Jump to content


Photo

Help!!! Computer taken over by virus!!!


  • Please log in to reply
31 replies to this topic

#1 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 27 July 2004 - 08:27 PM

Can someone help help me? My computer has been infected with a virus via e-mail! Iran hijack this and here's the log file:

\winaw.exe
O4 - HKLM\..\RunOnce: [syseo.exe] C:\WINDOWS\syseo.exe
O4 - HKLM\..\RunOnce: [ienw32.exe] C:\WINDOWS\ienw32.exe
O4 - HKLM\..\RunOnce: [sysno.exe] C:\WINDOWS\sysno.exe
O4 - HKLM\..\RunOnce: [msxd32.exe] C:\WINDOWS\msxd32.exe
O4 - HKLM\..\RunOnce: [syswk.exe] C:\WINDOWS\system32\syswk.exe
O4 - HKLM\..\RunOnce: [d3ho.exe] C:\WINDOWS\system32\d3ho.exe
O4 - HKLM\..\RunOnce: [netyq32.exe] C:\WINDOWS\netyq32.exe
O4 - HKLM\..\RunOnce: [apisw32.exe] C:\WINDOWS\system32\apisw32.exe
O4 - HKLM\..\RunOnce: [mshl32.exe] C:\WINDOWS\system32\mshl32.exe
O4 - HKLM\..\RunOnce: [mfcqc.exe] C:\WINDOWS\mfcqc.exe
O4 - HKLM\..\RunOnce: [addmv.exe] C:\WINDOWS\addmv.exe
O4 - HKLM\..\RunOnce: [sdkcx.exe] C:\WINDOWS\sdkcx.exe
O4 - HKLM\..\RunOnce: [crjw.exe] C:\WINDOWS\system32\crjw.exe
O4 - HKLM\..\RunOnce: [sdkoc32.exe] C:\WINDOWS\system32\sdkoc32.exe
O4 - HKLM\..\RunOnce: [appxe32.exe] C:\WINDOWS\system32\appxe32.exe
O4 - HKLM\..\RunOnce: [sdkfn32.exe] C:\WINDOWS\system32\sdkfn32.exe
O4 - HKLM\..\RunOnce: [appoq32.exe] C:\WINDOWS\appoq32.exe
O4 - HKLM\..\RunOnce: [iedc.exe] C:\WINDOWS\system32\iedc.exe
O4 - HKLM\..\RunOnce: [mfcft.exe] C:\WINDOWS\mfcft.exe
O4 - HKLM\..\RunOnce: [appsw.exe] C:\WINDOWS\system32\appsw.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O4 - Global Startup: winlogin.exe
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - http://www.2nd-thoug.../install026.exe
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {886DDE35-E955-11D0-A707-000000521958} - http://69.56.176.78/webplugin.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-downlo...tsInstaller.cab

Does anyone know what to do? Thanks!

#2 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 28 July 2004 - 09:19 AM

Can you post the complete log. please?
Run the program, and press Scan. You will notice the Scan button will turn into a "Save Log" button. Save the log and Post that log onto this topic

#3 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 30 July 2004 - 07:51 PM

Here's the complete log:

