Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

RunDLL32 Fake AV and Redirect Virus


  • This topic is locked This topic is locked
3 replies to this topic

#1 needshelpinma

needshelpinma

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:10:04 AM

Posted 19 August 2013 - 09:11 AM

I visited my parents over the weekend and my dad got a virus. After a lot of research I determined its a RunDLL32 virus where some DLL is running at start-up and its disabling Security Center and Microsoft Security Essentials. If I kill the RunDLL32 process tree I am able to manually turn of the Security Center via services.msc and MSE. When the virus is actived, many Google searches or click open offers to fake Norton Anti-Virus which my dad also downloaded.

 

I have:

  • Uninstalled fake Norton Anti-Virus (I think)
  • Ran HiJack this and removed what I thought I needed to
  • Updated and ran MBAM
  • Ran SUPERAntiSpyware

The only way I can get this thing off is to kill RunDLL32, so I ran CombFix and now have my log below. Could anyone help with identifying the bad DLL and a way to remove it?

ComboFix 13-08-16.03 - Joe 08/17/2013  20:56:21.1.2 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.4056.2978 [GMT -4:00]
Running from: c:\users\Joe\Downloads\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
SP: Microsoft Security Essentials *Disabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Joe\AppData\Local\DefineExt\teMP.dat
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\addon.ico
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.cfg
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabUninstaller.exe
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\DT.ico
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\searchhere.ico
c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\uninstalldt.exe
c:\users\Joe\AppData\Roaming\Install.dat
c:\users\Joe\AppData\Roaming\Microsoft\Windows\Recent\Dubstep dancing to an Adele song. [VIDEO].URL
.
.
(((((((((((((((((((((((((   Files Created from 2013-07-18 to 2013-08-18  )))))))))))))))))))))))))))))))
.
.
2013-08-18 01:08 . 2013-08-18 01:08	--------	d-----w-	c:\users\Default\AppData\Local\temp
2013-08-18 00:19 . 2013-07-02 08:34	9460976	----a-w-	c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{856C8278-F44A-4A5E-927C-8403CAC32CEF}\mpengine.dll
2013-08-18 00:09 . 2013-08-18 00:09	--------	d-----w-	c:\users\Joe\AppData\Roaming\SUPERAntiSpyware.com
2013-08-18 00:09 . 2013-08-18 00:09	--------	d-----w-	c:\program files\SUPERAntiSpyware
2013-08-18 00:09 . 2013-08-18 00:09	--------	d-----w-	c:\programdata\SUPERAntiSpyware.com
2013-08-15 02:04 . 2013-08-15 02:04	--------	d-----w-	c:\program files (x86)\Common Files\Adobe
2013-08-15 02:02 . 2013-08-15 02:02	--------	d-----w-	c:\program files (x86)\Common Files\Java
2013-08-15 02:02 . 2013-08-15 02:02	867240	----a-w-	c:\windows\SysWow64\npDeployJava1.dll
2013-08-15 02:02 . 2013-08-15 02:02	96168	----a-w-	c:\windows\SysWow64\WindowsAccessBridge-32.dll
2013-08-15 02:02 . 2013-08-15 02:02	--------	d-----w-	c:\program files (x86)\Java
2013-08-14 23:37 . 2013-08-14 23:37	--------	d-----w-	c:\users\Joe\AppData\Local\Programs
2013-08-11 12:13 . 2013-08-15 01:59	--------	d-----w-	c:\program files (x86)\Common Files\Symantec Shared
2013-08-11 12:10 . 2013-08-18 00:16	--------	d-----w-	c:\programdata\Symantec
2013-08-11 12:10 . 2013-08-11 12:10	--------	d-----w-	c:\programdata\Norton
2013-08-11 12:04 . 2013-08-18 01:04	--------	d-----w-	c:\users\Joe\AppData\Roaming\DefaultTab
2013-08-11 12:03 . 2013-08-18 01:03	--------	d-----w-	c:\users\Joe\AppData\Local\DefineExt
2013-08-11 12:03 . 2013-08-11 12:03	--------	d-----w-	c:\program files (x86)\Common Files\xing shared
2013-08-11 12:02 . 2013-08-11 12:03	--------	d-----w-	c:\program files (x86)\Real
2013-08-11 12:02 . 2013-08-11 12:02	--------	d-----w-	c:\users\Joe\AppData\Local\Real
2013-08-03 12:48 . 2013-04-02 22:51	1643520	----a-w-	c:\windows\system32\DWrite.dll
2013-08-03 12:48 . 2013-04-09 23:34	1247744	----a-w-	c:\windows\SysWow64\DWrite.dll
2013-08-03 11:49 . 2013-08-03 11:49	9728	---ha-w-	c:\windows\SysWow64\api-ms-win-downlevel-shlwapi-l1-1-0.dll
2013-08-01 22:26 . 2013-08-01 22:26	541696	--sha-r-	c:\windows\SysWow64\wowreg323.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-08-15 02:02 . 2011-11-12 21:31	789416	----a-w-	c:\windows\SysWow64\deployJava1.dll
2013-08-15 00:26 . 2013-03-10 01:44	692104	----a-w-	c:\windows\SysWow64\FlashPlayerApp.exe
2013-08-15 00:26 . 2012-01-08 22:13	71048	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-08-11 12:02 . 2009-12-03 13:13	499712	----a-w-	c:\windows\SysWow64\msvcp71.dll
2013-08-11 12:02 . 2009-12-03 13:13	348160	----a-w-	c:\windows\SysWow64\msvcr71.dll
2013-07-02 08:34 . 2011-11-14 21:06	9460976	----a-w-	c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-06-24 04:57 . 2011-11-12 21:42	78277128	----a-w-	c:\windows\system32\MRT.exe
2013-06-05 03:34 . 2013-07-18 20:59	3153920	----a-w-	c:\windows\system32\win32k.sys
2013-06-04 06:00 . 2013-07-18 20:59	624128	----a-w-	c:\windows\system32\qedit.dll
2013-06-04 04:53 . 2013-07-18 20:59	509440	----a-w-	c:\windows\SysWow64\qedit.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-05-01 4786048]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"PDVDDXSrv"="c:\program files (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [2009-06-25 140520]
"Desktop Disc Tool"="c:\program files (x86)\Roxio\Roxio Burn\RoxioBurnLauncher.exe" [2009-06-19 494064]
"DellSupportCenter"="c:\program files (x86)\Dell Support Center\bin\sprtcmd.exe" [2009-05-21 206064]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-11-02 59240]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2011-12-08 421736]
"TkBellExe"="c:\program files (x86)\Real\RealPlayer\update\realsched.exe" [2013-08-11 295512]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2013-03-12 253816]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-05-11 958576]
.
c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dell Dock First Run.lnk - c:\program files\Dell\DellDock\DellDock.exe /firstrun [2009-9-21 1316192]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
R3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys;c:\windows\SYSNATIVE\DRIVERS\MpNWMon.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe;c:\windows\SYSNATIVE\Wat\WatAdminSvc.exe [x]
S0 PxHlpa64;PxHlpa64;c:\windows\System32\Drivers\PxHlpa64.sys;c:\windows\SYSNATIVE\Drivers\PxHlpa64.sys [x]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV64.SYS;c:\program files\SUPERAntiSpyware\SASDIFSV64.SYS [x]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL64.SYS;c:\program files\SUPERAntiSpyware\SASKUTIL64.SYS [x]
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE64.EXE;c:\program files\SUPERAntiSpyware\SASCORE64.EXE [x]
S2 AESTFilters;Andrea ST Filters Service;c:\windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_7f58c91b65c73836\AESTSr64.exe;c:\windows\SYSNATIVE\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_7f58c91b65c73836\AESTSr64.exe [x]
S2 DockLoginService;Dock Login Service;c:\program files\Dell\DellDock\DockLogin.exe;c:\program files\Dell\DellDock\DockLogin.exe [x]
S2 RealNetworks Downloader Resolver Service;RealNetworks Downloader Resolver Service;c:\program files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe;c:\program files (x86)\RealNetworks\RealDownloader\rndlresolversvc.exe [x]
S3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys;c:\windows\SYSNATIVE\DRIVERS\NisDrvWFP.sys [x]
S3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\Antimalware\NisSrv.exe;c:\program files\Microsoft Security Client\Antimalware\NisSrv.exe [x]
S3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys;c:\windows\SYSNATIVE\Drivers\RtsUStor.sys [x]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys;c:\windows\SYSNATIVE\DRIVERS\yk62x64.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - PROCEXP152
.
Contents of the 'Scheduled Tasks' folder
.
2013-08-18 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-10 00:26]
.
2013-08-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2348333154-2142078140-2439362001-1000Core.job
- c:\users\Joe\AppData\Local\Google\Update\GoogleUpdate.exe [2012-01-08 22:17]
.
2013-08-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2348333154-2142078140-2439362001-1000UA.job
- c:\users\Joe\AppData\Local\Google\Update\GoogleUpdate.exe [2012-01-08 22:17]
.
2013-08-18 c:\windows\Tasks\vbbg.job
- c:\windows\system32\rundll32.exe [2009-07-13 01:14]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2009-01-23 305664]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-06-30 165912]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-06-30 385560]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-06-30 365080]
"Broadcom Wireless Manager UI"="c:\program files\Dell\Dell Wireless WLAN Card\WLTRAY.exe" [2009-07-17 4968960]
"IAAnotif"="c:\program files (x86)\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2009-06-05 186904]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 1436736]
"SysTrayApp"="c:\program files\IDT\WDM\sttray64.exe" [2010-02-26 487424]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
TCP: DhcpNameServer = 192.168.1.1 71.243.0.12
FF - ProfilePath - c:\users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\i8wsnzdc.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - ExtSQL: 2013-08-11 08:03; {FCE04E1F-9378-4f39-96F6-5689A9159E45}; c:\programdata\RealNetworks\RealDownloader\BrowserPlugins\Firefox\Ext
FF - ExtSQL: 2013-08-11 08:04; addon@defaulttab.com; c:\users\Joe\AppData\Roaming\Mozilla\Firefox\Profiles\i8wsnzdc.default\extensions\addon@defaulttab.com.xpi
.
- - - - ORPHANS REMOVED - - - -
.
BHO-{B78F92C8-DEB3-11E2-9A0A-FB64281D6ADE} - c:\users\Joe\AppData\Local\DefineExt\temp.dat
Toolbar-Locked - (no file)
SafeBoot-mcmscsvc
SafeBoot-MCODS
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
Toolbar-Locked - (no file)
AddRemove-Adobe Shockwave Player - c:\windows\system32\Adobe\Shockwave 11\uninstaller.exe
AddRemove-DefaultTab - c:\users\Joe\AppData\Roaming\DefaultTab\DefaultTab\uninstalldt.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-08-17  21:24:21
ComboFix-quarantined-files.txt  2013-08-18 01:24
.
Pre-Run: 191,263,461,376 bytes free
Post-Run: 191,347,150,848 bytes free
.
- - End Of File - - B471A0F4F1F1E50B42282870FF1BDEE5
A36C5E4F47E84449FF07ED3517B43A31



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 20 August 2013 - 12:23 AM



Hello needshelpinma

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.





we will run this now, it will help remove some files from the computer.


Blitzblank.

Download BlitzBlank and save it to your desktop. Open Blitzblank.exe
  • Click OK at the warning (and take note of it, this is a VERY powerful tool!).
  • Click the Script tab and copy/paste the following text there:
DeleteFile:
c:\windows\SysWow64\wowreg323.dll
c:\windows\Tasks\vbbg.job
  • Click Execute Now. Your computer will need to reboot in order to replace the files.
  • When done, post me the report created by Blitzblank. you can find it at the root of the drive Normaly C:\
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 23 August 2013 - 09:05 PM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:10:04 AM

Posted 26 August 2013 - 09:22 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users