Speaking of sharing, I had a very rewarding virus-hunting experience today. Today, I documented some substantial evidence of how this fraudware is loading.
Initial symptom: Every time the customer powered up his laptop it would eventually display:
"Error loading c:\windows\system32\tihunedo.dll The specified module cannot be found."
I immediately recognized (and verified) that DLL as one of the infamous infections. However, other than that, there were no other symptoms of infection. He simply clicked "OK" and continued. There were no virus detection notifications. The system ran slower than it should, but other than that, it was ok.
Checking the registry, I found the value:
"wxvault.dll C:\PROGRA~1\Google\GOOGLE~3\GOEC62~1.DLL vunakifa.dll c:\windows\system32\tihunedo.dll"
Under the key:
"hklm\software\microsoft\windows nt\currentversion\windows"
vunakifa.dll...
...is another confirmed Fraudware component. (Prevx)
GOEC62~1.DLL ....
" ...is used by objects that are classified as safe. It has not yet been seen to be associated with malicious software." (Prevx)
"... is located in a not identifiable folder. The file size on Windows XP is 0 bytes.
The program has a visible window. The application has no file description. Note: File does not exist any longer. The application is loaded during the Windows boot process (see Registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs). goec62~1.dll is not a Windows core file. Therefore the technical security rating is 25% dangerous, however also read the users reviews." (file.com)
wxvault.dll...
...is both listed as a "harmless" component, and a Vundo malware component. The "legit" description is that it is an encryption engine "related to Embassy Security Suite that comes installed on Dell Lap tops. [per]
I'm not going to say more than this. You high-level techies will be able to figure this out, and understand why I'm keeping my mouth shut...
Hope this helps!
90% of being smart is knowing what you're dumb at.