Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

HELP! Anyone dealt with Personal Shield Pro?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
immoderate Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-26-11 11:52 PM
Original message
HELP! Anyone dealt with Personal Shield Pro?
It's a nasty virus that pretends to be an anti-virus program.

I know there are ways to delete it, but it won't let me open those web pages. It's nasty!

Thank to all for your assistance.

--imm
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
woo me with science Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 12:18 AM
Response to Original message
1. Here is a removal guide from bleepingcomputer.com, a reputable site.
Edited on Wed Jul-27-11 12:43 AM by woo me with science
I just copied and pasted the page, so the formatting might be weird, and the images are missing. It starts with description of the virus. The actual removal instructions are further down. If any of the missing images are critical to understanding what they are saying, post back and I will try to copy them for you. Also, if you need information from a link they mention, let me know.

Good luck!





http://www.bleepingcomputer.com/virus-removal/personal-shield-pro


Remove Personal Shield Pro (Uninstall Guide)
Posted by Grinler on June 10, 2011 @ 01:12 AM · Views: 16,131





What this infection does:

Personal Shield Pro is the name of a rogue that has belonged to numerous families of rogue anti-spyware programs in the past. The latest incarnation of this program is now MS Removal Tool family of rogue anti-spyware programs. This rogue is installed on your computer through the use of Trojans that pretend to be updates to various programs such as Flash, Shockwave, or codecs required to view an online video. These programs are also installed without your knowledge by exploiting vulnerabilities in programs installed on your computer when visiting normally safe sites that have been hacked with exploit kits. Regardless of how Personal Shield Pro arrives on your computer, when it is installed it will store the infection in a random folder located in C:\Documents and Settings\All Users\Application Data\ for Windows XP and C:\ProgramData in Windows Vista and Windows 7. The infection will then be configured to start automatically when you login to Windows.




Personal Shield Pro screen shot
Personal Shield Pro screen shot
For more screen shots of this infection click on the image above.
There are a total of 12 images you can view.



While Personal Shield Pro is running it will terminate most programs that you attempt to run while stating that the program is infected. It does this in order to protect itself from any security programs that may be used to assist in the removal of this infection. The text of an alert you could see when attempting to run an executable is:

Warning!
Application cannot be executed. The file taskmgr.exe is infected. Please activate your antivirus software.

This program will also display fake security warnings that are used to scare you into thinking that you computer has a severe security problem. The text of some of these alerts include:

Warning: Your computer is infected
Windows has detected spyware infection!
Click this message to install the last update of Windows security software...

Personal Shield Pro Firewall Alert
Personal Shield Pro Firewall has blocked a program from accessing the internet.
Internet Explorer Internet Browser is infected with worm Lsas.Blaster.Keylogger. This worm is trying to send your credit card details using Internet Explorer Internet Browser to connect to remote host.

All of these security alerts, including the infection warnings, are all false and should be ignored.

Without a doubt, Personal Shield Pro was designed to scare you into thinking that your computer has a security problem so that you will then purchase the program. For no reason should you purchase Personal Shield Pro, and if you have, you should contact your credit card company and dispute the charge stating that the program is a computer virus. To remove Personal Shield Pro and any related malware, please follow the steps in the removal guide below.



Threat Classification:

Information on Rogue Programs & Scareware



Advanced information:

View Personal Shield Pro files.
View Personal Shield Pro Registry Information.



Tools Needed for this fix:

Malwarebytes' Anti-Malware



Symptoms that may be in a HijackThis Log:

The line below is an example. The names used by this infection change per install.

O4 - HKCU\..\RunOnce: %AllUsersProfile%\hL10300JeEfM10300\hL10300JeEfM10300.exe



Guide Updates:

06/09/11 - Initial guide creation.
06/27/11 - Updated for new variant.
07/17/11 - Updated for new Security Tool variant using the same name.



Automated Removal Instructions for Personal Shield Pro using Malwarebytes' Anti-Malware:



1. Print out these instructions as we may need to close every window that is open later in the fix.

2. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If you run into this problem when following the steps in this guide you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.

