Virtumonde Infection

I recognize it. It is the installation to Zone Alarm Security Suite. I deleted ZA after it started causing problems with my internet. Should I delete it?
 
No need, it is then a false positive.

Delete this folder:

C:\_OTMoveIt\MovedFiles

Empty Recycle Bin.

Still problems?
 
Copied the results of a Spybot scan. Here you go.

Hint of the Day: Click the bar at the right of this to see more information! ()


Smitfraud-C.: [SBI $99619F8C] Settings (Registry key, nothing done)
HKEY_USERS\S-1-5-21-682003330-1284227242-2147195623-1003\Software\Microsoft\instkey

Microsoft.WindowsSecurityCenter.FirewallBypass: [SBI $D80580B5] Settings (Registry value, nothing done)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\explorer.exe

Microsoft.WindowsSecurityCenter.FirewallBypass: [SBI $B067B5B7] Settings (Registry value, nothing done)
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\explorer.exe

Virtumonde: [SBI $8F2A4A7E] Class ID (Registry key, nothing done)
HKEY_CLASSES_ROOT\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}

Virtumonde.generic: [SBI $1BB1339D] Browser helper object (Registry key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}

Virtumonde.generic: [SBI $2F10E03B] Settings (Registry value, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}

Virtumonde: [SBI $779C9C0D] Settings (Registry key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP

Virtumonde: [SBI $FD08B4B7] Configuration file (File, nothing done)
C:\WINDOWS\system32\mTuDcMoq.ini2

Virtumonde: [SBI $2A2DCEAC] Configuration file (File, nothing done)
C:\WINDOWS\system32\mTuDcMoq.ini

Virtumonde.prx: [SBI $D9B85025] Autorun settings (senamuguji) (Registry value, nothing done)
HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\senamuguji

Virtumonde.prx: [SBI $D9B85025] Autorun settings (senamuguji) (Registry value, nothing done)
HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\senamuguji

Virtumonde.prx: [SBI $D9B85025] Autorun settings (senamuguji) (Registry value, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\senamuguji

Virtumonde.sci: [SBI $D87CA6BD] Class ID (Registry value, nothing done)
HKEY_CLASSES_ROOT\CLSID\{6D794CB4-C7CD-4c6f-BFDC-9B77AFBDC02C}\InprocServer32\=...C:\WINDOWS\system32\efcYSIcY.dll...

DoubleClick: Tracking cookie (Firefox: default) (Cookie, nothing done)


MediaPlex: Tracking cookie (Firefox: default) (Cookie, nothing done)


FastClick: Tracking cookie (Firefox: default) (Cookie, nothing done)


FastClick: Tracking cookie (Firefox: default) (Cookie, nothing done)


FastClick: Tracking cookie (Firefox: default) (Cookie, nothing done)


FastClick: Tracking cookie (Firefox: default) (Cookie, nothing done)


AdRevolver: Tracking cookie (Firefox: default) (Cookie, nothing done)


AdRevolver: Tracking cookie (Firefox: default) (Cookie, nothing done)


AdRevolver: Tracking cookie (Firefox: default) (Cookie, nothing done)


AdRevolver: Tracking cookie (Firefox: default) (Cookie, nothing done)


AdRevolver: Tracking cookie (Firefox: default) (Cookie, nothing done)


HitBox: Tracking cookie (Firefox: default) (Cookie, nothing done)


HitBox: Tracking cookie (Firefox: default) (Cookie, nothing done)


HitBox: Tracking cookie (Firefox: default) (Cookie, nothing done)


HitBox: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)


CasaleMedia: Tracking cookie (Firefox: default) (Cookie, nothing done)



--- Spybot - Search & Destroy version: 1.6.0 (build: 20080707) ---

2008-07-07 blindman.exe (1.0.0.8)
2008-07-07 SDFiles.exe (1.6.0.4)
2008-07-07 SDMain.exe (1.0.0.6)
2008-07-07 SDShred.exe (1.0.2.3)
2008-07-07 SDUpdate.exe (1.6.0.8)
2008-07-07 SDWinSec.exe (1.0.0.12)
2008-07-07 SpybotSD.exe (1.6.0.30)
2008-09-16 TeaTimer.exe (1.6.3.25)
2007-03-10 unins000.exe (51.41.0.0)
2008-09-05 unins001.exe (51.49.0.0)
2008-07-07 Update.exe (1.6.0.7)
2008-10-22 advcheck.dll (1.6.2.13)
2007-04-02 aports.dll (2.1.0.0)
2005-05-31 borlndmm.dll (7.0.4.453)
2005-05-31 delphimm.dll (7.0.4.453)
2008-06-14 DelZip179.dll (1.79.11.1)
2008-09-15 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2008-10-22 Tools.dll (2.1.6.8)
2005-05-31 UnzDll.dll (1.73.1.1)
2005-05-31 ZipDll.dll (1.73.2.0)
2008-11-04 Includes\Adware.sbi (*)
2008-12-29 Includes\AdwareC.sbi (*)
2008-06-03 Includes\Cookies.sbi (*)
2008-09-02 Includes\Dialer.sbi (*)
2008-09-09 Includes\DialerC.sbi (*)
2008-07-23 Includes\HeavyDuty.sbi (*)
2008-11-18 Includes\Hijackers.sbi (*)
2008-12-22 Includes\HijackersC.sbi (*)
2008-12-09 Includes\Keyloggers.sbi (*)
2008-12-22 Includes\KeyloggersC.sbi (*)
2004-11-29 Includes\LSP.sbi (*)
2008-11-18 Includes\Malware.sbi (*)
2008-12-29 Includes\MalwareC.sbi (*)
2008-12-16 Includes\PUPS.sbi (*)
2008-12-16 Includes\PUPSC.sbi (*)
2007-11-07 Includes\Revision.sbi (*)
2008-06-18 Includes\Security.sbi (*)
2008-12-29 Includes\SecurityC.sbi (*)
2008-06-03 Includes\Spybots.sbi (*)
2008-06-03 Includes\SpybotsC.sbi (*)
2008-12-10 Includes\Spyware.sbi (*)
2008-12-10 Includes\SpywareC.sbi (*)
2008-06-03 Includes\Tracks.uti
2008-12-29 Includes\Trojans.sbi (*)
2008-12-29 Includes\TrojansC.sbi (*)
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll
 
I haven't turned Teatimer back on just yet, wasn't sure if I'd need it to be off in future steps. I'll run Spybot with the browser closed and see if it produces any results.
 
Here ya go.

Avira AntiVir Personal
Report file date: Tuesday, January 06, 2009 17:35

Scanning for 1153470 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: DIZZLES_MACHINE

Version information:
BUILD.DAT : 8.2.0.337 16934 Bytes 11/18/2008 13:05:00
AVSCAN.EXE : 8.1.4.10 315649 Bytes 11/18/2008 14:21:26
AVSCAN.DLL : 8.1.4.0 40705 Bytes 5/26/2008 13:56:40
LUKE.DLL : 8.1.4.5 164097 Bytes 6/12/2008 18:44:19
LUKERES.DLL : 8.1.4.0 12033 Bytes 5/26/2008 13:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 17:30:36
ANTIVIR1.VDF : 7.1.1.33 1705984 Bytes 12/24/2008 17:22:29
ANTIVIR2.VDF : 7.1.1.60 318976 Bytes 1/2/2009 17:41:46
ANTIVIR3.VDF : 7.1.1.74 158208 Bytes 1/6/2009 18:34:55
Engineversion : 8.2.0.45
AEVDF.DLL : 8.1.0.6 102772 Bytes 10/14/2008 16:05:56
AESCRIPT.DLL : 8.1.1.19 336252 Bytes 12/20/2008 17:56:05
AESCN.DLL : 8.1.1.5 123251 Bytes 11/7/2008 21:06:41
AERDL.DLL : 8.1.1.3 438645 Bytes 11/4/2008 19:58:38
AEPACK.DLL : 8.1.3.4 393591 Bytes 11/11/2008 15:41:39
AEOFFICE.DLL : 8.1.0.33 196987 Bytes 12/20/2008 17:56:04
AEHEUR.DLL : 8.1.0.75 1524087 Bytes 12/20/2008 17:56:02
AEHELP.DLL : 8.1.2.0 119159 Bytes 12/20/2008 17:55:55
AEGEN.DLL : 8.1.1.8 323956 Bytes 12/20/2008 17:55:54
AEEMU.DLL : 8.1.0.9 393588 Bytes 10/14/2008 16:05:56
AECORE.DLL : 8.1.5.2 172405 Bytes 12/20/2008 17:55:52
AEBB.DLL : 8.1.0.3 53618 Bytes 10/14/2008 16:05:56
AVWINLL.DLL : 1.0.0.12 15105 Bytes 7/9/2008 14:40:05
AVPREF.DLL : 8.0.2.0 38657 Bytes 5/16/2008 15:28:01
AVREP.DLL : 8.0.0.2 98344 Bytes 7/31/2008 18:02:15
AVREG.DLL : 8.0.0.1 33537 Bytes 5/9/2008 17:26:40
AVARKT.DLL : 1.0.0.23 307457 Bytes 2/12/2008 14:29:23
AVEVTLOG.DLL : 8.0.0.16 119041 Bytes 6/12/2008 18:27:49
SQLITE3.DLL : 3.3.17.1 339968 Bytes 1/22/2008 23:28:02
SMTPLIB.DLL : 1.2.0.23 28929 Bytes 6/12/2008 18:49:40
NETNT.DLL : 8.0.0.1 7937 Bytes 1/25/2008 18:05:10
RCIMAGE.DLL : 8.0.0.51 2371841 Bytes 6/12/2008 19:48:07
RCTEXT.DLL : 8.0.52.0 86273 Bytes 6/27/2008 19:34:37

