Possibly Vundo?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Mak5086, Feb 20, 2007.

  1. Mak5086

    Mak5086 Private E-2

    Ran all of your run me first programs except Panda, reason being every time I open windows explorer I get bombarded with viruses and re directs. Most are caught by Norton anti virus, some are not. The ones I've noticed are Vundo, downloader, drive cleaner.
    I was able to run spy bot in safe mode. Couter spy and ccleaner I had to run in normal boot mode.
    Also when I try to run firefox browser Windows Explorer opens with various windows for virus or spyware removal tools.
     

    Attached Files:

  2. Mak5086

    Mak5086 Private E-2

    other logs
     

    Attached Files:

  3. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Continue by downloading a tool we will need - Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it later.

    Please uninstall the following thru add/remove programs:
    J2SE Runtime Environment 5.0 Update 10
    Java 2 Runtime Environment, SE v1.4.1_02
    Java 2 Runtime Environment, SE v1.4.2_06
    Viewpoint Media Player
    Reboot your computer and install:
    Java Runtime 6

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    O2 - BHO: (no name) - {58FF7395-B48F-41CB-A20C-2FFA2A049EB2} - C:\WINDOWS\system32\nnnkjgd.dll
    O2 - BHO: (no name) - {C9B7B2D6-FB6B-4EF7-A507-462C7380C6B3} - C:\WINDOWS\system32\rqomn.dll
    O2 - BHO: (no name) - {E03C740E-BB24-4d3c-B92A-6F84DE1DD99C} - C:\WINDOWS\system32\wveyyrfb.dll
    O4 - HKLM\..\Run: [CTDrive] rundll32.exe C:\WINDOWS\system32\drvpem.dll,startup
    O20 - Winlogon Notify: nnnkjgd - C:\WINDOWS\SYSTEM32\nnnkjgd.dll G
    O20 - Winlogon Notify: rqomn - C:\WINDOWS\system32\rqomn.dll
    O20 - Winlogon Notify: wineyx32 - C:\WINDOWS\SYSTEM32\wineyx32.dll

    After clicking Fix, exit HJT.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:

    * Delete on Reboot
    * then Click on the All Files button.
    * Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\nnnkjgd.dll
    C:\WINDOWS\system32\ljjhggh.dll
    C:\WINDOWS\system32\cbxvsss.dll
    C:\WINDOWS\system32\wineyx32.dll
    C:\WINDOWS\system32\wveyyrfb.dll
    C:\WINDOWS\system32\nmoqr.ini
    C:\WINDOWS\system32\rqomn.dll
    C:\WINDOWS\system32\drvpem.dll

    * Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    * Click the red-and-white Delete File button. Click the unregister .dll's. Click Yes at the Delete on Reboot prompt.

    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Please download VundoFix.exe to your desktop.

    * Double-click VundoFix.exe to run it.
    * Click the Scan for Vundo button.
    * Once it's done scanning, click the Remove Vundo button.
    * You will receive a prompt asking if you want to remove the files, click YES
    * Once you click yes, your desktop will go blank as it starts removing Vundo.
    * When completed, it will prompt that it will reboot your computer, click OK.
    * Please post the contents of C:\vundofix.txt

    Note: It is possible that VundoFix encountered a file it could not remove.
    In this case, VundoFix will run on reboot, simply follow the above instructions starting from "Click the
    Scan for Vundo button." when VundoFix appears at reboot.

    Now attach new logs for:

    * GetRunKey
    * ShowNew
    * HJT
    * Vundo log

    Be sure to tell us how things are running.
     
  4. Mak5086

    Mak5086 Private E-2

    Hi, thanks for your response.
    I can't access add remove programs. I get message, windows cannot find c\windows\system32\rundll32.exe
    This wasn't happening I tried this.
    Also I Noticed in the email I got it says install kill the messenger with a link, but on the forum page it says install java runtime 6
     
  5. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Try to do all the rest......we will kill the messenger later, if need be.
     
  6. Mak5086

    Mak5086 Private E-2

    While vundo fix was running CounterSpy gave me a warning that Vundo fix is attempting to creat a trojan program; explorer.exe, and asking me to quarantine it. I haven't done anything yet.
    What should I do?
     
  7. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Uninstall Counterspy, as we are done with it.
     
  8. Mak5086

    Mak5086 Private E-2

    I use Counter Spy regularly. I have a subcription. It's asking me to quarantine, allow or block this action by vundo fix
     
  9. Mak5086

    Mak5086 Private E-2

    vundo fix finished before I could do anything. I chose block just to close the warning window from CounterSpy. Not sure if it did anything.
    When I rebooted Norton anti virus caught some virus attempts, Vundo, Infostealer then Vundo again. Each time it said file was automatically deleted.
    After running Killbox I got the PendingFileRenameOperations prompt.
    Logs are attached.
    I've noticed a new hidden file on my desktop; desktop.ini
     

    Attached Files:

  10. Mak5086

    Mak5086 Private E-2

    Hijack this log
     

    Attached Files:

  11. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Download and run Prevx1

    Attach the log as well as:
    GetRun
    ShowNew
    HJT
     
  12. Mak5086

    Mak5086 Private E-2

    Ran Prevx, program froze while vallidating 9 malware. I see 8 in jail.
    Still cannot access add/remove programs.
    here are the logs.
     

    Attached Files:

  13. Mak5086

    Mak5086 Private E-2

    prevx log fails to upload
     
  14. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
    O2 - BHO: (no name) - {58FF7395-B48F-41CB-A20C-2FFA2A049EB2} - (no file)
    O2 - BHO: (no name) - {B8202A18-F606-4F74-B1C4-E9E659644585} - (no file)
    02 - BHO: (no name) - {C12EA335-F195-4455-B10E-ED72EDF251CF} - C:\WINDOWS\system32\rqomn.dll (file missing)
    02 - BHO: (no name) - {E03C740E-BB24-4d3c-B92A-6F84DE1DD99C} - C:\WINDOWS\system32\gldjrhbe.dll
    O20 - Winlogon Notify: hgdee - C:\WINDOWS\
    O20 - Winlogon Notify: nnnkjgd - C:\WINDOWS\
    O20 - Winlogon Notify: wineyx32 - C:\WINDOWS\

    After clicking Fix, exit HJT.

    Now Download this file - ComboFix
    Double click combofix.exe & follow the prompts.
    When finished, it will produce a log for you. Attach this log to your next reply

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    Attach the logs for:
    * GetRunKey
    * ShowNew
    * HJT
     
  15. Mak5086

    Mak5086 Private E-2

    after trying to run combofix I immediately got this message in notepad:

    (The tool, ComboFix has been temporarily withdrawn.

    The author discovered a rootkit infection that will intefere with ComboFix's running.

    This will cause Combofix to be UNSAFE FOR USE on your machine.

    Even if you manage to find a mirror for the tool, PLEASE DO NOT RUN THIS TOOL

    Apologies for any inconvenience caused)
     
  16. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please do the rest and attach the logs.
     
  17. Mak5086

    Mak5086 Private E-2

    Here are the logs.
     

    Attached Files:

  18. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Go to start / run and type "cleanmgr" without quotes and run the cleaner.

    Let me know how things are working.
     
  19. Mak5086

    Mak5086 Private E-2

    aside from not being able to access "add/remove programs", everything else seems to be fine so far.
     
  20. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    First, to check whether the Add/Remove applet is alive and well, go to Start>Run, type in "appwiz.cpl" (without the quotes) and click OK (or press Enter).

    If the Add/Remove applet starts, then it's a problem with the shortcuts. The easiest and most immediate way to fix it is to go to C:\Windows\System32 folder, find the appwiz.cpl file and put a shortcut to it somewhere handy.

    If it doesn't start, you can try replacing it with a new copy through System File Checker. Rather than running the whole SFC routine, you can go to Start>Run, type in "msconfig" (without the quotes), click OK and on the General tab, click the "Expand File" button. Tell it you want to extract appwiz.cpl, tell it to extract it from either C:\I386 or your XP CD (which you'll need to put in the CD drive) and tell it to extract it to C:\Windows\System32.
     
  21. Mak5086

    Mak5086 Private E-2

    add/remove programs will not run from the Run Command, it asks me which program I would like to use to open.

    C:\l386 dosen't seem to exist, assuming that first character is an "el".

    I don't have a stand alone XP CD. I have 3 recovery CDs that came with the computer. When ask to extract from and I browse to CD drive it only gives me the option to look for .cab files(I tried all 3 CDs), I can't change this.

    The error message I get when I try to run "add/remove" from control panel is "windows cannot find c\windows\system32\rundll32.exe"
     
  22. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Have you run Spybot Search & Destroy in recent times? Check its backups. It had been known to remove the rundll32.exe file in conjunction with SmiFraud-C infections. If this is what happened, you can just restore it from the backup.
     
  23. Mak5086

    Mak5086 Private E-2

    I did run Spybot Search & Destroy before my first post, but I don't see the rundll32.exe file in the back up. Only some registry keys, two of which had something to do with SmiFraud.
     
  24. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You can try replacing it with a new copy through System File Checker. Rather than running the whole SFC routine, you can go to Start>Run, type in "msconfig" (without the quotes), click OK and on the General tab, click the "Expand File" button. Tell it you want to extract appwiz.cpl, tell it to extract it from either C:\I386 or your XP CD (which you'll need to put in the CD drive) and tell it to extract it to C:\Windows\System32.

    And it is i386 not el386.
     
  25. Mak5086

    Mak5086 Private E-2

    Expand file doesn't seem to work. When I put in the informaton and hit Expand File, nothing happens.
     
  26. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You opened msconfig, hit the tab at the bottom of the general page for expand file, got a popup box to put in the restore file, then restore from ...save in ...you did all that?
    Did you browse for the file? Was it found in a backup i386 folder. Do you have a backup partition? Did you browse for it on the restore cd's?
     
  27. Mak5086

    Mak5086 Private E-2

    I opened msconfig, hit the tab at the bottom of the general page for expand file, got a popup box to put in the restore file, then restore from, when I try to browse for the file, the files of type line only lets me look for .cab files, I can't change this.

    I found two i386 folders, C:\Windows\I386\APPWIZ.CP_. I tried typing that in directly, then save in C:\Windows\system 32. I hit expand, the window closed, then hit ok to get out of sys config utility, then restart.

    The other i386 folder, C:\Windows\ServicePackFiles\i386, with the appwiz.cpl file. Tried the same thing.

    I don't have a back up partition. I don't have a stand alone XP CD. I have 3 recovery CDs that came with the computer. When ask to extract from and I browse to CD drive it only gives me the option to look for .cab files(I tried all 3 CDs), I can't change this.

    I've also noticed I can't access my display settings, mouse or keyboard settings.
     
    Last edited: Feb 25, 2007
  28. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    If these are the only problems ....no longer having malware problems ...I would suggest you post in the software section.

    However, if you can borrow an xp cd (your version ..home or pro) then go to start / run / and type sfc /scannow and have the disc ready.

    Note the space between the c and the /!
     
  29. Mak5086

    Mak5086 Private E-2

    I got everything to work by "copying" the rundll32.exe file from C:\Windows\ServicePackFiles\i386 to C:\Windows\System32.
     
  30. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    There ya go .....You may uninstall any programs we had you download.

    If you are not having any other malware problems, it is time to do our final steps:

    1. If we used Pocket Killbox during your cleanup, do the below
    * Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
    * go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
    * Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
    * How to Protect yourself from malware!
     
  31. Mak5086

    Mak5086 Private E-2

    Thanks for all your help!
     
  32. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No problem ....safe surfing.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds