Need assistance removing Smitfraud-C.generic from 64 bit Windows 7.

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Xarpolis, May 14, 2012.

  1. Xarpolis

    Xarpolis Private E-2

    Hello there. I ran Spybot today and it located a trojan, Smitfraud-C.generic. I've tried numerous times to remove it (including using the programs listed on your "how to remove malware" thread) and nothing has worked as of this time.

    I've followed all of the instructions, which has lead me to posting this thread.

    Could you please point me in the right direction? I appreciate your help.

    Attached are all 4 logs that were requested.

    Thank you very much.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!


    Please do the below so that we can boot to System Recovery Options to run a scan.

    For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.
    For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

    Plug the flashdrive into the infected PC.

    Enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.

    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this file to your next reply. (See: How to attach)
     
  3. Xarpolis

    Xarpolis Private E-2

    Thank you for the tremendously quick response. I'm replying now from my wife's computer. Here is the log that you've requested. (I ran the 64 bit version of the program you linked).

    I still have my own computer turned on with the frst64.exe program loaded. Please let me know what steps I should take now.

    Thank you.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.


    Download this >>

    Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.
    Now reboot back into the System Recovery Options as you did previously.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (See how to attach)

    Now boot into normal Windows can continue with the below.



    Goto the below link and follow the instructions for running TDSSKiller from Kaspersky
    • Be sure to attach your log from TDSSKiller
    Now please also download MBRCheck to your desktop.

    See the download links under this icon [​IMG]
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )



    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • the logs from TDSSKiller and MBRcheck
    • C:\MGlogs.zip
    Make sure you tell me how things are working now!
     

    Attached Files:

  5. Xarpolis

    Xarpolis Private E-2

    I have to do 2 posts for this, as one of the scans you asked for gave me 2 log files.

    I'll have the updated MGlogs.zip file shortly.
     

    Attached Files:

  6. Xarpolis

    Xarpolis Private E-2

    And here is the zipped log.

    As far as how things are working, Malwarebytes flagged me with a notification for a Trojen as I was sending the previous message. I wasn't sure which route to take, so I chose ignore. That way it wouldn't possibly get locked into a quarantine folder the way some of the other pages mentioned before.

    So that's where we're at right now.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Attach the most recent log from Malwarebytes. Don't fix anything, just attach the log so I can see what it is finding. It is probably the below:

    C:\Windows\svchost.exe

    We tried to remove this with FRST but it failed to really get it removed. This means something else is hiding.

    Since TDSSKiller found a bunch to fix. I would like you to reboot your PC and run another scan with TDSSKiller and attach a new log so we can be sure all the TDL infection components were really removed.
     
  8. Xarpolis

    Xarpolis Private E-2

    I'm not sure what happened between last night and today, but apparently the Trojan is now gone.

    After sending my previous message about clicking Ignore on the Malwarebytes scan, It continued to pop up for me, so I hit quarantine. I still continued to see Malwarebytes has blocked access to site xxx.xxx.xxx.xxx while using my computer the remainder of the night.

    As of this morning, I ran the updated TDSSKiller scan (A new version came out and was available for download), and it didn't find anything outside of my flipcam software. So it looks like all is complete.

    Thank you very much for your help. Have a great day.
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please attach this log so I can see if my assumption was correct. Also do the below so we can be sure your malware is gone and not just lying temporarily dormant


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).


    Then attach the below log:
    • C:\MGlogs.zip
     
  10. Xarpolis

    Xarpolis Private E-2

    I'm sorry for the delay in getting back to you. I've been out of town for the past few days. Please don't think that I've forgotten about your last request(s).

    I'll get working on them shortly, after I finish doing the laundry and what not. Thanks again for your help.
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just attach the logs as soon as you can. But note, I will be away after Wed May 23rd for 10 days.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds