Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Issues with win 7 anti virus


  • Please log in to reply
14 replies to this topic

#1 greennb

greennb

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 09 December 2011 - 01:34 PM

First of all, I have to thank everyone on the site who has posted ways to remove win 7 anti-virus, it was helpful enough to at least gain some control back of my laptop. After having the virus show up, I ran into a bunch of problems with it. As expected, the virus blocked internet use or anti-virus software (I have MAMB, SUPERAntiSpyware, and AviraAntiVir. I restarted the computer and ran it in safemode w/ networking. I was still blocked from the internet and could not download .exe files (rkill). I then came across a forum recommending to manually activating the code on win 7 anti-virus and listed some codes to use. One ended up working, I waited for it to fake-remove the viruses, and was then able to use the rkill file. I followed by running MAMB and it caught what I thought was everything.

Now a day later, a bunch of my desktop icons have administrator shields on them and all asking to make changes to the computer (ones in particular were MAMB, Java, Skype, Adobe, and iExplore icons). I double checked and the privilege setting under properties was not checked for "run as administrator." I just finished running SUPERAntiSpyware and it came up with a handful of stuff. Beyond Adware tracking cookies, it shows 3 items of "Trojan.Agent/Gen-IExplorer[Fake]" and 3 items of "Trojan.Agent/Gen-PEC"; while I'm glad that the software caught them, it seems like I'm killing one and 5 pop up in its place. I appreciate any advise on where to go from here, thanks in advance and let me know if I left any thing out.

Comp Specs. Running Windows 7 on Acer Aspire

Edited by greennb, 09 December 2011 - 01:45 PM.


BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:09:55 PM

Posted 09 December 2011 - 01:46 PM

Hi

Navigate to this path

C:\Users\<user>\AppData\local

You may still have xyz.exe rogue which may cause you trouble

Go to C:/windows/system32/taskmgr

Right click-run as administrator

Now kill the xyz process

Go to the location and remove it

Download the EXE file association fix for your OS and run it

Good luck

#3 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 09 December 2011 - 02:35 PM

Thanks for the response, I opened up my windows task manager, showed all processes (89 total) but did not see an xyz.exe file. I hoping the last scan removed what was remaining, just don't understand why some of these programs are now asking to make changes on every successful attempt to open them w/ "run as administrator" icons on them. And when clicking "no", you can't open the program. Thanks anyways narenxp

Edited by greennb, 09 December 2011 - 02:42 PM.


#4 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 09 December 2011 - 02:39 PM

By the way, here is the previous log on superantispyware:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 12/09/2011 at 01:26 PM

Application Version : 4.54.1000

Core Rules Database Version : 8033
Trace Rules Database Version: 5845

Scan type : Complete Scan
Total Scan Time : 00:49:46

Memory items scanned : 542
Memory threats detected : 0
Registry items scanned : 13408
Registry threats detected : 0
File items scanned : 34654
File threats detected : 13

Adware.Tracking Cookie
C:\Users\Nate\AppData\Roaming\Microsoft\Windows\Cookies\44CLXYKN.txt
C:\Users\Nate\AppData\Roaming\Microsoft\Windows\Cookies\BDIHABFW.txt
C:\Users\Nate\AppData\Roaming\Microsoft\Windows\Cookies\0MVHRHTF.txt
media.kyte.tv [ C:\Users\Nate\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\G25K4KHK ]
msnbcmedia.msn.com [ C:\Users\Nate\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\G25K4KHK ]
objects.tremormedia.com [ C:\Users\Nate\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\G25K4KHK ]
secure-us.imrworldwide.com [ C:\Users\Nate\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\G25K4KHK ]

Trojan.Agent/Gen-IExplorer[Fake]
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX0\NIRD\IEXPLORE.EXE
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX1\NIRD\IEXPLORE.EXE
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX2\NIRD\IEXPLORE.EXE

Trojan.Agent/Gen-PEC
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX0\PROCS\EXPLORER.EXE
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX1\PROCS\EXPLORER.EXE
C:\USERS\NATE\APPDATA\LOCAL\TEMP\RARSFX2\PROCS\EXPLORER.EXE

#5 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:09:55 PM

Posted 09 December 2011 - 10:49 PM

Extract and run this

http://www.winhelponline.com/fileasso/exe_fix_w7.zip

See if you can launch properly now

#6 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 11 December 2011 - 03:26 PM

narenxp, I extracted and ran the file. It did not make any difference. I am still being asked to make changes when opening some programs by user account control. I also just ran another scan from MAMB, it came up with 2 items: both being Trojan.Fake MS. Any other advice on where to go from here would be much appreciated. Thanks for your help Narenxp. I will post the log info from MABM after I reset my comp.

#7 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 11 December 2011 - 03:27 PM

Here is the notepad log from MAMB

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8352

Windows 6.1.7601 Service Pack 1
Internet Explorer 8.0.7601.17514

12/11/2011 3:26:39 PM
mbam-log-2011-12-11 (15-26-39).txt

Scan type: Full scan (C:\|D:\|Q:\|)
Objects scanned: 302170
Time elapsed: 41 minute(s), 39 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 2

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
c:\Users\Nate\AppData\Local\aqs.exe (Trojan.FakeMS) -> Quarantined and deleted successfully.
c:\Users\Nate\AppData\LocalLow\Sun\Java\deployment\cache\6.0\40\d277628-16890a88 (Trojan.FakeMS) -> Quarantined and deleted successfully.

#8 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:09:55 PM

Posted 11 December 2011 - 04:38 PM

c:\Users\Nate\AppData\Local\aqs.exe (Trojan.FakeMS)


Still you have not got a clean MBAM log

You need to get a clean log,and then run the EXE fix provided

#9 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 11 December 2011 - 08:03 PM

I just ran another MAMB scan, it came up clean, then extracted and reran the exe file you had mentioned. What kind of results was I supposed to see from that, I'm not as savvy as I'd like to be. I have to think there is some type of problem with these trojans continuing to show up as well as the issues with user account controls, just not sure what I'm looking for.

#10 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 12 December 2011 - 04:12 PM

Well I'm back to square one again. Win 7 Antispyware 2012 just reared it's head on me again.....Guess I hadn't removed everything after all. This also came up with this upon restart: windows cannot find c\:windows\system32\igfxpers.exe. And there is still the issues with the user account controls. I'm becoming more and more tempted to just do a system restore.

Having the same difficulties with Win 7 virus, restarted in safe mode but was still unable to open exe files. Found the registration key, now in the process of running rkill, mabm, and rebooting. I attempted to restore the system after running mabm, but was unable to complete it as a pop box said anti virus program was running after waiting 5-10 minutes for the computer to complete the process and restart.

I also noticed the user control account shield looks different than ones I've been seeing, it is only blue and yellow unlike the red green blue and yellow shield. Is this a problem?

#11 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:55 PM

Posted 13 December 2011 - 01:01 PM

Hello, it appears you were left stranded. Let's see if the 'cannot find' still exists after these.

This infection changes settings on your computer so that when you launch an executable, a file ending with .exe, it will instead launch the infection rather than the desired program. To fix this we must first download a Registry file that will fix these changes. From a clean computer, please download the following file and save it to a removable media such as a CD/DVD, external Drive, or USB flash drive.

FixNCR.reg

insert the removable device into the infected computer and open the folder the drive letter associated with it. You should now see the FixNCR.reg file that you had downloaded onto it. Double-click on the FixNCR.reg file to fix the Registry on your infected computer.



Run RKill then MBAM again please.

Next....I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image


NOTE: In some instances if no malware is found there will be no log produced.

Edited by boopme, 14 December 2011 - 02:55 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#12 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 13 December 2011 - 10:59 PM

Thanks for your help Boopme, here are the ESETscan results:


C:\Users\Nate\AppData\Local\ukr.exe a variant of Win32/Kryptik.XDA trojan cleaned by deleting - quarantined
C:\Users\Nate\AppData\Local\Temp\hgfyvuqyua a variant of Win32/Kryptik.XDA trojan cleaned by deleting - quarantined
C:\Users\Nate\AppData\Local\Temp\hsc.dll a variant of Win32/Kryptik.XGF trojan cleaned by deleting - quarantined
C:\Users\Nate\AppData\Local\Temp\imd.dll a variant of Win32/Kryptik.XDA trojan cleaned by deleting - quarantined
C:\Users\Nate\AppData\Local\Temp\wvjafnqoqj a variant of Win32/Kryptik.XGF trojan cleaned by deleting - quarantined
C:\Users\Nate\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\7b2a2edc-51da2ae1 a variant of Win32/Kryptik.XGF trojan cleaned by deleting - quarantined
C:\Users\Nate\Documents\4a6h526gh.exe a variant of Win32/Kryptik.XGF trojan cleaned by deleting - quarantined

#13 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:55 PM

Posted 14 December 2011 - 03:03 PM

When a browser runs an applet, the Java Runtime Environment (JRE) stores the downloaded files into its cache folder (C:\Documents and Settings\username\Application Data\Sun\Java\Deployment\cache) for quick execution later and better performance. Malicious applets are also stored in the Java cache directory and your anti-virus may detect them and provide alerts. For more specific information about Java exploits, please refer to Virus found in the Java cache directory.

Notification of these files as a threat does not always mean that a machine has been infected; it indicates that a program included the viral class file but this does not mean that it used the malicious functionality. As a precaution, I recommend clearing the entire cache to ensure everything is cleaned out:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#14 greennb

greennb
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:09:55 PM

Posted 15 December 2011 - 12:22 PM

Thanks for your help boopme, hopefully that'll clear everything up and I won't have any persisting problems. thanks again.

#15 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,934 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:10:55 PM

Posted 15 December 2011 - 03:03 PM

You're welcome!! If there are no more problems or signs of infection, you should Create a New Restore Point to prevent possible reinfection from an old one. Some of the malware you picked up could have been backed up, renamed and saved in System Restore. Since this is a protected directory your tools cannot access to delete these files, they sometimes can reinfect your system if you accidentally use an old restore point. Setting a new restore point AFTER cleaning your system will help prevent this and enable your computer to "roll-back" to a clean working state.

The easiest and safest way to do this is:
  • Go to Posted Image > Programs > Accessories > System Tools and click "System Restore".
  • Choose the radio button marked "Create a Restore Point" on the first screen then click "Next". Give the R.P. a name, then click "Create". The new point will be stamped with the current date and time. Keep a log of this so you can find it easily should you need to use System Restore.
  • Then use Disk Cleanup to remove all but the most recently created Restore Point.
  • Go to Posted Image > Run... and type: Cleanmgr
  • Click "Ok". Disk Cleanup will scan your files for several minutes, then open.
  • Click the "More Options" tab, then click the "Clean up" button under System Restore.
  • Click Ok. You will be prompted with "Are you sure you want to delete all but the most recent restore point?"
  • Click Yes, then click Ok.
  • Click Yes again when prompted with "Are you sure you want to perform these actions?"
  • Disk Cleanup will remove the files and close automatically.
Vista and Windows 7 users can refer to these links:
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users