Green Link Spyware

Discussion in 'Malware Help (A Specialist Will Reply)' started by J8son, Apr 11, 2005.

  1. J8son

    J8son Corporal

    Is anyone familiar with the spyware app that changes certain words on web pages into green links to advertisement sites?

    For example: The word "spyware" in the sentence above is a link to a site trying to sell spyware removal software.

    This is the address of the link as I see it on my P.C.: http://69.42.87.214/cgi-bin/ezlclk.fcgi?id=6735

    I've ran every Spyware program know to man including Norton System Works, Ad-Aware, Spybot and the beta edition of Microsoft's new spyware app but to no avail. I also followed the Basic Spyware, Trojan And Virus Removal tutorial tutorial to a T but no luck there either.

    As a side note I'm also receiving the Aurora pop-ups mentioned in another thread and they all have the same address as the link above. Am I right in assuming the problems could both be stemming from the same app?

    I have a log file available when ready.
     
  2. J8son

    J8son Corporal

    Bump
     
  3. solaris89

    solaris89 First Sergeant

    It's not spyware per se, it's code written into the page.
     
  4. J8son

    J8son Corporal

    What do you suggest? This is a problem that only started last week.
     
  5. J8son

    J8son Corporal

    Sorry for bumping this again but it's kind of hard keeping it on the main page with all the activity on the forum.

    Since I havn't heard what might be causing this I'll go ahead and post my log file just incase anyone would like to take a look at it and see if they can make senes of it.

    Thanks again.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    By bumping your thread you only made it take longer for someone to respond.
    We look for the oldest threads with 0 responses first. By bumping, your response was not 0 and you made it newer rather than older. So you see bumping will not help you.
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Is this next line valid? Do you recognize this URL?
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.rr.com/flash/index.cfm

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    d:\windows\system32\rnadopg.exe

    After killing all the above processes, click "Back".
    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = about:blank
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = about:blank
    F2 - REG:system.ini: Shell=Explorer.exe D:\WINDOWS\Nail.exe
    O2 - BHO: BolgerObj Class - {302A3240-4805-4a34-97D7-1645A0B08410} - D:\WINDOWS\Bolger.dll
    O2 - BHO: ohb - {999A06FF-10EF-4A29-8640-69E99882C26B} - D:\WINDOWS\System32\rtneg.dll
    O3 - Toolbar: (no name) - {2CDE1A7D-A478-4291-BF31-E1B4C16F92EB} - (no file)
    O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
    O4 - HKLM\..\Run: [gah95on6] D:\WINDOWS\System32\gah95on6.exe
    O4 - HKLM\..\Run: [cwibzao] d:\windows\system32\rnadopg.exe
    O4 - HKLM\..\RunOnce: [WMC_RebootCheck] D:\WINDOWS\inf\unregmp2.exe /FixUps
    O4 - HKCU\..\Run: [a05mRQc7i] redatelc.exe
    O4 - HKCU\..\RunOnce: [MPlayer2_FixUp] D:\WINDOWS\inf\unregmp2.exe /Fixups
    O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm
    O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINDOWS\web\related.htm


    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    D:\WINDOWS\Bolger.dll
    D:\WINDOWS\System32\rtneg.dll
    d:\windows\system32\rnadopg.exe
    D:\WINDOWS\System32\gah95on6.exe
    D:\WINDOWS\System32\redatelc.exe
    C:\Program Files\AutoUpdate <--- the whole folder

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST).

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  8. J8son

    J8son Corporal

    This is O.K. because it's my Road Runner home page.

    The good news is the green links have disappeared. The bad news is I still have the Aurora pop-up software installed and that's what's really doing the most damage to my P.C. and slowing everything down.

    Here is the new log file. Do you see anything else there that I might be able to delete and get rid of Aurora?

    Should I start a new thread for Aurora since it's a new issue?

    Thanks again guy. You've been a big help. ;)
     

    Attached Files:

  9. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you fix the below line last time in HijackThis?

    F2 - REG:system.ini: Shell=Explorer.exe D:\WINDOWS\Nail.exe

    Please look in c:\windows does the nail.exe file exist.

    If so fix the F2 line again using HJT. Then boot into safe mode and rename the nail.exe file to nail.xxx. Now locate your system.ini file (c:\windows\system.ini) and double click on it from Windows Explorer. That will open the file up in notepad. Look for a line have the D:\WINDOWS\Nail.exe file on it and delete it. Save the the file and exit notepad.

    Reboot into normal mode and post a new HJT. Tell me the results of the above and how things are working.
     
  10. J8son

    J8son Corporal

    I found the nail.exe in the d:\windows folder and I renamed it as instructed. The problem I've come to is that when I open the system.ini file in safe mode it does not list the nail.exe.

    Here is the contents of my system.ini file:

    ; for 16-bit app support
    [drivers]
    wave=mmdrv.dll
    timer=timer.drv
    [mci]
    [driver32]
    [386enh]
    woafont=dosapp.FON
    EGA80WOA.FON=EGA80WOA.FON
    EGA40WOA.FON=EGA40WOA.FON
    CGA80WOA.FON=CGA80WOA.FON
    CGA40WOA.FON=CGA40WOA.FON
     
  11. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay! But is the line now gone from your HJT log? Are you currently in normal boot mode or safe mode?
     
  12. J8son

    J8son Corporal

    Yes. As you will see in the new log file I have attached it still appears under the following heading:

    F2 - REG:system.ini: Shell=Explorer.exe D:\WINDOWS\Nail.exe

    I noticed that it says REG:system.ini. Could this be an entry in my registry I should remove?
     

    Attached Files:

  13. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


    Did you try fixing the F2 line again using HijackThis?

    Please look in c:\windows did the nail.exe file come back? Or is it still nail.xxx?

    system.ini is a file and you already looked in the file for nail.exe
     
  14. J8son

    J8son Corporal

    I tried fixing that line with HijackThis again just to double check. However, it seems that when ever I reboot the nail.exe returns in the d:\windows folder (the nail.xxx is still there as well).

    NOTE: Windows is installed on my D:\ drive not my C:\. Just thought I'd mention that so there is no confusion.
     
  15. J8son

    J8son Corporal

    UPDATE:

    I was browsing around my d:\windows folder trying to see what I could find and I stumbled onto what I think could be the source my problem.

    There is a file called vpdvsahha.exe. Why did this particular file catch my eye? Because the icon associated with this file is exactly the same as the one on all of the Aurora pop-ups.

    I checked the properties and it was created about a week ago (about the same time the Aurora pop-ups appeared). It is also created by a company called Direct Revenue. After some research on the net I have found they are a leading spyware advertisement company.

    I'm going to attempt to delete the file in safe mode to see if that works. What should I do about the nail.exe file that still remains?
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Try this!


    - Click Start > Run and type: cmd and then click OK! This brings up a command prompt window.
    - At the command prompt opens, type the below command and then hit the enter key:

    nail.exe /FullRemove

    Close the command prompt window and reboot and post a current HJT log and tell me where things stand now.

    Were you able to remove the other file you found?
     
  17. J8son

    J8son Corporal

    I tried the cmd - nail.exe /FullRemove command and it looks like it's gone. So far it has not returned.

    However, when I deleted the vpdvsahha.exe file in safe mode it returns apon reboot (also when I try renaming it to vpdvsahha.xxx). I am certain this is directly related to the Aurora pop-ups so it's imperative that I get rid of this file (and all other registry entries in order to keep it from re-installing itself).

    Apon further investigation in the Properties menu I have learned that it is also associated with an executable file called buddy.exe.

    Here is my most recent HijackThis log.
     

    Attached Files:

  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    In the below steps I'm assuming that you saw the vpdvsahha.exe and buddy.exe files in the D:\windows folder. If that is not correct just substitute into my directions the proper folder name.

    Please download Pocket KillBox and extract it to its own folder somewhere.

    Please run Pocket Killbox. Select the option to Replace on Reboot.

    Now, Copy and Paste D:\WINDOWS\vpdvsahha.exe into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click No.

    Now, Copy and Paste D:\WINDOWS\buddy.exe into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click No.

    Now, Copy and Paste d:\windows\system32\pfppgsl.exe into the box and check the option to Use Dummy. Now, Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click Yes!

    And allow your system to reboot but boot into safe mode.

    In safe mode run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions:
    O4 - HKLM\..\Run: [lfmxzzr] d:\windows\system32\pfppgsl.exe

    After clicking Fix, exit HJT.

    I want to double check that the bad files are really gone so let's also do the below.

    While still in safe mode run Windows Explorer to delete
    D:\WINDOWS\vpdvsahha.exe
    D:\WINDOWS\buddy.exe
    d:\windows\system32\pfppgsl.exe

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
    Last edited: Apr 15, 2005
  19. CalRodeo

    CalRodeo Private E-2


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds