Prompt for MediaPass setup

April 3, 2010 at 19:29:45
Specs: Windows XP
Downloaded files / scanned will not run.
Running behind firewall, Symantic and Spybot.
Searched all drives and did not find any files.
I always get a popup to install MediaPass for Windows Media Player.
Also refers to Dymanet.
I cancel without installing anything.
Then a browser window pops up with this address -
about:/zerror.php?type=403&v_url=http%3A//funsiteshere.com/redir.php%3Fo%3Ddymanet%26kw%3Dreg&r=1 -
and navigation to webpage was cancelled.
So how to stop this crap?
Thanks

See More: Prompt for MediaPass setup

Report •

#1
April 3, 2010 at 19:35:50
Its adware, please run the following scans and post their logs.

Download DDS and save it to your desktop.
DDS.scr


Disable any script blocker if your Anti-Virus/Anti-Malware has it.
Once downloaded you can disconnect from the Internet and disable your Ant-Virus temporarily if needed.
Then double click dds.scr to run the tool.
When done, the DDS.txt will open.
Click Yes at the next prompt for Optional Scan.

When done, DDS will open two (2) logs:
1. DDS.txt
2. Attach.txt (do not zip just copy/paste)

Save both reports to your desktop then post them please.

Please download Malwarebytes' Anti-Malware from one of these sites:

MalwareBytes1

MalwareBytes2

Rename the setup file, mbam-setup.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename mbam-setup.exe to tool.exe> click save.

1. Double Click tool.exe to install the application.
2. Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select "Perform Quick Scan", then click Scan. The scan may take some time to finish,so please be patient.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Make sure that everything found is checked, and click Remove Selected.
7. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.
8. The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
9. Copy&Paste the entire report in your next reply.


Report •

#2
April 3, 2010 at 20:06:21
The DDS file is noted as an AutoCad script when I go to run it.

Report •

#3
April 3, 2010 at 20:30:40
Run this tool then try to run DDS again, then if DDS will not run try to run Malwarebytes

Please download exeHelper to your desktop.
Double-click on exeHelper.com to run the fix.
A black window should pop up, press any key to close once the fix is completed.
Post the contents of exehelperlog.txt (Will be created in the directory where you ran exeHelper.com, and should open at the end of the scan)
Note: If the window shows a message that says "Error deleting file", please re-run the program before posting a log - and post the two logs together (they will both be in the one file).


Report •

Related Solutions

#4
April 3, 2010 at 20:52:26
exeHelper by Raktor
Build 20100329
Run at 11:35:55 on 04/04/10
Now searching...
Checking for numerical processes...
Checking for sysguard processes...
Checking for bad processes...
Checking for bad files...
Checking for bad registry entries...
Resetting filetype association for .exe
Resetting filetype association for .com
Resetting userinit and shell values...
Resetting policies...
--Finished--
------------------------------------------------------
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

4/4/2010 11:26:11 AM
mbam-log-2010-04-04 (11-26-11).txt

Scan type: Quick scan
Objects scanned: 103573
Time elapsed: 7 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 6
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Worm.Allaple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\0ee94fd3-bee8-75bf-7dbe-7e2c97567382 (Adware.Adrotator) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AppDataLow\HavingFunOnline (Adware.BHO.FL) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{cfadd3ab-dc1b-fd2c-7bd6-2deb3fd66489} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{cfadd3ab-dc1b-fd2c-7bd6-2deb3fd66489} (Trojan.BHO) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\RECYCLER\S-1-5-21-299502267-1715567821-839522115-1003\Dc7.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-299502267-1715567821-839522115-1003\Dc8.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-299502267-1715567821-839522115-1003\Dc9.exe (Adware.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\0ee94fd3-bee8-75bf-7dbe-7e2c97567382.exe (Adware.Adrotator) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\f3593c23-2b74-a8d0-de60-aaac28b936ed.dll (Trojan.BHO) -> Delete on reboot.
-----------------------------------------------------
repeated Quick Scan
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

4/4/2010 11:50:09 AM
mbam-log-2010-04-04 (11-50-09).txt

Scan type: Quick scan
Objects scanned: 103409
Time elapsed: 9 minute(s), 30 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)


Report •

#5
April 3, 2010 at 21:04:49

Please download Combofix with internet explorer instead of any other browser if possible, if not possible use the browser you are currently using.

Remember..your Antivirus and any realtime antispyware program the you may have must be turned off or disabled before running ComboFix. The clickable link "This Link" in the ComboFix tutorial will help you get them disabled.

Please download ComboFix to the desktop from one of the following links:

ComboFix

Rename the setup file, combofix.exe, before you download it. To do that once the "enter name of file to save to" box appears as the download begins in the filename box rename combofix.exe to to Combo-Fix> click save.
Note: In the event you already have Combofix, this is a new version that I need you to download. It is important that it is saved and renamed following this process directly to your desktop.
If you are using Firefox, make sure that your download settings are as follows:
Tools->Options->Main tab
Set to "Always ask me where to Save the files".

Please do not rename Combofix to other names, but only to the one indicated.
Close any open browsers.
Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
-----------------------------------------------------------
Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before performing a scan. They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Click on This Link to see a list of programs that should be disabled. The list is not all inclusive. If yours is not listed and you don't know how to disable it, please ask.
-----------------------------------------------------------
Close any open browsers.
WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
-----------------------------------------------------------
Double click on Combo-Fix.exe & follow the prompts.
Install the recovery console when asked.
When finished, it will produce a report for you.
Please post the "C:\Combo-Fix.txt" .
Note: Do not mouseclick combo-fix's window while it's running. That may cause it to hang.


Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

Please do not install any new programs or update anything unless told to do so while we are fixing your problem.


Report •

#6
April 3, 2010 at 21:48:52
ComboFix 10-04-03.02 - john 04/04/2010 12:29:17.1.1 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1033.18.2047.1456 [GMT 8:00]
Running from: c:\documents and settings\john\Desktop\Combo-Fix.exe
AV: Symantec AntiVirus Corporate Edition *On-access scanning disabled* (Updated) {FB06448E-52B8-493A-90F3-E43226D3305C}
.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\windows\AppPatch\AcAdProc.dll
c:\windows\struct~.ini

.
((((((((((((((((((((((((( Files Created from 2010-03-04 to 2010-04-04 )))))))))))))))))))))))))))))))
.

2010-04-04 03:10 . 2010-04-04 03:10 -------- d-----w- c:\documents and settings\john\Application Data\Malwarebytes
2010-04-04 03:09 . 2010-03-29 07:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-04 03:09 . 2010-04-04 03:09 -------- d-----w- c:\documents and settings\All Users\Application Data\Malwarebytes
2010-04-04 03:09 . 2010-03-29 07:24 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-04 01:49 . 2010-04-04 01:49 -------- d-----w- c:\documents and settings\john\Application Data\Uniblue
2010-04-03 21:28 . 2010-04-03 21:28 -------- d-----w- c:\program files\Common Files\L&H
2010-04-03 21:27 . 2010-04-03 21:45 -------- d-----w- c:\program files\Microsoft Works
2010-04-03 12:00 . 2010-04-03 12:00 -------- d-----w- c:\documents and settings\john\Application Data\com.adobe.mauby.4875E02D9FB21EE389F73B8D1702B320485DF8CE.1
2010-04-03 11:51 . 2010-04-03 11:51 -------- d-----w- c:\documents and settings\john\Application Data\GibbHill Properties Ltd
2010-04-03 05:15 . 2010-04-03 05:15 -------- d-----w- c:\documents and settings\Default User\Local Settings\Application Data\Adobe
2010-04-03 05:04 . 2010-04-03 05:04 86016 ----a-w- c:\documents and settings\All Users\Application Data\NOS\Adobe_Downloads\arh.exe
2010-04-03 05:04 . 2010-04-03 09:26 -------- d-----w- c:\documents and settings\All Users\Application Data\NOS
2010-04-02 08:20 . 2010-04-02 08:20 -------- d-----w- c:\program files\Windows Installer Clean Up
2010-04-02 08:20 . 2010-04-03 22:21 -------- d-----w- c:\program files\MSECACHE
2010-03-18 00:48 . 2010-03-18 00:48 -------- d-----w- c:\program files\½»ÐÐÍøÒø°²È«ÊäÈëÈí¼þ
2010-03-14 21:02 . 2010-03-14 21:02 -------- d-----w- c:\documents and settings\john\Local Settings\Application Data\PCHealth
2010-03-10 23:40 . 2010-03-18 02:48 -------- d-----w- c:\documents and settings\john\Local Settings\Application Data\Temp
2010-03-10 23:40 . 2010-03-10 23:40 -------- d-----w- c:\documents and settings\NetworkService\Local Settings\Application Data\Google
2010-03-10 23:35 . 2010-03-10 23:35 -------- d-----w- c:\documents and settings\LocalService\Local Settings\Application Data\Google
2010-03-10 23:03 . 2010-03-10 23:03 -------- d-----w- c:\program files\Bonjour
2010-03-10 03:33 . 2010-03-10 03:33 -------- d-----w- c:\documents and settings\All Users\Application Data\TEMP
2010-03-10 02:34 . 2010-03-10 02:34 72488 ----a-w- c:\documents and settings\All Users\Application Data\Apple Computer\Installer Cache\iTunes 9.0.3.15\SetupAdmin.exe
2010-03-05 06:31 . 2010-03-05 06:31 439816 ----a-w- c:\documents and settings\john\Application Data\Real\Update\setup3.10\setup.exe

.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-04 04:37 . 2009-01-07 21:02 -------- d-----w- c:\program files\Symantec AntiVirus
2010-04-04 04:15 . 2009-01-07 11:26 102752 ----a-w- c:\documents and settings\john\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
2010-04-03 12:15 . 2009-01-10 11:20 -------- d-----w- c:\documents and settings\john\Application Data\ZoomBrowser EX
2010-04-03 12:05 . 2009-01-11 00:32 -------- d-----w- c:\documents and settings\john\Application Data\AdobeUM
2010-04-03 12:05 . 2009-01-07 05:08 -------- d-----w- c:\program files\Common Files\Adobe
2010-04-02 08:28 . 2009-01-11 04:57 411368 ----a-w- c:\windows\system32\deploytk.dll
2010-04-02 08:13 . 2009-01-11 04:56 -------- d-----w- c:\program files\Java
2010-03-24 04:05 . 2009-12-13 01:21 -------- d-----w- c:\documents and settings\All Users\Application Data\Youdao
2010-03-17 21:45 . 2009-02-25 23:09 37027 ----a-w- c:\windows\atmoUn.exe
2010-03-10 23:35 . 2009-01-07 15:17 -------- d-----w- c:\program files\Google
2010-03-10 23:05 . 2009-01-10 22:29 -------- d-----w- c:\program files\iPod
2010-03-10 23:04 . 2009-01-10 00:42 -------- d-----w- c:\program files\Common Files\Apple
2010-03-10 23:03 . 2009-01-10 22:28 -------- d-----w- c:\program files\QuickTime
2010-03-10 22:24 . 2009-01-07 14:53 -------- d-----w- c:\program files\Microsoft Silverlight
2010-02-27 20:03 . 2009-06-28 00:54 -------- d-----w- c:\documents and settings\john\Application Data\ppStream
2010-02-13 12:33 . 2009-12-14 00:06 -------- d-----w- c:\documents and settings\All Users\Application Data\Thunder Network
2010-02-02 22:07 . 2010-02-02 22:07 503808 ----a-w- c:\documents and settings\john\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5c363b17-n\msvcp71.dll
2010-02-02 22:07 . 2010-02-02 22:07 499712 ----a-w- c:\documents and settings\john\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5c363b17-n\jmc.dll
2010-02-02 22:07 . 2010-02-02 22:07 348160 ----a-w- c:\documents and settings\john\Application Data\Sun\Java\Deployment\SystemCache\6.0\54\1a209876-5c363b17-n\msvcr71.dll
2010-02-02 22:07 . 2010-02-02 22:07 61440 ----a-w- c:\documents and settings\john\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7e39f469-n\decora-sse.dll
2010-02-02 22:07 . 2010-02-02 22:07 12800 ----a-w- c:\documents and settings\john\Application Data\Sun\Java\Deployment\SystemCache\6.0\17\6d0ad391-7e39f469-n\decora-d3d.dll
2010-01-25 00:02 . 2010-01-17 00:42 2172368 ----a-w- c:\documents and settings\All Users\Application Data\CCTV\tv\Reli_CCTV.dll
2010-01-18 00:07 . 2010-01-18 00:07 3407072 ----a-w- c:\documents and settings\All Users\Application Data\Jlcm\update\FrameUpdate.exe
2010-01-17 22:30 . 2010-01-17 22:30 468480 ----a-w- c:\documents and settings\All Users\Application Data\PPLive\test_vod1.dll
2010-01-06 05:11 . 2010-02-13 12:43 390960 ----a-w- c:\documents and settings\All Users\Application Data\Thunder Network\Thunder_A30B0AF7-D81B-464e-B4E4-4B6DF996FB46_\Components\DownloadLibDll\md_p_1.0.20\xldcagent.dll
.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"msnmsgr"="c:\program files\Windows Live\Messenger\msnmsgr.exe" [2009-07-26 3883856]
"YodaoDict"="d:\program files\DeskDict2\RunDict.exe" [2010-03-04 370128]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-01-19 68856]
"ctfmon.exe"="c:\windows\system32\ctfmon.exe" [2008-04-14 15360]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-04 208952]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE" [2004-08-04 455168]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2005-05-18 5562368]
"nwiz"="nwiz.exe" [2005-05-18 1495040]
"AzMixerSel"="c:\program files\Realtek\InstallShield\AzMixerSel.exe" [2005-04-26 45056]
"High Definition Audio Property Page Shortcut"="HDAShCut.exe" [2005-01-07 61952]
"RTHDCPL"="RTHDCPL.EXE" [2009-04-10 17879552]
"ccApp"="c:\program files\Common Files\Symantec Shared\ccApp.exe" [2005-06-02 48752]
"vptray"="c:\progra~1\SYMANT~1\VPTray.exe" [2005-06-23 85696]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2009-11-10 417792]
"iTunesHelper"="d:\itunes\iTunesHelper.exe" [2010-02-15 141608]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2010-02-18 248040]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]

c:\documents and settings\All Users\Start Menu\Programs\Startup\
Acrobat Assistant.lnk - c:\program files\Adobe\Acrobat 6.0\Distillr\acrotray.exe [2003-10-24 217194]
HP Digital Imaging Monitor.lnk.disabled [2009-1-10 1808]
HP Image Zone Fast Start.lnk.disabled [2009-1-10 798]
system.bat [2010-3-10 606]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe"

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"d:\\Program Files\\Ares\\Ares.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\wlcsdk.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"d:\\iTunes\\iTunes.exe"=
"d:\\Ares\\Ares.exe"=

R3 Alidevice;Alidevice;c:\windows\system32\drivers\alidevice.sys [8/27/2009 8:32 AM 6656]
S3 Ambfilt;Ambfilt;c:\windows\system32\drivers\Ambfilt.sys [5/3/2009 10:08 PM 1684736]
S3 havabus;HAVA Bus Enumerator;c:\windows\system32\DRIVERS\havabus.sys --> c:\windows\system32\DRIVERS\havabus.sys [?]
S3 havanet;HAVA NDIS Protocol Driver;c:\windows\system32\DRIVERS\havanet.sys --> c:\windows\system32\DRIVERS\havanet.sys [?]
S3 HAVATV;Hava Video Device;c:\windows\system32\DRIVERS\HAVATV.sys --> c:\windows\system32\DRIVERS\HAVATV.sys [?]
S3 HavaTV_10;Hava Remote Video Device;c:\windows\system32\DRIVERS\HavaTV_10.sys --> c:\windows\system32\DRIVERS\HavaTV_10.sys [?]
S3 SavRoam;SAVRoam;c:\program files\Symantec AntiVirus\SavRoam.exe [6/23/2005 7:27 PM 124608]

--- Other Services/Drivers In Memory ---

*Deregistered* - EraserUtilDrvI9
.
Contents of the 'Scheduled Tasks' folder

2009-07-03 c:\windows\Tasks\AppleSoftwareUpdate.job
- c:\program files\Apple Software Update\SoftwareUpdate.exe [2007-08-29 04:34]

2010-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-10 23:35]

2010-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-03-10 23:35]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://msn.com/
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Connection Wizard,ShellNext = wmplayer.exe //ICWLaunch
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_96D6FF0C6D236BF8.dll/cmsidewiki.html
DPF: {A3CD7F74-93C9-4BC4-B892-CCDF1514F714} - hxxps://pbank.95559.com.cn/personbank/ocx/safe_bankcomm.cab
.
.
------- File Associations -------
.
.scr=AutoCADScriptFile
.
- - - - ORPHANS REMOVED - - - -

AddRemove-Autodesk Express Viewer - c:\progra~1\Autodesk\AUTODE~1\Setup.exe

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-04-04 12:37
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden autostart entries ...

scanning hidden files ...

scan completed successfully
hidden files: 0

**************************************************************************
.
--------------------- DLLs Loaded Under Running Processes ---------------------

- - - - - - - > 'explorer.exe'(3292)
c:\windows\system32\WININET.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Common Files\Symantec Shared\ccSetMgr.exe
c:\program files\Common Files\Symantec Shared\ccEvtMgr.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Symantec AntiVirus\DefWatch.exe
c:\program files\Java\jre6\bin\jqs.exe
c:\program files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
c:\windows\system32\nvsvc32.exe
c:\windows\system32\HPZipm12.exe
c:\program files\Symantec AntiVirus\Rtvscan.exe
c:\program files\Canon\CAL\CALMAIN.exe
c:\windows\system32\wscntfy.exe
c:\windows\RTHDCPL.EXE
d:\program files\DeskDict2\YodaoDict.exe
.
**************************************************************************
.
Completion time: 2010-04-04 12:44:14 - machine was rebooted
ComboFix-quarantined-files.txt 2010-04-04 04:44

Pre-Run: 2,247,147,520 bytes free
Post-Run: 2,410,225,664 bytes free

WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect

- - End Of File - - 294CBD3ED091651A5607A7D6F8AE85A1


Report •

#7
April 3, 2010 at 22:27:44
This file or folder c:\program files\½»ÐÐÍøÒø°²È«ÊäÈëÈí¼þ is not normal but I can find no info on it. There is a chance that it is part of YodaoDict. Are you familiar with it.

Open Notepad and copy/paste everything between the X's into it and make sure the first word (such as KILLALL, File, Folder, Registry etc.) is at the very top of the page.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
DIRLOOK::
c:\program files\½»ÐÐÍøÒø°²È«ÊäÈëÈí¼þ

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Go to File on the top bar and choose" Save As", Change the "Save As Type" to All Files, Name it CFScript.txt then save it to your desktop.
Then drag/drop the CFScript.txt onto ComboFix.exe (the red symbol on your desktop) if combofix does not auto start click "run".

Please post the log that is produced.


Report •

#8
April 4, 2010 at 00:07:09
That was for YodaoDict, the crazy charactors because it was Chinese. There was an empty license file and a unisntall.
So, after uninstall the folder is gone.

Report •

#9
April 4, 2010 at 03:57:37
So I followed up with a full scan (C, D) and found 11 more.
All those removed show in Quarantine, should I delete them?
-----------------------------------------------------------------------------
Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org

Database version: 3930

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

4/4/2010 6:47:12 PM
mbam-log-2010-04-04 (18-47-12).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 179964
Time elapsed: 1 hour(s), 18 minute(s), 32 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 11

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP394\A0036882.exe (Adware.Adrotator) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP396\A0037968.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP396\A0037971.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038667.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038660.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038665.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038668.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038669.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038672.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038752.exe (Adware.Agent) -> Quarantined and deleted successfully.
D:\System Volume Information\_restore{4594C37E-1751-4476-B9A8-2CF20D6FC635}\RP401\A0038753.exe (Adware.Agent) -> Quarantined and deleted successfully.


Report •

#10
April 4, 2010 at 05:58:57
A little clean-up to do.

Delete DDS from your desktop

Go to start> run> type in ComboFix /Uninstall (note the space after ComboFix) then press enter> run. This will uninstall combofix so give the uninstaller a minute to run.

Download ATF Cleaner from this link:
http://www.majorgeeks.com/ATF_Cleaner_d4949.html
Run ATF-Cleaner
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.

Empty the restore folder. Go to start>control panel>system>system restore tab>check the box beside "turn off system restore>apply (takes a minute)>ok. Go back and uncheck the box to turn system restore back on>apply>ok.

Next create a new restore point. Go to start> run> type in msconfig> ok> click launch system restore> check the circle beside "create a restore point> next> name it today's date> create > click home > exit the system configuration utility> restart the computer.

You should consider adding "Spywareblaster" to your arsenol of antispyware tools, you can download it from this link Spywareblaster

Just download it,install it, and update it. Its free and runs in the background, so you don't actually run it, and re-writes malicious script before it can install on your computer. Look for updates weekly as there is no auto-update on the free version.

Glad we could help.


Report •

#11
April 4, 2010 at 13:50:05
Ok all cleaned out as instructed and installed Spywareblaster.
Would love to know how I got this crap so I could avoid it.
Thanks so much for your help, you made it easy!
Regards,
Jay

Report •

#12
April 4, 2010 at 14:01:17
SpywareBlaster will help as this blocks many nasties without using any resources at all. The rest is down to careful browsing and always using Alt+F4 to escape from any weird screens that pop up (instead of closing boxes with the X).


What's the time?


Report •

#13
April 4, 2010 at 14:13:04
As I'm located in China, I need to be vigilent about things, the Great Firewall and all. Can't visit/use many sites as they are blocked. I use Ares as a P2P to get things and always scan before using/installing.
Am also using MyDefrag to keep things clean.
I have 3 backup external drives (1 HDD and 2 SSD) that I'd like to scan/fix but Anti-Malware and SpywareBlaster does not give me an option to check/do just them.
Once again, thanks for the help.

Report •

#14
April 4, 2010 at 16:25:20
To add to what Derek suggested any p2p program that ask you to allow a shared folder in your system that bypasses your security programs is setting up a portal for viruses and spyware to enter your computer so if you use them uninstall them as soon as finish using them.

I didn't see the DDS results but you should be run windows newest update SP3, if not, update to that and install all the new updates for it.

If you are running Java and Adobe be sure they are also updated as they are frequently exploited.

Glad we could help.


Report •

#15
April 4, 2010 at 16:46:10
Well, I was trying to use Adobe Acrobat (6.06).
Could not auto-open the PDF files I had saved.
For some reason it hung or gave me a notice that it was not installed.
However, if I started Acrobat from the desktop then can open manually.
As I don't have the original disk I d/l the file from Ares, scanned and tried to install when I got the stupid prompt to install MediaPass.
That's what started this mess.
However some updates won't install.
Microsoft .NET Framework 3.5 Service Pack 1 and .NET Framework 3.5 Family Update for .NET versions 2.0 through 3.5 (KB951847) x86
Microsoft .NET Framework 2.0 Service Pack 2 Security Update for Windows 2000, Windows Server 2003, and Windows XP (KB974417)
SP3 is installed (My computer info XP Pro)
Thanks again.

Report •

#16
April 4, 2010 at 17:38:12
"My Defrag" is fine but it won't make any difference at all to viruses or other nasties. The files remain still intact (good or bad).

SpywareBlaster simply puts kill bits in the registry to prevent things taking hold (so it doesn't need to do anything on other drives). It won't stop all forms of nasties.

Most Anti-Malware programs have an option to scan drives other than C.


What's the time?


Report •

#17
April 4, 2010 at 19:12:02
Am also now running Advanced System Care to keep things as they should be. Uninstalled the old Acrobat and got the new Adobe Reader 9.0 so old files open automatically.
Thanks for your help.

Report •

Ask Question