Request for help ridding my system of malware (winlogonhook)

Discussion in 'Malware Help (A Specialist Will Reply)' started by graeme_e_smith, Jul 9, 2006.

  1. graeme_e_smith

    graeme_e_smith Private E-2

    Hello, like everyone else here I'd really apprieciate some help in cleaning up my system ;)

    The system details are:
    Processor: Intell Pentium M 1.86GHz
    Ram : 1GHz
    Operating System: Windows XP SP2 (Should be bang up to date with MS updates)
    Virus/Online Security: Norton Internet Security 2006 (again everything is up to date)
    Access to internet is broadband, through a router.

    The problems:
    When booting up the explorer.exe process consumes nearly 100% of the cpu all the time. I discovered that by booting with the network cable unplugged, and then plugging it in afterwards this doesn't happen. (The processes can also be killed in task manager, network cable unplugged and then explorer.exe restarted to get around the problem.) When I boot up without the cable plugged in I always get a standard Windows error box saying that a service can't start without connecting to the internet: I just kill the message box withough clicking any of the buttons.

    I've done a bit of a trawl with many of the recommended malware detection programmes and between them they say I have the following problems.

    Spy Sweeper found: Trojan Agent Winlogonhook and trojan_downloader-2pursuit

    Spyware Doctor found: Trojan.Downloader.Samll.CQB, Ikitek Key Logger, Trojan.Downloader.Small.CML and Purity Scan.

    Both programmes offer to remove the offending items if I pay for a license but I'm loath to do this since I'm already paying quite a lot of money to Norton to protect my system (even though it can't see any of the above nasties) and after looking around the support forums it appears that simply paying up for more anti-malware won't necessarily get rid of the problem and I'll still have to ask for help. If paying up is what I have to do then I will, but I thought it wise to ask first.

    I've been through the READ & RUN ME FIRST sticky and believe that I've followed all of its instructions to the letter, even the one about turning off system restore that chaslang says everyone forgets. If I've got a step wrong please advise and I'll be happy to repeat it. Attached are three reports that the sticky asks for.

    Thanks in advance for the help. I'm really impressed by the way there are folk out there who are happy to help others. It seems quite rare now-days.

    Cheers,

    Graeme
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Neither Spyware Doctor or Spy Sweeper will fix Winlogonhook. A paid version or Spy Sweeper will say it fixed it on each scan but it will still be there on the next scan. And Norton will not even detect it. Also Norton is more specifically an antivirus application and doesn't do a very good job with all the malware that actually exists.

    If you are still running the trial version or Spyware Doctor and Spy Sweeper, uninstall them now. You have Windows Defender and do not need the other and they will just slow your PC down.

    Right now I have been fixing about 10 of these per day. You may have one of the newer hidden forms that often is paired with a hidden Virtumonde infection. Please run the below very quick scans to help us locate other hidden files.


    Run the below procedure and attach the runkeys.txt log.
    Now run the below procedure and attach the newfiles.txt log.
     
  3. graeme_e_smith

    graeme_e_smith Private E-2

    And I can assure you that your help is really appreciated. When I first realized that my laptop was infected with something I had a look online and was pretty surprised that there were so many forums offering support. When I looked a little further and realized how hard people were working to help each other, well, I was stunned.

    As you requested, I've run the GetRunKey and ShowNew batch files. The logs are attached. The attached ones are with Windows running in normal mode. I did do a run under safe mode, but when I compared the files (using fc at the command line) there were no significant differences: a couple of the time indices were different and a couple of those long registry indices were slightly different in the GetRunKey log, but that was it. If you need the safe mode files let me know and I'll post again.

    One thought I did have was that, as I described in my initial post, I'm booting up the laptop with the network cable unplugged to stop the malware getting control of my system. Will this affect the logs? I could probably run the scripts with the malware running if I fiddle about in task manager and reduce the explorer.exe priority so I can use the computer with it forced to the background.

    Cheers,

    Graeme
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of mljgd.dll once and then click the kill button. After you have killed all of the mljgd.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of mljgd.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    Now back on Killbox's main window, Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.

    C:\WINDOWS\SYSTEM32\mljgd.dll
    C:\WINDOWS\SYSTEM32\dgjlm.tmp
    C:\WINDOWS\SYSTEM32\dgjlm.ini
    C:\WINDOWS\SYSTEM32\dgjlm.ini2
    C:\WINDOWS\SYSTEM32\dgjlm.dat
    C:\WINDOWS\SYSTEM32\dgjlm.dat2


    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    Now attach a new HJT log and a new log from ShowNew.

    And also tell me how the steps went.
    Make sure you tell me how things are working now!
     
  5. graeme_e_smith

    graeme_e_smith Private E-2

    The system seems much, much better now. I tried booting the system up with the network cable in and killing and restarting the explorer.exe process in task manager, both of which had resulted in the 100% cpu usage issue, and everything seems as it should be. Explorer.exe generally has 0% of the cpu, occasionally leaping to 2 or 3% but that's it. I did notice that the install shield icon flashed up in the system tray briefly as Windows finished booting up. I'm not sure if that's important or not.

    I found the steps OK to follow. The only thing that differed slightly was that killbox never asked me to confirm deletion, just asked if I wanted to reboot now. This didn't put me off, but I guess if I'd been an anxious, computerphobic parent with my child's A-level project stored on the PC it could have freaked me out a bit.

    I've attached the new logs and I'd be grateful if you'd cast your eye over them to check if you can see anything untoward. I do know quite a bit about computers but all my experience is on custom made hardware and embedded software or scientific simulations; the workings of the Windows registry and processes leave me scratching my head. Thinking along those lines, which of the forums do you think would be best for getting advice about the processes Windows starts running during boot up? As we've been looking at the processes I've noticed lots of stuff in there that I don't understand why it's present--sure I use matlab.exe a lot, but I see no reason why it or its server should permanently have a processes running.

    Thanx for the help.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's finish up your malware removal and I will also give you a couple things to have HJT fix that are not needed at startup too!


    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {7C69DE23-7715-47A3-850C-BD0D130D9A5B} - C:\WINDOWS\system32\mljgd.dll (file missing)
    O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O20 - Winlogon Notify: cfgmngr32 - C:\WINDOWS\g168000.dll (file missing)
    O20 - Winlogon Notify: winbjv32 - winbjv32.dll (file missing)
    O20 - Winlogon Notify: WRNotifier - WRLogonNTF.dll (file missing)

    After clicking Fix, exit HJT.:
    Now reboot in normal mode and post a new HJT log.

    Make sure you tell me how things are working now.



    For research on your Startups so you can decide for yourself if you want it or do not want it, use links like below:

    http://www.bleepingcomputer.com/startups/

    http://www.liutilities.com/products/wintaskspro/processlibrary/qttask/
     
  7. graeme_e_smith

    graeme_e_smith Private E-2

    All steps in the last posting went well. I've repeated the killing and restarting explorer.exe process and turning the laptop on and off and everythjing seems to be working well. As you requested I've attached another HJT log to this message.

    I notice the following two lines in the HJT log:
    Do you reckon that it's safe to get HJT to delete these too: they look to be related to the BitDefender scanner I used in the RUN & READ ME FIRST steps.

    Thanks for the tips on sorting out the boot up stuff. Once I've got the all clear on this malware I'll get onto that ;).
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Just leave those lines alone. As suspected, the are for Bitdefender online scan. The second one actually adds a menu selection into Internet Explorer, Tools which is the correct way to uninstall Bitdefender Online scanner. HijackThis is wrong. The files are not missing.

    Your log is clean. If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!
     
  9. graeme_e_smith

    graeme_e_smith Private E-2

    Thanx ever so much chaslang. I can't tell you how greatful I am for your help getting this sorted out.

    The good news is that I do almost everything in the How to protect yourself from malware! tutorial already. I was missing the Ccleaner step, although I've got it now, and the stuff about adding passwords to all account (I don't normally bother since I'm the only user).

    Thanx again.
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Make sure you password protect your account. It does not matter if you are the only user. Malware developer love to find PCs with no passwords on user accounts. Especically if the account has admin priviledges. If they find you running like this, they can take total control of your PC and even lock you out because they can create a password which you will not know. Then you would be in big trouble! ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds