popups, redirects, coolweb/vx2?

Discussion in 'Malware Help (A Specialist Will Reply)' started by mooreb, Jan 4, 2005.

  1. mooreb

    mooreb Private E-2

    I'm stuck, have been trying all methods described for weeks. Any help appreciated!!

    Most consistent symptoms are popups to www.loadingwebsite.com/ormal/yyy12.html & others, repopulating of ws.bootconf & svchost32, HJT O1 entries for hosts 69.20.10.183, and VX2 variants found by Adaware with dlls that can't be deleted.

    I've run all the tools in the sticky thread in safe mode but can't beat it. Also have lost networking in safe mode, but the online tools don't find anything (except one entry from house call, 'HTML ADVER A').

    If someone can walk me through, I'd be eternally grateful....
     
  2. PhilliePhan

    PhilliePhan Guest

    Hi Mooreb,

    Please go ahead and send us a HijackThis Log. Please be sure to follow the instructions below:

    Note that your HijackThis should be up-to-date (v1.99) and MUST be extracted to its own safe folder – C:\Program Files\HijackThis!
    Should you need a Fresh Download of HJT, get it HERE: HijackThis v1.99

    Also note that, before you scan, you MUST close all running programs including your web browser, e-mail and items in the system tray.

    Please save your HJT Log as a .txt File and attach it via the "Manage Attachments" tool in the Additional Options section when you post.

    I’m not around this forum too often these days, but somebody will try to take a look when they get a chance.

    PP :)
     
  3. mooreb

    mooreb Private E-2

    thanks pp ! -- and whoever else may be able to help. your efforts are amazing and appreciated. here's the HJT log....
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You appear to have multiple antivirus applications installed and running. You need to uninstall all but one. Which one are you going to keep?
     
  5. mooreb

    mooreb Private E-2

    hi chaslang and thanks! open to suggestions. escan is the main one i have running now, giant trial is lapsed, norton turned off. from the log, ezshield is something i never knowingly installed and dont see any uninstall hooks.

    if i uninstall giant would that do the trick, or should i also kill escan?

    thanks!!!!
     
  6. PhilliePhan

    PhilliePhan Guest

    Hi Mooreb,

    Keep the escan, if thats's the one you want. Uninstall or turn off the rest.

    It is 2:15AM here and my eyes are killing me - Got to get some sleep! There are some items in your log that I'd like to deal with before going after the VX2 stuff.
    However, I am going to have to pick this up tomorrow evening - Sorry. Chaslang may jump back in before then. Either way, please download the following tools and have them handy so that we may proceed immediately when Chas or I check back:

    http://www.downloads.subratam.org/DllCompare.exe

    Pocket KillBox

    VX2.BetterInternet Finder XP/2k - Version Msg126


    Generic Find It Tool - NT/2000/XP

    LSP - Fix

    Please go ahead and run LSP-Fix and just click "Finish." Then, attach a fresh HJT Log and Chas or I will get back to you!

    Best :)
    PP
     
  7. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Keep Escan. You must uninstall Norton. It is stll running and still installed.
    Giant is not an antivirus application. It is more a spyware app! And they don't exist anymore now. They were bought my Microsoft.

    Ezshield is not an antivirus app either and you probably need it. ezsp_px.exe is the executable for Easy Systems CD & DVD writing software.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have a broken LSP chain. Run LSPFix that PP gave you the link for.
    Check the "I know what I am doing" box Click on mwtsp.dll on the left window and click on the arrow pointing to the right. Click Finish and follow the prompts.

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).


    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\WINDOWS\system32\tnlio\oluvbdj.exe
    C:\WINDOWS\system32\cekbw\ocdaf.exe
    C:\WINDOWS\system32\wqbhooxq\icixntmd.exe
    C:\WINDOWS\system32\xjjciwyo\frerchx.exe

    After killing all the above processes, click "Back".

    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 ieautosearch
    O1 - Hosts: 69.20.16.183 auto.search.msn.com
    O1 - Hosts: 69.20.16.183 ieautosearch
    O4 - HKLM\..\Run: [oluvbdj] C:\WINDOWS\system32\tnlio\oluvbdj.exe
    O4 - HKLM\..\Run: [ocdaf] C:\WINDOWS\system32\cekbw\ocdaf.exe
    O4 - HKLM\..\Run: [icixntmd] C:\WINDOWS\system32\wqbhooxq\icixntmd.exe
    O4 - HKLM\..\Run: [frerchx] C:\WINDOWS\system32\xjjciwyo\frerchx.exe
    O9 - Extra button: ComcastHSI - {669B269B-0D4E-41FB-A3D8-FD67CA94F646} - http://www.comcast.net/ (file missing)
    O9 - Extra button: Support - {8828075D-D097-4055-AA02-2DBFA9D85E8A} - http://www.comcastsupport.com/ (file missing)
    O9 - Extra button: Help - {97809617-3937-4F84-B335-9BB05EF1A8D4} - http://online.comcast.net/help/ (file missing)
    O10 - Broken Internet access because of LSP provider 'mwtsp.dll' missing
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://207.188.7.150/0781853c483095b0f302/netzip/RdxIE601.cab

    After clicking Fix, exit HJT.

    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\system32\tnlio\oluvbdj.exe
    C:\WINDOWS\system32\cekbw\ocdaf.exe
    C:\WINDOWS\system32\wqbhooxq\icixntmd.exe
    C:\WINDOWS\system32\xjjciwyo\frerchx.exe

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.

    The O1 - Hosts lines will come back. We'll fix that up in the VX2 clean process PP was talking a
     
    Last edited: Jan 5, 2005
  9. mooreb

    mooreb Private E-2

    thanks!!! i've deleted all anti-virus except escan, fixed the HJT entries and deleted the .exe files in safe mode. ran lspfix first, but O10 broken LSP entry came back. ran lspfix again and its gone for now. new log is attached... things are running ok but still got a popup...
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Extract all the files from the Generic Tool the PP had you download into their own folder.
    Then run find.bat. Post the log it creates back here as an attachment.
     
  11. mooreb

    mooreb Private E-2

    Thanks again chaslang -- Find It output file is attached.

    BTW, I ran this from the infected laptop without being connected to the internet. If that is a problem, I can re-run this evening when the laptop will be connected again. Not sure if it matters.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Here is a list of files that we need to delete using Killbox.
    C:\WINDOWS\System32\wkfeman.dll
    C:\WINDOWS\System32\n64s0gh7e64.dll
    C:\WINDOWS\System32\GRARAspi.dll
    C:\WINDOWS\System32\k2620cjoefoc0.dll
    C:\WINDOWS\System32\reched32.dll
    C:\WINDOWS\System32\cmrtcli.dll
    C:\WINDOWS\System32\leeps11n.dll
    C:\WINDOWS\System32\j86mlij118o.dll
    C:\WINDOWS\System32\i2jq0c15ef.dll
    C:\WINDOWS\System32\tbappcmp.dll
    C:\WINDOWS\System32\gp4ql3h51.dll
    C:\WINDOWS\System32\eoent97.dll
    C:\WINDOWS\System32\amwav.dll
    C:\WINDOWS\System32\nimsmgr.dll
    C:\WINDOWS\System32\j04o0ah3ed4.dll
    C:\WINDOWS\System32\afstream.dll
    C:\WINDOWS\System32\rDstapi.dll
    C:\WINDOWS\System32\t28ulcl91fq.dll
    C:\WINDOWS\System32\g204lcdq1f0e.dll
    C:\WINDOWS\System32\nbtcfgx.dll
    C:\WINDOWS\System32\vxa256.dll
    C:\WINDOWS\System32\ruched20.dll
    C:\WINDOWS\System32\aza007fme.dll
    C:\WINDOWS\System32\jt2007fme.dll
    C:\WINDOWS\System32\dnpo0173e.dll
    C:\WINDOWS\System32\fp4003hme.dll
    C:\WINDOWS\System32\enpol1731.dll
    C:\WINDOWS\System32\mjiole16.dll
    C:\WINDOWS\System32\wdbhits.dll
    C:\WINDOWS\System32\p26s0cj7efo.dll
    C:\WINDOWS\System32\lul8093ue.dll
    C:\WINDOWS\System32\m0lsla371d.dll
    C:\WINDOWS\System32\ubnp.dll
    C:\WINDOWS\System32\tkpmonui.dll
    C:\WINDOWS\System32\czmmdlg.dll
    C:\WINDOWS\System32\purfnet.dll
    C:\WINDOWS\System32\mzcsubs.dll
    C:\WINDOWS\System32\cLrules.dll
    C:\WINDOWS\System32\mqls2.dll
    C:\WINDOWS\System32\ixnathlp.dll
    C:\WINDOWS\System32\pbtorec.dll
    C:\WINDOWS\System32\SjOrder.dll
    C:\WINDOWS\System32\LSXPM12N.DLL
    C:\WINDOWS\System32\kxdnec.dll
    C:\WINDOWS\System32\dn2m01f1e.dll
    C:\WINDOWS\System32\cbvfat.dll
    C:\WINDOWS\System32\itq.dll
    C:\WINDOWS\System32\kidpl.dll
    C:\WINDOWS\System32\dhmodemx.dll
    C:\WINDOWS\System32\PGDLIB32.DLL
    C:\WINDOWS\System32\kzdgr1.dll
    C:\WINDOWS\System32\opmdspif.dll
    C:\WINDOWS\System32\mv2sl9f71.dll
    C:\WINDOWS\System32\p26slcj71fo.dll
    C:\WINDOWS\System32\dhsapi.dll
    C:\WINDOWS\System32\dCd8.dll
    C:\WINDOWS\System32\wuhatm.dll
    C:\WINDOWS\System32\lvl8093ue.dll
    C:\WINDOWS\System32\itsso.dll
    C:\WINDOWS\System32\cslbact.dll
    C:\WINDOWS\System32\kwdpl.dll
    C:\WINDOWS\System32\cgyptdlg.dll
    C:\WINDOWS\system32\jsdvwsdk.dll


    and the last one is c:\WINDOWS\system32\guard.tmp

    And here is how you need to do it.

    Here is the procedure to use to delete them. Run Pocket Killbox. Select the option to Replace on Reboot.

    Now you are going to repeat the below steps for every file except C:\WINDOWS\System32\guard.tmp (we will add it separately at the end). Replace the the word fullpathfile with the actual full file name path from above (one file at a time). For example, the first time you paste in C:\WINDOWS\System32\wkfeman.dll

    1) Now, Copy and Paste fullpathfile into the box
    2) Check the option to Use Dummy.
    3) Now, Click the Red X and Yes to the confirmation message.
    4) A message will ask if you want to reboot now – Click NO.
    5) Repeat for all files except the last one

    For the last file, we will be rebooting when prompted. Here is the final step of the file deletions:

    Now, Copy and Paste C:\WINDOWS\System32\guard.tmp into the box. Check the option to Use Dummy and Click the Red X and Yes to the confirmation message. A message will ask if you want to reboot now – Click YES and allow your machine to reboot Normally.

    After it reboots get another find.bat log and post it. Do not reboot after posting this log. While it may not always do so, it can mutate and also spread to new file names thus making this process go on and on. We need to get all these files deleted before we can get to the next step.
     
    Last edited: Jan 5, 2005
  13. mooreb

    mooreb Private E-2

    Thanks -- will do -- one question first, should I use Killbox in safe mode or normal?
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It should not matter but safe mode can sometimes be the best option.
     
  15. mooreb

    mooreb Private E-2

    Was already in nornal mode so ran in normal instead of rebooting.

    Pasted all the files into Pocket Killbox, ended with guard.tmp.

    Upon answering 'Yes' to reboot, the program shows 'verifying registry data - plz wait'. Then, I get an error window -- "PendingFileRenameOperations Registry Data has been Removed by External Process!". Tried again with same result.

    Not sure how to proceed... thanks for the quick responses!
     
  16. PhilliePhan

    PhilliePhan Guest

    Please post a fresh Find.bat log and do not reboot after posting.

    PP :)
     
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Normally when you get

    "PendingFileRenameOperations Registry Data has been Removed by External Process!".

    You just need to do a manual reboot and the files will be deleted by Pocket Killbox.
     
  18. mooreb

    mooreb Private E-2

    OK thanks -- here is the fresh find it log.
     

    Attached Files:

  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Use Windows Explorer and look in your C:\WINDOWS\System32 folder for the file named guard.tmp

    It looks like it is there. If so, try to delete it by right clicking on it and selecting delete.
    Does that work?
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If the previous step deleted guard.tmp. Do the below otherwise wait for new instructions:

    Run Pocket KillBox and Copy and Paste the Following into the box: C:\RECYCLER\Desktop.ini - Click Red X to delete it using Standard File Kill.

    NOW:


    Open VX2Finder and Click on the "Find Vx2.Betterinternet" button.

    Then click on these buttons in the right pane unless they are "greyed" out:

    - UserAgent$ Button to remove the UserAgent from the registry
    - Guardian.reg
    - Restore Policy

    Exit and reboot.

    NEXT: Run find.bat and attach that Log and a fresh HJT Log
     
  21. mooreb

    mooreb Private E-2

    Done -- guard.tmp deleted w/Windows Explorer.
    Used Killbox for Desktop.ini.
    Ran VX2Finder. Did all steps except guardian.reg (was greyed out).
    Reboot.

    New HJT & Find.bat files attached...
     

    Attached Files:

  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Using START > RUN > regedit, please open the registry editor and navigate to the following:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ShellScrap

    Backup this key by clicking File, Export and then enter a File name and save it somewhere you can find it (if needed). Do the Export before doing the following:
    RightClick on the above registry key (the ShellScrap one - make sure the bottom of the regedit window shows the full reg key as shown above in bold) and select DELETE.

    Exit all browsers run HJT and have it fix:

    O1 - Hosts: 69.20.16.183 auto.search.msn.com
    O1 - Hosts: 69.20.16.183 search.netscape.com
    O1 - Hosts: 69.20.16.183 ieautosearch

    Reboot and post a new HJT log and tell me how things are working

    Then we need to figure out why the below came back:
    O10 - Broken Internet access because of LSP provider 'mwtsp.dll' missing

    I thought we fixed this with LSP-Fix earlier.
     
  23. mooreb

    mooreb Private E-2

    Killed the shellscrap reg key, seems to be working fine.

    New HJT attached.

    Not sure why O10 entry keeps coming back, I've tried fixing it with LSPfix a few times (haven't tried today though).

    Thanks!!
     

    Attached Files:

  24. PhilliePhan

    PhilliePhan Guest

    Hey Chas, Mooreb -

    The mwtsp.dll is related to escan. . . (I think?). You may need to download a new one!!

    A related link: http://www.mwti.net/antivirus/hotfix/mwtsp.asp

    Just a thought :)

    PP
     
  25. mooreb

    mooreb Private E-2

    Thx pp! -- I downloaded the updated mwtsp.dll and put it in system32 (replacing an existing copy), rebooted, still have the O10 entry. Ran LSPfix again (removing mwtsp) and the O10 entry goes away, but returns on reboot.

    Entries on the 'keep' side of LSPFix are
    mwsock.dll - Tcpip
    winrnr.dll - NTDS
    nwprovau.dll - NWLink IPX/SPX/NetBIOS
    rsvpsp.dll - (Protocol handler)

    'Remove' side shows just mwtsp.dll.

    However everything seems to be functioning fine (including escan) and *NO POPUPS*!!! Also the O1 - Hosts: 69.20.16.183 entries are gone and have not repopulated. Latest HJT is attached, pretty much same as before I think. Is this a victory?!??!
     

    Attached Files:

  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Good find PP!

    You may need to register the DLL!

    From the command prompt or from a Run dialog box:

    regsvr32 c:\windows\system32\mwtsp.dll
     
  27. mooreb

    mooreb Private E-2

    Thanks chaslang. I tried registering from command line, but get:
    "c:\windows\system32\mwtsp.dll was loaded, but the DllRegisterServer entry point was not found. The file can not be registered."

    So, uninstalled eScan, reinstalled. Same O10 entry for missing LSP mtwsp.dll. Same response from regsvr32.

    That being said, everything seems to working fine and I am eternally grateful for all your help. You guys are awesome.
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome but with Escan uninstall try the LSP-fix and see what happens. Does the O10 line go away?
     
  29. mooreb

    mooreb Private E-2

    ah -- after uninstall, the O10 line goes away in HJT, and LSPFix does not show mwtsp.dll. However, upon reinstall of escan, the O10 line comes back, and using LSPFix only removes it temporarily from the HJT list, as the O10 entry returns on reboot...
     
  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member


    Yes but does it come back saying (missing) or (unknown file)?
     
  31. mooreb

    mooreb Private E-2

    It says, "O10 - Broken internet access because of LSP provider 'mwtsp.dll' missing"
     
  32. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay so download the mwtsp.zip file from the below link:

    http://www.mwti.net/antivirus/hotfix/mwtsp.asp

    and extract it to your system32 folder.

    See if that helps.
     
  33. mooreb

    mooreb Private E-2

    Thanks chaslang. I tried downloading the mtwsp dll from that link. The file already existed in system 32. I replaced it, but unfortunately still get the same results -- broken LSP flagged in HJT. LSPfix temporarily removes the problem but it returns on reboot -- as long as eScan is installed. If escan is not installed the problem goes away and does not return. But as soon as I reinstall eScan, the problem comes back.
     
  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Try this:
    1) Use LSP to fix the problem.
    2) Unregister the DLL from the command problem:
    regsvr32 /u c:\windows\system32\mwtsp.dll

    You may still get an error on this.
    3) Uninstall the Escan software and reboot
    4) After reboot look for the c:\windows\system32\mwtsp.dll file and delete it (let me know if it is still here at this point).
    5) Check a HijackThis scan and make sure it does not show the O10 problem
    6) Check for updates to your Escan program and download them if available.
    7) Re-install Escan

    Tell me if there is any change!
    If still showing up as missing. Download and run this: http://faq.tweakers.net/wos/WinsockXPFix.exe


    I found a link (although some of it is in German) that show someone had the same problem and just used LSP-fix and the problem was gone.

    http://www.trojaner-board.de/archive/index.php/t-10910.html
     
    Last edited: Jan 8, 2005
  35. mooreb

    mooreb Private E-2

    hmm --still same problem! i downloaded winsockXPFix -- I'm trying to back up the registry from that program before fixing and it's throwing all sorts of errors. (cannot save this, cannot save that). Should I proceed or back up the registry some other way...?
     
  36. mooreb

    mooreb Private E-2

    ps - followed all steps, mwtsp.dll was still present in system32 so i deleted. also, yes, regsvr32 gave an error when unregistering...
     
  37. mooreb

    mooreb Private E-2

    I went ahead and ran WinsockXPFix -- unfortunately the O10 entry for missing mwtsp.dll still remains.
     
  38. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay but since we deleted mwtsp.dll before, is it there now? If so, I don't know what to tell you about this anymore. Seems like something is messed up with Escan.

    If everything is working okay (including Escan), it maybe best just to ignore that line in HijackThis but remember that in the future (just in case you ever post a log again).
     
  39. mooreb

    mooreb Private E-2

    i deleted mwtsp.dll after uninstall of escan but it returns after reinstall of escan. so i would agree it seems like a problem specific to escan. everything seems to working fine (including escan) so i think we can call it a day. thanks again for all of your help and expertise on this. you're a godsend. thank you!!
     
  40. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds