• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
Sign in to follow this  
Followers 0
neodragon

In Dire Need of Help!!!

10 posts in this topic

i can't seem to rid my computer of this CWS infection.....it keeps sending me to this sight res://etyzo.dll/index.html#96676........it is the most annoying thing ever.

I've tried the Ad-Ware scan, CWShredder, Spybot S&D, and many others. Plz help.

 

I haven't tried Hijack_This yet. Im not sure how to run it... Can someone help me run through it in steps plz????

:unsure:

Share this post


Link to post
Share on other sites

Hello please download About:Buster and unzip it to your desktop. Start it, hit Ok, Start, And Ok to start the scan. It will generate a log. Post that log along with a Hijack this log here.

 

Information on how to post a Hijack this log in my signature.

 

 

Ducky

Share this post


Link to post
Share on other sites

Here's the log i got from the About:Buster.....

 

About:Buster Version 1.24

Removed! : C:\WINDOWS\grwqjj.dat

Removed! : C:\WINDOWS\drhvcg.dat

Removed! : C:\WINDOWS\bxajr.dat

Removed! : C:\WINDOWS\djsfe.dat

Removed! : C:\WINDOWS\gyadrl.dat

Removed! : C:\WINDOWS\pkmrdt.dat

Removed! : C:\WINDOWS\gbpaoz.dat

Removed! : C:\WINDOWS\ibjmda.dat

Removed! : C:\WINDOWS\System\javakm32.dll

Error Removing! : C:\WINDOWS\System\atlam.exe

Attempted Clean Of Temp folder.

Removed Uninstall Key (HSA)

Removed Uninstall Key (SE)

Removed Uninstall Key (SW)

Pages Reset... Done!

Share this post


Link to post
Share on other sites

Here is my Hijack_This Log.............plz help thanx

 

Logfile of HijackThis v1.98.0

Scan saved at 4:29:51 PM, on 7/3/2004

Platform: Windows ME (Win9x 4.90.3000)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

C:\WINDOWS\SYSTEM\KERNEL32.DLL

C:\WINDOWS\SYSTEM\MSGSRV32.EXE

C:\WINDOWS\SYSTEM\mmtask.tsk

C:\WINDOWS\SYSTEM\MPREXE.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVSYNMGR.EXE

C:\WINDOWS\SYSTEM\STIMON.EXE

C:\WINDOWS\SYSTEM\MSTASK.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSSTAT.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSHWIN32.EXE

C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVCONSOL.EXE

C:\WINDOWS\EXPLORER.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMKEYBD.EXE

C:\WINDOWS\SYSTEM\SYSTRAY.EXE

C:\WINDOWS\SYSTEM\USBMMKBD.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\KEYBDMGR.EXE

C:\PROGRAM FILES\NETROPA\ONSCREEN DISPLAY\OSD.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WND.EXE

C:\WINDOWS\SYSTEM\HIDSERV.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YBRWICON.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WNF.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YCOMMON.EXE

C:\PROGRAM FILES\VIEWPOINT\VIEWPOINT MANAGER\VIEWMGR.EXE

C:\WINDOWS\APIVM.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\INSTANT UPDATER\RULAUNCH.EXE

C:\PROGRAM FILES\AIM\AIM.EXE

C:\WINDOWS\SYSTEM\WMIEXE.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMUSBKB2.EXE

C:\PROGRAM FILES\EFFICIENT NETWORKS\ENTERNET 300\APP\ENTERNET.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YBROWSER.EXE

C:\WINDOWS\SYSTEM\DDHELP.EXE

C:\WINDOWS\SYSTEM\ATLAM.EXE

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\PROGRAM FILES\HIJACKTHIS.EXE

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/ext/search/search.html

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by SBC Yahoo! DSL

R3 - Default URLSearchHook is missing

F1 - win.ini: run=hpfsched

O2 - BHO: Class - {99C866A5-8A79-53A6-D913-C42709E5F535} - C:\WINDOWS\SYSTEM\SDKHG.DLL (file missing)

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing)

O2 - BHO: Class - {32338E0B-6009-0AF4-DCEA-85388D0FD4A4} - C:\WINDOWS\NTCT32.DLL (file missing)

O2 - BHO: Class - {992D61D4-A6ED-DC0E-8E7E-24F69B309D85} - C:\WINDOWS\SYSTEM\JAVAKM32.DLL (file missing)

O2 - BHO: Class - {A732FA8F-EC19-7CF2-8EA8-1289AEDD82F9} - C:\WINDOWS\SYSTEM\D3LO32.DLL

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX

O3 - Toolbar: McAfee VirusScan - {ACB1E670-3217-45C4-A021-6B829A8A27CB} - C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSCSHELLEXTENSION.DLL

O4 - HKLM\..\Run: [Keyboard Manager] C:\Program Files\Netropa\One-touch Multimedia Keyboard\MMKeybd.exe

O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe

O4 - HKLM\..\Run: [systemTray] SysTray.Exe

O4 - HKLM\..\Run: [McAfee Guardian] "C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\GUARDIAN\CMGRDIAN.EXE" /SU

O4 - HKLM\..\Run: [uSBMMKBD] usbmmkbd.exe

O4 - HKLM\..\Run: [Hidserv] Hidserv.exe run

O4 - HKLM\..\Run: [share-to-Web Namespace Daemon] C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe

O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe

O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe

O4 - HKLM\..\Run: [APIVM.EXE] C:\WINDOWS\APIVM.EXE

O4 - HKLM\..\Run: [THGuard] "C:\PROGRAM FILES\TROJANHUNTER 3.9\THGUARD.EXE"

O4 - HKLM\..\RunServices: [McAfeeVirusScanService] C:\Program Files\McAfee\McAfee VirusScan\AVSYNMGR.EXE

O4 - HKLM\..\RunServices: [stillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE

O4 - HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe

O4 - HKLM\..\RunServices: [schedulingAgent] mstask.exe

O4 - HKLM\..\RunServices: [sYSMW.EXE] C:\WINDOWS\SYSTEM\SYSMW.EXE

O4 - HKLM\..\RunServices: [CRGV32.EXE] C:\WINDOWS\SYSTEM\CRGV32.EXE

O4 - HKLM\..\RunServices: [sYSTP32.EXE] C:\WINDOWS\SYSTEM\SYSTP32.EXE

O4 - HKLM\..\RunServices: [MSZK32.EXE] C:\WINDOWS\SYSTEM\MSZK32.EXE

O4 - HKLM\..\RunServices: [ATLKY32.EXE] C:\WINDOWS\SYSTEM\ATLKY32.EXE

O4 - HKLM\..\RunServices: [APIDC32.EXE] C:\WINDOWS\APIDC32.EXE

O4 - HKLM\..\RunServices: [JAVAWJ32.EXE] C:\WINDOWS\JAVAWJ32.EXE

O4 - HKLM\..\RunServices: [sDKEV32.EXE] C:\WINDOWS\SDKEV32.EXE

O4 - HKLM\..\RunServices: [sYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE

O4 - HKLM\..\RunServices: [sDKVP.EXE] C:\WINDOWS\SYSTEM\SDKVP.EXE

O4 - HKLM\..\RunServices: [iPCY.EXE] C:\WINDOWS\SYSTEM\IPCY.EXE

O4 - HKLM\..\RunServices: [APIAT.EXE] C:\WINDOWS\SYSTEM\APIAT.EXE

O4 - HKLM\..\RunServices: [sDKMV.EXE] C:\WINDOWS\SYSTEM\SDKMV.EXE

O4 - HKLM\..\RunServices: [ADDEC32.EXE] C:\WINDOWS\SYSTEM\ADDEC32.EXE

O4 - HKLM\..\RunServices: [APPZH32.EXE] C:\WINDOWS\SYSTEM\APPZH32.EXE

O4 - HKLM\..\RunServices: [D3GU32.EXE] C:\WINDOWS\SYSTEM\D3GU32.EXE

O4 - HKLM\..\RunServices: [APPLM.EXE] C:\WINDOWS\SYSTEM\APPLM.EXE

O4 - HKLM\..\RunServices: [NETRN.EXE] C:\WINDOWS\NETRN.EXE

O4 - HKLM\..\RunServices: [sYSOX32.EXE] C:\WINDOWS\SYSTEM\SYSOX32.EXE

O4 - HKLM\..\RunServices: [APIGD.EXE] C:\WINDOWS\SYSTEM\APIGD.EXE

O4 - HKLM\..\RunServices: [NTQC.EXE] C:\WINDOWS\SYSTEM\NTQC.EXE

O4 - HKLM\..\RunServices: [iEDU32.EXE] C:\WINDOWS\SYSTEM\IEDU32.EXE

O4 - HKLM\..\RunServices: [ATLBP.EXE] C:\WINDOWS\SYSTEM\ATLBP.EXE

O4 - HKLM\..\RunServices: [iEVW32.EXE] C:\WINDOWS\SYSTEM\IEVW32.EXE

O4 - HKLM\..\RunServices: [MSCO32.EXE] C:\WINDOWS\MSCO32.EXE

O4 - HKLM\..\RunServices: [ADDMB32.EXE] C:\WINDOWS\ADDMB32.EXE

O4 - HKLM\..\RunServices: [CRJC.EXE] C:\WINDOWS\CRJC.EXE

O4 - HKLM\..\RunServices: [ADDMI32.EXE] C:\WINDOWS\SYSTEM\ADDMI32.EXE

O4 - HKLM\..\RunServices: [iPPS32.EXE] C:\WINDOWS\IPPS32.EXE

O4 - HKLM\..\RunServices: [JAVAGO32.EXE] C:\WINDOWS\SYSTEM\JAVAGO32.EXE

O4 - HKLM\..\RunServices: [NETLA32.EXE] C:\WINDOWS\NETLA32.EXE

O4 - HKLM\..\RunServices: [APPJN32.EXE] C:\WINDOWS\SYSTEM\APPJN32.EXE

O4 - HKLM\..\RunServices: [iPIG32.EXE] C:\WINDOWS\IPIG32.EXE

O4 - HKLM\..\RunServices: [MSSD32.EXE] C:\WINDOWS\SYSTEM\MSSD32.EXE

O4 - HKLM\..\RunServices: [ATLMN.EXE] C:\WINDOWS\ATLMN.EXE

O4 - HKLM\..\RunServices: [NETFL.EXE] C:\WINDOWS\NETFL.EXE

O4 - HKLM\..\RunServices: [iEZY.EXE] C:\WINDOWS\IEZY.EXE

O4 - HKLM\..\RunServices: [MSDN.EXE] C:\WINDOWS\MSDN.EXE

O4 - HKLM\..\RunServices: [iPLE32.EXE] C:\WINDOWS\SYSTEM\IPLE32.EXE

O4 - HKLM\..\RunServices: [iPJD32.EXE] C:\WINDOWS\IPJD32.EXE

O4 - HKLM\..\RunServices: [iPBZ.EXE] C:\WINDOWS\SYSTEM\IPBZ.EXE

O4 - HKLM\..\RunServices: [sDKZD32.EXE] C:\WINDOWS\SYSTEM\SDKZD32.EXE

O4 - HKLM\..\RunServices: [APPGE.EXE] C:\WINDOWS\SYSTEM\APPGE.EXE

O4 - HKLM\..\RunServices: [JAVAZL32.EXE] C:\WINDOWS\SYSTEM\JAVAZL32.EXE

O4 - HKLM\..\RunServices: [iEWQ32.EXE] C:\WINDOWS\SYSTEM\IEWQ32.EXE

O4 - HKLM\..\RunServices: [sYSAD32.EXE] C:\WINDOWS\SYSTEM\SYSAD32.EXE

O4 - HKLM\..\RunServices: [sYSMR32.EXE] C:\WINDOWS\SYSTEM\SYSMR32.EXE

O4 - HKLM\..\RunServices: [WINVD.EXE] C:\WINDOWS\WINVD.EXE

O4 - HKLM\..\RunServices: [NTJM.EXE] C:\WINDOWS\SYSTEM\NTJM.EXE

O4 - HKLM\..\RunServices: [ATLAM.EXE] C:\WINDOWS\SYSTEM\ATLAM.EXE

O4 - HKCU\..\Run: [McAfee.InstantUpdate.Monitor] "C:\Program Files\McAfee\McAfee Shared Components\Instant Updater\RuLaunch.exe" /STARTMONITOR

O4 - HKCU\..\Run: [Yahoo! Pager] 1

O4 - HKCU\..\Run: [AIM] C:\PROGRAM FILES\AIM\aim.exe -cnetwait.odl

O4 - Startup: hp instant support.lnk = C:\Program Files\Hewlett-Packard\hpis\bin\matcli.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRAM FILES\AIM\AIM.EXE

O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://files.member.yahoo.com/dl/installs/sbc/yinsthdlk.cab

O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = sbcglobal.net

O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 151.164.1.8,206.13.28.12

O21 - SSODL: AUHook - {BCBCD383-3E06-11D3-91A9-00C04F68105C} - C:\WINDOWS\SYSTEM\AUHOOK.DLL

Share this post


Link to post
Share on other sites

Here's a refreshed Hijack_THis log.......

 

Logfile of HijackThis v1.98.0

Scan saved at 4:46:39 PM, on 7/3/2004

Platform: Windows ME (Win9x 4.90.3000)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

C:\WINDOWS\SYSTEM\KERNEL32.DLL

C:\WINDOWS\SYSTEM\MSGSRV32.EXE

C:\WINDOWS\SYSTEM\mmtask.tsk

C:\WINDOWS\SYSTEM\MPREXE.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVSYNMGR.EXE

C:\WINDOWS\SYSTEM\STIMON.EXE

C:\WINDOWS\SYSTEM\MSTASK.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSSTAT.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSHWIN32.EXE

C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVCONSOL.EXE

C:\WINDOWS\EXPLORER.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMKEYBD.EXE

C:\WINDOWS\SYSTEM\SYSTRAY.EXE

C:\WINDOWS\SYSTEM\USBMMKBD.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\KEYBDMGR.EXE

C:\PROGRAM FILES\NETROPA\ONSCREEN DISPLAY\OSD.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WND.EXE

C:\WINDOWS\SYSTEM\HIDSERV.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YBRWICON.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WNF.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YCOMMON.EXE

C:\PROGRAM FILES\VIEWPOINT\VIEWPOINT MANAGER\VIEWMGR.EXE

C:\WINDOWS\APIVM.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\INSTANT UPDATER\RULAUNCH.EXE

C:\PROGRAM FILES\AIM\AIM.EXE

C:\WINDOWS\SYSTEM\WMIEXE.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMUSBKB2.EXE

C:\PROGRAM FILES\EFFICIENT NETWORKS\ENTERNET 300\APP\ENTERNET.EXE

C:\WINDOWS\SYSTEM\DDHELP.EXE

C:\WINDOWS\SYSTEM\ATLAM.EXE

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\PROGRAM FILES\HIJACKTHIS.EXE

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/ext/search/search.html

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by SBC Yahoo! DSL

R3 - Default URLSearchHook is missing

F1 - win.ini: run=hpfsched

O2 - BHO: Class - {99C866A5-8A79-53A6-D913-C42709E5F535} - C:\WINDOWS\SYSTEM\SDKHG.DLL (file missing)

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing)

O2 - BHO: Class - {32338E0B-6009-0AF4-DCEA-85388D0FD4A4} - C:\WINDOWS\NTCT32.DLL (file missing)

O2 - BHO: Class - {992D61D4-A6ED-DC0E-8E7E-24F69B309D85} - C:\WINDOWS\SYSTEM\JAVAKM32.DLL (file missing)

O2 - BHO: Class - {A732FA8F-EC19-7CF2-8EA8-1289AEDD82F9} - C:\WINDOWS\SYSTEM\D3LO32.DLL

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX

O3 - Toolbar: McAfee VirusScan - {ACB1E670-3217-45C4-A021-6B829A8A27CB} - C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSCSHELLEXTENSION.DLL

O4 - HKLM\..\Run: [Keyboard Manager] C:\Program Files\Netropa\One-touch Multimedia Keyboard\MMKeybd.exe

O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe

O4 - HKLM\..\Run: [systemTray] SysTray.Exe

O4 - HKLM\..\Run: [McAfee Guardian] "C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\GUARDIAN\CMGRDIAN.EXE" /SU

O4 - HKLM\..\Run: [uSBMMKBD] usbmmkbd.exe

O4 - HKLM\..\Run: [Hidserv] Hidserv.exe run

O4 - HKLM\..\Run: [share-to-Web Namespace Daemon] C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe

O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe

O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe

O4 - HKLM\..\Run: [APIVM.EXE] C:\WINDOWS\APIVM.EXE

O4 - HKLM\..\Run: [THGuard] "C:\PROGRAM FILES\TROJANHUNTER 3.9\THGUARD.EXE"

O4 - HKLM\..\RunServices: [McAfeeVirusScanService] C:\Program Files\McAfee\McAfee VirusScan\AVSYNMGR.EXE

O4 - HKLM\..\RunServices: [stillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE

O4 - HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe

O4 - HKLM\..\RunServices: [schedulingAgent] mstask.exe

O4 - HKLM\..\RunServices: [sYSMW.EXE] C:\WINDOWS\SYSTEM\SYSMW.EXE

O4 - HKLM\..\RunServices: [CRGV32.EXE] C:\WINDOWS\SYSTEM\CRGV32.EXE

O4 - HKLM\..\RunServices: [sYSTP32.EXE] C:\WINDOWS\SYSTEM\SYSTP32.EXE

O4 - HKLM\..\RunServices: [MSZK32.EXE] C:\WINDOWS\SYSTEM\MSZK32.EXE

O4 - HKLM\..\RunServices: [ATLKY32.EXE] C:\WINDOWS\SYSTEM\ATLKY32.EXE

O4 - HKLM\..\RunServices: [APIDC32.EXE] C:\WINDOWS\APIDC32.EXE

O4 - HKLM\..\RunServices: [JAVAWJ32.EXE] C:\WINDOWS\JAVAWJ32.EXE

O4 - HKLM\..\RunServices: [sDKEV32.EXE] C:\WINDOWS\SDKEV32.EXE

O4 - HKLM\..\RunServices: [sYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE

O4 - HKLM\..\RunServices: [sDKVP.EXE] C:\WINDOWS\SYSTEM\SDKVP.EXE

O4 - HKLM\..\RunServices: [iPCY.EXE] C:\WINDOWS\SYSTEM\IPCY.EXE

O4 - HKLM\..\RunServices: [APIAT.EXE] C:\WINDOWS\SYSTEM\APIAT.EXE

O4 - HKLM\..\RunServices: [sDKMV.EXE] C:\WINDOWS\SYSTEM\SDKMV.EXE

O4 - HKLM\..\RunServices: [ADDEC32.EXE] C:\WINDOWS\SYSTEM\ADDEC32.EXE

O4 - HKLM\..\RunServices: [APPZH32.EXE] C:\WINDOWS\SYSTEM\APPZH32.EXE

O4 - HKLM\..\RunServices: [D3GU32.EXE] C:\WINDOWS\SYSTEM\D3GU32.EXE

O4 - HKLM\..\RunServices: [APPLM.EXE] C:\WINDOWS\SYSTEM\APPLM.EXE

O4 - HKLM\..\RunServices: [NETRN.EXE] C:\WINDOWS\NETRN.EXE

O4 - HKLM\..\RunServices: [sYSOX32.EXE] C:\WINDOWS\SYSTEM\SYSOX32.EXE

O4 - HKLM\..\RunServices: [APIGD.EXE] C:\WINDOWS\SYSTEM\APIGD.EXE

O4 - HKLM\..\RunServices: [NTQC.EXE] C:\WINDOWS\SYSTEM\NTQC.EXE

O4 - HKLM\..\RunServices: [iEDU32.EXE] C:\WINDOWS\SYSTEM\IEDU32.EXE

O4 - HKLM\..\RunServices: [ATLBP.EXE] C:\WINDOWS\SYSTEM\ATLBP.EXE

O4 - HKLM\..\RunServices: [iEVW32.EXE] C:\WINDOWS\SYSTEM\IEVW32.EXE

O4 - HKLM\..\RunServices: [MSCO32.EXE] C:\WINDOWS\MSCO32.EXE

O4 - HKLM\..\RunServices: [ADDMB32.EXE] C:\WINDOWS\ADDMB32.EXE

O4 - HKLM\..\RunServices: [CRJC.EXE] C:\WINDOWS\CRJC.EXE

O4 - HKLM\..\RunServices: [ADDMI32.EXE] C:\WINDOWS\SYSTEM\ADDMI32.EXE

O4 - HKLM\..\RunServices: [iPPS32.EXE] C:\WINDOWS\IPPS32.EXE

O4 - HKLM\..\RunServices: [JAVAGO32.EXE] C:\WINDOWS\SYSTEM\JAVAGO32.EXE

O4 - HKLM\..\RunServices: [NETLA32.EXE] C:\WINDOWS\NETLA32.EXE

O4 - HKLM\..\RunServices: [APPJN32.EXE] C:\WINDOWS\SYSTEM\APPJN32.EXE

O4 - HKLM\..\RunServices: [iPIG32.EXE] C:\WINDOWS\IPIG32.EXE

O4 - HKLM\..\RunServices: [MSSD32.EXE] C:\WINDOWS\SYSTEM\MSSD32.EXE

O4 - HKLM\..\RunServices: [ATLMN.EXE] C:\WINDOWS\ATLMN.EXE

O4 - HKLM\..\RunServices: [NETFL.EXE] C:\WINDOWS\NETFL.EXE

O4 - HKLM\..\RunServices: [iEZY.EXE] C:\WINDOWS\IEZY.EXE

O4 - HKLM\..\RunServices: [MSDN.EXE] C:\WINDOWS\MSDN.EXE

O4 - HKLM\..\RunServices: [iPLE32.EXE] C:\WINDOWS\SYSTEM\IPLE32.EXE

O4 - HKLM\..\RunServices: [iPJD32.EXE] C:\WINDOWS\IPJD32.EXE

O4 - HKLM\..\RunServices: [iPBZ.EXE] C:\WINDOWS\SYSTEM\IPBZ.EXE

O4 - HKLM\..\RunServices: [sDKZD32.EXE] C:\WINDOWS\SYSTEM\SDKZD32.EXE

O4 - HKLM\..\RunServices: [APPGE.EXE] C:\WINDOWS\SYSTEM\APPGE.EXE

O4 - HKLM\..\RunServices: [JAVAZL32.EXE] C:\WINDOWS\SYSTEM\JAVAZL32.EXE

O4 - HKLM\..\RunServices: [iEWQ32.EXE] C:\WINDOWS\SYSTEM\IEWQ32.EXE

O4 - HKLM\..\RunServices: [sYSAD32.EXE] C:\WINDOWS\SYSTEM\SYSAD32.EXE

O4 - HKLM\..\RunServices: [sYSMR32.EXE] C:\WINDOWS\SYSTEM\SYSMR32.EXE

O4 - HKLM\..\RunServices: [WINVD.EXE] C:\WINDOWS\WINVD.EXE

O4 - HKLM\..\RunServices: [NTJM.EXE] C:\WINDOWS\SYSTEM\NTJM.EXE

O4 - HKLM\..\RunServices: [ATLAM.EXE] C:\WINDOWS\SYSTEM\ATLAM.EXE

O4 - HKCU\..\Run: [McAfee.InstantUpdate.Monitor] "C:\Program Files\McAfee\McAfee Shared Components\Instant Updater\RuLaunch.exe" /STARTMONITOR

O4 - HKCU\..\Run: [Yahoo! Pager] 1

O4 - HKCU\..\Run: [AIM] C:\PROGRAM FILES\AIM\aim.exe -cnetwait.odl

O4 - Startup: hp instant support.lnk = C:\Program Files\Hewlett-Packard\hpis\bin\matcli.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRAM FILES\AIM\AIM.EXE

O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://files.member.yahoo.com/dl/installs/sbc/yinsthdlk.cab

O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = sbcglobal.net

O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 151.164.1.8,206.13.28.12

O21 - SSODL: AUHook - {BCBCD383-3E06-11D3-91A9-00C04F68105C} - C:\WINDOWS\SYSTEM\AUHOOK.DLL

Share this post


Link to post
Share on other sites

Hi could you send

 

- C:\WINDOWS\SYSTEM\SYSMW.EXE

- C:\WINDOWS\SYSTEM\CRGV32.EXE

- C:\WINDOWS\IPIG32.EXE

 

and

 

- C:\WINDOWS\WINVD.EXE

 

 

To TBoY14 at Msn.com

 

Replace at with @. Then i will try updating About:Buster to remove those files. All files were randomly chosen :). If you cant find one file its ok.

-

Share this post


Link to post
Share on other sites

Please take the following steps:

 

First, please enable viewing of hidden/system files per the instructions here: http://www.xtra.co.nz/help/0,,4155-1916458,00.html

 

Also, before we start, to be safe backup your registry.

Start --> Run --> scanregw

If you get a dialog asking if you want to backup the registry, press 'OK'

Press 'OK' when the backup is finished

 

IMPORTANT Be sure all browser and explorer windows are closed.

 

Using the Task Manager end the task on the following processes:

Network Security Service (if present)

C:\WINDOWS\APIVM.EXE

C:\WINDOWS\SYSTEM\ATLAM.EXE

 

Run HijackThis and place a check mark next to the following items:

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/ext/search/search.htm

R3 - Default URLSearchHook is missing

 

O2 - BHO: Class - {99C866A5-8A79-53A6-D913-C42709E5F535} - C:\WINDOWS\SYSTEM\SDKHG.DLL (file missing)

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing)

O2 - BHO: Class - {32338E0B-6009-0AF4-DCEA-85388D0FD4A4} - C:\WINDOWS\NTCT32.DLL (file missing)

O2 - BHO: Class - {992D61D4-A6ED-DC0E-8E7E-24F69B309D85} - C:\WINDOWS\SYSTEM\JAVAKM32.DLL (file missing)

O2 - BHO: Class - {A732FA8F-EC19-7CF2-8EA8-1289AEDD82F9} - C:\WINDOWS\SYSTEM\D3LO32.DLL

 

O4 - HKLM\..\Run: [APIVM.EXE] C:\WINDOWS\APIVM.EXE

O4 - HKLM\..\RunServices: [sYSMW.EXE] C:\WINDOWS\SYSTEM\SYSMW.EXE

O4 - HKLM\..\RunServices: [CRGV32.EXE] C:\WINDOWS\SYSTEM\CRGV32.EXE

O4 - HKLM\..\RunServices: [sYSTP32.EXE] C:\WINDOWS\SYSTEM\SYSTP32.EXE

O4 - HKLM\..\RunServices: [MSZK32.EXE] C:\WINDOWS\SYSTEM\MSZK32.EXE

O4 - HKLM\..\RunServices: [ATLKY32.EXE] C:\WINDOWS\SYSTEM\ATLKY32.EXE

O4 - HKLM\..\RunServices: [APIDC32.EXE] C:\WINDOWS\APIDC32.EXE

O4 - HKLM\..\RunServices: [JAVAWJ32.EXE] C:\WINDOWS\JAVAWJ32.EXE

O4 - HKLM\..\RunServices: [sDKEV32.EXE] C:\WINDOWS\SDKEV32.EXE

O4 - HKLM\..\RunServices: [sYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE

O4 - HKLM\..\RunServices: [sDKVP.EXE] C:\WINDOWS\SYSTEM\SDKVP.EXE

O4 - HKLM\..\RunServices: [iPCY.EXE] C:\WINDOWS\SYSTEM\IPCY.EXE

O4 - HKLM\..\RunServices: [APIAT.EXE] C:\WINDOWS\SYSTEM\APIAT.EXE

O4 - HKLM\..\RunServices: [sDKMV.EXE] C:\WINDOWS\SYSTEM\SDKMV.EXE

O4 - HKLM\..\RunServices: [ADDEC32.EXE] C:\WINDOWS\SYSTEM\ADDEC32.EXE

O4 - HKLM\..\RunServices: [APPZH32.EXE] C:\WINDOWS\SYSTEM\APPZH32.EXE

O4 - HKLM\..\RunServices: [D3GU32.EXE] C:\WINDOWS\SYSTEM\D3GU32.EXE

O4 - HKLM\..\RunServices: [APPLM.EXE] C:\WINDOWS\SYSTEM\APPLM.EXE

O4 - HKLM\..\RunServices: [NETRN.EXE] C:\WINDOWS\NETRN.EXE

O4 - HKLM\..\RunServices: [sYSOX32.EXE] C:\WINDOWS\SYSTEM\SYSOX32.EXE

O4 - HKLM\..\RunServices: [APIGD.EXE] C:\WINDOWS\SYSTEM\APIGD.EXE

O4 - HKLM\..\RunServices: [NTQC.EXE] C:\WINDOWS\SYSTEM\NTQC.EXE

O4 - HKLM\..\RunServices: [iEDU32.EXE] C:\WINDOWS\SYSTEM\IEDU32.EXE

O4 - HKLM\..\RunServices: [ATLBP.EXE] C:\WINDOWS\SYSTEM\ATLBP.EXE

O4 - HKLM\..\RunServices: [iEVW32.EXE] C:\WINDOWS\SYSTEM\IEVW32.EXE

O4 - HKLM\..\RunServices: [MSCO32.EXE] C:\WINDOWS\MSCO32.EXE

O4 - HKLM\..\RunServices: [ADDMB32.EXE] C:\WINDOWS\ADDMB32.EXE

O4 - HKLM\..\RunServices: [CRJC.EXE] C:\WINDOWS\CRJC.EXE

O4 - HKLM\..\RunServices: [ADDMI32.EXE] C:\WINDOWS\SYSTEM\ADDMI32.EXE

O4 - HKLM\..\RunServices: [iPPS32.EXE] C:\WINDOWS\IPPS32.EXE

O4 - HKLM\..\RunServices: [JAVAGO32.EXE] C:\WINDOWS\SYSTEM\JAVAGO32.EXE

O4 - HKLM\..\RunServices: [NETLA32.EXE] C:\WINDOWS\NETLA32.EXE

O4 - HKLM\..\RunServices: [APPJN32.EXE] C:\WINDOWS\SYSTEM\APPJN32.EXE

O4 - HKLM\..\RunServices: [iPIG32.EXE] C:\WINDOWS\IPIG32.EXE

O4 - HKLM\..\RunServices: [MSSD32.EXE] C:\WINDOWS\SYSTEM\MSSD32.EXE

O4 - HKLM\..\RunServices: [ATLMN.EXE] C:\WINDOWS\ATLMN.EXE

O4 - HKLM\..\RunServices: [NETFL.EXE] C:\WINDOWS\NETFL.EXE

O4 - HKLM\..\RunServices: [iEZY.EXE] C:\WINDOWS\IEZY.EXE

O4 - HKLM\..\RunServices: [MSDN.EXE] C:\WINDOWS\MSDN.EXE

O4 - HKLM\..\RunServices: [iPLE32.EXE] C:\WINDOWS\SYSTEM\IPLE32.EXE

O4 - HKLM\..\RunServices: [iPJD32.EXE] C:\WINDOWS\IPJD32.EXE

O4 - HKLM\..\RunServices: [iPBZ.EXE] C:\WINDOWS\SYSTEM\IPBZ.EXE

O4 - HKLM\..\RunServices: [sDKZD32.EXE] C:\WINDOWS\SYSTEM\SDKZD32.EXE

O4 - HKLM\..\RunServices: [APPGE.EXE] C:\WINDOWS\SYSTEM\APPGE.EXE

O4 - HKLM\..\RunServices: [JAVAZL32.EXE] C:\WINDOWS\SYSTEM\JAVAZL32.EXE

O4 - HKLM\..\RunServices: [iEWQ32.EXE] C:\WINDOWS\SYSTEM\IEWQ32.EXE

O4 - HKLM\..\RunServices: [sYSAD32.EXE] C:\WINDOWS\SYSTEM\SYSAD32.EXE

O4 - HKLM\..\RunServices: [sYSMR32.EXE] C:\WINDOWS\SYSTEM\SYSMR32.EXE

O4 - HKLM\..\RunServices: [WINVD.EXE] C:\WINDOWS\WINVD.EXE

O4 - HKLM\..\RunServices: [NTJM.EXE] C:\WINDOWS\SYSTEM\NTJM.EXE

O4 - HKLM\..\RunServices: [ATLAM.EXE] C:\WINDOWS\SYSTEM\ATLAM.EXE

 

O21 - SSODL: AUHook - {BCBCD383-3E06-11D3-91A9-00C04F68105C} - C:\WINDOWS\SYSTEM\AUHOOK.DLL

 

Press 'Fix Checked'.

 

Exit HiJackThis.

 

Reboot into Safe Mode* and delete the following files: <insert R* entry dll's>

(also deleted any *.dat files with the same name as one of these *.exe files)

C:\WINDOWS\APIVM.EXE

C:\WINDOWS\SYSTEM\ATLAM.EXE

C:\WINDOWS\SYSTEM\D3LO32.DL

C:\WINDOWS\APIVM.EXE

C:\WINDOWS\SYSTEM\SYSMW.EXE

C:\WINDOWS\SYSTEM\CRGV32.EXE

C:\WINDOWS\SYSTEM\SYSTP32.EXE

C:\WINDOWS\SYSTEM\MSZK32.EXE

C:\WINDOWS\SYSTEM\ATLKY32.EXE

C:\WINDOWS\APIDC32.EXE

C:\WINDOWS\JAVAWJ32.EXE

C:\WINDOWS\SDKEV32.EXE

C:\WINDOWS\SYSTEM\SYSWB.EXE

C:\WINDOWS\SYSTEM\SDKVP.EXE

C:\WINDOWS\SYSTEM\IPCY.EXE

C:\WINDOWS\SYSTEM\APIAT.EXE

C:\WINDOWS\SYSTEM\SDKMV.EXE

C:\WINDOWS\SYSTEM\APPZH32.EXE

C:\WINDOWS\SYSTEM\D3GU32.EXE

C:\WINDOWS\SYSTEM\APPLM.EXE

C:\WINDOWS\NETRN.EXE

C:\WINDOWS\SYSTEM\SYSOX32.EXE

C:\WINDOWS\SYSTEM\APIGD.EXE

C:\WINDOWS\SYSTEM\NTQC.EXE

C:\WINDOWS\SYSTEM\IEDU32.EXE

C:\WINDOWS\SYSTEM\ATLBP.EXE

C:\WINDOWS\SYSTEM\IEVW32.EXE

C:\WINDOWS\MSCO32.EXE

C:\WINDOWS\ADDMB32.EXE

C:\WINDOWS\CRJC.EXE

C:\WINDOWS\SYSTEM\ADDMI32.EXE

C:\WINDOWS\IPPS32.EXE

C:\WINDOWS\SYSTEM\JAVAGO32.EXE

C:\WINDOWS\NETLA32.EXE

C:\WINDOWS\SYSTEM\APPJN32.EXE

C:\WINDOWS\IPIG32.EXE

C:\WINDOWS\SYSTEM\MSSD32.EXE

C:\WINDOWS\ATLMN.EXE

C:\WINDOWS\NETFL.EXE

C:\WINDOWS\IEZY.EXE

C:\WINDOWS\MSDN.EXE

C:\WINDOWS\SYSTEM\IPLE32.EXE

C:\WINDOWS\IPJD32.EXE

C:\WINDOWS\SYSTEM\IPBZ.EXE

C:\WINDOWS\SYSTEM\SDKZD32.EXE

C:\WINDOWS\SYSTEM\APPGE.EXE

C:\WINDOWS\SYSTEM\JAVAZL32.EXE

C:\WINDOWS\SYSTEM\IEWQ32.EXE

C:\WINDOWS\SYSTEM\SYSAD32.EXE

C:\WINDOWS\SYSTEM\SYSMR32.EXE

C:\WINDOWS\WINVD.EXE

C:\WINDOWS\SYSTEM\NTJM.EXE

 

While still in Safe Mode* finish the cleanup process, please run through the rest of these steps:

 

Go to Start --> Run and type Regedit then click Ok.

Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services

and highlight Services in the left pane. In the right pane, look for any of these entries:

 

__NS_Service

__NS_Service_2

__NS_Service_3

 

If any are listed, right-click that entry in the right pane and choose Delete.

 

Now navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root

and highlight Root in the Left Pane. In the right pane, look for these entries:

 

LEGACY___NS_Service

LEGACY___NS_Service_2

LEGACY___NS_Service_3

 

If you find it, right-click it in the right-pane and choose delete.

 

If you have trouble deleting a key. Then click once on the key name (LEGACY__NS_SERVICE_ or another name that starts with LEGACY__NS_SERVICE) to highlight it. Then click on the Permission menu option under Security or Edit. Then Uncheck "Allow inheritable permissions" and press copy. Then click on everyone and put a checkmark in "full control". Then press apply and ok and attempt to delete the key again.

 

Exit regedit, boot in Normal Mode.

 

To remove the remainder of the files this exploit deposits, run this Online AntiVirus scan, removing all it finds:

 

Trend Micro (PC-cillin) - Free on-line Scan

http://housecall.antivirus.com

 

 

=== Check ActiveX Settings ===

Adjust your security settings for ActiveX:

Go to Internet Options/Security/Internet, press 'default level', then OK.

Now press "Custom Level."

In the ActiveX section, set the first option, 'Download signed controls', to 'Prompt; set the

second option, 'Download unsigned controls', to 'Disable'; and finally, set 'Initialize and Script ActiveX controls not marked as safe" to 'Disable'.

 

 

=== Replace Deleted Files ===

It is also possible that the infection may have deleted up to three files from your system. If these files are present, to be safe I suggest you overwrite them with a new copy.

 

Go here: http://www.spywareinfo.com/~merijn/winfiles.html#control and download the version of control.exe for your operating system. If you are running Windows 2000, copy it to c:\winnt\system32\. For Windows XP, copy it to c:\windows\system32\.

 

Download the Hoster from here: http://members.aol.com/toadbee/hoster.zip

Press 'Restore Original Hosts' and press 'OK'

Exit Program.

 

If you have Spybot S&D installed you may also need to replace one file.

Go here: http://www.spywareinfo.com/~merijn/winfiles.html#sdhelper and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

 

Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended.

 

 

Download the latest version of Adaware (get the free edition)

http://www.lavasoft.de/software/adaware/

(choose download from the left hand menu)

 

Go to: Select Full Install and choose the download location of your choice (1.7mb)

Choose Download from http://fileforum.betanews.com/detail.php3?fid=965718306 <--(I found FileForum easiest)

 

Be sure to UPDATE BEFORE SCANNING FIRST!! That is a very important step and I have included easy directions.

 

After download and installing first, please update the program. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # :01R325 22.06.2004 or higher listed.

 

Next, go to Settings (the gear icon at the top) and then *Scanning* and checkmark these items so they will be green:

Scan within archives

Scan my IE Favorites for banned URLS

Scan my hosts file

 

Then click *proceed* to save settings.

 

Click on *Tweak* next. And checkmark to make this green also:

Automatically try to unregister objects prior to deletion

 

Click on *proceed*

 

Next, from the main screen, click on *Start* (lower righthand corner) and put a dot in the box next to *use Custom scanning options*, then click *Next* to start your scan.

 

Checkmark any items found after scanning to remove (this will actually put them in quarantine and can recover from backup if any should not be removed).

 

Reboot your PC after cleaning with Adaware and scan again. Repeat the process until no further items are found as bad.

 

Run HiJackThis and post a new log in this thread.

 

 

 

* How to Boot into Safe Mode:

http://service1.symantec.com/SUPPORT/tsgen...001052409420406

Share this post


Link to post
Share on other sites
Hi could you send

 

- C:\WINDOWS\SYSTEM\SYSMW.EXE

- C:\WINDOWS\SYSTEM\CRGV32.EXE

- C:\WINDOWS\IPIG32.EXE

 

and

 

- C:\WINDOWS\WINVD.EXE

 

 

To TBoY14 at Msn.com

 

Replace at with @. Then i will try updating About:Buster to remove those files. All files were randomly chosen :). If you cant find one file its ok.

-

i'm not sure wat u mean with some of this..... but i did another scan and some of the log changed a bit....

 

About:Buster Version 1.24

Error Removing! : C:\WINDOWS\addqv.exe

Removed! : C:\WINDOWS\appam32.dll

Removed! : C:\WINDOWS\elbvb.dat

Removed! : C:\WINDOWS\lvdbal.dat

Removed! : C:\WINDOWS\System\dbwty.dat

Attempted Clean Of Temp folder.

Removed Uninstall Key (HSA)

Removed Uninstall Key (SE)

Removed Uninstall Key (SW)

Pages Reset... Done!

 

 

Logfile of HijackThis v1.98.0

Scan saved at 8:40:39 PM, on 7/3/2004

Platform: Windows ME (Win9x 4.90.3000)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

C:\WINDOWS\SYSTEM\KERNEL32.DLL

C:\WINDOWS\SYSTEM\MSGSRV32.EXE

C:\WINDOWS\SYSTEM\mmtask.tsk

C:\WINDOWS\SYSTEM\MPREXE.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVSYNMGR.EXE

C:\WINDOWS\SYSTEM\STIMON.EXE

C:\WINDOWS\SYSTEM\MSTASK.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSSTAT.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSHWIN32.EXE

C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\AVCONSOL.EXE

C:\WINDOWS\EXPLORER.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMKEYBD.EXE

C:\WINDOWS\SYSTEM\SYSTRAY.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\KEYBDMGR.EXE

C:\WINDOWS\SYSTEM\USBMMKBD.EXE

C:\PROGRAM FILES\NETROPA\ONSCREEN DISPLAY\OSD.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WND.EXE

C:\WINDOWS\SYSTEM\HIDSERV.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YBRWICON.EXE

C:\PROGRAM FILES\HEWLETT-PACKARD\HP SHARE-TO-WEB\HPGS2WNF.EXE

C:\PROGRAM FILES\YAHOO!\BROWSER\YCOMMON.EXE

C:\PROGRAM FILES\VIEWPOINT\VIEWPOINT MANAGER\VIEWMGR.EXE

C:\WINDOWS\SYSTEM\WMIEXE.EXE

C:\WINDOWS\APIVM.EXE

C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\INSTANT UPDATER\RULAUNCH.EXE

C:\PROGRAM FILES\NETROPA\ONE-TOUCH MULTIMEDIA KEYBOARD\MMUSBKB2.EXE

C:\PROGRAM FILES\EFFICIENT NETWORKS\ENTERNET 300\APP\ENTERNET.EXE

C:\WINDOWS\SYSTEM\DDHELP.EXE

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\ADDQV.EXE

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\PROGRAM FILES\YAHOO!\BROWSER\YBROWSER.EXE

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\WINDOWS\SYSTEM\WINOA386.MOD

C:\PROGRAM FILES\HIJACKTHIS.EXE

 

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.yahoo.com/ext/search/search.html

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by SBC Yahoo! DSL

R3 - Default URLSearchHook is missing

F1 - win.ini: run=hpfsched

O2 - BHO: Class - {99C866A5-8A79-53A6-D913-C42709E5F535} - C:\WINDOWS\SYSTEM\SDKHG.DLL (file missing)

O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (file missing)

O2 - BHO: Class - {32338E0B-6009-0AF4-DCEA-85388D0FD4A4} - C:\WINDOWS\NTCT32.DLL (file missing)

O2 - BHO: Class - {992D61D4-A6ED-DC0E-8E7E-24F69B309D85} - C:\WINDOWS\SYSTEM\JAVAKM32.DLL (file missing)

O2 - BHO: Class - {A732FA8F-EC19-7CF2-8EA8-1289AEDD82F9} - C:\WINDOWS\SYSTEM\D3LO32.DLL (file missing)

O2 - BHO: Class - {92E73686-A5E7-F01C-CDF5-AA547D057D90} - C:\WINDOWS\SYSTEM\NETIN.DLL (file missing)

O2 - BHO: Class - {79CAD02C-8BB4-675C-D802-BFB2C2F6800B} - C:\WINDOWS\CRTG.DLL (file missing)

O2 - BHO: Class - {4CCFF5DA-AABA-0F8D-68C1-24CF5592B254} - C:\WINDOWS\SYSTEM\IEEE.DLL (file missing)

O2 - BHO: Class - {16EDBFB9-1984-8A48-C374-07BA91BDCB56} - C:\WINDOWS\SYSTEM\JAVAQY.DLL (file missing)

O2 - BHO: Class - {7AF4E359-9A5A-B06E-0125-4480B6233C67} - C:\WINDOWS\SYSTEM\SDKEK32.DLL (file missing)

O2 - BHO: Class - {7B30F33D-4323-2428-D014-8BE0A8C8C8ED} - C:\WINDOWS\APPAM32.DLL (file missing)

O2 - BHO: Class - {4D3C5204-6F62-C647-8CC8-1C8D0356D793} - C:\WINDOWS\SYSTEM\MFCPW32.DLL

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX

O3 - Toolbar: McAfee VirusScan - {ACB1E670-3217-45C4-A021-6B829A8A27CB} - C:\PROGRAM FILES\MCAFEE\MCAFEE VIRUSSCAN\VSCSHELLEXTENSION.DLL

O4 - HKLM\..\Run: [Keyboard Manager] C:\Program Files\Netropa\One-touch Multimedia Keyboard\MMKeybd.exe

O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe

O4 - HKLM\..\Run: [systemTray] SysTray.Exe

O4 - HKLM\..\Run: [McAfee Guardian] "C:\PROGRAM FILES\MCAFEE\MCAFEE SHARED COMPONENTS\GUARDIAN\CMGRDIAN.EXE" /SU

O4 - HKLM\..\Run: [uSBMMKBD] usbmmkbd.exe

O4 - HKLM\..\Run: [Hidserv] Hidserv.exe run

O4 - HKLM\..\Run: [share-to-Web Namespace Daemon] C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe

O4 - HKLM\..\Run: [YBrowser] C:\Program Files\Yahoo!\browser\ybrwicon.exe

O4 - HKLM\..\Run: [ViewMgr] C:\Program Files\Viewpoint\Viewpoint Manager\ViewMgr.exe

O4 - HKLM\..\Run: [APIVM.EXE] C:\WINDOWS\APIVM.EXE

O4 - HKLM\..\Run: [THGuard] "C:\PROGRAM FILES\TROJANHUNTER 3.9\THGUARD.EXE"

O4 - HKLM\..\RunServices: [McAfeeVirusScanService] C:\Program Files\McAfee\McAfee VirusScan\AVSYNMGR.EXE

O4 - HKLM\..\RunServices: [stillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE

O4 - HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe

O4 - HKLM\..\RunServices: [schedulingAgent] mstask.exe

O4 - HKLM\..\RunServices: [sYSMW.EXE] C:\WINDOWS\SYSTEM\SYSMW.EXE

O4 - HKLM\..\RunServices: [CRGV32.EXE] C:\WINDOWS\SYSTEM\CRGV32.EXE

O4 - HKLM\..\RunServices: [sYSTP32.EXE] C:\WINDOWS\SYSTEM\SYSTP32.EXE

O4 - HKLM\..\RunServices: [MSZK32.EXE] C:\WINDOWS\SYSTEM\MSZK32.EXE

O4 - HKLM\..\RunServices: [ATLKY32.EXE] C:\WINDOWS\SYSTEM\ATLKY32.EXE

O4 - HKLM\..\RunServices: [APIDC32.EXE] C:\WINDOWS\APIDC32.EXE

O4 - HKLM\..\RunServices: [JAVAWJ32.EXE] C:\WINDOWS\JAVAWJ32.EXE

O4 - HKLM\..\RunServices: [sDKEV32.EXE] C:\WINDOWS\SDKEV32.EXE

O4 - HKLM\..\RunServices: [sYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE

O4 - HKLM\..\RunServices: [sDKVP.EXE] C:\WINDOWS\SYSTEM\SDKVP.EXE

O4 - HKLM\..\RunServices: [iPCY.EXE] C:\WINDOWS\SYSTEM\IPCY.EXE

O4 - HKLM\..\RunServices: [APIAT.EXE] C:\WINDOWS\SYSTEM\APIAT.EXE

O4 - HKLM\..\RunServices: [sDKMV.EXE] C:\WINDOWS\SYSTEM\SDKMV.EXE

O4 - HKLM\..\RunServices: [ADDEC32.EXE] C:\WINDOWS\SYSTEM\ADDEC32.EXE

O4 - HKLM\..\RunServices: [APPZH32.EXE] C:\WINDOWS\SYSTEM\APPZH32.EXE

O4 - HKLM\..\RunServices: [D3GU32.EXE] C:\WINDOWS\SYSTEM\D3GU32.EXE

O4 - HKLM\..\RunServices: [APPLM.EXE] C:\WINDOWS\SYSTEM\APPLM.EXE

O4 - HKLM\..\RunServices: [NETRN.EXE] C:\WINDOWS\NETRN.EXE

O4 - HKLM\..\RunServices: [sYSOX32.EXE] C:\WINDOWS\SYSTEM\SYSOX32.EXE

O4 - HKLM\..\RunServices: [APIGD.EXE] C:\WINDOWS\SYSTEM\APIGD.EXE

O4 - HKLM\..\RunServices: [NTQC.EXE] C:\WINDOWS\SYSTEM\NTQC.EXE

O4 - HKLM\..\RunServices: [iEDU32.EXE] C:\WINDOWS\SYSTEM\IEDU32.EXE

O4 - HKLM\..\RunServices: [ATLBP.EXE] C:\WINDOWS\SYSTEM\ATLBP.EXE

O4 - HKLM\..\RunServices: [iEVW32.EXE] C:\WINDOWS\SYSTEM\IEVW32.EXE

O4 - HKLM\..\RunServices: [MSCO32.EXE] C:\WINDOWS\MSCO32.EXE

O4 - HKLM\..\RunServices: [ADDMB32.EXE] C:\WINDOWS\ADDMB32.EXE

O4 - HKLM\..\RunServices: [CRJC.EXE] C:\WINDOWS\CRJC.EXE

O4 - HKLM\..\RunServices: [ADDMI32.EXE] C:\WINDOWS\SYSTEM\ADDMI32.EXE

O4 - HKLM\..\RunServices: [iPPS32.EXE] C:\WINDOWS\IPPS32.EXE

O4 - HKLM\..\RunServices: [JAVAGO32.EXE] C:\WINDOWS\SYSTEM\JAVAGO32.EXE

O4 - HKLM\..\RunServices: [NETLA32.EXE] C:\WINDOWS\NETLA32.EXE

O4 - HKLM\..\RunServices: [APPJN32.EXE] C:\WINDOWS\SYSTEM\APPJN32.EXE

O4 - HKLM\..\RunServices: [iPIG32.EXE] C:\WINDOWS\IPIG32.EXE

O4 - HKLM\..\RunServices: [MSSD32.EXE] C:\WINDOWS\SYSTEM\MSSD32.EXE

O4 - HKLM\..\RunServices: [ATLMN.EXE] C:\WINDOWS\ATLMN.EXE

O4 - HKLM\..\RunServices: [NETFL.EXE] C:\WINDOWS\NETFL.EXE

O4 - HKLM\..\RunServices: [iEZY.EXE] C:\WINDOWS\IEZY.EXE

O4 - HKLM\..\RunServices: [MSDN.EXE] C:\WINDOWS\MSDN.EXE

O4 - HKLM\..\RunServices: [iPLE32.EXE] C:\WINDOWS\SYSTEM\IPLE32.EXE

O4 - HKLM\..\RunServices: [iPJD32.EXE] C:\WINDOWS\IPJD32.EXE

O4 - HKLM\..\RunServices: [iPBZ.EXE] C:\WINDOWS\SYSTEM\IPBZ.EXE

O4 - HKLM\..\RunServices: [sDKZD32.EXE] C:\WINDOWS\SYSTEM\SDKZD32.EXE

O4 - HKLM\..\RunServices: [APPGE.EXE] C:\WINDOWS\SYSTEM\APPGE.EXE

O4 - HKLM\..\RunServices: [JAVAZL32.EXE] C:\WINDOWS\SYSTEM\JAVAZL32.EXE

O4 - HKLM\..\RunServices: [iEWQ32.EXE] C:\WINDOWS\SYSTEM\IEWQ32.EXE

O4 - HKLM\..\RunServices: [sYSAD32.EXE] C:\WINDOWS\SYSTEM\SYSAD32.EXE

O4 - HKLM\..\RunServices: [sYSMR32.EXE] C:\WINDOWS\SYSTEM\SYSMR32.EXE

O4 - HKLM\..\RunServices: [WINVD.EXE] C:\WINDOWS\WINVD.EXE

O4 - HKLM\..\RunServices: [NTJM.EXE] C:\WINDOWS\SYSTEM\NTJM.EXE

O4 - HKLM\..\RunServices: [ATLAM.EXE] C:\WINDOWS\SYSTEM\ATLAM.EXE

O4 - HKLM\..\RunServices: [sDKTN32.EXE] C:\WINDOWS\SYSTEM\SDKTN32.EXE

O4 - HKLM\..\RunServices: [NTFN.EXE] C:\WINDOWS\SYSTEM\NTFN.EXE

O4 - HKLM\..\RunServices: [NTVM.EXE] C:\WINDOWS\NTVM.EXE

O4 - HKLM\..\RunServices: [NTCA32.EXE] C:\WINDOWS\NTCA32.EXE

O4 - HKLM\..\RunServices: [ADDQV.EXE] C:\WINDOWS\ADDQV.EXE

O4 - HKLM\..\RunOnce: [Ad-aware] "C:\PROGRAM FILES\LAVASOFT\AD-AWARE 6\AD-AWARE.EXE" "+b1"

O4 - HKCU\..\Run: [McAfee.InstantUpdate.Monitor] "C:\Program Files\McAfee\McAfee Shared Components\Instant Updater\RuLaunch.exe" /STARTMONITOR

O4 - HKCU\..\Run: [Yahoo! Pager] 1

O4 - HKCU\..\Run: [AIM] C:\PROGRAM FILES\AIM\aim.exe -cnetwait.odl

O4 - Startup: hp instant support.lnk = C:\Program Files\Hewlett-Packard\hpis\bin\matcli.exe

O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE

O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YPAGER.EXE

O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRAM FILES\AIM\AIM.EXE

O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://files.member.yahoo.com/dl/installs/sbc/yinsthdlk.cab

O17 - HKLM\System\CCS\Services\VxD\MSTCP: Domain = sbcglobal.net

O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 151.164.1.8,206.13.28.12

O21 - SSODL: AUHook - {BCBCD383-3E06-11D3-91A9-00C04F68105C} - C:\WINDOWS\SYSTEM\AUHOOK.DLL

Share this post


Link to post
Share on other sites

What i meant was find those files. Zip em up and attach them and send them to that address. Thanks. :). They'll keep coming back because buster doesnt remove em yet.

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0