Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

How To Remove Virusprotect Or Virus Protect (removal Instructions)


  • Please log in to reply
41 replies to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 01 July 2007 - 02:01 PM


How to remove VirusProtect or Virus Protect (Removal Instructions)

What this programs does: VirusProtect, which was originally called VirusProtectPro, is a rogue anti-spyware program installed via Zlob infections. VirusProtect is installed via a type of Trojan infection called Zlob Trojans which masquerade as video or audio codecs required to view a movie or listen to a audio file. In reality, though, these Trojans instead install VirusProtect as well as other malware on to your computer without permission. When the Zlob Trojan is launched on your computer, it will automatically download and install Virus Protect. When VirusProtect has finished downloading and is installed, it will automatically launch and start a scan of your computer. This scan will provide exaggerated or false results and state that the only way to clean these "infections" is to purchase the commercial version of the software. They do this purely as a way to scare you into purchasing the full commercial version of their software. Needless to say, you should not purchase VirusProtect. A screenshot of VirusProtect and VirusProtectPro can be found below.
VirusProtect Screenshot
VirusProtect Screenshot
VirusProtectPro Screenshot
VirusProtectPro Screenshot
Another byproduct of the Zlob Trojans are that you will see fake security alerts in your Windows taskbar saying there is a problem with your computer or that you are infected. Once again these alerts are false and are only being used as a scare tactic. When you click on the alert, it will automatically launch VirusProtect and do a scan. The current text of the fake security alert is:

System has detected a number of active spyware applications that may impact the performance of your computer. Click the icon to get rid of unwanted spyware by downloading an up-to-date anti-spyware solution. An example of the fake alert is shown below:
Virus Protect Fake Security Alert
VirusProtect Fake Security Alert

This guide will remove the Zlob Trojan which displays the fake security alerts, the VirusProtect and VirusProtectPro programs, and other malware that are typically installed with these programs.
Tools Needed for this fix: Symptoms in a HijackThis Log (VirusProtectPro variants are no longer active):

O4 - HKLM\..\Run: [VirusProtectPro 3.3] "C:\Program Files\VirusProtectPro 3.3\VirusProtectPro 3.3.exe" /h
O4 - HKLM\..\Run: [VirusProtectPro 3.4] "C:\Program Files\VirusProtectPro 3.4\VirusProtectPro 3.4.exe" /h
O4 - HKLM\..\Run: [VirusProtectPro 3.5] "C:\Program Files\VirusProtectPro 3.5\VirusProtectPro 3.5.exe" /h
O4 - HKLM\..\Run: [VirusProtectPro 3.6] "C:\Program Files\VirusProtectPro 3.6\VirusProtectPro 3.6.exe" /h
O4 - HKLM\..\Run: [VirusProtectPro 3.7] "C:\Program Files\VirusProtectPro 3.7\VirusProtectPro 3.7.exe" /h
O4 - HKLM\..\Run: [VirusProtect 3.8] "C:\Program Files\VirusProtect 3.8\VirusProtect 3.8.exe" /h
O4 - HKLM\..\Run: [VirusProtect 3.9] "C:\Program Files\VirusProtect 3.9\VirusProtect 3.9.exe" /h
O21 - SSODL: E404Helper - {1098beac-9d51-4244-ac20-9a405175dd6e} - e404d.dll (file missing)


Add/Remove Programs control panel entry (VirusProtectPro variants are no longer active):

VirusProtectPro 3.3
VirusProtectPro 3.4
VirusProtectPro 3.5
VirusProtectPro 3.6
VirusProtectPro 3.7
VirusProtect 3.8
VirusProtect 3.9

Guide Updates: 07/01/07 - Initial guide creation.
07/03/07 - Updated to include automated removal via SmitFraud fix
07/12/07 - Updated for version 3.4
07/24/07 - Updated for version 3.5
08/05/07 - Updated for version 3.6
08/18/07 - Updated for version 3.7
11/13/07 - Updated for version 3.8
12/14/07 - Updated for version 3.9



Choose the removal method you would like to use:
Automated Removal Instructions for VirusProtect:
  1. Print out these instructions as we will need to close every window that is open later in the fix.

  2. Download SmitfraudFix.exe from here and save it to your desktop:

    SmitFraudFix.exe

    Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:



  3. Next, please reboot your computer into Safe Mode by doing the following:

    1. Restart your computer

    2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.

    3. Instead of Windows loading as normal, a menu should appear

    4. Select the first option, to run Windows in Safe Mode.

    5. When you are at the logon prompt, log in as the same user that you had performed the previous steps as.

  4. When your computer has started in safe mode, and you see the desktop, close all open Windows.

  5. Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:



  6. When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.

  7. You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).



  8. The program will start cleaning your computer and go through a series of cleanup processes. When it is done, it will automatically start the Disk Cleanup program as shown by the image below.





    This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 11.

  9. When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
  10. When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.
  11. Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log, and when you are done, close the Notepad screen.
Your computer should now be free of the VirusProtect infection. If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Posting A Hijackthis Log


Manual Removal Instructions for VirusProtect:

These steps may appear to be long and daunting. They are, though, quite easy to do and consist of so many steps only because I have written them in an extremely detailed manner.
  1. Print out these instructions as we will need to close every window that is open later in the fix.

  2. Download FixVPP.reg to your desktop by right clicking on the following link and then selecting Save Link As or Save File as, depending on your browser.

    FixVPP.reg Download Link

    Confirm that the file FixVPP.reg now resides on your desktop as we will need it later.

  3. Download SmitfraudFix.exe from here and save it to your desktop:

    SmitFraudFix.exe

    Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:



  4. Go to your desktop and double click on the FixVPP.reg file that you downloaded earlier. When it asks if you would like to merge the information, press the Yes button and then the OK button.

  5. Click on the Start button and then select the Run option.

  6. In the Open: field type c:\windows\system32 and then press the OK button.

  7. When the folder appears, if it says These files are hidden, click on the Show the contents of this folder option.

  8. We now need to make it so you can see hidden files.
    1. Click on the Tools menu and select Folder Options.
    2. Click on the View tab.
    3. Under the Hidden files and folders category select Show hidden files and folders.
    4. Uncheck Hide protected operating system files.
    5. Press Apply and then OK.
    6. If you still can not see the file, then undo these changes and skip to step 11.

  9. Scroll through the list of files in this folder and look for fftktmk.dll. Right-click on fftktmk.dll and select rename. Rename the file to fftktmk.dll.bad.

    Look for the file ucmbegr.dll and rename the file to ucmbegr.dll.bad

    Look for the file moywh.dll and rename the file to moywh.dll.bad

    Look for the file wygomd.dll and rename the file to wygomd.dll.bad

    Look for the file rldyt.dll and rename the file to rldyt.dll.bad

    Look for the file chzbi.dll and rename the file to chzbi.dll.bad

    Look for the file ymmzwd.dll and rename the file to ymmzwd.dll.bad

    Look for the file ivrllc.dll and rename the file to ivrllc.dll.bad

    Look for the file zcwlnic.dll and rename the file to zcwlnic.dll.bad

    Look for the file ncrjf.dll and rename the file to ncrjf.dll.bad

    Look for the file uglgs.dll and rename the file to uglgs.dll.bad

    Look for the file tvtpwp.dll and rename the file to tvtpwp.dll.bad

    Look for the file wowlze.dll and rename the file to wowlze.dll.bad

    Look for the file cjuvwa.dll and rename the file to cjuvwa.dll.bad

    Look for the file gnjsjc.dll and rename the file to gnjsjc.dll.bad

    Look for the file ezzhjmt.dll and rename the file to ezzhjmt.dll.bad

    Look for the file fsehfcu.dll and rename the file to fsehfcu.dll.bad

    Look for the file qhcvdw.dll and rename the file to qhcvdw.dll.bad

    Look for the file axdpfl.dll and rename the file to axdpfl.dll.bad

    Look for the file svxmhpz.dll and rename the file to svxmhpz.dll.bad

    Look for the file ofcpi.dll.dll and rename the file to ofcpi.dll.dll.bad

    Look for the file iinqyl.dll and rename the file to iinqyl.dll.bad

    Note: Please rename any of the above files that you may find. If you do not find any of these files, then you should post a note about it in the Am I Infected? forum.
  10. After you rename the file, you can close the System32 folder window.

  11. Next, please reboot your computer into Safe Mode by doing the following:

    1. Restart your computer

    2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.

    3. Instead of Windows loading as normal, a menu should appear

    4. Select the first option, to run Windows in Safe Mode.

    5. When you are at the logon prompt, log in as the same user which you had done the previous steps.

  12. When your computer has started in safe mode and you see the desktop, click on the Start Menu button.

  13. Click on the Control Panel option.

  14. Double-click on the Add or Remove Programs icon.

  15. Find the entries for VirusProtect 3.8 or VirusProtect 3.9and double-click on them to uninstall if found. Follow the prompts to uninstall the program, but do not allow it to reboot the computer if it asks.

  16. When it has completed uninstalling you can close Add or Remove Programs and your Control Panel.

  17. Delete the following files and folders (Do not be concerned if a folder does not exist):

    C:\Windows\System32\fftktmk.dll.bad
    C:\Windows\System32\ucmbegr.dll.bad
    C:\Windows\System32\moywh.dll.bad
    C:\Windows\System32\wygomd.dll.bad
    C:\Windows\System32\chzbi.dll.bad
    C:\Windows\System32\rldyt.dll.bad
    C:\Windows\System32\ymmzwd.dll.bad
    C:\Windows\System32\ivrllc.dll.bad
    C:\Windows\System32\zcwlnic.dll.bad

    C:\Windows\System32\ncrjf.dll.bad
    C:\Windows\System32\uglgs.dll.bad
    C:\Windows\System32\tvtpwp.dll.bad
    C:\Windows\System32\wowlze.dll.bad
    C:\Windows\System32\cjuvwa.dll.bad
    C:\Windows\System32\gnjsjc.dll.bad
    C:\Windows\System32\ezzhjmt.dll.bad
    C:\Windows\System32\fsehfcu.dll.bad
    C:\Windows\System32\qhcvdw.dll.bad
    C:\Windows\System32\axdpfl.dll.bad
    C:\Windows\System32\svxmhpz.dll.bad
    C:\Windows\System32\ofcpi.dll.bad
    C:\Windows\System32\iinqyl.dll.bad
    C:\Windows\System32\e404d.dll
    C:\Program Files\Helper\ C:\Program Files\VirusProtect 3.8\
    C:\Program Files\VirusProtect 3.9\

  18. Close all open Windows.

  19. Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:


  20. When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.

  21. When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.

  22. You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).



  23. The program will start cleaning your computer and go through a series of cleanup processes. When it is done, it will automatically start the Disk Cleanup program as shown by the image below.





    This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 25.

  24. When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
  25. When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.
  26. Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log to see what files were found, and when you are done, close the Notepad screen.
  27. We next perform an online scan with Panda to find any possible inactive remnants from this infection: Panda Online

    1. Once you are on the Panda site click the Scan your PC button

    2. A new window will open...click the Check Now button

    3. Enter your Country

    4. Enter your State/Province

    5. Enter your e-mail address and click send

    6. Select either Home User or Company

    7. Click the big Scan Now button

    8. If it wants to install an ActiveX component allow it

    9. It will start downloading the files it requires for the scan (Note: It may take a few minutes)

    10. When download is complete, click on Local Disks to start the scan

  28. When the online scan has been completed, let it remove what it finds, and then you can close Internet Explorer.
Your computer should now be free of the Virus Protect infection. If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Posting A Hijackthis Log


This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can post a HijackThis log in our HijackThis Logs and Analysis forum.

If you have any questions about this self-help guide then please post those questions in our AntiVirus, Firewall and Privacy Products and Protection Methods forum and someone will help you.


BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 02 July 2007 - 03:34 PM

Updated for new infector:

C:\Windows\System32\zpeolvh.dll

#3 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 04 July 2007 - 11:32 AM

Updated for new infector:

C:\Windows\System32\xnvaogd.dll

#4 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 06 July 2007 - 10:10 AM

Updated for new infector:

C:\Windows\System32\lapmvzf.dll

#5 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 07 July 2007 - 09:27 PM

Added new infector:

C:\Windows\System32\myqlejy.dll

#6 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 09 July 2007 - 02:56 PM

Updated for new infector:

C:\Windows\System32\wfcof.dll

#7 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 12 July 2007 - 08:20 PM

Updated for new infector and version 3.4:

C:\Windows\System32\surzzh.dll

#8 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 15 July 2007 - 01:39 PM

Updated for two new infectors:


C:\Windows\System32\onljweo.dll
C:\Windows\System32\yhjbbzf.dll

#9 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 16 July 2007 - 11:51 AM

Updated for new infector:

C:\Windows\System32\cefrjsh.dll

#10 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 17 July 2007 - 11:35 AM

Updated for new infector:

C:\Windows\System32\wpchz.dll

#11 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 18 July 2007 - 09:57 AM

Updated for new infector:

C:\Windows\System32\vgibz.dll

#12 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 19 July 2007 - 03:17 PM

Updated for new infector:

C:\Windows\System32\psndz.dll

#13 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 21 July 2007 - 11:01 AM

Added new infector:

C:\Windows\System32\cqsfk.dll

#14 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 24 July 2007 - 03:56 PM

Updated for new infector:

C:\Windows\System32\wzhtjqo.dll

#15 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  •  Avatar image
  • Admin
  • 45,110 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:02 AM

Posted 27 July 2007 - 04:16 PM

Updated for 3 new infectors:

C:\Windows\System32\lrnjnzf.dll
C:\Windows\System32\zpuwriz.dll
C:\Windows\System32\tkrsw.dll




1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users