hid32.dll a virus?

Discussion in 'Malware Help (A Specialist Will Reply)' started by semenoff1948, Oct 8, 2009.

  1. semenoff1948

    semenoff1948 Private E-2

    So my new antivirus program called Avira is telling me that I have a virus infection and the file is hid32.dll. They say it's a Trojan, specifically "TR/Crypt.ZPACK.Gen Trojan". When I look up hid32.dll on google, I only get websites about viruses and so on. Nothing calling it an essential file. So my question is, how do I get rid of this file? Am I supposed to get rid of this file, or do I just need to get it replaced/repaired?
     
  2. semenoff1948

    semenoff1948 Private E-2

    You know anyone can respond and help out.
     
  3. evilfantasy

    evilfantasy Malware Fighter

    We are very busy in this forum so replies can take some time.

    Here. http://www.threatexpert.com/report.aspx?md5=f24f2ffe27e8dbb6693830ecd5d26d3c

    You need to let Avira fix, quarantine or delete the file. I would then suggest following the instructions in the below link and attach the requested logs to this topic when you finish.

    READ & RUN ME FIRST. Malware Removal Guide

    Once the logs are posted be patient and wait for a reply.
    1. To avoid additional delay in getting a response, it is strongly advised that after completing the READ & RUN ME you also read this sticky:
    Any additional post is a bump which will add more delay. Once you attach the logs, your thread will be in the work queue and as stated our system works the oldest threads FIRST.​
     
  4. semenoff1948

    semenoff1948 Private E-2

    I followed all of your instructions including the links listed instructions. Downloaded necessary files. Ran test and here are the results. Now help me and please answer original question.
    --------------------------------------
    SUPERAntiSpyware Scan Log
    http://www.superantispyware.com

    Generated 10/08/2009 at 03:35 PM

    Application Version : 4.29.1002

    Core Rules Database Version : 4154
    Trace Rules Database Version: 2082

    Scan type : Complete Scan
    Total Scan Time : 01:01:06

    Memory items scanned : 560
    Memory threats detected : 0
    Registry items scanned : 7805
    Registry threats detected : 1
    File items scanned : 35551
    File threats detected : 101

    Trojan.Unknown Origin
    HKU\S-1-5-21-3745066895-2625275812-1350031872-1007\Software\Microsoft\Windows\CurrentVersion\Run#dll32 [ dll32 ]

    Adware.Tracking Cookie
    C:\Documents and Settings\Sojourner\Cookies\sojourner@tracking.gajmp[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.hotchalk[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@atdmt[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@track.freezinger[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media.adrevolver[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@stats.townnews[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@atdmt[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@advertising[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@petfinder[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@collective-media[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.safecountcommunity[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@openxxx.viragemedia[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.googleadservices[8].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.clickmanage[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media.mtvnservices[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.discounttire[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.pgatour[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ad.yieldmanager[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@tribalfusion[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@adserver.finalcall[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@burstnet[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@e-2dj6wfkochcjsbp.stats.esomniture[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ad.yieldmanager[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.discounttiredirect[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@electronicarts.112.2o7[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@discounttiredirect[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@adprotraffic[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@casalemedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@casalemedia[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[5].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@e-2dj6wdmyqndjego.stats.esomniture[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[6].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@api-media.mtvnservices[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[7].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[4].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@media6degrees[8].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.gmbtrack[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.forum-email[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.addynamix[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@cdn4.specificclick[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.chessmedia[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[4].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@aff.primaryads[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[5].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@aff.primaryads[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[6].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@trackalyzer[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@stats.paypal[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@serving-sys[7].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@crackle[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@a1.interclick[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@e-2dj6wak4qmdzibo.stats.esomniture[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@tracking.sms[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@adbrite[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@intermundomedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@socialmedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.lucidmedia[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@chitika[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.pointroll[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.pointroll[5].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@discounttire[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@fastclick[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@realmedia[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.pointroll[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@doubleclick[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@revsci[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@fastclick[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.pointroll[4].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@pubmatic.lucidmedia[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@interclick[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.islamicfinder[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@app.insightgrit[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@viewers.multicastmedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@apmebf[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@tracker.freerun[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.jartrack[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@adserver.finalcallmedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@bizrate[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.discountedwheelwarehouse[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@specificclick[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@specificmedia[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@optimost[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@www.burstnet[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@specificclick[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@msnportal.112.2o7[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@specificmedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.cnn[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.sun[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@download.nmp.neuroticmedia[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@adinterax[2].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.sun[3].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@ads.undertone[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@islamicfinder[1].txt
    C:\Documents and Settings\Sojourner\Cookies\sojourner@invitemedia[1].txt

    Trojan.Agent/Gen-FakeAlert[X32]
    C:\WINDOWS\SYSTEM32\HID32.DLL
    -------------------------------------------
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

  6. semenoff1948

    semenoff1948 Private E-2


    I've uploaded the log file, now can I please have some assistance. I would like to know what the hid32.dll file was and how it infected my system in the first place.
     

    Attached Files:

  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I can't tell you how it got on your system. But any time an infection is found, there are often more infected files, so you need to do what evilfantasy asked you to do. You need to do the Read and Run First Instructions and attach the requested logs.

    We are running days behind and he will get back to you as you come back up into his work queue.
     
  8. semenoff1948

    semenoff1948 Private E-2


    I've already done all that.
     
  9. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No you haven't. You have only attached the SAS log.

    Please attach these logs:
    MBAM
    ComboFix
    RootRepeal
    C:\MGLogs.zip
     
  10. semenoff1948

    semenoff1948 Private E-2

    I believe this is all the logs you are asking for. Now assistance please.
     

    Attached Files:

  11. semenoff1948

    semenoff1948 Private E-2

    Yeah, I've included logs. Still waiting for a response. I'm surprised computer isn't dead by now.
     
  12. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Your bump just cost you about three days. You are now back at the end of the queue.
     
  13. semenoff1948

    semenoff1948 Private E-2

    Great Thursday. As long as it's not 3 years or never, and it's 3 days. That's fine by me.
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are making this process difficult.

    First, you should read this> Warning about Porn, Keygens, Cracks, and other Illegal Softwareas it pertains to this:
    C:\Documents and Settings\Morgan\My Documents\LimeWire\Saved\Sony Vegas Pro 9 + Crack and Key Gen\crack vegas 9\Keygen.exe (Trojan.Agent) -> No action taken. ---> which shows that you may not have fixed the items that MBAM found. Unless you did so after saving the log.

    Second, you did not follow the instructions to put ComboFix on your desktop, instead you put it here:
    C:\ComboFix.exe

    Third, I clearly stated that you needed to attach this:
    C:\MGlogs.zip
     
  15. semenoff1948

    semenoff1948 Private E-2

    I'm trying the best I can. Can you cut me some slack.

    I thought I attached those logs. I've attached so many of them. My mistake, but it's attached to this message.

    As for the combo fix, I didn't know it made much of a difference where it was at. However, it's on my desktop now and I have ran the program.

    Also, I believe everything the virus software had found, including files and keygens were removed completely. However, I didn't remove MGtools even though that popped up in the virus software avira.
     

    Attached Files:

  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    It is a very bad idea to allow all users to have admin. privileges!! You should only have one user with Administrative privileges and set the rest to limited.
    Code:
    Users on this computer:
    Is Admin? | Username
    ------------------
       Yes    | Administrator
       Yes    | FBI
              | Guest (Disabled)
              | HelpAssistant (Disabled)
       Yes    | Morgan
       Yes    | Sojourner
              | SUPPORT_388945a0 (Disabled)
       Yes    | Visitor
    
    Run this: Disable/Remove Windows Messenger to remove Windows Messenger. Do not confuse Windows Messenger with MSN Messenger because they are not the same. Windows Messenger is a frequent cause of popups.

    I would strongly suggest that you uninstall ThreatFire.

    Please use add/remove programs to uninstall:
    Java 2 Runtime Environment, SE v1.4.2_03

    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    After clicking Fix, exit HJT.

    * Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
    If it is not on your Desktop, the below will not work.
    * Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    * If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    * Open Notepad and copy/paste the text in the below code box into it (make sure you scroll all the way down in the code box to get all lines selected ):
    Code:
    KILLALL::
    
    File::
    C:\WINDOWS\System32\hid32.dll
    
    FCopy::
    C:\MGtools\temp\XPSP3\beep.sysmg | C:\WINDOWS\system32\dllcache\beep.sys
    
    Registry::
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\c02bc930670]
    
    * Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    * At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    * You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    If it asks you to overide the prvevious file with the same name, click YES.
    * Now use your mouse to drag CFscript.txt on top of ComboFix.exe
    http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif
    * Follow the prompts.
    * When it finishes, a log will be produced named c:\combofix.txt
    * I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Now remove everything you can in this folder:
    C:\Documents and Settings\Morgan\Local Settings\Temp\

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:

    * C:\ComboFix.txt
    * C:\MGlogs.zip

    Make sure you tell me how things are working now!
     
  17. semenoff1948

    semenoff1948 Private E-2

    Why? What difference does it make? How do I change it anyway?

    I don't know if MGlogs did it's thing right but whatever. I'll upload anyway. Looks like the forums are not allowing me to upload CombFix to the forums. I tried to rename it but it doesn't seem to matter. Say's I already uploaded it.

    Things are working pretty good actually . Higher then average speed. Like the computer is running super fast like it's supposed to. However, I think it's mostly because I turned off the Spyware doctor program at start up and other virus software, which I actually thought were supposed to help the computer. In turn however, they slowed it down. I have not turned them back on because they are annoying, but I know I will have too. So I don't know how that will affect the speed. However, my computer as it is right now is dramatically fast.

    Also, CCleaner is really good.
     

    Attached Files:

  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    The reason behind not allowing all the users to have admin. privileges is because of what you just went through. As soon as malware gets into your system in an administrative account, it full access to all account and all files. If you want to know how to change user account privileges, please post in the software forum.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no real-time protection. They are useful as backup scanners.They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore ato create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds