• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
Sign in to follow this  
Followers 0
tjd0200

can't delete BTIEIN

2 posts in this topic

Every time I open up Internet Explorer or My Network Places I get a notification from Symantec that a Trojan threat has been found. The threat is not defined with any detail in the quarantine, just "Trojan Threat". Scan computer, Symantec Corporate 9 finds nothing. Tried removal instructions for trojan threat from Symantec's site with no luck. Updated and ran both Adaware and Spybot. Spybot keeps finding the BTIEIN registry key. I know this is the HUNTBAR key, but I can't delete it. It keeps changing my home page and defaulting to a search url everytime you try to navigate to a different site. Finally downloaded Hijack This but not familiar enough to know everything that shouldn't be deleted. Any help would be greatly appreciated.

 

Have included Hijack This log.

 

Logfile of HijackThis v1.98.0

Scan saved at 3:38:23 PM, on 7/19/2004

Platform: Windows XP SP1 (WinNT 5.01.2600)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

C:\WINDOWS\System32\smss.exe

C:\WINDOWS\system32\winlogon.exe

C:\WINDOWS\system32\services.exe

C:\WINDOWS\system32\lsass.exe

C:\WINDOWS\system32\svchost.exe

C:\WINDOWS\System32\svchost.exe

C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe

C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe

C:\WINDOWS\system32\spoolsv.exe

C:\Program Files\Symantec AntiVirus\DefWatch.exe

C:\Program Files\Symantec AntiVirus\SavRoam.exe

C:\Program Files\Symantec AntiVirus\Rtvscan.exe

C:\WINDOWS\Explorer.EXE

C:\WINDOWS\system32\atlyt32.exe

C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe

C:\Program Files\Common Files\Symantec Shared\ccApp.exe

C:\PROGRA~1\SYMANT~2\VPTray.exe

C:\WINDOWS\ippy.exe

C:\WINDOWS\System32\hkcmd.exe

C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe

C:\Program Files\Internet Explorer\IEXPLORE.EXE

C:\Documents and Settings\Administrator.CRX\Local Settings\Temp\Temporary Directory 3 for hijackthis.zip\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://smbusiness.dellnet.com/

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://ecmob.dll/index.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049

R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://store.adobe.com/WebObjects/WEC?page...systemCode=AOLN

R3 - Default URLSearchHook is missing

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll

O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll

O2 - BHO: AcroIEToolbarHelper Class - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll

O2 - BHO: (no name) - {CAD07FE9-6CBE-706E-AD3F-ABD30C3C2C92} - C:\WINDOWS\atlwq.dll

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx

O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files\Adobe\Acrobat 6.0\Acrobat\AcroIEFavClient.dll

O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll

O4 - HKLM\..\Run: [AdaptecDirectCD] "C:\Program Files\Roxio\Easy CD Creator 5\DirectCD\DirectCD.exe"

O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"

O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~2\VPTray.exe

O4 - HKLM\..\Run: [ippy.exe] C:\WINDOWS\ippy.exe

O4 - HKLM\..\Run: [igfxTray] C:\WINDOWS\System32\igfxtray.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe

O4 - HKLM\..\RunOnce: [atlyt32.exe] C:\WINDOWS\system32\atlyt32.exe

O4 - HKLM\..\RunOnce: [d3ig.exe] C:\WINDOWS\system32\d3ig.exe

O4 - HKLM\..\RunOnce: [netxt.exe] C:\WINDOWS\system32\netxt.exe

O4 - HKLM\..\RunOnce: [apicg.exe] C:\WINDOWS\apicg.exe

O4 - HKLM\..\RunOnce: [wingf32.exe] C:\WINDOWS\wingf32.exe

O4 - HKLM\..\RunOnce: [atlej.exe] C:\WINDOWS\system32\atlej.exe

O4 - HKLM\..\RunOnce: [sdkqu.exe] C:\WINDOWS\system32\sdkqu.exe

O4 - HKLM\..\RunOnce: [addss.exe] C:\WINDOWS\addss.exe

O4 - HKLM\..\RunOnce: [ieun.exe] C:\WINDOWS\ieun.exe

O4 - HKLM\..\RunOnce: [atlir.exe] C:\WINDOWS\atlir.exe

O4 - HKLM\..\RunOnce: [windj32.exe] C:\WINDOWS\system32\windj32.exe

O4 - HKLM\..\RunOnce: [syszt32.exe] C:\WINDOWS\system32\syszt32.exe

O4 - HKLM\..\RunOnce: [Winnt32RunOnceWarning] user.exe

O4 - HKCU\..\Run: [MSMSGS] "C:\Program Files\Messenger\msmsgs.exe" /background

O4 - Global Startup: Acrobat Assistant.lnk = C:\Program Files\Adobe\Acrobat 6.0\Distillr\acrotray.exe

O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE

O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000

O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll

O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/SSC/SharedCon...bin/AvSniff.cab

O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedC...n/bin/cabsa.cab

O16 - DPF: {CE28D5D2-60CF-4C7D-9FE8-0F47A3308078} (ActiveDataInfo Class) - https://www-secure.symantec.com/techsupp/ac...ta/SymAData.cab

O16 - DPF: {E77C0D62-882A-456F-AD8F-7C6C9569B8C7} (ActiveDataObj Class) - https://www-secure.symantec.com/techsupp/ac.../ActiveData.cab

O17 - HKLM\System\CCS\Services\Tcpip\Parameters: Domain = CRX.local

O17 - HKLM\Software\..\Telephony: DomainName = CRX.local

O17 - HKLM\System\CS1\Services\Tcpip\Parameters: Domain = CRX.local

Share this post


Link to post
Share on other sites

Thanks for submitting your HijackThis log. Since this reply is lengthy, please print it to help you keep track of the steps.

 

1 -- Please download About:Buster and unzip it to your desktop. Do not run it just yet.

 

2 -- Then create a permanent folder for HijackThis (such as C:\HJT) and move your copy of the HijackThis.exe file from its current location in the temporary folders into the new folder. (Or, you could simply download a new copy of HijackThis(v1.98) and unzip it into the new folder.) Either way, HJT needs its own folder to ensure that backup files are reliably preserved. Do not run HJT just yet.

 

3 -- Reboot into Safe Mode (How do I boot into "Safe" mode?).

 

3 -- Make sure all browser and program windows are closed, then start the About Buster program, hit Ok, Start, and Ok again to start the scan. It will generate a log. Save that logfile for now, as you'll be asked to send it back to us at the end of these instructions.

 

Now run About Buster again, and save that logfile for us as well.

 

4 -- Run HijackThis, press Scan, and put a check against the following entries, if they still show up.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://ecmob.dll/index.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ecmob.dll/sp.html#37049

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://ecmob.dll/index.html#37049

R3 - Default URLSearchHook is missing

 

O2 - BHO: (no name) - {CAD07FE9-6CBE-706E-AD3F-ABD30C3C2C92} - C:\WINDOWS\atlwq.dll

 

O4 - HKLM\..\Run: [ippy.exe] C:\WINDOWS\ippy.exe

O4 - HKLM\..\RunOnce: [atlyt32.exe] C:\WINDOWS\system32\atlyt32.exe

O4 - HKLM\..\RunOnce: [d3ig.exe] C:\WINDOWS\system32\d3ig.exe

O4 - HKLM\..\RunOnce: [netxt.exe] C:\WINDOWS\system32\netxt.exe

O4 - HKLM\..\RunOnce: [apicg.exe] C:\WINDOWS\apicg.exe

O4 - HKLM\..\RunOnce: [wingf32.exe] C:\WINDOWS\wingf32.exe

O4 - HKLM\..\RunOnce: [atlej.exe] C:\WINDOWS\system32\atlej.exe

O4 - HKLM\..\RunOnce: [sdkqu.exe] C:\WINDOWS\system32\sdkqu.exe

O4 - HKLM\..\RunOnce: [addss.exe] C:\WINDOWS\addss.exe

O4 - HKLM\..\RunOnce: [ieun.exe] C:\WINDOWS\ieun.exe

O4 - HKLM\..\RunOnce: [atlir.exe] C:\WINDOWS\atlir.exe

O4 - HKLM\..\RunOnce: [windj32.exe] C:\WINDOWS\system32\windj32.exe

O4 - HKLM\..\RunOnce: [syszt32.exe] C:\WINDOWS\system32\syszt32.exe

Once you have selected all the items for HJT to fix, make sure all browsers and program windows are closed except for HijackThis, and click fix checked.

 

5 -- Run About Buster a third time, and save that logfile for us too.

 

Go ahead and check if any of these files still exist, and if they do please delete them:

 

C:\WINDOWS\addss.exe

C:\WINDOWS\apicg.exe

C:\WINDOWS\atlir.exe

C:\WINDOWS\atlwq.dll

C:\WINDOWS\ieun.exe

C:\WINDOWS\ippy.exe

C:\WINDOWS\system32\atlej.exe

C:\WINDOWS\system32\atlyt32.exe

C:\WINDOWS\system32\d3ig.exe

C:\WINDOWS\system32\netxt.exe

C:\WINDOWS\system32\sdkqu.exe

C:\WINDOWS\system32\syszt32.exe

C:\WINDOWS\system32\windj32.exe

C:\WINDOWS\wingf32.exe

 

6 -- Reboot back into Normal Mode, and run HijackThis again. Press Scan, and put a check against the following entry.

O4 - HKLM\..\RunOnce: [Winnt32RunOnceWarning] user.exe

Then, make sure all browsers and program windows are closed except for HijackThis, and click "fix checked"

 

Then, find the file called user.exe on your system (using Start > Search > For Files and Folders) and rename it to "user.old".

 

7 -- Now let's clean out the common "hide outs" that malware might try to re-install itself from.

 

Go to Start > Run and enter: cleanmgr. Let it scan your system, then check these three boxes and then press ok to remove: Temporary Files, Temporary Internet Files, Recycle Bin.

 

Please disable Windows System Restore, then reboot, then re-enable Windows System Restore by following the instructions at: "How to turn off or turn on Windows XP System Restore"

 

8 -- Finally, after coming up after the reboot in Step #7 run HijackThis to create a new logfile. Repost it here along with the three About Buster logs. If you had any problems with the steps outlined above, please let us know what they were. If we need to take additional steps, your response and the new logfiles will indicate what they may be.

 

Once your system is cleaned, we’ll close with some general recommendations for avoiding malware infections in the future.

 

In the meantime, please read: So how did I get infected in the first place?

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0