Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rwinrpex.exe


  • Please log in to reply
6 replies to this topic

#1 Framed

Framed

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:11 AM

Posted 13 September 2006 - 06:14 AM

Is this a new virus/spyware/something?

It shows up in avg and in my delete startup program tool it shows up to start up and when I delete it says deleted but then I reopen program and its there again.

It is also in my processes.

Any help?

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:11 AM

Posted 13 September 2006 - 07:57 AM

I'm not finding any info on this file so its probably bad.

Go to virustotal.com
In the "Select file" box, browse to the location of the suspicious file and submit [upload] it for scanning/analysis.
Post back with the results of the file analysis.

If your running Win XP/2000, download and scan with Ewido Anti-Spyware v4.0 in "SAFE MODE".
Print out the Ewido Install and Scan Instructions.

Then perform this online Virus scan:
[Watch the Address bar in IE. You may receive alerts that "This site might require the following ActiveX control...Click here to install...". Click on that alert and then Click Install ActiveX component.]
Trend Micro Housecall
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 Framed

Framed
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:11 AM

Posted 14 September 2006 - 02:37 AM

AntiVir 7.2.0.16 09.14.2006 TR/Dldr.Agent.DZ.2
Authentium 4.93.8 09.13.2006 no virus found
Avast 4.7.844.0 09.13.2006 no virus found
AVG 386 09.13.2006 Adware Generic.QFU
BitDefender 7.2 09.14.2006 no virus found
CAT-QuickHeal 8.00 09.13.2006 no virus found
ClamAV devel-20060426 09.13.2006 no virus found
DrWeb 4.33 09.13.2006 Adware.ZenoSearch
eTrust-InoculateIT 23.72.124 09.14.2006 no virus found
eTrust-Vet 30.3.3076 09.13.2006 no virus found
Ewido 4.0 09.13.2006 Adware.ZenoSearch
Fortinet 2.82.0.0 09.13.2006 no virus found
F-Prot 3.16f 09.13.2006 no virus found
F-Prot4 4.2.1.29 09.13.2006 no virus found
Ikarus 0.2.65.0 09.13.2006 no virus found
Kaspersky 4.0.2.24 09.14.2006 not-a-virus:AdWare.Win32.ZenoSearch.s
McAfee 4851 09.13.2006 potentially unwanted program Adware-Zeno
Microsoft 1.1560 09.14.2006 no virus found
NOD32v2 1.1755 09.13.2006 no virus found
Norman 5.90.23 09.13.2006 W32/ZenoSearch.AE
Panda 9.0.0.4 09.13.2006 Adware/Maxifiles
Sophos 4.09.0 09.14.2006 no virus found
Symantec 8.0 09.14.2006 no virus found
TheHacker 5.9.8.211 09.14.2006 Adware/ZenoSearch.s
UNA 1.83 09.13.2006 no virus found
VBA32 3.11.1 09.13.2006 AdWare.Win32.ZenoSearch.s
VirusBuster 4.3.7:9 09.13.2006 no virus found

Aditional Information
File size: 168034 bytes
MD5: 9d5674ae18597514fd56a07828b0b55b
SHA1: d8eaca273c31e24f88daa00180ba7cb309ca0cfe

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:11 AM

Posted 14 September 2006 - 04:21 AM

Did you perform the scans I recommended? The analysis shows Ewido detects this file so it should be able to remove it.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 Framed

Framed
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:11 AM

Posted 14 September 2006 - 05:17 AM

Here is the Ewido scan I did in safe mode.

---------------------------------------------------------
ewido anti-spyware - Scan Report
---------------------------------------------------------

+ Created at: 6:06:39 AM 9/14/2006

+ Scan result:



HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1920E150-5D27-4B95-B60B-D68B78928441} -> Adware.ContextuAd : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1920E150-5D27-4B95-B60B-D68B78928441} -> Adware.ContextuAd : Cleaned with backup (quarantined).
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DisplayUtility -> Adware.Delfin : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\drsmartload180a.exe -> Adware.DollarRevenue : Cleaned with backup (quarantined).
C:\dfndrff_15.exe -> Adware.DollarRevenue : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2296428D-C133-4928-B76A-A200FF409572} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A1-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A9-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2296428D-C133-4928-B76A-A200FF409572} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A1-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5345A7A9-805A-4923-B505-86B2FEBA3FE0} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\S-1-5-21-2639492738-2362545447-4120108830-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5929CD6E-2062-44A4-B2C5-2C7E78FBAB38} -> Adware.Generic : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8B6DA27E-7F64-4694-8F8F-DC87AB8C6B22} -> Adware.LinkMaker : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8B6DA27E-7F64-4694-8F8F-DC87AB8C6B22} -> Adware.LinkMaker : Cleaned with backup (quarantined).
C:\WINDOWS\system32\k6440ghqe64e0.dll -> Adware.Look2Me : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\mmxsnet.exe -> Adware.MediaMotor : Cleaned with backup (quarantined).
C:\WINDOWS\unstall.exe -> Adware.MediaMotor : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\NNBar_VCSetup_876075.exe -> Adware.Mirar : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\mit1FF.tmp.cab/NNBar_VCSetup_876075.exe -> Adware.Mirar : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\mit1FF.tmp/NNBar_VCSetup_876075.exe -> Adware.Mirar : Cleaned with backup (quarantined).
C:\WINDOWS\system32\WinNB58.dll -> Adware.Mirar : Cleaned with backup (quarantined).
C:\Program Files\themexp\Themexp.org File\NNWDAB638.EXE -> Adware.NewDotNet : Cleaned with backup (quarantined).
C:\WINDOWS\NDNuninstall6_38.exe -> Adware.NewDotNet : Cleaned with backup (quarantined).
C:\WINDOWS\NDNuninstall7_22.exe -> Adware.NewDotNet : Cleaned with backup (quarantined).
HKU\S-1-5-21-2639492738-2362545447-4120108830-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{4A2AACF3-ADF6-11D5-98A9-00E018981B9E} -> Adware.NewDotNet : Cleaned with backup (quarantined).
C:\WINDOWS\system32\rkinstaller.exe -> Adware.Relevant : Cleaned with backup (quarantined).
C:\Program Files\themexp\Themexp.org File\SetupInst.exe -> Adware.SaveNow : Cleaned with backup (quarantined).
C:\WINDOWS\MirarSetup_876075.exe -> Adware.SaveNow : Cleaned with backup (quarantined).
C:\WINDOWS\system32\diskkey.dll -> Adware.Virtumonde : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{93C6313C-9DB4-4694-8BD0-E378C573A9AD} -> Adware.Virtumonde : Cleaned with backup (quarantined).
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EA32FB3B-21C9-42CC-B8EF-01A9B28EDB0D} -> Adware.Virtumonde : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{93C6313C-9DB4-4694-8BD0-E378C573A9AD} -> Adware.Virtumonde : Cleaned with backup (quarantined).
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EA32FB3B-21C9-42CC-B8EF-01A9B28EDB0D} -> Adware.Virtumonde : Cleaned with backup (quarantined).
HKU\S-1-5-21-2639492738-2362545447-4120108830-500\CLSID\{93C6313C-9DB4-4694-8BD0-E378C573A9AD} -> Adware.Virtumonde : Cleaned with backup (quarantined).
C:\TIGEN001.exe -> Adware.ZenoSearch : Cleaned with backup (quarantined).
C:\WINDOWS\system32\oqdsrego.exe -> Adware.ZenoSearch : Cleaned with backup (quarantined).
C:\WINDOWS\system32\rwinrpex.exe -> Adware.ZenoSearch : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\ShadowMu.rar/ShadowMu-Launcher v2.2.exe -> Backdoor.Sturf : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\ZYRTEC_MU_full.rar/ZYRTEC MU\Launcher.exe -> Backdoor.Sturf : Cleaned with backup (quarantined).
C:\WINDOWS\optimize.exe -> Downloader.Dyfuca.ey : Cleaned with backup (quarantined).
C:\WINDOWS\srvnhjspys.exe -> Downloader.Dyfuca.ey : Cleaned with backup (quarantined).
C:\814.exe -> Downloader.Dyfuca.fb : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\!update.exe -> Downloader.PurityScan.co : Cleaned with backup (quarantined).
C:\Program Files\Common Files\Μicrosoft.NET\rundll.exe -> Downloader.PurityScan.da : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\counter strike stream 1.6 .rar/patch.exe -> Downloader.Small.bwy : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\counter strike stream 1.6 .rar/keygen.exe -> Downloader.Small.dib : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\bl4ck.com -> Downloader.Small.dmj : Cleaned with backup (quarantined).
C:\WINDOWS\system32\a.exe -> Downloader.Small.dmj : Cleaned with backup (quarantined).
C:\kybrdff_15.exe -> Downloader.VB.alg : Cleaned with backup (quarantined).
C:\nwnmff_15.exe -> Downloader.VB.amh : Cleaned with backup (quarantined).
C:\Documents and Settings\Administrator\Local Settings\Temp\counter strike stream 1.6 .rar/crack.exe -> Hijacker.VB.fg : Cleaned with backup (quarantined).
C:\WINDOWS\rzetzmg.exe -> Hijacker.VB.ij : Cleaned with backup (quarantined).
C:\WINDOWS\Downloaded Program Files\USDR6_0001_D08M0404NetInstaller.exe -> Not-A-Virus.Downloader.Win32.WinFixer.l : Ignored.
C:\Documents and Settings\Administrator\Local Settings\Temp\qnhnscix.zip/Loader.exe -> Not-A-Virus.HackTool.Win32.Patcher.c : Ignored.
C:\WINDOWS\uni_ehhhh.exe -> Trojan.VB.tg : Cleaned with backup (quarantined).
C:\WINDOWS\uninst104.exe -> Trojan.VB.tg : Cleaned with backup (quarantined).


::Report end


The file is not in my procceses anymore now, but it is still in my startup program tool.

Was the file bad or ?

#6 Framed

Framed
  • Topic Starter

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Local time:03:11 AM

Posted 14 September 2006 - 05:25 AM

Nevermind, I deleted it from my startup program again and reopened it and even restarted my computer and it isn't showing up anymore.

Thanks alot for helping me.

#7 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:11 AM

Posted 14 September 2006 - 06:33 AM

Your welcome. If everything is working normally again, then the last thing to do is to SET A NEW RESTORE POINT to prevent reinfection from an old restore point. Any malware you picked up could have been saved in System Restore. Since System Restore is a protected directory, your tools can not access it to delete these bad files which can reinfect your system. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to set a new RESTORE POINT:
1. Go to Start > Programs > Accessories > System Tools and click "System Restore".
2. Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
3. Then go to Start > Run and type: Cleanmgr
4. Click "OK".
5. Click the "More Options" Tab.
6. Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users