Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

mbam can't remove uacinit.dll after reboot


  • Please log in to reply
18 replies to this topic

#1 kdub38

kdub38

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 10 August 2009 - 10:16 PM

I'm running xp, getting the usual malware symptoms: fake warnings, disabled programs etc.

Through reading this site I was able to get most of it off finally. Now it's down to this last tenacious bit.

Here is the latest log:


Malwarebytes' Anti-Malware 1.40
Database version: 2595
Windows 5.1.2600 Service Pack 3

8/10/2009 9:21:54 PM
mbam-log-2009-08-10 (21-21-54).txt

Scan type: Quick Scan
Objects scanned: 94046
Time elapsed: 4 minute(s), 28 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\phheq.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Delete on reboot.

Edited by Pandy, 10 August 2009 - 10:30 PM.
Moved from Win XP Home and Pro ~Pandy


BC AdBot (Login to Remove)

 


#2 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 10 August 2009 - 10:24 PM

We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive.
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check only the Files box: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#3 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 10 August 2009 - 10:51 PM

Thanks for your quick reply. Please be patient with me .

Rootrepeal first gave me an alert to adjust the disk access level. I clicked on the dialog box to get it out of my way (it took a few times), and then it started

on its own.

The log:

ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2009/08/10 22:29
Program Version: Version 1.3.3.0
Windows Version: Windows XP SP3
==================================================

Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!

Path: C:\WINDOWS\system32\UACdshhckrddv.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UAChyqqfsapjk.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\uacinit.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACobojrrcltd.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UAConbtkpbxna.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACrkqnnnivba.dat
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACtnfbwdlvxr.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACuvfehdirwq.db
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\UACwklqacfipj.dll
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac1ed5.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac20d4.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac21e2.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac26e4.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac2f8e.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac2f9e.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac3602.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac3f3e.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac425b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4583.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4672.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac477b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4866.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4880.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4b10.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac4dfe.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5093.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac51c7.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5295.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac53fe.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5585.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac56ec.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac573b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac575a.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5873.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac592f.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5a77.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5a96.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5aa6.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5c6b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5c7a.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5d36.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac85fb.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5e4f.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5f2a.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac5fc6.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6033.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac61aa.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac641b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac642b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6592.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6786.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac690d.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6af1.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6d82.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac6e8b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac73e8.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac84b1.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac87ce.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac87ef.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8966.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8a8d.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8ae1.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8b4b.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8dfa.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac8e36.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uac923e.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uaca0ea.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\UACb38c.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uacb695.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uacba1f.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uacbcbf.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uacbfdc.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uacc3a5.tmp
Status: Invisible to the Windows API!

Path: C:\WINDOWS\Temp\uxeventlog.txt
Status: Invisible to the Windows API!

Path: C:\WINDOWS\system32\drivers\UACnhkqxvrmbv.sys
Status: Invisible to the Windows API!

Path: c:\documents and settings\owner\local settings\temp\~df964e.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\owner\local settings\temp\~df3cc3.tmp
Status: Allocation size mismatch (API: 131072, Raw: 16384)

Path: c:\documents and settings\owner\local settings\temp\~dfaed8.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: c:\documents and settings\owner\local settings\temp\~dfba80.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\Documents and Settings\Owner\Local Settings\Temp\UAC5a43.tmp
Status: Invisible to the Windows API!

Path: c:\documents and settings\owner\local settings\temp\~df667d.tmp
Status: Allocation size mismatch (API: 16384, Raw: 0)

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\63RH6OY3\uac%20virus%20xp[1].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\63RH6OY3\uac%20virus%20xp[1].txt
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\X7SFFJT4\uac%20xp%20disable[1].htm
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\X7SFFJT4\uac%20xp%20disable[1].txt
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\X7SFFJT4\UACANI74BRCAJRZVESCAPH9Q1VCAVFFGTICA1X5U2TCA27IXRACAOOIY6KCA2FC56OCA8DR47ICAELTVK9CA43S76UCAR7GS2ICALQVIK7CATQYLOECAYC60VVCA7NNE7NCAQS7LBBCADVK4OLCAFIN973CAI35H1C
Status: Invisible to the Windows API!

Path: C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\Content.IE5\X7SFFJT4\Uacinit_dll_t103575.html;ce=1;je=1;sr=1280x768x32;dc=4a7faf4b-d3c74-7a4aa-2ad5d;dg=P5330-W-MS-8;dst=1;et=1249958196062;tzo=300;a=p-fdwEfW0hIeH9U;tags=405.5935[1].gif
Status: Invisible to the Windows API!

==EOF==

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,331 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:07:14 AM

Posted 10 August 2009 - 11:25 PM

Hello... Now the next step...

Rerun Rootrepeal. After the scan completes, go to the files tab and find these files:

C:\WINDOWS\system32\UACdshhckrddv.dll
C:\WINDOWS\system32\UAChyqqfsapjk.dll
C:\WINDOWS\system32\uacinit.dll
C:\WINDOWS\system32\UACobojrrcltd.dll
C:\WINDOWS\system32\UAConbtkpbxna.dll
C:\WINDOWS\system32\UACtnfbwdlvxr.dll
C:\WINDOWS\system32\UACwklqacfipj.dll
C:\WINDOWS\system32\drivers\UACnhkqxvrmbv.sys

Then use your mouse to highlight it in the Rootrepeal window.
Next right mouse click on it and select *wipe file* option only.
Then immediately reboot the computer.



Rerun MBAM like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan.
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

How is it running now?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 11 August 2009 - 12:25 AM

So far so good!

I checked for updates with mbam, but was already up to date.

Here's the first scan:

Malwarebytes' Anti-Malware 1.40
Database version: 2595
Windows 5.1.2600 Service Pack 3

8/10/2009 11:53:57 PM
mbam-log-2009-08-10 (23-53-57).txt

Scan type: Quick Scan
Objects scanned: 95474
Time elapsed: 9 minute(s), 18 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 1
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 32

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Program Files\Protection System (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\Temp\Installer.exe (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac4880.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac51c7.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac5585.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac592f.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac5a77.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac5a96.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac5e4f.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac5f2a.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac641b.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac642b.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac6786.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac6d82.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac87ce.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac87ef.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac8dfa.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uac923e.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uacba1f.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\uacc3a5.tmp (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\Program Files\Protection System\core.cga (Rogue.ProtectionSystem) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\nudetube.com.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\pornotube.com.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\Documents and Settings\All Users\Desktop\youporn.com.lnk (Rogue.Link) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACdshhckrddv.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UAChyqqfsapjk.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACobojrrcltd.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UAConbtkpbxna.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACrkqnnnivba.dat (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACtnfbwdlvxr.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACwklqacfipj.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\UACnhkqxvrmbv.sys (Trojan.Agent) -> Quarantined and deleted successfully.




Here's the scan after reboot:

Malwarebytes' Anti-Malware 1.40
Database version: 2595
Windows 5.1.2600 Service Pack 3

8/11/2009 12:07:17 AM
mbam-log-2009-08-11 (00-07-17).txt

Scan type: Quick Scan
Objects scanned: 95172
Time elapsed: 9 minute(s), 14 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

Nice!

After the reboot AVG was on for the first time in days . During the mbam scan it ID'd two items as trojans, but it said they were mbam processes.

They were as follows:

C:\yedfjdy.exe
C:\documents and settings\owner\local settings\temp\c.exe

Hopefully the two programs were just conflicted.

#6 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 11 August 2009 - 12:31 AM

Looks good. Run this scan as a double check.

Please download ATF Cleaner by Atribune & save it to your desktop. alternate download link DO NOT use yet.
Please download and install SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here and unzip into the program's folder.)
  • Under the "Configuration and Preferences", click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Double-click ATF-Cleaner.exe to run the program.
  • Under Main "Select Files to Delete" choose: Select All.
  • Click the Empty Selected button.
  • If you use Firefox browser click Firefox at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • If you use Opera browser click Opera at the top and choose: Select All
  • Click the Empty Selected button.
    If you would like to keep your saved passwords, please click No at the prompt.
  • Click Exit on the Main menu to close the program.
Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.

The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#7 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 11 August 2009 - 07:25 AM

Here's the SAS log:


SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/11/2009 at 01:55 AM

Application Version : 4.27.1002

Core Rules Database Version : 4048
Trace Rules Database Version: 1988

Scan type : Complete Scan
Total Scan Time : 00:56:23

Memory items scanned : 243
Memory threats detected : 0
Registry items scanned : 5328
Registry threats detected : 7
File items scanned : 69945
File threats detected : 4

Adware.Tracking Cookie
C:\Documents and Settings\Owner\Cookies\owner@overture[3].txt
C:\Documents and Settings\Owner\Cookies\owner@questionmarket[3].txt
C:\Documents and Settings\Owner\Cookies\owner@stopzilla[2].txt

Rogue.Component/Trace
HKLM\Software\Microsoft\7C5084AC
HKLM\Software\Microsoft\7C5084AC#7c5084ac
HKLM\Software\Microsoft\7C5084AC#Version
HKLM\Software\Microsoft\7C5084AC#7c50292c
HKLM\Software\Microsoft\7C5084AC#7c5040c9
HKU\S-1-5-21-3248855805-2287819187-2170916956-1003\Software\Microsoft\FIAS4018
HKU\S-1-5-21-3248855805-2287819187-2170916956-1003\Software\Microsoft\FIAS4057

Trojan.Fake-Alert/Trace
C:\Documents and Settings\Owner\Local Settings\Temporary Internet Files\fbk.sts

#8 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 11 August 2009 - 03:41 PM

How's your computer running now?
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#9 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 11 August 2009 - 05:25 PM

So far so good. I haven't been on it today until now, but it has been running all day. I don't see any evidence of anything else happening.

How should I manage my computer from here on out? What should I pay money for if anything, and should I keep these new utiities which I downloaded?

#10 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 12 August 2009 - 02:06 AM

No need to pay for anything. You could keep Malwarebytes and run a scan every now and then.

If you’re clean, you should create a new Restore Point to prevent possible re-infection from an old one.

Go Start > Programs > Accessories > System Tools and click System Restore. Choose the radio button marked Create a Restore Point on the first screen then click Next. Give the Restore Point a name and then click Create. Then use Disk Cleanup to remove all but the most recently created Restore Point. Go Start > Run and type: "Cleanmgr" (without the quotes). Click Ok > More Options tab > Clean Up in the System Restore section to remove all previous restore points except the newly created one.

Also, go Start > Control Panel and double-click Add or Remove Programs. Post back and report any Java entries that you have.
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#11 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 12 August 2009 - 07:31 AM

it says :


"System restore has been turned off by group policy. To turn on System Restore, contact your domain administrator."


This must be a result of the infections.

#12 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 12 August 2009 - 04:39 PM

http://windowsxp.mvps.org/srpolicy.htm
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#13 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 12 August 2009 - 05:04 PM

Ok, System Restore is taken care of.


For Java I have :

J2SE Runtime Environment 5.0 update 2

Java 6 update 13

Java 6 update 7

#14 Budapest

Budapest

    Bleepin' Cynic


  • Moderator
  • 23,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:09:14 PM

Posted 12 August 2009 - 05:08 PM

Those Java entries are out of date. You should remove them and then get the latest from here:

http://java.com/en/download/index.jsp
The power of accurate observation is commonly called cynicism by those who haven't got it.

—George Bernard Shaw

#15 kdub38

kdub38
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:14 AM

Posted 12 August 2009 - 05:32 PM

Is the J2SE Runtime a different thing or should I remove that as well?




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users