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: Tuesday, January 06, 2009 17:35

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'firefox.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'WgaTray.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'iPodService.exe' - '1' Module(s) have been scanned
Scan process 'ViewpointService.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'PnkBstrA.exe' - '1' Module(s) have been scanned
Scan process 'razerofa.exe' - '1' Module(s) have been scanned
Scan process 'razertra.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '1' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'CurseClient.exe' - '1' Module(s) have been scanned
Scan process 'msmsgs.exe' - '1' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '1' Module(s) have been scanned
Scan process 'QTTask.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'soundman.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'LGDCore.exe' - '1' Module(s) have been scanned
Scan process 'razerhid.exe' - '1' Module(s) have been scanned
Scan process 'realsched.exe' - '1' Module(s) have been scanned
Scan process 'aawservice.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
40 processes with 40 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
[WARNING] System error [21]: The device is not ready.
Master boot sector HD2
[INFO] No virus was found!
[WARNING] System error [21]: The device is not ready.
Master boot sector HD3
[INFO] No virus was found!
[WARNING] System error [21]: The device is not ready.
Master boot sector HD4
[INFO] No virus was found!
[WARNING] System error [21]: The device is not ready.

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan the registry.
The registry was scanned ( '56' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\Documents and Settings\Cap'n DP\Desktop\Downloads\zaSuiteSetup_80_020_000_en.exe
[0] Archive type: ZIP SFX (self extracting)
--> WINDOWS6.0-KB929547-V2-X64.MSU
[1] Archive type: CAB (Microsoft)
--> Windows6.0-KB929547-v2-x64.cab
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\Documents and Settings\Cap'n DP\Desktop\Downloads\zaSuiteSetup_80_059_000_en.exe
[0] Archive type: ZIP SFX (self extracting)
--> WINDOWS6.0-KB929547-V2-X64.MSU
[1] Archive type: CAB (Microsoft)
--> Windows6.0-KB929547-v2-x64.cab
[WARNING] No further files can be extracted from this archive. The archive will be closed
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP549\A0134446.dll
[DETECTION] Is the TR/Vundo.NU Trojan
[NOTE] The file was moved to '4994e5ac.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP549\A0134447.dll
[DETECTION] Is the TR/Vundo.NU Trojan
[NOTE] The file was moved to '4994e5b0.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP549\A0134495.dll
[DETECTION] Is the TR/Monder.adyt Trojan
[NOTE] The file was moved to '4994e5b3.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP551\A0135129.exe
[DETECTION] Is the TR/FakeXPA.A.44 Trojan
[NOTE] The file was moved to '4994e7ce.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP551\A0135130.exe
[DETECTION] Is the TR/FakeXPA.A.44 Trojan
[NOTE] The file was moved to '4994e7d0.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP551\A0135131.exe
[DETECTION] Is the TR/FakeXPA.A.44 Trojan
[NOTE] The file was moved to '4994e7d2.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP551\A0135132.exe
[DETECTION] Is the TR/FakeXPA.A.44 Trojan
[NOTE] The file was moved to '4994e7d4.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135387.dll
[DETECTION] Is the TR/ConHook.D.9 Trojan
[NOTE] The file was moved to '4994e7de.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135390.dll
[DETECTION] Is the TR/ConHook.D.9 Trojan
[NOTE] The file was moved to '4994e7ea.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135391.dll
[DETECTION] Is the TR/Pakes.mfm Trojan
[NOTE] The file was moved to '4994e7ec.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135392.dll
[DETECTION] Is the TR/Monder.adsr Trojan
[NOTE] The file was moved to '4994e7ee.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135396.dll
[DETECTION] Is the TR/ConHook.D.6 Trojan
[NOTE] The file was moved to '4994e7f0.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135397.dll
[DETECTION] Is the TR/Monder.adyt Trojan
[NOTE] The file was moved to '4994e7f2.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135401.dll
[DETECTION] Is the TR/ConHook.D.6 Trojan
[NOTE] The file was moved to '4994e7f6.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135402.dll
[DETECTION] Is the TR/Pakes.mfm Trojan
[NOTE] The file was moved to '4994e7f7.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135403.dll
[DETECTION] Is the TR/ConHook.D.6 Trojan
[NOTE] The file was moved to '4994e7f8.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135404.dll
[DETECTION] Is the TR/ConHook.D.3 Trojan
[NOTE] The file was moved to '4994e7fa.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135406.dll
[DETECTION] Is the TR/ConHook.D.11 Trojan
[NOTE] The file was moved to '4994e7fc.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135407.dll
[DETECTION] Is the TR/ConHook.D.11 Trojan
[NOTE] The file was moved to '4994e7fd.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135408.dll
[DETECTION] Is the TR/Vundo.72704Y.3 Trojan
[NOTE] The file was moved to '4994e7ff.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135409.dll
[DETECTION] Is the TR/Vundo.72704Y.2 Trojan
[NOTE] The file was moved to '4994e801.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135411.dll
[DETECTION] Is the TR/ConHook.D.3 Trojan
[NOTE] The file was moved to '4994e802.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135413.dll
[DETECTION] Is the TR/ConHook.D.11 Trojan
[NOTE] The file was moved to '4994e804.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135414.dll
[DETECTION] Is the TR/Monder.adys Trojan
[NOTE] The file was moved to '4994e805.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135415.dll
[DETECTION] Is the TR/ConHook.D.6 Trojan
[NOTE] The file was moved to '4994e807.qua'!
C:\System Volume Information\_restore{024099E1-85C2-4AC9-90D5-D19A4893E7F4}\RP556\A0135416.dll
[DETECTION] Is the TR/ConHook.D.11 Trojan
[NOTE] The file was moved to '4994e808.qua'!
C:\WINDOWS\system32\musowewo.dll
[DETECTION] Is the TR/PSW.OnlineGames.udrj Trojan
[NOTE] The file was moved to '49d6e9ad.qua'!


End of the scan: Tuesday, January 06, 2009 18:31
Used time: 56:29 Minute(s)

The scan has been done completely.

5727 Scanning directories
170317 Files were scanned
27 viruses and/or unwanted programs were found
0 Files were classified as suspicious:
0 files were deleted
0 files were repaired
27 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
170288 Files not concerned
1551 Archives were scanned
8 Warnings
27 Notes
 
Looks like those were all in system restore which will get flushed during final instructions.

Any other issues left?
 
Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Please download JavaRa and unzip it to your desktop.

***Please close any instances of Internet Explorer before continuing!***

  • Double-click on JavaRa.exe to start the program.
  • From the drop-down menu, choose English and click on Select.
  • JavaRa will open; click on Remove Older Versions to remove the older versions of Java installed on your computer.
  • Click Yes when prompted. When JavaRa is done, a notice will appear that a logfile has been produced. Click OK.
  • A logfile will pop up. Please save it to a convenient location.

Then download and install Java Runtime Environment (JRE) 6 Update 11

Looking over your log, it seems you don''t have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) Comodo (Uncheck during installation "Install COMODO Antivirus (Recommended)"!, "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage")
2) Online Armor
3) PC Tools
4) Sunbelt/Kerio
5) ZoneAlarm (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

Now lets uninstall ComboFix:

  • Click START then RUN
  • Now type Combofix /u in the runbox and click OK

Next we remove all used tools.

Please download OTCleanIt and save it to desktop.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.

Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

  • Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and re-enable system restore here:

    Windows XP System Restore Guide

Re-enable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
  • From within Internet Explorer click on the Tools menu and then click on Options.
  • Click once on the Security tab
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt
  • Change the Download unsigned ActiveX controls to Disable
  • Change the Initialize and script ActiveX controls not marked as safe to Disable
  • Change the Installation of desktop items to Prompt
  • Change the Launching programs and files in an IFRAME to Prompt
  • Change the Navigate sub-frames across different domains to Prompt
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, press the Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.

  • Update your AntiVirus Software and keep your other programs up-to-date Update your Antivirus programs and other security products regularly to avoid new threats that could infect your system.
    You can use one of these sites to check if any updates are needed for your pc.
    Secunia Software Inspector
    F-secure Health Check
  • Visit Microsoft''s Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.
  • Install Malwarebytes'' Anti-Malware - Malwarebytes'' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. Tutorial on installing & using this product can be found below:

    Malwarebytes'' Anti-Malware Setup Guide

    Malwarebytes'' Anti-Malware Scanning Guide

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety


Stand Up and Be Counted ---> Malware Complaints <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place

Happy surfing and stay clean! :bigthumb:
 
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note: If it has been four days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than four days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.
 
Back
Top