Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Removal of huhugafe.dll


  • This topic is locked This topic is locked
7 replies to this topic

#1 adrajpuc

adrajpuc

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:01:00 AM

Posted 28 February 2010 - 07:41 PM

Hi,

My friend's computer had some problems and she asked me to take a look. I used Malwarebytes to remove some viruses, enabled her Windows firewall and configured her AVG free 9.0 (it was already loaded on the computer). Both Malwarebytes and AVG report no viruses when doing a full scan. However, using Process Explorer, I notice there is a dll being executed called huhugafe.dll. It seems to be running under the svchost for things like Windows automatic update. I disable Windows updates, but after about 20 minutes or so, this DLL is reported as being active. I've searched online and it appears to be a virus, but Malwarebytes and AVG don't seem to find it. Process Explorer points to c:\WINDOWS\system32\huhugafe.dll, but I don't see this file (I enabled viewing of hidden system files and even used the command line program).

Any tips on what to do about this? Is it really a virus? Is there a particular piece of software I can use to remove it?

Thanks,
Aaron

Edited by Orange Blossom, 28 February 2010 - 08:52 PM.
Move to AII. ~ OB


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,323 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:00 AM

Posted 28 February 2010 - 09:46 PM

Hello this is a Vundo variant.
SAS should see it.

Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Please ask any needed questions,post logs and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 adrajpuc

adrajpuc
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:01:00 AM

Posted 02 March 2010 - 11:11 PM

The instructions you provided were clear and complete, I had no trouble running them and removing the viruses. SAS caught 2 viruses, a fake anti-virus one and Vundo. I re-ran MBAM and it caught one additional one. I was a little surprised, I thought MBAM would have retuned a clean bill of health. The logs are attached below. However, Process Explorer is claiming that rundll32.exe is running under an svchost and that the command line is the following:

C:\WINDOWS\system32\rundll32.exe "C:\WINDOWS\system32\huhugafe.dll",d

So this would seem to imply that despite the claims by SAS and MBAM to have found and cleaned the viruses, they are still on the computer. I haven't notice any unusual behavior yet, I plan on letting the PC run overnight. But huhugafe.dll still seems to be starting up so I'm assuming the PC is still infected.

Any other thoughts?

The only step I guess I didn't do was the following:

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

Mozilla is loaded on the computer as well as internet explorer. Is Mozilla the same thing as FireFox? Could skipping this step have caused the problem to return?

Here are the logs:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/02/2010 at 09:51 PM

Application Version : 4.34.1000

Core Rules Database Version : 4632
Trace Rules Database Version: 2444

Scan type : Complete Scan
Total Scan Time : 03:38:16

Memory items scanned : 230
Memory threats detected : 0
Registry items scanned : 6322
Registry threats detected : 4
File items scanned : 98120
File threats detected : 0

Rogue.AntiVirusPlus
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C2B5AAB8-2183-4BE7-81A6-F11493C45872}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C2B5AAB8-2183-4BE7-81A6-F11493C45872}

Adware.Vundo/Variant
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D263FA6D-84CC-48A8-9AF6-C664362B7A5B}
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D263FA6D-84CC-48A8-9AF6-C664362B7A5B}


Malwarebytes' Anti-Malware 1.44
Database version: 3817
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.11

3/2/2010 10:49:14 PM
mbam-log-2010-03-02 (22-49-14).txt

Scan type: Quick Scan
Objects scanned: 140836
Time elapsed: 8 minute(s), 35 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 1
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\Documents and Settings\Owner.YOUR-US67PI6LUV\Application Data\SystemProc (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
(No malicious items detected)

Edited by adrajpuc, 03 March 2010 - 10:09 AM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,323 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:00 AM

Posted 02 March 2010 - 11:29 PM

Hello, ues it is reattaching itself to legitimaye ,exe files. We are going to need to use stronger tools. we will need to see a DDS log and rootkit log.
You will need to Download and Run DDS which will create a Pseudo HJT Report as part of its log..
If for some reason you cannot perform a step, move on to the next.
Please follow this guide. go and do steps 6 thru 8 ,, Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help . Then go here Virus, Trojan, Spyware, and Malware Removal Logs ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 adrajpuc

adrajpuc
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:01:00 AM

Posted 03 March 2010 - 10:14 AM

OK, I will do these latest steps and re-post.

In the meantime, I think I may have skipped a step in your previous instructions:

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.

Mozilla is loaded on the computer as well as internet explorer. I didn't do the FireFox step because I hadn't realized my friend may have been using FireFox. Could skipping this step have caused the problem to return?

Thanks,
Aaron

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,323 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:00 AM

Posted 03 March 2010 - 11:21 AM

Most likely not as this is probably in an exe or dll and if it is it will show in the next logs. So we're still better just going thru DDS
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 adrajpuc

adrajpuc
  • Topic Starter

  • Members
  • 15 posts
  • OFFLINE
  •  
  • Local time:01:00 AM

Posted 08 March 2010 - 08:53 PM

I completed the scanning using DDS and posted the logs as instructed. You can find the post here: http://www.bleepingcomputer.com/forums/t/301279/logs-for-detection-of-possible-rootkit-virus/

Thanks,
Aaron

#8 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,960 posts
  • ONLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:01:00 AM

Posted 09 March 2010 - 12:17 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/301279/logs-for-detection-of-possible-rootkit-virus/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users