Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account
Photo

viruswebprotect has taken over my Task bar and Explorer [RESOLVED]


  • This topic is locked This topic is locked

#1
Learnatic

Learnatic

    Member

  • Member
  • PipPipPip
  • 131 posts
A virus over tok my machine last night. 90 mins after my NOD32 updated.
This morning I updated ESET NOD32 again so I have limited internet access.
NOD32 scan cleaned two files but didn't do anything.
6/09/2008 7:09:13 AM C:\ 225108 2 2 Completed

I cannot access Explorer to open 'hijack this' and I've downloaded and run Smitfraud (three times) in Safe mode and saved logs but cannot access them yet.

I updated Spybot and ran and it was !!completely clean !!

When I open Explorer, my screen goes blue and I lose task bar.

(If I don't open Explorer)
After a minute, I task bar becomes inert and the cursor becomes an eggtimer on there. I've left it there for 30 mins and it doesn't change.

Three 'shortcuts' have installed 'emselves onto my desktop.
The properties of these are :


Anyone else have these probs? and is there a way clear?

I've been on this for nigh 24 hours straight now and getting irritable.
I've used Ashampoo and saved lots of my documents and music.

Cheers,
Max.

Snap008.jpg
Snap009.jpg
  • 0

Advertisements


#2
Egwene

Egwene

    Member 2k

  • Visiting Consultant
  • 2,141 posts
Hello Learnatic !

Welcome to the site! :) My name's Egwene and I'll be helping clean up your computer. :) I'm currently looking over your log. I am still in training here, so there might be a delay between my replies as they need to be checked by an expert before I can post them. I'll need a bit of time to research your log fully, so please bear with me.

Before we proceed to clean your computer from malware, let's go over some points that will help both me and you, and prevent causing damage to your computer:
  • To make sure that you receive an email when I reply to this topic, please click here and check that this topic is listed under Malware Removal - HijackThis™ Logs Go Here.
  • Please don't be afraid to ask questions! No question is considered dumb here. It's better to be safe than sorry!
  • When posting logs, please ensure Wordwrap is turned off in Notepad (to check, open Notepad click on Format | Uncheck Word Wrap)
  • Please follow the steps exactly in the same order posted. If you can't perform a certain step, or you're unsure on what to do, please stop and let me know.
  • NEVER fix anything in HijackThis or other programs on your own! This can be very dangerous and cause harm to your system. If you see a certain entry or program you're unsure about, please don't hesitate to ask!
  • Make sure you reply to this thread using the Add Reply button: Posted Image

Please read this post completely, it may make it easier for you if you copy and paste this post to a new text document or print it for reference later.
  • 0

#3
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Thanks Egwene, but the pics of the logs are just pics .. I cannot access the files to open them..
I'll be trying to do so tomorrow.. it's getting late here in Australie and first thing tomorrow I'll see about a way to get the logs.
Cheers,
Max.


I just found a way to get scan logs ..
Here's the first Smitfraud one .. will add the later ones tomorrow.
I am tired et tending to make mistakes.
Mx.

Attached File  SMit_Fix_06_09_2008.txt   5.64KB   127 downloads

Edited by Learnatic, 06 September 2008 - 07:02 AM.

  • 0

#4
Egwene

Egwene

    Member 2k

  • Visiting Consultant
  • 2,141 posts
Hey Learnatic,

Please do not bold your posts or attach logs.

Please do not post links to malwares.


Thanks :)

---

First, you should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

Next, please reboot your computer in Safe Mode by doing the following :
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
  • Instead of Windows loading as normal, a menu with options should appear;
  • Select the first option, to run Windows in Safe Mode, then press "Enter".
  • Choose your usual account.
Once in Safe Mode, double-click on SmitfraudFix.exe
Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

You will be prompted : "Registry cleaning - Do you want to clean the registry ?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.
A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply.
The report can also be found at the root of the system drive, usually at C:\rapport.txt

Warning : running option #2 on a non infected computer will remove your Desktop background.

---

Then, please visited this link and follow these intructions : You Must Read This Before Posting A Hijackthis Log.

Then please post the MBAM repport and the HijackThis repport.

Regards,
Egwene.
  • 0

#5
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Okiedokie re the bold type .. it's just me and a lot of me mates eyes aren't as good as when we were younger.

I preceded the links to the malware with an "httx" rather than "http" to prevent auto opening.
This was the 'properties' of the the icons that appeared on my desktop .. - they have now gone after one of the Smitfraud runs.

I cannot copy the above instructions to notepad as I cannot open my Explorer or "My Documents" and the taskbar has been immobilised.

I will try again starting in Safe mode and run the Smitfraud programme.

Cheers,
Max.
  • 0

#6
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Okiedokie Chums,
Difficult typing .. have to fit everything in 16 second gaps. The Screen, Taskbar and Icons refresh every 16 secs.
After a while they will all disappear.
I then depress "Ctrl/Alt/Del to open Task Manager and then open "explorer.exe"

Smitfraud cleaned out most of the bad stuff ( I have no "Install VIRUS ALERT" warnings). It did not ask to check if wininet.dll is infected.

I couldn't download Mbam. due perhaps to screen closing down and reopening every 16 secs(?)

I can't use the "Manage Current attachments" - the 'Browse' wont work.
I can copy and paste the Smitfraud log if you wish.

I've updated Windows.
I seldom use IE preferring Mozilla. After two and a half days straight, I'm starting to think of giving it kick boxing lessons.

Here're my log files. Hope they help you and me,
Cheers,


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:24:16, on 7/09/2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16608)
Boot mode: Safe mode

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Documents and Settings\Max Well\Desktop\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = proxy.nca.connect.com.au:8080
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
O4 - HKLM\..\Run: [igfxtray] C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [igfxhkcmd] C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [igfxpers] C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [egui] "C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
O4 - HKLM\..\Run: [SoundMAX] "C:\Program Files\Analog Devices\SoundMAX\Smax4.exe" /tray
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Mmm] "C:\Program Files\HACE\Mmm\MmmTray.exe"
O4 - HKCU\..\Run: [DU Meter] C:\Program Files\DU Meter\DUMeter.exe
O4 - HKCU\..\Run: [SRS Audio Sandbox] "C:\Program Files\SRS Labs\Audio Sandbox\SRSSSC.exe" /hideme
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.mi...b?1193015734890
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.mi...b?1193015572453
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.m...ash/swflash.cab
O16 - DPF: {FFB3A759-98B1-446F-BDA9-909C6EB18CC7} (PCPitstop Exam) - http://utilities.pcp.../pcpitstop2.dll
O23 - Service: DU Meter Service (DUMeterSvc) - Hagel Technologies Ltd - C:\Program Files\DU Meter\DUMeterSvc.exe
O23 - Service: Eset HTTP Server (EhttpSrv) - ESET - C:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
O23 - Service: Eset Service (ekrn) - ESET - C:\Program Files\ESET\ESET Smart Security\ekrn.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe

--
End of file - 4478 bytes
  • 0

#7
Egwene

Egwene

    Member 2k

  • Visiting Consultant
  • 2,141 posts

I can copy and paste the Smitfraud log if you wish.


Yes, please do :)
  • 0

#8
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Here it is thanks ..

SmitFraudFix v2.346

Scan done at 13:16:42.01, Sun 07/09/2008
Run from C:\Documents and Settings\Max Well\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts

127.0.0.1 localhost
127.0.0.1 www.007guard.com ....
12.it
127.0.0.1 ebayt.it...
127.0.0.1 w.. etc

Edited by Learnatic, 07 September 2008 - 09:03 AM.

  • 0

#9
Egwene

Egwene

    Member 2k

  • Visiting Consultant
  • 2,141 posts
Do not post the Host part of the repport, but please post the others :)

Look at your SmitFradFix repport, it is incomplete.

:)

Edited by Egwene, 07 September 2008 - 06:27 AM.

  • 0

#10
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Okay Egwene,
I'm having trouble typing and posting logs . the computer is closing now every 14 seconds and it apears it's closed halfway through the Fraud Log.. Please delete that post and I'll try again and review my post.
SmitFraudFix v2.346

Scan done at 21:30:47.37, Sun 07/09/2008
Run from C:\Documents and Settings\Max Well\Desktop\SmitfraudFix
OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
The filesystem type is NTFS
Fix run in safe mode

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler Before SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll

»»»»»»»»»»»»»»»»»»»»»»»» Killing process


»»»»»»»»»»»»»»»»»»»»»»»» hosts


127.0

Edited by Learnatic, 07 September 2008 - 07:10 AM.

  • 0

Advertisements


#11
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Egwene,
It appears the computer is turning off every 14 seconds truncating the log so I will send the second half of the SmitFraud log
127.0.0.1 www.ebay7.it
.com
127.0.0.1 madsexxx.com
127.0.0.1 mafiapics.com

Edited by Learnatic, 07 September 2008 - 07:12 AM.

  • 0

#12
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Hi Egwene, I appear to be sending the Smitfraud Logs but they are not appearing on the forum...
As say, the machine resets every 14 seconds.
  • 0

#13
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
Here is the end of the Smitfraud log:

127.0.0.1 meine-grusskarten.de

»»»»»»»»»»»»»»»»»»»»»»»» VACFix

VACFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Winsock2 Fix

S!Ri's WS2Fix: LSP not Found.


»»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

GenericRenosFix by S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


»»»»»»»»»»»»»»»»»»»»»»»» IEDFix

IEDFix
Credits: Malware Analysis & Diagnostic
Code: S!Ri



»»»»»»»»»»»»»»»»»»»»»»»» 404Fix

404Fix
Credits: Malware Analysis & Diagnostic
Code: S!Ri


»»»»»»»»»»»»»»»»»»»»»»»» AntiXPVSTFix

»»»»»»»»»»»»»»»»»»»»»»»» RK


»»»»»»»»»»»»»»»»»»»»»»»» DNS

HKLM\SYSTEM\CCS\Services\Tcpip\..\{BB49F3C0-44C8-48AE-9F2A-DA54DA6ABE4E}: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\..\{BB49F3C0-44C8-48AE-9F2A-DA54DA6ABE4E}: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\..\{BB49F3C0-44C8-48AE-9F2A-DA54DA6ABE4E}: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=10.1.1.1
HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=10.1.1.1


»»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


»»»»»»»»»»»»»»»»»»»»»»»» Winlogon.System
!!!Attention, following keys are not inevitably infected!!!

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"System"=""


»»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

Registry Cleaning done.

»»»»»»»»»»»»»»»»»»»»»»»» SharedTaskScheduler After SmitFraudFix
!!!Attention, following keys are not inevitably infected!!!

SrchSTS.exe by S!Ri
Search SharedTaskScheduler's .dll


»»»»»»»»»»»»»»»»»»»»»»»» End
  • 0

#14
Egwene

Egwene

    Member 2k

  • Visiting Consultant
  • 2,141 posts
Hey Learnatic,

Please do this scan in normal mode.


  • Download random's system information tool (RSIT) by random/random from here and save it to your desktop.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Once it has finished, two logs will open. Please post the contents of both log.txt (<<will be maximized) and info.txt (<<will be minimized)


N.B : Please check if you have posted me all the content of the log. If not, please post me what is missing in a other reply :)


Regards,
Egwene.
  • 0

#15
Learnatic

Learnatic

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 131 posts
G'day Egwene,
Good news here in Australie, after midnight last night, upon rebooting in Normal mode after being in Safe to do a Spybot scan, which found nothing, the 14second shutdown/restarts have stopped and the machine appears to be functioning properly.
I can open Explorer and locate files etc.

My only concern was thee following text inthe RSIT log-info ...
.........
YoutubeGet 4-->"C:\PROGRAMS\YoutubeGet\unins000.exe"

Hosts File

127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com

Security center information

AV: ESET Smart Security 3.0 ...
.......

Here're my RSIT logs and HJT (normal mode) I've done this morning:

Cheers,
Max.

Attached File  RSIT_08th_Septlog.txt   21.98KB   146 downloads
Attached File  RSIT_08th_Septinfo.txt   18.61KB   177 downloads
Attached File  hijackthis.log_08092008_01.txt   5.54KB   121 downloads
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP