searchportal.info and popuppers.com

Discussion in 'Malware Help (A Specialist Will Reply)' started by nick.whiteley, Oct 20, 2006.

  1. nick.whiteley

    nick.whiteley Private E-2

    Hi,

    I have been having all sorts of problems with one of my machines. Norton had been disabled (somehow, although I suspect this may have been down the the mother in law messing about too much) and I had all sorts of popups, hijacks etc.

    I ran all the tools as directed on this site apart from the online scans which I haven't been able to run due to my browser being hijacked by searchportal.info (maybe there is a workaround for this?)

    Can you help get me back in good shape? As I said, I have followed the instructions provided and am now attaching my HJT log
     

    Attached Files:

  2. nick.whiteley

    nick.whiteley Private E-2

    Sorry, forgot the getrunkey and shownew logs.

    I have Win XP SP2 and was able to run windows defender.

    As mentioned previously I wasn't able to run panda or bitdefender due to the browser hijacking (please let me know if there is a workaround for this).

    If I am still missing anything let me know and I'll get it done.

    Many thanks!

    Nick
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majorgeeks!

    Please run this Qoologic Removal Procedure and attach a log from it.

    Now complete the below steps!

    1. Download this file - combofix.exe
    2. Double click combofix.exe & follow the prompts.
    3. When finished, it will produce a log for you. Attach this log to your next reply

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall!

    Now attach the below new logs and tell me how the above steps went.
    1. GetRunKey
    2. ShowNew
    3. HJT


    It will take two messages to attach the above 5 logs!
     
  4. nick.whiteley

    nick.whiteley Private E-2

    Thanks for your assistance, here are the results:

    1. Qoofix: "No malicious modules found, No Qoologic infected files found. Scan completed succesfully. Note: some registry keys may have been removed"
    2. Combofix rebooted the machine - not sure what the results where.

    I downloaded qoofix and combofix onto another machine and copied them across so haven't connected the infected machine to the internet yet but since running qoofix and combofix IE launched twice and tried to open the followng pages:

    iesettingsupdate
    popuppers

    Please find log files as requested
     

    Attached Files:

  5. nick.whiteley

    nick.whiteley Private E-2

    part 2: reruns after qoofix and combo fix.

    Thanks

    Nick
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First uninstall the below old versions of Sun Java:
    Java 2 Runtime Environment, SE v1.4.2_05

    Start by downloading two tools we will need

    - Process Explorer

    - Pocket KillBox

    Extract them to their own folder somewhere that you will be able to locate them later.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of winghy32.dll once and then click the kill button. After you have killed all of the winghy32.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs(If you do not find the dll, just continue on):
    rpcc.dll
    mlljj.dll

    Next double click on explorer.exe and again click once on each instance of winghy32.dll and kill it. (If you do not find the dll, just continue on.)

    Now repeat the above step for the below DLLs (If you do not find the dll, just continue on):
    rpcc.dll
    mlljj.dll

    Now just exit Process Explorer.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.

    C:\WINDOWS\next06.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1
    R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
    O2 - BHO: (no name) - {102319EE-CA68-8465-E319-01EF20CBB419} - C:\WINDOWS\system32\ztnsesm.dll
    O2 - BHO: (no name) - {1DAEFCB9-06C8-47c6-8F20-3FB54B244DAA} - C:\WINDOWS\system32\lcdwpsii.dll (file missing)
    O2 - BHO: (no name) - {2687DC48-6339-4515-81DA-1517ACA33BB9} - C:\WINDOWS\system32\mlljj.dll
    O2 - BHO: (no name) - {40A2988E-C954-4DDE-BD08-453191805BB9} - C:\WINDOWS\system32\durvil1.dll
    O2 - BHO: BHO - {9BB5B49C-0D59-418d-A6A5-F6373B8FEF64} - C:\Program Files\BHO Plugin\plugin.dll
    O2 - BHO: Banner Rotator - {E954DB82-1533-4714-92F2-59C98D5C18CC} - C:\WINDOWS\system32\brrotate.dll
    O4 - HKLM\..\Run: [win32093105472658] C:\WINDOWS\win32093105472658.exe
    O4 - HKLM\..\Run: [win32088310547265] C:\WINDOWS\win32088310547265.exe
    O4 - HKLM\..\Run: [mmnext06] C:\WINDOWS\next06.exe
    O4 - HKLM\..\Run: [loaddr] C:\DOCUME~1\Graham\LOCALS~1\Temp\fred.exe
    O4 - HKLM\..\Run: [edaycnk.dll] C:\WINDOWS\system32\rundll32.exe C:\WINDOWS\system32\edaycnk.dll,fjqlkgd
    O4 - HKLM\..\Run: [26.tmp.exe] C:\DOCUME~1\Graham\LOCALS~1\Temp\26.tmp.exe
    O4 - HKLM\..\Run: [25.tmp] C:\DOCUME~1\Graham\LOCALS~1\Temp\25.tmp.exe
    O4 - HKLM\..\Run: [1pop06apelt2] C:\WINDOWS\elitepop06.exe
    O4 - HKLM\..\Run: [adstart] "iexplore.exe" "http://iesettingsupdate"
    O4 - HKCU\..\Run: [PSDream] "C:\Program Files\PSDream\PSDream.exe"
    O15 - Trusted Zone: *.elitemediagroup.net
    O16 - DPF: {09F1ADAC-76D8-4D0F-99A5-5C907DADB988} - http://www.systemdoctor.com/download/2006/cab/SystemDoctor2006FreeInstall.cab
    O16 - DPF: {FF3F0F03-0F01-131A-A3F9-08F02B23E0CC} - http://66.117.37.13/gba263.exe
    O20 - Winlogon Notify: mlljj - C:\WINDOWS\system32\mlljj.dll
    O20 - Winlogon Notify: rpcc - C:\WINDOWS\system32\rpcc.dll
    O20 - Winlogon Notify: winghy32 - winghy32.dll (file missing)
    O21 - SSODL: DCOM Server 3339 - {2C1CD3D7-86AC-4068-93BC-A02304BB3339} - C:\WINDOWS\system32\3339_32.dll (file missing)
    O21 - SSODL: DCOM Server 2236 - {2C1CD3D7-86AC-4068-93BC-A02304BB2236} - (no file)

    After clicking Fix, exit HJT.

    Copy the bold text below to notepad. Save it as fixme.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Program Files\PSDream\PSDream.exe
    C:\Documents and Settings\Graham\Local Settings\Temp\fred.exe
    C:\Documents and Settings\Graham\Local Settings\Temp\26.tmp.exe
    C:\Documents and Settings\Graham\Local Settings\Temp\25.tmp.exe
    C:\Documents and Settings\Graham\Application Data\Dxcdmns.dll
    C:\Documents and Settings\Graham\Application Data\Dxcknwrd.dll
    C:\Documents and Settings\Graham\Application Data\Dxcuknwrd.dll
    C:\asdf.txt
    C:\WINDOWS\1011_EliottEU3.exe
    C:\WINDOWS\elitepop06.exe
    C:\WINDOWS\h3k.exe
    C:\WINDOWS\h3k3584.exe
    C:\WINDOWS\mai.exe
    C:\WINDOWS\next06.exe
    C:\WINDOWS\srvdxrgqdk.exe
    C:\WINDOWS\srvlsroxwy.exe
    C:\WINDOWS\srvmekloiw.exe
    C:\WINDOWS\srvwfpnili.exe
    C:\WINDOWS\swlou.exe
    C:\WINDOWS\win32093105472658.exe
    C:\WINDOWS\win32088310547265.exe
    C:\WINDOWS\yfj.exe
    C:\WINDOWS\yojkb.dll
    C:\WINDOWS\system32\brrot-uninst.exe
    C:\WINDOWS\system32\cmd32.exe
    C:\WINDOWS\system32\durvil1.exe
    C:\WINDOWS\system32\edaycnk.dll
    C:\WINDOWS\system32\EliottEU3.exe
    C:\WINDOWS\system32\ts_www2.exe
    C:\WINDOWS\system32\2236_32.dll
    C:\WINDOWS\system32\brrotate.dll
    C:\WINDOWS\system32\durvil1.dll
    C:\WINDOWS\system32\edaycnk.dll
    C:\WINDOWS\system32\gtool.dll
    C:\WINDOWS\system32\hrdubjd.dll
    C:\WINDOWS\system32\jjllm.ini
    C:\WINDOWS\system32\mljgf.dll
    C:\WINDOWS\system32\mlljj.dll
    C:\WINDOWS\system32\nsr31.dll
    C:\WINDOWS\system32\rpcc.dll
    C:\WINDOWS\system32\ztnsesm.dll
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you do receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folders and delete if found:
    C:\Program Files\BHO Plugin
    C:\Program Files\PSDream

    Also delete all files and subfolders in the below folders except ones from the current date (Windows will not let you delete the files from the current day).
    C:\WINDOWS\TEMP
    C:\Documents and Settings\Graham\Local Settings\Temp

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  7. nick.whiteley

    nick.whiteley Private E-2

    Thanks again for the help.

    OK, here is what happened.

    I followed the instructions as directed. No winghy32 or rpcc but found instances of mlljj.

    Logs from the end of all that are attached.

    Note. BHO Plugin regenerates after delete but is empty (is this normal?)

    No attempted launches of IE on the infected machine after reboot so thinking I was clean I connected it to the internet and ran my norton update. I was then inundated with the following:

    silver.exe
    trojan.popper - tddvytfn.exe
    aff_001.exe
    trojan_horse - uni_7eh.exe
    109uninst.exe
    cmdservice
    ac3_0008.exe
    tagasaurus.exe
    psdream.exe
    duce6.exe
    avenuemedia.dyfuca

    IE was trying to open on the following page: pops.mmohsix.com/anotherapp.php

    Windows Defender found the following:

    zenoseaarch
    downloader.bd
    avenuemedia
    monnet
    targetsaver
    mirar

    Sooooo....

    I re-ran the instructions you have given to date from the start - results of that in the next post...
     

    Attached Files:

  8. nick.whiteley

    nick.whiteley Private E-2

    ......

    after the above problems I re-ran the instructions you gave and I am re-attaching here the latest logs. So far I haven't re-connected to the internet. Thought it best to wait this time for your opinion of the current state of the system on the infected machine.

    Many thanks

    Nick
     

    Attached Files:

  9. nick.whiteley

    nick.whiteley Private E-2

    Having completed the above everything feels in good shape but a full Norton system scan revealed:

    autosearch.dll
    elitesix.ocx
    laL1U3IQ.vbs
    motorsix.ocx
    next06.exe

    all were deleted but they seam to be re-apearances of the same thing. Any ideas how to prevent re-occurences?

    from the logs, how do things look to you? anything more I need to do to ensure I am clean?

    Many thanks

    Nick
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Without seeing a log of exactly what and where Norton (and Windows Defender) are finding things, I can only assume that they may have been in the backup folders created by Killbox or HJT or possibly in System Restore. You really should only run what we request and nothing else until we finish all of your cleaning. Then you can run any scans you want to see if anything else is found.

    So let's finish with some final cleanup since your logs are basically free from malware.

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    3. Delete the below folders:
      • C:\Documents and Settings\Graham\Desktop\SmitfraudFix
      • C:\Program Files\BHO Plugin
      • C:\Program Files\Grisoft
      • C:\Program Files\QOOBOX
    4. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and enable System Restore to create a new clean Restore Point.
    5. Now attach a new log from ShowNew after all the above cleanup!
    After doing the above, you should work thru the below link:

    If you are still having malware detections at this point, you must attach a log that shows exactly who is detecting it, what it is detecting, and where it is detecting it!
     
  11. nick.whiteley

    nick.whiteley Private E-2

    Hi Chaslang,

    Many thanks for all your help. Performed the steps below and did the protection steps too but as soon as I use Internet Explorere I am hit with the following:

    Tagasourus
    cmdservice
    psdream
    monnet
    mirar
    uni_7eh
    elite toolbar

    They are picked up by the the orton live protection and mostly dealt with (although some can't be deleted)

    It's my father in law's machine and he needed it back for a couple of days - things are usable at least which is a great improvement over before.

    I will gather the extra info you require when he gets the machine back to me at the weekend. Shall we close this thread and open a new one with these additoinal problems?

    Sorry for the delay here and thanks again.

    Nick
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No just stay in this thread. But please post a log that shows exactly what and where the problems are being found.

    Do the below still exist? If so, delete them!

    C:\Documents and Settings\All Users\Application Data\AutoSearch.dll
    C:\Program Files\BHO Plugin <--- the whole folder
    C:\WINDOWS\mmputt.exe
    C:\WINDOWS\srvffvfwkk.exe
    C:\WINDOWS\srvkfdjcis.exe
    C:\WINDOWS\srvoekvstn.exe
    C:\WINDOWS\srvtsqxoaz.exe
    C:\WINDOWS\system32\omdsregl.exe
    C:\WINDOWS\system32\tcpip.exe
    C:\WINDOWS\system32\loadinfo.ini


    After deleting the above, also run a new PandaActiveScan and attach the log from it.

    Then new version of ShowNew (it has changed since you last downloaded it) and attach a log from it too.
     
    Last edited: Oct 28, 2006

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds