Help with Trojan.DNSChanger.hg

Discussion in 'Malware Help (A Specialist Will Reply)' started by HotShot, Dec 15, 2006.

  1. HotShot

    HotShot Private E-2

    Hi all just joined to see if I can get some help with Trojan.DNSChanger.hg

    I have read & followed the READ & RUN ME FIRST thread and have attached the files in my posts.

    Basically after WoW wouldn't work due to a error saying it couldn't validate the game version and finding out some causes was trojans for that, I decided to clean my system & didn't come across any trojans they named & instead the only trojan detected was this one and WoW still ain't working sob :( so ive spent all day trying to get rid but have had no luck so far. Im hoping that will change.

    The program I used to scan at 1st was Spyware Doctor which (i didn't know when downloading) only scans and not removes infections. So im going to post the report from that in my next post along with the other log files as they can't all be attatched in one post.

    Hope someone can help and thnx for reading.
     

    Attached Files:

  2. HotShot

    HotShot Private E-2

    This is my second post to include the other log files and the info from the Spyware Doctor log:

    Scan Results:
    scan start: 15/12/2006 11:47:53
    scan stop: 15/12/2006 11:56:35
    scanned items: 98326
    found items: 25
    found and ignored: 0
    tools used: General Scanner, Process Scanner, LSP Scanner, Startup Scanner, Registry Scanner, Hosts Scanner, Browser Scanner, Browser Activity Scanner, Disk Scanner, ActiveX Scanner



    Infection Name Location Risk
    Advertising C:\Documents and Settings\Administrator\Cookies\hotshot@ad.zanox[1].txt Low
    Tracking Cookie(s) C:\Documents and Settings\Administrator\Cookies\hotshot@atwola[1].txt Low
    Advertising C:\Documents and Settings\Administrator\Cookies\hotshot@com[1].txt Low
    Tracking Cookie(s) C:\Documents and Settings\Administrator\Cookies\hotshot@fms[2].txt Low
    Tracking Cookie(s) C:\Documents and Settings\Administrator\Cookies\hotshot@gamespy[1].txt Low
    Tracking Cookie(s) C:\Documents and Settings\Administrator\Cookies\hotshot@planetelderscrolls.gamespy[1].txt Low
    Advertising C:\Documents and Settings\Administrator\Cookies\hotshot@yieldmanager[2].txt Low
    Known Bad Sites C:\Documents and Settings\Administrator\Favorites\fun stuff\flash vids\flowgo.com.url High
    Affiliated with Browser Hijackers C:\Documents and Settings\Administrator\Favorites\games\other\flash\miniclip.com - free games.url Elevated
    Affiliated with Browser Hijackers C:\Documents and Settings\Administrator\Favorites\games\other\miniclip.com - free online games, multiplayer games and more....url Elevated
    Known Bad Sites C:\Documents and Settings\Administrator\Favorites\games\the sims 2\simtentatious.url High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\0VT9YH6Y\gray-arrow[1].gif High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\0VT9YH6Y\menu-arrow[1].jpg High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8CVUHXEY\pattern-line[1].gif High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8CVUHXEY\white-arrow[1].gif High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\GM0VN2BV\in-image[1].gif High
    CWS C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\GM0VN2BV\red-arrow[1].gif High
    Trojan.Downloader.Ruins HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon##System High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters##NameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{13A1CA6E-A12C-4479-917D-99E3AACF8D61}##DhcpNameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{13A1CA6E-A12C-4479-917D-99E3AACF8D61}##NameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{6C74E91F-BBBD-4984-812A-69D616B39E74}##NameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{6CFCDAE0-D4B6-4741-90BF-930E87A909A8}##DhcpNameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{7FC4D1B7-E100-4BFF-A012-7292ECF63BDE}##DhcpNameServer High
    Trojan.DNS Changer HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{7FC4D1B7-E100-4BFF-A012-7292ECF63BDE}##NameServer
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Please install and RENAME HijackThis as requested in step 7 of the READ & RUN ME. Do this now before continuing.

    Now run please run this procedure: WareOut Removal


    Now Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
    R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
    O17 - HKLM\System\CCS\Services\Tcpip\..\{13A1CA6E-A12C-4479-917D-99E3AACF8D61}: NameServer = 85.255.115.85,85.255.112.236
    O17 - HKLM\System\CCS\Services\Tcpip\..\{6C74E91F-BBBD-4984-812A-69D616B39E74}: NameServer = 85.255.115.85,85.255.112.236
    O17 - HKLM\System\CCS\Services\Tcpip\..\{7FC4D1B7-E100-4BFF-A012-7292ECF63BDE}: NameServer = 85.255.115.85,85.255.112.236
    O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.115.85 85.255.112.236
    O17 - HKLM\System\CS1\Services\Tcpip\..\{13A1CA6E-A12C-4479-917D-99E3AACF8D61}: NameServer = 85.255.115.85,85.255.112.236
    O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.115.85 85.255.112.236
    O17 - HKLM\System\CS2\Services\Tcpip\..\{13A1CA6E-A12C-4479-917D-99E3AACF8D61}: NameServer = 85.255.115.85,85.255.112.236
    O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.115.85 85.255.112.236

    After clicking Fix, exit HJT.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  4. HotShot

    HotShot Private E-2

    OK I have done that, just checked WoW again and was able to get in without any errors. :) I have attacthed the new logs also.

    Also I would like to say thanks for you help and patience and my apologies for missing the propper setup of HJT.
     

    Attached Files:

  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot to attach the log requested in the Wareout removal procedure. We need to make sure that it did not indicate any other infected files.

    You should also run CounterSpy again and this time let it fix what it finds rather than ignoring them.

    Also you need to do the below.

    Uninstall the below old versions of software:
    J2SE Runtime Environment 5.0 Update 6
    J2SE Runtime Environment 5.0 Update 9

    Now install the current version of Sun Java from: Sun Java Runtime Environment
     
  6. HotShot

    HotShot Private E-2

    Attatched the wareout log will get onto the rest now. Thnx and sry for taking so long but time was getting on here in the uk.
     

    Attached Files:

  7. HotShot

    HotShot Private E-2

    Ok I uninstalled J2SE Runtime Environment 5.0 Update 6 & 9 as requested. I also did a fast scan with AVG Anti-Spyware 7.5 and it cam up with the same DNSChanger problem, It recommended quarintine so I did but they don't seem to have been quarantined anyway and I have attatched the report incase you need to see it.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Look for the below file and delete it! Boot to safe mode and delete if you cannot delete it in normal boot mode.

    C:\WINDOWS\SYSTEM32\KDUFR.EXE

    Did you tell AVG to FIX? It looks like you took no action?

    Did you re-run CounterSpy and have it FIX this time?

    Attach a new HJT log so I can be sure nothing came back.
     
  9. HotShot

    HotShot Private E-2

    I did get counterspy to fix what problems it showed which was msg plus and morpheus. AVG said to quarintine so I clicked on it to apply the changes but nothing seemed to have been quarantined. Also I could not locate C:\WINDOWS\SYSTEM32\KDUFR.EXE in normal or safe mode and i even used the search for files and folder option for KDUFR and KDUFR.EXE after checking manually in normal and safe mode.

    Im running counterspy again and the previous problems haven't showed up as of yet but they have usually shown by now. The new HTJ log is attatched.

    I thought maybe the problems was stored in system restore? and thats why they came back but i haven't disabled and won't unless asked to.
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Windows Search will not show hidden files unless properly configured as I will show you below. However it is still possible that the file was deleted by the FixWareOut program.

    See this to properly configure Windows Search: Searching for Hidden Files on WinXP


    Your HJT log is still clean! If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     
  11. HotShot

    HotShot Private E-2

    I did that but the DNSCHANGER.hg is still there :confused: any suggestions?
     
  12. HotShot

    HotShot Private E-2

    Oh forgot to say FixWareOut must have deleted the KDUFR.EXE as it still can't be found even using the search option which I did with the settings recommend in the Searching for Hidden Files on WinXP post.
     
  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Have you toggled system restore? If not, please do so. Did you configure the DNS settings as requested in the WareOut Removal procedure. Double check that you have done the below:

    • Go into Control Panel -->Network Connections.
    • Right click on your connection
    • and click Properties.
    • On the Properties page, highlight Internet Protocol(TCP/IP)
    • Click Properties. This will bring up another page.
    • Select Obtain DNS Server Automatically.
    • Click the ok button. The page will close.
    • Press ok on the page in front of you.
    • Restart the computer.
    • Reconnect to the Internet using Internet Explorer.
    Now check AVG!
     
  14. HotShot

    HotShot Private E-2

    Yes I did do System Restore and I did check the DNS settings after WareOut and it was already set on Obtain DNS Server Automatically and I have checked just now and its still set at that.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

  16. HotShot

    HotShot Private E-2

    Ok I just did that and have attatched the log.
     

    Attached Files:

  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It still says the file I asked you to delete is there!


    Start by downloading a tool we will need - Pocket KillBox

    Save it to its own folder somewhere that you will be able to locate it later.

    Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\SYSTEM32\KDUFR.EXE
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now run FixWareOut again and attach a new log. If it no longer shows the file, then also try running AVG Anti-Spyware and see what happens. However if, the FixWareOut log still reports that file, then run the below instead.


    Download Blacklight Beta
    • Download blbeta.exe and save it to the Desktop.
    • Once saved... double click blbeta.exe to install the program.
    • Click accept agreement and Click scan
      This app too may fire off a warning from antivirus. Let the driver load.
      Wait for it to finish.
    • If it displays any items...don't do anything with them yet. Just hit exit (close)
    • It will drop a log on Desktop that starts with fsbl....big number
    Please post contents of the BlackLight log.
     
  18. HotShot

    HotShot Private E-2

    Ok I copied:

    REGEDIT4

    [HKEY_LOCAL_MACHINE\\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "system"=-

    to notepad clicked on file/save as, put the filename as fixME.reg and set the Save as type to all files and saved to desktop. When I double clicked the fixME.reg file it says:

    "Are you sure you want to add the information in C:\Documents and Settings\Administrator\Desktop\fixME.reg to the registry?

    I click yes and then it says:

    "Cannot import C:\Documents and Settings\Administrator\Desktop\fixME.reg: Error accessing the registry.
     
  19. HotShot

    HotShot Private E-2

    OK here is an update, I just did a scan with AVG Anti-Spyware and it found the Trojan.DNSChanger.hg but this time only found 1 of it and it actually allowed me to send it to quarantine and is sitting there at the moment and this is the exact file you asked me to delete but i couoldnt find. Anyway its sat in quarantine and I have attatched the AVG Anti-Spyware log from the scan I just did.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Maybe this is part of the problem! Your registry may be locked or your permissions have been changed. Make sure you close ALL applications first and also try it in safe mode. If that does not work I will have you download a tool and I will work up a procedure to remove this registry key. Try the above while I work up a procedure that I will post anyway just incase we need it.
     
  21. HotShot

    HotShot Private E-2

    ok figred I would check if you still want me to do that? as you probably didn't catch my post as we seemed to post at the same time lol
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! Empty the Quarantine now. And then reboot and run a new AVG scan!

    Here is the fix for the locked registry key (if we still need it).

    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to the following key and take ownership of it (I explained how to do that further down).

    HKEY_LOCAL_MACHINE\\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon


    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Take Ownership
    • Now locate the system variable in the right window pane and right click on it and select Delete
    • Now in RegistrarLite click View and then Refresh
    • Is the system variable still gone.
    • Let me know if you get any error messages while doing this
    Now I would run FixWareOut one more time and attach the log!
     
  23. HotShot

    HotShot Private E-2

    Ok I did as you requested by emptying the quarantine in avg and rebooted, then did a fresh scan and the scan didn't find any problems. Do i still need to do anything? Do i have control of my registry?

    Also a big THANKS for all your help and patience so far. :)
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did FixWareOut still show the registry key infected? If not, just complete the final steps that I gave you in message # 10.
     
  25. HotShot

    HotShot Private E-2

    If im reading it correct it doesn't seem it found anything and I have attacthed the log just incase Im wrong. Will do the final steps now.
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're right it was good this time! :) All clean now! ;)
     
  27. HotShot

    HotShot Private E-2

    Did the steps and want to say thnx once again for all the help. :)
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf Safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds