Help--computer hacked by antivirus scanning software through popup on website

See Quads post ...was hoping Quads would chime in....

 

OK before we connect...two items trouble me

C:\Program Files\Java\jre6\bin\java.exe is preparing to access the internet" is detected.
Java Platform SE 6 U13  6.0.130.3--Java Plug In 1.6.0_13 for Netscape Navigator (DLL Helper)

Are you running any other real time protection software ...Like Windows Defender

Re Cookies it may look different in 3.5.5 ...been some time ...one more try and then we'll forget cookies

FF > Tools > Options > Privacy Tab > Accept third party cookies ~ untick

Open Windows Defender > Tools > Software Explorer > Startup Programs > Show for all Users ~ You should findan orange Java Platform listing > highlight it so Java shows rt side of screen > then click Disable....all this will dois Disable Java at Startup which is not needed.  If Java is required if will still open.  Feel funny about Java\jre6\bin\java.exe is preparing to access the internet" is detected.  Have no idea what app you may have that is asking for Java to access the Internet or why Java needs to access the Internet.

FF > Addons > Extensions and Plugins > anything Java Disable....fully reversible if required.  Although 6 U 13 is not safe to run.  Old and has known security holes.   Have no idea why you have Java Plug In 1.6.0_13 for Netscape Navigator (DLL Helper)

Do what you can ....connect to Internet ...watch for smoke...Run Norton Live Update and Full Scan and if still no smoke...open FF and download MBAM and update and run Full Scan

bjm_   fingers crossed. 

Your in good hands now ~ thanks for being so patient ....

 

@ Quads

never so happy to see you as I am right now.  :smileyhappy:

 

Thanks for looking in...Really, thanks and floplot thanks for chiming in...I'm spent. 

 

bjm_

fHi bjm,

 

Did you see Quads post?  I'm wondering if I should try to remove the Antivirus suite the way it is shown in his attachment first before connecting to the intenet.  I think the screen shots that they showed are the same as the one I saw yesterday.

 

Or, did Norton detect and remove it?  I guess I'm confused--is the infection the three Trojans or is it the rogue AntiVirus suite--or are they the same thing?

 

Wait to hear from you or Quads before I do anything,

 

pcmom4

Yes I saw Quads post and link ....I've been hanging on hoping Quads would see all my posts and look in.

Quads is the be all and end all when it come to Malware

Go with Quads ..read and print out and follow all that link offers...we may have danced around the issue...now the professional will take over.... I hope !

 

 

 

 

The "Trojans" and the Rogue files "[random]tssd.exe" looks like one and the same,  Norton may have detected file(s) as that, but the rest needs to be reset and removed, from any leftover files, registry entries and the internet connection reset.

 

Exactly as the instructions in order stated including the Safe Mode with Networking , 21 steps

 

Quads

Thanks so much Quads--i'll print out the instructions and follow them.  One question--if I use safe mode with networking I need to reconnect the cable to the DSL, correct? (That's how we had it before the attack--this PC is not wirelessly connected.)

 

I'll let you know how it goes--

 

pcmom4

 

Big thanks to bjm  for all your help--

Yes, as the instructions reset the proxy setting ans then while in safe mode with networking you can download the other programs the instructions state.

Just take it slowly step by step with what is being said to do, and download etc.

 

 

Quads 

bjm_

 

There are other ways around this rogue, but we will try the ready made instructions first, 

 

Quads

 

Quads

All I could see was an infected box with outdated / vulnerable / unpatched apps.  She was offered Safe Mode w SysRestore and was ready to go down that rabbit hole as long as someone would tell her how.  I got in thinking....OP knows less than me... I'll try to dissuade OP away from SysRestore (for obvious reasons) and then I was in for a pinch and before I knew it I was in for a pound.   I have a list of Malware Removal sites ready to offer....but, the hole I was digging just kept getting deeper and deeper.  I just kept thinking... If only Quads would chime in...I could stop digging.

I'll go stand in the corner now ... 

Thanks for chiming in

bjm_

 

I got in thinking....OP knows less than me... I'll try to dissuade OP away from SysRestore (for obvious reasons)


 

bjm_

 

Would you care to elaborate on those obvious reasons? Specifically what dire consequences would have resulted if the OP had tried System Restore? The worst that would have happened is that the restore operation would have failed because the malware had corrupted the restore points or blocked access to System Restore.

I think what we can learn from Quad's post is that the most important beginning procedure is to identify the problem before changing anything.  Rather than discussing the viability of any particular action, the fact is that any action at all should be based on some understanding of the infection itself.

Very well put, delphinium, and that is why we are here, to help people and learn from others in the process.

Just to put my 2 cents in--

 

From a lay person's perspective, when something like this hits your computer, you are thankful for any help whatsoever--it feels like a treat to not be sitting on some 800 number for hours waiting for help.  I think each of you have been a fantastic help--I'm the dope who messed up my machine, so anyone that helps me out is a hero in my book.

 

And, for the record, I don't mind the process of taking some time trying various options to find an answer--I'm here to learn, too. 

 

That said--it's late once again here and I've got kids to get to bed.  I will run Quad's AntiVirus Suite removal link first thing in the morning--I'm fairly tired and this looks like a pretty detailed procedure--want to get it right. 

 

Thanks for figuring all this out (including the hopelessly non-updated state of my computer).  I never could have done this on my own.  I hope that Quads and the rest of you fine folks will be around in the morn--

 

pcmom4

 

 

 

 

Hi Turbo

I agree, next time I'll try to persuade OP to run SysRestore (for obvious reasons) that the worst that would have happened is that the restore operation would have failed because the malware had corrupted the restore points or blocked access to System Restore. 

I'll ignore the fact that the most important beginning procedure is to identify the problem before changing anything.

I'll ignore the fact that any action at all should be based on some understanding of the infection itself.

 

bjm_

Just starting--one question:

 

In the instructions is says to login to safe mode with netowrking and login with the username you normally use.  We normally use the "online and email " limited account--and this is the one that I was on when the infection occurred.  It is not an administrative account--should I log on into that account or to the administrative account?

 

pcmom4

I took the guide at its word and tried the limited online account.  Reset the proxy settings and downloaded rkill.com.  The DOS screen opens and it starts, but then I get this message:

 

Windows cannot open this file: pev.rkexe

 

and asks if I want to find associations on the computer or the web for the file.  I tried running rkill while the warning was up many, many times but it just kept coming back.  (I did close the warnings after a while.)  I then tried downloading iExplore.exe (a renamed rkill) and it did the same thing with the same warning. 

 

I can't get anywhere.  Any ideas?  Perhaps I should login under the Administrator's account.

 

Help...

 

pcmom4

Hi Pcmom4

The thing is Quads is in like a whole nother time zone across the other side of the globe...so, we're waiting for Quads.

We've learned ...when Quads take on a project ...out of respect and gratitude for Quads...it's undertsood step aside and wait for Quads... too many cooks spoil the stew :smileyhappy:

 

Please be patient...

bjm_

Hi PCmom

 

1. while in the infected account, do you have realtime products installed like Spybot S&D installed with Teatimer??

 

2. Go here http://homepages.slingshot.co.nz/~crutches/Loggers/ Download "Hijackthis.com", Run it  with the PC in Normal Mode if possible, 

Save a log and post it back here as an attachment.

 

Well will try and get the startup entry this way it the O4 entry still exists. 

 

Quads

Hi Quads,

 

Surprisingly, I managed to get into the Admin account in Normal mode, download Hijackthis and run it.  I did get this message:  "System denied write access to the Hosts file."  It suggested that I right click on the icon and run as administrator--this did not come up as an option so it wasn't done.

 

This was not run from the infected account--this was run from Normal mode in the Admin account (which looks like normal--the desktop of the infected account, Online and Email, is all messed up.)  I can try running it from the infected account in normal mode, if you want.  (I'm not sure if that will work.)

 

pcmom4

I hate limited accounts with Vista

 

The reason to run it in the infected account is that if the rogue has used the O4 HKCU entry it means that the registry entries for HKCU are only for that user account and only to start up when logging into that account.

 

If Not Normal Mode, Safe Mode with Networking with infected account

 

Quads