Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan agent rxj


  • This topic is locked This topic is locked
3 replies to this topic

#1 mboden

mboden

  • Members
  • 122 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 10 April 2011 - 07:50 AM

Got infected w/this one. Found this link: Blade helping a previous poster w/same issue

I've followed the instructions in Blade's first post (was able to successfully download and run Rkill by Grinler and likewise have don same w/Malwarebytes (version 1.50.1.3). The Malwarebytes log is pasted below:

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 6323

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

4/10/2011 8:38:29 AM
mbam-log-2011-04-10 (08-38-29).txt

Scan type: Quick scan
Objects scanned: 168544
Time elapsed: 8 minute(s), 23 second(s)

Memory Processes Infected: 47
Memory Modules Infected: 2
Registry Keys Infected: 8
Registry Values Infected: 67
Registry Data Items Infected: 2
Folders Infected: 4
Files Infected: 77

Memory Processes Infected:
c:\program files\Nero\Nero8\nero backitup\nbkeyscan.exe (Malware.Gen) -> 2184 -> Unloaded process successfully.
c:\program files\common files\Adobe\ARM\1.0\AdobeARM.exe (Malware.Gen) -> 2236 -> Unloaded process successfully.
c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe (Malware.Gen) -> 2340 -> Unloaded process successfully.
c:\program files\quicktime\qttask.exe (Malware.Gen) -> 2416 -> Unloaded process successfully.
c:\program files\iTunes\ituneshelper.exe (Malware.Gen) -> 2596 -> Unloaded process successfully.
c:\documents and settings\Owner\application data\cleanhdd.exe (Malware.Gen) -> 2872 -> Unloaded process successfully.
c:\program files\myclearsearch\myclearsearchsvc.exe (PUP.Zwangi) -> 2888 -> Unloaded process successfully.
c:\program files\facemoods.com\facemoods\1.4.17.7\facemoodssrv.exe (Malware.Gen) -> 2608 -> Unloaded process successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> 3840 -> Unloaded process successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> 4196 -> Unloaded process successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> 4564 -> Unloaded process successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> 4612 -> Unloaded process successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> 4688 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4292 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4516 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4548 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4668 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4672 -> Unloaded process successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> 4684 -> Unloaded process successfully.
c:\WINDOWS\setup.exe (Malware.Gen) -> 4532 -> Unloaded process successfully.
c:\WINDOWS\setup.exe (Malware.Gen) -> 4940 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 1088 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 1992 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 4952 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 6024 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 6072 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 5564 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 3288 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 2024 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 5292 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 6076 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 2700 -> Unloaded process successfully.
c:\program files\quicktime\qttask .exe (Malware.Gen) -> 5256 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 1744 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 4932 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 6032 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 2156 -> Unloaded process successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> 6084 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 4040 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 5272 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 5656 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 1468 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 856 -> Unloaded process successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> 5728 -> Unloaded process successfully.
c:\program files\quicktime\qttask .exe (Malware.Gen) -> 4336 -> Unloaded process successfully.
c:\WINDOWS\iexplarer.exe (Malware.Packer.Gen) -> 6104 -> Unloaded process successfully.
c:\WINDOWS\iexplarer.exe (Malware.Packer.Gen) -> 1880 -> Unloaded process successfully.

Memory Modules Infected:
c:\WINDOWS\system32\mpjqn8o8qv.dll (Trojan.FakeAlert) -> Delete on reboot.
c:\documents and settings\Owner\application data\cleanhdd.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MyClearSearch Helper Service (PUP.Zwangi) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.EXE (Malware.Gen) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.FakeAlert) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.FakeAlert) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\INSTALL.EXE (Malware.Gen) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\HOMEPAGE PROTECTION SERVICE (PUP.Zwangi) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs\C:\PROGRAM FILES\NERO\NERO8\NERO BACKITUP\NBKEYSCAN.EXE (Malware.Gen) -> Value: NBKEYSCAN.EXE -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NBKeyScan (Malware.Gen) -> Value: NBKeyScan -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe ARM (Malware.Gen) -> Value: Adobe ARM -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher (Malware.Gen) -> Value: Adobe Reader Speed Launcher -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iTunesHelper (Malware.Gen) -> Value: iTunesHelper -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cleanhdd (Malware.Gen) -> Value: cleanhdd -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\facemoods (Malware.Gen) -> Value: facemoods -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerb (Malware.Gen) -> Value: MKerb -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerb (Malware.Gen) -> Value: MKerb -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfre (Malware.Gen) -> Value: MKfre -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfre (Malware.Gen) -> Value: MKfre -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKevc (Malware.Gen) -> Value: MKevc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKevc (Malware.Gen) -> Value: MKevc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerJ (Malware.Gen) -> Value: MKerJ -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerJ (Malware.Gen) -> Value: MKerJ -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfrN (Malware.Gen) -> Value: MKfrN -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfrN (Malware.Gen) -> Value: MKfrN -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfrJc (Malware.Gen) -> Value: MKfrJc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKfrJc (Malware.Gen) -> Value: MKfrJc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerGc (Malware.Gen) -> Value: MKerGc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKerGc (Malware.Gen) -> Value: MKerGc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.FakeAlert) -> Value: {B1B220C1-A500-99BD-F110-04B53A2C8952} -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnoc (Malware.Packer.Gen) -> Value: HNUmaIXnoc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnoc (Malware.Packer.Gen) -> Value: HNUmaIXnoc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnwg (Malware.Packer.Gen) -> Value: HNUmaIXnwg -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnwg (Malware.Packer.Gen) -> Value: HNUmaIXnwg -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKbuqc (Malware.Packer.Gen) -> Value: MKbuqc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKbuqc (Malware.Packer.Gen) -> Value: MKbuqc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXntpf (Malware.Packer.Gen) -> Value: HNUmaIXntpf -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXntpf (Malware.Packer.Gen) -> Value: HNUmaIXntpf -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnz9 (Malware.Packer.Gen) -> Value: HNUmaIXnz9 -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnz9 (Malware.Packer.Gen) -> Value: HNUmaIXnz9 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVG_TRAY (Malware.Gen) -> Value: AVG_TRAY -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Media Player ACM (Malware.Gen) -> Value: Windows Media Player ACM -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnqe (Malware.Gen) -> Value: HNUmaIXnqe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnqe (Malware.Gen) -> Value: HNUmaIXnqe -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnd (Malware.Gen) -> Value: HNUmaIXnd -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnd (Malware.Gen) -> Value: HNUmaIXnd -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnrc (Malware.Packer.Gen) -> Value: HNUmaIXnrc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnrc (Malware.Packer.Gen) -> Value: HNUmaIXnrc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnqg (Malware.Gen) -> Value: HNUmaIXnqg -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnqg (Malware.Gen) -> Value: HNUmaIXnqg -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnvZ (Malware.Gen) -> Value: HNUmaIXnvZ -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnvZ (Malware.Gen) -> Value: HNUmaIXnvZ -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnY (Malware.Gen) -> Value: HNUmaIXnY -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnY (Malware.Gen) -> Value: HNUmaIXnY -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnth (Malware.Gen) -> Value: HNUmaIXnth -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnth (Malware.Gen) -> Value: HNUmaIXnth -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnce (Malware.Gen) -> Value: HNUmaIXnce -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnce (Malware.Gen) -> Value: HNUmaIXnce -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXncI (Malware.Gen) -> Value: HNUmaIXncI -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXncI (Malware.Gen) -> Value: HNUmaIXncI -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnVc (Malware.Gen) -> Value: HNUmaIXnVc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnVc (Malware.Gen) -> Value: HNUmaIXnVc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnVK (Trojan.FakeAlert) -> Value: HNUmaIXnVK -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnVK (Trojan.FakeAlert) -> Value: HNUmaIXnVK -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnwpc (Malware.Packer.Gen) -> Value: HNUmaIXnwpc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HNUmaIXnwpc (Malware.Packer.Gen) -> Value: HNUmaIXnwpc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKZSc (Malware.Packer.Gen) -> Value: MKZSc -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKZSc (Malware.Packer.Gen) -> Value: MKZSc -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKaZ (Malware.Packer.Gen) -> Value: MKaZ -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MKaZ (Malware.Packer.Gen) -> Value: MKaZ -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{B1B220C1-A500-99BD-F110-04B53A2C8952} (Trojan.Ertfor) -> Value: {B1B220C1-A500-99BD-F110-04B53A2C8952} -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WINID (Malware.Trace) -> Value: WINID -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\idstrf (Malware.Trace) -> Value: idstrf -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions (Hijack.FolderOptions) -> Value: NoFolderOptions -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Homepage Protection Service\UninstallString (PUP.Zwangi) -> Value: UninstallString -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page (Hijack.StartPage) -> Bad: (http://myclearsearch.com/) Good: (http://www.google.com) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools (PUM.Hijack.Regedit) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
c:\Program\Inet2 (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\browserseek (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\program files\browserseek (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\program files\myclearsearch (PUP.Zwangi) -> Quarantined and deleted successfully.

Files Infected:
c:\program files\Nero\Nero8\nero backitup\nbkeyscan.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\common files\Adobe\ARM\1.0\AdobeARM.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\quicktime\qttask.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\iTunes\ituneshelper.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\cleanhdd.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\myclearsearch\myclearsearchsvc.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\program files\facemoods.com\facemoods\1.4.17.7\facemoodssrv.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\taskmgr.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\wininst.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\setup.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\quicktime\qttask .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\wininst .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\taskmgr .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\program files\quicktime\qttask .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\system32\mpjqn8o8qv.dll (Trojan.FakeAlert) -> Delete on reboot.
c:\Documents and Settings\Owner\Local Settings\temp\debug.exe (Malware.Packer.Gen) -> Delete on reboot.
c:\Documents and Settings\Owner\Local Settings\temp\spoolsv.exe (Malware.Packer.Gen) -> Delete on reboot.
c:\WINDOWS\iexplarer.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\Documents and Settings\Owner\Local Settings\temp\iexplarer.exe (Malware.Packer.Gen) -> Delete on reboot.
c:\Documents and Settings\Owner\Local Settings\temp\nvsvc32.exe (Malware.Packer.Gen) -> Delete on reboot.
c:\program files\AVG\AVG10\avgtray.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\microsoft\windows media\12.0\wmpacm .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\login.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\avp.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\winamp.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\hexdump.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\install.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\cmd.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\svchost.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\bu7dm.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\bu7dm .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\cmd .exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\cmd .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\services.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\avp32.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\cmd.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\all users\application data\6xtK82aF.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\1123515000.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\171.tmp.exe (Trojan.QHosts) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\3371945230.exe (Malware.Packer.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\winamp .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\uuuaiitb.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\hexdump .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\hki6492.exe (Malware.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\inet.exe (Trojan.Agent) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\install .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\brand.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\bu7dm .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\egocarh.exe (Adware.BHO) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\avp .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\awensrcxmo.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\lj2nwsy2holt.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\login .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\myclearsearch-setup.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\neasxwcmor.tmp (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\svchost .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\nsz18D.tmp\browserseek.dll (Adware.Agent.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\nsz18D.tmp\browserseek.exe (Adware.Agent.Gen) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\local settings\temp\stb186.tmp\setup.exe (Adware.Dropper.Gen) -> Quarantined and deleted successfully.
c:\WINDOWS\Temp\jar_cache8388566118092932213.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\taskmgr .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\setup .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\WINDOWS\DMStp2.dll (Trojan.Hiloti) -> Quarantined and deleted successfully.
c:\WINDOWS\wininst .exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
c:\Program\Inet2\inet.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\Program\Inet2\settings.cfg (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\Program\Inet2\inet.dll (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\Program\Inet2\inetupserv.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\Program\Inet2\interop.shdocvw.dll (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\Program\Inet2\settings.cfg_ (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\documents and settings\Owner\application data\cleanhdd.dll (Trojan.Agent) -> Delete on reboot.
c:\documents and settings\all users\application data\browserseek\browserseek174.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\program files\myclearsearch\ShowMsg.exe (PUP.Zwangi) -> Quarantined and deleted successfully.
c:\program files\myclearsearch\uninstall.exe (PUP.Zwangi) -> Quarantined and deleted successfully.

Suggestions appreciated.

BC AdBot (Login to Remove)

 


#2 mboden

mboden
  • Topic Starter

  • Members
  • 122 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 10 April 2011 - 07:59 AM

Also-after the scan, MBAM asked for a reboot. Upon reboot, I get the following message:

"File Name Warning
There is a file or folder on your computer called "C:/Program" which
could cause certain applications to not function correctly. Renaming it
to "C:/Program1" would solve this problem. Would you like to rename it now?"

I haven't "renamed" it or "ignored" it, my two choices.

#3 mboden

mboden
  • Topic Starter

  • Members
  • 122 posts
  • OFFLINE
  •  
  • Local time:06:58 AM

Posted 12 April 2011 - 03:57 PM

This thread is closed and the topic has been moved to here.

Edited by mboden, 12 April 2011 - 03:58 PM.


#4 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,993 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:06:58 AM

Posted 15 April 2011 - 07:09 PM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/topic390568.html you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users