• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

Remove Worm.Win32.Netsky Fake Spyware Alert (winhelper86.dll, winupdate86.exe, winlogon86.exe trojans)

Myantispyware team December 2, 2009    

If you are seeing a Spyware Alert box that stats that Worm.Win32.Netsky detected on your machine, then you have become infected with a trojan that uses this Spyware Alert to trick you into purchasing Advanced Virus Remover, Antivirus 2009 or another rogue antispyware program. Once running, the trojan will display a fake Security alert as shown below:

Security alert
Security Warning!
Worm.Win32.Netsky detected on your machine.
This virus is distributed via the Internet through email and Active-x
objects.
The worm has its own smtp engine which means it gathers
emails from your local computer and re-distributes itself.
In worst cases this worm can allow attachers to access your
computer, stealing passwords and personal data.
Viruses can damage your confidential data and work on your
computer.
Continue working in unprotected mode is very dangerous.

Recommendation: It is necessary to perform a system scan.

Worm_Win32_Netsky_detected
Worm.Win32.Netsky detected on your machine – Fake Spyware Alert

What is more, the troajn will also display a lot of popups, disable Windows Task Manager and change a desktop background to blue with a black window saying that you have a serious infection and need to run a spyware removal tool. However, all of these warnings are fake and supposed to scare you into thinking your computer is in danger. Use the removal guide below to remove this infections and Worm.Win32.Netsky Fake Spyware Alert from your computer for free.

Symptoms in a HijackThis Log

F2 – REG:system.ini: Shell=Explorer.exe logon.exe
F2 – REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon86.exe
O4 – HKLM\..\Run: [winupdate86.exe] C:\WINDOWS\system32\winupdate86.exe
O10 – Unknown file in Winsock LSP: c:\windows\system32\winhelper86.dll
O10 – Unknown file in Winsock LSP: c:\windows\system32\winhelper86.dll

Use the following instructions to remove Worm.Win32.Netsky Fake Spyware Alert

Step 1.

Download HijackThis from here and save it to your Desktop.
If you cannot run HijackThis, then re-download it, but before saving HijackThis.exe, rename it first to explorer.exe and click Save button to save it to desktop.

Run HijackThis. Click “Do a system scan only” button. Now select the following entries by placing a tick in the left hand check box, if present:

F2 – REG:system.ini: Shell=Explorer.exe logon.exe
F2 – REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon86.exe
O4 – HKLM\..\Run: [winupdate86.exe] C:\WINDOWS\system32\winupdate86.exe

Place a checkmark against each of them. Once you have selected all entries, close all running programs then click once on the “fix checked” button. Close HijackThis.

Step 2.

Download LSPFix from here and unzip it to your Desktop.

Run LSPFix. Place a tick in the “I know what i`m doing”.

In the KEEP box select winhelper86.dll and press “>>” button.

Press Finish>> button. When LSPFix is done removing the LSP you will see a summary box. Press OK.

Step 3.

Download MalwareBytes Anti-malware (MBAM). Close all programs and Windows on your computer.

Double Click mbam-setup.exe to install the application. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.

If an update is found, it will download and install the latest version.

Once the program has loaded you will see window similar to the one below.

malwarebytes-antimalware1
Malwarebytes Anti-Malware Window

Select Perform Quick Scan, then click Scan, it will start scanning your computer. This procedure can take some time, so please be patient.

When the scan is complete, click OK, then Show Results to view the results. You will see a list of infected items similar as shown below. Note: list of infected items may be different than what is shown in the image below.

mbam
Malwarebytes Anti-malware, list of infected items

Make sure that everything is checked, and click Remove Selected for start removal process. When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.

Note: if you need help with the instructions, then post your questions in our Spyware Removal forum.

The infection creates the following files and folders

c:\windows\system32\AVR10.exe
c:\windows\system32\critical_warning.html
c:\windows\system32\winhelper86.dll
c:\windows\system32\winupdate86.exe
c:\windows\system32\winlogon86.exe

The infection creates the following registry keys and values

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdate86.exe

Trojan Tutorials - HowTo

 Previous Post

How to remove sshnas.dll or sshnas21.dll trojan (Remove trojan FakeAlert)

Next Post 

How to remove AntiKeep (Uninstall instructions)

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

212 Comments

  1. Harry
    ― January 6, 2010 - 3:35 am  Reply

    I’m in the process of doing the final scan, but had the same findings as martin so I’m expecting this to work. Assuming it does, thanks heaps!

  2. Patrik
    ― January 6, 2010 - 3:48 am  Reply

    alyssa, looks like a trojan has removed a core part of Malwarebytes Anti-malware. Reinstall malwarebytes and run it once again.

  3. G P
    ― January 6, 2010 - 4:00 am  Reply

    thank you so much!
    i spent hours doing this before, then your help it did it in seconds!
    thank you

  4. Patrik
    ― January 6, 2010 - 4:07 am  Reply

    Jimmy, looks like you have removed winlogon86.exe.
    Boot your PC in the Recovery console (use Windows installation disk).
    Once loaded, go to system32 folder and copy userinit.exe to winlogon86.exe
    Real also the instruction: How to use Recovery console.

  5. Jimmy K
    ― January 6, 2010 - 1:43 pm  Reply

    Patrik,

    Thanks so so so so much!!!!!
    Really sincerely appreciated.

    I got logged back on (thanks to your help) and ran HTJ, LDPFix, and Malwarebytes and it took care of everything. Again, so many thanks!

    FYI: My laptop was the infected drive and since it didn’t come with WIN install disks I had to purchase a SATA to USB connector ($15) and connect the drive to my desktop. This was a very useful way to preliminarily virus scan, eliminate the DL problems, edit the registry, and get the drive bootable to run all the software mentioned above.

    MANY THANKS!!!!!!!!!!!!!!!!!!!!!!!!

  6. Jimmy K
    ― January 6, 2010 - 2:29 pm  Reply

    ONE LAST THING

    When i try to launch System Restore, i get a message saying: “System Restore has been turned off by group policy. To turn on System Restore, contact your domain Administrator.”
    My guess is that the malware did this. Any help regarding reactivating System Restore.

    MANY THANKS

  7. Steven
    ― January 6, 2010 - 3:38 pm  Reply

    Hi Patrik

    My Dad’s PC had had this issue, ive followed your steps and was looking good until i was unable to log onto any user(as described above) i tried to user the Recovery Console to the best of my ability, but after a reboot it still wasnt working, are you able to write on here what i should follow, from what i understood i used “Copy c:\windows\system32\userinit.exe winlogon86.exe” this obviously isnt correct as i still have the issue, are you able to advise?

    Thanks for all your help so far

  8. Mike
    ― January 6, 2010 - 8:41 pm  Reply

    I cannot thank you enough! I spent all day on this. Thank You!

  9. david
    ― January 6, 2010 - 9:40 pm  Reply

    Patrick, i am kinda having the same issue as jimmy. i can log in but i cannot get to the RegEdit because i see the virus pop up but when i exit out it just gives my a black screen. i would like to keep some of my pictures that i have saved on my computer. is there anything i can do to recover my computer and still keep my pics?

  10. Patrik
    ― January 6, 2010 - 10:33 pm  Reply

    Jimmy, try following:
    Click Start->Run, type regedit.exe and press Enter.
    Navigate to the following key by expanding the + at left of each key at left::
    HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore

    In the right-panel:
    Right click to DisableConfig and select Delete. Click OK to confirm it.
    Right click to the value DisableSR and select Delete. Click OK to confirm it.
    Close regedit and reboot your computer.

    Try make a new Restore point.

  11. Patrik
    ― January 6, 2010 - 10:43 pm  Reply

    Steven, read comments here.

  12. Patrik
    ― January 6, 2010 - 10:45 pm  Reply

    David, also try repair Windows registry default values using Recovery console. Use the link from my previous comment.

  13. Steven
    ― January 7, 2010 - 11:54 am  Reply

    Thanks for that Patrik, i copied what U8MYR!CE posted but the same thing still happens, I tried to complete the steps again but just incase i had completed them inncorrectly, but it asked me to over right the file, so i can assume i did it correctly the first time. Can you think of anything else that might cause me not to be able to log on?

    Thanks again

  14. Dean
    ― January 7, 2010 - 2:28 pm  Reply

    My Home PC has been hit with this, and when I start with the Hijack this, I don’t see any of the listed three files…the closest one I have is:

    F2 – REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon32.exe

    What should I do?

  15. Dean
    ― January 7, 2010 - 2:37 pm  Reply

    I suck…I just found the correct message board for that version of the bug, but I still don’t have all the listed files in the Hijack this. Should I just tag the ones I have and keep going?

    Yes, I’m clearly a noob.

  16. AEH
    ― January 7, 2010 - 2:57 pm  Reply

    My Dell didn’t come with any Windows CDs and I am stuck in the logon loop. Do you have any suggestions?

  17. Jason
    ― January 7, 2010 - 2:58 pm  Reply

    if you are having problems this is one of the best articles I have seen for repairing stuff like this, EXCELLENT!

  18. Heather
    ― January 7, 2010 - 8:59 pm  Reply

    Hi Patrick, I ran Hijack This but the only file I found that was similar to the 3 you mentioned was F2-REG:system.ini: UserInit=C:\WINDOWS\system32\winlogon32.exe. Should I still tick the box even though it doesn’t end in 86? If I follow the rest of the steps will it still get rid of the problem?
    Thanks for the help.

  19. Heather
    ― January 7, 2010 - 9:09 pm  Reply

    Never mind Patrick, I just found what I needed after searching your site a bit more… wish me luck!

  20. Patrik
    ― January 7, 2010 - 9:47 pm  Reply

    Steven, try copy userinit.exe to logon.exe and winlogon32.exe.

  21. Patrik
    ― January 7, 2010 - 9:47 pm  Reply

    Dean, fix the line using HijackThis.

  22. Patrik
    ― January 7, 2010 - 9:51 pm  Reply

    AEH, attach your hardisk to another computer. Then copy userinit.exe from your Windows/System32 folder to winlogon86.exe.
    Attach the disk to your computer and boot it.

  23. felix
    ― January 8, 2010 - 7:24 am  Reply

    I have copied the solution to a dvd disc but does open up, is there another way of opening it. This is just crazy. I am going to have long hard look at my security software

  24. Patrik
    ― January 8, 2010 - 7:51 am  Reply

    felix, try a flash disk (usb drive).

  25. felix
    ― January 8, 2010 - 1:54 pm  Reply

    i tried that and it would not open them

  26. Sarah
    ― January 8, 2010 - 3:59 pm  Reply

    I’ve gotten to Winstock 2 Repair Utility, but the files I have are only:

    mswsock.dll, winrnr.dll, mdnsNSP.dll, helper32.dll, and rsvpsp.dll

    Which of those is the one I need to remove?

  27. JJ McKenzie
    ― January 8, 2010 - 6:48 pm  Reply

    I got my programs transferred over on a thumb drive finally, TY. I no longer get the error that I cannot run my registry editor, it’s infected, I now get the original symptom to it being disabled by administrator. I feel 1000% better about this situation, but could something still be lingering based on this?

    Thank you.

  28. JJ McKenzie
    ― January 8, 2010 - 7:04 pm  Reply

    Felix,

    I got a $6.00 Kingston 2GB DataTraveler and it worked like a charm.

  29. JJ McKenzie
    ― January 8, 2010 - 8:07 pm  Reply

    Update: regedit fixed, netstat -a at command prompt is probably as scary as it gets. 🙁

  30. Patrik
    ― January 8, 2010 - 10:41 pm  Reply

    Sarah, remove helper32.dll

« Previous 1 2 3 4 5 … 8 Next »

Leave a Reply to THANK YOU Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

Tech Support Scam
Remove Tech Support Scam pop-up virus [Microsoft & Apple Scam]
This setting is enforced by your administrator (Removal guide)
DNSChanger
How to remove DNSChanger malware virus [Updated Apr. 2018]
How to reset Mozilla Firefox (Updated Apr. 2018)
remove android virus
How to remove virus from Android phone

Recent Guides

How to remove sshnas.dll or sshnas21.dll trojan (Remove trojan FakeAlert)
How to remove Personal Security (Uninstall instructions)
How to remove AntiAdd (Uninstall instructions)
How to remove RESpyWare (Uninstall instructions)
How to remove Antivir (Uninstall instructions)

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.