Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

RUNDLL - Error Loading wnhf.cvo


  • This topic is locked This topic is locked
9 replies to this topic

#1 ApplyFriction

ApplyFriction

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:42 AM

Posted 23 February 2010 - 04:44 PM

Hello,

This is my first time posting here. I'm using Windows XP Home.


Two things:

Firstly, when re-booting my computer today, I got this error message on my desktop: RUNDLL - Error Loading wnhf.cvo - The Specified Module Could Not Be Found. I re-booted my computer a few times and still get the error message.

Secondly, I've also been noticing that iexplorer.exe is running in my task manager process list even though I never use Internet Explorer (I use FireFox). I terminate the process, but it returns every time.

Any ideas on what I can do to resolve these 2 problems? I have a HijackThis log file if you'd like. Please tell me where to post it.


Thanks in advance.

Robert
.

BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:42 AM

Posted 23 February 2010 - 05:08 PM

Hello Robert
RunDLL32.exe is a legit Windows file that loads .dll files which too can be legit or malware related. The Cannot find or error loading error message usually occurs when the associated .dll has been removed. The file may have been removed during an anti-virus scan, the uninstall of a program or use of a specialized fix tool. However, an associated registry entry remains and is telling Windows to load the file when you boot up.

If the file was removed but not the entry, Windows will display an error message indicating that the file was not found or there was an error loading. You need to remove this registry entry so Windows stops searching for the program when it loads.

To resolve this download and run Autoruns, search for the related entry and then delete it.
  • {wnhf.cvo }
  • Create a new folder on your hard drive called AutoRuns and extract (unzip) the file there. (click here if your not sure how to do this.)
  • Open the folder and double-click on autoruns.exe to launch it.
  • Please be patient as it scans and populates the entries.
  • When done scanning, it will say Ready at the bottom.
  • Scroll through the list and look for a startup entry related to the file with the error message.
  • Right-click on the file and choose delete.
  • Reboot your computer and see if the startup error returns.


Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware (v1.44) and save it to your desktop.Download Link 1
Download Link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 ApplyFriction

ApplyFriction
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:42 AM

Posted 23 February 2010 - 05:50 PM

Hello boopme,

Thank you for your help.

The RUNDLL - Error Loading wnhf.cvo problem is resolved.

The iexplorer.exe in my process list problem (if it is in fact a problem) is still there.


Here is my Malwarebytes log file:

Malwarebytes' Anti-Malware 1.44
Database version: 3781
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/23/2010 5:30:08 PM
mbam-log-2010-02-23 (17-30-08).txt

Scan type: Quick Scan
Objects scanned: 112950
Time elapsed: 7 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 1
Registry Values Infected: 1
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 8

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\artojmw.dll (Trojan.Backdoor) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\idid (Trojan.Sasfix) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\crntdll (Spyware.Passwords) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe rundll32.exe lsfpdfb) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\artojmw.dll (Trojan.Backdoor) -> Delete on reboot.
C:\WINDOWS\system32\0035.DLL (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dmnv.pro (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wiexetrip.dll (Trojan.Backdoor) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sojs.smo (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ftoe.rho (Trojan.Oficla) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qtplugin.exe (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\WORK.DAT (Malware.Trace) -> Quarantined and deleted successfully.
.

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:42 AM

Posted 23 February 2010 - 08:44 PM

Hello, first a reboot is neede to complete some of that removal,if you haven't please do.

Now some advice about what was found. One or more of the identified infections is a backdoor trojan.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would counsel you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the trojan has been identified and can be killed, because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?
When Should I Format, How Should I Reinstall

We can still clean this machine but I can't guarantee that it will be 100% secure afterwards. Let me know what you decide to do.


If you decide to continue ,this is next.
Next run ATF and SAS: If you cannot access Safe Mode,run in normal ,but let me know.

Note: On Vista, "Windows Temp" is disabled. To empty "Windows Temp" ATF-Cleaner must be "Run as an Administrator".

From your regular user account..
Download Attribune's ATF Cleaner and then SUPERAntiSpyware , Free Home Version. Save both to desktop ..
DO NOT run yet.
Open SUPER from icon and install and Update it
Under Scanner Options make sure the following are checked (leave all others unchecked):
Close browsers before scanning.
Scan for tracking cookies.
Terminate memory threats before quarantining
.
Click the "Close" button to leave the control center screen and exit the program. DO NOT run yet.

Now reboot into Safe Mode: How to enter safe mode(XP)
Using the F8 Method
Restart your computer.
When the machine first starts again it will generally list some equipment that is installed in your machine, amount of memory, hard drives installed etc. At this point you should gently tap the F8 key repeatedly until you are presented with a Windows XP Advanced Options menu.
Select the option for Safe Mode using the arrow keys.
Then press enter on your keyboard to boot into Safe Mode
.

Double-click ATF-Cleaner.exe to run the program.
Under Main "Select Files to Delete" choose: Select All.
Click the Empty Selected button.

If you use Firefox or Opera browser click that browser at the top and choose: Select All
Click the Empty Selected button.
If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program
.

NOW Scan with SUPER
Open from the desktop icon or the program Files list
On the left, make sure you check C:\Fixed Drive.
Perform a Complete scan. After scan,Verify they are all checked.
Click OK on the summary screen to quarantine all found items.
If asked if you want to reboot, click "Yes" and reboot normally.

To retrieve the removal information after reboot, launch SUPERAntispyware again.
Click Preferences, then click the Statistics/Logs tab.
Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
If there are several logs, click the current dated log and press View log.
A text file will open in your default text editor.
Please copy and paste the Scan Log results in your next reply.
Click Close to exit the program.


Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Full scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.


Please ask any needed questions,post logs and Let us know how the PC is running now.

Edited by boopme, 23 February 2010 - 08:45 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 ApplyFriction

ApplyFriction
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:42 AM

Posted 24 February 2010 - 01:13 AM

Hello boopme,

Thank you once again.

The iexplorer.exe in my process list problem is resolved.

I have decided not to go ahead with a reformat and reinstall of the OS at this time. However, I thank you for your help offer.

Everything seems to be working fine.



Here is my SUPERAntiSpyware log file:

SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 02/23/2010 at 11:35 PM

Application Version : 4.34.1000

Core Rules Database Version : 4614
Trace Rules Database Version: 2426

Scan type : Custom Scan
Total Scan Time : 01:53:31

Memory items scanned : 225
Memory threats detected : 0
Registry items scanned : 6055
Registry threats detected : 0
File items scanned : 55399
File threats detected : 2

Trojan.Agent/Gen-HackPatch
C:\PROGRAM FILES\SUNBELT SOFTWARE\COUNTERSPY\COUNTERSPY V3.1.2252 PATCH.EXE

Rogue.Agent/Gen-Nullo[DLL]
C:\WINDOWS\SYSTEM32\MSVRC20.DLL



Here is my Malwarebytes log file:

Malwarebytes' Anti-Malware 1.44
Database version: 3782
Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

2/24/2010 12:41:57 AM
mbam-log-2010-02-24 (00-41-57).txt

Scan type: Full Scan (C:\|D:\|E:\|F:\|G:\|H:\|I:\|)
Objects scanned: 181564
Time elapsed: 39 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 1
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 3

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\errshe32b.dll (Trojan.Backdoor) -> Delete on reboot.

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\WINDOWS\system32\errshe32b.dll (Trojan.Backdoor) -> Delete on reboot.
C:\Program Files\Maketorrent 2\uninstall.exe (Password.Stealer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\yjmdllerr.dll (Trojan.Backdoor) -> Delete on reboot.
.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:42 AM

Posted 24 February 2010 - 11:12 AM

Hello,great news.. just be aware that the info stealers were remved and to change your passwords..etc...
Let's just do one more online scan.

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Check Posted Image
  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 ApplyFriction

ApplyFriction
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:42 AM

Posted 24 February 2010 - 05:04 PM

Hello boopme,

Thanks again for all the help and attention you've been giving to this 'problem' of mine. One thing that has become very clear to me throughout this whole exercise is how little I know. I thought I was well protected. It's clear to me now that that is not the case.

You may or may not find this useful, but the original problem was never with "iexplorer.exe", but iexplore.exe. I had made a mistake in the spelling. Anyway, it's still there, in the process list. However, what is new now is that whenever I end the process, I immediately get a ZoneAlarm Security Alert telling me "Updated.exe is trying to communicate with C:\WINDOWS\Explorer.EXE by opening its process". If I deny it, the alert keeps repeating itself. So, for now, I've allowed it and iexplore.exe remains an active process.


Here is my ESET OnlineScan log file:

C:\Documents and Settings\All Users\Application Data\Spybot - Search & Destroy\Recovery\WinZBot.zip Win32/Bagle.gen.zip worm cleaned by deleting - quarantined
C:\Documents and Settings\Robert\Local Settings\Application Data\Identities\{A7EE93A3-2205-4DEC-A177-6DF41E98D812}\Microsoft\Outlook Express\Inbox.dbx probably unknown NewHeur_PE virus unable to clean
C:\Documents and Settings\Robert\Local Settings\Application Data\Identities\{A7EE93A3-2205-4DEC-A177-6DF41E98D812}\Microsoft\Outlook Express\Sent Items.dbx probably unknown NewHeur_PE virus unable to clean
C:\Documents and Settings\Robert\Local Settings\Temp\IXP000.TMP\SUPERAntiSpyware.exe probably a variant of Win32/Inject trojan cleaned by deleting - quarantined
C:\Documents and Settings\Robert\Local Settings\Temp\IXP001.TMP\SUPERAntiSpyware.exe probably a variant of Win32/Inject trojan cleaned by deleting - quarantined
C:\Documents and Settings\Robert\My Documents\My Received Files\Nero 7 Premium.zip Win32/Toolbar.AskSBar application deleted - quarantined
C:\Documents and Settings\Robert\My Documents\My Received Files\unlocker1.8.8.exe Win32/Adware.ADON application deleted - quarantined
C:\Documents and Settings\Robert\My Documents\My Received Files\Nero 7 Premium\Nero-7.10.1.0_eng_full.exe Win32/Toolbar.AskSBar application deleted - quarantined
C:\Program Files\RqAds\RqAds.exe probably a variant of Win32/TrojanClicker.Agent trojan cleaned by deleting - quarantined
C:\WINDOWS\system32\Updated\Updated.exe probably a variant of Win32/Inject trojan cleaned by deleting - quarantined
D:\My Received Files\unlocker1.8.7.exe a variant of Win32/Adware.ADON application deleted - quarantined
I:\SUPERAntiSpyware Professional v4.31.1000 Final Multilanguage.rar probably a variant of Win32/Inject trojan deleted - quarantined
I:\SUPERAntiSpyware Professional v4.31.1000 Final Multilanguage\SUPERAntiSpyware Professional 4.31.1000 Final Multilanguage\SUPERAntiSpywarePro.exe probably a variant of Win32/Inject trojan deleted - quarantined
.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:03:42 AM

Posted 25 February 2010 - 09:07 PM

Hello sorry for the delay. The "updated" is a malware called Troj/Banload,and it's trying to communicste from your PC to it's home.

Troj/Banload-IY is a Trojan for the Windows platform.

Troj/Banload-IY includes functionalities to:

- access the internet and communicate with a remote server via HTTP
- download, install and run new software

When run, Troj/Banload-IY copies itself to \updated.exe.

When run, Troj/Banload-IY sets the following registry entry:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
winup32
\updated.exe

When run, Troj/Banload-IY may create and run the file \winupdate128.exe and this file is detected by Sophos as Troj/Bnkmr-Fam.

SOPHOS


Since the info stealers continue to show up I feel the must be a rootkit here that keeps regenerating itself.
We will need to run A rootkit scan and get a DDS log to review. Both are in these instructions.

You will need to Download and Run DDS which will create a Pseudo HJT Report as part of its log..
If for some reason you cannot perform a step, move on to the next.
Please follow this guide. go and do steps 6 thru 8 ,, Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help . Then go here Virus, Trojan, Spyware, and Malware Removal Logs ,click New Topic,give it a relevant Title and post that complete log.

Let me know if it went OK.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 ApplyFriction

ApplyFriction
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:42 AM

Posted 25 February 2010 - 11:49 PM

Hello boopme,

Thank you so much once again. Everything went according to plan.

I've posted in the "Virus, Trojan, Spyware, and Malware Removal Logs" Forum under the topic title Troj/Banload-IY [Updated.exe].


I was just curious about something I noticed in the ESET OnlineScan log file I left in my previous post here. Two things caught my eye:

C:\Documents and Settings\Robert\Local Settings\Application Data\Identities\{A7EE93A3-2205-4DEC-A177-6DF41E98D812}\Microsoft\Outlook Express\Inbox.dbx probably unknown NewHeur_PE virus unable to clean
C:\Documents and Settings\Robert\Local Settings\Application Data\Identities\{A7EE93A3-2205-4DEC-A177-6DF41E98D812}\Microsoft\Outlook Express\Sent Items.dbx probably unknown NewHeur_PE virus unable to clean

Are these important?
.

#10 Orange Blossom

Orange Blossom

    OBleepin Investigator


  • Moderator
  • 36,947 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Bloomington, IN
  • Local time:03:42 AM

Posted 26 February 2010 - 01:19 AM

Hello,

Now that you have posted a log here: http://www.bleepingcomputer.com/forums/t/298653/trojbanload-iy-updatedexe/ you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a MRT Team member, nor should you ask for help elsewhere. Doing so can result in system changes which may not show in the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the MRT Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the MRT Team members are EXTREMELY busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the MRT Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another MRT Team member is already assisting you and not open the thread to respond.

Please be patient. It may take several days to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

To avoid confusion, I am closing this topic. Good luck with your log.

Orange Blossom :thumbsup:
Help us help you. If HelpBot replies, you MUST follow step 1 in its reply so we know you need help.

Orange Blossom

An ounce of prevention is worth a pound of cure

SpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users