• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
Sign in to follow this  
Followers 0
berthier

res://fspdi.dll/index.html#37680

4 posts in this topic

Hi all !

 

It's the first time i've posted. I am a "pure novice" and unfortunately I have a big big problem… I think (but i am not sure) I Have CWS.smartsearch.2 trojan in my system (Windows2000 professionnel)

The symptoms are :

1/Homepage changed to :" res://fspdi.dll/index.html#37680"

2/"Only The Best" popup windows

3/Apparition of a duplicate search engine : http://search-to-find.com/ or http://www.lookfor.cc

 

I followed the basic instructions in order to remove this malware. First I downloaded Adaware 6.0 (Adaware detects nothing special) and the latest version of CWShredder(v1.59.1) but everytime I try to check for update, it can't update information from merijn.org. One time, CWShredder displayed a window telling that my system is infected by the CWS.smartsearch.2 trojan but after this first alert, it runs correctly without detecting any problem. I downloaded Coolwebsearch.smartkiller (v2/v2)miniremoval tool indicated that there was no smart file to remove. So I downloaded Hijackthis and this my logfile, Thanks ! :

 

Logfile of HijackThis v1.97.7

Scan saved at 02:26:54, on 22/07/2004

Platform: Windows 2000 SP2 (WinNT 5.00.2195)

MSIE: Internet Explorer v5.00 SP2 (5.00.2920.0000)

 

Running processes:

C:\WINNT\system32\MsgSys.EXE

C:\WINNT\Explorer.EXE

C:\Program Files\Iomega\DriveIcons\ImgIcon.exe

C:\WINNT\System32\dpmw32.exe

C:\WINNT\system32\NWTRAY.EXE

C:\Program Files\NavNT\vptray.exe

C:\WINNT\system32\sdkzv32.exe

C:\WINNT\system32\internat.exe

C:\Program Files\Iomega\AutoDisk\AD2KClient.exe

C:\Program Files\Microsoft Office\Office\OSA.EXE

C:\WINNT\system32\sysjs.exe

C:\Program Files\Microsoft Office\Office\Winword.exe

C:\Documents and Settings\Bureau\My Shared Folder 03_03\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://fspdi.dll/index.html#37680

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://fspdi.dll/index.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://fspdi.dll/index.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://keyword.fr.netscape.com/keyword/%s

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

N1 - Netscape 4: user_pref("browser.startup.homepage", "tjaw.com"); (C:\Program Files\Netscape\Users\michard\prefs.js)

O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx

O2 - BHO: (no name) - {9C691A33-7DDA-4C2F-BE4C-C176083F35CF} - (no file)

O2 - BHO: (no name) - {B252D755-32EB-7D7A-C90F-1DFEFC68C50B} - C:\WINNT\system32\javabf.dll

O3 - Toolbar: @msdxmLC.dll,-1@1036,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx

O4 - HKLM\..\Run: [synchronization Manager] mobsync.exe /logon

O4 - HKLM\..\Run: [iomega Startup Options] C:\Program Files\Iomega\Common\ImgStart.exe

O4 - HKLM\..\Run: [iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe

O4 - HKLM\..\Run: [NDPS] C:\WINNT\System32\dpmw32.exe

O4 - HKLM\..\Run: [NWTRAY] NWTRAY.EXE

O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe

O4 - HKLM\..\Run: [RealTray] C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER

O4 - HKLM\..\Run: [RunDLL] rundll32.exe "C:\WINNT\Downloaded Program Files\bridge.dll",Load

O4 - HKLM\..\Run: [soecpqbuhycn] C:\WINNT\system32\ibuajw.exe

O4 - HKLM\..\Run: [apiuu.exe] C:\WINNT\system32\apiuu.exe

O4 - HKLM\..\Run: [sdkzv32.exe] C:\WINNT\system32\sdkzv32.exe

O4 - HKCU\..\Run: [internat.exe] internat.exe

O4 - HKCU\..\Run: [iomega Active Disk] C:\Program Files\Iomega\AutoDisk\AD2KClient.exe

O4 - HKCU\..\Run: [system Update4] c:\docume~1\berthier\applic~1\explore.exe

O4 - Startup: Démarrage d'Office.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE

O4 - Startup: Microsoft Recherche accélérée.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

O9 - Extra button: Real.com (HKLM)

O12 - Plugin for .bmp: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .mov: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .png: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .qt: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O14 - IERESET.INF: START_PAGE_URL=http://www.fr.msn.com

O14 - IERESET.INF: MS_START_PAGE_URL=http://www.fr.msn.com

O16 - DPF: Interface Chat Voila - http://chat4.x-echo.com/Applet/vchatsign.cab

O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macromedia.com/pub/shockwa...director/sw.cab

O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52/200211...meInstaller.exe

O16 - DPF: {9C691A33-7DDA-4C2F-BE4C-C176083F35CF} - http://static.flingstone.com/cab/2000XP/CDTInc/bridge.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload.macromedia.com/pub/shock...ash/swflash.cab

Share this post


Link to post
Share on other sites

Hello please download About:Buster and unzip it to your desktop. Don´t run it yet.

 

How to use Ad-Aware to remove Spyware <= Please check this link for instructions on how to download, install and then use adaware. Don´t use it yet.

1 You already have Adaware installed. Make sure it's up to date. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # : 01R333 18.07.2004 or higher listed.

 

2 Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.

 

3. Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok

Scroll down and find the service called "Network Security Service". When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. This service is installed by the malware. If this service is not listed go ahead with the next step.

 

4. Reboot to Safe Mode

How to start the computer in

Safe mode

 

 

5. Make sure your PC is configured to show hidden files

 

Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked.

Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"

Click "Apply" then "OK"

 

6.CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://fspdi.dll/index.html#37680

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://fspdi.dll/index.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://fspdi.dll/index.html#37680

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\system32\fspdi.dll/sp.html#37680

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

O2 - BHO: (no name) - {9C691A33-7DDA-4C2F-BE4C-C176083F35CF} - (no file)

O2 - BHO: (no name) - {B252D755-32EB-7D7A-C90F-1DFEFC68C50B} - C:\WINNT\system32\javabf.dll

O4 - HKLM\..\Run: [RunDLL] rundll32.exe "C:\WINNT\Downloaded Program Files\bridge.dll",Load

O4 - HKLM\..\Run: [soecpqbuhycn] C:\WINNT\system32\ibuajw.exe

O4 - HKLM\..\Run: [apiuu.exe] C:\WINNT\system32\apiuu.exe

O4 - HKLM\..\Run: [sdkzv32.exe] C:\WINNT\system32\sdkzv32.exe

O4 - HKCU\..\Run: [system Update4] c:\docume~1\berthier\applic~1\explore.exe

O16 - DPF: {9C691A33-7DDA-4C2F-BE4C-C176083F35CF} - http://static.flingstone.com/cab/2000XP/CDTInc/bridge.cab

 

If you set these restrictions yourself, using a program like Spybot Search & Destroy or SpywareGuard, or your system administrator put this into place, leave the following 06 item; otherwise, FIX it with HijackThis:

 

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present

 

 

7. Delete the following files if present.

C:\WINNT\system32\fspdi.dll

C:\WINNT\system32\javabf.dll

C:\WINNT\system32\sysjs.exe

C:\WINNT\system32\ibuajw.exe

C:\WINNT\system32\apiuu.exe

C:\WINNT\system32\sdkzv32.exe

c:\docume~1\berthier\applic~1\explore.exe

C:\WINNT\Downloaded Program Files\bridge.dll

 

 

8. Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

 

9. Scan with Adaware and let it remove any bad files found.

 

10. Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

 

Temporary Files

Temporary Internet Files

Recycle Bin

 

11. Reboot to normal mode, scan again with Hijack This and post a new log here.

 

12. Finally, do an online scan HERE. Let it remove any infected files found.

 

 

Post a fresh HijackThis log and the AboutBuster report back here please.

Share this post


Link to post
Share on other sites

Thanks mmxx66 !

 

I followed your advices , with a minor (but important I think) modification. First, I did what you wrote, but after the reboot the malware was still active with the same symptoms and with a new random name for the homepage by default like res://jklw.dll/index.html#37680...(new executables appeared also)

 

I worked hard, it was long and difficult...I did a second time the work and I removed also a dll file called : sdkzv32.dll. And I think that this file was responsible of the infection : with the "Process explorer" freeware, I noticed that EXPLORER used this dll. So I closed the "explorer.exe processus" and deleted this dll. After this and after the other steps (clean temp directories, run Adaware, etc.), the malware was killed ! ;)

 

I am a novice and If I say something wrong or stupid, don't be shocked... What do you think about this dll ? Do you want further informations ? (I don't know which ones are relevant).

 

I lost the abousBuster log, but this is my Hijack log (I think it's OK :whistle: )

 

Logfile of HijackThis v1.97.7

Scan saved at 14:22:17, on 23/07/2004

Platform: Windows 2000 SP2 (WinNT 5.00.2195)

MSIE: Internet Explorer v5.00 SP2 (5.00.2920.0000)

 

Running processes:

C:\WINNT\system32\MsgSys.EXE

C:\WINNT\Explorer.EXE

C:\Program Files\Iomega\DriveIcons\ImgIcon.exe

C:\WINNT\System32\dpmw32.exe

C:\WINNT\system32\NWTRAY.EXE

C:\Program Files\NavNT\vptray.exe

C:\WINNT\system32\internat.exe

C:\Program Files\Iomega\AutoDisk\AD2KClient.exe

C:\Program Files\Microsoft Office\Office\OSA.EXE

C:\Documents and Settings\berthier\Bureau\My Shared Folder 03_03\HijackThis.exe

 

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://keyword.fr.netscape.com/keyword/%s

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens

N1 - Netscape 4: user_pref("browser.startup.homepage", "http://home.netscape.com/"); (C:\Program Files\Netscape\Users\michard\prefs.js)

O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx

O3 - Toolbar: @msdxmLC.dll,-1@1036,&Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx

O4 - HKLM\..\Run: [synchronization Manager] mobsync.exe /logon

O4 - HKLM\..\Run: [iomega Startup Options] C:\Program Files\Iomega\Common\ImgStart.exe

O4 - HKLM\..\Run: [iomega Drive Icons] C:\Program Files\Iomega\DriveIcons\ImgIcon.exe

O4 - HKLM\..\Run: [NDPS] C:\WINNT\System32\dpmw32.exe

O4 - HKLM\..\Run: [NWTRAY] NWTRAY.EXE

O4 - HKLM\..\Run: [vptray] C:\Program Files\NavNT\vptray.exe

O4 - HKCU\..\Run: [internat.exe] internat.exe

O4 - HKCU\..\Run: [iomega Active Disk] C:\Program Files\Iomega\AutoDisk\AD2KClient.exe

O4 - Startup: Démarrage d'Office.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE

O4 - Startup: Microsoft Recherche accélérée.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE

O9 - Extra button: Real.com (HKLM)

O12 - Plugin for .bmp: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .mov: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .png: C:\Program Files\Netscape\Communicator\Program\PLUGINS\npqtplugin.dll

O12 - Plugin for .qt: C:\PROGRA~1\Netscape\COMMUN~1\Program\PLUGINS\npqtplugin.dll

O14 - IERESET.INF: START_PAGE_URL=http://www.fr.msn.com

O14 - IERESET.INF: MS_START_PAGE_URL=http://www.fr.msn.com

O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macromedia.com/pub/shockwa...director/sw.cab

O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload.macromedia.com/pub/shock...ash/swflash.cab

Share this post


Link to post
Share on other sites

Good job.

Your log is clean.

 

These items are considered to be resource hogs that are not needed and it may be worthwhile to fix them with HJT. You will still be able to start them manually if you need them:

 

O4 - Startup: Démarrage d'Office.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE

O4 - Startup: Microsoft Recherche accélérée.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE

 

Here are some tips, to reduce the potential for spyware infection in the future, I strongly recommend installing the following applications:

  • Spywareblaster <= SpywareBlaster will prevent spyware from being installed.
  • Spywareguard <= SpywareGuard offers realtime protection from spyware installation attempts.
  • How to use Ad-Aware to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Ad-Aware.
  • How to use Spybot to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Spybot. Similar to Ad-Aware, I strongly recommend both to catch most spyware.

To protect yourself further:

  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.

I also suggest that you delete any files from "temp", "tmp" folders. In Internet Explorer, click on "Tools" => "Internet Options" => "Delete Files" and select the box that says "Delete All Offline Content" and click on "OK" twice. Also, empty the recycle bin by right clicking on it and selecting "Empty Recycle Bin". These steps should be done on a regular basis.

 

And also see TonyKlein's good advice

So how did I get infected in the first place?

 

Good luck :D

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0