Your computer is infected with malicious software? Do you have pop-ups on your PC?
If so, search this blog for removal instructions or browse computer threats by category.

Tuesday, October 4, 2011

Volmgr.exe, volmgr.dll: Trojan.Plongo and Google/Bing Redirects

Tell your friends:
Badvertisement and highly efficient click-fraud attacks have increased dramatically over the last year, especially during the Summer months. Web search engines are the primary method for most Internet users to find information on a particular topic. Cyber crooks who operate large groupings of hacked PCs can effectively monetize botnets redirecting Google, Bing and Yahoo! search results to completely irrelevant web pages full of advertisements or even adware. You can find multiple forum threads about this issue, commonly addressed as the Google redirect virus or just search redirect virus. Malware from the TDSS (TDL3 and TDL4) and ZeroAccess/Serifef families were involved in nearly all cases of those annoying redirects. However, yesterday we found another Trojan horse that may cause redirects too and may even replace the ZeroAccess/Serifef. Some of the hacked websites that were previously installing the ZeroAccess/Serifef Trojans and rootkits now distributed Trojan.Plongo, Trojan.Win32.Generic [Kaspersky]. It uses DLL injection and drops two files in %AppData% folder: volmgr.exe and volmgr.dll. Malware uses rootkit techniques to hide its presence from the victim and security products. However, GMER detects the hidden file without any problems.

What is more, Trojan.Plongo modifies Windows hosts file and DNS settings. It deletes default values and adds the following lines:

A quick trace root reveals that the server is physically located in Romania. Google may ask you if you would like to change your default search page to However, cyber crooks can easily change servers and rebuild malware, so you may be redirected to other servers as well, not necessarily Unfortunately, only ten security vendors out of forty three are able to detect this malware. Even less can effectively remove it from the infected computer. Thankfully, Norton Power Eraser does a great job of deleting Trojan.Plongo malware. The following removal guide has been created to help you to remove volmgr.exe, volmgr.dll and associated malware from your computer. If you have any questions, please leave a comment below. Good luck and be safe online!

Removal instructions:

1. Download Norton Power Eraser. Download link:

2. Double-click on the NPE.exe to run the utility. Please read the end user license agreement carefully and if you agree, click on the Accept button.

3. Click on the Scan button.

4. Rootkit scan is important this time, so click on the Restart button. Windows will now restart. You don't have to do anything. After a reboot it will continue to scan your computer for malicious software.

5. When Norton Power Eraser has finished, it will list all malicious files found on your computer. Important: select olmgr.dll to be fix too. Then click on the Fix button and then choose Restart. It will automatically reboot your computer again.


6. After a reboot, Norton Power Eraser will show you removal results. That's about it for the Trojan.Plongo malware. You can now close Norton Power Eraser.

Associated files and registry values:

  • %AppData%\volmgr.dll
  • %AppData%\volmgr.exe
Registry values:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run volmgr = "%AppData%\volmgr.exe"
Share this information with other people:


Anonymous said...

The software adds a lot more than just that stuff... It also adds cryptography keys for bing and google in the programdata\microsoft\crypto\rsa\s-1-5-xx folder

as well as a whole bunch of other crap in registry keys.

Anonymous said...

Could you enlighten us on how to remove or fix those additional problems such as the cryptography keys thing and registry?

How does it change the registry? Does it pass as a windows update? My computer updated today with 4 updates after this virus has been acting up.