VX2, PeopleOnPage,etc

Discussion in 'Malware Help (A Specialist Will Reply)' started by screedman2, Jan 8, 2005.

  1. screedman2

    screedman2 Private E-2

    I have been trying to get rid of vx2, peopleOnPage and a few other spyware/malware from my computer for a month. I have read many of the support forum postings, and was going to attempt to follow the directions for removal, but I get the impression that I need to run hijackthis first as the vx2 renames itself differently (dill names may not be the same as what I have been reading). I am ready to call dell and have them walk me through a clean install of windows xp home (my existing os) but I hate to do that since my wireless network drivers are very difficult to find and install.....HELP...I have run spybot S&D, adaware with the vx2 fix, a2, and cwshredder...my desktop looks like an ad for antispyware...I have the same problem as many others....it is detected, but not removed in safe and reg mode and vx2 fix says system clean....I am somewhat of a novice, so I really need detailed help. Thanks.
     
  2. PhilliePhan

    PhilliePhan Guest

    Hi screedman2,

    Please start with the Cleanup Tutorial HERE:

    READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan and Virus Removal

    There are only a few of us Volunteers who regularly offer advice in this forum. Running through the above Tutorial will remove a lot of stuff that would otherwise clog a HijackThis Log and save us valuable time.

    Please let us know the steps that you are able to complete and the ones that give you problems. Note that you need to be in Safe Mode with System Restore OFF (if you have it) and have the Viewing of Hidden Files ENABLED as per the instructions in the link. Make sure to do the Online Scans.

    Post back and let us know how you fared. Also, send us a HijackThis Log. Please be sure to follow the instructions below:

    Note that your HijackThis should be up-to-date (v1.99) and MUST be extracted to its own safe folder – C:\Program Files\HijackThis!
    Should you need a Fresh Download of HJT, get it HERE: HijackThis v1.99

    Also note that, before you scan, you MUST close all running programs including your web browser, e-mail and items in the system tray.

    Please save your HJT Log as a .txt File and attach it via the "Manage Attachments" tool in the Additional Options section when you post.

    Completing the above Tutorial should put your machine in a good state to go after that peasky VX2 variant if you are indeed infected with it. I’m not around this forum too often these days, but somebody will try to take a look when they get a chance.

    Best luck :)
    PP
     
  3. screedman2

    screedman2 Private E-2

    I just installed and ran the microsoft windows antispyware software...it is taking forever, then I will install and run the rest of the downloading tools you stated. I will then run hijack this and send you the report. THanks for getting me started....I will be back to you with the hijack this report as soon as I finish.....Is it okay if I do all the requirements, send the hijackthis report and shut down, while I await your answer? Thanks, Screedman2
     
  4. PhilliePhan

    PhilliePhan Guest

    Yes, go ahead and shut down. After I take a look (Probably get some free time Sunday evening), if further scans are needed you will not be able to reboot after doing them. But, we'll wait and see.

    PP :)
     
  5. screedman2

    screedman2 Private E-2

    Now I have a real problem...I finished the microsoft windows antispyware scan, removed all it suggested, rebooted as told, and now when I reboot, it gives the message cannot find C: I keep hitting okay until it goes away and the desktop comes back up....HOWEVER, my firewall is off and will not allow me to turn it on....On Boot up it says:
    an exception occured while trying to run "c:\windows\system32\cjrpol.dll", umonitor----------I press okay
    windows cannot find C:\progra~1\toolbar\tbps.exe type name correctly and search..............i press okay
    windows cannot find c:............i press okay
    windows cannot find c:............i press okay
    desktop loads and message tells me firewall is off, i open security center and try to enable and it says security center could not turn on windows firewall
    to to control panel and open windows firewall and try to turn on and I get the message windows firewall cannot be displayed because associated service is not running..do you want to start windows internet connection sharing (ICS) I say yes and it tells me it cannot start windows internet connection sharing....
    PLEASE help...without a firewall, I am in worse shape for getting more viruses and adaware
     
  6. PhilliePhan

    PhilliePhan Guest

    Hi Screedman2,

    I'm sorry - I did not realize that M$ Anti-spy had made it into the tutorial. When you mentioned it, I thought it was something you were doing on your own.

    cjrpol.dll & tbps.exe are Malware. The M$ program obviously did not remove them thoroughly.

    Try to get me a HJT log in normal boot. Also, see if you can run Spybot and Ad-Aware in safe mode to clean up those remnants.

    I won't be here again until Sunday night at the earliest. I dropped a message to Chaslang to take a look at this thread and he may have a suggestion or two.


    For your Firewall concerns, try one of these FREE ones temporarily until we figure this out! Actually, if you have been using the Windows Firewall, you may find either of these preferable as they monitor both inbound and outbound traffic:

    Sygate Personal Firewall Free

    ZoneAlarm Free

    Hang in there! I will try to check back Sunday night and we will work this out!

    PP :)
     
  7. screedman2

    screedman2 Private E-2

    Thanks, I am running spybot and adaware in safe mode now....then I will reboot in normal mood and run hijack this and send you the log....I will install one of the other firewalls in the meantime for safety. THanks, Screedman
     
  8. screedman2

    screedman2 Private E-2

    Okay...ran spybot and adaware in safe mode. When I rebooted I said to go back to last known good configuration. Norton came up on boot and said fixing log on c and I did not get a message that windows could not find c: this time....however, I still cannot turn on my firewall...I am sending you the logfile from hijack this....it is attached. Now I will try to download one of the other firewalls you sent me so I can feel safe until we fix the windows firewall. My fear is I had so much trouble getting my existing dlink wireless network card to work with the windows firewall, I am afraid to install another firewall for fear the network will not work.....I hope this doesn't happen....maybe I'll just keep the system shut down until I hear back from you.....I did uninstall ms antispyware....I thought it best to get rid of it after it "lost" my firewall ability. Anyway, thanks again and the logfile is attached. Screedman
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I believe PP has hit the sack and I heading there now too. But this will get you started:

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).


    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\WINDOWS\system32\lrcccp32.exe
    C:\WINDOWS\system32\lap1_qc.exe

    After killing all the above processes, click "Back".
    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 216.19.0.250 idenupdate.motorola.com
    O4 - HKLM\..\Run: [q33f37W] lrcccp32.exe
    O4 - HKCU\..\Run: [b0spRXa5g] lap1_qc.exe

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\system32\lrcccp32.exe
    C:\WINDOWS\system32\lap1_qc.exe

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  10. screedman2

    screedman2 Private E-2

    Thanks, I will go do that. After I installed zone alarm last night, I ran adaware and spybot in reg mode and for the first time in a month, I did not see vx2, but peopleOnPage came back. And the computer is still running very slow and sluggish. I am guessing this lrccp32 and lap1_qc hold the remaining spyware located on this computer...possibly vx2 leftover files or PeopleOnPage?
    I guess the microsoft antispyware may have gotten rid of it or most of it....along with my ability to use the windows firewall? I did remove it from my computer completely after what happened, and because it constantly warned me about "hunter" trying to access my system, and no matter how many times I said remove and it successfully removed access and files, the message came back. I think I will wait on installing their new antispyware until it is more perfected.
    Just as an aside, will what you have told me to do allow me to enable my windows firewall again, or is that gone for good? Do you know of any way to possibly get it back? I have zone alarm installed now and running with my norton antivirus, and I plan to finally install spyblaster, which I have been holding off on until I got this thing under control, which I hope is now under control. Any suggestions on other software I should have to avoid going through this again? Thanks again for all your help...Screedman
     
  11. screedman2

    screedman2 Private E-2

    Decided to run adaware in safe mode one more time before trying your fix and guess what? I lied! It found VX2 again, so it is NOT gone...still there....I guess it was just wishful thinking.......and as usual, it could not delete the system32 guard temp. I will go try your fix now.....and send you the log file...hopefully that will help. Thanks, Screedman
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If you have not run my fix, run it! You need to do those steps and post a new HJT log so we can continue.

    No these will most likely not bring back you Windows firewall but you will not need it if you are using ZoneAlarm (which may be better for you anyway). The stuff we normally recommed to do to help keep you safe is here: How to Protect yourself from malware!

    If you are having VX2 problems being reported and they are not getting fixed, do the following too.

    Download this tool:

    Generic Find It Tool - NT/2000/XP

    Extract all the files from the Generic Tool into its own folder.
    Then run find.bat. Post the log it creates back here as an attachment.
     
  13. screedman2

    screedman2 Private E-2

    Okay...I ran your fix and have attached both the hijack this file and the findit log....just as an aside...after the fix, my webjal program no longer works. Is this because we did a fix on hosts:216.19.0.250 idenupdate.motorola.com? Can this be fixed or do I need to reinstall the program? I am ready for the next step on the vx2 problem....Thanks, Screedmam
     

    Attached Files:

  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    The IP address in that Hosts line belongs to:

    216.19.0.250 = [ taz.cybervisions.net ]

    OrgName: RTD Systems and Networking
    OrgID: RTD
    Address: 7411 E. Addis
    City: Prescott Valley
    StateProv: AZ
    PostalCode: 86314
    Country: US
    NetRange: 216.19.0.0 - 216.19.63.255
    CIDR: 216.19.0.0/18
    NetName: NETWORK-RTD
    NetHandle: NET-216-19-0-0-1
    Parent: NET-216-0-0-0-0
    NetType: Direct Allocation
    NameServer: NS2.COMMSPEED.NET
    NameServer: NS3.COMMSPEED.NET
    Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
    RegDate: 1998-07-07
    Updated: 2002-02-26
    TechHandle: LC683-ARIN
    TechName: CommSpeed LLC
    TechPhone: 1-928-772-1111
    TechEmail: tech@commspeed.net

    Whereas the URL belongs to:
    idenupdate.motorola.com = [ 129.188.16.21 ]

    Registrant:
    Motorola Inc. MOTOROLA-DOM
    1303 E Algonquin Road
    Schaumburg IL 60196
    US
    Domain Name: MOTOROLA.COM
    Administrative Contact Technical Contact:
    Internic Motorola A Internic@MOTOROLA.COM

    Motorola Inc
    1303 E. Algonquin Road
    Schaumburg IL 60196
    US
    847-576-5000 fax: 602-952-4314

    They are not the same as far as I can see. And thus any time you entered idenupdate.motorola.com you wound up going to taz.cybervisions.net Is that what you expect to happen. It looks like a hijack to me. Any program that needs to add a line to your hosts file to work should be suspect.

    It is possible that one of the O4 lines we fix belongs to Webjal but they sure look like trojans are not documented anywhere. Poor programming methods can lead to problems like this where a valid program appears to be a trojan. Foot prints where the name field in the [] appears to be jibberish are 99.9% of the time a trojan or some form of malware.

    Let's look into fixing Webjal later when the rest of your problems are fixed. But answer a question. Can you see the below two files in your Recycle Bin:
    lrcccp32.exe
    lap1_qc.exe


    Your log now does show what you mentioned before. VX2 problems!!! These lines are what I'm referring too.
    O1 - Hosts: 69.20.16.183 auto.search.msn.com
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 ieautosearch

    I wonder where you picked them up from since we first started working your thread. They may have been there and the others problems could have been masking them.

    I'll post the start of a multi step fix in my next message (it requires some work to remove this).

    In the mean time you will need to download some additional tools. Do not run them just download and be ready to run them when requested. So download the following:


    http://www.downloads.subratam.org/DllCompare.exe

    Pocket KillBox

    VX2.BetterInternet Finder XP/2k - Version Msg126
     
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have a pretty bad VX2 infection with a lot of files. Here is a list of files that we need to delete using PocketKillbox.

    c:\Windows\System32\dlvacm.dll
    c:\Windows\System32\irn8l55u1.dll
    c:\Windows\System32\PGBDLG.DLL
    c:\Windows\System32\mv26l9fs1.dll
    c:\Windows\System32\e402ledo1h0c.dll
    c:\Windows\System32\mv88l9lu1.dll
    c:\Windows\System32\enj8l11u1.dll
    c:\Windows\System32\mv64l9jq1.dll
    c:\Windows\System32\iYlmCoIn_0_v4.dll
    c:\Windows\System32\n0n60a5sed.dll
    c:\Windows\System32\n2n60c5sef.dll
    c:\Windows\System32\g8lm0i31e8.dll
    c:\Windows\System32\en24l1fq1.dll
    c:\Windows\System32\k4260efseh260.dll
    c:\Windows\System32\enlql1351.dll
    c:\Windows\System32\p0p60a7sed.dll
    c:\Windows\System32\fpn4035qe.dll
    c:\Windows\System32\CRNSOLE.DLL
    c:\Windows\System32\nkvdmd.dll
    c:\Windows\System32\RPGOBJ.DLL
    c:\Windows\System32\l60u0gd9e60.dll
    c:\Windows\System32\fpl2033oe.dll
    c:\Windows\System32\FQNTSUB.DLL
    c:\Windows\System32\cbyptsvc.dll
    c:\Windows\System32\WYVDMOE.DLL
    c:\Windows\System32\EJDAZ32.DLL
    c:\Windows\System32\en6sl1j71.dll
    c:\Windows\System32\iafxhk.dll
    c:\Windows\System32\ABMPVCNO.DLL
    c:\Windows\System32\mv44l9hq1.dll
    c:\Windows\System32\f60o0gd3e60.dll
    c:\Windows\System32\PETOREC.DLL
    c:\Windows\System32\DQDIM.DLL
    c:\Windows\System32\ktjsl7171.dll
    c:\Windows\System32\i2nm0c51ef.dll
    c:\Windows\System32\LRCALSPL.DLL
    c:\Windows\System32\IFMUI.DLL
    c:\Windows\System32\NCTRAP.DLL
    c:\Windows\System32\azaul3591.dll
    c:\Windows\System32\KFDBE.DLL
    c:\Windows\System32\m828lifu1828.dll
    c:\Windows\System32\POGFILT.DLL
    c:\Windows\System32\f42mlef11h2.dll
    c:\Windows\System32\gp4ol3h31.dll
    c:\Windows\System32\gpnul3591.dll
    c:\Windows\System32\n84slih7184.dll
    c:\Windows\System32\d?dplay.exe


    and C:\WINDOWS\System32\guard.tmp

    And here is how you need to do it.

    Here is the procedure to use to delete them. Run Pocket Killbox. Select the option to Replace on Reboot.

    Now you are going to repeat the below steps for every file except C:\WINDOWS\System32\guard.tmp (we will add it separately at the end). Replace the the word fullpathfile with the actual full file name path from above (one file at a time). For example, the first time you paste in c:\Windows\System32\dlvacm.dll

    1) Now, Copy and Paste fullpathfile into the box
    2) Check the option to Use Dummy.
    3) Now, Click the Red X and Yes to the confirmation message.
    4) A message will ask if you want to reboot now – Click NO.
    5) Repeat for all files except the last one

    For the last file, we will be rebooting when prompted. Here is the final step of the file deletions:

    Now, Copy and Paste C:\WINDOWS\System32\guard.tmp into the box. Check the option to Use Dummy and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click YES and allow your machine to reboot Normally. Tell me if you get any error messages on reboot and tell me the exact messages.

    After it reboots get another find.bat log and post it. Also post a new HijackThis log.

    Important:
    Do not reboot after getting the above logs or the problem files could mutate. Wait until we get back to you on the next steps.
    Also run Windows Explorer and look in C:\WINDOWS\System32 for the file guard.tmp. Tell me if you see it or not
     
  16. screedman2

    screedman2 Private E-2

    Hi Guys, sorry it took a day for me to get back to you, but what I feared most, reformatting the entire system, happened. The whole system started doing weird things....cannot find c:, a host of other crazy messages, and many of my programs just stopped working....so, I spent the day reformatting the hard drive and reinstalling the os and all the software....This is the second time in a year I have had to do this with two different computers due to spyware.....what a pain in the neck. Anyway, system is back up and running and the only problem I seem to have is spybot removed "wild tangent" and now I get an rundll error message every time I boot up saying: Error loading c:\Program Files\Wild Tangent\Apps\CDA\CDA Engine0400.dll
    Don't know what that means, but I click okay and everything appears to be up and running....Any idea what the message means and if it can cause a problem? Thanks, Screedman
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That's too bad you had to reformat!

    You will most likely see an entry for WildTangent in your HJT log. Have HJT fix it.

    You need to do all the steps in the below link ASAP before you run into problems again:

    How to Protect yourself from malware!
     
  18. PhilliePhan

    PhilliePhan Guest

    Hi Screedman,

    I just wanted to extend an apology for the hassle that the M$ tool caused. It has been removed from the Cleanup Tutorial, at least until the bugs get worked out! Even though Chas and I volunteer our free time in this forum and offer our advice free of charge, we take pride in doing the best job possible. This incident reflects poorly upon us.
    Please accept my sincere apology for the inconvenience this has caused you.

    PP
     
  19. screedman2

    screedman2 Private E-2

    Hey Phil...you have nothing to appologize about....you guys provide a great service and my incident is rare from what I have seen in your forum. Looking on the bright side, at least we all were able to discover some bugs with the new ms antispyware that may help others.....I appreciate the time you guys took to help me and I plan to continue as a member of your site. You guys are very knowledgable and helpful to so many of us, and when you think about all the bad out there on the internet, it is great to have a reliable and resourceful site to turn to...Thanks again, Screedman
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Screedman,

    Thanks for being so understanding. I just wish we knew what went wrong. You system did have a load of different problems that we were uncovering as we went along. Sometime fixing one problem unmasks others (yes some malware inhibits other malware). Again we are sorry this happened and with we could hae fixed this up without having a format involved. Make sure you take all the precautions in the How to Protect yourself from malware! thread ASAP. These will help to lower the chances of running into problems like this again.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds