Web Page Pop-Ups #1

Discussion in 'Malware Help (A Specialist Will Reply)' started by chrissyc, Oct 20, 2006.

  1. chrissyc

    chrissyc Private E-2

    I've had major problems and have cleared up a lot (hijacked toolbar, Google web page pop-ups, redirects, etc.) but I'm still getting a TON of web page pop ups titled Auto, Computers, Business, etc. I also keep getting a pop-up page Warning and I've saved the text from many of them on an attached file called Warning. I have to use this computer for work - if someone could please help me I would be SO SO SO grateful. Thanks VERY much.
     

    Attached Files:

  2. chrissyc

    chrissyc Private E-2

    Web Page Pop-Ups #2

    More attachments - I have followed the instructions as best as possible from this site and much of it has helped, I think.
     

    Attached Files:

  3. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Majrogeeks!

    You must follow the directions for installing and using ShowNew and GetRunKey (which you did not attach a log for). You did not run it properly and as a result your log is incomplete. Please follow the directions and attach new logs (for both ot them).

    You also are running Spybot's Teatimer which we specifically indicate not to do.

    Now Disable Spybot's TeaTimer
    • Run Spybot and click Mode
    • Select Advanced Mode.
    • Then click Tools and select Resident.
    • Now in the right window pane, uncheck TeaTimer.
    • Also while this is open, in the left column now select IE Tweaks
    • and then in the right pane make sure all the Miscellaneous locks are unchecked.
    • Now quit Spybot!

    You also did not follow the directions for installing and renaming HijackThis. You ran it from the ZIP file which is probably what you did for ShowNew too. Please follow directions and things will go much faster.
     
  4. chrissyc

    chrissyc Private E-2

    I did disable Teatimer. It is still unchecked. I don't know why it is still running.
    Hijack This would not let me rename it but I'll keep trying. Also, without going into my system files I could not get ShowNew and RunKey to work right, even copying the files out of the zip file. But I'll try these things again when I get a chance. I really am trying to follow the instructions - I worked on your instructions all day yesterday, like 6 hours, but kept running into snags.
    Thanks & I'll try to update later.
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You cannot rename it if it is running. Is that what your problem is? HijackThis can easily be renamed otherwise. It does not stop you from changing the name (as long as it is not running).

    I'm not sure what you mean. What do you mean by "without going into my system files"? Just create the folder suggested (which is C:\MGtools ) and unzip the contents of both ShowNew.zip and GetRunKey.zip into that folder. Then run Windows Explorer ( by right clicking Start and select Explore ). Then navigate to the C:\MGtools folder and first double click on GetRunKey.bat to run it and create the runkeys.txt log. Then close the notepad window with runkeys.txt in it. Now locate ShowNew.bat in Windows Explorer and double click on it which will create the newfiles.txt log. You can also close this notepad window.

    Then just upload the below two files as attachments:

    c:\runkeys.txt
    c:\newfiles.txt
     
  6. chrissyc

    chrissyc Private E-2

    OK, I tried to do these again. Please let me know if I've not done something correctly. I'm still getting the pop-up screens constantly.
    Thank you!!
     

    Attached Files:

  7. chrissyc

    chrissyc Private E-2

    Newfiles.txt and hijackthis log attached... 2nd time around. Thanks!
    Amy
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you know what AdSponsor is? I see it was recently installed on your PC. It sounds suspicious. If you do not know what it is then add to the list just below of software to uninstall.

    Uninstall the below software:
    elitemediagroup.net <--- this is malware
    J2SE Runtime Environment 5.0 Update 5 <--- this is an old version
    Java 2 Runtime Environment, SE v1.4.2_03 <--- this is an old version
    Mozilla Firefox (1.5) <--- this is an old version
    Symantec Network Drivers Update

    Now install the current version of Sun Java from: Sun Java Runtime Environment

    Then install the current version of FireFox from: Mozilla Firefox

    • Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    • On the page that opens, scroll down to Symantec Network Drivers Service
    • then right click the entry, select Properties and press Stop Service.
    • When it shows that it is stopped, next please set the Start-up Type to 'Disabled'.
    • Click OK until you get back to Windows.
    • Next, run HJT, but instead of scanning, click on the None of the above, just start the program button at the bottom of the choices.
    • At the lower right, click on the Config button
    • Then click the Misc tools button
    • Select Delete an NT Service
    • Copy/pasteSNDSrvc into the box that opens, and press OK
    • If you receive any error messages just ignore them and continue.
    • Now exit HJT but do not reboot when it tells you it needs to. We will do that further down after running HJT again to fix some other items.
    Continue by downloading a tools we will need - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    Please run HijackThis and click on the Open the Misc Tools Section button on the open page. Then select Open process manager on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click Kill process. Then click yes.
    C:\Program Files\PSDream\PSDream.exe
    C:\WINDOWS\YMANTE~1\wucrtupd.exe

    After killing all the above processes, click Back.
    Then please click Scan and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    R3 - URLSearchHook: (no name) - {A8BD6820-6ED7-423E-9558-2D1486B0FEEA} - (no file)
    O2 - BHO: RunBus Class - {4865F155-CE00-4E93-A414-147844D7C81A} - C:\WINDOWS\system32\tcblajqp.dll
    O2 - BHO: (no name) - {D5B53D4D-FFAE-A40A-8ECA-F1DA1DCC3E9E} - C:\WINDOWS\system32\yqb.dll (file missing)
    O3 - Toolbar: (no name) - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - (no file)
    O4 - HKLM\..\Run: [ExploreUpdSched] C:\WINDOWS\system32\swintpes.exe ELT001
    O4 - HKLM\..\Run: [{34-46-6B-BF-ZN}] c:\windows\system32\osdsregm.exe ELT001
    O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
    O4 - HKCU\..\Run: [Eyqjvu] C:\Documents and Settings\HP_Owner\Application Data\??mantec\s?ool32.exe
    O4 - HKCU\..\Run: [PSDream] "C:\Program Files\PSDream\PSDream.exe"
    O4 - HKCU\..\Run: [Chckup] C:\WINDOWS\system32\Netverchk.exe
    O4 - HKCU\..\Run: [Srro] "C:\WINDOWS\YMANTE~1\wucrtupd.exe" -vt tzt
    O4 - Startup: TA_Start.lnk = C:\WINDOWS\system32\dwdsregt.exe
    O15 - Trusted Zone: *.adgate.info
    O15 - Trusted Zone: *.adsextend.net
    O15 - Trusted Zone: *.dollarrevenue.com
    O15 - Trusted Zone: *.elitemediagroup.net
    O15 - Trusted Zone: *.imagesrvr.com
    O15 - Trusted Zone: *.matcash.com
    O15 - Trusted Zone: *.media-motor.com
    O15 - Trusted Zone: *.mediatickets.net
    O15 - Trusted Zone: *.snipernet.biz
    O15 - Trusted Zone: *.sxload.com
    O15 - Trusted Zone: *.systemdoctor.com
    O15 - Trusted Zone: *.adgate.info (HKLM)
    O15 - Trusted Zone: *.adsextend.net (HKLM)
    O15 - Trusted Zone: *.dollarrevenue.com (HKLM)
    O15 - Trusted Zone: *.elitemediagroup.net (HKLM)
    O15 - Trusted Zone: *.imagesrvr.com (HKLM)
    O15 - Trusted Zone: *.matcash.com (HKLM)
    O15 - Trusted Zone: *.media-motor.com (HKLM)
    O15 - Trusted Zone: *.mediatickets.net (HKLM)
    O15 - Trusted Zone: *.snipernet.biz (HKLM)
    O15 - Trusted Zone: *.systemdoctor.com (HKLM)
    O15 - Trusted Zone: *.winantivirus.com (HKLM)
    O16 - DPF: {5526B4C6-63D6-41A1-9783-0FABF529859A} - http://cabs.elitemediagroup.net/cabs/eliteview.cab
    O16 - DPF: {E06E2E99-0AA1-11D4-ABA6-0060082AA75C} (GpcContainer Class) - https://mwmus.webex.com/client/v_mywebex-mwm/mywebex/ieatgpc.cab
    O16 - DPF: {E4C29FDC-F547-4219-ACFD-571F2A7A564A} (WebCamTest Class) - http://awbeta.net-nucleus.com/CABUPDATES/winwcd.cab
    O16 - DPF: {F919FBD3-A96B-4679-AF26-F551439BB5FD} - mk:mad:MSITStore:C:\DOCUME~1\HP_Owner\LOCALS~1\Temp\winfix.chm::/SystemDoctor2006FreeInstall.cab
    O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe

    After clicking Fix, exit HJT.

    Now Copy the bold text below to notepad. Save it as fixWLK.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.
    Now run Pocket Killbox by doubleclicking on killbox.exe
    Choose Tools > Delete Temp Files and click Delete Selected Temp Files.
    Then after it deletes the files click the Exit (Save Settings) button.
    NOTE: Pocket Killbox will only list the added files it is able to find on the system. So when you do the below, if some files do not show in the list after pasting them in, just continue.

    Select:
    • Delete on Reboot
    • then Click on the All Files button.
    • Please copy the file paths below to the clipboard by highlighting ALL of them and pressing CTRL + C (or, after highlighting, right-click and choose copy):

    C:\Documents and Settings\HP_Owner\Start Menu\Programs\Startup\TA_Start.lnk
    C:\Documents and Settings\HP_Owner\Application Data\Dxcknwrd.dll
    C:\Documents and Settings\HP_Owner\Application Data\Dxcuknwrd.dll
    C:\Documents and Settings\HP_Owner\Application Data\??mantec\s?ool32.exe
    C:\WINDOWS\Downloaded Program Files\CONFLICT.1\USDR6_0001_D08M0404NetInstaller.exe
    C:\WINDOWS\Downloaded Program Files\USDR6_0001_D08M0404NetInstaller.exe
    C:\Program Files\Batty2\Uninstall.exe
    C:\Program Files\Common Files\Yazzle1281OinUninstaller.exe
    C:\Program Files\PSCloner\upd.exe
    C:\Program Files\PSDream\Uninstall.exe
    C:\Program Files\PSDream\PSDream.exe
    C:\WINDOWS\1011_emi03.exe
    C:\WINDOWS\1011_justin.exe
    C:\WINDOWS\876056.exe
    C:\WINDOWS\pxhqlkfy.exe
    C:\WINDOWS\Setup90.exe
    C:\WINDOWS\srvwxqwrcz.exe
    C:\WINDOWS\srvzthvhfi.exe
    c:\windows\unstall.exe
    C:\WINDOWS\system32\BattyRun2.dll
    C:\WINDOWS\system32\CAUnst.exe
    C:\WINDOWS\system32\dwdsregt.exe
    C:\WINDOWS\system32\Eim03.exe
    C:\WINDOWS\system32\justin.exe
    C:\WINDOWS\system32\Netverchk.exe
    C:\WINDOWS\system32\nsn3331.dll
    C:\WINDOWS\system32\nsq1019.dll
    c:\windows\system32\osdsregm.exe
    C:\WINDOWS\system32\slimyabp.exe
    C:\WINDOWS\system32\swintpes.exe
    C:\WINDOWS\system32\tcblajqp.dll
    C:\WINDOWS\system32\ts_www.exe
    C:\WINDOWS\system32\ts_www2.exe
    C:\WINDOWS\system32\wapicc.exe
    c:\windows\system32\WinNB58.dll
    C:\WINDOWS\?ymantec\wucrtupd.exe
    c:\windows\ymante~1\wucrtupd.exe
    • Return to Killbox, go to the File menu, and choose Paste from Clipboard.
    • Click the red-and-white Delete File button. Click Yes at the Delete on Reboot prompt.
    If you receive a PendingFileRenameOperations prompt, just click OK to continue (But please let me know if you receive this message!).
    If Killbox does not reboot just reboot your PC yourself.

    After reboot locate the below folder and delete if found:
    C:\Program Files\Batty2"
    C:\Program Files\CMFibula
    C:\Program Files\em
    C:\Program Files\PSCloner
    C:\Program Files\PSDream
    C:\Documents and Settings\HP_Owner\Application Data\??mantec <--- this will look like Symantec
    C:\Windows\Symantec

    Also delete the C:\Program Files\AdSponsor folder if you decided earlier that you did not know what it is.

    Now attach the below new logs and tell me how the above steps went.

    1. GetRunKey
    2. ShowNew
    3. HJT
    Make sure you tell me how things are working now!

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
    Last edited: Oct 23, 2006
  9. chrissyc

    chrissyc Private E-2

    OK - will you marry me?

    Seriously I've been online for just a few minutes and no pop-up sites so far. I'm SO VERY THANKFUL. I will see how this goes tomorrow b/c I have a busy work day. I can tell then if all the annoyances are gone.

    The Elite Media is still showing in my control panel of installed programs. I had tried to delete it a dozen times and even now it still shows up. Should I do anything else?

    Also, HJT won't allow SNDSrvc to be deleted at all... but the other methods seem to have worked - so far, so good.

    You ROCK and are AWESOME. I'm broke but will love to contribute something to your site soon, if there is an avenue for that.

    Kindest regards,
    Amy
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    LOL! Now that's a new one! :D

    Yes we will use a special program to uninstall it and there is one more item I just noticed there.

    Download and install this: Your Uninstaller! 2006

    Now use Your Uninstalled to uninstall the below:
    elitemediagroup.net
    media-motor.net

    Attach a new log from ShowNew so I can see the results!


    Yes but it deleted it anyway. Remember I did say to ignore error messages.
     
  11. chrissyc

    chrissyc Private E-2

    Wow, those were tough to uninstall... but I finally got it to work in advanced mode. Thanks SO SO SO SO much... here is the new log. I hope it's clean now.
     

    Attached Files:

  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome!

    Your log is clean. If you are not having any other malware problems, it is time to do our final steps:
    1. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    2. If we used ComboFix you can delete the ComboFix.exe file and associated C:\combofix.txt log that was created.
    3. If we used VundoFix, you can delete the VundoFix.exe file and the C:\VundoFix Backups folder and C:\vundofix.txt log that was created.
    4. If we had your run FixWareOut, you can delete the Fixwareout.exe file and the C:\fixwareout folder.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. You can delete the ShowNew.Zip and GetRunkey.Zip files and the files that you extracted from the ZIP files. You can also delete the C:\newfiles.txt and C:\runkeys.txt logs that were created
    7. If you are running Windows XP or Windows ME, do the below:
      • go back to step 8 of the READ & RUN ME to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  13. chrissyc

    chrissyc Private E-2

    Things have been great, thank you. I did the final steps... on my system there was no System Restore tab under My Computer, but I found it under System Properties in Control Panel.
    How can I repay you? You've saved me! Thanks so much... I can't even tell you!
    A
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome! I'm happy I could help you out! Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds