Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Malware/Virus


  • This topic is locked This topic is locked
7 replies to this topic

#1 Overture_22

Overture_22

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 04 March 2011 - 08:08 PM

Hi guys, I am new here, but I was helped here a long time ago removing a virus IE2010. So maybe you guys can help me out now.

I was roaming the internet, and some how ended up with this Virus/Malware. The first thing I noticed was that it disables me from using Windows Secuirity Essencials. So I ran my computer in safe mode, and I was then able to use WSE to scan my computer, further more it failed to find any threats. So I rebooted my computer back into its regular mode. I then noticed that all google links that I click are redirected to differnt "anti-virus sites" that say I am infected. I then ran Malwarebytes Anti-malware scan, it came up with nothing, SUPERantispyware it also came up with nothing, and AVG anti-rootkit came up with nothing. :( I've also cleared all my temporary internet files, cookies, and cleared my java cache. Removed all programs i've recently installed...

I can't seem to rid myself of this thing. Any help would be greatly appreciated.

BC AdBot (Login to Remove)

 


#2 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:10:45 AM

Posted 04 March 2011 - 08:14 PM

Can you post the logs from your scans?

#3 Overture_22

Overture_22
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 05 March 2011 - 03:46 AM

I reran everything and found some stuff, but it's still not fixed.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org

Database version: 5906

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.19019

04/03/2011 11:36:26 PM
mbam-log-2011-03-04 (23-36-26).txt

Scan type: Full scan (C:\|D:\|)
Objects scanned: 254611
Time elapsed: 6 hour(s), 26 minute(s), 13 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 03/05/2011 at 00:16 AM

Application Version : 4.49.1000

Core Rules Database Version : 6536
Trace Rules Database Version: 4348

Scan type : Complete Scan
Total Scan Time : 00:33:20

Memory items scanned : 628
Memory threats detected : 0
Registry items scanned : 7978
Registry threats detected : 0
File items scanned : 22529
File threats detected : 29

Adware.Tracking Cookie
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@chitika[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adcentriconline[3].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.undertone[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@stats4.clicktracks[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@advertise[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adxpose[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@media6degrees[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@realmedia[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@tribalfusion[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@lucidmedia[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@apmebf[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@fastclick[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@legolas-media[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@atdmt[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@collective-media[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@yieldmanager[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@content.yieldmanager[4].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@casalemedia[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ads.bleepingcomputer[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@doubleclick[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.yieldmanager[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving-sys[3].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@invitemedia[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@network.realmedia[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@serving-sys[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@adcentriconline[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@legolas-media[1].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@content.yieldmanager[2].txt
C:\Users\owner\AppData\Roaming\Microsoft\Windows\Cookies\owner@bs.serving-sys[1].txt

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I don't know where to get Anit-rootkit scan logs from, as well as microsoft secuirity essencials logs from.

#4 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:10:45 AM

Posted 05 March 2011 - 11:02 AM

The event log viewer stores the Microsoft Security Essential scan log details. AVG Should have the scan logs within the application.

#5 Overture_22

Overture_22
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 05 March 2011 - 01:41 PM

This part is weird because on microsoft security essencials scan it displayed that it didn't find anything, but I guess it did.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Microsoft Antimalware scan has started.
Scan ID: {EAF8FBBE-B72A-44E6-9130-2C12E5692150}
Scan Type: Antimalware
Scan Parameters: Full Scan
Scan Resources:
User: DEREKS-PC\owner

Microsoft Antimalware has detected malware or other potentially unwanted software.
For more information please see the following:
http://go.microsoft.com/fwlink/?linkid=37020&name=Exploit:Java/CVE-2010-0840.BE&threatid=2147643716
Name: Exploit:Java/CVE-2010-0840.BE
ID: 2147643716
Severity: Severe
Category: Exploit
Path: containerfile:_C:\Users\owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\1659a8c3-362a72ea;containerfile:_C:\Users\owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\160cda79-159f19d5;file:_C:\Users\owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\1659a8c3-362a72ea->folder/Ump_45.class;file:_C:\Users\owner\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\160cda79-159f19d5->folder/Ump_45.class
Detection Origin: Local machine
Detection Type: Concrete
Detection Source: User
User: DEREKS-PC\owner
Process Name: Unknown
Signature Version: AV: 1.99.581.0, AS: 1.99.581.0, NIS: 0.0.0.0
Engine Version: AM: 1.1.6603.0, NIS: 0.0.0.0

Microsoft Antimalware scan has finished.
Scan ID: {EAF8FBBE-B72A-44E6-9130-2C12E5692150}
Scan Type: Antimalware
Scan Parameters: Full Scan
User: DEREKS-PC\owner
Scan Time: 2:02:04

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In the AVG Anti-rootkit client there is no option, or prefernce avaliable to be able to view scan logs. :S So I am still unsure. I also took the liberty of manually removing the files that Microsoft Security Essencials detected, and it seem's to have stopped redirecting google links. But my MSE still closes when trying to load.

#6 cryptodan

cryptodan

    Bleepin Madman


  • Members
  • 21,868 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Catonsville, Md
  • Local time:10:45 AM

Posted 05 March 2011 - 02:14 PM

may require a deeper look:

Please follow the instructions in ==>This Guide<==.

Once the proper logs are created, then make a NEW TOPIC and post it ==>HERE<== Please include the link to this topic in your new topic and a description of your computer issues and what you have done to resolve them.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

Once you have created the new topic, please reply back here with a link to the new topic.

#7 Overture_22

Overture_22
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 05 March 2011 - 04:31 PM

http://www.bleepingcomputer.com/forums/topic383299.html

#8 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,801 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:06:45 AM

Posted 05 March 2011 - 06:27 PM

Hello,

Now for the hard and frustrating part: waiting.

Now that you have posted a log, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :cherry:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users