smitfraud / svchost possible virus

Discussion in 'Malware Help (A Specialist Will Reply)' started by T0M, Apr 22, 2012.

  1. T0M

    T0M Private E-2

    Hi guys,

    A few days ago I started getting the google redirecting issue. After a few scans and research it looks like its centred around the svchost file in the 'Windows' folder.

    After running all the scans from the READ ME thread, I'm still having the pop-up from MalwareBytes saying that it is preventing a malware intrusion.

    I only have the 4 logs as I am on a 64-bit system (I didn't do RRlog)

    Thanks for your time,

    Tom.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please also download MBRCheck to your desktop
    • Double click MBRCheck.exe to run (vista and Win 7 right click and select Run as Administrator)
    • It will show a Black screen with some information that will contain either the below line if no problem is found:
      • Done! Press ENTER to exit...
    • Or you will see more information like below if a problem is found:
      • Found non-standard or infected MBR.
      • Enter 'Y' and hit ENTER for more options, or 'N' to exit:
    • Either way, just choose to exit the program at this point since we want to see only the scan results to begin with.
    • MBRCheck will create a log named similar to MBRCheck_07.16.10_00.32.33.txt which is random based on date and time.
    • Attach this log to your next message. (See: HOW TO: Attach Items To Your Post )
     
  3. T0M

    T0M Private E-2

    Here is the log you requested.

    Since doing all of the scans and protocol from the READ ME last night, the messages from MalwareBytes have increased in frequency. Every few seconds I am receiving messages saying that it has blocked access to a malicious website.

    Thanks again for your time,

    Tom.
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do you have your Windows 7 boot CD? You have an MBR infection.
     
  5. T0M

    T0M Private E-2

    Yes, I still have it. Should I just go straight ahead and return to the factory settings, or is there anything else I should do first?

    Also how can I stop this happening again in future? Should I run some supplementary Anti-Malware programs alongside my anti-virus?
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now that you have the DVD, you need to boot from it to access the Windows 7 System Recovery Environment. You can read details about this in the below link:

    http://www.bleepingcomputer.com/tutorials/tutorial161.html

    Once you have gotten to the command prompt, you need to run the below command


    Then you will reboot normally back to Windows re run MBRCheck and attach a new log from MBRcheck
     
  7. T0M

    T0M Private E-2

    I'm running into trouble with this. Basically I can get to the command prompt page and then when I type blotted.exe /fixmbr it immediately says "this has been done successfully". Should the response be that quick or should this process take some time? Anyway, I then "X" the command prompt screen and click restart. Then windows restarts saying there is a problem and directs me to system repair. I'm just going round in circles. Am I doing something wrong?
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It's bootrec.exe not blotted.exe.


    Yes it should be a quick response.

    Do you mean startup repair? Have you tried doing that yet?
     
  9. T0M

    T0M Private E-2

    Yeah, sorry about that. I wrote that last reply on my phone, and it just used spell check to correct "bootrec". Yeah, I was in start repair, and when that failed each time it just took me back to the same beginning screen again.

    Eventually someone else restored it back to the factory settings for me.

    I've attached the log.

    Thanks for your time and help. Much appreciated.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now go to this MGTools and download MGtools.exe.

    Run the C:\MGTools.exe and attach the C:\MGlogs.zip.
     
  11. T0M

    T0M Private E-2

    Ok, that one is also attached.

    Thanks for your time and help, kestrel. I'll know where to come in future :)
     

    Attached Files:

  12. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    How are things running for you now?
     
  13. T0M

    T0M Private E-2

    Yep, everything is fine right now. Obviously I'm just concerned about it happening again in future. Right now I have my AV and MalwareBytes running, so I'm just hoping this is enough.

    Thanks, again.
     
  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good, glad to hear it.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds