Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

TrojanDownloader help please...


  • This topic is locked This topic is locked
9 replies to this topic

#1 klemkas

klemkas

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:01 AM

Posted 01 April 2009 - 04:22 AM

hello, i noticed the same problem this morning. nod32 reports a trojan every minute or so, though scan didn't find anything. i'll post malwarebytes report also.

Malwarebytes' Anti-Malware 1.35
Database version: 1927
Windows 5.1.2600 Service Pack 3

2009.04.01 12:20:18
mbam-log-2009-04-01 (12-20-18).txt

Scan type: Quick Scan
Objects scanned: 74859
Time elapsed: 3 minute(s), 21 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 4
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\acpi32 (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\systemntmi (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nicsk32 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fips32cup (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

By the way, nod32 still reports same trojan.

Edited by klemkas, 01 April 2009 - 04:47 AM.


BC AdBot (Login to Remove)

 


#2 Guest_The weatherman_*

Guest_The weatherman_*

  • Guests
  • OFFLINE
  •  

Posted 01 April 2009 - 05:38 PM

Moved to a more appropriate forum. TW

#3 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male

Posted 02 April 2009 - 12:39 AM

You log shows a Rootkit infection. Some of those can be very nasty and your online passwords may have been compromised.

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#4 klemkas

klemkas
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 02 April 2009 - 08:23 AM

So, i did everything step-by-step as instructed, and to my surprise the scan did not detect anything. I restarted the pc, and as soon as i launched mozilla firefox browser, nod32 reported that TrojanDownloader.Wigon.BS was removed (cleaned by deleting, quarantined) in some system folder.

Maybe the problem can be in the firefox browser itself? as soon as it starts browsing the alerts are appearing. And does this mean, that trojan is not effective? but it just sits somewhere and tries to activate itself? Because nod32 says it has removed trojan.

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 04/02/2009 at 04:01 PM

Application Version : 4.26.1000

Core Rules Database Version : 3824
Trace Rules Database Version: 1780

Scan type	   : Complete Scan
Total Scan Time : 01:13:03

Memory items scanned	  : 228
Memory threats detected   : 0
Registry items scanned	: 5366
Registry threats detected : 0
File items scanned		: 19369
File threats detected	 : 0

i also scanned again with malwarebytes and it found 9 infections again, i'm restarting and trying to scan again.

Malwarebytes' Anti-Malware 1.35
Database version: 1927
Windows 5.1.2600 Service Pack 3

2009.04.02 16:44:57
mbam-log-2009-04-02 (16-44-56).txt

Scan type: Full Scan (C:\|D:\|)
Objects scanned: 146710
Time elapsed: 29 minute(s), 48 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 8
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\acpi32 (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i386si (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\systemntmi (Rootkit.Spamtool) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ws2_32sik (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nicsk32 (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\netsik (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\fips32cup (Rootkit.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ksi32sk (Rootkit.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Documents and Settings\Dovile\Local Settings\Temp\BN23.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

Ok, the second scan found 2 infections again, i didn't open the browser before scaning this time and am restarting pc again.

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\acpi32 (Rootkit.Spamtool) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\Dovile\Local Settings\Temp\BN9.tmp (Trojan.Agent) -> Quarantined and deleted successfully.

and again
Registry Keys Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\acpi32 (Rootkit.Spamtool) -> Quarantined and deleted successfully.

the next time malwarebytes did not detect anything, but after a minute nod32 reported again and i scanned again, and it found the same C:\Documents and Settings\Dovile\Local Settings\Temp\BN9.tmp (Trojan.Agent) AGAIN. so it's replenishing. (oh, and the browser wasn't on, so it's not the browser...)

by the way, when restarting, before shutdown a warning appears "dovile.exe the application failed to initialize because dll initialization failed" (dovile is the pc user name). what the hell is going on.....

Edited by klemkas, 02 April 2009 - 09:08 AM.


#5 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:01 AM

Posted 02 April 2009 - 04:25 PM

Please print out and follow these instructions: "How to use SDFix". This program is for Windows 2000/XP ONLY.
When using this tool, you must use the Administrator's account or an account with "Administrative rights"
  • Disconnect from the Internet and temporarily disable your anti-virus, script blocking and any real time protection programs before performing a scan.
  • When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt.
  • If SDFix is unable to run after rebooting from Safe Mode, run SDFix in either Mode, and type F, then press Enter for it to finish the final stage and produce the report.
  • Please copy and paste the contents of Report.txt in your next reply.
  • Be sure to renable you anti-virus and and other security programs before connecting to the Internet.
-- If the computer has been infected with the VirusAlert! malware warning from the clock and the Start Menu icons or drives are not visible, open the SDFix folder, right-click on either the XP_VirusAlert_Repair.inf or W2K VirusAlert_Repair.inf (depending on your version of Windows) and select Install from the Context menu. Then reboot to apply the changes.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#6 klemkas

klemkas
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 04 April 2009 - 03:50 AM

Hi there, well, i used SDFix and still nothing. same warnings from nod32. the report file is large enough, so i'll atach it separately.
by the way, McAfee on other pc reported SDFix.exe as trojan itself, is it right?
Posted Image
ok, i didn't find how to attach files, so here it goes.
[b]SDFix: Version 1.240 [/b]
Run by Administrator on 2009.04.04 at 11:34

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

[b]Checking Services [/b]:


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


[b]Checking Files [/b]: 

No Trojan Files Found






Removing Temp Files

[b]ADS Check [/b]:
 


								 [b]Final Check [/b]:

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2009-04-04 11:38:13
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:10,b5,fc,c1,3f,20,fd,b5,29,ee,e3,88,17,df,04,52,7d,47,fc,c1,c4,..
"p0"="C:\Program Files\DAEMON Tools Lite\"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"khjeh"=hex:9b,01,77,95,f1,d6,6b,f7,b7,c5,40,48,8c,8a,29,80,48,90,1f,81,a8,..
"a0"=hex:20,01,00,00,32,a6,75,ba,4a,f3,73,08,ce,a9,c9,9e,32,b9,a9,81,84,..

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:9b,ee,60,bb,97,6a,3f,af,3b,a7,12,7d,78,ce,7d,8b,6f,ec,13,09,2b,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:10,b5,fc,c1,3f,20,fd,b5,29,ee,e3,88,17,df,04,52,7d,47,fc,c1,c4,..
"p0"="C:\Program Files\DAEMON Tools Lite\"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"khjeh"=hex:9b,01,77,95,f1,d6,6b,f7,b7,c5,40,48,8c,8a,29,80,48,90,1f,81,a8,..
"a0"=hex:20,01,00,00,32,a6,75,ba,4a,f3,73,08,ce,a9,c9,9e,32,b9,a9,81,84,..

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:dc,ea,68,3e,86,41,3e,88,1a,98,1a,8c,66,2c,b9,32,8c,4a,6e,9c,8b,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000000
"khjeh"=hex:10,b5,fc,c1,3f,20,fd,b5,29,ee,e3,88,17,df,04,52,7d,47,fc,c1,c4,..
"p0"="C:\Program Files\DAEMON Tools Lite\"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"khjeh"=hex:9b,01,77,95,f1,d6,6b,f7,b7,c5,40,48,8c,8a,29,80,48,90,1f,81,a8,..
"a0"=hex:20,01,00,00,32,a6,75,ba,4a,f3,73,08,ce,a9,c9,9e,32,b9,a9,81,84,..

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:9b,ee,60,bb,97,6a,3f,af,3b,a7,12,7d,78,ce,7d,8b,6f,ec,13,09,2b,..

scanning hidden registry entries ...

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\413064731629BE848A040689F8B9D36A\Features]
"`\1r?i?f?t?a?s?"="u).as5R.J9Uj3_MIwHEI(E&G0T-aJ@h-dKex)ZAkt-gA_D&n~=*(HK_U.foa"
"}\1o?d?y?n?o?_?p?r?o?g?r?a?m?a?"="@0'Gj8,t_8kE{5CRj=X3LX`@fv2$c9R*KMfyoe[N`w-T,zlUA9LXr}WHD6?D^}bK(Wwqq=k[CjKgKEg_C1_gq{JgQAQpK.d2LBQyJ$n$7p'qM?ug0lH9qZDC=e-?(ZKi1?_xT+Bu0HTg,%llb&FrP968xnb[gQZ*HqgwP4,[A@+kEe5]O970"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports]
"\\N-7D898894C56D4\Tisk/rna"=""

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


[b]Remaining Services [/b]:




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\WINDOWS\\system32\\dpvsetup.exe"="C:\\WINDOWS\\system32\\dpvsetup.exe:*:Enabled:Microsoft DirectPlay Voice Test"
"C:\\WINDOWS\\system32\\rundll32.exe"="C:\\WINDOWS\\system32\\rundll32.exe:*:Enabled:Run a DLL as an App"
"C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\HP1006MC.EXE"="C:\\WINDOWS\\system32\\spool\\drivers\\w32x86\\3\\HP1006MC.EXE:*:Enabled:SMLMProxy Module - HP1006MC.EXE"
"C:\\Program Files\\ApexDC++\\ApexDC.exe"="C:\\Program Files\\ApexDC++\\ApexDC.exe:*:Enabled:ApexDC++ - Pinnacle of File Sharing"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\SPSSInc\\SPSS16\\SPSSWinWrapIDE.exe"="C:\\Program Files\\SPSSInc\\SPSS16\\SPSSWinWrapIDE.exe:*:Disabled:SPSS Basic Script Editor (1033)"
"C:\\Program Files\\SPSSInc\\SPSS16\\spss.com"="C:\\Program Files\\SPSSInc\\SPSS16\\spss.com:*:Disabled:SPSS 16.0 for Windows (1033:com)"
"C:\\Program Files\\SPSSInc\\SPSS16\\spss.exe"="C:\\Program Files\\SPSSInc\\SPSS16\\spss.exe:*:Disabled:SPSS 16.0 for Windows (1033:exe)"
"C:\\Program Files\\Kyodai Mahjongg 2006\\kmj.exe"="C:\\Program Files\\Kyodai Mahjongg 2006\\kmj.exe:*:Enabled:Kyodai Mahjongg"
"C:\\Program Files\\uTorrent\\uTorrent.exe"="C:\\Program Files\\uTorrent\\uTorrent.exe:*:Enabled:æTorrent"
"C:\\WINDOWS\\system32\\userinit.exe"="C:\\WINDOWS\\system32\\userinit.exe:*:Enabled:ENABLE"
"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype"
"C:\\WINDOWS\\Explorer.EXE"="C:\\WINDOWS\\Explorer.EXE:*:Enabled:ENABLE"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"

[b]Remaining Files [/b]:



[b]Files with Hidden Attributes [/b]:

Mon  7 Jan 2008		   352 A..H. --- "C:\WINDOWS\nod32fixtemdono.reg"
Mon  3 Mar 2008		 5,702 A..H. --- "C:\WINDOWS\nod32restoretemdono.reg"
Wed  1 Apr 2009		20,451 ...H. --- "C:\Documents and Settings\Dovile\Dovile.exe"
Tue 20 May 2003	   118,784 A..H. --- "C:\WINDOWS\system\Advapii.dll"
Mon  6 Oct 2008		 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Wed 11 Feb 2009	 9,934,392 A..H. --- "C:\Program Files\Google\Picasa3\setup.exe"
Sun 14 Dec 2008			 0 A.SH. --- "C:\Documents and Settings\All Users\DRM\Cache\Indiv01.tmp"
Thu 12 Feb 2009			 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\44fb4874aea086fc46affdc6f401b232\BIT30.tmp"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\aqb5r9d.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\bfzg2m9.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\cv7qqil.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\e09oqdh.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\e5s1djw.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\fx0q71p.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\giad7oa.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\gvurjdu.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\h7bq7dm.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\i9mdc9n.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\idpy8vw.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\iv1aoo9.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\ivxvn92.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\iyl948r.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\j3x4ktn.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\jxvtczc.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\k7vb6ys.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\m04yoa4.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\mhiib58.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\mtp1ktb.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\oxx6f27.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\peaevz6.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\q75oheq.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\qlgrf7o.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\r0a09ba.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\r568p64.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\r5vap6i.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\ref9nrm.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\rw4qk2x.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\tqm6cik.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\uejgfrr.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\uqpu7gz.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\uzpcdj3.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\veuuhn8.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\vrcpqmt.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\wtgpwpf.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\xlfwvg7.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\xvm83td.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\y89mmzy.dll"
Sat 25 Oct 2008			16 ...H. --- "C:\Documents and Settings\All Users\Application Data\SafeNet Sentinel\Sentinel RMS Development Kit\System\ybzbt6b.dll"

[b]Finished![/b]


#7 klemkas

klemkas
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:11:01 AM

Posted 04 April 2009 - 03:57 AM

i found one more topic about this trojan, should i try the procedures posted there?
http://www.bleepingcomputer.com/forums/t/214455/win32trojandownloaderwigonbs/

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,573 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:01 AM

Posted 05 April 2009 - 04:46 PM

i found one more topic about this trojan, should i try the procedures posted there?
http://www.bleepingcomputer.com/forums/t/214455/win32trojandownloaderwigonbs/

You should never follow advice given to someone else, as this is specifically for their computer and may cause problems on yours.

Given the severity of your infection, I think it's time to head on over to the HijackThis forum for a closer look.

Preparation Guide for use before posting a HijackThis Log

Go straight to Step 6. Be sure to include a link to this thread so they can see what has already been tried.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#9 klemkas

klemkas
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:01 AM

Posted 06 April 2009 - 01:10 PM

Hi, thanks, i will do that first thing in the morning, thanks a lot for Your efforts to help. (though it would probably be easier just to format that damn thing, but now it's personal).
Take care, thanks again!

#10 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,805 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:11:01 AM

Posted 07 April 2009 - 08:54 PM

Hello klemkas,

Now that you have a log posted here: http://www.bleepingcomputer.com/forums/t/217519/win32trojandownloaderwigonbs/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users