SmitFraud, Vundo and Virtumonde can't be destroyed, and they brought friends.

Discussion in 'Malware Help (A Specialist Will Reply)' started by Kaze, Dec 21, 2006.

  1. Kaze

    Kaze Sgt. Psychobabble

    Alright, I've been battling numerous spyware over the past two days. I have no idea how I got it. Anyway, here's the deal.

    I have followed the general guide on this forum. I am in normal startup mode, but can't change anything in msconfig anyway. Supposedly, I'm not the adminstrator. This is a lie. System Restore is off.

    I have booted into safe mode with no networking numerous times and have deleted smitfraud, smitfraud toolbar888, Virtuemonde Zlod, tagasaurus and numerous tracking cookies over and over and over again with spybot. My spybot settings are correct. I have run vundofix.exe and smitfraud.exe and have deleted my trusted zones repeatedly. I have wiped out my temp files with programs such as ccleaner and atfcleaner.

    It basically breaks down that in safe mode I can annihilate everything without it coming back. Except for vundofix which sometimes has problems deleting a .dll like pmkhi.dll. I could delete it right now, but it will just be replaced with something else. When I boot into normal mode, everything comes back. Sometimes it's Vundo and Sometimes it's smitfraud and sometimes it's something completely different. Every ten minutes I run spybot and it finds something new.

    Panda scan is running at the moment, but that will obviously be taking awhile. So I figured I'd post what I have and see if I can make any headway while it does it's thing. I'm starting to be overrun with "INSTALL THIS NOW" stuff. Please end my suffering.
     

    Attached Files:

  2. Kaze

    Kaze Sgt. Psychobabble

    the other stuff
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You forgot to attach the log from running AVG Antispyware. Please attach it.

    Your log shows that you still have remnants from Symantec and McAfee trying to load services. We need get them removed too. So let's begin with them.
    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Symantec Lic NetConnect service
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Now repeat the above to Stop and Disable the below two Services (if you do not find them or get any errors, just continue):
      • McAfee Real-time Scanner
      • McAfee SystemGuards
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/paste CLTNetCnService into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now repeat the above to delete the below two Services (if you do not find them or get any errors, just continue):
      • McShield
      • McSysmon
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that in my next message after running HJT again to fix some other items.
     
    Last edited: Dec 22, 2006
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay make sure you complete the instructions in message number 3 before continuing with the below.

    Please download and install Registrar Lite Make sure you select a Majorgeeks download link and not the Authors!

    Run Registrar Lite navigate to the following key and take ownership of them (explained further down):

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE]
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_CMDSERVICE\0000]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_CMDSERVICE]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_CMDSERVICE\0000]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_CMDSERVICE]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_CMDSERVICE\0000]
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR]
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR\0000]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_NETWORK_MONITOR]
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_NETWORK_MONITOR\0000

    To take ownership of the key do the following:
    • Copy & Paste the registry key from above into the address bar of Registrar Lite and hit the enter key. This will bring you to the registry key.
    • Click-on Security in the Menu
    • Select Take Ownership
      [*]Repeat these steps for all of the registry keys given above before continue to the next steps below.
      [*]Now leave RegistrarLite running and continue
      [*]Now run the fixME.reg REGISTRY PATCH below in this message.
      [*]Tell me the results. Any error messages?
      [*]Now in RegistrarLite click View and then Refresh
      [*]Now navigate one at a time to each of the above keys we took ownership of to make sure they were deleted.
      [*]If any of the keys still exist, right click on it and select Delete. Let me know if you have to do this and if you get any error messages at this point.
    Here is the Registry Patch

    Now Copy the bold text below to notepad. Save it as fixCS.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    The above patch may not get everything and we will probably have to come back and use Registrar Lite to Edit Permissions. We will come back to that later as necessary.


    After completing ALL of the above instructions, continue here!

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of pmkhi.dll once and then click the kill button. After you have killed all of the pmkhi.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of pmkhi.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O2 - BHO: (no name) - {3FD6B99C-A275-46ea-8FD1-3D63986E51E4} - C:\WINDOWS\System32\rcsougnr.dll
    O2 - BHO: (no name) - {57882C5F-5A87-4A86-A0BF-7433A8DB1D4A} - C:\WINDOWS\System32\pmkhi.dll
    O20 - Winlogon Notify: pmkhi - C:\WINDOWS\System32\pmkhi.dll

    After clicking Fix, exit HJT.


    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Note for IE 7 users: You need to select Internet Options then the Advanced tab and then Reset Internet Explorer Settings!


    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\Common Files\{70F7CC00-081F-1033-0520-040403040001}\Update.exe
    C:\WINDOWS\system32\cjdnacic.exe
    C:\WINDOWS\system32\dfnosgwj.exe
    C:\WINDOWS\system32\ISHOST.EXE_tobedeleted
    C:\WINDOWS\system32\wnscpsv.exe
    C:\WINDOWS\system32\drvnop.dll
    C:\WINDOWS\system32\drvwor.dll
    C:\WINDOWS\system32\eabfdb_g.dll
    C:\WINDOWS\system32\nbefrich.dll
    C:\WINDOWS\system32\nhychlde.dll
    C:\WINDOWS\system32\pmkhi.dll
    C:\WINDOWS\system32\qomjhee.dll
    C:\WINDOWS\system32\rcsougnr.dll
    C:\WINDOWS\system32\rqrqrpo.dll
    C:\WINDOWS\system32\urqrrrq.dll
    C:\WINDOWS\system32\ihkmp.ini
    C:\WINDOWS\system32\jjkkj.ini
    C:\WINDOWS\system32\?dobe\w?nspool.exe
    C:\WINDOWS\Ym9i\asappsrv.dll
    C:\WINDOWS\Ym9i\command.exe
    C:\WINDOWS\Ym9i\sA62.vbs
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folder and delete if found:
    C:\Program Files\Common Files\{30F7CC00-081F-1033-0520-040403040001}
    C:\Program Files\Common Files\{70F7CC00-081F-1033-0520-040403040001}
    C:\WINDOWS\Ym9i

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Dec 22, 2006
  5. Kaze

    Kaze Sgt. Psychobabble

    I'm getting a "Unable to open service McShield for wrinting on Local Computer

    Error 5: Access is denied" message when I try to disable the real time scanner process. The other two have been deleted. It can't even be changed in safe mode.
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's okay! Remember I did say to ignore any errors and continue. If anything remains we will work on it later. Continue onto my next message.
     
  7. Kaze

    Kaze Sgt. Psychobabble

    Alright, well most of the keys that you asked me to delete are gone except

    controlset002\...\Legacy_cmdservice\0000
    currentcontrolset\...\legacy network monitor\0000
    controlset001\...\legacy network monitor\0000


    everything else dumps me into enum\root whenever I type it in, so I assume they are gone. I had to delete one in safe mode and the rest won't budge. Access denied, it says.

    Should I push on, reguardless?
     
  8. Kaze

    Kaze Sgt. Psychobabble

    I got impatient and did the rest anyway. It all went off without a hitch.

    However, I can see from runkeys that I still have network monitor issues. Additionally, HJT is listing an .exe under "ttools". Definitely not good. My zonealarm is still stoping stuff every few seconds.
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay we got some of them removed but some remain. These are the ones that are typically more stubborn because they are owned by the System (the operating system) which makes it harder to remove.

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NETWORK_MONITOR\0000
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_NETWORK_MONITOR
    HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_NETWORK_MONITOR\0000

    I want you to use Registar Lite again to navigate to each key (one at a time) by pasting them into the Address Bar and hitting return. Now this time click the Security menu item and select Edit Permissions. Here is what I expect you to see in the Group or user names area of the form:

    Everyone
    SYSTEM

    Select Everyone by clicking on it. Now at the bottom in the Permissions box click the check box for Full Control. The click Apply and then OK to get back to the main Registrar Lite screen. Now right click on the registry key and select Delete. The click View and Refresh. Check to see if the registry key just deleted truly deleted. If so, move on to the next to work thru the whole list. If it does not delete, I want you to boot into safe mode and repeat these exact same steps to see if we can do it from safe mode.

    Let me know the results. If it looks to you like they all deleted, attach a new GetRunKeys log.

    Were you running notepad and did you have a command prompt window open when you got your HJT log> I see the below running:
    C:\WINDOWS\System32\cmd.exe
    C:\WINDOWS\system32\notepad.exe

    These should not be running at the time you run HJT.

    Is your copy of Spy Sweeper a paid or free trial version?

    You are starting to clutter up your Desktop too much? Clean some of unnecessary stuff off of it now. Like the below
    Code:
     
    "C:\Documents and Settings\Administrator\Desktop\"
    aawsep~1.exe  Dec 22 2006     2855080  "aawsepersonal.exe"
    active~1.txt  Dec 21 2006        9940  "Activescan.txt"
    atf-cl~1.exe  Dec 20 2006       47104  "ATF-Cleaner.exe"
    bdscan.txt    Dec 22 2006       21500  "bdscan.txt"
    blbeta.exe    Dec 22 2006      826936  "blbeta.exe"
    counte~1.exe  Dec 22 2006    13846080  "counterspy.exe"
    fixcs.reg     Dec 22 2006         950  "fixCS.reg"
    fixme.reg     Dec 22 2006         474  "fixme.reg"
    fixvundo.exe  Dec 21 2006      166064  "FixVundo.exe"
    fixvundo.log  Dec 22 2006         265  "FixVundo.log"
    fsbl-2~1.log  Dec 22 2006        1786  "fsbl-20061222060629.log"
    fxvmonde.exe  Dec 22 2006      168592  "FxVMonde.exe"
    google~1.exe  Dec 22 2006     1140608  "GoogleToolbarInstaller.exe"
    NEF71F~1      Dec 22 2006              "New Folder (5)"
    NEF72F~1      Dec 22 2006              "New Folder (6)"
    NEWFOL~1      Dec 21 2006              "New Folder"
    NEWFOL~2      Nov 24 2006              "New Folder (2)"
    NEWFOL~3      Dec 14 2006              "New Folder (3)"
    NEWFOL~4      Dec 14 2006              "New Folder (4)"
    newtex~1.txt  Dec 21 2006         474  "New Text Document.txt"
    newtex~2.txt  Dec 21 2006        6533  "New Text Document (2).txt"
    newtex~3.txt  Dec 22 2006           0  "New Text Document (3).txt"
    newtex~4.txt  Dec 22 2006           0  "New Text Document (4).txt"
    problems.txt  Dec 22 2006          42  "problems.txt"
    reglite.exe   Dec 22 2006     2084888  "reglite.exe"
    sdsetup.exe   Dec 22 2006    10503520  "sdsetup.exe"
    SMITFR~1      Dec 20 2006              "SmitfraudFix"
    smitfr~1.exe  Dec 20 2006      731028  "SmitfraudFix.exe"
    SMITREM       Dec 21 2006              "smitRem"
    ssftri~1.exe  Oct 25 2006    13057056  "ssftrialsnrsetup5241.exe"
    utorrent.exe  Dec 10 2006      174163  "utorrent.exe"
    VUNDOFIX      Dec 22 2006              "VundoFix"
    vundofix.exe  Dec 22 2006       88064  "VundoFix.exe"
    woot222.txt   Dec 22 2006       11526  "woot222.txt" 

    Let's continue to work on your infections! You have become reinfected with more Virtumonde problems. This is likely due to the fact that your Windows version is so out of date.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of jkhhf.dll once and then click the kill button. After you have killed all of the jkhhf.dll under winlogon click ok. (If you do not find the dll, just continue on.)


    Next double click on explorer.exe and again click once on each instance of jkhhf.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    O2 - BHO: (no name) - {37218B5D-659A-43F3-84B5-A126F925AD54} - C:\WINDOWS\System32\jkhhf.dll
    O2 - BHO: (no name) - {3FD6B99C-A275-46ea-8FD1-3D63986E51E4} - C:\WINDOWS\System32\ergytgot.dll (file missing)
    O4 - HKCU\..\Run: [ttool] C:\WINDOWS\9129837.exe
    O20 - Winlogon Notify: jkhhf - C:\WINDOWS\System32\jkhhf.dll
    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now click Start, Run, and enter cmd and click OK! This will open a command prompt window. In the command prompt window enter the below commands each followed by the Enter key.
    del %windir%\temp\win*.*
    exit

    If you get an error message while doing the above command prompt step, just ignore it and continue!

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\WINDOWS\System32\ergytgot.dll
    C:\WINDOWS\system32\jkhhf.dll
    C:\WINDOWS\system32\qomjhee.dll
    C:\WINDOWS\system32\rcsougnr.dll
    C:\WINDOWS\system32\fhhkj.ini
    C:\WINDOWS\system32\jjkkj.ini
    C:\WINDOWS\9129837.exe
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).

    If Killbox does not reboot just reboot your PC yourself.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT


    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Dec 23, 2006
  10. Kaze

    Kaze Sgt. Psychobabble

    I can't update my windows because it has a peg leg and a parrot on it's shoulder. I'll probably be buying a legit version sometime here in the near future. I have a full version of spy sweeper. It is helping.

    Network monitor appears to be gone along with everything killbox annihilated. Smooth running so far.
     
  11. Kaze

    Kaze Sgt. Psychobabble

    Strange, it said the stuff was attached. Let's try this again in IE.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Yes you should get a valid license. Old versions of Windows are prone to getting more infections.

    Yes Spy Sweeper is helping. Since you have a full version of Spy Sweeper, you need to uninstall CounterSpy now to avoid conflicts and excessive use of System Resources which will slow your PC down alot. Uninstall now.

    Network monitor appears to be gone along with everything killbox annihilated. Smooth running so far.[/quote]Your logs are clean too!

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we user SDFix you can delete all the SDFix related files and folders from your Desktop or whereever you installed it.
    4. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    5. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    6. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    7. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    8. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds