Win32/Renos.dz -- can't get rid of it!

Hewlett-packard / Hp compaq tc4400 (gq098us...
May 29, 2009 at 12:46:27
Specs: Microsoft Windows Vista Business, 2.167 GHz / 3062 MB
Yesterday afternoon, windows defender popped up warning me of a virus: trojan.downloader Win32/Renos.dz. This was surprising because I have AVG 8.5 free which did not catch this virus and I have never gotten any messages from Windows defender. I clicked "remove" and thought everything was ok...

Maybe 30 minutes later I get the same message. Again, I clicked "remove" and decided to do a full scan with AVG. AVG did not find any threats. I thought maybe I would install Malwarebytes anti-malware, but when I went to the website I encountered an error saying the server could not be contacted. I next tried to download Superantispyware... I got to the website fine, but when I tried to download it I got the same error saying the server could not be contacted.

Using another computer I downloaded Malwarebytes anti-malware and installed it but it would not run. I renamed the program and it ran, but it froze while it was scanning a certain file. Later on that evening AVG started its scheduled scan and found and healed 4 threats.

My computer has a second partition on which I've installed the Windows 7 release candidate. Today I installed Malwarebytes anti-malware on windows 7 and did a complete scan of my infected vista partition. It found and healed 3 infections. I thought that finally the problem was solved.

I started up my Vista partition and what do you know, I get that same old windows defender message about that same virus. I can't get rid of it!

Can anyone help me?


See More: Win32/Renos.dz -- cant get rid of it!

Report •


#1
May 29, 2009 at 12:53:09
Can you post your malwarebyte scan log.

-------------------------------------------------


Report •

#2
May 29, 2009 at 13:39:44
Here is the malwarebytes log (I was mistaken when I said it found 3 infections... it only found 1):

-------------------------------
Malwarebytes' Anti-Malware 1.37
Database version: 2192
Windows 6.1.7100

5/29/2009 3:04:01 PM
mbam-log-2009-05-29 (15-04-01).txt

Scan type: Full Scan (E:\|)
Objects scanned: 335771
Time elapsed: 2 hour(s), 9 minute(s), 7 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 1

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
e:\Users\sensenigsm1\AppData\Local\Temp\tmp3B58.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.


Report •

#3
May 29, 2009 at 13:47:17
Can you please post your AVZ log:
Note: Run AVZ in windows normal mode. If avz.exe doesn't start, then try to rename the file avz.exe to something else and try to run it again.

1) To create the logfile, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

2) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

3) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator

You should now see the main window of the AVZ utility. Please navigate to File->Custom Scripts. Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteStdScr(3);
RebootWindows(true);
end.

Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script, the PC will reboot. After the reboot the LOG subfolder is created in the folder with AVZ, with a file called virusinfo_syscure.zip inside. Upload that file to rapidshare.com and paste the link here.

Image Tutorial

-------------------------------------------------


Report •

Related Solutions

#4
May 29, 2009 at 14:21:21

Report •

#5
May 29, 2009 at 14:42:11
Follow these Steps in order numbered. Don't proceed to next step unless you have sucessfully completed previous step:

1) Run this script in AVZ like before your computer will reboot.

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('C:\Users\SENSEN~1\AppData\Local\Temp\20334.exe','');
 QuarantineFile('C:\Users\SENSEN~1\AppData\Local\Temp\3328.exe','');
 QuarantineFile('\\?\globalroot\systemroot\system32\gxvxcpogdrplwexhbsxxxugoqpppidtjybbqn.dll','');
 DeleteFile('\\?\globalroot\systemroot\system32\gxvxcpogdrplwexhbsxxxugoqpppidtjybbqn.dll');
 DeleteFile('C:\Users\SENSEN~1\AppData\Local\Temp\3328.exe');
 DeleteFile('C:\Users\SENSEN~1\AppData\Local\Temp\20334.exe');
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

2) After reboot. Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

-------------------------------------------------


Report •

#6
May 29, 2009 at 15:21:02
I completed the first step with no problems, however I encountered problems with the second step.

I downloaded combofix.exe and renamed it to 123.exe. When I ran the program, the console window displayed error messages saying that access was denied to certain areas and it needed administrator privileges. I got a message saying that rootkit activity was found and displayed the locations of three infected files, which I wrote down. The computer then restarted.

I looked for the log but was unable to find one. There was a file in C:\ named 123 (the same as I renamed combofix to) but there was no file extension and I was unable to open it, even with notepad. I tried to upload this file but was told I do not have permission to open the file.

I ran combofix a second time by right clicking it and selecting "Run as administrator" but the same thing happened.

Here are the locations of the files that ComboFix displayed:

C:\Windows\System32\drivers\gxvxciunvvjknfpdxcmqtexjtorkbsurtichy
C:\Windows\System32\gxvxcacqfqbtsivpupmceteymbevvdjiqeqiy.dll
C:\Windows\System32\gxvxcpogdrplwexhbsxxxugopppidtjybbqn.dll


Thank you very much for all of your help and your quick responses.... it is greatly appreciated!


Report •

#7
May 29, 2009 at 15:26:28
Follow this steps in order numbered:

1) Run this script in AVZ your computer will reboot:

begin
SetAVZPMStatus(True);
rebootwindows(true);
end.

2) After reboot redo Response Number 3 and post the new log.

-------------------------------------------------


Report •

#8
Report •

#9
May 29, 2009 at 16:12:41
Run this script in AVZ like before your computer will restart:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('C:\Users\SENSEN~1\AppData\Local\Temp\3328.exe','');
 QuarantineFile('C:\Users\SENSEN~1\AppData\Local\Temp\20334.exe','');
 QuarantineFile('C:\Windows\System32\Drivers\afy8wzl2.SYS','');
 QuarantineFile('C:\Windows\System32\gxvxcpogdrplwexhbsxxxugopppidtjybbqn.dll','');
 QuarantineFile('C:\Windows\System32\gxvxcacqfqbtsivpupmceteymbevvdjiqeqiy.dll','');
 QuarantineFile('C:\Windows\System32\drivers\gxvxciunvvjknfpdxcmqtexjtorkbsurtichy','');
 DeleteFile('C:\Windows\System32\drivers\gxvxciunvvjknfpdxcmqtexjtorkbsurtichy');
 DeleteFile('C:\Windows\System32\gxvxcacqfqbtsivpupmceteymbevvdjiqeqiy.dll');
 DeleteFile('C:\Windows\System32\gxvxcpogdrplwexhbsxxxugopppidtjybbqn.dll');
 DeleteFile('C:\Windows\System32\Drivers\afy8wzl2.SYS');
 DeleteFile('C:\Users\SENSEN~1\AppData\Local\Temp\20334.exe');
 DeleteFile('C:\Users\SENSEN~1\AppData\Local\Temp\3328.exe');
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

Note: After reboot continue with combofix. Make sure you download combofix again.

-------------------------------------------------


Report •

#10
May 29, 2009 at 16:35:59
Same exact thing happened with combofix. Do I need to turn of UAC?

I got the same message about rootkit activity and these same three files:

C:\Windows\System32\drivers\gxvxciunvvjknfpdxcmqtexjtorkbsurtichy.sys
C:\Windows\System32\gxvxcacqfqbtsivpupmceteymbevvdjiqeqiy.dll
C:\Windows\System32\gxvxcpogdrplwexhbsxxxugopppidtjybbqn.dll

I also noticed as AVZ was running that there was an error accessing a certain file but the script completed and the computer restarted before I could get any details...


Report •

#11
May 29, 2009 at 17:02:33
Download and run Kaspersky AVP tool: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool:
# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Attach Scan log/Summary to your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...


Report •

#12
May 29, 2009 at 17:10:52
I've used a rootkit detector called GMER to remove C:\Windows\System32\drivers\gxvxciunvvjknfpdxcmqtexjtorkbsurtichy.sys and I manually deleted the other files.

I have not received the windows defender warning since this afternoon... which is good. But I still can't access malwarebytes.org.


Report •

#13
May 29, 2009 at 17:47:43
Don't think it would be that easy to remove a rootkit. If that was the case combofix would have taken care of it if it reported it. Try to run combofix again if it fails follow response number 11.

-------------------------------------------------


Report •

#14
May 29, 2009 at 18:30:00
Thank you!

I ran combofix again and it worked this time. I have no problems visiting malwarebytes.org.

I can post the log if you think something more is necessary...

thank you so much for your help!


Report •

#15
May 29, 2009 at 18:35:52
Yes post the log.

-------------------------------------------------


Report •

#16
Report •

#17
May 29, 2009 at 18:54:48
1) Run this script in AVZ:


begin
CreateQurantineArchive('c:\quarantine.zip');
end.

2) A file called quarantine.zip should be created in C:\. Then please zip up C:\qoobox\quarantine and upload both it and C:\quarantine.zip to a filehost such as http://rapidshare.com/ Then, Private Message me the Download link to the uploaded file.

3) Lastly, uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok. Or Start > run > type 123 /u > ok.

4) Run scan with Response Number 11.

5) Run full scan with Malwarebyte fix what it detects and post scan log.

-------------------------------------------------


Report •

#18
May 30, 2009 at 02:38:47
Malwarebytes found and fixed two infections

">http://www.4shared.com/file/108719095/cb4e370/mbam-log-2009-05-30__05-31-24_.html

(off to work...)


Report •

#19
May 30, 2009 at 05:57:52
Fix what it found we already took care of it. Its just empty entries.

-------------------------------------------------


Report •

#20
May 30, 2009 at 12:03:26
I did another full scan while I was at work and nothing malicious was found. Thanks again for all of your help.

Report •

#21
June 3, 2009 at 08:24:36
hi,

I am also getting same pop ups from windows defender for win32/renoz.dz.. i have avast pro installed, i scheduled its boot time scan, and avast detected the file at location windows/system32/gxcgjfhflfljg.................sys.. i asked avast to delete this file.. but still i am getting same pop ups..
then i tried to scanning my computer with AVZ.exe with custom scripts as mentioned in response number 3.. here is the link of virus scan info for my comp
http://rapidshare.com/files/2403845...

but the file names and files are different from the files that are mentioned in script for quarantine the files in response no. 5

so can you please help me what to do next.

Thank you for all help..


Report •

#22
June 3, 2009 at 08:25:45
mistake in mentioning the file location that avast detected.. the correct location is windows/system32/drivers/gjdkll.......sys.

Report •

#23
June 3, 2009 at 08:28:51
http://www.computing.net/security/w... < create your own post with the problem.

-------------------------------------------------


Report •


Ask Question