Cannot remove Trojan:JS/Medfos.B

Recommended Posts

Got "Rogue.SystemProgressiveProtection" from a fake Fedex emails. Ran updated MBAM and it removed several items:

Files Detected: 4

C:\ProgramData\B2FCF13D1007295A0000B2FC3E4B33BC\B2FCF13D1007295A0000B2FC3E4B33BC.exe (Trojan.Lameshield.124) -> Quarantined and deleted successfully.

C:\Users\gkorba\Desktop\System Progressive Protection.lnk (Rogue.SystemProgressiveProtection) -> Quarantined and deleted successfully.

C:\Users\gkorba\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Progressive Protection\System Progressive Protection.lnk (Rogue.SystemProgressiveProtection) -> Quarantined and deleted successfully.

And subsequent full MBAM scan showed all clean. Then MSE kept finding Trojan:JS/Medfos.B in %appdata%\local\-f3a8-4422-bcdb-d6c8ded53e42.crx->manager.js, and it keeps coming back after telling MSE to delete it.

I found the process that keeps creating that CRX is "C:\Windows\System32\rundll32.exe" "C:\Users\gkorba\AppData\Roaming\dlosat.dll",Reversed_Type, but I don't know how to get rid of it.

Attached are dds.txt and attach.txt




Share this post

Link to post
Share on other sites

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.


  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.


  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+


Share this post

Link to post
Share on other sites

Hi Gringo,

After I posted, and before I got your reply, I used Process Explorer to identify two rundll32.exe processes that were loading two DLLs that were recreating the CRX file that MSE was removing, and then deleted the CRX and the two DLLs on reboot using Sysinternal's movefile.exe.

Now I see no further problems, but have followed your instructions and here are the logs you requested. Note that all the LMI stuff referenced in RogueKiller is LogMeIn Rescue, which I am using to do this all remotely from another machine.

Results of screen317's Security Check version 0.99.56

Windows 7 Service Pack 1 x86 (UAC is enabled)

Internet Explorer 8 Out of date!

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Enabled!

Microsoft Security Essentials

Antivirus up to date!

`````````Anti-malware/Other Utilities Check:`````````

Malwarebytes Anti-Malware version

Adobe Flash Player 11.5.502.135

Adobe Reader 9 Adobe Reader out of Date!

````````Process Check: objlist.exe by Laurent````````

Microsoft Security Essentials msseces.exe

Windows Defender MSMpEng.exe

Microsoft Security Client Antimalware MsMpEng.exe

Microsoft Security Client Antimalware NisSrv.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 26% Defragment your hard drive soon! (Do NOT defrag if SSD!)

````````````````````End of Log``````````````````````

# AdwCleaner v2.104 - Logfile created 01/03/2013 at 01:54:14

# Updated 29/12/2012 by Xplode

# Operating system : Windows 7 Professional Service Pack 1 (32 bits)

# User : GKorba - GKORBA01

# Boot Mode : Normal

# Running from : C:\Users\gkorba\Desktop\adwcleaner.exe

# Option [Delete]

***** [services] *****

***** [Files / Folders] *****

***** [Registry] *****

***** [internet Browsers] *****

-\\ Internet Explorer v8.0.7601.17514

[OK] Registry is clean.


AdwCleaner[s1].txt - [517 octets] - [03/01/2013 01:54:14]

########## EOF - C:\AdwCleaner[s1].txt - [576 octets] ##########

RogueKiller V8.4.2 [Dec 31 2012] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version

Started in : Normal mode

User : GKorba [Admin rights]

Mode : Remove -- Date : 01/03/2013 02:03:25

¤¤¤ Bad processes : 6 ¤¤¤

[sUSP PATH] unattended_srv.exe -- C:\Users\gkorba\AppData\Local\LogMeIn Rescue Unattended\LMIR0001.tmp\unattended_srv.exe -> KILLED [TermProc]

[DLL] explorer.exe -- C:\Windows\explorer.exe : C:\Users\gkorba\AppData\Local\LOGMEI~1\LMIR0001.tmp\rahook.dll -> UNLOADED

[DLL] explorer.exe -- C:\Windows\explorer.exe : C:\Users\gkorba\AppData\Local\LOGMEI~1\LMIR0001.tmp\LMIRhook.000.dll -> UNLOADED

[sUSP PATH] unattended.exe -- C:\Users\gkorba\AppData\Local\LogMeIn Rescue Unattended\LMIR0001.tmp\unattended.exe -> KILLED [TermProc]

[DLL] explorer.exe -- C:\Windows\explorer.exe : C:\Users\gkorba\AppData\Local\LOGMEI~1\LMIR0001.tmp\LMIRhook.000.dll -> UNLOADED

[DLL] explorer.exe -- C:\Windows\explorer.exe : C:\Users\gkorba\AppData\Local\LOGMEI~1\LMIR0001.tmp\LMIRhook.000.dll -> UNLOADED

¤¤¤ Registry Entries : 3 ¤¤¤

[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: SAMSUNG SSD PM800 TM 128 +++++

--- User ---

[MBR] f581396ca32fa274db6c6e51095e85b1

[bSP] bd88243ba1753a8780c06e4eb19307c6 : Windows Vista MBR Code

Partition table:

0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 39 Mo

1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 81920 | Size: 9618 Mo

2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 19779584 | Size: 112445 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[3]_D_01032013_02d0203.txt >>

RKreport[1]_S_01022013_02d1911.txt ; RKreport[2]_S_01032013_02d0200.txt ; RKreport[3]_D_01032013_02d0203.txt


John Wilson

Share this post

Link to post
Share on other sites


I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?


Share this post

Link to post
Share on other sites



I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools





Share this post

Link to post
Share on other sites



48 Hour bump

It has been more than 48 hours since my last post.

  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!


Share this post

Link to post
Share on other sites

Thanks for your help Gringo, and sorry for the delay. Please close this thread. Combofix frequently breaks the LMI Rescue connection I was using to do this remotely, so I elected to stop with this and remove the infection with other means.

Share this post

Link to post
Share on other sites

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Share this post

Link to post
Share on other sites
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.