Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

WinPC Antivirus Popup


  • Please log in to reply
11 replies to this topic

#1 jagrim

jagrim

  • Members
  • 64 posts
  • OFFLINE
  •  
  • Local time:03:41 AM

Posted 25 May 2009 - 07:06 AM

Got a popup from WinPcAntivirus that I was infected and that I should upgrade. Also got pupup from spoybot blocking access to the internet. Knowing that I use Norton, I suspected some type of trojan.

Performed the following:
1) Ran Malware bytes (log attached)
2) Updated Super antispyware
3) Entered Safe Mode and ran ATF Cleaner and SuperAntispyware (No Log Attached)
4) Updated MAlware bytes and reran (log attached)
5) Entered Safe Mode and ran Dr Web's Cure-It (log attached)
6) Set new restore point and cleared all others

My question is: Did I perform a successful clean?
Thanks in advance
Alan

MBAM Log #1
Malwarebytes' Anti-Malware 1.36
Database version: 1992
Windows 5.1.2600 Service Pack 3

5/24/2009 6:25:15 PM
mbam-log-2009-05-24 (18-25-15).txt

Scan type: Quick Scan
Objects scanned: 103042
Time elapsed: 14 minute(s), 7 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 0
Registry Keys Infected: 7
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 0
Files Infected: 5

Memory Processes Infected:
C:\Documents and Settings\Angie & Alan\Application Data\winav.exe (Rogue.WinPCAntivirus) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CLASSES_ROOT\wininetapp.wininet (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{b360243e-09e8-402f-8721-00b6798089ad} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{4b66e1df-4de3-4cda-83b5-11673eadab0b} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{9692be2f-eb8f-49d9-a11c-c24c1ef734d5} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{39fc2065-c9c7-49cd-8942-44cc2dedc844} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\wininetapp.wininet.1 (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\WinPC Antivirus (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\Control Panel\don't load\scui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\don't load\wscui.cpl (Hijack.SecurityCenter) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\ieocx.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Documents and Settings\Angie & Alan\Start Menu\WinPC Antivirus.LNK (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Angie & Alan\Desktop\WinPC Antivirus.LNK (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Angie & Alan\Application Data\winav.exe (Rogue.WinPCAntivirus) -> Quarantined and deleted successfully.
C:\Documents and Settings\Angie & Alan\Application Data\asd.bat (Rogue.WinPCDefender) -> Quarantined and deleted successfully.



SuperAnti Spyware:
Log was deleted (my bad) but it picked up and cleaned Trojan.FakeAlert.origin
Lesson #1- Check and copy log prior to closing





MBAM Log #2
Malwarebytes' Anti-Malware 1.36
Database version: 2176
Windows 5.1.2600 Service Pack 3

5/24/2009 8:41:44 PM
mbam-log-2009-05-24 (20-41-44).txt

Scan type: Quick Scan
Objects scanned: 105920
Time elapsed: 5 minute(s), 17 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)



Dr Web's Cure It Log:

BHC5B6.tmp;C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\Clone;Trojan.Fakealert.origin;Incurable.Moved.;
RegUBP2b-Angie & Alan.reg;C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Snapshots;Trojan.StartPage.1505;Deleted.;
A0039422.reg;C:\System Volume Information\_restore{E951CEC3-18DC-4002-B745-BBC5BFA5BFF8}\RP537;Trojan.StartPage.1505;Deleted.;
A0039640.reg;C:\System Volume Information\_restore{E951CEC3-18DC-4002-B745-BBC5BFA5BFF8}\RP543;Trojan.StartPage.1505;Deleted.;
A0042622.reg;C:\System Volume Information\_restore{E951CEC3-18DC-4002-B745-BBC5BFA5BFF8}\RP572;Trojan.StartPage.1505;Deleted.;
A0042703.reg;C:\System Volume Information\_restore{E951CEC3-18DC-4002-B745-BBC5BFA5BFF8}\RP572;Trojan.StartPage.1505;Deleted.;
A0042728.reg;C:\System Volume Information\_restore{E951CEC3-18DC-4002-B745-BBC5BFA5BFF8}\RP572;Trojan.StartPage.1505;Deleted.;
stress_reducers.exe;F:\Old Upstairs Computer Data\My Documents\Jokes;Joke.Puncher;Incurable.Moved.;




Sorry for the long post.
Thanks for the help

BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 25 May 2009 - 08:26 AM

Hi,

Please do a new, full scan with MBAM, and post that logfile in your next reply. :thumbsup:

#3 jagrim

jagrim
  • Topic Starter

  • Members
  • 64 posts
  • OFFLINE
  •  

Posted 25 May 2009 - 09:53 AM

Results of full scan

Malwarebytes' Anti-Malware 1.36
Database version: 2176
Windows 5.1.2600 Service Pack 3

5/25/2009 9:51:49 AM
mbam-log-2009-05-25 (09-51-49).txt

Scan type: Full Scan (C:\|F:\|)
Objects scanned: 187588
Time elapsed: 49 minute(s), 50 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

#4 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 26 May 2009 - 04:41 AM

Hi,

Please go to Kaspersky website and perform an online antivirus scan.

Note: If you are using Windows Vista, open your browser by right-clicking on its icon and select 'Run as administrator' to perform this scan.
  • Read through the requirements and privacy statement and click on Accept button.
  • It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
  • When the downloads have finished, click on Settings.
  • Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button:
    • Spyware, Adware, Dialers, and other potentially dangerous programs
      Archives
  • Click on My Computer under Scan.
  • Once the scan is complete, it will display the results. Click on View Scan Report.
  • You will see a list of infected items there. Click on Save Report As....
  • Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
  • Please post this log in your next reply.
If you need a tutorial, see here

#5 jagrim

jagrim
  • Topic Starter

  • Members
  • 64 posts
  • OFFLINE
  •  
  • Local time:03:41 AM

Posted 26 May 2009 - 07:28 PM

Sorry for the delay in getting the scan done. The log file is below

Looks like one is in the quarantine file of Dr Web and the other one is in a Norton file (not sure if that is a quarantine file or what)

Thanks for the assistance
Alan


--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7.0 REPORT
Tuesday, May 26, 2009
Operating System: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Tuesday, May 26, 2009 22:30:31
Records in database: 2254010
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
A:\
C:\
D:\
E:\
F:\

Scan statistics:
Files scanned: 89941
Threat name: 2
Infected objects: 2
Suspicious objects: 0
Duration of the scan: 01:16:26


File name / Threat name / Threats count
C:\Documents and Settings\Administrator\DoctorWeb\Quarantine\BHC5B6.tmp Infected: Trojan-Downloader.Win32.FraudLoad.vyga 1
C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\Clone\BHC5B7.tmp Infected: Trojan-Downloader.Win32.FraudLoad.vwuu 1

The selected area was scanned.

#6 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 27 May 2009 - 08:36 AM

Hi,

Let's delete them. :thumbsup:

Open Notepad.
Copy this in the Notepad-file:

@ECHO OFF
IF EXIST log.txt DEL log.txt
ECHO Deleting files>>log.txt
FOR %%g in (
"C:\Documents and Settings\Administrator\DoctorWeb\Quarantine\BHC5B6.tmp"
"C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\Clone\BHC5B7.tmp") DO (
IF EXIST %%g (
ATTRIB -r -s -h %%g
DEL %%g
IF EXIST %%g (
ECHO %%g not deleted>>log.txt
) ELSE (
ECHO %%g deleted>>log.txt)
) ELSE (
ECHO %%g not found>>log.txt))
START NOTEPAD.EXE log.txt

Go to File - Save as...
Fill in the next values:
Location: Desktop
File name: del.bat
File type: All files (*.*).
Now, click Save.
Doubleclick del.bat.
Post the contents of the logfile that opens in your next reply.

#7 jagrim

jagrim
  • Topic Starter

  • Members
  • 64 posts
  • OFFLINE
  •  

Posted 27 May 2009 - 10:03 AM

Logfile from delete.bat

Alan


Deleting files
"C:\Documents and Settings\Administrator\DoctorWeb\Quarantine\BHC5B6.tmp" deleted
"C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\Clone\BHC5B7.tmp" not deleted

#8 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 27 May 2009 - 02:54 PM

Hi,

Run the bat-file again.

Which problems do you still have? :thumbsup:

#9 jagrim

jagrim
  • Topic Starter

  • Members
  • 64 posts
  • OFFLINE
  •  
  • Local time:03:41 AM

Posted 27 May 2009 - 05:23 PM

Superbird,

I reran the bat several times with the same results. Also ran del.bat with Norton and Spybot disabled with the same result.
I checked Norton history and found that it was blocking our attempts to delete the file.
Entered Safe Mode and ran del.bat and successfully deleted it. The log file is below.

Thanks
Alan


Deleting files
"C:\Documents and Settings\Administrator\DoctorWeb\Quarantine\BHC5B6.tmp" not found
"C:\Documents and Settings\All Users\Application Data\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\BASH\Clone\BHC5B7.tmp" deleted

#10 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 28 May 2009 - 12:40 AM

Hi,

Seems good. :thumbsup:
Do you still have problems?

#11 jagrim

jagrim
  • Topic Starter

  • Members
  • 64 posts
  • OFFLINE
  •  

Posted 28 May 2009 - 05:40 AM

No, the popups stopped after running MBAM, SAS, and Dr Web. Looks like what you & I did were cleaning up the remanents. I appreciate the assitance that you gave.
This website is awesome. I have cleaned several of my neighbors computers with asisstance but this was my wife's computer this time. As long as we have teenagers at home and in the neighborhood, it looks like they will keep me busy fixing things.

Once again, thanks for the assistance.
Alan

#12 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 29 May 2009 - 01:27 AM

You're most welcome. :thumbsup:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users