Undeletable files, pop-ups on Google, and a recurring Trojan horse

Discussion in 'Malware Help (A Specialist Will Reply)' started by Spakku, Jul 7, 2007.

  1. Spakku

    Spakku Private E-2

    I've got a crap-load of viruses and the like that I have been trying in vain eliminate by myself.
    HijackThis keeps giving me the same list (plus extra on occasion) of culprits that I cannot delete, even if I tell it to delete them on reboot, they don't go away. I've also tried repeating the process with System Restore turned off (since that was an issue for me in the past).
    AVG keeps randomly telling me about a Trojan horse virus in my temporary internet files, even after I've emptied them.

    I'm willing to give you any amount of information, all you need to do is ask specifically for it, because I don't know what else will help.

    I'm willing to marry anybody who figures this out.
     
  2. Spakku

    Spakku Private E-2

    Now the pop-ups are happening on Internet Explorer and Mozilla Firefox. And sometimes when I don't even have a browser window open.

    Please, help me
     
  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, renaming, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.
    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • CounterSpy - only for Windows XP, 2K, & NT users
      • AVG Antispyware log - ONLY IF NEEDED you were not able to run CounterSpy. - only for Windows XP, 2K, & NT users
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use two messages to attach all of these logs!
     
  4. Spakku

    Spakku Private E-2

    Part 1
     

    Attached Files:

  5. Spakku

    Spakku Private E-2

    Part 2
     

    Attached Files:

  6. Spakku

    Spakku Private E-2

    The remaning culprits seem to be hgggg.dll and opnomnl.dll. Google searches tell me that these are trojan.vundo files which are apparently damn near impossible to get rid of.

    Also, there's ctfmon.exe, but I've never seen that go away and I think it's harmless.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I see you are logged in! Hang on for awhile as I'm working up a fix for you now.

    Not for us! ;)

    It is part of MS Office.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Whoa!!! What did you do with your HJT log????

    Did you start deleting things?
    Or did you filter things (i.e., block them from showing)?
    You log is way too small and things that should be showing are not showing>
     
  9. Spakku

    Spakku Private E-2

    I have the filter set to ignore stuff I know is safe already, I forgot to take that off. The new log is attached. Oddly, opnomnl.dll seems to have been replaced.
     

    Attached Files:

    Last edited: Jul 8, 2007
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That is just part of what the infection will do. It may change process and filenames after each shutdown or reboot. Even the O4 line DLL file (which you had filtered before but your runkeys.txt log still showed it) has changed.

    You appear to have skipped step 2 of the READ ME. Part of the fixME.reg patch further down should automatically fix this.

    Uninstall the Sunbelt CounterSpy trial since we are finished with it now and it could get in the way of the clean up!


    Continue by downloading a tool we will need

    - Process Explorer


    Extract it to its own folder somewhere that you will be able to locate it later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of any of the below DLL files (if found) and then click the kill button.
    bdycfxtu.dll
    djrdsxdd.dll
    hgggg.dll
    hkucvgkg.dll
    mpmckwvp.dll
    nawwknju.dll
    opnomnl.dll

    After you have killed all instances of any of the above DLLs under winlogon click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on explorer.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    bdycfxtu.dll
    djrdsxdd.dll
    hgggg.dll
    hkucvgkg.dll
    mpmckwvp.dll
    nawwknju.dll
    opnomnl.dll

    After you have killed all instances of any of the above DLLs under Explorer click ok.
    (If you do not find these DLLS, just continue on.)

    Next double click on iexplore.exe and again click once on each instance of any of the below DLL files (if found) and then click the kill button.
    bdycfxtu.dll
    djrdsxdd.dll
    hgggg.dll
    hkucvgkg.dll
    mpmckwvp.dll
    nawwknju.dll
    opnomnl.dll

    After you have killed all instances of any of the above DLLs under iexplore click ok.
    (If you do not find these DLLS, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {1F6581D5-AA53-4b73-A6F9-41420C6B61F1} - C:\WINDOWS\system32\djrdsxdd.dll
    O2 - BHO: (no name) - {39C19932-E72A-498B-94DE-A6E0AA0E9D0F} - C:\WINDOWS\system32\hgggg.dll
    O4 - HKLM\..\Run: [icq.com] rundll32.exe "C:\WINDOWS\system32\nawwknju.dll",forkonce
    O20 - Winlogon Notify: hgggg - C:\WINDOWS\system32\hgggg.dll

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it
    double click it and allow it to merge with the registry.
    Now download The Avenger by Swandog46, and save it to your Desktop.
    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  11. Spakku

    Spakku Private E-2

    New attachments pt 1
     

    Attached Files:

  12. Spakku

    Spakku Private E-2

    And pt 2.

    I didn't skip step 2, by the way. My options said that I could see them but it didn't work. Is that a part of what I had?

    Anyways, that worked great. IE and Firefox are super-fast, not to mention that the pop-ups and message boxes have disappeared altogether.
    I want you inside of me.
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No not normally. The Vundo infections do not normally do anything to this. There are others that try to block you from changing those settings but you did not have those infections. The registry patch corrected it anyway.

    You are still badly infected. Remember back in message 6 when you posted a new HJT log and said the one file name had been replace. Well we should have gotten new logs from ShowNew and GetRunKey at that time to. Alot more was created and hiding.


    • Run avenger.exe by double-clicking on it.
    • Check the 'Input script manually' box.
    • Click on the magnifying glass icon.
    • Copy everything in the Quote box below, and paste it in the box that opens:
    • Now click the 'Done' button.
    • Click on the traffic light icon and OK the prompt.
    • You will be prompted to restart, OK the prompt and your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt
    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. Avenger
    2. GetRunKey
    3. ShowNew
    4. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 8 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  14. Spakku

    Spakku Private E-2

    What kind of stuff got left? My computer's acting like new.

    Anyways, here's all the attachments that will fit in a single post.
     

    Attached Files:

  15. Spakku

    Spakku Private E-2

    And here's HJT's attachment.

    I guess you do know best. I assume these things must be degrading to my system somehow if you want them gone.
     

    Attached Files:

  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    They were all part of your original Virtumonde and Winlogonhook infections. Anyone of those files could have caused you infections to come back in full force or even worse than last time.


    Your logs are clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, C:\WINDOWS\nircmd.exe, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    5. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    6. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    7. If we had you run Avenger, you can delete all files related to Avenger now.
    8. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    9. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    10. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    11. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds