Jump to content


Photo

can't delete BTIEIN


  • Please log in to reply
1 reply to this topic

#1 tjd0200

tjd0200

    Member

  • New Member
  • Pip
  • 3 posts

Posted 19 July 2004 - 03:02 PM

Every time I open up Internet Explorer or My Network Places I get a notification from Symantec that a Trojan threat has been found. The threat is not defined with any detail in the quarantine, just "Trojan Threat". Scan computer, Symantec Corporate 9 finds nothing. Tried removal instructions for trojan threat from Symantec's site with no luck. Updated and ran both Adaware and Spybot. Spybot keeps finding the BTIEIN registry key. I know this is the HUNTBAR key, but I can't delete it. It keeps changing my home page and defaulting to a search url everytime you try to navigate to a different site. Finally downloaded Hijack This but not familiar enough to know everything that shouldn't be deleted. Any help would be greatly appreciated.

Have included Hijack This log.

Logfile of HijackThis v1.98.0
Scan saved at 3:38:23 PM, on 7/19/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec AntiVirus\SavRoam.exe
C:\Program Files\Symantec AntiVirus\Rtvscan.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\atlyt32.exe
C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\PROGRA~1\SYMANT~2\VPTray.exe
C:\WINDOWS\ippy.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Administrator.CRX\Local Settings\Temp\Temporary Directory 3 for hijackthis.zip\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://smbusiness.dellnet.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://ecmob.dll/index.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://store.adobe.c...systemCode=AOLN
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O2 - BHO: (no name) - {CAD07FE9-6CBE-706E-AD3F-ABD30C3C2C92} - C:\WINDOWS\atlwq.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe
O4 - HKLM\..\Run: [ippy.exe] C:\WINDOWS\ippy.exe
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\RunOnce: [atlyt32.exe] C:\WINDOWS\system32\atlyt32.exe
O4 - HKLM\..\RunOnce: [d3ig.exe] C:\WINDOWS\system32\d3ig.exe
O4 - HKLM\..\RunOnce: [netxt.exe] C:\WINDOWS\system32\netxt.exe
O4 - HKLM\..\RunOnce: [apicg.exe] C:\WINDOWS\apicg.exe
O4 - HKLM\..\RunOnce: [wingf32.exe] C:\WINDOWS\wingf32.exe
O4 - HKLM\..\RunOnce: [atlej.exe] C:\WINDOWS\system32\atlej.exe
O4 - HKLM\..\RunOnce: [sdkqu.exe] C:\WINDOWS\system32\sdkqu.exe
O4 - HKLM\..\RunOnce: [addss.exe] C:\WINDOWS\addss.exe
O4 - HKLM\..\RunOnce: [ieun.exe] C:\WINDOWS\ieun.exe
O4 - HKLM\..\RunOnce: [atlir.exe] C:\WINDOWS\atlir.exe
O4 - HKLM\..\RunOnce: [windj32.exe] C:\WINDOWS\system32\windj32.exe
O4 - HKLM\..\RunOnce: [syszt32.exe] C:\WINDOWS\system32\syszt32.exe
O4 - HKLM\..\RunOnce: [Winnt32RunOnceWarning] user.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background
O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {CE28D5D2-60CF-4C7D-9FE8-0F47A3308078} (ActiveDataInfo Class) - https://www-secure.s...ta/SymAData.cab
O16 - DPF: {E77C0D62-882A-456F-AD8F-7C6C9569B8C7} (ActiveDataObj Class) - https://www-secure.s.../ActiveData.cab
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = CRX.local
O17 - HKLM\Software\..\Telephony: DomainName = CRX.local
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = CRX.local

#2 daveai

daveai

    Forum Deity

  • Retired Staff
  • PipPipPipPipPip
  • 1,214 posts

Posted 27 July 2004 - 05:11 PM

Thanks for submitting your HijackThis log. Since this reply is lengthy, please print it to help you keep track of the steps.

1 -- Please download About:Buster and unzip it to your desktop. Do not run it just yet.

2 -- Then create a permanent folder for HijackThis (such as C:\HJT) and move your copy of the HijackThis.exe file from its current location in the temporary folders into the new folder. (Or, you could simply download a new copy of HijackThis(v1.98) and unzip it into the new folder.) Either way, HJT needs its own folder to ensure that backup files are reliably preserved. Do not run HJT just yet.

3 -- Reboot into Safe Mode (How do I boot into "Safe" mode?).

3 -- Make sure all browser and program windows are closed, then start the About Buster program, hit Ok, Start, and Ok again to start the scan. It will generate a log. Save that logfile for now, as you'll be asked to send it back to us at the end of these instructions.

Now run About Buster again, and save that logfile for us as well.

4 -- Run HijackThis, press Scan, and put a check against the following entries, if they still show up.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://ecmob.dll/index.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049
R3 - Default URLSearchHook is missing

O2 - BHO: (no name) - {CAD07FE9-6CBE-706E-AD3F-ABD30C3C2C92} - C:\WINDOWS\atlwq.dll

O4 - HKLM\..\Run: [ippy.exe] C:\WINDOWS\ippy.exe
O4 - HKLM\..\RunOnce: [atlyt32.exe] C:\WINDOWS\system32\atlyt32.exe
O4 - HKLM\..\RunOnce: [d3ig.exe] C:\WINDOWS\system32\d3ig.exe
O4 - HKLM\..\RunOnce: [netxt.exe] C:\WINDOWS\system32\netxt.exe
O4 - HKLM\..\RunOnce: [apicg.exe] C:\WINDOWS\apicg.exe
O4 - HKLM\..\RunOnce: [wingf32.exe] C:\WINDOWS\wingf32.exe
O4 - HKLM\..\RunOnce: [atlej.exe] C:\WINDOWS\system32\atlej.exe
O4 - HKLM\..\RunOnce: [sdkqu.exe] C:\WINDOWS\system32\sdkqu.exe
O4 - HKLM\..\RunOnce: [addss.exe] C:\WINDOWS\addss.exe
O4 - HKLM\..\RunOnce: [ieun.exe] C:\WINDOWS\ieun.exe
O4 - HKLM\..\RunOnce: [atlir.exe] C:\WINDOWS\atlir.exe
O4 - HKLM\..\RunOnce: [windj32.exe] C:\WINDOWS\system32\windj32.exe
O4 - HKLM\..\RunOnce: [syszt32.exe] C:\WINDOWS\system32\syszt32.exe

Once you have selected all the items for HJT to fix, make sure all browsers and program windows are closed except for HijackThis, and click fix checked.

5 -- Run About Buster a third time, and save that logfile for us too.

Go ahead and check if any of these files still exist, and if they do please delete them:

C:\WINDOWS\addss.exe
C:\WINDOWS\apicg.exe
C:\WINDOWS\atlir.exe
C:\WINDOWS\atlwq.dll
C:\WINDOWS\ieun.exe
C:\WINDOWS\ippy.exe
C:\WINDOWS\system32\atlej.exe
C:\WINDOWS\system32\atlyt32.exe
C:\WINDOWS\system32\d3ig.exe
C:\WINDOWS\system32\netxt.exe
C:\WINDOWS\system32\sdkqu.exe
C:\WINDOWS\system32\syszt32.exe
C:\WINDOWS\system32\windj32.exe
C:\WINDOWS\wingf32.exe

6 -- Reboot back into Normal Mode, and run HijackThis again. Press Scan, and put a check against the following entry.

O4 - HKLM\..\RunOnce: [Winnt32RunOnceWarning] user.exe

Then, make sure all browsers and program windows are closed except for HijackThis, and click "fix checked"

Then, find the file called user.exe on your system (using Start > Search > For Files and Folders) and rename it to "user.old".

7 -- Now let's clean out the common "hide outs" that malware might try to re-install itself from.

Go to Start > Run and enter: cleanmgr. Let it scan your system, then check these three boxes and then press ok to remove: Temporary Files, Temporary Internet Files, Recycle Bin.

Please disable Windows System Restore, then reboot, then re-enable Windows System Restore by following the instructions at: "How to turn off or turn on Windows XP System Restore"

8 -- Finally, after coming up after the reboot in Step #7 run HijackThis to create a new logfile. Repost it here along with the three About Buster logs. If you had any problems with the steps outlined above, please let us know what they were. If we need to take additional steps, your response and the new logfiles will indicate what they may be.

Once your system is cleaned, we’ll close with some general recommendations for avoiding malware infections in the future.

In the meantime, please read: So how did I get infected in the first place?
If you found our service worthwhile, and want to help keep SpwareInfo running please consider donating here.

"Applying computer technology is simply finding the right wrench to pound in the correct screw." Anonymous




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button