Completed 7 Steps - still problems

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by jimogrady, Mar 17, 2006.

  1. jimogrady

    jimogrady Private E-2

    I have completed - the 7 steps as requited here: http://forums.majorgeeks.com/showthread.php?t=35407

    But continue to get strange popups (even when not browsing) - these sites come ups most often:
    http://www.winfixer.com/download/2006/?p=20&ex=1&ax=2&aid=vm_dw_wfx6kw_9&lid=setting
    http://www.amaena.com/securityworm5/?aid=vm_dw_scq_2&lid=
    http://www.booksellersnow.com/geeks.htm
    http://64.186.139.111/ads/3/?affid=82&cid=home

    I even get a cursor on occassion that I cannot control.

    I am atttaching Hijack log and BitDefender log

    Help is appreciated,

    Jim
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Please complete the rest of step 6 and attach the Panda log.

    Also please follow the instructions in step 7 and install HijackThis as indicated. You did not read follow the directions and thus installed it exactly where we ask that it not be installed. Also you should not be using MSCONFIG like you are to control startups. Did you read the directions in step 7?

    After doing both of the above, run the below and attach the requested vundofix log:
    Virtumonde aka Trojan Vundo Removal

    This is discussed in the READ ME and the Winfixer popup should have triggered you to run this.

    After running doing ALL of the above. Attach a new HJT log.
     
  3. jimogrady

    jimogrady Private E-2

    Thanks for pointing our my errors in procedure -

    I did HJT once again - properly installed, see: hijackthis-before.log
    I did virtumundo removal
    I then did HJT again - hijackthis.log

    They are attached in this post, Jim
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I only needed on HJT log bit I do need to see the Vundofix log as requested. Seems like it did not completely work. That could be because you have a dual infection. Attach the previous log and then run it again and attach the new VundoFix log
     
  5. jimogrady

    jimogrady Private E-2

    Thanks again, I did not post that Vundofix log because it did not show one - when I clicked to run as a task it never re-opened - so I just ran it from there - in anycase, I ran it again (Scan for Vundo) and it said "No infected files found"

    So --- maybe it is solved - I guess I will wait and see - will post again if problem recurs -

    Thanks,

    Jim
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The procedure tells you that it is here: C:\vundofix.txt

    No it is not fixed. According to your last HJT log you are still infected. We will have to remove it manually since VundoFix is not finding it. I work something up.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Start by downloading two tools we will need:

    - Process Explorer

    - Pocket KillBox

    Extract them to there own folder somewhere that you will be able to locate them later. You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of avldr.dll once and then click the kill button. After you have killed all of the avldr.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above in the winlogon.exe process but look for mlljj.dll This one may not be found. Just continue.

    Next double click on explorer.exe and again click once on each instance of avldr.dll and kill it.

    Now repeat the above in the explorer.exe process for mlljj.dll This one may not be found. Just continue.


    Now just exit Process Explorer.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R3 - Default URLSearchHook is missing
    O2 - BHO: RawExecAction Object - {18898424-E3AB-4BA9-8E8D-5434B1CECA75} - C:\WINDOWS\system32\mlljg.dll (file missing)
    O18 - Protocol: ezpp - {810403FA-E82E-11D5-8AAB-0010A404A3DE} - C:\WINDOWS\system32\EZTOOL~1.DLL (file missing)
    O20 - Winlogon Notify: avldr - C:\WINDOWS\SYSTEM32\avldr.dll


    Copy the bold text below to notepad. Save it as fixVundo.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox:
    Choose Tools > Delete Temp Files and click OK.

    Run Killbox.exe. Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note many of the file list below may not exist but we need to check for them anyway.

    C:\WINDOWS\SYSTEM32\rdlva.ini
    C:\WINDOWS\SYSTEM32\rdlva.ini2
    C:\WINDOWS\SYSTEM32\rdlva.bak
    C:\WINDOWS\SYSTEM32\rdlva.bak1
    C:\WINDOWS\SYSTEM32\rdlva.bak2
    C:\WINDOWS\SYSTEM32\rdlva.tmp
    C:\WINDOWS\System32\avldr.dll

    C:\WINDOWS\SYSTEM32\jjllm.ini
    C:\WINDOWS\SYSTEM32\jjllm.ini2
    C:\WINDOWS\SYSTEM32\jjllm.bak
    C:\WINDOWS\SYSTEM32\jjllm.bak1
    C:\WINDOWS\SYSTEM32\jjllm.bak2
    C:\WINDOWS\SYSTEM32\jjllm.tmp
    C:\WINDOWS\System32\mlljj.dll

    If you find any other files in this folder that begin with rdlva or jjllm and end with any other extension ( the .ini is an an extension) delete them to.

    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    After reboot post a new HJT log and tell me how the steps went.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds