Problems removing Vundo / Winfixer

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by kaiyote, Mar 25, 2007.

  1. kaiyote

    kaiyote Private E-2

    I'm having major difficulties in removing Trojan.Vundo / Winfixer from my system. NAV 2006 (with up2date defs) has been running consistently, and has repeatedly caught instances of these viruses, as well as InfoStealer on my system. I can't seem to get rid of them, but am fairly certain they arrived around 3/21-23.

    I attempted the Special Removal Procedures for Vundo/Winfixer, to no avail.

    I have followed the R&R 1st Malware Removal, with the exception of the CounterSpy log - is the View option available while running it in safe mode?

    Logs attached; I have my suspicions about three dlls, but am an amateur.
     

    Attached Files:

  2. kaiyote

    kaiyote Private E-2

    As advised, I did rename HJT prior to running. Unfortunately, I have misplaced my PandaLog - will post it once it finishes re-running. Thanks.
     

    Attached Files:

  3. kaiyote

    kaiyote Private E-2

    PandaScan text attached
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You must remember to only attach HijackThis logs from Normal Boot mode unless we ask for them to be from safe mode. Don't attach a new one yet. First do the below.

    Run this Virtumonde aka Trojan Vundo Removal


    Now attach the below new logs and tell me how the above steps went.

    1. VundoFix log
    2. GetRunKey
    3. ShowNew
    4. HJT
    We will still have some more to do, so don't expect things to be totally fixed yet! We'll get there! ;)
     
  5. kaiyote

    kaiyote Private E-2

    VundoFix ran well - log file attached, along with new Runkeys & Newfiles logs.

    I understand this will take some iterations, but just to keep u posted:
    NAV blocked three installation while I was writing this response:
    onngomrf.dll Trojan.Vundo
    rfntekaf.dll InfoStealer
    fcpfckxh.exe Trojan.Vundo
    It also brought up one for NAV Manual Repair - Trojan.Vundo

    And I had one IE Popup for "Registry Repair Pro"
     

    Attached Files:

  6. kaiyote

    kaiyote Private E-2

    Ran HJT in normal mode afterwards, as directed.

    Two more IE pop-ups in the meantime, as well as an ErrorSafe warning/redirect.

    NAV, after the manual removal, recommended a reboot - which I did not perform, since 1) it hasn't worked in the past and 2) I'm concerned it will add additional permutations of the virus in the middle of your assistance.

    Thanks for your learned assistance - and nice quote.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    DO you know what the below is for that is loading at startup?

    "cat"="C:\\Program Files\\CAT\\cat.exe"

    Info I have says it is a trojan!
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I assume it is part of the below which I see in your installed program list, but what is it.

    "DisplayName"="CAT 1.0"
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 11
    J2SE Runtime Environment 5.0 Update 6
    J2SE Runtime Environment 5.0 Update 9

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment

    Now Uninstall the Sunbelt CounterSpy trial since we are finished with it now! Then delete the below two folders which may be left behind by the uninstall:
    C:\Documents and Settings\All Users\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software

    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of mljjj.dll once and then click the kill button. After you have killed all of the mljjj.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrqnop.dll

    Next double click on explorer.exe and again click once on each instance of mljjj.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrqnop.dll

    Next double click on iexplore.exe and again click once on each instance of mljjj.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrqnop.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {25AA8609-B074-4D1F-9043-28E5ECFC75A0} - C:\WINDOWS\system32\mljjj.dll
    O2 - BHO: (no name) - {28CEA1DA-2199-4AEE-BA75-9032C8450B66} - C:\WINDOWS\system32\rqrqnop.dll
    O2 - BHO: (no name) - {F067EF81-6E15-411B-91C7-130A3B161A21} - C:\WINDOWS\system32\jkhfd.dll (file missing)
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [SoundService] rundll32.exe "C:\WINDOWS\system32\egbnicwd.dll",setvm
    O20 - Winlogon Notify: mljjj - C:\WINDOWS\system32\mljjj.dll
    O20 - Winlogon Notify: rqrqnop - C:\WINDOWS\SYSTEM32\rqrqnop.dll

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\egbnicwd.dll
    C:\WINDOWS\system32\mljjj.dll
    C:\WINDOWS\system32\rqrqnop.dll
    C:\WINDOWS\system32\jjjlm.bak1
    C:\WINDOWS\system32\dwcinbge.ini
    C:\WINDOWS\system32\jjjlm.ini
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  10. kaiyote

    kaiyote Private E-2

    Thank you very much for the time you spent with me.

    Anomaly: extra reboot after uninstalling Javas (3) due to system freeze

    Other than that, it appears that your process went flawlessly. Thank you for your clear & concise instructions.

    I've attached the logs, and will wait for your confirmation before I remove my restore points.

    Re your inquiry about cat.exe - That is a known program (to me) that I have had for some time. It is an Amber Alert ticker that updates when Amber Alerts are issued, and is available from codeamber.org, if you want to examine a copy of the .exe

    I did notice that my computer uses a lot of resources on initial startup - I need to leave it alone for ~5mins after logging in. From task manager, it appears an instance of svchost (SYSTEM) hogs the processor for the majority of the time. I am highly greatful for your assistance in removing the malware, and don't wish to bog you down with anything else lengthy. I intend to start with the suggestions in the "Basic Computer Maintenance..." thread, but if you have any quick thoughts on anything else you saw while you were perusing my logs that it doesn't address, or a straightforward way to discern which program is using that particular svchost thread, please let me know.
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Many people running Symantec/Norton Internet Security Suites complain that there PC is slow especially at start up. It could be your major problem.


    You can however also have HJT fix the below items which are not requied to load at startup. This could help a little. (Also note, Task Manager should not be running when you get a HijackThis log).

    O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0\bin\jusched.exe"
    O4 - Startup: PowerReg Scheduler.exe
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe



    Other than the above, your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds