What is XP Antispyware 2010?
The Malwarebytes research team has determined that XP Antispyware 2010 is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue. You are strongly advised to follow our removal instructions below.
How do I know if I am infected with XP Antispyware 2010?
This is how the main screen of the rogue application looks:
And see these warnings:
How did XP Antispyware 2010 get on my computer?
Rogue programs use different methods for spreading themselves. This particular one was installed by a trojan.
How do I remove XP Antispyware 2010?
Our program Malwarebytes' Anti-Malware can detect and remove this rogue application.
Please follow the detailed instructions posted in this post.
How would the full version of Malwarebytes' Anti-Malware help protect me?
We hope our application has helped you eradicate this malicious software. If your current security solution let this infection through, you might please consider purchasing the FULL version of Malwarebytes' Anti-Malware for additional protection.
As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against the XP Antispyware 2010 rogue. It would have warned you before the rogue could install itself, giving you a chance to stop it before it became too late.
Technical details for experts
Signs in a HijackThis log:
C:\Documents and Settings\{username}\Local Settings\Application Data\av.exe C:\Documents and Settings\{username}\Dck.exe O4 - HKCU\..\Run: [BMIMZMHMFM] C:\Documents and Settings\{username}\Dck.exe
Note: the elements in the startup entry are randomized names
Alterations made by the installer:
File System =============== In the existing folder C:\Documents and Settings\{username} Adds the file Dck.exe In the existing folder C:\WINDOWS Adds the file msa.exe"="01:21 24/01/10 136704 bytes In the existing folder C:\WINDOWS\Tasks Adds the file {35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job"="20:20 28/01/10 248 bytes Adds the file {66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job"="20:20 28/01/10 364 bytes Registry =============== [HKEY_CLASSES_ROOT\secfile] [HKEY_CLASSES_ROOT\.exe] @="secfile" [HKEY_CURRENT_USER\Software\BMIMZMHMFM] "Nl1"="-2069912880" "Nl0"="30056529" "Nl6"="3" "Nl3"="-1332651008" "Nl2"="30056722" "Nl5"="4" "Nl4"="86400" "Nq1"="'tSbFNJuL/h22spR48AI743bz2Kge8sEawEe9qDmwlElsy8Vz+c4nuMDfXPK0HljtkauXVCGbnnfra35yKwccKDhh+" "Nq0"="'tSLPLpWL7R22spR48AI743bz2Kge8sEYzVKwvT2iiUlsy8Vz6cQms8nYW7WrGAah1q7ZF2rk+EDa U9'" "Nq2"="'xC7aKZ+O6wyPlq1krRM4sG7m2LFGsYtHjHOagBf10Uk/n4gL8s8xs9LeD5KQVh3/j+XFa0mnvQ==' [HKEY_CURRENT_USER\Software\WS9E3IQBKY] "Nd2"="'ZuLNIa64IWuvvLI2R7iRAEwL8iFnqi/6lPGZOoQgs7J0x4Dgk1NI9w=='" "Nd1"="" "Nz1"="-814201008" "Nz0"="30056722" "Nz14"="0" "Nz6"="12" "Nz4"="100" "Nz3"="250" "Nz5"="3600" "Nz2"="13" "Nd0"="'Gbv+C4eSExjnyIpWf4+pYXAo/2QGxA/X94OiMMEM3fg2w7Pu0VNI9IxRBBYdPv+C8udmYYz+5+k/6cSbr3ScnTXryfHSy9au8r" "Nd3"="'FOqnUdbLQBfZ+w=='" [HKEY_CURRENT_USER\Software\XML] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "BMIMZMHMFM"="'C:\Documents and Settings\{username}\Dck.exe'"
Malwarebytes' Anti-Malware log:
Malwarebytes' Anti-Malware 1.44 Database version: 3653 Windows 5.1.2600 Service Pack 2 Internet Explorer 6.0.2900.2180 1/28/2010 8:53:26 PM mbam-log-2010-01-28 (20-53-26).txt Scan type: Quick Scan Objects scanned: 97991 Time elapsed: 3 minute(s), 13 second(s) Memory Processes Infected: 2 Memory Modules Infected: 0 Registry Keys Infected: 3 Registry Values Infected: 1 Registry Data Items Infected: 1 Folders Infected: 0 Files Infected: 4 Memory Processes Infected: C:\Documents and Settings\{username}\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Unloaded process successfully. C:\Documents and Settings\{username}\Dck.exe (Trojan.FakeAlert) -> Unloaded process successfully. Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_CLASSES_ROOT\secfile (Trojan.Fakealert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\BMIMZMHMFM (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bmimzmhmfm (Trojan.FakeAlert) -> Quarantined and deleted successfully. Registry Data Items Infected: HKEY_CLASSES_ROOT\.exe\(default) (Hijacked.exeFile) -> Bad: (secfile) Good: (exefile) -> Quarantined and deleted successfully. Folders Infected: (No malicious items detected) Files Infected: C:\Documents and Settings\{username}\Local Settings\Application Data\av.exe (ROGUE.Win7Antispyware2010) -> Quarantined and deleted successfully. C:\Documents and Settings\{username}\Dck.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\msa.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\Tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
- IP-blocks
- Execution protection
Edited by Metallica, 06 February 2010 - 02:26 PM.