W32/Vundo.gen7 persistant

Discussion in 'Malware Help (A Specialist Will Reply)' started by vkinetic, Jun 20, 2007.

  1. vkinetic

    vkinetic Private First Class

    Norman AntiVirus is consistantly warning (and blocking) the W32/Vundo.gen7 trojan, located at c:\Windows\system32\jlgajlg.dll - the warning comes up every ten seconds or so. Tried the specific fix for this in the Special Removal Procedures thread (Vundo fix) - had to uninstall Norman for this fix to find the file (jlgajlg.dll) which it says it removed on the next boot, but the file just reinstalled itself. Reinstalled Norman and then followed all your procedures in the READ ME FIRST thread:

    Windows Malicious Software removal tool found nothing
    Windows Defender found nothing
    Bit Defender did find some trojans in System Restore and one in system files, but crashed before I could save the log. Ran it again and it didn't find as many infections second time around, but the log file is attached
    Panda didn't find anything
    Ewido (AVG) log attached
    Blacklight log attached
    GetRunKey and NewFiles logs attached (had to run the bat files at the command prompt as they would'nt run in Windows)

    See further posts for other attachments - please assist in cleaning this machine!
     

    Attached Files:

  2. vkinetic

    vkinetic Private First Class

    More logs
     

    Attached Files:

  3. vkinetic

    vkinetic Private First Class

    Last log
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you purchase and knowingly install SpywareBot? Uninstall it now if it is in your Add/Remove programs list.

    Also do the below while I work thru all of your logs in detail.

    Uninstall CounterSpy since you did not attach a log from it anyway and it is only a trial and you have too many antispyware blockers installed.

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 9
    Viewpoint Media Player (Remove Only) <-- should have been uninstalled in step 0 of the READ ME

    Make sure you reboot after uninstalling the above!

    After reboot, now install the current version of Sun Java from: Sun Java Runtime Environment
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay I just noticed that you are using VERY OLD versions of GetRunKey and ShowNew. You must always work from the current online copy of the READ ME. Please download the current version and use them to get new logs. Attach the logs. I need these before I can continue.

    Also I hope you have your Windows XP boot CD because you are going to new it to remove your infection. The only way to remove part of what you have is by booting to the recovery console.
     
  6. vkinetic

    vkinetic Private First Class

    Thanks chaslang. Allyour instructions have been followed. Yes, I have the XP disk. New logs attached.
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay let's just try something first to see if we can find an easier way to remove this.

    Click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands in the command prompt window and ignore any message about any process jlgajlg or jlgajlg.dll not being found. If taskkill is not found please tell me. There are space inbetween the -r and the -s and the -h

    taskkill jlgajlg
    attrib -r -s -h C:\WINDOWS\system32\jlgajlg.dll
    del C:\WINDOWS\system32\jlgajlg.dll
    exit

    The exit command will close the command prompt window.
    1. Download this file - combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it will produce a log for you. Attach this log to your next reply
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.


    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!
     
  8. vkinetic

    vkinetic Private First Class

    Thanks chaslang - taskkill was not a recognised command at the command prompt
     
  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay I guess you do not have Windows XP Pro. Continue with the other steps and then we will probably have to resort to using your XP CD.
     
  10. vkinetic

    vkinetic Private First Class

    Access was denied in trying to change the file attributes for jlgajlg.dll
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    As I said in my previous message
    This means all steps! Sorry if that was not clear.
     
  12. vkinetic

    vkinetic Private First Class

    Thanks chaslang - jlgalg.dll is not found - because Norman is blocking it (some other process is constantly trying to install it). From previous attempts to fix this (with vundofix.exe) I had to uninstall Norman completely to allow that process to install jlgajlg.dll

    So therefore, should I uninstall Norman, and then follow the remainder of your instructions? Also, I have XP Pro disks here - is there a way to extract the taskkill command from an XP Pro disk?

    I very much appreciate your help and quick response
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It does not matter whether it is found or not. It is there. Yes it may be best to uninstall Norman since it really is not protecting you from or stopping any of this from infecting you. All it is doing is getting in the way of cleanup.

    Why? Are you saying you have an XP Pro disk? It should be in the i386 folder and will be named TASKKILL.EX_

    The underscore at the end means the file is compressed and needs to be expanded to become taskkill.exe. You would use a command like the below from a command prompt:

    expand d:\i386\taskkill.ex_ c:\windows\system32\taskkill.exe

    where d: should be replace by your CD ROM drive letter.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just in case you don't have the taskkill.exe file or in case it does not work (and I would not bet on it), here is what you will need to do next.



    Now read thru the below to familiarize yourself with it and print it so you can refer to it while offline since you will not be able to browser once starting the below.
    1. Put the Windows XP CD into the CD ROM tray and close the tray. You may get a popup window asking about installing Windows XP. If you do, just close that window.
    2. Then restart your computer
    3. This should cause your computer to boot from the CD instead of the hard drive..(if not your you'll need to enter the BIOS and set the boot order so the CD ROM is first in the list.)
    4. You should get a "Press any key to boot from CD" message! Press a key to do that otherwise it will by pass the CD boot.
    5. After it boots up, you will see it load a bunch of files (be patient it can take a little while) and eventually you will see a menu where you can select the "Recovery Console" by pressing R It is normally the middle item in the list. Press R
    6. You will see a list of possible Windows partitions with numbers next to them. Select your Windows Installation (which is C:\Windows) by typing the number next to it (which should be 1) and press enter.
    7. It will ask you for the Administrator password is next (so make sure you know it). It you never gave it a password it is probably blank. If it is blank, just press enter. If you have set one then type it in and hit enter. It will tell you if you enter the wrong password.
    8. When you enter the correct password you will get a prompt that looks like this: C:\WINDOWS>
    Now from this command prompt window, here are some things I want you to do. Enter the below commands (the commands are in bold black) in the order given. I will add comments in purple.

    cd system32\drivers <-- the prompt should change to C:\WINDOWS\SYSTEM32\DRIVERS>

    del houdxrue.sys
    del nvcw32mf.sys

    If you get any error mesages while running the del command which should delete those two file then run the below two commands which will attempt to rename the files.

    ren houdxrue.sys
    ren nvcw32mf.sys


    If the del and the ren do not work just type exit to leave the Recovery Console and boot into Windows and just come back here and tell me exactly what happened. Do not do any of the below!

    If the above worked then continue with the below.

    cd C:\WINDOWS\system32
    del jlgajlg.dll
    del ltgkoosz.dll
    del wcmcpooj.dll
    del jlgajlg.dll.bak
    del ltgkoosz.dll.bak

    exit <--- this will exit the Recovery Console and boot to Windows

    After booting into Windows, run HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O2 - BHO: (no name) - {2BEDF8C4-7C34-426D-93AA-26BB65BA4715} - c:\windows\system32\jlgajlg.dll
    O4 - HKLM\..\Run: [SpywareBot] C:\Program Files\SpywareBot\SpywareBot.exe -boot
    O20 - Winlogon Notify: rnulhpwn - C:\WINDOWS\SYSTEM32\jlgajlg.dll

    Now exit HJT


    Now attach the below new logs and tell me how the above steps went.

    1. ShowNew
    2. HJT
     
  15. vkinetic

    vkinetic Private First Class

    Interim Reply

    Got Taskkill installed but didn't help as access was denied in trying to change the attributes or delete jlgajg.dll

    Attached are logs for Combofix, GetRunKey, ShowNew and HJT. Looking good.

    I haven't progressed to follow your last instructions yet.
     

    Attached Files:

  16. vkinetic

    vkinetic Private First Class

    HJT log
     

    Attached Files:

  17. vkinetic

    vkinetic Private First Class

    Sorry, missed the ShowNew log - here it is
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Looks like combofix along with the Recovery Console (I assume you ran that) fixed the main problem.

    Did you forget to have HJT fix the below? Fix them now.
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    O4 - HKLM\..\Run: [SpywareBot] C:\Program Files\SpywareBot\SpywareBot.exe -boot

    Also you missed a few files to delete. Delete the below:
    C:\WINDOWS\SYSTEM32\ltgkoosz.dll
    C:\WINDOWS\SYSTEM32\wcmcpooj.dll
    C:\WINDOWS\SYSTEM32\ltgkoosz.dll.bak

    Then reboot and after reboot, run CCleaner

    Then attach new logs from ShowNew and HJT.

    How are things running now?
     
  19. vkinetic

    vkinetic Private First Class

    Thanks chaslang, sorry for the delay.

    I continued with the Recovery Console instructions. Neither houdxrue.sys nor nvcw32mf.sys were found in the System32\drivers directory. I continued anyway. I deleted ltgkoosz.dll, wcmcpooj.dll and ltgkoosz.dll.bak from the system32 directory - the other files in your instructions were not found.

    Ran the HJT scan - not all the lines you referred to were in the scan - in particular the 020 - winlogon Notify....jlgajlg.dll was not present.

    Rebooted, ran CCleaner and ran the HJT and ShowNew bats - logs attached.

    Two notes :-

    Firstly, one of the symptoms of this issue (it may or may not be related) was a screen with crap data in it and an 'OK' button that appeared just after the windows 'Welcome' screen - the 'OK' button had to be pressed to continue into Windows. When rebooting after the CombiFux earlier there was no such screen appearing. However after rebooting following your latest instructions, there it was again.

    Secondly, the system seems to be fine, but I won't really know until I re-install Norman and see if it generates the constant and prolific warnings about the Vundi.gen7 trojan being blocked.

    Thanks for all your help
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay that looks much better.

    Delete the below files:
    C:\Documents and Settings\Karen Croft\Local Settings\Application Data\2BEDF8C4-7C34-426D-93AA-26BB65BA4715.dat
    C:\Documents and Settings\Karen Croft\Local Settings\Application Data\2BEDF8C4-7C34-426D-93AA-26BB65BA4715.ini
    C:\Documents and Settings\Karen Croft\Local Settings\Application Data\2BEDF8C4-7C34-426D-93AA-26BB65BA4715.txt

    Now reboot!

    Do you still see the window you mentioned with junk in it?
    Can you get a snapshot of it (probably not if you cannot boot until passing it)?
    If it does still happen, does it happen when booting in safe mode?
    Also does it happen if you login to a different user account in normal boot mode.
    If you do see this Window, attach a new GetRunKey log along with a new ShowNew log.

    Reinstall your Norman Software now too and let me know if it is complaining.
     
  21. vkinetic

    vkinetic Private First Class

    hi chaslang - deleted the three files you referred to in your last post. Re-installed Norman and there are no warnings so far. However the window I was referring to that appears at start up still appears - interestingly not every time, but 9 times out of 10 it does. I've attached an screen shot of this window and the garbage that appears in that window changes every time. Yes the window also often appears when booting into safe mode. There is only one user account on this system. Aside from that everything seems fine and the system is pretty quick.

    New logs attached
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not true! Including the Administrator account which can only be used in safe mode, I see an account for Daniel and also for Karen.


    First let's fix another problem you have with a missing registry key.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now please download ProcessExplorer in preparation for later steps.
    • Unzip it to its own folder somewhere you can locate it later
    When that Window appears, leave it there and can you do the two things below?
    1. Get a HijackThis log
    2. Now run procexp.exe by double clicking on it.
      • Let's configure some options first:
        • Click View and select Show Lower Pane. And where it says "Lower Pane View" make sure DLL's is checked.
        • Now click on explorer.exe.
        • Now also under the View menu choose "Select columns" and put a check mark on "Image Path".
      • Now click on File and then Save As. And save the process list.
      • Post it back here as an attachment.
    If you can do the above while the window is present, then attach the two logs.
     
  23. vkinetic

    vkinetic Private First Class

    The reg imported your suggestion successfully. Note that I had to run Regedit from the cmd prompt as the system seems to have lost it's association with .reg files (I know how to fix this). At any rate the import was successfull.

    Two things to avoid confusion:

    1. The user accounts you see are left over from a previous installation,
    which was repaired some time ago. There are only two accounts - Daniel&KarenCroft and Administrator

    2. The window we are talking about appears at the Welcome screen at system startup, and before the log on accounts. In normal mode the system boots straight into the one and only user account (after clicking ok to the said window). In safe mode the window appears before choosing whether to log into the user account or the Administrator account

    So, if I understand your last instructions correctly, nothing can be run when that window is present. Nevertheless I followed the instructions anyway and the logs are attached.

    Thanks
     

    Attached Files:

  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If this runs before Windows Even truly starts, it will be difficult to find what it is since we cannot peak into what's running until after Windows loads. I'm also not sure if it is malware or not. Let's try something.


    Download Registry Search (see the link titled RegSearch Download Link )
    Extract the files from Regsearch.zip into a folder.
    Doubleclick regsearch.exe to start the program.
    Copy & paste the following string bdjbxxft in the top area of the form and then click "Ok".
    Notepad will be opened with text in it (the file named RegSearch.txt will be saved in the program's folder as well). Attach this file to your next reply.


    Then repeat the above for this string: dyzrmlrx

    Also tell me if you know what the below folder is for. If not, what is in this folder?
    C:\WINDOWS\SxsCaPendDel

    Also you show two Tasks that are scheduled to run:
    2007-03-28 10:07:42 C:\WINDOWS\tasks\McAfee Cleanup.job
    2007-06-20 15:55:00 C:\WINDOWS\tasks\MP Scheduled Scan.job

    The first makes not sense since you don't have McAfee. The second is related to Microsoft Windows Defender which I assume you setup to run at certain times. You should delete the McAfee task.

    Scheduled scans are cretaed via the Windows Scheduled tasks facility. Go to Control Panel, Performance and Maintenance, Scheduled tasks.

    In the menu at the top, choose Advanced, View hidden tasks
     
  25. vkinetic

    vkinetic Private First Class

    Logs from RegSearch attached.

    There are two files in the c:\windows\SxsCaPendDel folder:

    a3fb669d6377b2f47b09ff3a0ba3df87 536kB 'File' 5/06/06
    cb6e9dff8302acb40a61bfa86085a122 612kB 'File' 5/06/06

    McAfee used to be on this machine. It caused untold problems for these users and was unsinstalled and the McAfee Removal Tool was run. Obviously and not surprisingly, remnants remain.

    The scheduled task for the McAfee cleanup was deleted.

    We've had to BSOD's since this morning referring simply to a number string. Aside from those the system is working well.
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    • Run Registrar Lite
    • Copy & Paste the below registry key into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost

    • In the right side window pane, you will see two instances of something titled netsvcs. The first should be a folder (notice the yellow folder icon). The second is the item we want which is a registry value. Double click on this second instance of netsvcs (it probably has an icon with a b in it ).
    • This will bring up another window titled Data Editor. In this window in the bottom section of the forim which is titled Test: you will see a long list of words.
    • Locate the word dyzrmlrx and highlight it using your mouse.
    • Then hit backspace to delete the text
    • Then hit backspace once more to delete the blank line created by the erase
    • Then click the Apply button
    • Then Okay your way out of this window and close Registrar Lite.
    • Reboot your PC.
    After reboot are you still getting this popup at startup? If so, this may not be malware.

    Also re-run the RegSearch command looking for the dyzrmlrx string and attach a new log.
     
  27. vkinetic

    vkinetic Private First Class

    hi chaslang. Followed your instructions - the window still exists after deleting dyzrmlrx in Registrar Lite and rebooting. Ran RegSearch and the log is attached.

    Apart from the window issue the system appears to be working very well.

    Thanks for your help chaslang, you're a legend
     

    Attached Files:

  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Let's try something with MSconfig. Run MSconfig and select Diagnostic Startup then reboot and tell me if that window still appears. You can return to Normal Startup after you get this answered.
     
  29. vkinetic

    vkinetic Private First Class

    Yes, the window still appears with the diagnostic startup.

    Thanks chaslang
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  31. vkinetic

    vkinetic Private First Class

    Thanks chaslang. I read the link but I'm not convinced - I recall sometime last year another user who had exactly the same symptoms (lost file associations and that message window) and he wasn't running Ad-Aware at all. We fixed the file association issue but he decided to have me do a complete Windows re-install, so we never got to trying to solve that window at startup issue. Further, therre must be tens of thousands of users using Ad-Aware, and I would have thought that if this was a bug in that app we'd be hearing a lot more about it.

    Nevertheless I will be referring the link you provided to the support people for Norman (since Ad-Aware is a component of Norman Interent Control +) to see what they have to say about it.

    Anyways, the system you have been helping me with has been operating fine so far except for that pesky messsage, so once again your help and attention to this issue is very much appreciated :major
     
    Last edited: Jun 24, 2007
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There can be many reasons for losing file associations. I was more concerned with the fact that that link at Lavasoft was talking about the early popup windows. At this point I will have to declare your system free for malware. This problem (whatever it is) is due to something that is loading very early in the boot stage. It could be due to the fact that something needed is even missing. You may be better off discussing this in the Software Forum or with Norman since it could still be Ad-Aware relalated.

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix, you can delete the ComboFix.exe file, C:\ComboFix folder, C:\QooBox folder, and the C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds