Malware for sure!

Discussion in 'Malware Help (A Specialist Will Reply)' started by 4949BobR, Apr 13, 2007.

  1. 4949BobR

    4949BobR Private E-2

    I ran Spybot S+D and AdAware SE to try to clean up a problem (browser being redirected to Spyware clean-up purchase sites, false IE messages, blank pages etc) but to no avail. Followed up with additional research which led me here and thought I had smitFraud (saw it in AdAware and from descriptions here). Ran through the special removal procedure for it described in another thread (HijackThis, smitRem, Panda Activescan). The problem has not been alleviated. I went through all the lines in the HijackThis scan and looked for the files listed using Windows explorer, but none of then were found on my computer. I have attached the two logs- smitfiles.txt and activescan.txt. Any advice would be appreciated, and thanks for the great website!
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    You have a load of malware problems! You need to run our standard cleaning procedure but first before getting to that, I have one additional procedure to run using a program named ComboFix!

    1. Download this file - combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it will produce a log for you. Attach this log to your next reply
    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.


    Please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, renaming, running, and posting HijackThis logs as attachments.
    • Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support
    • Make sure you check version numbers and get all updates.
    • Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.
    • After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:
    Make sure you also rename HijackThis.exe as suggested in the procedures. Use analyse.exe for the new name. This is very important due to some new infections going around.
    • When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too:
      • ComboFix log
      • CounterSpy - only for Windows XP, 2K, & NT users
      • AVG Antispyware log - ONLY IF NEEDED you were not able to run CounterSpy. - only for Windows XP, 2K, & NT users
      • Bitdefender - from step 6
      • Panda Scan - from step 6
      • runkeys.txt - the log from GetRunKey.bat
      • newfiles.txt - the log from ShowNew.bat
      • HijackThis
    NOTE: You can only attach 3 files in a single message so it will require that you use three messages to attach all of these logs!
     
  3. 4949BobR

    4949BobR Private E-2

    Thanks for getting back. Attached are the CombiFix files created. I'll get right on to the rest of the procedure.
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! ComboFix fixed a load of problem should make the rest of our job a little easier. ;)
     
  5. 4949BobR

    4949BobR Private E-2

    Okay. I have followed the Malware removal guide through to step 6b. Man, some of those scans take a loooong time! But no pain no gain I guess!! I was unable to run CounterSpy- it choked the three times I tried. AVG Anti-Spyware ran and the log is attached. I followed that with Bitdefender and then Panda Activescan and the logs are attached as well. I was able to run CCleaner and SB S+D in safe mode but couldn't connect to the net in safe mode with network support so had to run Bitdefender and Panda Activescan in normal mode. Remaining logs to come in next post.
     

    Attached Files:

  6. 4949BobR

    4949BobR Private E-2

    Here are the last of the log files- from getrunkey and shownew and the new HJT log file. I am waiting on step 8 (the toggle System Restore) because the problems haven't been solved. I'll look at the alternative scans suggested but will wait for any input before proceeding. Thanks again:)
     

    Attached Files:

  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We have a lot to do! Since this is going to be a long procedure, I'm going to break it into two messages. Complete the steps in this message first!!


    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!
    • Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Take Ownership
    • Repeat these steps for all of the registry keys given above before continue to the next steps below.
    • Now leave RegistrarLite running and continue
    • Now run the fixME.reg REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages?
    • Now in RegistrarLite click View and then Refresh
    • Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
    • If any of the keys still exist, move on down to PART 2 - Setting Permissions for Everyone below!.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixCMD.reg to your desktop. Be sure the Save as type is set to all files Once you have saved it double click it and allow it to merge with the registry.

    PART 2 - Setting Permissions for Everyone
    Run the below if some of the registry keys still exist after running the above steps.

    Now I want you to use Registar Lite again to navigate to each of the below keys (one at a time) by pasting them into the Address Bar and hitting return. But this time click the Security menu item and select Edit Permissions so we can change permissions to everyone ( I describe this down below the list of registry keys).
    After click Edit Permissions , here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Nowright click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Note: If you don't see the Everyone group, choose your user account name (if it shows) otherwise choose Administrator (if it shows).

    Then reboot your PC! And move on to my next message!
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After completing the instructions in my previous message, continue on with the below.

    Uninstall the Sunbelt CounterSpy trial since we are finished with it now! Then delete the below two folders which may be left behind by the uninstall:
    C:\Documents and Settings\All Users\Application Data\Sunbelt Software
    C:\Program Files\Sunbelt Software

    Continue by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of ddcyv.dll once and then click the kill button. After you have killed all of the ddcyv.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrpmno.dll
    wvuvuut.dll


    Next double click on explorer.exe and again click once on each instance of ddcyv.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrpmno.dll
    wvuvuut.dll

    Next double click on iexplore.exe and again click once on each instance of ddcyv.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rqrpmno.dll
    wvuvuut.dll

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {217DBA6A-A3B4-432A-A8BE-D83674AA316B} - C:\WINDOWS\system32\ddcyv.dll
    O2 - BHO: (no name) - {57E218E6-5A80-4f0c-AB25-83598F25D7E9} - C:\WINDOWS\system32\fbjjfiat.dll
    O2 - BHO: (no name) - {67C55A8D-E808-4caa-9EA7-F77102DE0BB6} - (no file)
    O2 - BHO: (no name) - {970D022E-A884-4D2A-BB4A-EBC22D2FEBD2} - C:\WINDOWS\system32\rqrpmno.dll
    O2 - BHO: (no name) - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
    O3 - Toolbar: (no name) - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - (no file)
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [AlcxMonitor] ALCXMNTR.EXE
    O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\Run: [SoundService] rundll32.exe "C:\WINDOWS\system32\gfyiquva.dll",setvm
    O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_01\bin\jusched.exe"
    O20 - Winlogon Notify: ddcyv - C:\WINDOWS\system32\ddcyv.dll
    O20 - Winlogon Notify: rqrpmno - C:\WINDOWS\SYSTEM32\rqrpmno.dll
    O20 - Winlogon Notify: wvuvuut - C:\WINDOWS\SYSTEM32\wvuvuut.dll

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\Documents and Settings\HP_Owner\net.exe
    C:\Documents and Settings\Net Access\Desktop\net.exe
    C:\Documents and Settings\Net Access\net.exe
    C:\Documents and Settings\You Others\Local Settings\Temp\install.exe
    C:\Documents and Settings\You Others\Local Settings\Temp\nsg202.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsk1EF.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsm209.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nso186.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nso1A5.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nso223.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsp218.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nst1D0.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsx1C6.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsx210.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsy1AD.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temp\nsz1FB.tmp\Telecharger.dll
    C:\Documents and Settings\You Others\Local Settings\Temporary Internet Files\Content.IE5\DW0GOKK9\installdrivecleanerstart[1].exe
    C:\Documents and Settings\You Others\Local Settings\Temporary Internet Files\Content.IE5\DW0GOKK9\new[1].exe
    C:\WINDOWS\IA\KE.vbs
    C:\WINDOWS\system32\net.exe
    C:\WINDOWS\system32\oo.exe
    C:\WINDOWS\system32\awxjhgns.dll
    C:\WINDOWS\system32\ddcyv.dll
    C:\WINDOWS\system32\fbjjfiat.dll
    C:\WINDOWS\system32\gfyiquva.dll
    C:\WINDOWS\system32\hposdiqf.dll
    C:\WINDOWS\system32\nwmfwaot.dll
    C:\WINDOWS\system32\pbsjdtrc.dll
    C:\WINDOWS\system32\rqrpmno.dll
    C:\WINDOWS\system32\rtqunpgd.dll
    C:\WINDOWS\system32\vamdxhvk.dll
    C:\WINDOWS\system32\wvuvuut.dll
    C:\WINDOWS\system32\vycdd.bak1
    C:\WINDOWS\system32\vycdd.bak2
    C:\WINDOWS\system32\vycdd.bakt
    C:\WINDOWS\system32\dgpnuqtr.tmp
    C:\WINDOWS\system32\vycdd.tmp
    C:\WINDOWS\system32\avuqiyfg.ini
    C:\WINDOWS\system32\aybeg.ini
    C:\WINDOWS\system32\dgpnuqtr.ini
    C:\WINDOWS\system32\dgpnuqtr.ini2
    C:\WINDOWS\system32\ehkmp.ini
    C:\WINDOWS\system32\gjjlm.ini
    C:\WINDOWS\system32\hhrhnape.ini
    C:\WINDOWS\system32\vycdd.ini
    C:\WINDOWS\system32\vycdd.ini2
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But if you do get this message, please let me know!)

    If Killbox does not reboot just reboot your PC yourself.

    Now run Ccleaner!

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  9. 4949BobR

    4949BobR Private E-2

    Hi Chaslang, thanks for getting back. I'm just a little confused. You say: "Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key."

    Does this mean from the getrunkey file? What part do I paste, everything including the [...] or just what is inside? Also, what about the stuff that is in quotation marks- just ignore it?
     
  10. 4949BobR

    4949BobR Private E-2

    I have worked through all those tasks- wow! Had no problem merging the fixCMD.reg- no error messages. Most of the listed keys were still there after registrarlite but couldn't find the last two groups: CmdService and Network_monitor. Attached are the three last logs run after Killbox and CCleaner. I don't think its quite done yet though since I just got a pop-up (rond.starsdoor.com/?.....). Thanks again for all the help. I think we are close!
     

    Attached Files:

  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    We will come back to the CmdService and Network_Monitor issues later after I get a chance to work up a new procedure. It has spread into more keys! Let's address a bunch of other problems first.

    First goto Add/Remove Programs and uninstall Network Monitor
    • Now Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Command Service
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now repeat the above to Stop and Disable the below two Services (if you do not find them or get any errors, just continue):
      • Client IP-IPX
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste cmdService into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now repeat the above to delete the below two Services (if you do not find them or get any errors, just continue):
      • Client IP-IPX
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Now make sure do not open any uncessary processes running (i.e. Limewire..etc))
    Also make sure that one and only one Internet Explorer browser is opened up

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of mljjk.dll once and then click the kill button. After you have killed all of the mljjk.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs(If you do not find the dll, just continue on):
    pmnlljh.dll

    Next double click on explorer.exe and again click once on each instance of mljjk.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    pmnlljh.dll
    Next double click on iexplore.exe and again click once on each instance of mljjk.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    pmnlljh.dll

    Now just exit Process Explorer.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.
    C:\WINDOWS\IA\command.exe
    C:\Program Files\Ipwindows\ipwins.exe
    C:\Program Files\Common Files\{7CEC0A80-0C81-1033-0216-050823200002}\Update.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {03F2F280-86EF-4574-9F77-7D8229DBBC49} - C:\WINDOWS\system32\mljjk.dll
    O2 - BHO: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{3CEC0~1\Bar888.dll
    O3 - Toolbar: Bar888 - {C1B4DEC2-2623-438e-9CA2-C9043AB28508} - C:\PROGRA~1\COMMON~1\{3CEC0~1\Bar888.dll
    O4 - HKLM\..\Run: [AlcWzrd] ALCWZRD.EXE
    O4 - HKCU\..\Run: [IpWins] "C:\Program Files\Ipwindows\ipwins.exe"
    O20 - Winlogon Notify: mljjk - C:\WINDOWS\system32\mljjk.dll
    O20 - Winlogon Notify: pmnlljh - C:\WINDOWS\SYSTEM32\pmnlljh.dll
    O23 - Service: Client IP-IPX - Unknown owner - C:\WINDOWS\system32\svchosts.exe" -e mc-110-12-0000627 (file missing)
    O23 - Service: Command Service (cmdService) - Unknown owner - C:\WINDOWS\IA\command.exe

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\system32\net.exe
    C:\WINDOWS\system32\svchosts.exe
    C:\WINDOWS\system32\unsvchosts.exe
    C:\WINDOWS\system32\wnscpisv32.exe
    C:\WINDOWS\system32\awxjhgns.dll
    C:\WINDOWS\system32\efcawvt.dll
    C:\WINDOWS\system32\hposdiqf.dll
    C:\WINDOWS\system32\mljjk.dll
    C:\WINDOWS\system32\nwmfwaot.dll
    C:\WINDOWS\system32\pmnlljh.dll
    C:\WINDOWS\system32\pmnmmjg.dll
    C:\WINDOWS\system32\rtqunpgd.dll
    C:\WINDOWS\system32\vamdxhvk.dll
    C:\WINDOWS\system32\vrokyucx.dll
    C:\WINDOWS\system32\wvusqon.dll
    C:\WINDOWS\system32\atmtd.dll.tmp
    C:\WINDOWS\system32\kjjlm.ini
    C:\WINDOWS\IA\command.exe
    C:\Program Files\Ipwindows\ipwins.exe
    C:\Program Files\Common Files\{7CEC0A80-0C81-1033-0216-050823200002}\Update.exe
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But if you do get this message, please let me know!)

    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folder and delete if found:
    C:\WINDOWS\IA
    C:\Program Files\InetGet2
    C:\Program Files\Ipwindows
    C:\Program Files\Network Monitor
    C:\Program Files\Common Files\{3CEC0A80-0C81-1033-0216-050823200002}
    C:\Program Files\Common Files\{7CEC0A80-0C81-1033-0216-050823200002}

    Now run this procedure: DelCmdService - How to use but when it asks for the GetRunKey log you can either get it then or below. I only need one instance.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!
     
  12. 4949BobR

    4949BobR Private E-2

    Hi again chaslang,

    All went well with the latest instructions except for the first item... the uninstall file for network monitor was not there so couldn't run it. Attached are the last log files. I have done a half hour's worth of surfing and nothing has come up yet:D . Fingers are crossed! Is it on to the toggling of the system restore next? Thanks again and talk to you later...
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not yet! You still have some items to remove including the more of Network Monitor. I'll put together another fix soon.

    Get me a log from this: Getting Uninstall Programs List From The Registry
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Also please run ComboFix again! You have some left overs from PurityScan. Attach the new ComboFix log.
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    After complete the steps in messages # 13 & 14 continue with the below.


    Run Registrar Lite navigate to each of the following keys (one at a time) and take ownership of them (I explained how to do that further down).

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_NETWORK_MONITOR

    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the Address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the top Menu
    • Select Take Ownership
    • Repeat these steps for all of the registry keys given above before continue to the next steps below.
    • Now leave RegistrarLite running and continue
    • Now run the fixME.reg REGISTRY PATCH below in this message.
    • Tell me the results. Any error messages?
    • Now in RegistrarLite click View and then Refresh
    • Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
    • If any of the keys still exist, move on down to PART 2 - Setting Permissions for Everyone below!.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixNM.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    PART 2 - Setting Permissions for Everyone
    Run the below if some of the registry keys still exist after running the above steps.

    Now I want you to use Registar Lite again to navigate to each of the below keys (one at a time) by pasting them into the Address Bar and hitting return. But this time click the Security menu item and select Edit Permissions so we can change permissions to everyone ( I describe this down below the list of registry keys).
    After click Edit Permissions , here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Nowright click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Now exit Registrar Lite if still running.


    Now Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of awxjhgns.dll once and then click the kill button. After you have killed all of the awxjhgns.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    jwfvbbrj.dll
    nwmfwaot.dll
    rtqunpgd.dll
    tcdimbbg.dll
    vamdxhvk.dll


    Next double click on explorer.exe and again click once on each instance of awxjhgns.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    jwfvbbrj.dll
    nwmfwaot.dll
    rtqunpgd.dll
    tcdimbbg.dll
    vamdxhvk.dll


    Next double click on iexplore.exe and again click once on each instance of awxjhgns.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    jwfvbbrj.dll
    nwmfwaot.dll
    rtqunpgd.dll
    tcdimbbg.dll
    vamdxhvk.dll


    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {970D022E-A884-4D2A-BB4A-EBC22D2FEBD2} - C:\WINDOWS\system32\pmnlljh.dll (file missing)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    • select File, Cleanup, Delete All Backups
    • Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    • Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\Common Files\{7CEC0A80-0C81-1033-0216-050823200002}\Update.exe
    C:\WINDOWS\system32\awxjhgns.dll
    C:\WINDOWS\system32\jwfvbbrj.dll
    C:\WINDOWS\system32\nwmfwaot.dll
    C:\WINDOWS\system32\rtqunpgd.dll
    C:\WINDOWS\system32\tcdimbbg.dll
    C:\WINDOWS\system32\vamdxhvk.dll
    C:\WINDOWS\system32\kjjlm.bak2
    C:\WINDOWS\system32\kjjlm.tmp
    C:\WINDOWS\system32\kjjlm.ini2
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But if you do get this message, please let me know!)

    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!
    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  16. 4949BobR

    4949BobR Private E-2

    Hi chaslang,

    Here are the results from the latest processes- GetUnKey and combofix. No problems while running these.
     

    Attached Files:

  17. 4949BobR

    4949BobR Private E-2

    4 of the 6 network_monitor keys were deleted automatically but the ones in controlset002 had to be done by hand in Part 2. No errors in any of the ***.reg merges. I didn't find any of the list of dll in Process Explorer in any of the 3 sections so I just kept going. HJT and Killbox went okay, and these are the remainder of the logs for GetRunKey, ShowNew and HJT. There was an odd question after reboot. While starting up Internet Explorer it asked something like: "IE is not your default browser would you like to make it default?" I answered yes- hope this wasn't something trying to get back in:eek:
    Thanks again for this handholding- its been an education!
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Does the below file exist?

    C:\WINDOWS\uninstall_nmon.vbs

    If so, please put a copy of it into a ZIP file and attach it here.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Are you sure you are deleting all the files with Killbox? Are you using the correct options and following all directions? Are you getting the Pending operations error I asked about. The files I asked you to delete are still there and there are no copies of them in the Killbox backup. That means you are not deleting them. The below still exist and need to be deleted. Try again.


    C:\WINDOWS\system32\awxjhgns.dll
    C:\WINDOWS\system32\hposdiqf.dll
    C:\WINDOWS\system32\nwmfwaot.dll
    C:\WINDOWS\system32\rtqunpgd.dll
    C:\WINDOWS\system32\vamdxhvk.dll
    C:\WINDOWS\system32\dgpnuqtr.ini

    Then attach a new log from ShowNew!

    Now attach a new log from ShowNew. How are things currently working?
     
  19. 4949BobR

    4949BobR Private E-2

    Hi,

    C:\WINDOWS\uninstall_nmon.vbs does not exist. I did a search of My Computer and the only place "uninstall_nmon.vbs" showed up was in zip file in C:\documents and settings\all users\spybot search and destroy\recovery named NetworkMonitor.zip. I have attached both to this message. There are also a whole bunch of other zips there named DelfinProject, CommandService, Smitfraud and Smitfraudtoolbar and webHancer. I re-did the Pocket Killbox steps as described: deleting all backups and temp files then selecting delete on reboot, all files and then copying the list into the clipboard, choosing paste from clipboard clicking the red and white button and yes to delete on reboot. This time (though never before) I got the Pending operations message, clicked okay. It didn't reboot so I did it myself. After reboot I started Killbox again and checked to see if the files were still there, and they were, so I did the whole procedure again and they still were there. Again I started Killbox. This time I pasted the list of files one at a time and did standard kill clicking through to "success". I rebooted and did a search for the files and they can't be found now. I am also attaching the ShowNew log. As far as how everything is working now, it all seems to be good. I haven't had any pop-ups, blank pages or MSN or hotmail problems at all.
     

    Attached Files:

  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay you are all clean now! Make sure you delete the ZIP files you put on your Desktop;
    Code:
    "C:\Documents and Settings\HP_Owner\Desktop\"
    networ~1.zip  Apr  9 2007        1590  "NetworkMonitor.zip"
    networ~2.zip  Apr 10 2007        1590  "NetworkMonitor7.zip"
    
    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you run Avenger, you can delete all files related to Avenger now.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    8. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    9. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  21. 4949BobR

    4949BobR Private E-2

    Hi chaslang,

    Its been a couple of days now since being declared clean, and things still seem to be okay. I just wanted to come back and thank you for the help that you provided and the time you have spent for me and for all the others you are helping. It is very sad that this sort of help is needed- the maliciousness of malware can be devastating at worst and at least a huge waste of time and resources. My advice to anyone reading this-and I have done them myself- clean up your computer, install anti-spyware software and a secure as possible firewall, and keep it all up to date. Do it now before you are infected because eventually you will be. Thanks again chaslang and best wishes to you:)
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome Bob!

    Thanks for coming back and letting us know things are still looking good and for sharing your thoughts which are an echo of our How to protect thread's message. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds