Deep In smitfraud-c.generic HELP!

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by deepinvirus, Jul 21, 2012.

  1. deepinvirus

    deepinvirus Private E-2

    OK, I know this virus has been beaten to death here. I know because I have followed all the steps, not only here, but everywhere else also. I have been trying diligently for over two months to get rid of this beast and it just won't leave!!! I guess I'm to the point of asking someone to hold my hand through the process, because apparently, I can't do it! ERRRRR!!!!!

    Every time I shut down (or it BSODs), it takes me around two hours to get a somewhat stable PC again. Every time I open a pdf = BSOD. Random programs cause BSOD. Random events cause BSOD.

    So, if someone out there would be gracious enough to help me out, I'm desperate now. I have a fairly new and decent PC that is half useless and I can't fix it.

    What do I need to do, from the ground up, square one?

    What's the first step I need to take?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    I'm sorry but no you have not. If you did, you would have attached the logs we asked for. So please follow the instructions in the below and attach the logs we ask for:


    READ & RUN ME FIRST. Malware Removal Guide
     
  3. deepinvirus

    deepinvirus Private E-2

    Honestly was that necessary? And yes I have, however; I was interested in what initial steps would be offered to take, because following what I have found here previously did not work and I was unsure of how to get started. Now I am. This will take some time to complete due to the major hassle I go through just to restart, and I work today, so I won't be able to do a thing until later in the day.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes! Because we need the logs as stated in the instructions. Without the logs we cannot help you. Completing the instructions includes attaching the logs if you still have problems. You did not even give tell us what version of Windows you are running. The logs would have at least told us this plus so much more.

    If you already followed the cleaning procedure, you should only need to attach the logs.
     
  5. deepinvirus

    deepinvirus Private E-2

    I digress. I have followed the guides and I hope I did everything correctly. I still have the virus as it still shows up in spybot. I also still get BOD when I open pdf files and my quad processors are still running sporadically. I can also tell I have it during startup. It causes a grey bar to appear over my desk top tool bar for a few seconds at start up. I do not have hijacked browsers.

    This is my PC:

    http://h10025.www1.hp.com/ewfrf/wc/document?docname=c01905330&cc=us&dlc=en&lc=en&product=4006029

    Its 64 bit win 7 home.

    Let me know if there is any other information you need. I just want this monster gone!!!

    Thank You!
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you knowingly install Wajam ?

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista or Win 7, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: (no name) - {f999a48b-1950-4d81-9971-79018f807b4b} - (no file)
    O2 - BHO: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - (no file)
    O2 - BHO: HelloWorldBHO - {ABD3B5E1-B268-407B-A150-2641DAB8D898} - C:\Program Files (x86)\Common Files\Homepage Protection\HomepageProtection.dll
    O3 - Toolbar: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - (no file)
    O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)

    After clicking Fix, exit HJT.

    Uninstall the below software:
    Homepage Protection
    Java(TM) 6 Update 18

    Please download OTM by Old Timer and save it to your Desktop.
    • Right-click OTM.exe and select Run as administrator to run it.
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
    :Files
    C:\Windows\svchost.exe
    
    :Reg
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{0E41A470-5078-4933-AF0A-AFDA115D4623}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0E41A470-5078-4933-AF0A-AFDA115D4623}]
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  7. deepinvirus

    deepinvirus Private E-2

    No, I didn't even know what wajam was! My wife says she didn't either. I uninstalled it.

    Hijack this didn't pick up three items requested, so I have not continued until I hear back from you. I attached a screen cap:

    O2 - BHO: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - (no file)
    O3 - Toolbar: (no name) - {A057A204-BACC-4D26-9990-79A187E2698E} - (no file)
    O3 - Toolbar: (no name) - {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just ignore things not found and continue.
     
  9. deepinvirus

    deepinvirus Private E-2

    Smitfraud was still found by spybot. I can not upload C:\MGlogs.zip, the system says that I have already attached it to the thread. I tried to rename it and that did not workeither.
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Renaming will not help when you are stll trying to upload the same fiile contents. You did not follow the instructions to run the GetLogs.bat file. Please see the previous instructions.
     
  11. deepinvirus

    deepinvirus Private E-2

    Oh yes! I ran the wrong thing. Here ya go.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    OTM was not able to remove the infected svchost.exe file.


    Please do the below so that we can boot to System Recovery Options to run a scan.

    For 32-bit (x86) systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For 64-bit (x64) systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  13. deepinvirus

    deepinvirus Private E-2

    Well, that was a no go. Here is what happened:

    Failed to start Windows due to a recent hardware or software change.

    1) Insert installation disk [which I do not have]
    2) Choose language
    3) Choose repair.

    Status: Oxc0000225

    Info: Boot selection failed because required device is inaccessible.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Exactly when did this start happening? Before or after you ran FRST. The FRST scan I asked you to run, does not fix /change anything. It is just a scan to collect a log.
     
  15. deepinvirus

    deepinvirus Private E-2

    It occured during this section of the instructions:

    It asks for a recovery disc to continue and it will not let me proceed without it.
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay so you did not even get to run FRST. If you do not try to run this and just boot your PC normally, does it boot up.
     
  17. deepinvirus

    deepinvirus Private E-2

    Correct, I was not able to get that far and yes my PC will boot normally, but FRST does not auto run [if that's what you meant].
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No that was not what I meant. ;) I just wanted to clarification on what you stated. It sounded like your PC may not be booting anymore.


    Goto the below link and follow the instructions for running TDSSKiller from Kaspersky
    • Be sure to attach your log from TDSSKiller
    Now please also download MBRCheck to your desktop.


    See the download links under this icon [​IMG]
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  19. deepinvirus

    deepinvirus Private E-2

    OK, here they are.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay TDSSKiller fix a few things related to your infection. However there is a chance that your Master Boot Record on drive C is infected. Too bad you could not get FRST to boot to the Recovery Console as we could have used it to fix this.




    Please download aswMBR ( 511KB ) to your desktop.
    • Double click the aswMBR.exe icon to run it
    • Click the Scan button to start the scan
    • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.
    Also rerun the OTM fix from message # 6 and attach the new OTM log.
     
  21. deepinvirus

    deepinvirus Private E-2

    OK here they are.
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re-Run aswMBR
    • Click Scan
    • On completion of the scan, click the FIXMBR button
    • There is a slight pause after clicking the 'Fix' button.
    • Wait for the tool to report 'Infection fixed successfully', now reboot the machine.
    • Rebooting the machine prematurely, before seeing this line will result in an incomplete fix.
      Note:After the 'Infection fixed successfully' message appears, the machine may became unresponsive. You may have to do a hard boot of your machine. That may be a side effect from the fix. All will be well after the reboot.
    • Save the log as before and post in your next reply.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     
  23. deepinvirus

    deepinvirus Private E-2

    FIXMBR did not produce the 'Infection fixed successfully' message after around twenty minutes of waiting. You will see it in the log.
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You did not tell me how things are working.

    If you are still having malware problems, tell me what they are and also try to run the aswMBR fixmbr instructions in safe boot mode.
     
  25. deepinvirus

    deepinvirus Private E-2

    Chaslang,

    WE HAVE SUCCESS!!!! Good job!!!! No more nasties!!!!
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Great! Then we will ignore the unknown MBR.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. You can uninstall RogueKiller and HitManPro.
    2. Go back to step 6 oof the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    3. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    4. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  27. deepinvirus

    deepinvirus Private E-2

    OK, I completed steps 1 - 7, however; no link was provided for step 8. Or is this like one of those 'cliff hanger' movies? LOL!
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  29. deepinvirus

    deepinvirus Private E-2

    No problem at all, you have been a tremendous help and I can't thank you enough. That was quite an ordeal.
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds