Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Alert Pop Up Window?


  • Please log in to reply
13 replies to this topic

#1 colochic

colochic

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 02 March 2008 - 09:33 AM

I just recently started getting a pop up window and it doesn't look like it is from windows and have never had it before. (See image below) Before this pops up, I usually get a black box Icon in my program tray (I think that's what it's called, but it's where the icons next to the time is) and I have not been able to catch that with print screen. It says close to the same thing the pop up does.

Posted Image
If the insert image doesn't work, this is the link for the pic. Pic of pop up

I assumed that my computer needed some cleaning and ran my antivirus (Avast) and a spyware remover (Spyware Terminator) and neither have gotten rid of this problem. As soon as this pop up started happening, every time I go to the internet it redirects me to web pages that I have not clicked on. I don't know if these two issues are related, but they started happening at the same time. I'm not a techie so to speak, so I will need help written in a manner which I can understand. Trust me I will ask what it means if I don't.

I am running Windows XP. If there is any other info I need to include please let me know.

BC AdBot (Login to Remove)

 


m

#2 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 02 March 2008 - 02:06 PM

I finally caught the other pop up. This is what it looks like.
Posted Image

#3 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,699 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:09:06 AM

Posted 02 March 2008 - 06:33 PM

Hello colochic and welcome to BC :flowers:

Let's see what another SUPERAntiSpyware will find. I'd like you to run a scan in Safe Mode. You will, of course, install it in normal mode.

Download and install SUPERAntiSpyware free found here: SUPERAntiSpyware

Be sure to click on the download button to the left, not on the free trial download on the right.

Install it and double-click the icon on your desktop to run it.
It will ask if you want to update the program definitions, click Yes.
Under Configuration and Preferences, click the Preferences button.
Click the Scanning Control tab.
Under Scanner Options make sure the following are checked:
  • Close browsers before scanning
  • Scan for tracking cookies
  • Terminate memory threats before quarantining.
o Please leave the others unchecked.
o Click the Close button to leave the control center screen.
Reboot into Safe Mode
On the main screen, under Scan for Harmful Software click Scan your computer.
On the left check C:\Fixed Drive.
On the right, under Complete Scan, choose Perform Complete Scan.
Click Next to start the scan. Please be patient while it scans your computer.
After the scan is complete a summary box will appear. Click OK.
Make sure everything in the white box has a check next to it, then click Next.
It will quarantine what it found and if it asks if you want to reboot, click Yes.
Reboot into Normal Mode
To retrieve the removal information for me please do the following:
o After reboot, double-click the SUPERAntispyware icon on your desktop.
o Click Preferences. Click the Statistics/Logs tab.
o Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
o It will open in your default text editor (such as Notepad/Wordpad).
o Please highlight everything in the notepad, then right-click and choose copy.
Click close and close again to exit the program.

Please post the log in your next reply.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#4 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 02 March 2008 - 10:51 PM

Okay...weird...I ran the scan. It removed/quarantined over 600 items and when I pull up the Satatistics/Logs tab, there is nothing to click on under the Scanner Logs. When I open up SuperAntiSpyware it isn't even showing that I did the scan! It is showing that no scan has been made. Advice?

BTW the bubble from the program tray is still popping up, haven't seen the other window since I did the scan though.

#5 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,699 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:09:06 AM

Posted 02 March 2008 - 11:05 PM

Hello colochic,

That is decidedly peculiar. I've never known that to happen. I need to consult with some folks about where to go from here.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:06 AM

Posted 03 March 2008 - 09:54 AM

Don't worry about the SAS log right now. Your issue appears to be related to a Trojan that uses scare tactics to goad you into purchasing one of several rogue programs to fix it.

Please print out and follow the generic instructions for using "SmitfraudFix". Make sure you scroll down to Clean and perform the steps where you reboot in "Safe Mode" and run option #2.
-- If you have downloaded SmitfraudFix previously, please delete that version and download it again as the tool is frequently updated!
-- If using Windows Vista be sure to Run As Administrator
-- If the tool fails to launch from the Desktop, please move smitfraudFix.exe to the root of the system drive (usually C:\), and run it from there.

Please print out and follow the instructions for using SDFix in BC's self-help tutorial "How to use SDFix".
-- When using this tool, you must use the Administrator's account or an account with "Administrative rights"
When done, the SDFix report log will open in notepad and automatically be saved in the SDFix folder as Report.txt. Please copy and paste the contents of Report.txt in your next reply.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#7 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 03 March 2008 - 09:32 PM

Okay, I have been trying all day and cannot figure out how to open up and run SmitfraudFix in Safe mode. I feel stupid for not being able to figure this out, but help would be appreciated.

Thanks

#8 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,699 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:09:06 AM

Posted 03 March 2008 - 10:24 PM

Hello colochic,

Sorry about the problems you're having. Can you please describe what you are doing and what happens when you try to go into safe mode and use SmitfraudFix.

Are you able to get into Safe Mode? If yes, is the program not opening once you get there? etc.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#9 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 04 March 2008 - 01:17 AM

I can get into safe mode, but the program doesn't open automatically and I can't find it even though it's been downloaded and even saved a copy to my desktop. I have even done a search for it in safe mode and still nothing.

(Thanks so much for all you help!)

#10 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:06 AM

Posted 04 March 2008 - 07:40 AM

After rebooting into safe mode, when you are at the logon prompt, make sure you log in as the same user account which you used to download the file. If not, you may not be able to find the file on your desktop. If your still having problems finding it, go back to normal mode and move it to the root of the system drive (usually C:\) where you will be able to easily locate it when going into safe mode.

Double-click smitfraudfix.exe to start the tool.
  • Select option #2 - Clean by typing 2 and press Enter to delete infected files.
  • Wait for the tool to complete and disk cleanup to finish.
  • You will be prompted: "Registry cleaning - Do you want to clean the registry?" Answer Yes by typing Y and press Enter.
  • The tool will now check if wininet.dll is infected. If a clean version is found, you will be prompted to replace wininet.dll.
  • Answer Yes to the question "Replace infected file?" by typing Y and press Enter.
  • A reboot may be needed to finish the cleaning process.
  • If your computer does not restart automatically, please do it yourself manually (restart normally).
If your still having problems, then go ahead and run the tool in normal mode.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#11 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 05 March 2008 - 10:14 PM

YAY I got it to work. So far no more icky pop ups! Thanks!



SmitFraudFix v2.300

Scan done at 19:55:15.00, Wed 03/05/2008
Run from C:\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

Killing process


hosts


127.0.0.1 localhost

VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


Generic Renos Fix

GenericRenosFix by S!Ri


Deleting infected files

C:\WINDOWS\Tasks\At?.job Deleted
C:\Program Files\eMedia Codec\ Deleted

IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{D307088F-DCEB-46F8-8F1B-B3EDDBC3757A}: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185
HKLM\SYSTEM\CS1\Services\Tcpip\..\{D307088F-DCEB-46F8-8F1B-B3EDDBC3757A}: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185
HKLM\SYSTEM\CS3\Services\Tcpip\..\{D307088F-DCEB-46F8-8F1B-B3EDDBC3757A}: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=207.217.126.81 207.217.77.82 207.69.188.185


Deleting Temp Files


Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


Registry Cleaning

Registry Cleaning done.

SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


End

#12 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:06 AM

Posted 05 March 2008 - 10:54 PM

If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Start > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click "Ok".
  • Click the "More Options" Tab.
  • Click "Clean Up" in the System Restore section to remove all previous restore points except the newly created one.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#13 colochic

colochic
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:08:06 AM

Posted 06 March 2008 - 09:53 AM

I will do that and THANKS SO MUCH!!! You guys are a huge help.

#14 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,579 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:06 AM

Posted 06 March 2008 - 09:56 AM

Your welcome.

To protect yourself against malware and reduce the potential for re-infection, be sure to read:
"Simple and easy ways to keep your computer safe".
"How did I get infected?, With steps so it does not happen again!".
"Best Practices - Internet Safety for 2008".
"Hardening Windows Security - Part 1 & Part 2".
"IE Recommended Minimal Security Settings".
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users