32\MOGEVIGA.DLL
C:\WINDOWS\SYSTEM32\PUMEPEGI.DLL
C:\WINDOWS\SYSTEM32\VIPUKUNA.DLL
C:\WINDOWS\SYSTEM32\SUWOFADA.DLL
C:\WINDOWS\SYSTEM32\RATIFUYA.DLL
C:\WINDOWS\SYSTEM32\BAHEZIDO.DLL
C:\WINDOWS\SYSTEM32\DAVAPEFU.DLL
C:\WINDOWS\SYSTEM32\DEZOGEWI.DLL
C:\WINDOWS\SYSTEM32\FISIBEZU.DLL


Several days later, AVG finally found (and moved to the Virus Vault) infected items.
When I viewed the scan results to see the file names, all items found were restore points.
I've already emptied the virus vault, and used CCleaner (set on "secure file deletion, Gutmann 35 passes).
In addition, I turned off System Restore (deleting all restore points).

Each day, I've been checking Task Mngr and Process Explorer to see what processes were running.

The tell-tale rundll32.exe is running AGAIN in Task Mngr.
Since Task Mngr doesn't show the command line for the rundll32.exe,
I again checked Process Explorer to view the command line for the rundll32.exe, which shows:
C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\hazikubu.dll",d

My computer is set to SHOW HIDDEN FILES.
I've checked the C:\Windows\System32 directory, and the hazikubu.dll file doesn't show up.
I checked msconfig, and the only item checked to run at boot is AVG.
(I had to uninstall the Online Armor Firewall, because it used up too much system resources and slowed down my computer to the point that I couldn't use the computer.)

This morning's AVG scan found nothing.

When I ran regedit, and searched for hazikubu, it found one entry in:
HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5603\
000 (Name), REG_SZ (Type), hazikubu*.*(Data)


How do I remove the last remaining item, the hazikubu.dll ?
My experience in editing the registry is limited.

Thanks.
If we don't change the direction we are going,
We are likely to end up where we are headed.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:11 AM

Posted 09 February 2010 - 12:36 PM

Hello,sorry you have been lost in the mix..
Please run these next. If you have Spybot installed temporarily disable it.
Next run ATF:
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Please download ATF Cleaner by Atribune & save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.

Next run MBAM (MalwareBytes):

NOTE: Before saving MBAM please rename it to zztoy.exe....now save it to your desktop.

Please download Malwarebytes Anti-Malware and save it to your desktop.

alternate download link

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 Sashacat

Sashacat
  • Topic Starter

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 09 February 2010 - 01:22 PM

boopme, thank you for taking the time to reply :thumbsup:

Initially I was unable to get Malwarebytes' Antimalware to install (I kept having a "Destination Component" error during the Malwarebyte's install attempt....). After several days of searching, I finally found a post (on the Malwarebytes' forum) that suggested the "Destination Component" error was the result of an HP printer (yes, I have an HP printer), and I tried what the post suggested, which was put the HP printer install cd in, go to the setup folder, and run a certain .msi file, and that resolved my "Destination Component" error issue, and was FINALLY able to install Malwarebytes' Antimalware.

When I scanned with Malwarebytes' (a FULL scan, instead of just the "Quick Scan"), it found several infected files (that SUPERAnti-Spyware did NOT find), and it got rid of them.

I scanned again with SUPERAnti-Spyware and it finally came up "clean" (no infected files found).

Scanned again with Malwarebytes' and it finally came up "clean" also.

I used to have ATF Cleaner and I used to use it regularly. Then I found CCleaner, and found that it did a much better job. I use CCleaner now (on a daily basis).
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 01/31/2010 at 07:55 PM

Application Version : 4.33.1000

Core Rules Database Version : 4541
Trace Rules Database Version: 1978

Scan type : Quick Scan
Total Scan Time : 01:06:06

Memory items scanned : 398
Memory threats detected : 3
Registry items scanned : 448
Registry threats detected : 12
File items scanned : 9007
File threats detected : 11

Adware.Vundo/Variant-[Fixed]
C:\WINDOWS\SYSTEM32\SEKANAWO.DLL
C:\WINDOWS\SYSTEM32\SEKANAWO.DLL
C:\WINDOWS\SYSTEM32\MOGEVIGA.DLL
C:\WINDOWS\SYSTEM32\PUMEPEGI.DLL
C:\WINDOWS\SYSTEM32\VIPUKUNA.DLL

Adware.Vundo/Variant-EC
C:\WINDOWS\SYSTEM32\SUWOFADA.DLL
C:\WINDOWS\SYSTEM32\SUWOFADA.DLL
HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler#{1f281130-6679-4f1a-8659-b31032c7fe28}
HKCR\CLSID\{1F281130-6679-4F1A-8659-B31032C7FE28}
HKCR\CLSID\{1f281130-6679-4f1a-8659-b31032c7fe28}\InprocServer32
HKCR\CLSID\{1f281130-6679-4f1a-8659-b31032c7fe28}\InprocServer32#ThreadingModel
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad#bifojeruz
C:\WINDOWS\SYSTEM32\RATIFUYA.DLL

Adware.Vundo Variant
C:\WINDOWS\SYSTEM32\BAHEZIDO.DLL
C:\WINDOWS\SYSTEM32\BAHEZIDO.DLL

Adware.Tracking Cookie
C:\Documents and Settings\Lisa Hill\Cookies\lisa hill@atdmt[2].txt

Adware.MyWebSearch/FunWebProducts
HKCR\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}
HKCR\CLSID\{147A976F-EEE1-4377-8EA7-4716E4CDD239}\TreatAs
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\ProxyStubClsid32
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib
HKCR\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}\TypeLib#Version

Adware.Vundo/Variant-Senorita
C:\WINDOWS\SYSTEM32\DAVAPEFU.DLL

Adware.Vundo/Variant
C:\WINDOWS\SYSTEM32\DEZOGEWI.DLL
C:\WINDOWS\SYSTEM32\FISIBEZU.DLL

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Malwarebytes' Anti-Malware 1.44
Database version: 3694
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

2/5/2010 3:52:39 PM
mbam-log-2010-02-05 (15-52-39).txt

Scan type: Full Scan (C:\|)
Objects scanned: 177850
Time elapsed: 1 hour(s), 2 minute(s), 45 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 11
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\minibugtransporter.minibugtransporterx.1 (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{04a38f6b-006f-4247-ba4c-02a139d5531c} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Typelib\{3c2d2a1e-031f-4397-9614-87c932a848e0} (Adware.Minibug) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{67450775-3b18-49b1-aa83-0e010f07f4df} (Trojan.Dropper) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{69b3ebfa-0015-4914-9312-e7758eacfac1} (Trojan.Dropper) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{30de9920-2e84-40a2-88a5-b8d256e15101} (Trojan.Dropper) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\seneka (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\Program Files\Common Files\ACD Systems\Filters\EITCC_LinearBlur.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\MenuExt\&Search\(default) (Adware.Hotbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform\funwebproducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Program Files\Common Files\ACD Systems\Filters\EITCC_LinearBlur.dll (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Application Data\sysReserve.ini (Malware.Trace) -> Quarantined and deleted successfully.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/05/2010 at 07:33 PM

Application Version : 4.33.1000

Core Rules Database Version : 4560
Trace Rules Database Version: 2372

Scan type : Complete Scan
Total Scan Time : 03:18:33

Memory items scanned : 399
Memory threats detected : 0
Registry items scanned : 5583
Registry threats detected : 0
File items scanned : 21693
File threats detected : 1

Trojan.Agent/Gen-Nullo[Short]
C:\SYSTEM VOLUME INFORMATION\_RESTORE{970BF179-4538-46F7-A171-F13CFC09440B}\RP143\A0085882.DLL

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/05/2010 at 11:03 PM

Application Version : 4.33.1000

Core Rules Database Version : 4560
Trace Rules Database Version: 2372

Scan type : Complete Scan
Total Scan Time : 00:01:02

Memory items scanned : 1
Memory threats detected : 0
Registry items scanned : 0
Registry threats detected : 0
File items scanned : 0
File threats detected : 0

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Malwarebytes' Anti-Malware 1.44
Database version: 3694
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

2/6/2010 6:25:29 AM
mbam-log-2010-02-06 (06-25-28).txt

Scan type: Full Scan (C:\|)
Objects scanned: 176173
Time elapsed: 1 hour(s), 40 minute(s), 3 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/06/2010 at 07:01 AM

Application Version : 4.33.1000

Core Rules Database Version : 4560
Trace Rules Database Version: 2372

Scan type : Custom Scan
Total Scan Time : 00:31:57

Memory items scanned : 403
Memory threats detected : 0
Registry items scanned : 5574
Registry threats detected : 0
File items scanned : 3470
File threats detected : 0

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

The tell-tale rundll32.exe is running AGAIN in Task Mngr.
Since Task Mngr doesn't show the command line for the rundll32.exe,
I again checked Process Explorer to view the command line for the rundll32.exe, which shows:
C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\hazikubu.dll",d

My computer is set to SHOW HIDDEN FILES.
I've checked the C:\Windows\System32 directory, and the hazikubu.dll file doesn't show up.
I checked msconfig, and the only item checked to run at boot is AVG.

This morning's AVG scan found nothing.

When I ran regedit, and searched for hazikubu, it found one entry in:
HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5603\
000 (Name), REG_SZ (Type), hazikubu*.*(Data)

How do I remove the last remaining item, the hazikubu.dll ?
My experience in editing the registry is limited.

I don't know if it's a matter of changing the value in the registry for that entry, or simply deleting that entry in the registry. There is no hazikubu file left on my hard drive, but that one entry in the registry remains. Thanks for your help.
If we don't change the direction we are going,
We are likely to end up where we are headed.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:11 AM

Posted 09 February 2010 - 02:36 PM

Hello, I feel the safest way is to see if the tools find it first.
If you have Spybot installed temporarily disable it.
Both ,MBAm and SAS need a slight upidate. the newest databases may contain the signtures for removal.. Please update and run MBAm in normal then SAS in Safe mode.

Follow with an Online scan..

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 Sashacat

Sashacat
  • Topic Starter

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 09 February 2010 - 07:13 PM

boopme:
I ran the Eset scan. No Threats Found.
Scanned Files: 125918
Infected Files: 0
Cleaned Files: 0
Total Scan Time: 03:24:35
Scan Status: Finished

There was no "List of Found Threats" or option to "Export to text file".
I saved a screen capture of the "No Threats Found" results if you need it.

This morning I updated definitions for both SUPERAnti-Spyware and Malwarebytes' Antimalware.
I will do as you recommended and run a scan of each and reply with the results of each.

Thanks.
If we don't change the direction we are going,
We are likely to end up where we are headed.

#6 Sashacat

Sashacat
  • Topic Starter

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 10 February 2010 - 08:36 AM

boopme:

Scan results for the latest MBAm and SAS are shown below (no infections found on either).
Also, AVG's scan this morn'g found ZERO infections as well.



Malwarebytes' Anti-Malware 1.44
Database version: 3717
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

2/9/2010 11:32:09 PM
mbam-log-2010-02-09 (23-32-09).txt

Scan type: Full Scan (C:\|)
Objects scanned: 177387
Time elapsed: 1 hour(s), 40 minute(s), 10 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/10/2010 at 01:02 AM

Application Version : 4.33.1000

Core Rules Database Version : 4569
Trace Rules Database Version: 2372

Scan type : Complete Scan
Total Scan Time : 01:27:33

Memory items scanned : 375
Memory threats detected : 0
Registry items scanned : 5573
Registry threats detected : 0
File items scanned : 21439
File threats detected : 0

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

rundll32.exe is running in Task Mngr.
Process Explorer confirms the command line is:
C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\hazikubu.dll",d

This is the entry shown in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru\5603\
000 (Name), REG_SZ (Type), hazikubu*.*(Data)


I AM able to end task on that process either in Task Mngr., or kill the process in Process Explorer, but it just comes back again, because of that one entry in the registry.

Is it a matter of changing the value for that entry, or should I just delete that entry in the registry ?

Thanks.
If we don't change the direction we are going,
We are likely to end up where we are headed.

#7 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:11 AM

Posted 10 February 2010 - 11:06 PM

Welll that is the malware hazikubu.dll. I hate to tell some one to delete a registry key, as it is dangerous and can render the PC unbootable. I do not know your skill level. So it is your choice.


Always back up your registry before making any changes.

Go to Start » Run and type: regedit
Click OK.
On the left side, click to highlight My Computer at the top.
Go up to File » Export
Make sure in that window there is a tick next to "All" under Export Branch.
Leave the "Save As Type" as "Registration Files".
Under "Filename" put RegBackup.
Choose to save it to C:\
Click save and then go to File » Exit.

Or you can download and use ERUNTwhich is an excellent free tool that allows you to to take a snapshot (backup) of your registry before making changes and restore it when needed.

I would for safety sake post these logs and have them remove it.
You will need to Download and Run DDS which will create a Pseudo HJT Report as part of its log..
If for some reason you cannot perform a step, move on to the next.
Please follow this guide. go and do steps 6 thru 8 ,, Preparation Guide For Use Before Using Hijackthis. Then go here HijackThis Logs and Virus/Trojan/Spyware/Malware Removal ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#8 Sashacat

Sashacat
  • Topic Starter

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 15 February 2010 - 03:10 PM

boopme, many thanks for your reply.
I too share your concern about deleting registry keys.
I am NOT an old hand at making changes to the registry.

I've been reading, and re-reading your reply, and the "Preparation Guide",
as well as the "Detailed Info" and "FAQ's" for ERUNT, where I found the following information:

http://www.larshederer.homepage.t-online.de/erunt/faq.htm
Question: Should I disable Windows XP’s System Restore function when using ERUNT?
Answer: Yes!


http://www.larshederer.homepage.t-online.de/erunt/erunt.txt
Note: The "Export registry" function in Regedit is USELESS (!) for
making a complete backup of the registry. Neither does it export the
whole registry (for example, no information from the "SECURITY" hive
is saved), nor can the exported file be used later to replace the
current registry with the old one. Instead, if you re-import the file,
it is merged with the current registry without deleting anything that
has been added since the export, leaving you with an absolute mess of
old and new entries.



I have downloaded both ERUNT and DDS.

Crossing my fingers, wish me luck :thumbsup: I will report back as instructed.
If we don't change the direction we are going,
We are likely to end up where we are headed.

#9 Sashacat

Sashacat
  • Topic Starter

  • Members
  • 372 posts
  • OFFLINE
  •  
  • Local time:10:11 AM

Posted 15 February 2010 - 04:26 PM

I did a registry backup with ERUNT and saved it to the default location.

I ran DDS as instructed.

I did NOT make any changes to the registry. (Am in chicken-heart mode) :thumbsup:



I posted the DDS log here (as instructed):

http://www.bleepingcomputer.com/forums/t/296034/hazikubudll-rundll32exe-malware/
If we don't change the direction we are going,
We are likely to end up where we are headed.

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:11 AM

Posted 15 February 2010 - 04:52 PM

Ok, this looks good and the DDS was the safer choice I am glad you made that... I will review the other info there with my colleagues ,thanks.

Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users