We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Virus Scam
Comments
-
Hi,
When I connected to the internet and turned the computer on it said system restored to 16 march. I didnt do it.
No.2 there was no remote registry.
No.3 Port 135 status Stealth ?
No.4 Left this one as not sure what the result of no.3 meant.
No.5 3 infected, spyware password, PUM.Disabled.s... (registry data) times 2 both the same.Thanks to all competitions posters and answer finders:TDon't squander time its the stuff lives are made of:rotfl::rotfl::rotfl::rotfl::rotfl:0 -
Hi,
When I connected to the internet and turned the computer on it said system restored to 16 march. I didnt do it.
No.2 there was no remote registry.
No.3 Port 135 status Stealth ?
No.4 Left this one as not sure what the result of no.3 meant.
No.5 3 infected, spyware password, PUM.Disabled.s... (registry data) times 2 both the same.
They must have done it, for whatever reason. Perhaps they wanted to undo whatever "help" they rendered.
2. Try this guide to find it:
http://tech-wonders.blogspot.com/2009/08/disable-remote-registry-service-in.html . Edit: I just noticed that XP home doesn't have 'remote registry', sorry about that.
3. Rerun the tool, and on the 'Am I vulnerable tab?' click on Local Dcom Test. If it indicates that you need to, click on the 'DCOMbobulate Me' and select Disable DCOM.
4. Please try it. It'll just test the ports on the computer, seeing if there are any insecure ports. It ideally and probably should all appear 'green' and say stealth, but if not it would be good to know.
5. Please reload Malwarebytes, and click on the 'Logs' tab, and copy/paste the contents of any of the logs there.0 -
No.3 still says stealth so its invisible
No.4 All green so passed
Logs tab from Malwarebytes
Malwarebytes' Anti-Malware 1.50.1.1100
www.malwarebytes.org
Database version: 6183
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702
27/03/2011 17:42:54
mbam-log-2011-03-27 (17-42-54).txt
Scan type: Quick scan
Objects scanned: 248679
Time elapsed: 56 minute(s), 43 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 2
Folders Infected: 0
Files Infected: 1
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
(No malicious items detected)
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Folders Infected:
(No malicious items detected)
Files Infected:
c:\documents and settings\Rudd\local settings\Temp\pqipuydm.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.Thanks to all competitions posters and answer finders:TDon't squander time its the stuff lives are made of:rotfl::rotfl::rotfl::rotfl::rotfl:0 -
CouponBar: [SBI $EFE6495E] Class ID (Registry key, nothing done)
HKEY_CLASSES_ROOT\CLSID\{9522B3FB-7A2B-4646-8AF6-36E7F593073C}
CouponBar: [SBI $CB95FB49] Class ID (Registry key, nothing done)
HKEY_CLASSES_ROOT\CLSID\{A85A5E6A-DE2C-4F4E-99DC-F469DF5A0EEC}
CouponBar: [SBI $51FE8B2E] Root class (Registry key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cpbrkpie.Coupon6Ctrl.1
CouponBar: [SBI $51FE8B2E] Class ID (Registry key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9522B3FB-7A2B-4646-8AF6-36E7F593073C}
CouponBar: [SBI $7A5ACBCB] Interface (Registry key, nothing done)
HKEY_CLASSES_ROOT\Interface\{6E780F0B-BCD6-40CB-B2DB-7AF47AB4D4A4}
CouponBar: [SBI $7B15781E] Interface (Registry key, nothing done)
HKEY_CLASSES_ROOT\Interface\{A138BE8B-F051-4802-9A3F-A750A6D862D4}
CouponBar: [SBI $E3788A7B] Type library (Registry key, nothing done)
HKEY_CLASSES_ROOT\TypeLib\{87255C51-CD7D-4506-B9AD-97606DAF53F3}
Zedo: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
MediaPlex: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
FastClick: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
WebTrends live: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
MediaPlex: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
CasaleMedia: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
DoubleClick: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
Right Media: Tracking cookie (Internet Explorer: Owner) (Cookie, nothing done)
--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) ---
2009-01-26 blindman.exe (1.0.0.8)
2009-01-26 SDFiles.exe (1.6.1.7)
2009-01-26 SDMain.exe (1.0.0.6)
2009-01-26 SDShred.exe (1.0.2.5)
2009-01-26 SDUpdate.exe (1.6.0.12)
2009-01-26 SpybotSD.exe (1.6.2.46)
2009-01-26 TeaTimer.exe (1.6.4.26)
2011-03-27 unins000.exe (51.49.0.0)
2009-01-26 Update.exe (1.6.0.7)
2009-11-04 advcheck.dll (1.6.5.20)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2009-01-26 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2009-01-26 Tools.dll (2.1.6.10)
2009-01-16 UninsSrv.dll (1.0.0.0)
2011-03-18 Includes\Adware.sbi (*)
2011-03-22 Includes\AdwareC.sbi (*)
2010-08-13 Includes\Cookies.sbi (*)
2010-12-14 Includes\Dialer.sbi (*)
2011-03-08 Includes\DialerC.sbi (*)
2011-02-24 Includes\HeavyDuty.sbi (*)
2010-11-30 Includes\Hijackers.sbi (*)
2011-03-08 Includes\HijackersC.sbi (*)
2010-09-15 Includes\iPhone.sbi (*)
2010-12-14 Includes\Keyloggers.sbi (*)
2011-03-08 Includes\KeyloggersC.sbi (*)
2004-11-29 Includes\LSP.sbi (*)
2011-02-24 Includes\Malware.sbi (*)
2011-03-22 Includes\MalwareC.sbi (*)
2011-02-24 Includes\PUPS.sbi (*)
2011-03-15 Includes\PUPSC.sbi (*)
2010-01-25 Includes\Revision.sbi (*)
2009-01-13 Includes\Security.sbi (*)
2011-03-08 Includes\SecurityC.sbi (*)
2008-06-03 Includes\Spybots.sbi (*)
2008-06-03 Includes\SpybotsC.sbi (*)
2011-02-24 Includes\Spyware.sbi (*)
2011-03-15 Includes\SpywareC.sbi (*)
2010-03-08 Includes\Tracks.uti
2010-12-28 Includes\Trojans.sbi (*)
2011-03-22 Includes\TrojansC-02.sbi (*)
2011-03-03 Includes\TrojansC-03.sbi (*)
2011-03-08 Includes\TrojansC-04.sbi (*)
2011-03-21 Includes\TrojansC-05.sbi (*)
2011-03-08 Includes\TrojansC.sbi (*)
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dllThanks to all competitions posters and answer finders:TDon't squander time its the stuff lives are made of:rotfl::rotfl::rotfl::rotfl::rotfl:0 -
Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Folders Infected:
(No malicious items detected)
Files Infected:
c:\documents and settings\Rudd\local settings\Temp\pqipuydm.exe (Spyware.Passwords.XGen) -> Quarantined and deleted successfully.
Basically that's a keylogger and password stealer. For this reason, you'd want to change all of your passwords unfortunately.
Thanks for the HijackHunter log (different to Hijackthis)
Download and install Ccleaner as there are some files in the temp folders that need to be deleted:
http://www.piriform.com/ccleaner
and run it. Uncheck 'windows log' files, as well as browser history if you want to keep that - then Analyse and clean.
Also double check Internet Explorer: go to Tools, Internet Options, then Connections Tab, finally LAN settings and make sure that it's set to "Automatically detect settings" - also please tell me if it wasn't (although I should be able to tell from the hijackhunter log anyway).
Run a scan with this (it's quick, select the single scan option and don't worry about installing it):
Hitman Pro: Second Opinion Malware Scanner
http://www.surfright.nl/en/hitmanpro
Afterwards, you could leave it running a long scan with
Microsoft Windows Malicious Software Removal Tool 32-bit (no install needed)
http://www.microsoft.com/downloads/en/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en0 -
Id recommend a combofix run
Please run COMBOFIX
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Shut down your anti virus
Follow the simple instructions it gives
Post the COMPLETE log it creates here (Split into sections if need be) ~ if there are loads of 'SNAPSHOT' pages then leave them out
If it comes up with a RENAMING error then RIGHT click the exe file and RENAME and call it QWERTY (Making the complete file name 'QWERTY.exe') Or SAVE as 'QWERTY' on download
(If no log comes up or you lose it, COMBOFIX.TXT can be found in C drive):idea:0 -
Id recommend a combofix run
Please run COMBOFIX
http://download.bleepingcomputer.com/sUBs/ComboFix.exe
Shut down your anti virus
Follow the simple instructions it gives
Post the COMPLETE log it creates here (Split into sections if need be) ~ if there are loads of 'SNAPSHOT' pages then leave them out
If it comes up with a RENAMING error then RIGHT click the exe file and RENAME and call it QWERTY (Making the complete file name 'QWERTY.exe') Or SAVE as 'QWERTY' on download
(If no log comes up or you lose it, COMBOFIX.TXT can be found in C drive)
Thanks Rik as long as it wont conflict with what I have already done I will try it tomorrow. Thanks for your help.Thanks to all competitions posters and answer finders:TDon't squander time its the stuff lives are made of:rotfl::rotfl::rotfl::rotfl::rotfl:0
This discussion has been closed.
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 351.7K Banking & Borrowing
- 253.4K Reduce Debt & Boost Income
- 454K Spending & Discounts
- 244.7K Work, Benefits & Business
- 600.1K Mortgages, Homes & Bills
- 177.3K Life & Family
- 258.3K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.2K Discuss & Feedback
- 37.6K Read-Only Boards