Outerinfo popups

Discussion in 'Malware Help (A Specialist Will Reply)' started by boxcarsven, Oct 21, 2006.

  1. boxcarsven

    boxcarsven Private E-2

    Hello,
    I have been directed to your site by a friend who recommended your help. I have been getting popups from OIN for about two weeks now, and have run several scans which find items like "purity.scan downloader" and "small.downloader" I followed the instructions in the read and run first sticky, but the problems have not stopped. Attached are the logs from bitdefender, panda activescan, getrunkey, and shownew.
    i would appreciate any help you can give me
    thanks
    chad
    (i will reply to my own message with the last log. )
     

    Attached Files:

  2. boxcarsven

    boxcarsven Private E-2

    additional log

    here is the fourth log...
     

    Attached Files:

  3. boxcarsven

    boxcarsven Private E-2

    hijack this log attached
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Is your copy of Spyware Doctor a paid or free trial version? If free, uninstall it.
    If Spyware Doctor is a paid version, keep it, and uninstall Windows Defender.

    Did you configure the below Proxy Override settings yourself?

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 64.136.29.30;64.136.21.30;64.136.29.34;searchap.untd.com;
    127.0.0.1;localhost;*microsoft.com;*windowsupdate.com;*wustat.windows.com;*.pogo.com;*.worldwinner.com;*test-speed.com;liveupdate.symantecliveupdate.com;*symantec.com;
    *.nai.com;*.networkassociates.com;*photosite.com;*.dir.untd.com;<local>


    Now uninstall the below old versions of software:
    Java 2 Runtime Environment, SE v1.4.2
    MarketResearch

    Start by downloading a tools we will need - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.
    C:\Documents and Settings\hendersonloveday\Application Data\W?nSxS\?srss.exe
    C:\PROGRA~1\COMMON~1\SKS~1\rundll.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell4me.com/myway
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.dell4me.com/myway
    R3 - URLSearchHook: (no name) - {174DC437-5D8E-2570-D2AB-77B5E9C6DFCC} - C:\WINDOWS\system32\pjcjtyqx.dll
    O2 - BHO: (no name) - {126C9698-0854-7285-2BB1-0095C8F589CD} - C:\WINDOWS\system32\lqdk.dll (file missing)
    O2 - BHO: (no name) - {174DC437-5D8E-2570-D2AB-77B5E9C6DFCC} - C:\WINDOWS\system32\pjcjtyqx.dll
    O2 - BHO: - {2a77fcd8-a40c-4789-ac6d-9555c74d968b} - C:\WINDOWS\system32\jenlkb.dll (file missing)
    O2 - BHO: - {5f30cfbb-dd56-481a-b253-325d40a5f897} - C:\WINDOWS\system32\fv.dll (file missing)
    O2 - BHO: - {8aefbf9a-7e67-4d59-be88-bdbd2d0bc522} - C:\WINDOWS\system32\wqtcr.dll (file missing)
    O2 - BHO: (no name) - {AAD0FE89-2524-45F2-47DD-65AD390F7DF7} - C:\WINDOWS\system32\oibwddw.dll (file missing)
    O2 - BHO: (no name) - {C0F1FBFC-2802-1ED6-3F31-6EDD4EFF15F0} - C:\WINDOWS\system32\ksk.dll (file missing)
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Zzko] C:\Documents and Settings\hendersonloveday\Application Data\W?nSxS\?srss.exe
    O4 - HKCU\..\Run: [Aida] "C:\PROGRA~1\COMMON~1\SKS~1\rundll.exe" -vt ndrv

    After clicking Fix, exit HJT.

    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):


    C:\Documents and Settings\hendersonloveday\Application Data\W?nSxS\?srss.exe
    C:\Program Files\Common Files\SKS~1\rundll.exe
    C:\WINDOWS\SYSTEM32\cmd.ftp
    C:\WINDOWS\SYSTEM32\wnsapisv.exe
    C:\WINDOWS\SYSTEM32\pjcjtyqx.dll

    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    After reboot, please delete the below folders. Note that the Questionmarks represent unprintable characters that were found during the scans, but they may appear to you as normal characters when you locate them using Windows Explorer. I will add comments in RED next to each item. Note the date of the folders which will help you to locate them and to distinguish them from valid folder names than may also be seen.
    Code:
    [B]C:\Documents and Settings\hendersonloveday\Application Data\[/B]
    [B]CROSOF~1      Sep 15 2006              "??crosoft"  [COLOR=red] <-- will look like Microsoft!  Don't confuse with the real one![/COLOR][/B]
    [B]CROSOF~1.NET  Sep  1 2006              "??crosoft.NET"   [COLOR=red]<-- will look like Microsoft.NET  Don't confuse with the real one![/COLOR][/B]
    [B]MCROSO~1.NET  Oct 19 2006              "M?crosoft.NET"  [COLOR=red] <-- will look like Microsoft.NET  Don't confuse with the real one![/COLOR][/B]
    [B]TSKS~1        Oct  8 2006              "T?sks"    [COLOR=red]<-- will look like Tasks[/COLOR][/B]
    [B]WNSXS~1       Aug 27 2006              "W?nSxS"    [COLOR=red]<-- will look like WinSxS[/COLOR][/B]
    [B]àDOBE         Oct 13 2006              "àdobe"     [COLOR=red]<-- will look like adobe[/COLOR][/B]
    [B]YMBOLS~1      Sep  2 2006              "?ymbols"    [COLOR=red]<-- will look like Symbols[/COLOR][/B]
    [B]SKS~1         Oct  1 2006              "??sks"     [COLOR=red] <-- will look like Tasks[/COLOR][/B]
     
    [B]C:\Program Files\[/B]
    [B]SMBOLS~1      Sep 30 2006              "s?mbols"    [COLOR=red]<-- will look like Symbols[/COLOR][/B]
    [B]YMBOLS~1      Sep 29 2006              "?ymbols"    [COLOR=red]<-- will look like Symbols[/COLOR][/B]
    [B]PPPATC~1      Oct 20 2006              "?ppPatch"   [COLOR=red] <-- will look like AppPatch[/COLOR][/B]
    [B]SSEMBL~1      Sep 17 2006              "?ssembly"    [COLOR=red]<-- will look like Assembly[/COLOR][/B]
     
    [B]C:\Program Files\Common Files\[/B]
    [B]SSTEM3~1      Sep  2 2006              "s?stem32"   [COLOR=red] <-- will look like System32[/COLOR][/B]
    [B]SKS~1         Aug 27 2006              "ç?sks"      [COLOR=red]<-- not sure what this will look like[/COLOR][/B]
    [B]MBOLS~1       Oct 10 2006              "??mbols"    [COLOR=red] <-- will look like Symbols[/COLOR][/B]
    [B]SEMBLY~1      Sep  3 2006              "??sembly"  [COLOR=red]<-- will look like Assembly[/COLOR][/B]
    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\Temp
    C:\Documents and Settings\hendersonloveday\Local Settings\Temp

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT

    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  5. boxcarsven

    boxcarsven Private E-2

    Not to sound stupid, but i dont even know what proxy settings are, let alone how to override them.
    I followed the steps through fixing files with the hijack this program, but when i click on the killbox file, i get the message "Component MSCOMCTL.OCX or one of its dependencies not correctly registered: a file is missing or invalid."
    thanks for the advice so far; at least the popups are temporarily stopped.
    chad
     
  6. boxcarsven

    boxcarsven Private E-2

    okay, i downloaded it again and its working... i'll post again when i have the new logs.
    thanks
    chad
     
  7. boxcarsven

    boxcarsven Private E-2

    okay -- i couldn't find any of those files you mentioned under application data, program files or program common files, but here are the new logs...
    thanks
    chad
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Look again! And take a look at the newfiles.txt log from ShowNew for yourself. It does not lie. They are all there. One of them is even still running as shown in your HJT log:

    C:\Documents and Settings\hendersonloveday\Application Data\W?nSxS\?srss.exe

    If you are not seeing them (and take note of my comments in RED) then you did not follow the directions in step 2 or the READ & RUN ME.
     
  9. boxcarsven

    boxcarsven Private E-2

    okay, i had followed step two in the original read and run first post, but had not checked search hidden files in the explorer search menu. found every file you mentioned and deleted each. attached are three new log files...
    thanks for your patience
    chad
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Step 2 of the READ ME only applies to Windows Explorer not to Windows Search. You should have just opened Windows Explorer and manually navigated to the files/folders and deleted them. It is much faster than using search for each one.

    You missed one that you still need to delete:
    Code:
    "C:\Program Files\Common Files\"
    SKS~1         Aug 27 2006              "ç?sks"
    Also you missed the O4 line in HJT that showed [Aida], so let's fix it and a couple other lines.

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 64.136.29.30;64.136.21.30;64.136.29.34;searchap.untd.com;
    127.0.0.1;localhost;*microsoft.com;*windowsupdate.com;*wustat.windows.com;*.pogo.com;*.worldwinner.com;*test-speed.com;
    liveupdate.symantecliveupdate.com;*symantec.com;*.nai.com;*.networkassociates.com;*photosite.com;*.dir.untd.com;<local>
    O4 - HKCU\..\Run: [Aida] "C:\PROGRA~1\COMMON~1\SKS~1\rundll.exe" -vt ndrv

    After clicking Fix, exit HJT.

    Now reboot in normal mode


    Now attach the below new logs and tell me how the above steps went.

    1. ShowNew
    2. HJT



    Make sure you tell me how things are working now!
     
  11. boxcarsven

    boxcarsven Private E-2

    I started by using windows explorer, but missed every file. found and deleted the tasks folder and the hjt r1 entry, but still don't see the o4 entry. ran hjt three times, and it never came up.
    regardless, the computer seems healthy again. no hijacking of my windows, and i have switched to mozilla firefox. hope the two logs show clear seas, and thank you so much for your knowledge and patience.
    chad
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    My instructions were based on what was in the HJT log you posted in message number 8. It was still in that log. Apparently it had already been fixed by one of the steps but maybe it was not reflected in your HJT log yet. It is gone now. Your logs are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    4. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    7. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds