Jump to content

Welcome to Geeks to Go
Geeks to Go Welcome
Create Account Login to Account
Photo

Removal instructions for AntiVirus Studio 2010

- - - - -

  • Please log in to reply
5 replies to this topic

#1
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,944 posts
Content is republished with permission from Malwarebytes.

What is AntiVirus Studio 2010?

The Malwarebytes research team has determined that AntiVirus Studio 2010 is a fake anti-malware application. These so-called "rogues" use intentional false positives to convince users that their systems have been compromised. Then they try to sell you their software, claiming it will remove these threats. In extreme cases the false threats are actually the very trojans that advertise or even directly install the rogue. You are strongly advised to follow our removal instructions below.

How do I know if I am infected with AntiVirus Studio 2010?

This is how the main screen of the rogue application looks:

Posted Image

You will find these icons on your desktop and in your taskbar:

Posted Image

And see these warnings:

Posted Image

Posted Image

Posted Image

Posted Image

How did AntiVirus Studio 2010 get on my computer?

Rogue programs use different methods for spreading themselves. This particular one was installed by a trojan.

How do I remove AntiVirus Studio 2010?

Our program Malwarebytes' Anti-Malware can detect and remove this rogue application.
  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:

    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.
  • When completed, a log will open in Notepad. The rogue application should now be gone.

Is there anything else I need to do to get rid of AntiVirus Studio 2010?

  • No, Malwarebytes' Anti-Malware removes AntiVirus Studio 2010 completely.

Note: in some cases this malware blocked the execution of legitimate programs. If you run into such an event and ignoring the warnings does not help, rename the desired executable to firefox.exe

How would the full version of Malwarebytes' Anti-Malware help protect me?

We hope our application has helped you eradicate this malicious software. If your current security solution let this infection through, you might please consider purchasing the FULL version of Malwarebytes' Anti-Malware for additional protection.

As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against the AntiVirus Studio 2010 rogue. It would have warned you before the rogue could install itself, giving you a chance to stop it before it became too late.


Posted Image

Posted Image

Technical details for experts

Signs in a HijackThis log:
C:\Documents and Settings\{username}\Desktop\load.exe
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe

O4 - HKCU\..\Run: [45cwseuwf8sk] C:\Documents and Settings\{username}\Desktop\load.exe
O4 - HKCU\..\Run: [AntiVirus Studio 2010] "C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe" /STARTUP
O4 - HKCU\..\Run: [SecurityCenter] C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe

Note: the startup name for the installer load.exe is random

Alterations made by the installer:
  File System
  ===============

    Adds the folder C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010
      Adds the file taskmgr.dll"="08:43 01/10/10 115200 bytes
      Adds the file securityhelper.exe"="14:58 02/10/10 2819584 bytes
      Adds the file securitycenter.exe"="08:43 01/10/10 312832 bytes
      Adds the file AntiVirus Studio 2010.exe"="08:43 01/10/10 1651712 bytes
    In the existing folder C:\Documents and Settings\{username}\Application Data\Microsoft\Internet Explorer\Quick Launch
      Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1942 bytes
    In the existing folder C:\Documents and Settings\{username}\Local Settings\Temp
      Adds the file _6.tmp"="13:20 07/10/10 0 bytes
      Adds the file ~DFA583.tmp"="13:22 07/10/10 114688 bytes
      Adds the file 02c9c3c35bdx5.exe"="13:20 07/10/10 49152 bytes
      Adds the file 17dkf.exe"="13:20 07/10/10 102400 bytes
      Adds the file 1iowieoo.exe"="13:21 07/10/10 41984 bytes
      Adds the file 2010yo.exe"="13:21 07/10/10 86016 bytes
      Adds the file 472a10e2ebxd9.exe"="13:20 07/10/10 47104 bytes
      Adds the file 56493.exe"="13:20 07/10/10 61440 bytes
      Adds the file 8gmsed-bd.exe"="13:20 07/10/10 58368 bytes
      Adds the file ae0965a7157cd.exe"="13:20 07/10/10 48128 bytes
      Adds the file al3erfa3.exe"="13:20 07/10/10 25600 bytes
      Adds the file aler3fa.exe"="13:20 07/10/10 26624 bytes
      Adds the file alerfa.exe"="13:20 07/10/10 23552 bytes
      Adds the file alerfa2.exe"="13:21 07/10/10 24576 bytes
      Adds the file alerfa322.exe"="13:20 07/10/10 27648 bytes
      Adds the file aqfitrlxi2.exe"="13:20 07/10/10 45056 bytes
      Adds the file backd-efq.exe"="13:20 07/10/10 7168 bytes
      Adds the file brdss.exe"="13:20 07/10/10 72704 bytes
      Adds the file bzqa43d.exe"="13:20 07/10/10 57344 bytes
      Adds the file cocksucker.exe"="13:20 07/10/10 82944 bytes
      Adds the file cosock.exe"="13:20 07/10/10 75776 bytes
      Adds the file cunifuc.exe"="13:20 07/10/10 39936 bytes
      Adds the file dc_3.exe"="13:20 07/10/10 65536 bytes
      Adds the file dd10x10.exe"="13:20 07/10/10 35840 bytes
      Adds the file ddhelp.exe"="13:20 07/10/10 74752 bytes
      Adds the file ddoll3342.exe"="13:20 07/10/10 43008 bytes
      Adds the file destroyer.exe"="13:20 07/10/10 97280 bytes
      Adds the file dkfjd93.exe"="13:20 07/10/10 83968 bytes
      Adds the file ds7hw.exe"="13:20 07/10/10 28672 bytes
      Adds the file eelnvd13.exe"="13:20 07/10/10 52224 bytes
      Adds the file eephilpe.exe"="13:20 07/10/10 19456 bytes
      Adds the file exppdf_w.exe"="13:20 07/10/10 8192 bytes
      Adds the file fe.exe"="13:20 07/10/10 92160 bytes
      Adds the file format.exe"="13:20 07/10/10 99328 bytes
      Adds the file gedx_ae09.exe"="13:20 07/10/10 12288 bytes
      Adds the file gpupz2a.exe"="13:20 07/10/10 16384 bytes
      Adds the file hardwh.exe"="13:20 07/10/10 71680 bytes
      Adds the file hhbboll_2.exe"="13:20 07/10/10 34816 bytes
      Adds the file hiphop.exe"="13:20 07/10/10 87040 bytes
      Adds the file hjkgfddd.exe"="13:21 07/10/10 78848 bytes
      Adds the file hodeme.exe"="13:20 07/10/10 94208 bytes
      Adds the file htfad4.exe"="13:20 07/10/10 31744 bytes
      Adds the file hvipws9.exe"="13:20 07/10/10 54272 bytes
      Adds the file jdhellwo3.exe"="13:20 07/10/10 53248 bytes
      Adds the file jk[bleep]fu.exe"="13:22 07/10/10 46080 bytes
      Adds the file jofcdks.exe"="13:20 07/10/10 36864 bytes
      Adds the file kgn.exe"="13:20 07/10/10 33792 bytes
      Adds the file kilslmd.exex"="13:20 07/10/10 38912 bytes
      Adds the file kjdh_gf_jjdhgd.exe"="13:20 07/10/10 50176 bytes
      Adds the file kjh102k3.exe"="13:20 07/10/10 79872 bytes
      Adds the file kn.a.exe"="13:20 07/10/10 4096 bytes
      Adds the file kock.exe"="13:20 07/10/10 81920 bytes
      Adds the file ljts-23.exe"="13:21 07/10/10 64512 bytes
      Adds the file lols.exe"="13:20 07/10/10 95232 bytes
      Adds the file lorsk.exe"="13:20 07/10/10 76800 bytes
      Adds the file ploper.exe"="13:20 07/10/10 80896 bytes
      Adds the file poertd.exe"="13:20 07/10/10 91136 bytes
      Adds the file ppddfcfux.exxe"="13:20 07/10/10 44032 bytes
      Adds the file pswwg3c.exe"="13:20 07/10/10 32768 bytes
      Adds the file qwedvor.exe"="13:20 07/10/10 101376 bytes
      Adds the file qwklrvjhqlkj.exe"="13:20 07/10/10 22528 bytes
      Adds the file r0life.exe"="13:20 07/10/10 40960 bytes
      Adds the file rator.exe"="13:20 07/10/10 69632 bytes
      Adds the file rtfme.exe"="13:20 07/10/10 103424 bytes
      Adds the file safe.exe"="13:20 07/10/10 89088 bytes
      Adds the file snowif.exe"="13:20 07/10/10 68608 bytes
      Adds the file sycre.exe"="13:20 07/10/10 67584 bytes
      Adds the file test.exe"="13:20 07/10/10 98304 bytes
      Adds the file timem.exe"="13:20 07/10/10 88064 bytes
      Adds the file warsddd_w.exe"="13:20 07/10/10 14336 bytes
      Adds the file wefgetn_00.exe"="13:21 07/10/10 13312 bytes
      Adds the file wergfq.exe"="13:20 07/10/10 77824 bytes
      Adds the file winlogoff.exe"="13:20 07/10/10 100352 bytes
      Adds the file wqefqw7e.exe"="13:20 07/10/10 15360 bytes
      Adds the file wrcud12.exe"="13:20 07/10/10 11264 bytes
      Adds the file wrfwe_di.exe"="13:20 07/10/10 60416 bytes
    In the existing folder C:\Documents and Settings\{username}\Start Menu\Programs
      Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1970 bytes
    Adds the folder C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010
      Adds the file How to Activate AntiVirus Studio 2010.lnk"="13:20 07/10/10 1208 bytes
      Adds the file Help AntiVirus Studio 2010.lnk"="13:20 07/10/10 1182 bytes
      Adds the file AntiVirus Studio 2010.lnk"="13:20 07/10/10 1976 bytes
      Adds the file Activate AntiVirus Studio 2010.lnk"="13:20 07/10/10 1996 bytes

  Registry
  ===============
    [HKEY_CURRENT_USER\Software\AntiVirus Studio 2010]
      "LastUpdateDate"="'2010/9/16'"
      "LastTimeStamp"="186"
      "BackgroundScanTimeout"="1"
      "BackgroundScan"="1"
      "MinimizeOnStart"="0"
      "AutomaticallyUpdates"="1"
      "ScanSystemOnStartup"="1"
      "SoftID"="'AntiVirus Studio 2010'"
      "InstallDir"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010'"
      "ADVid"="'93'"
      "(Default)"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010'"
      "BuyUrl"="'9213E182D88955043FDF326FE4079BCA82EDD6B8E25ABB2925100F325033DEE2FA8667'"
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Studio 2010]
      "DisplayIcon"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe",1'"
      "UninstallString"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe" /UNINSTALL'"
      "DisplayName"="'AntiVirus Studio 2010'"
    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
      "45cwseuwf8sk"="'C:\Documents and Settings\{username}\Desktop\load.exe'"
      "AntiVirus Studio 2010"="'"C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe" /STARTUP'"
      "SecurityCenter"="'C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe'"


Malwarebytes' Anti-Malware log:
Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4766

Windows 5.1.2600 Service Pack 3
Internet Explorer 6.0.2900.5512

10/7/2010 1:32:15 PM
mbam-log-2010-10-07 (13-32-15).txt

Scan type: Quick scan
Objects scanned: 123137
Time elapsed: 5 minute(s), 13 second(s)

Memory Processes Infected: 3
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 3
Folders Infected: 2
Files Infected: 62

Memory Processes Infected:
C:\Documents and Settings\{username}\Desktop\load.exe (Trojan.Agent) -> Unloaded process successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe (Rogue.AntivirusStudio) -> Unloaded process successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe (Rogue.AntivirusStudio) -> Unloaded process successfully.

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_CURRENT_USER\Software\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45cwseuwf8sk (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\antivirus studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\securitycenter (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Folders Infected:
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010 (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.

Files Infected:
C:\Documents and Settings\{username}\Desktop\load.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\AntiVirus Studio 2010.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securitycenter.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\securityhelper.exe (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\AntiVirus Studio 2010\taskmgr.dll (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\Activate AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\Help AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010\How to Activate AntiVirus Studio 2010.lnk (Rogue.AntivirusStudio) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Start Menu\Programs\AntiVirus Studio 2010.LNK (Rogue.AntivirusStudio2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Application Data\Microsoft\Internet Explorer\Quick Launch\AntiVirus Studio 2010.LNK (Rogue.AntivirusStudio2010) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\02c9c3c35bdx5.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\17dkf.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\472a10e2ebxd9.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\56493.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\8gmsed-bd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ae0965a7157cd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\al3erfa3.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\alerfa.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\backd-efq.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\bzqa43d.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cocksucker.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cosock.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\cunifuc.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dc_3.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dd10x10.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ddhelp.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ddoll3342.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\dkfjd93.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ds7hw.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\eelnvd13.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\eephilpe.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\exppdf_w.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\fe.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\gedx_ae09.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\gpupz2a.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hardwh.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hhbboll_2.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hiphop.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hodeme.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\hvipws9.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\jdhellwo3.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\jofcdks.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\kilslmd.exex (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\kjdh_gf_jjdhgd.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\lols.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\lorsk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\ppddfcfux.exxe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\pswwg3c.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\qwedvor.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\qwklrvjhqlkj.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\r0life.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\rator.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\snowif.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\sycre.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\test.exe (Trojan.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\timem.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wergfq.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\winlogoff.exe (Trojan.FakeSmoke) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wqefqw7e.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wrcud12.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\{username}\Local Settings\Temp\wrfwe_di.exe (Trojan.Downloader) -> Quarantined and deleted successfully.


As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention
Save yourself the hassle and get protected.
  • 0

Advertisements


#2
Gee-Bee

Gee-Bee

    Member

  • Member
  • PipPip
  • 28 posts
Hi, I got this problem on my pc.

I have Malwarebytes installed and updated, and after running it and re-booting it doesn't show up anymore.

However, McAfee still finds it in C:\Documents and Settings\GORDON\Local Settings\Temp and says it can't delete it.

Should I delete the file from the folder manually? Or is there something else I need to do?

Many thanks for any help anyone can give me.

Gee-Bee
  • 0

#3
Gee-Bee

Gee-Bee

    Member

  • Member
  • PipPip
  • 28 posts
PS - I also see the following in the same folder:

al3erfa3
aler3fa
alerfa
alerfa322
aqfitrlxi2

Are theserelated to the PUP? And do I need to do anything about them?

Thanks.

Gee-Bee
  • 0

#4
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,944 posts
If you have additional problems or questions, please go to the malware forum and follow the instructions at the top....Especially the CLICK HERE.

That will give you several steps that will help you clean up 70 percent of all problems by yourself. If at the end of the process you are still having difficulty--and you may not be-- then post an OTListIt log in THAT forum.
  • 0

#5
Gee-Bee

Gee-Bee

    Member

  • Member
  • PipPip
  • 28 posts
Hi Metallica, sorry for the delay in replying - been away with work.

Went back and followed the instructions running OTL in addition to using Malwarebytes, and the problem seems to have been resolved. Not sure why it worked second-time around but not first just using Malwarebytes, (you Super-Geeks no doubt understand), however the fact that it did is what I really care about.

Many thanks for your help.

Cheers,

Gee-Bee
  • 0

#6
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,944 posts
We're just glad you were able to solve it. :D
  • 0




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

featured
Malware Removal How to Guides Windows 7 System Building Download Files Register welcome

Never used a forum? Learn how.