Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Vundo Trojan

  • This topic is locked This topic is locked
2 replies to this topic

#1 jsv


  • Members
  • 14 posts
  • Local time:10:23 AM

Posted 30 December 2008 - 09:17 PM

I've been battling trojan vundo for several days now and finally seem to have gotten a clean bill from both Super Anti-Spyware and Malwarebytes. It seems that Super AntiSpyware has updated their definitions to include the removal of Vundo today. But perhaps I'm being optimistic? I've asked for help on this thread and Mark had suggested it may be a good idea to post here too.

Here's my DDS log. The one thing I keep noticing is qoMgfGay.dll - is this something to worry about?

Also since this Vundo trojan has appeared on my pc, I got another message upon startup: "the application or DLL C:\WINDOWS\System32\yocbzt.dll is not a valid windows image. Please check this against your installation diskette." THis message only appeared once. Since then, I've noticed that once I startup the computer, I get a black screen before Windows loads with "Boot.ini file invalid. Booting from C:\WINDOWS\". Is this something for me to be concerned about?

Any help is most gratefully appreciated!

DDS (Version 1.1.0) - NTFSx86
Run by user1 at 18:23:51.35 on Tue 12/30/2008
Internet Explorer: 7.0.5730.11 BrowserJavaVersion: 1.6.0_07
Microsoft Windows XP Home Edition 5.1.2600.2.1252.1.1033.18.1015.344 [GMT -8:00]

AV: Trend Micro PC-cillin Internet Security 2006 *On-access scanning enabled* (Updated)
FW: Trend Micro PC-cillin Internet Security (Firewall) *enabled*

============== Running Processes ===============

C:\windows\system32\svchost -k DcomLaunch
C:\Program Files\Windows Defender\MsMpEng.exe
C:\windows\System32\svchost.exe -k netsvcs
C:\Program Files\Ad-Aware\aawservice.exe
C:\Program Files\Multimedia Card Reader\shwicon2k.exe
C:\Program Files\BillP Studios\WinPatrol\winpatrol.exe
C:\Program Files\Trend Micro\Internet Security 2006\pccguide.exe
C:\Program Files\Microsoft IntelliPoint\ipoint.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe
C:\Program Files\a-squared Anti-Malware\a2service.exe
C:\Program Files\AskBarDis\bar\bin\AskService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\LeapFrog\LeapFrog Connect\CommandService.exe
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE
C:\windows\system32\svchost.exe -k imgsvc
C:\Program Files\Outlook Express\msimn.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\user1\Desktop\dds.scr

============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/intl/en/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uSearchMigratedDefaultURL = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8
uInternet Settings,ProxyOverride = *.local
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://www.google.com/ie
BHO: Spybot-S&D IE Protection: {53707962-6f74-2d53-2644-206d7942484f} - c:\progra~1\spybot~1\SDHelper.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
TB: {5BED3930-2E9E-76D8-BACC-80DF2188D455} - No File
TB: {981FE6A8-260C-4930-960F-C3BC82746CB0} - No File
EB: MasterCook Bar: {c92041c1-6d22-4069-ba0e-66246aa752b0} - c:\windows\system32\shdocvw.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [SpybotSD TeaTimer] c:\program files\spybot - search & destroy\TeaTimer.exe
uRun: [Malwarebytes' Anti-Malware] c:\program files\malwarebytes' anti-malware\mbam.exe
mRun: [igfxtray] c:\windows\system32\igfxtray.exe
mRun: [igfxhkcmd] c:\windows\system32\hkcmd.exe
mRun: [igfxpers] c:\windows\system32\igfxpers.exe
mRun: [Sunkist2k] c:\program files\multimedia card reader\shwicon2k.exe
mRun: [WinPatrol] c:\program files\billp studios\winpatrol\winpatrol.exe
mRun: [pccguide.exe] "c:\program files\trend micro\internet security 2006\pccguide.exe"
mRun: [IntelliPoint] "c:\program files\microsoft intellipoint\ipoint.exe"
dRun: [Picasa Media Detector] c:\program files\picasa\PicasaMediaDetector.exe
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
dRunOnce: [RunNarrator] Narrator.exe
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: E&xport to Microsoft Office Excel - c:\progra~1\micros~2\office11\EXCEL.EXE/3000
IE: MasterCook: Select Image - c:\program files\mastercook 9\web\MCIEContext.hta
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0_07\bin\ssv.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\progra~1\spybot~1\SDHelper.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: igfxcui - igfxdev.dll
Notify: PCANotify - PCANotify.dll
Notify: qoMgfGay - qoMgfGay.dll
AppInit_DLLs: yocbzt.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Microsoft AntiMalware ShellExecuteHook: {091eb208-39dd-417d-a5dd-7e2c2d8fb9cb} - c:\progra~1\wifd1f~1\MpShHook.dll
SEH: SABShellExecuteHook Class: {5ae067d3-9afb-48e0-853a-ebb7f4a000da} - c:\program files\superantispyware\SASSEH.DLL
LSA: Authentication Packages = msv1_0 c:\windows\system32\wvUkJaYP

================= FIREFOX ===================

FF - ProfilePath - c:\docume~1\user1\applic~1\mozilla\firefox\profiles\u0wl70gb.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/intl/en/

============= SERVICES / DRIVERS ===============

R1 AW_HOST;AW_HOST;c:\windows\system32\drivers\aw_host5.sys [2005-11-21 11008]
R1 awlegacy;awlegacy;c:\windows\system32\drivers\awlegacy.sys [2003-11-17 11165]
R1 SASDIFSV;SASDIFSV;\??\c:\program files\superantispyware\SASDIFSV.SYS [2008-8-19 8944]
R1 SASKUTIL;SASKUTIL;\??\c:\program files\superantispyware\SASKUTIL.sys [2008-8-19 55024]
R2 a2AntiMalware;a-squared Anti-Malware Service;"c:\program files\a-squared anti-malware\a2service.exe" [2008-12-28 419448]
R2 aawservice;Lavasoft Ad-Aware Service;"c:\program files\ad-aware\aawservice.exe" [2008-5-12 611664]
R2 ASKService;ASKService;c:\program files\askbardis\bar\bin\AskService.exe [2008-12-7 464264]
R2 LeapFrog Connect Device Service;LeapFrog Connect Device Service;"c:\program files\leapfrog\leapfrog connect\CommandService.exe" [2008-11-25 991232]
R2 Tmfilter;Tmfilter;c:\windows\system32\drivers\TmXPFlt.sys [2005-11-9 205328]
R2 Tmntsrv;Trend Micro Real-time Service;c:\progra~1\trendm~1\intern~1\Tmntsrv.exe [2006-3-8 340040]
R2 TmPfw;Trend Micro Personal Firewall;c:\progra~1\trendm~1\intern~1\TmPfw.exe [2006-3-15 634944]
R2 Tmpreflt;Tmpreflt;c:\windows\system32\drivers\Tmpreflt.sys [2005-11-9 36368]
R2 tmproxy;Trend Micro Proxy Service;c:\progra~1\trendm~1\intern~1\tmproxy.exe [2006-3-15 286791]
R2 WinDefend;Windows Defender;"c:\program files\windows defender\MsMpEng.exe" [2006-11-3 13592]
R3 SunkFilt62;Alcor Micro Corp - 6362;\??\c:\windows\system32\drivers\sunkfilt62.sys [2004-7-23 46536]
S2 ASKUpgrade;ASKUpgrade;c:\program files\askbardis\bar\bin\ASKUpgrade.exe [2008-12-7 234888]
S3 awhost32;Symantec pcAnywhere Host Service;"c:\program files\symantec\pcanywhere\awhost32.exe" [2006-2-14 106496]
S3 FlyUsb;FLY Fusion;c:\windows\system32\drivers\FlyUsb.sys [2008-12-26 18560]
S3 SASENUM;SASENUM;\??\c:\program files\superantispyware\SASENUM.SYS [2008-8-19 7408]
S3 SunkFilt6;Alcor Micro Corp - 6360;\??\c:\windows\system32\drivers\sunkfilt6.sys []

=============== Created Last 30 ================

2008-12-28 17:24 --d----- C:\VundoFix Backups
2008-12-28 13:43 15,504 a------- c:\windows\system32\drivers\mbam.sys
2008-12-28 13:43 38,496 a------- c:\windows\system32\drivers\mbamswissarmy.sys
2008-12-28 13:43 --d----- c:\program files\Malwarebytes' Anti-Malware
2008-12-27 19:39 420,282 a--sh--- c:\windows\system32\PYaJkUvw.ini2
2008-12-27 19:39 420,282 a--sh--- c:\windows\system32\PYaJkUvw.ini
2008-12-26 10:14 18,560 a------- c:\windows\system32\drivers\FlyUsb.sys
2008-12-26 10:14 110 a------- c:\windows\{CF055C57-A988-42E6-BDAF-E3D94C6973A8}_WiseFW.ini
2008-12-26 10:14 --d----- c:\windows\CF055C57A98842E6BDAFE3D94C6973A8.TMP
2008-12-26 10:13 --d----- c:\docume~1\alluse~1\applic~1\Leapfrog
2008-12-26 10:12 --d----- c:\program files\LeapFrog
2008-12-14 12:31 54,156 a---h--- c:\windows\QTFont.qfn
2008-12-14 12:31 1,409 a------- c:\windows\QTFont.for
2008-12-10 17:16 247,326 -c------ c:\windows\system32\dllcache\strmdll.dll
2008-12-07 16:22 --d----- c:\docume~1\alluse~1\applic~1\Azureus
2008-12-07 16:22 --d----- c:\docume~1\user1\applic~1\Azureus
2008-12-07 16:22 --d----- c:\program files\AskBarDis
2008-12-07 16:21 --d----- c:\program files\Vuze

==================== Find3M ====================

2008-10-28 14:36 823,296 a------- c:\windows\system32\divx_xx0c.dll
2008-10-28 14:36 823,296 a------- c:\windows\system32\divx_xx07.dll
2008-10-28 14:35 815,104 a------- c:\windows\system32\divx_xx0a.dll
2008-10-28 14:35 802,816 a------- c:\windows\system32\divx_xx11.dll
2008-10-28 14:35 684,032 a------- c:\windows\system32\DivX.dll
2008-10-23 05:01 283,648 a------- c:\windows\system32\gdi32.dll
2008-10-16 14:06 268,648 a------- c:\windows\system32\mucltui.dll
2008-10-16 14:06 208,744 a------- c:\windows\system32\muweb.dll
2008-10-16 12:38 826,368 a------- c:\windows\system32\wininet.dll
2008-10-03 02:15 247,326 a------- c:\windows\system32\strmdll.dll
2007-05-23 19:11 66,560 ac------ c:\docume~1\user1\applic~1\GDIPFONTCACHEV1.DAT
2007-02-20 14:45 47,748,928 ac------ c:\program files\Trend Pc-cillin 2006.exe
2007-02-19 12:56 81,920 ac------ c:\docume~1\user1\applic~1\ezpinst.exe
2007-02-19 12:56 47,360 ac------ c:\docume~1\user1\applic~1\pcouffin.sys
2008-03-24 19:54 4,184 a--sh--- c:\windows\system32\KGyGaAvL.sys

============= FINISH: 18:24:17.48 ===============

Attached Files

Edited by jsv, 30 December 2008 - 09:33 PM.

BC AdBot (Login to Remove)


#2 suebaby41


    W.A.M. (Women Against Malware)

  • Malware Response Team
  • 6,248 posts
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:01:23 PM

Posted 10 January 2009 - 12:09 PM

Welcome to the BleepingComputer Forums.

Since it has been a few days since you scanned your computer with HijackThis, we will need a new HijackThis log. If you have not already downloaded Random's System Information Tool (RSIT), please download Random's System Information Tool (RSIT) by random/random which includes a HijackThis log and save it to your desktop. If you have RSIT already on your computer, please run it again.
  • Double click on RSIT.exe to run RSIT.
  • Click Continue at the disclaimer screen.
  • Please post the contents of log.txt.
Thank you for your patience.

Please see Preparation Guide for use before posting about your potential Malware problem.

If you have already posted this log at another forum or if you decide to seek help at another forum, please let us know. There is a shortage of helpers and taking the time of two volunteer helpers means that someone else may not be helped.

While we are working on your HijackThis log, please:
  • Reply to this thread; do not start another!
  • Do not make any changes on your computer during the cleaning process or download/add programs on your computer unless instructed to do so.
  • Do not run any other tool until instructed to do so!
  • Let me know if any of the links do not work or if any of the tools do not work.
  • Tell me about problems or symptoms that occur during the fix.
  • Do not run any other programs or open any other windows while doing a fix.
  • Ask any questions that you have regarding the fix(es), the infection(s), the performance of your computer, etc.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

#3 suebaby41


    W.A.M. (Women Against Malware)

  • Malware Response Team
  • 6,248 posts
  • Gender:Female
  • Location:South Carolina, USA
  • Local time:01:23 PM

Posted 19 January 2009 - 03:31 PM

This subject is now closed. If you need this topic reopened, please contact a member of the HJT Team and we will reopen it for you. Include the address of this thread in your request. If you should have a new issue, please start a new topic. This applies only to the original topic starter. Everyone else please begin a New Topic.
You don't stop laughing when you get old; you get old when you stop laughing.
A Member of U-N-I-T-E (Unified Network of Instructors and Trained Eliminators)
Malware Removal University Masters Graduate

Posted Image
Join The Fight Against Malware
No reply within 5 days will result in your topic being closed. If you need more time, please let me know by posting in this topic so that your topic will not be closed.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users