Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Antivirus 2009 hit me


  • This topic is locked This topic is locked
3 replies to this topic

#1 WhiteWolf101

WhiteWolf101

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:57 AM

Posted 23 March 2009 - 12:20 AM

Hello all!

Situation is bad here...Antivirus 2009 has (from what I gather) disabled my Malware. It won't open and I can't re-install it. It also freezes my Hijack This in midscan. I run Kaspersky and the program is acting funny. Wile running Kaspersky, my firewall is partially running, and if I double click to open it, the entire program freezes. Any help would be GREATLY appreciated. Thanks!


DDS (Ver_09-03-16.01) - NTFSx86
Run by Compaq_Administrator at 0:05:31.04 on Mon 03/23/2009
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_07

============== Pseudo HJT Report ===============

mWinlogon: Userinit=c:\windows\system32\userinit.exe,c:\windows\system32\sdra64.exe,
BHO: : {149b8bcd-c759-4f95-9642-1137ba3d011b} - c:\windows\system32\ugniyto.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: AskBar BHO: {201f27d4-3704-41d6-89c1-aa35e39143ed} - c:\program files\askbardis\bar\bin\askBar.dll
BHO: {65b2513f-d98a-4633-a325-992dca5d360e} - No File
BHO: BHO: {abc42510-9b22-41c1-9dcd-8182a2d07c63} - c:\windows\system32\iehelper.dll
TB: Ask Toolbar: {3041d03e-fd4b-44e0-b742-2d9b88305f98} - c:\program files\askbardis\bar\bin\askBar.dll
TB: Yahoo! Toolbar: {ef99bd32-c1fb-11d2-892f-0090271d4f88} -
EB: {17BFCF1A-B579-48a7-9849-719DDD11D340} - No File
mRun: [MSConfig] c:\windows\pchealth\helpctr\binaries\MSConfig.exe /auto
IE: Add to Anti-Banner - c:\program files\kaspersky lab\kaspersky internet security 7.0\ie_banner_deny.htm
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} - hxxp://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
Notify: klogon - c:\windows\system32\klogon.dll
Notify: xghsxquu - ugniyto.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SecurityProviders: msapsspc.dll, schannel.dll, digest.dll, msnsspc.dll, digeste.dll,
LSA: Notification Packages = scecli c:\windows\system32\vidasasa.dll

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\compaq~1\applic~1\mozilla\firefox\profiles\dbfd1bmb.default\
FF - prefs.js: browser.search.selectedEngine - AIM Search
FF - prefs.js: browser.startup.homepage - www.google.com
FF - prefs.js: keyword.URL - hxxp://slirsredirect.search.aol.com/slirs_http/sredir?sredir=2706&query=
FF - plugin: c:\program files\gametap\bin\release\npgametaptool.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npgcplug.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npracplug.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npViewpoint.dll
FF - plugin: c:\program files\real\realarcade\plugins\mozilla\npracplug.dll
FF - plugin: c:\program files\viewpoint\viewpoint media player\npViewpoint.dll

============= SERVICES / DRIVERS ===============


============== File Associations ===============

regfile=regedit.exe "%1" %*
scrfile="%1" %*

=============== Created Last 30 ================

2009-03-22 23:32 <DIR> --d----- c:\docume~1\compaq~1\applic~1\Sammsoft
2009-03-22 23:32 <DIR> --d----- c:\program files\AskBarDis
2009-03-22 23:32 <DIR> --d----- c:\program files\Advanced Registry Optimizer
2009-03-22 21:42 10,752 a------- c:\windows\system32\iehelper.dll
2009-03-22 21:32 <DIR> --d----- c:\program files\WinPcap
2009-03-21 03:50 64,160 a------- c:\windows\system32\drivers\Lbd.sys
2009-03-21 03:48 <DIR> -cd-h--- c:\docume~1\alluse~1\applic~1\{7972B2E5-3E09-4E5E-81B7-FE5819D6772F}
2009-03-21 03:48 <DIR> --d----- c:\program files\Lavasoft
2009-03-21 03:41 138,384 a------- c:\windows\system32\drivers\tmcomm.sys
2009-03-21 02:46 <DIR> --d----- c:\docume~1\compaq~1\applic~1\Malwarebytes
2009-03-21 02:46 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2009-03-21 02:46 15,504 a------- c:\windows\system32\drivers\mbam.sys
2009-03-21 02:45 <DIR> --d----- c:\docume~1\alluse~1\applic~1\Malwarebytes
2009-03-21 02:45 <DIR> --d----- c:\program files\Malwarebytes' Anti-Malware
2009-03-08 22:32 <DIR> --d----- c:\docume~1\alluse~1\applic~1\eGames
2009-03-08 22:32 <DIR> --d----- c:\program files\common files\SWF Studio
2009-03-08 22:32 <DIR> --dsh--- c:\docume~1\compaq~1\applic~1\.#
2009-03-08 22:17 <DIR> --d----- c:\docume~1\alluse~1\applic~1\GameHouse
2009-03-08 20:47 208 a------- c:\windows\TLCAPPS.INI
2009-03-07 14:13 94,208 a------- c:\windows\ScUnin.exe
2009-03-07 14:13 35,190 a------- c:\windows\scunin.dat
2009-03-07 14:13 967 a------- c:\windows\ScUnin.pif
2009-03-07 14:13 <DIR> --d----- c:\program files\Starcraft
2009-03-01 21:43 754 a------- c:\windows\WORDPAD.INI
2009-02-23 09:15 <DIR> --d----- c:\program files\Incomplete
2009-02-22 15:28 266 a------- c:\windows\KA.INI

==================== Find3M ====================

2009-03-22 23:36 29,005,344 a--sh--- c:\windows\system32\drivers\fidbox.dat
2009-03-22 23:36 751,392 a--sh--- c:\windows\system32\drivers\fidbox2.dat
2009-03-22 23:36 387,452 a--sh--- c:\windows\system32\drivers\fidbox.idx
2009-03-22 23:36 70,748 a--sh--- c:\windows\system32\drivers\fidbox2.idx
2009-03-04 20:46 7,284 a------- c:\windows\rrm46.dat
2009-03-01 21:37 342 a------- c:\docume~1\compaq~1\applic~1\wklnhst.dat
2009-02-09 16:22 21,840 a------t c:\windows\system32\SIntfNT.dll
2009-02-09 16:22 17,212 a------t c:\windows\system32\SIntf32.dll
2009-02-09 16:22 12,067 a------t c:\windows\system32\SIntf16.dll
2009-02-03 11:33 101,287 a------- c:\windows\system32\drivers\klin.dat
2009-02-03 11:33 89,601 a------- c:\windows\system32\drivers\klick.dat
2009-01-29 18:00 66,872 a------- c:\windows\system32\PnkBstrA.exe
2009-01-17 21:28 1,402,999 ---sh--- c:\windows\system32\ikrwbqhi.tmp
2009-01-15 16:42 1,372,550 ---sh--- c:\windows\system32\rxxxxhuo.tmp
2008-07-13 11:03 0 a------- c:\program files\temp01
2008-04-04 18:13 774,144 a------- c:\program files\RngInterstitial.dll
2008-04-03 15:53 6,848 a--sh--- c:\windows\system32\UENXyyxx.ini2
2008-08-29 21:18 32,768 a--sh--- c:\windows\system32\config\systemprofile\local settings\history\history.ie5\mshist012008082920080830\index.dat

============= FINISH: 0:07:44.06 ===============

* Edit* For some unknown reason, Hijack This didn't freeze! Here's the log:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:32:55 AM, on 3/23/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16762)
Boot mode: Normal

Running processes:
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\arservice.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe
C:\WINDOWS\system32\svchost.exe
c:\WINDOWS\system32\ZuneBusEnum.exe
C:\WINDOWS\ehome\mcrdsvc.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Internet Explorer\Iexplore.exe
C:\Program Files\Malwarebytes' Anti-Malware\yoyo.exe
C:\Program Files\Malwarebytes' Anti-Malware\yoyo.exe
C:\Documents and Settings\Compaq_Administrator\Desktop\HiJackThis.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,
O1 - Hosts: 195.245.119.131 browser-security.microsoft.com
O2 - BHO: (no name) - {149B8BCD-C759-4F95-9642-1137BA3D011B} - c:\windows\system32\ugniyto.dll
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: AskBar BHO - {201f27d4-3704-41d6-89c1-aa35e39143ed} - C:\Program Files\AskBarDis\bar\bin\askBar.dll
O2 - BHO: (no name) - {65b2513f-d98a-4633-a325-992dca5d360e} - (no file)
O2 - BHO: BHO - {ABC42510-9B22-41c1-9DCD-8182A2D07C63} - C:\WINDOWS\system32\iehelper.dll
O3 - Toolbar: Ask Toolbar - {3041d03e-fd4b-44e0-b742-2d9b88305f98} - C:\Program Files\AskBarDis\bar\bin\askBar.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\NPSWF32_FlashUtil.exe -p
O4 - .DEFAULT User Startup: Pin.lnk = C:\hp\bin\CLOAKER.EXE (User 'Default user')
O4 - .DEFAULT User Startup: PinMcLnk.lnk = C:\hp\bin\cloaker.exe (User 'Default user')
O20 - Winlogon Notify: ddcBRhhF - C:\WINDOWS\
O20 - Winlogon Notify: xghsxquu - C:\WINDOWS\SYSTEM32\ugniyto.dll
O23 - Service: Kaspersky Internet Security 7.0 (AVP) - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe

--
End of file - 3542 bytes

Attached Files


Edited by WhiteWolf101, 23 March 2009 - 12:34 AM.


BC AdBot (Login to Remove)

 


#2 WhiteWolf101

WhiteWolf101
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:04:57 AM

Posted 23 March 2009 - 12:48 AM

Another update:

Upon running Hijack this sucessfully and rebooting...Lo and behold, Malware opened and a system scan was performed. Here's the log:


Malwarebytes' Anti-Malware 1.34
Database version: 1863
Windows 5.1.2600 Service Pack 3

3/23/2009 12:46:00 AM
mbam-log-2009-03-23 (00-45-58).txt

Scan type: Quick Scan
Objects scanned: 71024
Time elapsed: 6 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 9
Registry Values Infected: 1
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 16

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\ugniyto.dll (Trojan.Vundo.H) -> No action taken.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xghsxquu (Trojan.Vundo.H) -> No action taken.
HKEY_CLASSES_ROOT\CLSID\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\xtowecws (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\xtowecws (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xtowecws (Trojan.Vundo.H) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> No action taken.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> No action taken.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\sdra64.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\sdra64.exe -> No action taken.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\SYSTEM32\Userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (userinit.exe) -> No action taken.

Folders Infected:
C:\WINDOWS\system32\lowsec (Spyware.StolenData) -> No action taken.

Files Infected:
c:\WINDOWS\system32\ugniyto.dll (Trojan.Vundo.H) -> No action taken.
C:\WINDOWS\system32\UACeddiqlsq.dll (Trojan.TDSS) -> No action taken.
C:\WINDOWS\system32\UACuolmxnqj.dll (Trojan.TDSS) -> No action taken.
C:\WINDOWS\system32\UACusotineo.dll (Rootkit.TDSS) -> No action taken.
C:\WINDOWS\system32\UACwkyalxoy.dll (Rootkit.TDSS) -> No action taken.
C:\WINDOWS\system32\drivers\UACsncbjivp.sys (Rootkit.TDSS) -> No action taken.
C:\WINDOWS\system32\lowsec\local.ds (Spyware.StolenData) -> No action taken.
C:\WINDOWS\system32\lowsec\user.ds (Spyware.StolenData) -> No action taken.
C:\WINDOWS\system32\lowsec\user.ds.lll (Spyware.StolenData) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\iehelper.dll (Trojan.FakeAlert) -> No action taken.
C:\WINDOWS\system32\UACcftoirmo.dat (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACmypvnbeh.dll (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACngxwjuwc.log (Trojan.Agent) -> No action taken.
C:\WINDOWS\system32\UACpujbkiej.log (Trojan.Agent) -> No action taken.




And After the scan, issues fixed:


Malwarebytes' Anti-Malware 1.34
Database version: 1863
Windows 5.1.2600 Service Pack 3

3/23/2009 12:46:25 AM
mbam-log-2009-03-23 (00-46-25).txt

Scan type: Quick Scan
Objects scanned: 71024
Time elapsed: 6 minute(s), 37 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 9
Registry Values Infected: 1
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 16

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\ugniyto.dll (Trojan.Vundo.H) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xghsxquu (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\xtowecws (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\xtowecws (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\xtowecws (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{149b8bcd-c759-4f95-9642-1137ba3d011b} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\AvScan (Malware.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: c:\windows\system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Trojan.FakeAlert) -> Data: system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\SYSTEM32\Userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully.

Folders Infected:
C:\WINDOWS\system32\lowsec (Spyware.StolenData) -> Delete on reboot.

Files Infected:
c:\WINDOWS\system32\ugniyto.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\UACeddiqlsq.dll (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\UACuolmxnqj.dll (Trojan.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\UACusotineo.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\UACwkyalxoy.dll (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\drivers\UACsncbjivp.sys (Rootkit.TDSS) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\local.ds (Spyware.StolenData) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds (Spyware.StolenData) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds.lll (Spyware.StolenData) -> Delete on reboot.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\sdra64.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\iehelper.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACcftoirmo.dat (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\UACmypvnbeh.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\UACngxwjuwc.log (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\UACpujbkiej.log (Trojan.Agent) -> Delete on reboot.

#3 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:05:57 AM

Posted 30 March 2009 - 02:49 PM

Welcome to the BleepingComputer Forums.

Since it has been a few days since you scanned your computer with HijackThis, we will need a new HijackThis log. If you have not already downloaded Random's System Information Tool (RSIT), please download Random's System Information Tool (RSIT) by random/random which includes a HijackThis log and save it to your desktop. If you have RSIT already on your computer, please run it again.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Please post the contents of log.txt.
Thank you for your patience.

Please see Preparation Guide for use before posting about your potential Malware problem.

If you have already posted this log at another forum or if you decide to seek help at another forum, please let us know. There is a shortage of helpers and taking the time of two volunteer helpers means that someone else may not be helped.

Please post your HijackThis log as a reply to this thread and not as an attachment. I am always leery of opening attachments so I always request that HijackThis logs are to be posted as a reply to the thread. I do not think that you are attaching anything scary but others may do so.

While we are working on your HijackThis log, please:
  • Reply to this thread; do not start another!
  • Do not make any changes on your computer during the cleaning process or download/add programs on your computer unless instructed to do so.
  • Do not run any other tool until instructed to do so!
  • Let me know if any of the links do not work or if any of the tools do not work.
  • Tell me about problems or symptoms that occur during the fix.
  • Do not run any other programs or open any other windows while doing a fix.
  • Ask any questions that you have regarding the fix(es), the infection(s), the performance of your computer, etc.
Thanks.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#4 suebaby41

suebaby41

    W.A.M. (Women Against Malware)


  • Malware Response Team
  • 6,248 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:05:57 AM

Posted 06 April 2009 - 10:49 AM

This subject is now closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users