Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

WinPC Defender is Making My Life a Misery!


  • This topic is locked This topic is locked
10 replies to this topic

#1 gazillionaire88

gazillionaire88

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 28 May 2009 - 09:17 AM

I've got myself into a right pickle i've read all the instructions on how to remove it but it's still on my system. Malwarebytes doesnt run for me and i dont know what to do! help me please. :thumbsup:

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,946 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:10 PM

Posted 28 May 2009 - 12:34 PM

Some types of malware will disable Malwarebytes Anti-Malware and other security tools. If MBAM will not install, try renaming it and changing the file extension. <- click this link if you do not see the file extension
  • Right-click on the mbam-setup.exe file, rename it to mysetup and change the .exe extension to .scr, .com, .pif, or .bat.
  • Then double-click on mysetup.scr (or whatever extension you renamed it) to begin installation.
  • If after installation, MBAM will not run, open the Malwarebytes' Anti-Malware folder in Program Files.
  • Right-click on mbam.exe, rename it to myscan and change the .exe extension in the same way as noted above.
  • Double-click on myscan.scr (or whatever extension you renamed it) to launch the program.
If using Windows Vista, refer to How to Change a File Extension in Windows Vista.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 gazillionaire88

gazillionaire88
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 29 May 2009 - 09:54 AM

hello mate,

I've tried what you told me to do and still mbam won't run :thumbsup: is there anything else I can try? sorry for the late reply I've been at work. thanks Gaz.

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,946 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:10 PM

Posted 29 May 2009 - 02:51 PM

Please download and scan with Dr.Web CureIt - alternate download link.
Follow these instructions for performing a scan in "safe mode" after running ATF-Cleaner.
If you cannot boot into safe mode, then perform your scan in normal mode. Be aware, this scan could take a long time to complete.
-- Post the log in your next reply. If you can't find the log, try to write down what was detected/removed before exiting Dr.WebCureIt so you can provide that information.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 gazillionaire88

gazillionaire88
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 29 May 2009 - 08:03 PM

:thumbsup: Hi mate i did a scan with cureit and it got three quarters of the way through and found over 200 infections and then it crashed and went off. Just out of blind luck i gave mbam a try and it worked! no problems at all atm so I think everythings fine now unless there's anything else I should try? Also I've got the log from the mbam scan.

:\program files\mywebsearch\bar\Message\COMMON\stop.gif (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Message\COMMON\systray.htm (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Message\COMMON\systrayp.htm (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Message\COMMON\tp_grad.gif (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Message\COMMON\warn.gif (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\COMMON.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\DOG.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\FISH.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\KUNGFU.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\LIFEGARD.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\MAID.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\MAILBOX.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\OPERA.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\ROBOT.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\SEDUCT.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Notifier\SURFER.F3S (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Settings\prevcfg2.htm (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Settings\setting2.htm (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Settings\settings.dat (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> No action taken.
c:\program files\mywebsearch\SrchAstt\1.bin\MWSSRCAS.DLL (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\AvatarSmallBtn.html (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\CursorManiaBtn.htmlx (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\FunBuddyIconBtn.html (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\MailStampBtn.htmlx (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\MyFunCardsIMBtn.html (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\MyStationeryBtn.htmlx (Adware.MyWebSearch) -> No action taken.
c:\program files\funwebproducts\Shared\Cache\SmileyCentralBtn.html (Adware.MyWebSearch) -> No action taken.
c:\program files\internetgamebox\InternetGameBox.exe (Adware.EGDAccess) -> No action taken.
c:\documents and settings\rod smith\application data\yourprivacyguard\Logs\update.log (Rogue.Yourprivacyguard) -> No action taken.
c:\program files\spyware-secure\config.s3db (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\Gfx_en.bin (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\language (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\nbmw (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\quarantine.s3db (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\skin (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\Spyware-Secure.url (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_Trial_EN.zip (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\explo_intro.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\explo_menu.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\file.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\fleche.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\folder.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\folder_f.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\folder_o.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\index.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\menu.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\menu3.js (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\spy.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\trait_coud.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\trait_droit.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\trait_vert.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\fleche.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\folder.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\key.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\menu.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\support.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\title-hepfile.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\EN\dowload-file-antispyware.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\EN\menu.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\images\EN\scstep2.gif (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\3differentscan.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\contactus.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\found-objects.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\lexic.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\navigtabs.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\quarantine.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\help\help_trial_en\rubs\register.htm (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\cookies_1-12.dat (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\filesDesc_1-12.dat (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\filesDesc_1-12.dic (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\filesExt_1-12.dat (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\filesMulti_1-12.idx (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\filesSimple_1-12.idx (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\malwaresDB_1-12 (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\register_1-12.dat (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\trad_demo_EN.txt (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\trad_demo_ES.txt (Rogue.Spyware-Secure) -> No action taken.
c:\program files\spyware-secure\resources\trad_demo_FR.txt (Rogue.Spyware-Secure) -> No action taken.
c:\documents and settings\rod smith.rs-0f7bd017d1fa\Desktop\WinPC Defender.LNK (Rogue.WinPCDefender) -> No action taken.
c:\documents and settings\rod smith.rs-0f7bd017d1fa\start menu\WinPC Defender.LNK (Rogue.WinPCDefender) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.
c:\documents and settings\rod smith\favorites\Error Cleaner.url (Rogue.Link) -> No action taken.
c:\documents and settings\rod smith\favorites\Privacy Protector.url (Rogue.Link) -> No action taken.
c:\documents and settings\rod smith\favorites\Spyware&Malware Protection.url (Rogue.Link) -> No action taken.
c:\documents and settings\all users\start menu\Programs\Startup\.protected (Rogue.Multiple) -> No action taken.
c:\documents and settings\rod smith\start menu\Programs\Startup\.protected (Rogue.Multiple) -> No action taken.
c:\.protected (Rogue.Multiple) -> No action taken.

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,946 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:10 PM

Posted 30 May 2009 - 05:53 AM

It wasn't blind luck. DrWebCureIt sometimes will remove enough of the malware to allow MBAM to run.

Now rescan again with Malwarebytes Anti-Malware but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

Please post a complete MBAM log to include the top portion which shows the program/database version, operating system, date of scan and scan type.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 gazillionaire88

gazillionaire88
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 01 June 2009 - 09:31 PM

hey sorry for the delay swamped with work and college atm! heres the log

Malwarebytes' Anti-Malware 1.37
Database version: 2211
Windows 5.1.2600 Service Pack 2

6/1/2009 3:20:15 AM
mbam-log-2009-06-01 (03-20-10).txt

Scan type: Full Scan (C:\|)
Objects scanned: 249250
Time elapsed: 1 hour(s), 4 minute(s), 29 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 23

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\program files\msn messenger\riched20.dll (Adware.MyWeb.FunWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP105\A0023712.dll (Adware.Seekmo) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039634.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039644.dll (Adware.MyWeb.FunWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039645.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039646.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039647.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039648.EXE (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039649.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039650.EXE (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039651.EXE (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039652.EXE (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039653.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039654.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039655.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039657.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039658.EXE (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039659.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039660.DLL (Adware.MyWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039665.EXE (Adware.MyWeb.FunWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP126\A0039666.DLL (Adware.MyWeb.FunWeb) -> No action taken.
c:\system volume information\_restore{e5b184a2-60a1-4983-b72f-d8219932cd04}\RP148\A0056147.dll (Adware.Seekmo) -> No action taken.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,946 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:10 PM

Posted 02 June 2009 - 07:01 AM

Now rescan again with Malwarebytes Anti-Malware but this time perform a Full Scan in normal mode and check all items found for removal. Don't forgot to check for database definition updates through the program's interface (preferable method) before scanning and to reboot afterwards. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. When done, click the Logs tab and copy/paste the contents of the new report in your next reply.

IMPORTANT NOTE: One or more of the identified infections (uacinit.dll is related to a nasty variant of the TDSSSERV rootkit component. Rootkits, backdoor Trojans, Botnets, and IRCBots are very dangerous because they compromise system integrity by making changes that allow it to by used by the attacker for malicious purposes. Rootkits are used by Trojans to conceal its presence (hide from view) in order to prevent detection of an attacker's software and make removal more difficult. Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. They can disable your anti-virus and security tools to prevent detection and removal. Remote attackers use backdoors as a means of accessing and taking control of a computer that bypasses security mechanisms. This type of exploit allows them to steal sensitive information like passwords, personal and financial data which is send back to the hacker. To learn more about these types of infections, you can refer to:If your computer was used for online banking, has credit card information or other sensitive data on it, you should disconnect from the Internet until your system is cleaned. All passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised and change each password using a clean computer, not the infected one. If not, an attacker may get the new passwords and transaction information. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connect again. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read:Although the infection has been identified and may be removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume the computer is secure even if the malware appears to have been removed. In some instances an infection may have caused so much damage to your system that it cannot be completely cleaned or repaired so you can never be sure that you have completely removed a rootkit. The malware may leave so many remnants behind that security tools cannot find them. Tools that claim to be able to remove rootkits cannot guarantee that all traces of it will be removed. Many experts in the security community believe that once infected with this type of malware, the best course of action is to wipe the drive clean, reformat and reinstall the OS. Please read:Should you decide not to follow that advice, we will do our best to help clean the computer of any infections but we cannot guarantee it to be trustworthy or that the removal will be successful. Let me know how you wish to proceed.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#9 gazillionaire88

gazillionaire88
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:10 PM

Posted 02 June 2009 - 06:24 PM

Here's the log from the latest mbam scan.

Malwarebytes' Anti-Malware 1.37
Database version: 2216
Windows 5.1.2600 Service Pack 2

6/2/2009 12:10:43 AM
mbam-log-2009-06-02 (00-10-39).txt

Scan type: Full Scan (C:\|)
Objects scanned: 251141
Time elapsed: 58 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> No action taken.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> No action taken.

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,946 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:10 PM

Posted 02 June 2009 - 08:38 PM

Some infections are difficult to remove completely because of their morphing characteristics which allows the malware to regenerate itself. Sometimes there is hidden piece of malware (i.e. rootkit) which has not been detected by your security tools that protects malicious files and registry keys so they cannot be permanently deleted. Disinfection will probably require the use of more powerful tools than we recommend in this forum. Before that can be done you will need you to create and post a DDS/HijackThis log for further investigation.

Please read the pinned topic titled "Preparation Guide For Use Before Posting A Hijackthis Log". If you cannot complete a step, then skip it and continue with the next. In Step 6 there are instructions for downloading and running DDS which will create a Pseudo HJT Report as part of its log.

When you have done that, post your log in the HijackThis Logs and Malware Removal forum, NOT here, for assistance by the HJT Team Experts. A member of the Team will walk you through, step by step, on how to clean your computer. If you post your log back in this thread, the response from the HJT Team will be delayed because your post will have to be moved. This means it will fall in line behind any others posted that same day.

Start a new topic, give it a relevant title and post your log along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. An expert will analyze your log and reply with instructions advising you what to fix. After doing this, we would appreciate if you post a link to your log back here so we know that your getting help from the HJT Team.

Please be patient. It may take a while to get a response because the HJT Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,805 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:12:10 PM

Posted 03 June 2009 - 08:22 PM

Hello,

Now that you have posted a log here: you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a HJT Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the HJT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the HJT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the HJT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond. Please be patient. It may take a while to get a response but your log will be reviewed and answered as soon as possible

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users