3. Reboot your computer into Safe Mode with Networking using the instructions for your version of Windows found in the following tutorial:

How to start Windows in Safe Mode (http://www.bleepingcomputer.com/tutorials/tutorial61.html)

When following the steps in the above tutorial, select Safe Mode with Networking rather than just Safe Mode. When the computer reboots into Safe Mode with Networking make sure you login with the username you normally use. When you are at your Windows desktop, please continue with the rest of the steps.

4. This infection changes your Windows settings to use a proxy server that will not allow you to browse any pages on the Internet with Internet Explorer or update security software. Regardless of the web browser you use, for these instructions we will first need need to fix this problem so that we can download the utilities we need to remove this infection.

Please start Internet Explorer, and when the program is open, click on the Tools menu and then select Internet Options as shown in the image below.



Internet Explorer Tools Menu


5. You should now be in the Internet Options screen as shown in the image below.



Internet Options screen



Now click on the Connections tab as designated by the blue arrow above.

6. You will now be at the Connections tab as shown by the image below.


Internet Options connections tab



Now click on the Lan Settings button as designated by the blue arrow above.

7. You will now be at the Local Area Network (LAN) settings screen as shown by the image below.



Proxy Settings screen



Under the Proxy Server section, please uncheck the checkbox labeled Use a proxy server for your LAN. Then press the OK button to close this screen. Then press the OK button to close the Internet Options screen. Now that you have disabled the proxy server you will be able to browse the web again with Internet Explorer.

8. Now we must end the processes that belong to Personal Shield Pro so that it does not interfere with the cleaning procedure. To do this, please download RKill to your desktop from the following link.

RKill Download Link - http://www.bleepingcomputer.com/download/anti-virus/rkill
(Download page will open in a new tab or browser window.)


When at the download page, click on the Download Now button labeled iExplore.exe download link. When you are prompted where to save it, please save it on your desktop.

If you are unable to connect to the site to download RKill, please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings. You may have to do this quite a few times before you can get RKill downloaded. If you still cannot download the RKill program on the infected computer, you should download it to a clean computer and copy it to the infected one via a USB flash drive or CDROM.

9. Once it is downloaded, double-click on the iExplore.exe icon in order to automatically attempt to stop any processes associated with Personal Shield Pro and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that RKill is an infection, do not be concerned. This message is just a fake warning given by Personal Shield Pro when it terminates programs that may potentially remove it. If you run into these infections warnings that close RKill, a trick is to leave the warning on the screen and then run RKill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that RKill can terminate Personal Shield Pro . So, please try running RKill until the malware is no longer running. You will then be able to proceed with the rest of the guide. Do not reboot your computer after running RKill as the malware programs will start again.

If you continue having problems running RKill, you can download the other renamed versions of RKill from the RKill download page. Both of these files are renamed copies of RKill, which you can try instead. Please note that the download page will open in a new browser window or tab.

10. Now you should download Malwarebytes' Anti-Malware, or MBAM, from the following location and save it to your desktop:

Malwarebytes' Anti-Malware Download Link http://www.bleepingcomputer.com/download/anti-virus/malwarebytes-anti-malware
(Download page will open in a new window)

If you are unable to connect to the site to download Malwarebytes', please go back and do steps 3-6 again and make sure the infection has not reenabled the proxy settings.


11. Once downloaded, close all programs and Windows on your computer, including this one.

12. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.

13. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware checked. Then click on the Finish button. If MalwareBytes' prompts you to reboot, please do not do so.

14. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.


MalwareBytes Anti-Malware Screen

15. On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Personal Shield Pro related files.

16. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.


MalwareBytes Anti-Malware Scanning Screen

17. When the scan is finished a message box will appear as shown in the image below.


MalwareBytes Anti-Malware Scan Finished Screen

You should click on the OK button to close the message box and continue with the Personal Shield Pro removal process.

18. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.

19. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.


MalwareBytes Scan Results


You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

20. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.

21. You can now exit the MBAM program.

22. As this infection also changes your Windows HOSTS file, we want to replace this file with the default version for your operating system. Please note that if you or your company has added custom entries to your HOSTS file then you will need to add them again after restoring the default HOSTS file. In order to protect itself, Personal Shield Pro changes the permissions of the HOSTS file so you can't edit or delete it. To fix these permissions please download the following batch file and save it to your desktop:

hosts-perm.bat Download Link (http://download.bleepingcomputer.com/bats/hosts-perm.bat)

When the file has finished downloading, double-click on the hosts-perm.bat file that is now on your desktop. If Windows asks if you if you are sure you want to run it, please allow it to run. Once it starts you will see a small black window that opens and then quickly goes away. This is normal and is nothing to be worried about. You should now be able to access your HOSTS file.

23. We now need to delete the C:\Windows\System32\Drivers\etc\HOSTS file. Once it is deleted, download the following HOSTS file that corresponds to your version of Windows and save it in the C:\Windows\System32\Drivers\etc folder. If the contents of the HOSTS file opens in your browser when you click on a link below then right-click on the appropriate link and select Save Target As..., if in Internet Explorer, or Save Link As.., if in Firefox, to download the file.

Windows XP HOSTS File Download Link: http://download.bleepingcomputer.com/misc/host-files/windows-xp/hosts
Windows Vista HOSTS File Download Link: http://download.bleepingcomputer.com/misc/host-files/windows-vista/hosts
Windows 2003 Server HOSTS File Download Link: http://download.bleepingcomputer.com/misc/host-files/windows-2003-server/hosts
Windows 2008 Server HOSTS File Download Link: http://download.bleepingcomputer.com/misc/host-files/windows-2008-server/hosts
Windows 7 HOSTS File Download Link: http://download.bleepingcomputer.com/misc/host-files/windows-7/hosts

Your Windows HOSTS file should now be back to the default one from when Windows was first installed.

24. Now reboot your computer.

25. As many rogues and other malware are installed through vulnerabilities found in out-dated and insecure programs, it is strongly suggested that you use Secunia PSI to scan for vulnerable programs on your computer. A tutorial on how to use Secunia PSI to scan for vulnerable programs can be found here:

How to detect vulnerable and out-dated programs using Secunia Personal Software Inspector

Your computer should now be free of the Personal Shield Pro program. You may want to consider purchasing the PRO version of Malwarebytes' Anti-Malware to protect against these types of threats in the future, as if you had the real-time protection component, that comes with the paid for version, activated it would not have allowed this infection to install.

If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:

Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help





Associated Personal Shield Pro Files:

%AllUsersProfile%\<random two letters>10300<random five letters>10300
%AllUsersProfile%\<random two letters>10300<random five letters>10300\<random two letters>10300<random five letters>10300
%AllUsersProfile%\<random two letters>10300<random five letters>10300\<random two letters>10300<random five letters>10300.exe

File Location Notes:

%AllUsersProfile% refers to the All Users Profile folder. By default, this is C:\Documents and Settings\All Users for Windows 2000/XP and C:\ProgramData\ for Windows Vista/7.



Associated Personal Shield Pro Windows Registry Information:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce "<random two letters>10300<random five letters>10300"


Printer Friendly | Permalink | Reply | Top
 
immoderate Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 03:03 AM
Response to Reply #1
3. Thanks, I mean, really, thanks.
Apparently Malwarebytes took care of it. I say apparently, because I've just been attacked by a scam anti-virus program, and what can you trust after that? I found some answers on the web, appears a few different ones(?) but when I went to those sites the Personal Shield Pro would crash my browser and then my computer. :(

Coming to DU fooled it. Actually my first choice, since I always get good information here. But I went looking around while waiting for a reply.

Now I can go to sleep. :hi:

--imm
Printer Friendly | Permalink | Reply | Top
 
woo me with science Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 07:39 AM
Response to Reply #3
6. Note that the instructions above say your hosts file was probably corrupted,
so you will probably want to follow their instructions for fixing it, in addition to using MBAM.

Glad to hear you were able to remove. :)
Printer Friendly | Permalink | Reply | Top
 
immoderate Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 05:25 PM
Response to Reply #6
7. Well some things weren't as it said.
For instance it hadn't switched the proxy server on. I also had no hosts file to begin with AFAIK. There is something else with hosts in the name, I assume it serves that purpose, whatever it is.

Personal Shield is apparently gone, but there are still some strange behaviors from my computer. I'm scanning the shit out of it, with everything that has worked for me before. A while ago, it wouldn't load anything linked from Google. But it would go to those links if I pasted them.

I spent a whole day nursing the computer, and I'm still suspecting it's not clean.

Thanks for getting me out of the ditch!

--imm
Printer Friendly | Permalink | Reply | Top
 
woo me with science Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 11:25 PM
Response to Reply #7
8. Sorry to hear you are still having some trouble.
Edited on Wed Jul-27-11 11:25 PM by woo me with science
I feel for you; I really do. It takes so much time.

Some thoughts...Just ignore what doesn't fit:

Did you use the rkill program before MBAM as recommended in the tutorial? It may be that some Personal Shield Pro processes were not shut down during removal and are reactivated now. It might be worth a try to go through the steps again, using rkill and then re-running MBAM. I hear you that the infection doesn't seem exactly the same, though...

I always run Superantispyware as well as MBAM. In my experience, it has often been able to catch minor things that MBAM misses. ESET online scanner has also been very helpful to me.

You might also want to search for "Personal Shield Pro" on the website to find other threads from people with this infection, to see if there's anything helpful in any of them: http://www.bleepingcomputer.com/forums/index.php?app=core&module=search§ion=search&do=search&fromsearch=1

If worse comes to worst and you can't get rid of the weirdness, you might consider posting in the forums at bleepingcomputer.com or another reputable help site to have someone guide you through a cleaning process. It's completely free, although you usually have to wait 3 to 5 days for a response. If you do use this option, note that they have a pre-posting cleaning procedure to go through: http://www.bleepingcomputer.com/forums/forum22.html

I've linked to bleepingcomputer throughout here, because I've had very good experiences with this site, but there are others out there. Just be careful that you have a reputable one before actually going to any link (i.e., google the name first to get info). MBAM even has its own support forums: http://forums.malwarebytes.org/

I hope you can get this resolved without too much additional trauma. There is, of course, always the option of reinstalling the operating system. :grr:

Good luck again. I'm really sorry this happened.


Printer Friendly | Permalink | Reply | Top
 
immoderate Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 08:56 AM
Response to Reply #8
9. I have persisted, and it appears to be "cured."
Thanks for all the extra information. If not now, it will be useful, I'm sure.

:hi:

--imm
Printer Friendly | Permalink | Reply | Top
 
woo me with science Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:12 AM
Response to Reply #9
10. Glad to hear it.
Congratulations on conquering the beast! :applause:
Printer Friendly | Permalink | Reply | Top
 
canetoad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 01:50 AM
Response to Original message
2. Remove this way:
You need another computer, a flash stick, knowledge how to boot your machine into safe mode. This usually involves tapping the F8 key as it boots and following the prompts.

On the 'safe' computer, download the Malwarebytes AntiMalware program and load the installer onto your flash stick.

Boot your infected machine in safe mode. Plug in the flash drive and install Malwarebytes. Still in safe mode, run a full Malwarebytes scan and delete everything it finds. This can take some time, be patient.

When finished, reboot into normal mode. Update Malwarebytes definitions file then run another full scan, deleting everything it finds.

You should be good to go.
Printer Friendly | Permalink | Reply | Top
 
immoderate Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 03:06 AM
Response to Reply #2
4. Safe mode w/network let me download.
Malwarebytes took care of it.

Thanks very much! What a great resource this Group is. :)


--imm
Printer Friendly | Permalink | Reply | Top
 
canetoad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-27-11 03:30 AM
Response to Reply #4
5. TY. As a follow up
I'd also delete all my System Restore points by going to My Computer, Properties and simply turning off Sys Restore. Reboot, turn Sys Restore on again. You can then make a fresh restore point knowing that you're not restoring malware.

There are several bogus anti-virus programs going around. Some of them prevent the installation and running of anti-malware programs, thus the need to install in safe mode. I'm glad you figured out safe mode + networking as it no doubt saved time and effort.

I NEVER buy software, there's enough good freeware around but.....the 30 bucks I paid for a registered copy of Malwarebytes was the best money ever spent. You get access to web protection and a scheduler to download updates and scan your machine at set times.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue May 07th 2024, 09:39 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC