Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need Help, Unable To Fix Virus / Spyware


  • Please log in to reply
7 replies to this topic

#1 verithrial

verithrial

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:34 PM

Posted 13 March 2008 - 05:55 PM

Hello,

I recently received a massive surge of spyware / virus' from a website. The virus took all of my system settings and ...basically turned them off leaving me without a task manager, internet and a slew of other things. It ported TONS of spyware and other programs onto my computer, flooding it. I was informed that the main function of this was a Keylogger, sent to steal all sorts of stuff from my computer. Spybot couldn't help, Adaware couldn't help and my Zone Alarm virus scanner / firewall didn't help at all, all of them up to date on definitions.

After a while I was able to perform a system restore, which fixed most of the problems, but left several very annoying ones behind.

The main issue I have is this : When I try to access google.com or any of its offshoots, it takes me to "Google Security" and runs a scan on my computer. Im not even sure if its really google. In fact, Im pretty sure its not. After the scan, it prompts me to download a fix for it, which I have not followed through with yet.

Here is a list of the infections it detects.

- Spyware.IEMonster.d

- Zlob.Googl.MS.Yah.block

- Spyware.IMMonitor

- St.Worw.Hack

- Win32.Rbot.fm

- Infostealer.Banker.E

- Dialer.Xpehbam.biz_dialer

- Mail.Spm.Ass.exe

Any help with this situation would be greatly appreciated.

-Geoff

BC AdBot (Login to Remove)

 


#2 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 37,009 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:02:34 PM

Posted 15 March 2008 - 10:39 PM

Hello verithrial and welcome to BC :flowers:

In order to provide you with the proper disinfection procedures we need to know what your operating system is: Windows XP, Vista, etc. Please let us know in your next reply.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript

#3 verithrial

verithrial
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:34 PM

Posted 20 March 2008 - 07:38 PM

Bah, yea sorry. Im running XP pro.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:34 PM

Posted 20 March 2008 - 08:16 PM

Hello let's start here, by using these tools. Follow the instructions from the BC tutorial......
How to remove the Smitfraud / Generic Zlob

NEXT:
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opers browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.

Please ask any needed questions,post log and Let us know how the PC is running now.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 verithrial

verithrial
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:34 PM

Posted 23 March 2008 - 03:01 AM

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/23/2008 at 01:59 AM

Application Version : 4.0.1154

Core Rules Database Version : 3423
Trace Rules Database Version: 1415

Scan type : Complete Scan
Total Scan Time : 01:10:30

Memory items scanned : 159
Memory threats detected : 0
Registry items scanned : 3512
Registry threats detected : 2
File items scanned : 26403
File threats detected : 23

Adware.Tracking Cookie
C:\Documents and Settings\geoffz\Cookies\geoffz@atwola[1].txt
C:\Documents and Settings\geoffz\Cookies\geoffz@cdn.atwola[1].txt
C:\Documents and Settings\geoffz\Cookies\geoffz@html[1].txt
C:\Documents and Settings\Default User\Cookies\system@stopzilla[1].txt
C:\Documents and Settings\geoffz\Local Settings\Temp\Cookies\geoffz@ad.yieldmanager[1].txt
C:\Documents and Settings\geoffz\Local Settings\Temp\Cookies\geoffz@ads.zam[2].txt
C:\Documents and Settings\geoffz\Local Settings\Temp\Cookies\geoffz@advertising[2].txt
C:\Documents and Settings\geoffz\Local Settings\Temp\Cookies\geoffz@apmebf[1].txt
C:\Documents and Settings\geoffz\Local Settings\Temp\Cookies\geoffz@media6degrees[1].txt

Rogue.WindowsSecurityAdviser
C:\Program Files\Microsoft Security Adviser

Rootkit.Unclassified/SysDamp-Traces
C:\WINDOWS\system32\svchost.t__

Adware.MMHRen-Trace
C:\WINDOWS\system32\winlogans.tmp

Rogue.SpywareIsolator
HKU\S-1-5-21-1659004503-1972579041-1801674531-1003\Software\spinstall
HKU\S-1-5-21-1659004503-1972579041-1801674531-1003\Software\spywareisolator
C:\Program Files\SpywareIsolator\config.cfg
C:\Program Files\SpywareIsolator\spywareisolator.exe
C:\Program Files\SpywareIsolator
C:\WINDOWS\system32\spywarewarning.mht
c:\winxplogon.sys
C:\WINDOWS\Prefetch\SPYWAREISOLATOR.EXE-17C865F2.pf

Adware.JavaCore/NoDNS
C:\WINDOWS\system32\cmds.txt

Trojan.Unclassified/DwnLdr
C:\SVCHOST.EXE
C:\SVCHOST2.EXE

Trojan.Unclassified-Packed/Suspicious
C:\WINDOWS\SYSTEM32\B4FM.DLL

Trojan.Unclassified/Users32
C:\WINDOWS\SYSTEM32\USERS32.DAT

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,490 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:34 PM

Posted 23 March 2008 - 11:57 AM

May I also see the Smitfraud log.
The report can be found at the root of the system drive, usually at C:\rapport.txt
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 verithrial

verithrial
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:01:34 PM

Posted 26 March 2008 - 02:15 AM

Hm, it would appear that the Smitfraud log is much too massive to post, according to the forum page. Perhaps I could make it an attachment or something? Sorry to complicate the matter further.

#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,739 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:34 PM

Posted 26 March 2008 - 07:45 AM

IMPORTANT NOTE: One or more of the identified infections was a backdoor Trojan. Backdoor Trojans, IRCBots and Infostealers are very dangerous because they provide a means of accessing a computer system that bypasses security mechanisms and steal sensitive information like passwords, personal and financial data which they send back to the hacker. Remote attackers use backdoor Trojans as part of an exploit to to gain unauthorized access to a computer and take control of it without your knowledge. Read the Danger: Remote Access Trojans.

If your computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and online forums. You should consider them to be compromised. They should be changed by using a different computer and not the infected one. If not, an attacker may get the new passwords and transaction information. Banking and credit card institutions should be notified of the possible security breach. Because your computer was compromised please read How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

Although the backdoor Trojan was identified and removed, your PC has likely been compromised and there is no way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because the backdoor Trojan has been removed the computer is now secure. Many experts in the security community believe that once infected with this type of malware, the best course of action is to reformat and reinstall the OS. Please read "When should I re-format? How should I reinstall?"
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users