Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware / Trojan Issue


  • Please log in to reply
15 replies to this topic

#1 jroderick88

jroderick88

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 10 June 2009 - 08:32 AM

I clicked on a video link in Facebook the other day which apparently had a trojan virus in it. I ran Norton scans over and over again and it appeared that I got the trojan. Now I am getting pop ups periodically which I have never got before.
The other thing that I am having a problem with is when I click on a google search link it redirects me to Shopica or some type of weird site that has something to do with what i typed in Google.

I am operating in Vista and I was using IE7 but I downloaded IE8 to see if it fixed my problem. I run Norton and I am always up to date on Updates and Virus scans. Also last night I downloaded Antispyware and ran a deep scan. I found over 2000 infections. Please Help...I don't want to re-image my machine as I have so many programs for work on my laptop.

Jeremy

BC AdBot (Login to Remove)

 


#2 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 10 June 2009 - 08:47 AM

Hello Jroderick88.
My name is MalwareMutilator (MM for short). Welcome to Bleeping Computer. :thumbsup:

Let's see if we can get a better handle of what's happening on your machine. You stated:

I downloaded Antispyware and ran a deep scan.

What is the exact name of the Antispyware program you downloaded? Also, do you have the log(s) generated from that program, and the results of your Norton scan?

If available, please post those logs for review.

Regards,

MalwareMutilator

#3 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 10 June 2009 - 09:07 AM

The name of the product is "Antispyware". I found it recommened in some expert forum yesterday.

Logs from Antispyware scan are as follows: First I ran a basic scan and ran that a couple of times and then I ran the deep scan overnight
I cant seem to locate the Norton Logs.


Microsoft Windows Vista Home Premium Service Pack 1
6.00 build 6001 Service Pack 1
Username: Jeremy
In groups: LOCAL Administrators Everyone Users None INTERACTIVE NTLM Authentication Authenticated Users High Mandatory Level This Organization Debugger Users
2009/06/10 03:00:00:430: Application Version: 4.0.3152.953
2009/06/10 03:00:00:430: Module Version: 4.0.3152.953
2009/06/10 03:00:00:430: Service Version: 4.0.3152.953
2009/06/10 03:00:00:430: ===============================================================
2009/06/10 03:00:00:430: Finish Logging


Microsoft Windows Vista Home Premium Service Pack 1
6.00 build 6001 Service Pack 1
Username: Jeremy
In groups: LOCAL Administrators Everyone Users None INTERACTIVE NTLM Authentication Authenticated Users High Mandatory Level This Organization Debugger Users
2009/06/10 08:35:16:464: Application Version: 4.0.3152.953
2009/06/10 08:35:16:464: Module Version: 4.0.3152.953
2009/06/10 08:35:16:464: Service Version: 4.0.3152.953
2009/06/10 08:35:16:464: ===============================================================
2009/06/10 08:35:16:464: Switching to PIEInProc.
2009/06/10 08:35:16:495: Checking for bad run key.
2009/06/10 08:35:16:495: Windows directory: C:\Windows
2009/06/10 08:35:16:495: System directory: C:\Windows\system32
2009/06/10 08:35:16:495: Program Files directory: C:\Program Files
2009/06/10 08:35:16:495: Application Data: C:\Users\Jeremy\AppData\Roaming
2009/06/10 08:35:16:495: User Profile: C:\Users\Jeremy
2009/06/10 08:35:16:495: User Temp: C:\Users\Jeremy\AppData\Local\Temp\
2009/06/10 08:35:16:495: Start Menu: C:\Users\Jeremy\AppData\Roaming\Microsoft\Windows\Start Menu
2009/06/10 08:35:16:495: User Desktop: C:\Users\Jeremy\Desktop
2009/06/10 08:35:16:495: Common Desktop: C:\Users\Public\Desktop
2009/06/10 08:35:16:495: Common Profile: C:\ProgramData
2009/06/10 08:35:16:495: SID set to: S-1-5-21-2344031088-1031463375-760663110-1000
2009/06/10 08:35:18:679: version was called, but is not defined in this dll version.
2009/06/10 08:35:18:679: Database Version:
2009/06/10 08:35:18:679: version was called, but is not defined in this dll version.
2009/06/10 08:35:18:679: Database Version:
2009/06/10 08:35:19:225: Driver check:
2009/06/10 08:35:19:225: SC manager open.
2009/06/10 08:35:19:225: Component check complete.
2009/06/10 08:35:22:828: Parsing command line:
2009/06/10 08:35:22:828: boot
2009/06/10 08:35:23:188: OnitDialog...
2009/06/10 08:35:23:188: Skipping splash screen.
2009/06/10 08:35:25:985: Checking for database update...
2009/06/10 08:35:30:275: Updating Security Center Info: Antispyware, C:\Program Files\Antispyware\Antispyware.exe, 1, 1
2009/06/10 08:35:30:415: ConnectServer: service
2009/06/10 08:35:30:431: ExecQuery: pResults
2009/06/10 08:35:30:446: Next: 1
2009/06/10 08:35:30:446: Found app's entry
2009/06/10 08:35:30:446: Put: displayName
2009/06/10 08:35:30:446: Put: productEnabled
2009/06/10 08:35:30:446: Put: productUptoDate
2009/06/10 08:35:30:540: PutInstance
2009/06/10 08:35:30:540: Done
2009/06/10 08:35:30:540: Database Version: 11.5.5 1244492909
2009/06/10 08:35:30:712: Database Version: 11.5.5 1244492909



Microsoft Windows Vista Home Premium Service Pack 1
6.00 build 6001 Service Pack 1
Username: Jeremy
In groups: LOCAL Administrators Everyone Users None INTERACTIVE NTLM Authentication Authenticated Users High Mandatory Level This Organization Debugger Users
2009/06/10 09:55:27:529: Application Version: 4.0.3152.953
2009/06/10 09:55:27:530: Module Version: 4.0.3152.953
2009/06/10 09:55:27:531: Service Version: 4.0.3152.953
2009/06/10 09:55:27:531: ===============================================================
2009/06/10 09:55:27:539: Finish Logging


Microsoft Windows Vista Home Premium Service Pack 1
6.00 build 6001 Service Pack 1
Username: Jeremy
In groups: LOCAL Administrators Everyone Users None INTERACTIVE NTLM Authentication Authenticated Users High Mandatory Level This Organization Debugger Users
2009/06/10 09:44:35:045: Application Version: 4.0.3152.953
2009/06/10 09:44:35:091: Module Version: 4.0.3152.953
2009/06/10 09:44:35:091: Service Version: 4.0.3152.953
2009/06/10 09:44:35:091: ===============================================================
2009/06/10 09:44:35:091: Switching to PIEInProc.
2009/06/10 09:44:35:544: Checking for bad run key.
2009/06/10 09:44:35:653: Windows directory: C:\Windows
2009/06/10 09:44:35:653: System directory: C:\Windows\system32
2009/06/10 09:44:35:653: Program Files directory: C:\Program Files
2009/06/10 09:44:35:653: Application Data: C:\Users\Jeremy\AppData\Roaming
2009/06/10 09:44:35:653: User Profile: C:\Users\Jeremy
2009/06/10 09:44:35:653: User Temp: C:\Users\Jeremy\AppData\Local\Temp\
2009/06/10 09:44:35:653: Start Menu: C:\Users\Jeremy\AppData\Roaming\Microsoft\Windows\Start Menu
2009/06/10 09:44:35:653: User Desktop: C:\Users\Jeremy\Desktop
2009/06/10 09:44:35:653: Common Desktop: C:\Users\Public\Desktop
2009/06/10 09:44:35:653: Common Profile: C:\ProgramData
2009/06/10 09:44:35:653: SID set to: S-1-5-21-2344031088-1031463375-760663110-1000
2009/06/10 09:44:43:359: version was called, but is not defined in this dll version.
2009/06/10 09:44:43:359: Database Version:
2009/06/10 09:44:43:359: version was called, but is not defined in this dll version.
2009/06/10 09:44:43:359: Database Version:
2009/06/10 09:44:49:740: Driver check:
2009/06/10 09:44:49:740: SC manager open.
2009/06/10 09:44:49:740: Component check complete.
2009/06/10 09:44:57:623: Parsing command line:
2009/06/10 09:44:57:623: boot
2009/06/10 09:44:57:623: OnitDialog...
2009/06/10 09:44:57:623: Skipping splash screen.
2009/06/10 09:45:00:649: Checking for database update...
2009/06/10 09:45:02:443: Updating Security Center Info: Antispyware, C:\Program Files\Antispyware\Antispyware.exe, 1, 1
2009/06/10 09:45:02:568: ConnectServer: service
2009/06/10 09:45:02:568: ExecQuery: pResults
2009/06/10 09:45:02:584: Next: 1
2009/06/10 09:45:02:584: Found app's entry
2009/06/10 09:45:02:584: Put: displayName
2009/06/10 09:45:02:584: Put: productEnabled
2009/06/10 09:45:02:584: Put: productUptoDate
2009/06/10 09:45:02:584: PutInstance
2009/06/10 09:45:02:584: Done
2009/06/10 09:45:02:584: Database Version: 11.5.5 1244492909
2009/06/10 09:45:03:738: Database Version: 11.5.5 1244492909
2009/06/10 09:55:45:634: Component check complete.
2009/06/10 09:56:07:069: Database Version: 11.5.5 1244492909
2009/06/10 09:56:10:308: Database Version: 11.5.5 1244492909
2009/06/10 09:56:13:581: Database Version: 11.5.5 1244492909
2009/06/10 09:56:16:792: Database Version: 11.5.5 1244492909
2009/06/10 09:56:19:896: Database Version: 11.5.5 1244492909
2009/06/10 09:56:23:005: Database Version: 11.5.5 1244492909
2009/06/10 09:56:26:129: Database Version: 11.5.5 1244492909
2009/06/10 09:56:29:354: Database Version: 11.5.5 1244492909
2009/06/10 09:57:02:677: Component check complete.
2009/06/10 10:01:19:487: Database Version: 11.5.5 1244492909
2009/06/10 10:01:21:597: Start Scan
2009/06/10 10:01:21:597: Scan options:
2009/06/10 10:01:21:598: Scan Active Processes
2009/06/10 10:01:21:598: Scan Windows Registry
2009/06/10 10:01:21:598: Scan Cookies
2009/06/10 10:01:21:598: Scan Files
2009/06/10 10:01:21:598: Deep Scan
2009/06/10 10:01:21:598: Scan All Drives
2009/06/10 10:01:21:598: Clearing Volatile Lists.
2009/06/10 10:01:21:743: 32-bit Winsock LSP Map:
2009/06/10 10:01:21:755: No LSPs are installed
2009/06/10 10:01:22:130: Entering Process Scan
2009/06/10 10:01:27:237: Database Version: 11.5.5 1244492909
2009/06/10 10:01:31:742: PreDbScan
2009/06/10 10:01:31:753: PostScan

#4 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 10 June 2009 - 09:22 AM

Hello again Jroderick88, :trumpet:

Let's try a few different scanners just to see if any hidden nasties are lurking. :thumbsup:


Download and run MBAM:

Because some types of malware can be easily removed, I recommend Malwarebytes Anti-Malware be run. MBAM is an advanced piece of software which may possibly resolve a number of the issues on your machine. It's important to let me know, however, if you experience any trouble accessing the site, downloading from it, or actually opening the program to run. Some rootkits specifically target MBAM, thus, the inability to run the program may possibly indicate a more serious problem.

Please download Malwarebytes Anti-Malware (v1.37) and save it to your desktop.

alternate download link 1
alternate download link 2

If you have a previous version of MBAM, remove it via Add/Remove Programs and download a fresh copy.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:

    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself.

  • Press the OK button to close that box and continue.

  • If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install. Alternatively, you can update through MBAM's interface from a clean computer, copy the definitions (rules.ref) located in C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes' Anti-Malware from that system to a usb stick or CD and then copy it to the infected machine.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and Scan in progress will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say The scan completed successfully. Click 'Show Results' to display all objects found.
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Please save the contents of that report as it will needed with your next reply. Now, exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you after scanning with MBAM. Please temporarily disable such programs or permit them to allow the changes.

Step #2

Download and run ATF Cleaner:
  • Using this link, please download ATF Cleaner and save it to your desktop.
  • Double-click ATF-Cleaner.exe to run the program.
  • Next, please place check marks in the following boxes:

    • Windows Temp
    • Current User Temp
    • All User Temp
    • Cookies
    • If you would like to keep your saved passwords, please click No at the Cookies prompt.
  • Temporary Internet Files
  • History
  • Prefetch
  • Java Cache
  • Click the [Empty Selected] button.
  • Click Exit.
Step #3

Before continuing with the next step, you should print out these instructions or copy them to a NotePad file so they will be accessible. Some steps will require you to disconnect from the Internet or use Safe Mode and you will not have access to this page.
  • Please download Dr.Web CureIt and save it to your desktop. DO NOT perform a scan yet.

    alternate download link


    Note: The file will be randomly named (i.e. 5mkuvc4z.exe).

  • Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".
Step #4

Scan with Dr.Web CureIt:

NOTE: This scan may take several hours to complete. Please perform the scan allowing for the time.
  • Double-click on the randomly named file to open the program and click Start. (There is no need to update if you just downloaded the most current version).
  • Read the Virus check by DrWeb scanner prompt and click Ok where asked to Start scan now? Allow the setup.exe to load if asked by any of your security programs.
  • The Express scan will automatically begin.
    (This is a short scan of files currently running in memory, boot sectors, and targeted folders).
  • If prompted to dowload the Full version Free Trial, ignore and click the X to close the window.
  • If an infected object is found, you will be prompted to move anything that cannot be cured. Click Yes to All. (This will move any detected files to the C:\Documents and Settings\userprofile\DoctorWeb\Quarantine folder if they can't be cured)
  • After the Express Scan is finished, put a check next to Complete scan to scan all local disks and removable media.
  • In the top menu, click Settings > Change settings, and uncheck "Heuristic analysis" under the "Scanning" tab, then click Apply, Ok.
  • Back at the main window, click the green arrow "Start Scanning" button on the right under the Dr.Web logo.
  • Please be patient as this scan could take a long time to complete.
  • When the scan has finished, a message will be displayed at the bottom indicating if any viruses were found.
  • Click Select All, then choose Cure > Move incurable.
  • In the top menu, click file and choose save report list.
  • Save the DrWeb.csv report to your desktop.
  • Exit Dr.Web Cureit when done.
  • Important! Reboot your computer because it could be possible that files in use will be moved/deleted during reboot.
  • After reboot, post the contents of the logs from Dr.Web, and from MBAM in your next reply. (You can use Notepad to open the DrWeb.cvs report)
After reviewing your logs I will furnish you with additional instructions. :flowers:

Regards,

MalwareMutilator

#5 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 10 June 2009 - 09:44 AM

Malwarebytes' Anti-Malware 1.37
Database version: 2257
Windows 6.0.6001 Service Pack 1

6/10/2009 10:43:54 AM
mbam-log-2009-06-10 (10-43-54).txt

Scan type: Quick Scan
Objects scanned: 78674
Time elapsed: 4 minute(s), 10 second(s)

Memory Processes Infected: 1
Memory Modules Infected: 1
Registry Keys Infected: 14
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 2
Files Infected: 14

Memory Processes Infected:
C:\Program Files\Antispyware\Antispyware.exe (Rogue.Antispyware) -> Unloaded process successfully.

Memory Modules Infected:
c:\program files\podmena\podmena.dll (Trojan.Downloader) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\CLSID\{44b71ad2-4f42-4312-bff3-9b68a41de078} (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Installer\UpgradeCodes\e20d6ec50a67ec04083b1251f2935d09 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\e20d6ec50a67ec04083b1251f2935d09 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ControlPanel\NameSpace\{44b71ad2-4f42-4312-bff3-9b68a41de078} (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\10cd00a0c66d64141805e4416afb7576 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\77b12cd46424a9b459aed6602d99c187 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\856d81ed094ec834f8e9b0200b2661db (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\f3cb2b9f6374b3f4fa195696edbc71c1 (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\podmena (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\podmena (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\podmena (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\podmenadrv (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\podmenadrv (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\podmenadrv (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antispyware (Rogue.Antispyware) -> Quarantined and deleted successfully.
C:\Program Files\podmena (Trojan.Downloader) -> Delete on reboot.

Files Infected:
c:\programdata\microsoft\Windows\start menu\Programs\antispyware\Antispyware on the Web.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
c:\programdata\microsoft\Windows\start menu\Programs\antispyware\Antispyware.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
c:\program files\podmena\podmena.dll (Trojan.Downloader) -> Delete on reboot.
c:\program files\podmena\podmena.sys (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Windows\msmark2.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\Program Files\Antispyware\Antispyware.exe (Rogue.Antispyware) -> Quarantined and deleted successfully.
c:\Windows\Tasks\Antispyware Scheduled Scan.job (Rogue.Antispyware) -> Quarantined and deleted successfully.
c:\Users\Public\Desktop\Antispyware.lnk (Rogue.Antispyware) -> Quarantined and deleted successfully.
c:\Windows\9g2234wesdf3dfgjf23 (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\Windows\f23567.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122715.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122739.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122807.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\Windows\dk39fi4fe.dat (Worm.KoobFace) -> Quarantined and deleted successfully.

#6 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 10 June 2009 - 09:54 AM

Ive completed steps 1 and 2. I am at work so I will have to wait for step 3 until I get home tonight.
Guess what MM..... I just checked Google and my search issue has been fixed. Yeah. I am still going to run step 3 tonight anyway. don' t you think that is a good idea?

:thumbsup:

Edited by jroderick88, 10 June 2009 - 09:56 AM.


#7 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 10 June 2009 - 09:55 AM

Hi Jroderick88,

I was sort-of afraid of this. I am not yet familier of the program Antispyware, but as I feared, it appears to be rouge. :thumbsup: I am still researching the program, but in the meantime; please continue with my earlier instructions. After completing those instructions, please complete a full-scan of your computer using MBAM, and post all of my requested logs.

MM

#8 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 10 June 2009 - 10:24 AM

One more thing, Jroderick88:

I've just realized that you are running Vista. On the chance that ATF does not run on Vista, please download and run CCleaner. That tool works just as well as ATF, and it does work on Vista.

MM

PS

My apologies for misspelling rogue. I hope that I didn't confuse you. :thumbsup:

#9 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 10 June 2009 - 11:45 AM

So are you telling me that the spyware program that I downloaded...was in fact more spyware? I went to their website to download it...that's crazy. I will complete all scans tonight after work.

#10 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 10 June 2009 - 12:32 PM

Hello Jroderick88,

Unfortunately, yes! That is exactly what I am telling you. :flowers:

Please have a look at this entry from your MBAM log (among others):

C:\Program Files\Antispyware\Antispyware.exe (Rogue.Antispyware)

What does that tell you? :thumbsup:

I can also tell you that your system was additionally infected with the KoobFace worm.

C:\Windows\f23567.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122715.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122739.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
c:\Windows\ro122807.dat (Worm.KoobFace) -> Quarantined and deleted successfully.
C:\Windows\dk39fi4fe.dat (Worm.KoobFace)
You can read more about that infection here:

KoobFace

So, I once again ask that you continue following my instructions precisely as I have requested.

MM

#11 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 11 June 2009 - 11:42 AM

Hi MM,

Sorry for the delayed response. so here's the deal.

I ran everything last night - I started from scratch.

MBAM - ran sucessfully
CC Cleaner - ran sucessfully
DrWeb - quick scan ran sucessfully
DrWeb - Complete Scan - gave me the following error after about 2 hours - FYI - I was in Safe Mode and I tried to run it again while I was sleeping and got the same error.

"Fpswn.exe has stopped working

A problem caused the program to stop working correctly. Windows will close the program and notify you if a solution is available." :thumbsup:

Your Thoughts?

#12 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 12 June 2009 - 08:12 AM

Hello Jroderick88, :flowers:

Iíve been unable to find any information pertaining to the exact error message you are receiving, so letís proceed this way for now:

Please perform an online scan with Kaspersky WebScanner.

(Requires free Java Runtime Environment (JRE) be installed before scanning for malware as ActiveX is no longer being used.)
  • Click on the Posted Image button.

  • The program will launch and fill in the Information section on the left.

  • Read the "Requirements and Limitations" then press the Posted Image button.

  • The program will begin downloading the latest program and definition files. It takes a while... please be patient and let it finish.

  • Once the files have been downloaded, click on the Posted Image button.

  • In the scan settings make sure the following are selected:

  • Detect malicious programs of the following categories:

  • Viruses, Worms, Trojan Horses, Rootkits Spyware, Adware, Dialers and other potentially dangerous programs.
  • Scan compound files (doesn't apply to the File scan area):
  • Archives
  • Mail databases. By default the above items should already be checked.
  • Click the Posted Image button if you made any changes.

[*]Now under the Scan section on the left:

  • Select My Computer

  • The program will start and scan your system. This will run for a while, be patient... let it run.
  • Once the scan is complete, it will display if your system has been infected.
  • Save the scan results as a Text file ... save it to your desktop.
  • Copy and paste the saved scan results file in your next reply.
[/list]After completing those steps, please furnish the new logs produced from MBAM, from the Dr. Web fast scan, and from the Kaspersky scan. Also, please tell me how your computer is running. Any more pop-ups or redirects? :thumbsup:

Regards,

MM

#13 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 14 June 2009 - 10:11 AM

My computer is running great. No more pop ups or redirects and web browsing is definitely faster.

KASPERSKY ONLINE SCANNER 7.0 REPORT
Sunday, June 14, 2009
Operating System: Microsoft Windows Vista Home Premium Edition, 32-bit Service Pack 1 (build 6001)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Sunday, June 14, 2009 00:38:18
Records in database: 2340675
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\

Scan statistics:
Files scanned: 141978
Threat name: 1
Infected objects: 1
Suspicious objects: 0
Duration of the scan: 02:29:01


File name / Threat name / Threats count
C:\Users\Jeremy\Music\TOTALLY HIP TRACK.wma Infected: Trojan-Downloader.WMA.Wimad.k 1

The selected area was scanned.

#14 MalwareMutilator

MalwareMutilator

  • Members
  • 931 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:03 AM

Posted 14 June 2009 - 12:02 PM

Hello again Jroderick88 , :trumpet:

Looking better, but youíre still not clean. :flowers: Please understand that the lack of symptoms does not necessarily mean that you are free of infections.

Your Kaspersky log indicates that youíre still infected with a Trojan. You havenít quite followed all of my last instructions, so please continue as follows:

Run MBAM, update to the newest definitions, and then please perform a full-scan of your system. Allow MBAM to fix any issues that it finds. Then, please post the results of your MBAM log along with your next reply.

Weíre progressing very well so hang in there until I give you the all-clean speech. :thumbsup:

Regards,

MM

#15 jroderick88

jroderick88
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:10:03 AM

Posted 15 June 2009 - 09:41 AM

Malwarebytes' Anti-Malware 1.37
Database version: 2260
Windows 6.0.6001 Service Pack 1

6/14/2009 7:11:24 PM
mbam-log-2009-06-14 (19-11-24).txt

Scan type: Full Scan (C:\|E:\|)
Objects scanned: 225908
Time elapsed: 1 hour(s), 50 minute(s), 53 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)--------------------------------------------------------------------------------



KASPERSKY ONLINE SCANNER 7.0 REPORT
Sunday, June 14, 2009
Operating System: Microsoft Windows Vista Home Premium Edition, 32-bit Service Pack 1 (build 6001)
Kaspersky Online Scanner version: 7.0.26.13
Program database last update: Sunday, June 14, 2009 00:38:18
Records in database: 2340675
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\

Scan statistics:
Files scanned: 141978
Threat name: 1
Infected objects: 1
Suspicious objects: 0
Duration of the scan: 02:29:01


File name / Threat name / Threats count
C:\Users\Jeremy\Music\TOTALLY HIP TRACK.wma Infected: Trojan-Downloader.WMA.Wimad.k 1

The selected area was scanned.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users