Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How To Remove Antivirgear (removal Instructions)


  • Please log in to reply
12 replies to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 14 September 2007 - 11:07 AM


How to remove AntiVirGear (Removal Instructions)

What these programs do: AntiVirGear is a rogue anti-spyware program which is installed via Zlob Trojan infections. Zlob Trojans are malware which masquerade as video or audio codecs which state they are required to be installed if you want to watch a particular movie or listen to a particular audio file found on the Internet. In reality, these files will instead install the AntiVirGear program as well as other malware onto your computer. These installations are typically done behind the scenes without your permission or knowledge. When the Zlob infection is first launched on your computer it will display fake security alerts and automatically download the AntiVirGear program. When AntiVirGear has finished installing, it will automatically launch and scan your computer for spyware. When it has finished it will display a list of exaggerated or fake results and require you to purchase the full software in order to remove them. These results, though, are fake and are being used as a method to scare you into purchasing the software. Regardless of what this program displays, you should not purchase AntiVirGear. A screenshot of AntiVirGear can be found below.
AntiVirGear Screenshot
AntiVirGear Screenshot
As said previously when the Zlob infection is started it will display fake security alerts in your Windows taskbar. These alerts will say there is a problem with your computer or infected with malware. These alerts are all false and are just being used to scare you into purchasing the software. If you click on the alert, it will automatically launch AntiVirGear and do a scan. The current text of the fake security alert is:

System has detected a number of active spyware applications that may impact the performance of your computer. Click the icon to get rid of unwanted spyware by downloading an up-to-date anti-spyware solution. An example of the fake alert is shown below:
AntiVirGear Fake Security alert
AntiVirGear Fake Security alert

This guide will remove the Zlob Trojan which displays the fake security alerts, the AntiVirGear program, and other malware that are typically installed with these programs.
Tools Needed for this fix: Symptoms in a HijackThis Log:

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http ://ffinder.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http ://ffinder.com/
O2 - BHO: ieffse32.msdn_hlp - {C1C6426B-FB16-4123-ACBE-74D94FB0E663} - C:\WINDOWS\system32\ieffse32.dll
O4 - HKLM\..\Run: [AntiVirGear 3.7] "C:\Program Files\AntiVirGear 3.7\AntiVirGear 3.7.exe" /h
O4 - HKLM\..\Run: [AntiVirGear 3.8] "C:\Program Files\AntiVirGear 3.8\AntiVirGear 3.8.exe" /h
*O10 - Unknown file in Winsock LSP: c:\windows\system32\laf1.dll
**O22 - SharedTaskScheduler: haruspicy - {60dea04c-9817-4309-bfa2-f8a1766c3cd1} - C:\WINDOWS\system32\jrpkmgh.dll

*Note: DO NOT delete this file manually. The file name associated with the LSP may have a different number in it (Ie. laf2.dll or laf3.dll).

**Note
: The file name associated with the O22 changes frequently.

Add/Remove Programs control panel entry:

AntiVirGear 3.7
AntiVirGear 3.8

Guide Updates: 09/14/07 - Initial guide creation.
09/25/07 - Updated guide to remove symptoms and LSP infection. LSP infections are a new attack vector for Zlob installed Rogues.
09/27/07 - Guide updated to include new LSP removal instructions.
09/28/07 - Removed LSP instructions as SmitFraudFix now removes them.
09/29/07 - Updated guide for the AntiVirGear 3.8 version.



Choose the removal method you would like to use:
Automated Removal Instructions for AntiVirGear:
  1. Print out these instructions as we will need to close every window that is open later in the fix.

  2. Download SmitfraudFix.exe from here and save it to your desktop:

    SmitFraudFix.exe

    Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:



  3. Next, please reboot your computer into Safe Mode by doing the following:

    1. Restart your computer

    2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.

    3. Instead of Windows loading as normal, a menu should appear

    4. Select the first option, to run Windows in Safe Mode.

    5. When you are at the logon prompt, log in as the same user that you had performed the previous steps as.

  4. When your computer has started in safe mode, and you see the desktop, close all open Windows.

  5. Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:



  6. When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.

  7. You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).



  8. The program will start cleaning your computer and go through a series of cleanup processes. When SmitFraudFix is done, it will automatically start the Disk Cleanup program as shown by the image below.





    This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 11.

  9. When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
  10. When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.
  11. Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log, and when you are done, close the Notepad screen.
Your computer should now be free of the AntiVirGear infection. If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Posting A Hijackthis Log


Manual Removal Instructions for AntiVirGear:

These steps may appear to be long and daunting. They are, though, quite easy to do and consist of so many steps only because I have written them in an extremely detailed manner.
  1. Print out these instructions as we will need to close every window that is open later in the fix.

  2. Download FixAVG.reg to your desktop by right clicking on the following link and then selecting Save Link As or Save File as, depending on your browser.

    FixAVG.reg Download Link

    Confirm that the file FixAVG.reg now resides on your desktop as we will need it later.

  3. Download SmitfraudFix.exe from here and save it to your desktop:

    SmitFraudFix.exe

    Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:



  4. Go to your desktop and double click on the FixAVG.reg file that you downloaded earlier. When it asks if you would like to merge the information, press the Yes button and then the OK button.

  5. Click on the Start button and then select the Run option.

  6. In the Open: field type c:\windows\system32 and then press the OK button.

  7. When the folder appears, if it says These files are hidden, click on the Show the contents of this folder option.

  8. We now need to make it so you can see hidden files.
    1. Click on the Tools menu and select Folder Options.
    2. Click on the View tab.
    3. Under the Hidden files and folders category select Show hidden files and folders.
    4. Uncheck Hide protected operating system files.
    5. Press Apply and then OK.
    6. If you still can not see the file, then undo these changes and skip to step 11.

  9. Scroll through the list of files in this folder and look for wqzdtjg.dll. Right-click on wqzdtjg.dll and select rename. Rename the file to wqzdtjg.dll.bad.

    Look for the file ddllup.dll and rename the file to ddllup.dll.bad

    Look for the file vmlwp.dll and rename the file to vmlwp.dll.bad

    Look for the file lgaac.dll and rename the file to lgaac.dll.bad

    Look for the file iheuv.dll and rename the file to iheuv.dll.bad

    Look for the file pluwue.dll and rename the file to pluwue.dll.bad

    Look for the file zdhgsp.dll and rename the file to zdhgsp.dll.bad

    Look for the file jrpkmgh.dll and rename the file to jrpkmgh.dll.bad

    Look for the file swqzdtj.dll and rename the file to swqzdtj.dll.bad

    Look for the file vusxqm.dll and rename the file to vusxqm.dll.bad

    Look for the file rnxwph.dll and rename the file to rnxwph.dll.bad

    Look for the file vzfhprk.dll and rename the file to vzfhprk.dll.bad

    Look for the file hymww.dll and rename the file to hymww.dll.bad

    Look for the file mvwqn.dll and rename the file to mvwqn.dll.bad

    Look for the file veptlh.dll and rename the file to veptlh.dll.bad

    Look for the file rmtdvc.dll and rename the file to rmtdvc.dll.bad

    Look for the file hteogat.dll and rename the file to hteogat.dll.bad

    Look for the file txxkb.dll and rename the file to txxkb.dll.bad

    Look for the file fifzqip.dlland rename the file to fifzqip.dll.bad

    Look for the file flirek.dll and rename the file to flirek.dll.bad

    Look for the file gdrtul.dll and rename the file to gdrtul.dll.bad

    Look for the file siiyal.dll and rename the file to siiyal.dll.bad

    Look for the file sttwrd.dll and rename the file to sttwrd.dll.bad

    Look for the file rrtrit.dll and rename the file to rrtrit.dll.bad

    Look for the file clbrcek.dll and rename the file to clbrcek.dll.bad

    Look for the file gaaplp.dll and rename the file to gaaplp.dll.bad

    Look for the file mxhfjy.dll and rename the file to mxhfjy.dll.bad

    Look for the file beahahl.dll and rename the file to beahahl.dll.bad

    Look for the file ugbtna.dll and rename the file to ugbtna.dll.bad

    Look for the file fqgwiw.dll and rename the file to fqgwiw.dll.bad

    Look for the file itdtjjf.dll and rename the file to itdtjjf.dll.bad

    Look for the file yneid.dll and rename the file to yneid.dll.bad

    Look for the file bqrcr.dll and rename the file to bqrcr.dll.bad

    Look for the file eulbn.dll and rename the file to eulbn.dll.bad

    Look for the file fnczfh.dll and rename the file to fnczfh.dll.bad

    Look for the file aghmao.dll and rename the file to aghmao.dll.bad

    Look for the file dsibr.dll and rename the file to dsibr.dll.bad

    Look for the file xovdzz.dll and rename the file to xovdzz.dll.bad

    Look for the file vtewupi.dll and rename the file to vtewupi.dll.bad

    Note: Please rename any of the above files that you may find. If you do not find any of these files, then you should post a note about it in the Am I Infected? forum.
  10. After you rename the file, you can close the System32 folder window.

  11. Next, please reboot your computer into Safe Mode by doing the following:

    1. Restart your computer

    2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.

    3. Instead of Windows loading as normal, a menu should appear

    4. Select the first option, to run Windows in Safe Mode.

    5. When you are at the logon prompt, log in as the same user which you had done the previous steps.

  12. When your computer has started in safe mode and you see the desktop, click on the Start Menu button.

  13. Click on the Control Panel option.

  14. Double-click on the Add or Remove Programs icon.

  15. Find the entry for AntiVirGear 3.7, AntiVirGear 3.8, and Online Video Add-on and double-click on them to uninstall them if found. Follow the prompts to uninstall the program, but do not allow it to reboot the computer if it asks.

  16. When it has completed uninstalling you can close Add or Remove Programs and your Control Panel.

  17. Delete the following files and folders (Do not be concerned if a folder does not exist):

    C:\Windows\System32\wqzdtjg.dll.bad
    C:\Windows\System32\ddllup.dll.bad
    C:\Windows\System32\vmlwp.dll.bad
    C:\Windows\System32\lgaac.dll.bad
    C:\Windows\System32\iheuv.dll.bad
    C:\Windows\System32\pluwue.dll.bad
    C:\Windows\System32\zdhgsp.dll.bad
    C:\Windows\System32\jrpkmgh.dll.bad
    C:\Windows\System32\swqzdtj.dll.bad
    C:\Windows\System32\vusxqm.dll.bad
    C:\Windows\System32\rnxwph.dll.bad
    C:\Windows\System32\vzfhprk.dll.bad
    C:\Windows\System32\hymww.dll.bad
    C:\Windows\System32\mvwqn.dll.bad
    C:\Windows\System32\veptlh.dll.bad
    C:\Windows\System32\rmtdvc.dll.bad
    C:\Windows\System32\hteogat.dll.bad
    C:\Windows\System32\txxkb.dll.bad
    C:\Windows\System32\fifzqip.dll.bad
    C:\Windows\System32\flirek.dll.bad
    C:\Windows\System32\gdrtul.dll.bad
    C:\Windows\System32\siiyal.dll.bad
    C:\Windows\System32\sttwrd.dll.bad
    C:\Windows\System32\rrtrit.dll.bad
    C:\Windows\System32\clbrcek.dll.bad
    C:\Windows\System32\ugbtna.dll.bad
    C:\Windows\System32\gaaplp.dll.bad
    C:\Windows\System32\mxhfjy.dll.bad
    C:\Windows\system32\beahahl.dll.bad
    C:\Windows\System32\fqgwiw.dll.bad
    C:\Windows\System32\itdtjjf.dll.bad
    C:\Windows\System32\yneid.dll.bad
    C:\Windows\System32\bqrcr.dll.bad
    C:\Windows\System32\eulbn.dll.bad
    C:\Windows\System32\aghmao.dll.bad
    C:\Windows\System32\fnczfh.dll.bad
    C:\Windows\System32\dsibr.dll.bad
    C:\Windows\System32\xovdzz.dll.bad
    C:\Windows\System32\vtewupi.dll.bad
    C:\Windows\System32\cfg.dat
    C:\Windows\System32\ieffse32.dll
    C:\Windows\System32\lbf.tme
    C:\Windows\System32\regmod.exe
    C:\Program Files\AntiVirGear 3.7\
    C:\Program Files\AntiVirGear 3.8\
  18. Close all open Windows.

  19. Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:


  20. When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.

  21. You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).



  22. The program will start cleaning your computer and go through a series of cleanup processes. When it is done, it will automatically start the Disk Cleanup program as shown by the image below.





    This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 25.

  23. When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
  24. When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.

  25. Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log to see what files were found, and when you are done, close the Notepad screen.

  26. We next perform an online scan with Panda to find any possible inactive remnants from this infection: Panda Online

    1. Once you are on the Panda site click the Scan your PC button

    2. A new window will open...click the Check Now button

    3. Enter your Country

    4. Enter your State/Province

    5. Enter your e-mail address and click send

    6. Select either Home User or Company

    7. Click the big Scan Now button

    8. If it wants to install an ActiveX component allow it

    9. It will start downloading the files it requires for the scan (Note: It may take a few minutes)

    10. When download is complete, click on Local Disks to start the scan

  27. When the online scan has been completed, let it remove what it finds, and then you can close Internet Explorer.
Your computer should now be free of the AntiVirGear infection. If you are still having problems with your computer after completing these instructions, then please follow the steps outlined in the topic linked below:
Preparation Guide For Use Before Posting A Hijackthis Log


This is a self-help guide. Use at your own risk.

BleepingComputer.com can not be held responsible for problems that may occur by using this information. If you would like help with any of these fixes, you can post a HijackThis log in our HijackThis Logs and Analysis forum.

If you have any questions about this self-help guide then please post those questions in our AntiVirus, Firewall and Privacy Products and Protection Methods forum and someone will help you.


BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 14 September 2007 - 02:54 PM

Updated for new infector:

C:\Windows\System32\ddllup.dll

#3 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 17 September 2007 - 10:58 AM

Updated for new infector:

C:\Windows\System32\vmlwp.dll

#4 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 20 September 2007 - 09:57 AM

Updated for new infector: C:\Windows\System32\lgaac.dll

#5 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 23 September 2007 - 08:45 AM

Updated for new AntiVirGear infector:

C:\Windows\System32\pluwue.dll

#6 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 23 September 2007 - 07:58 PM

Updated for new AntiVirGear infector:

C:\Windows\System32\zdhgsp.dll

#7 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 27 September 2007 - 07:38 PM

Updated for 3 new infectors:

C:\Windows\System32\swqzdtj.dll
C:\Windows\System32\vusxqm.dll
C:\Windows\System32\rnxwph.dll

Also also misc file deletions and how to remove the LSP files.

#8 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 29 September 2007 - 06:02 PM

Updated for new infector and version:

C:\Windows\System32\vzfhprk.dll

#9 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 02 October 2007 - 03:51 PM

Updated for the new infectors:

C:\Windows\System32\hymww.dll.bad
C:\Windows\System32\mvwqn.dll.bad

#10 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 04 October 2007 - 09:49 AM

New infector:

C:\Windows\System32\veptlh.dll

#11 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 05 October 2007 - 12:36 PM

Updated for new infectors:

C:\Windows\System32\rmtdvc.dll
C:\Windows\System32\hteogat.dll
C:\Windows\System32\txxkb.dll

#12 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 09 October 2007 - 10:07 AM

Updated for new infector:

C:\WINDOWS\system32\gdrtul.dll

#13 Grinler

Grinler

    Lawrence Abrams

  • Topic Starter

  • Admin
  • 42,868 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:04 AM

Posted 25 October 2007 - 01:01 PM

Updated for new infector:

C:\Windows\System32\ugbtna.dll




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users