Logfile of HijackThis v1.97.7
Scan saved at 7:37:32 PM, on 7/30/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\winik.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\System32\zarmjf.exe
C:\WINDOWS\system32\ntfu.exe
C:\documents and settings\beasleys\local settings\temp\23v.exe
C:\documents and settings\beasleys\local settings\temp\D3ADgokQZ.exe
C:\WINDOWS\system32\explorer.exe
C:\WINDOWS\System32\IEHost.exe
C:\WINDOWS\System32\rundll32.exe
C:\Program Files\Save\Save.exe
C:\WINDOWS\system32\pcs\pcsvc.exe
C:\Program Files\Common Files\Dpi\dpi.exe
C:\documents and settings\beasleys\local settings\temp\zT8.exe
C:\WINDOWS\System32\skecrap.exe
C:\Program Files\AIM\aim.exe
C:\Documents and Settings\Beasleys\Application Data\saas.exe
C:\WINDOWS\System32\admvol.exe
C:\WINDOWS\System32\fors31.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\explorer.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\System32\CglfZ.exe
C:\WINDOWS\System32\DrcG.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\System32\SearchBar.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {000020DD-C72E-4113-AF77-DD56626C6C42} - C:\WINDOWS\twaintec.dll
O2 - BHO: (no name) - {138A5205-A268-89B1-3BFB-4A72B4DB2878} - C:\WINDOWS\crxl32.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [muxfcfotydqdo] C:\WINDOWS\System32\zarmjf.exe
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [ntfu.exe] C:\WINDOWS\system32\ntfu.exe
O4 - HKLM\..\Run: [23v] C:\documents and settings\beasleys\local settings\temp\23v.exe
O4 - HKLM\..\Run: [D3ADgokQZ] C:\documents and settings\beasleys\local settings\temp\D3ADgokQZ.exe
O4 - HKLM\..\Run: [Explorer] C:\WINDOWS\system32\explorer.exe
O4 - HKLM\..\Run: [System Service] C:\WINDOWS\System32\msrexe.exe
O4 - HKLM\..\Run: [Bakra] C:\WINDOWS\System32\IEHost.exe
O4 - HKLM\..\Run: [{2CF0B992-5EEB-4143-99C0-5297EF71F444}] rundll32.exe C:\WINDOWS\System32\stlbdist.DLL,DllRunMain
O4 - HKLM\..\Run: [WhenUSave] "C:\Program Files\Save\Save.exe"
O4 - HKLM\..\Run: [3F@T@TZ4A44H6B] C:\WINDOWS\System32\EqbOv5.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [Pcsv] C:\WINDOWS\system32\pcs\pcsvc.exe
O4 - HKLM\..\Run: [Dpi] C:\Program Files\Common Files\Dpi\dpi.exe
O4 - HKLM\..\Run: [zT8] C:\documents and settings\beasleys\local settings\temp\zT8.exe
O4 - HKLM\..\Run: [qs9S37R] skecrap.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Urcc] C:\Documents and Settings\Beasleys\Application Data\saas.exe
O4 - HKCU\..\Run: [Eipfq] C:\WINDOWS\System32\admvol.exe
O4 - HKCU\..\Run: [bBq2RXd7S] fors31.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKLM\..\RunOnce: [sysno.exe] C:\WINDOWS\sysno.exe
O4 - HKLM\..\RunOnce: [msxd32.exe] C:\WINDOWS\msxd32.exe
O4 - HKLM\..\RunOnce: [syswk.exe] C:\WINDOWS\system32\syswk.exe
O4 - HKLM\..\RunOnce: [d3ho.exe] C:\WINDOWS\system32\d3ho.exe
O4 - HKLM\..\RunOnce: [netyq32.exe] C:\WINDOWS\netyq32.exe
O4 - HKLM\..\RunOnce: [apisw32.exe] C:\WINDOWS\system32\apisw32.exe
O4 - HKLM\..\RunOnce: [mshl32.exe] C:\WINDOWS\system32\mshl32.exe
O4 - HKLM\..\RunOnce: [mfcqc.exe] C:\WINDOWS\mfcqc.exe
O4 - HKLM\..\RunOnce: [addmv.exe] C:\WINDOWS\addmv.exe
O4 - HKLM\..\RunOnce: [sdkcx.exe] C:\WINDOWS\sdkcx.exe
O4 - HKLM\..\RunOnce: [crjw.exe] C:\WINDOWS\system32\crjw.exe
O4 - HKLM\..\RunOnce: [sdkoc32.exe] C:\WINDOWS\system32\sdkoc32.exe
O4 - HKLM\..\RunOnce: [appxe32.exe] C:\WINDOWS\system32\appxe32.exe
O4 - HKLM\..\RunOnce: [sdkfn32.exe] C:\WINDOWS\system32\sdkfn32.exe
O4 - HKLM\..\RunOnce: [appoq32.exe] C:\WINDOWS\appoq32.exe
O4 - HKLM\..\RunOnce: [iedc.exe] C:\WINDOWS\system32\iedc.exe
O4 - HKLM\..\RunOnce: [mfcft.exe] C:\WINDOWS\mfcft.exe
O4 - HKLM\..\RunOnce: [appsw.exe] C:\WINDOWS\system32\appsw.exe
O4 - HKLM\..\RunOnce: [ipnj32.exe] C:\WINDOWS\ipnj32.exe
O4 - HKLM\..\RunOnce: [sdkbb.exe] C:\WINDOWS\sdkbb.exe
O4 - HKLM\..\RunOnce: [mfcgp.exe] C:\WINDOWS\system32\mfcgp.exe
O4 - HKLM\..\RunOnce: [netgd32.exe] C:\WINDOWS\netgd32.exe
O4 - HKLM\..\RunOnce: [appzj.exe] C:\WINDOWS\appzj.exe
O4 - HKLM\..\RunOnce: [addvm.exe] C:\WINDOWS\addvm.exe
O4 - HKLM\..\RunOnce: [mssp32.exe] C:\WINDOWS\system32\mssp32.exe
O4 - HKLM\..\RunOnce: [winik.exe] C:\WINDOWS\system32\winik.exe
O4 - HKLM\..\RunOnce: [sysio.exe] C:\WINDOWS\sysio.exe
O4 - HKLM\..\RunOnce: [netns32.exe] C:\WINDOWS\netns32.exe
O4 - HKLM\..\RunOnce: [appec.exe] C:\WINDOWS\appec.exe
O4 - HKLM\..\RunOnce: [addoy32.exe] C:\WINDOWS\system32\addoy32.exe
O4 - HKLM\..\RunOnce: [winvj32.exe] C:\WINDOWS\winvj32.exe
O4 - HKLM\..\RunOnce: [apifx.exe] C:\WINDOWS\apifx.exe
O4 - HKLM\..\RunOnce: [atlqt.exe] C:\WINDOWS\system32\atlqt.exe
O4 - HKLM\..\RunOnce: [winaw.exe] C:\WINDOWS\winaw.exe
O4 - HKLM\..\RunOnce: [syseo.exe] C:\WINDOWS\syseo.exe
O4 - HKLM\..\RunOnce: [ienw32.exe] C:\WINDOWS\ienw32.exe
O4 - HKLM\..\RunOnce: [addcn32.exe] C:\WINDOWS\addcn32.exe
O4 - HKLM\..\RunOnce: [netny32.exe] C:\WINDOWS\netny32.exe
O4 - HKLM\..\RunOnce: [sdkoq.exe] C:\WINDOWS\sdkoq.exe
O4 - HKLM\..\RunOnce: [d3mp.exe] C:\WINDOWS\system32\d3mp.exe
O4 - HKLM\..\RunOnce: [javazf.exe] C:\WINDOWS\system32\javazf.exe
O4 - HKLM\..\RunOnce: [mfczb32.exe] C:\WINDOWS\mfczb32.exe
O4 - HKLM\..\RunOnce: [mfcgj32.exe] C:\WINDOWS\mfcgj32.exe
O4 - HKLM\..\RunOnce: [javank.exe] C:\WINDOWS\javank.exe
O4 - HKLM\..\RunOnce: [ipum.exe] C:\WINDOWS\ipum.exe
O4 - HKLM\..\RunOnce: [appad32.exe] C:\WINDOWS\appad32.exe
O4 - HKLM\..\RunOnce: [ieue.exe] C:\WINDOWS\system32\ieue.exe
O4 - HKLM\..\RunOnce: [javawu.exe] C:\WINDOWS\javawu.exe
O4 - HKLM\..\RunOnce: [ieme.exe] C:\WINDOWS\ieme.exe
O4 - HKLM\..\RunOnce: [mfcsg32.exe] C:\WINDOWS\mfcsg32.exe
O4 - HKLM\..\RunOnce: [javahf.exe] C:\WINDOWS\javahf.exe
O4 - HKLM\..\RunOnce: [appeh32.exe] C:\WINDOWS\system32\appeh32.exe
O4 - HKLM\..\RunOnce: [netqm32.exe] C:\WINDOWS\system32\netqm32.exe
O4 - HKLM\..\RunOnce: [mfcws.exe] C:\WINDOWS\mfcws.exe
O4 - HKLM\..\RunOnce: [addtu.exe] C:\WINDOWS\system32\addtu.exe
O4 - HKLM\..\RunOnce: [crzq.exe] C:\WINDOWS\system32\crzq.exe
O4 - HKLM\..\RunOnce: [javavk.exe] C:\WINDOWS\javavk.exe
O4 - HKLM\..\RunOnce: [ntqj32.exe] C:\WINDOWS\system32\ntqj32.exe
O4 - HKLM\..\RunOnce: [d3ig32.exe] C:\WINDOWS\d3ig32.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O4 - Global Startup: winlogin.exe
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - http://www.2nd-thoug.../install026.exe
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {886DDE35-E955-11D0-A707-000000521958} - http://69.56.176.78/webplugin.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-downlo...tsInstaller.cab

Edited by rallymonkey, 30 July 2004 - 09:41 PM.


#4 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 31 July 2004 - 09:36 AM

This computer is seriously infected. :alarm:

Let´s start with the Peper infection.

Download PeperFix
Save it to your Desktop.
Click on the PeperFix.exe to launch it.

Click the Find and Fix button.

It will scan the %Systemroot% folder and locate all the peper files. You will be prompted to reboot. Reboot and it will delete the peper files.
Ensure that you are online before starting the fix. Make sure to run the fix twice.

And post a new log please, there´s a lot of things to fix in your system.

#5 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 01 August 2004 - 02:20 AM

Thank You!!! Here's the new log file:

Logfile of HijackThis v1.97.7
Scan saved at 12:18:13 AM, on 8/1/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\winik.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\System32\zarmjf.exe
C:\WINDOWS\system32\ntfu.exe
C:\documents and settings\beasleys\local settings\temp\23v.exe
C:\documents and settings\beasleys\local settings\temp\D3ADgokQZ.exe
C:\WINDOWS\system32\explorer.exe
C:\WINDOWS\System32\IEHost.exe
C:\WINDOWS\System32\rundll32.exe
C:\Program Files\Save\Save.exe
C:\WINDOWS\system32\pcs\pcsvc.exe
C:\Program Files\Common Files\Dpi\dpi.exe
C:\documents and settings\beasleys\local settings\temp\zT8.exe
C:\WINDOWS\System32\ntptmgr.exe
C:\Program Files\AIM\aim.exe
C:\Documents and Settings\Beasleys\Application Data\saas.exe
C:\WINDOWS\System32\admvol.exe
C:\WINDOWS\System32\oakmlby.exe
C:\Program Files\Ares\Ares.exe
C:\WINDOWS\system32\explorer.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\System32\SearchBar.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {000020DD-C72E-4113-AF77-DD56626C6C42} - C:\WINDOWS\twaintec.dll
O2 - BHO: (no name) - {138A5205-A268-89B1-3BFB-4A72B4DB2878} - C:\WINDOWS\crxl32.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [muxfcfotydqdo] C:\WINDOWS\System32\zarmjf.exe
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [ntfu.exe] C:\WINDOWS\system32\ntfu.exe
O4 - HKLM\..\Run: [23v] C:\documents and settings\beasleys\local settings\temp\23v.exe
O4 - HKLM\..\Run: [D3ADgokQZ] C:\documents and settings\beasleys\local settings\temp\D3ADgokQZ.exe
O4 - HKLM\..\Run: [Explorer] C:\WINDOWS\system32\explorer.exe
O4 - HKLM\..\Run: [System Service] C:\WINDOWS\System32\msrexe.exe
O4 - HKLM\..\Run: [Bakra] C:\WINDOWS\System32\IEHost.exe
O4 - HKLM\..\Run: [{2CF0B992-5EEB-4143-99C0-5297EF71F444}] rundll32.exe C:\WINDOWS\System32\stlbdist.DLL,DllRunMain
O4 - HKLM\..\Run: [WhenUSave] "C:\Program Files\Save\Save.exe"
O4 - HKLM\..\Run: [3F@T@TZ4A44H6B] C:\WINDOWS\System32\TksAtZ.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [Pcsv] C:\WINDOWS\system32\pcs\pcsvc.exe
O4 - HKLM\..\Run: [Dpi] C:\Program Files\Common Files\Dpi\dpi.exe
O4 - HKLM\..\Run: [zT8] C:\documents and settings\beasleys\local settings\temp\zT8.exe
O4 - HKLM\..\Run: [qs9S37R] ntptmgr.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [Urcc] C:\Documents and Settings\Beasleys\Application Data\saas.exe
O4 - HKCU\..\Run: [Eipfq] C:\WINDOWS\System32\admvol.exe
O4 - HKCU\..\Run: [bBq2RXd7S] oakmlby.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKLM\..\RunOnce: [sysno.exe] C:\WINDOWS\sysno.exe
O4 - HKLM\..\RunOnce: [msxd32.exe] C:\WINDOWS\msxd32.exe
O4 - HKLM\..\RunOnce: [syswk.exe] C:\WINDOWS\system32\syswk.exe
O4 - HKLM\..\RunOnce: [d3ho.exe] C:\WINDOWS\system32\d3ho.exe
O4 - HKLM\..\RunOnce: [netyq32.exe] C:\WINDOWS\netyq32.exe
O4 - HKLM\..\RunOnce: [apisw32.exe] C:\WINDOWS\system32\apisw32.exe
O4 - HKLM\..\RunOnce: [mshl32.exe] C:\WINDOWS\system32\mshl32.exe
O4 - HKLM\..\RunOnce: [mfcqc.exe] C:\WINDOWS\mfcqc.exe
O4 - HKLM\..\RunOnce: [addmv.exe] C:\WINDOWS\addmv.exe
O4 - HKLM\..\RunOnce: [sdkcx.exe] C:\WINDOWS\sdkcx.exe
O4 - HKLM\..\RunOnce: [crjw.exe] C:\WINDOWS\system32\crjw.exe
O4 - HKLM\..\RunOnce: [sdkoc32.exe] C:\WINDOWS\system32\sdkoc32.exe
O4 - HKLM\..\RunOnce: [appxe32.exe] C:\WINDOWS\system32\appxe32.exe
O4 - HKLM\..\RunOnce: [sdkfn32.exe] C:\WINDOWS\system32\sdkfn32.exe
O4 - HKLM\..\RunOnce: [appoq32.exe] C:\WINDOWS\appoq32.exe
O4 - HKLM\..\RunOnce: [iedc.exe] C:\WINDOWS\system32\iedc.exe
O4 - HKLM\..\RunOnce: [mfcft.exe] C:\WINDOWS\mfcft.exe
O4 - HKLM\..\RunOnce: [appsw.exe] C:\WINDOWS\system32\appsw.exe
O4 - HKLM\..\RunOnce: [ipnj32.exe] C:\WINDOWS\ipnj32.exe
O4 - HKLM\..\RunOnce: [sdkbb.exe] C:\WINDOWS\sdkbb.exe
O4 - HKLM\..\RunOnce: [mfcgp.exe] C:\WINDOWS\system32\mfcgp.exe
O4 - HKLM\..\RunOnce: [netgd32.exe] C:\WINDOWS\netgd32.exe
O4 - HKLM\..\RunOnce: [appzj.exe] C:\WINDOWS\appzj.exe
O4 - HKLM\..\RunOnce: [addvm.exe] C:\WINDOWS\addvm.exe
O4 - HKLM\..\RunOnce: [mssp32.exe] C:\WINDOWS\system32\mssp32.exe
O4 - HKLM\..\RunOnce: [winik.exe] C:\WINDOWS\system32\winik.exe
O4 - HKLM\..\RunOnce: [sysio.exe] C:\WINDOWS\sysio.exe
O4 - HKLM\..\RunOnce: [netns32.exe] C:\WINDOWS\netns32.exe
O4 - HKLM\..\RunOnce: [appec.exe] C:\WINDOWS\appec.exe
O4 - HKLM\..\RunOnce: [addoy32.exe] C:\WINDOWS\system32\addoy32.exe
O4 - HKLM\..\RunOnce: [winvj32.exe] C:\WINDOWS\winvj32.exe
O4 - HKLM\..\RunOnce: [apifx.exe] C:\WINDOWS\apifx.exe
O4 - HKLM\..\RunOnce: [atlqt.exe] C:\WINDOWS\system32\atlqt.exe
O4 - HKLM\..\RunOnce: [winaw.exe] C:\WINDOWS\winaw.exe
O4 - HKLM\..\RunOnce: [syseo.exe] C:\WINDOWS\syseo.exe
O4 - HKLM\..\RunOnce: [ienw32.exe] C:\WINDOWS\ienw32.exe
O4 - HKLM\..\RunOnce: [addcn32.exe] C:\WINDOWS\addcn32.exe
O4 - HKLM\..\RunOnce: [netny32.exe] C:\WINDOWS\netny32.exe
O4 - HKLM\..\RunOnce: [sdkoq.exe] C:\WINDOWS\sdkoq.exe
O4 - HKLM\..\RunOnce: [d3mp.exe] C:\WINDOWS\system32\d3mp.exe
O4 - HKLM\..\RunOnce: [javazf.exe] C:\WINDOWS\system32\javazf.exe
O4 - HKLM\..\RunOnce: [mfczb32.exe] C:\WINDOWS\mfczb32.exe
O4 - HKLM\..\RunOnce: [mfcgj32.exe] C:\WINDOWS\mfcgj32.exe
O4 - HKLM\..\RunOnce: [javank.exe] C:\WINDOWS\javank.exe
O4 - HKLM\..\RunOnce: [ipum.exe] C:\WINDOWS\ipum.exe
O4 - HKLM\..\RunOnce: [appad32.exe] C:\WINDOWS\appad32.exe
O4 - HKLM\..\RunOnce: [ieue.exe] C:\WINDOWS\system32\ieue.exe
O4 - HKLM\..\RunOnce: [javawu.exe] C:\WINDOWS\javawu.exe
O4 - HKLM\..\RunOnce: [ieme.exe] C:\WINDOWS\ieme.exe
O4 - HKLM\..\RunOnce: [mfcsg32.exe] C:\WINDOWS\mfcsg32.exe
O4 - HKLM\..\RunOnce: [javahf.exe] C:\WINDOWS\javahf.exe
O4 - HKLM\..\RunOnce: [appeh32.exe] C:\WINDOWS\system32\appeh32.exe
O4 - HKLM\..\RunOnce: [netqm32.exe] C:\WINDOWS\system32\netqm32.exe
O4 - HKLM\..\RunOnce: [mfcws.exe] C:\WINDOWS\mfcws.exe
O4 - HKLM\..\RunOnce: [addtu.exe] C:\WINDOWS\system32\addtu.exe
O4 - HKLM\..\RunOnce: [crzq.exe] C:\WINDOWS\system32\crzq.exe
O4 - HKLM\..\RunOnce: [javavk.exe] C:\WINDOWS\javavk.exe
O4 - HKLM\..\RunOnce: [ntqj32.exe] C:\WINDOWS\system32\ntqj32.exe
O4 - HKLM\..\RunOnce: [d3ig32.exe] C:\WINDOWS\d3ig32.exe
O4 - HKLM\..\RunOnce: [d3nz.exe] C:\WINDOWS\system32\d3nz.exe
O4 - HKLM\..\RunOnce: [mfced.exe] C:\WINDOWS\mfced.exe
O4 - HKLM\..\RunOnce: [crkd32.exe] C:\WINDOWS\system32\crkd32.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O4 - Global Startup: winlogin.exe
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - http://www.2nd-thoug.../install026.exe
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {886DDE35-E955-11D0-A707-000000521958} - http://69.56.176.78/webplugin.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-downlo...tsInstaller.cab

#6 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 02 August 2004 - 03:23 PM

The Peper infection still is present.
Click on the PeperFix.exe to launch it.

Click the Find and Fix button.

It will scan the %Systemroot% folder and locate all the peper files. You will be prompted to reboot. Reboot and it will delete the peper files.
Ensure that you are online before starting the fix. Make sure to run the fix twice.
We need to remove a program called "Twain-Tec". To do this, first you need to disable System restore as per the instructions at here . Twiantec.dll is a transponder. HijackThis will detect it as a BHO but it must not be removed using HijackThis. This is because of the remaining registry entries and files which can be dangerous. Instead the following method of removal is preferable and complete:
Go to "Add/Remove Programs" => Uninstall "Twain-Tech". Reboot the computer to SAFE mode - How do I boot into "Safe" mode?. Delete twaintech.dll and twaintec.ini If twaintech.dll is in use, then you would need to rename it, reboot the computer, and then delete it.

Now please download About:Buster and unzip it to your desktop. Don´t run it yet.

How to use Ad-Aware to remove Spyware <= Please check this link for instructions on how to download, install and then use adaware. Don´t use it yet.
1 You already have Adaware installed. Make sure it's up to date. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # : 01R333 18.07.2004 or higher listed.

2 Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.

3. Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok
Scroll down and find the service called "Network Security Service". When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. This service is installed by the malware. If this service is not listed go ahead with the next step.

4. Reboot to Safe Mode
How to start the computer in
Safe mode


5. Make sure your PC is configured to show hidden files

Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked.
Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"
Click "Apply" then "OK"

6.CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\System32\SearchBar.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://websearch.drs...esearch.cgi?id=
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINDOWS\secure.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system32\grdwx.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = websearch.drsnsrch.com/q.cgi?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINDOWS\secure.html
O2 - BHO: (no name) - {000020DD-C72E-4113-AF77-DD56626C6C42} - C:\WINDOWS\twaintec.dll
O2 - BHO: (no name) - {138A5205-A268-89B1-3BFB-4A72B4DB2878} - C:\WINDOWS\crxl32.dll
O4 - HKLM\..\Run: [muxfcfotydqdo] C:\WINDOWS\System32\zarmjf.exe
O4 - HKLM\..\Run: [ntfu.exe] C:\WINDOWS\system32\ntfu.exe
O4 - HKLM\..\Run: [23v] C:\documents and settings\beasleys\local settings\temp\23v.exe
O4 - HKLM\..\Run: [D3ADgokQZ] C:\documents and settings\beasleys\local settings\temp\D3ADgokQZ.exe
O4 - HKLM\..\Run: [Explorer] C:\WINDOWS\system32\explorer.exe
O4 - HKLM\..\Run: [System Service] C:\WINDOWS\System32\msrexe.exe
O4 - HKLM\..\Run: [Bakra] C:\WINDOWS\System32\IEHost.exe
O4 - HKLM\..\Run: [{2CF0B992-5EEB-4143-99C0-5297EF71F444}] rundll32.exe C:\WINDOWS\System32\stlbdist.DLL,DllRunMain
O4 - HKLM\..\Run: [WhenUSave] "C:\Program Files\Save\Save.exe"
O4 - HKLM\..\Run: [3F@T@TZ4A44H6B] C:\WINDOWS\System32\TksAtZ.exe
O4 - HKLM\..\Run: [AutoUpdater] "C:\Program Files\AutoUpdate\AutoUpdate.exe"
O4 - HKLM\..\Run: [Pcsv] C:\WINDOWS\system32\pcs\pcsvc.exe
O4 - HKLM\..\Run: [Dpi] C:\Program Files\Common Files\Dpi\dpi.exe
O4 - HKLM\..\Run: [zT8] C:\documents and settings\beasleys\local settings\temp\zT8.exe
O4 - HKLM\..\Run: [qs9S37R] ntptmgr.exe
O4 - HKCU\..\Run: [Urcc] C:\Documents and Settings\Beasleys\Application Data\saas.exe
O4 - HKCU\..\Run: [Eipfq] C:\WINDOWS\System32\admvol.exe
O4 - HKCU\..\Run: [bBq2RXd7S] oakmlby.exe
O4 - HKLM\..\RunOnce: [sysno.exe] C:\WINDOWS\sysno.exe
O4 - HKLM\..\RunOnce: [msxd32.exe] C:\WINDOWS\msxd32.exe
O4 - HKLM\..\RunOnce: [syswk.exe] C:\WINDOWS\system32\syswk.exe
O4 - HKLM\..\RunOnce: [d3ho.exe] C:\WINDOWS\system32\d3ho.exe
O4 - HKLM\..\RunOnce: [netyq32.exe] C:\WINDOWS\netyq32.exe
O4 - HKLM\..\RunOnce: [apisw32.exe] C:\WINDOWS\system32\apisw32.exe
O4 - HKLM\..\RunOnce: [mshl32.exe] C:\WINDOWS\system32\mshl32.exe
O4 - HKLM\..\RunOnce: [mfcqc.exe] C:\WINDOWS\mfcqc.exe
O4 - HKLM\..\RunOnce: [addmv.exe] C:\WINDOWS\addmv.exe
O4 - HKLM\..\RunOnce: [sdkcx.exe] C:\WINDOWS\sdkcx.exe
O4 - HKLM\..\RunOnce: [crjw.exe] C:\WINDOWS\system32\crjw.exe
O4 - HKLM\..\RunOnce: [sdkoc32.exe] C:\WINDOWS\system32\sdkoc32.exe
O4 - HKLM\..\RunOnce: [appxe32.exe] C:\WINDOWS\system32\appxe32.exe
O4 - HKLM\..\RunOnce: [sdkfn32.exe] C:\WINDOWS\system32\sdkfn32.exe
O4 - HKLM\..\RunOnce: [appoq32.exe] C:\WINDOWS\appoq32.exe
O4 - HKLM\..\RunOnce: [iedc.exe] C:\WINDOWS\system32\iedc.exe
O4 - HKLM\..\RunOnce: [mfcft.exe] C:\WINDOWS\mfcft.exe
O4 - HKLM\..\RunOnce: [appsw.exe] C:\WINDOWS\system32\appsw.exe
O4 - HKLM\..\RunOnce: [ipnj32.exe] C:\WINDOWS\ipnj32.exe
O4 - HKLM\..\RunOnce: [sdkbb.exe] C:\WINDOWS\sdkbb.exe
O4 - HKLM\..\RunOnce: [mfcgp.exe] C:\WINDOWS\system32\mfcgp.exe
O4 - HKLM\..\RunOnce: [netgd32.exe] C:\WINDOWS\netgd32.exe
O4 - HKLM\..\RunOnce: [appzj.exe] C:\WINDOWS\appzj.exe
O4 - HKLM\..\RunOnce: [addvm.exe] C:\WINDOWS\addvm.exe
O4 - HKLM\..\RunOnce: [mssp32.exe] C:\WINDOWS\system32\mssp32.exe
O4 - HKLM\..\RunOnce: [winik.exe] C:\WINDOWS\system32\winik.exe
O4 - HKLM\..\RunOnce: [sysio.exe] C:\WINDOWS\sysio.exe
O4 - HKLM\..\RunOnce: [netns32.exe] C:\WINDOWS\netns32.exe
O4 - HKLM\..\RunOnce: [appec.exe] C:\WINDOWS\appec.exe
O4 - HKLM\..\RunOnce: [addoy32.exe] C:\WINDOWS\system32\addoy32.exe
O4 - HKLM\..\RunOnce: [winvj32.exe] C:\WINDOWS\winvj32.exe
O4 - HKLM\..\RunOnce: [apifx.exe] C:\WINDOWS\apifx.exe
O4 - HKLM\..\RunOnce: [atlqt.exe] C:\WINDOWS\system32\atlqt.exe
O4 - HKLM\..\RunOnce: [winaw.exe] C:\WINDOWS\winaw.exe
O4 - HKLM\..\RunOnce: [syseo.exe] C:\WINDOWS\syseo.exe
O4 - HKLM\..\RunOnce: [ienw32.exe] C:\WINDOWS\ienw32.exe
O4 - HKLM\..\RunOnce: [addcn32.exe] C:\WINDOWS\addcn32.exe
O4 - HKLM\..\RunOnce: [netny32.exe] C:\WINDOWS\netny32.exe
O4 - HKLM\..\RunOnce: [sdkoq.exe] C:\WINDOWS\sdkoq.exe
O4 - HKLM\..\RunOnce: [d3mp.exe] C:\WINDOWS\system32\d3mp.exe
O4 - HKLM\..\RunOnce: [javazf.exe] C:\WINDOWS\system32\javazf.exe
O4 - HKLM\..\RunOnce: [mfczb32.exe] C:\WINDOWS\mfczb32.exe
O4 - HKLM\..\RunOnce: [mfcgj32.exe] C:\WINDOWS\mfcgj32.exe
O4 - HKLM\..\RunOnce: [javank.exe] C:\WINDOWS\javank.exe
O4 - HKLM\..\RunOnce: [ipum.exe] C:\WINDOWS\ipum.exe
O4 - HKLM\..\RunOnce: [appad32.exe] C:\WINDOWS\appad32.exe
O4 - HKLM\..\RunOnce: [ieue.exe] C:\WINDOWS\system32\ieue.exe
O4 - HKLM\..\RunOnce: [javawu.exe] C:\WINDOWS\javawu.exe
O4 - HKLM\..\RunOnce: [ieme.exe] C:\WINDOWS\ieme.exe
O4 - HKLM\..\RunOnce: [mfcsg32.exe] C:\WINDOWS\mfcsg32.exe
O4 - HKLM\..\RunOnce: [javahf.exe] C:\WINDOWS\javahf.exe
O4 - HKLM\..\RunOnce: [appeh32.exe] C:\WINDOWS\system32\appeh32.exe
O4 - HKLM\..\RunOnce: [netqm32.exe] C:\WINDOWS\system32\netqm32.exe
O4 - HKLM\..\RunOnce: [mfcws.exe] C:\WINDOWS\mfcws.exe
O4 - HKLM\..\RunOnce: [addtu.exe] C:\WINDOWS\system32\addtu.exe
O4 - HKLM\..\RunOnce: [crzq.exe] C:\WINDOWS\system32\crzq.exe
O4 - HKLM\..\RunOnce: [javavk.exe] C:\WINDOWS\javavk.exe
O4 - HKLM\..\RunOnce: [ntqj32.exe] C:\WINDOWS\system32\ntqj32.exe
O4 - HKLM\..\RunOnce: [d3ig32.exe] C:\WINDOWS\d3ig32.exe
O4 - HKLM\..\RunOnce: [d3nz.exe] C:\WINDOWS\system32\d3nz.exe
O4 - HKLM\..\RunOnce: [mfced.exe] C:\WINDOWS\mfced.exe
O4 - HKLM\..\RunOnce: [crkd32.exe] C:\WINDOWS\system32\crkd32.exe
O4 - Global Startup: winlogin.exe


Go to Add/Remove Programs in the Control Panel and uninstall:
Twain Tech
Save or WhenUsave
if present.


7. Delete the following files and folders if present.
C:\WINDOWS\secure.html
C:\WINDOWS\twaintec.dll
C:\WINDOWS\crxl32.dll
C:\WINDOWS\system32\SearchBar.htm
C:\WINDOWS\system32\grdwx.dll
C:\WINDOWS\system32\zarmjf.exe
C:\WINDOWS\system32\ntfu.exe
C:\WINDOWS\system32\explorer.exe
C:\WINDOWS\system32\msrexe.exe
C:\WINDOWS\system32\IEHost.exe
C:\WINDOWS\system32\stlbdist.DLL
C:\WINDOWS\system32\TksAtZ.exe
C:\WINDOWS\system32\ntptmgr.exe
C:\WINDOWS\system32\oakmlby.exe

Find (f3) and delete:
winlogin.exe

And delete all the files related to the 04 entries.

Delete the folders:
C:\Program Files\Save
C:\Program Files\AutoUpdate
C:\WINDOWS\system32\pcs
C:\Program Files\Common Files\Dpi

8. Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

9. Scan with Adaware and let it remove any bad files found.

10. Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:


Temporary Files
Temporary Internet Files
Recycle Bin


11. Reboot to normal mode, scan again with Hijack This and post a new log here.

12. Finally, do an online scan HERE. Let it remove any infected files found.

Replace Deleted Files
It is also possible that the infection may have deleted up to three files from your system. If these files are present, to be safe I suggest you overwrite them with a new copy.

Go here and download the version of control.exe for your operating system. If you are running Windows 2000, copy it to c:\winnt\system32\. For Windows XP, copy it to c:\windows\system32\.

Download the Hoster from here Press 'Restore Original Hosts' and press 'OK'

Exit Program.

If you have Spybot S&D installed you may also need to replace one file.
Go here and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended.
Go to Internet Options/Security/Internet, press 'default level', then OK.
Now press "Custom Level."
In the ActiveX section, set the first option, 'Download signed controls', to 'Prompt; set the
second option, 'Download unsigned controls', to 'Disable'; and finally, set 'Initialize and Script ActiveX controls not marked as safe" to 'Disable'.

Post a fresh HijackThis log and the AboutBuster report back here please.

#7 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 02 August 2004 - 10:50 PM

Thank you!!! Here's the new log files:

Logfile of HijackThis v1.97.7
Scan saved at 10:42:33 PM, on 8/2/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\appjb32.exe
C:\WINDOWS\mfckp32.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
C:\Program Files\AIM\aim.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mkecw.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://mkecw.dll/index.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://mkecw.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mkecw.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://mkecw.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\mkecw.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {29292D86-4874-4575-BB37-B5ADBFB2C0AA} - C:\WINDOWS\winvt32.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKLM\..\Run: [b1XGY] C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
O4 - HKLM\..\Run: [mfckp32.exe] C:\WINDOWS\mfckp32.exe
O4 - HKLM\..\RunServices: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKCU\..\RunServices: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKLM\..\RunOnce: [ipbn32.exe] C:\WINDOWS\system32\ipbn32.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - http://www.2nd-thoug.../install026.exe
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O16 - DPF: {886DDE35-E955-11D0-A707-000000521958} - http://69.56.176.78/webplugin.cab


Lavasoft Ad-aware Personal Build 6.181
Logfile created on :Tuesday, August 03, 2004 1:35:29 AM
Created with Ad-aware Personal, free for private use.
Using reference-file :01R334 24.07.2004
______________________________________________________

Ad-aware Settings
=========================
Set : Activate in-depth scan (Recommended)
Set : Safe mode (always request confirmation)
Set : Scan active processes
Set : Scan registry
Set : Deep scan registry


8-3-2004 1:35:29 AM - Scan started. (Smart mode)

Listing running processes
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

#:1 [smss.exe]
FilePath : \SystemRoot\System32\
ThreadCreationTime : 8-3-2004 6:14:10 AM
BasePriority : Normal


#:2 [winlogon.exe]
FilePath : \??\C:\WINDOWS\system32\
ThreadCreationTime : 8-3-2004 6:14:12 AM
BasePriority : High


#:3 [services.exe]
FilePath : C:\WINDOWS\system32\
ThreadCreationTime : 8-3-2004 6:14:12 AM
BasePriority : Normal
FileSize : 99 KB
FileVersion : 5.1.2600.0 (xpclient.010817-1148)
ProductVersion : 5.1.2600.0
CompanyName : Microsoft Corporation
FileDescription : Services and Controller app
InternalName : services.exe
OriginalFilename : services.exe
ProductName : Microsoft
Created on : 9/3/2002 4:59:11 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 4:59:11 PM

#:4 [lsass.exe]
FilePath : C:\WINDOWS\system32\
ThreadCreationTime : 8-3-2004 6:14:12 AM
BasePriority : Normal
FileSize : 11 KB
FileVersion : 5.1.2600.1106 (xpsp1.020828-1920)
ProductVersion : 5.1.2600.1106
CompanyName : Microsoft Corporation
FileDescription : LSA Shell (Export Version)
InternalName : lsass.exe
OriginalFilename : lsass.exe
ProductName : Microsoft
Created on : 9/3/2002 4:39:51 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 4:39:51 PM

#:5 [svchost.exe]
FilePath : C:\WINDOWS\system32\
ThreadCreationTime : 8-3-2004 6:14:13 AM
BasePriority : Normal
FileSize : 12 KB
FileVersion : 5.1.2600.0 (xpclient.010817-1148)
ProductVersion : 5.1.2600.0
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
OriginalFilename : svchost.exe
ProductName : Microsoft
Created on : 9/3/2002 5:05:32 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 5:05:32 PM

#:6 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ThreadCreationTime : 8-3-2004 6:14:13 AM
BasePriority : Normal
FileSize : 12 KB
FileVersion : 5.1.2600.0 (xpclient.010817-1148)
ProductVersion : 5.1.2600.0
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
OriginalFilename : svchost.exe
ProductName : Microsoft
Created on : 9/3/2002 5:05:32 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 5:05:32 PM

#:7 [spoolsv.exe]
FilePath : C:\WINDOWS\system32\
ThreadCreationTime : 8-3-2004 6:14:14 AM
BasePriority : Normal
FileSize : 50 KB
FileVersion : 5.1.2600.0 (XPClient.010817-1148)
ProductVersion : 5.1.2600.0
CompanyName : Microsoft Corporation
FileDescription : Spooler SubSystem App
InternalName : spoolsv.exe
OriginalFilename : spoolsv.exe
ProductName : Microsoft
Created on : 9/3/2002 5:04:18 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 5:04:18 PM

#:8 [nprotect.exe]
FilePath : C:\Program Files\Norton SystemWorks\Norton Utilities\
ThreadCreationTime : 8-3-2004 6:14:23 AM
BasePriority : Normal
FileSize : 132 KB
FileVersion : 16.00.0.22
ProductVersion : 16.00.0.22
Copyright : Copyright © 2003 Symantec Corporation
CompanyName : Symantec Corporation
FileDescription : Norton Protection Status
InternalName : NPROTECT
OriginalFilename : NPROTECT.EXE
ProductName : Norton Utilities
Created on : 10/12/2003 2:37:41 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 8/14/2002 1:03:00 PM

#:9 [nopdb.exe]
FilePath : C:\PROGRA~1\NORTON~1\SPEEDD~1\
ThreadCreationTime : 8-3-2004 6:14:23 AM
BasePriority : Normal
FileSize : 168 KB
FileVersion : 7.00.0.24
ProductVersion : 7.00.0.24
Copyright : Copyright © 2002
CompanyName : Symantec Corporation
FileDescription : NOPDB
InternalName : NOPDB
OriginalFilename : NOPDB.dll
ProductName : Norton Speed Disk
Created on : 10/12/2003 2:38:55 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 8/14/2002 1:00:00 PM

#:10 [svchost.exe]
FilePath : C:\WINDOWS\System32\
ThreadCreationTime : 8-3-2004 6:14:23 AM
BasePriority : Normal
FileSize : 12 KB
FileVersion : 5.1.2600.0 (xpclient.010817-1148)
ProductVersion : 5.1.2600.0
CompanyName : Microsoft Corporation
FileDescription : Generic Host Process for Win32 Services
InternalName : svchost.exe
OriginalFilename : svchost.exe
ProductName : Microsoft
Created on : 9/3/2002 5:05:32 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 5:05:32 PM

#:11 [appjb32.exe]
FilePath : C:\WINDOWS\
ThreadCreationTime : 8-3-2004 6:14:23 AM
BasePriority : Normal
FileSize : 9 KB
Created on : 8/1/2004 11:45:20 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 8/1/2004 11:45:20 AM

#:12 [explorer.exe]
FilePath : C:\WINDOWS\
ThreadCreationTime : 8-3-2004 6:14:56 AM
BasePriority : Normal
FileSize : 980 KB
FileVersion : 6.00.2800.1106 (xpsp1.020828-1920)
ProductVersion : 6.00.2800.1106
CompanyName : Microsoft Corporation
FileDescription : Windows Explorer
InternalName : explorer
OriginalFilename : EXPLORER.EXE
ProductName : Microsoft
Created on : 9/3/2002 4:32:50 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/3/2002 4:32:50 PM

#:13 [javaht.exe]
FilePath : C:\WINDOWS\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 26 KB
Created on : 4/17/2004 6:29:25 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 4/17/2004 6:29:25 AM

#:14 [support.exe]
FilePath : C:\Program Files\Common Files\Dell\EUSW\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 288 KB
FileVersion : 2, 0, 0, 34
ProductVersion : 1, 0, 0, 1
Copyright : Copyright
CompanyName : Dell
FileDescription : Support
InternalName : Support
OriginalFilename : Support.exe
ProductName : Dell Support
Created on : 6/24/2003 3:46:30 PM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 9/19/2003 10:46:26 PM

#:15 [realsched.exe]
FilePath : C:\Program Files\Common Files\Real\Update_OB\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 148 KB
FileVersion : 0.1.0.1622
ProductVersion : 0.1.0.1622
Copyright : Copyright
CompanyName : RealNetworks, Inc.
FileDescription : RealNetworks Scheduler
InternalName : schedapp
OriginalFilename : realsched.exe
ProductName : RealOne Player (32-bit)
Created on : 10/1/2003 3:45:54 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 10/1/2003 3:45:54 AM

#:16 [jusched.exe]
FilePath : C:\Program Files\Java\j2re1.4.2_04\bin\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 32 KB
Created on : 2/23/2068 6:44:46 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 2/23/2004 6:44:44 AM

#:17 [bcmsmmsg.exe]
FilePath : C:\WINDOWS\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 120 KB
FileVersion : 3.5.25 08/27/2003 20:04:35
ProductVersion : 3.5.25 08/27/2003 20:04:35
Copyright : Copyright
CompanyName : Broadcom Corporation
FileDescription : Modem Messaging Applet
InternalName : smdmstat.exe
OriginalFilename : smdmstat.exe
ProductName : BCM Modem Messaging Applet
Created on : 8/29/2003 11:59:24 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 8/29/2003 11:59:24 AM

#:18 [qttask.exe]
FilePath : C:\Program Files\QuickTime\
ThreadCreationTime : 8-3-2004 6:15:00 AM
BasePriority : Normal
FileSize : 76 KB
FileVersion : 6.4
ProductVersion : QuickTime 6.4
CompanyName : Apple Computer, Inc.
InternalName : QuickTime Task
OriginalFilename : QTTask.exe
ProductName : QuickTime
Created on : 11/8/2003 6:53:51 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 11/8/2003 6:53:51 AM

#:19 [b1xgy.exe]
FilePath : C:\documents and settings\beasleys\local settings\temp\
ThreadCreationTime : 8-3-2004 6:15:01 AM
BasePriority : Normal
FileSize : 112 KB
Created on : 8/2/2004 7:42:42 AM
Last accessed : 8/3/2004 8:35:29 AM
Last modified : 8/2/2004 7:42:42 AM

#:20 [ares.exe]
FilePath : C:\Program Files\Ares\
ThreadCreationTime : 8-3-2004 6:15:01 AM
BasePriority : Normal
FileSize : 792 KB
FileVersion : 1.8.1.2943
ProductVersion : 1.8.1
CompanyName : Ares Development Group
FileDescription : Ares
InternalName : Ares
OriginalFilename : ARES.EXE
ProductName : Ares for windows
Created on : 6/17/2004 5:24:20 PM
Last accessed : 8/3/2004 8:07:30 AM
Last modified : 6/17/2004 5:24:20 PM

#:21 [wuauclt.exe]
FilePath : C:\WINDOWS\System32\
ThreadCreationTime : 8-3-2004 6:15:47 AM
BasePriority : Normal
FileSize : 145 KB
FileVersion : 5.4.3790.20 built by: lab04_n
ProductVersion : 5.4.3790.20
CompanyName : Microsoft Corporation
FileDescription : Windows Update AutoUpdate Client
InternalName : wuauclt.exe
OriginalFilename : wuauclt.exe
ProductName : Microsoft
Created on : 2/1/2004 7:21:43 AM
Last accessed : 8/3/2004 8:35:30 AM
Last modified : 1/31/2004 8:40:14 AM

#:22 [iexplore.exe]
FilePath : C:\Program Files\Internet Explorer\
ThreadCreationTime : 8-3-2004 7:43:06 AM
BasePriority : Normal
FileSize : 89 KB
FileVersion : 6.00.2800.1106 (xpsp1.020828-1920)
ProductVersion : 6.00.2800.1106
CompanyName : Microsoft Corporation
FileDescription : Internet Explorer
InternalName : iexplore
OriginalFilename : IEXPLORE.EXE
ProductName : Microsoft
Created on : 8/29/2002 10:00:00 AM
Last accessed : 8/3/2004 7:43:06 AM
Last modified : 8/29/2002 10:00:00 AM

#:23 [ad-aware.exe]
FilePath : C:\PROGRA~1\Lavasoft\AD-AWA~1\
ThreadCreationTime : 8-3-2004 8:34:39 AM
BasePriority : Normal
FileSize : 668 KB
FileVersion : 6.0.1.181
ProductVersion : 6.0.0.0
Copyright : Copyright
CompanyName : Lavasoft Sweden
FileDescription : Ad-aware 6 core application
InternalName : Ad-aware.exe
OriginalFilename : Ad-aware.exe
ProductName : Lavasoft Ad-aware Plus
Created on : 8/3/2004 12:33:47 AM
Last accessed : 8/3/2004 8:35:06 AM
Last modified : 7/13/2003 4:00:20 AM

Memory scan result :
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ
New objects : 0
Objects found so far: 0


Started registry scan
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

FreeScratchCards Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Code Store Database\Distribution Units\{13197ACE-6851-45C3-A7FF-C281324D5489}


ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{d36f70b1-7df5-4fd4-a765-70ccc8f72cd7}


ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : imitoolbar.popupwindow


ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : imitoolbar.popupwindow.1


ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{57add57b-173e-418a-8f70-17e5c9f2bcc9}


Lycos Sidesearch Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{4e627a1e-bc4b-4faf-8de8-1d9a54d37da3}


MemoryWatcher Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\MemoryWatcher


MemoryWatcher Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MemoryWatcher


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Apropos.Client


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Apropos.Client.1.1


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{A4A58A2C-B039-432B-8BC1-DCA7AC0757DC}


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Apropos


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Envolo


PeopleOnPage Object recognized!
Type : RegKey
Data : e_uninstall.log
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AutoUpdate


StopPop Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{4534CD6B-59D6-43FD-864B-06A0D843444A}


VX2 Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\twaintec


VX2 Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TwaintecDll.TwaintecDllObj.1


VX2 Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : TypeLib\{690BCCB4-6B83-4203-AE77-038C116594EC}


VX2 Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : vx2.vx2obj


WhenU Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\WhenU


WhenU Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WUSE.1


WhenU Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : WUSN.1


Win32.Adverts.TrojanDownloader Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{4A8DADD4-5A25-4d41-8599-CB7458766220}


Win32.Backdoor.Jeem Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SYSTEM\ControlSet001\Services\Swartax


Win32.Backdoor.Jeem Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SYSTEM\CurrentControlSet\Services\Swartax


CoolWebSearch Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
Value : {3F143C3A-1457-6CCA-03A7-7AA23B61E40F}


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : 1c3943


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : 4lkf83


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : vk8593


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : 2340v93


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : 4c34


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : c0948273


Win32.Backdoor.Jeem Object recognized!
Type : RegValue
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Welcome
Value : 398349873


Registry scan result :
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ
New objects : 33
Objects found so far: 33


Started deep registry scan
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ
Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Page.dll/index.html

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "res://sqsjc.dll/index.html#96676"
Rootkey : HKEY_CURRENT_USER
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "res://sqsjc.dll/index.html#96676"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainStart Page.dll/index.html

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "res://sqsjc.dll/index.html#96676"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "res://sqsjc.dll/index.html#96676"

Possible browser hijack attempt : Software\Microsoft\Internet Explorer\MainDefault_Page_URL.dll/index.html

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "res://sqsjc.dll/index.html#96676"
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Internet Explorer\Main
Value : Default_Page_URL
Data : "res://sqsjc.dll/index.html#96676"

Possible browser hijack attempt : .Default\Software\Microsoft\Internet Explorer\MainStart Page.search-space.com

Possible Browser Hijack attempt Object recognized!
Type : RegData
Data : "http://www.search-space.com/"
Rootkey : HKEY_USERS
Object : .Default\Software\Microsoft\Internet Explorer\Main
Value : Start Page
Data : "http://www.search-space.com/"


ClickSpring Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{39DA2444-065F-47CB-B27C-CCB1A39C06B7}


ClickSpring Object recognized!
Type : File
Data : mediat~1.ocx
Object : c:\windows\downlo~1\
FileSize : 124 KB
FileVersion : 1, 0, 0, 1
ProductVersion : 1, 0, 0, 1
Copyright : Copyright © 2003
CompanyName : PowerTeam Corporation
FileDescription : MediaTicketsInstaller ActiveX Control Module
InternalName : MediaTicketsInstaller
OriginalFilename : MediaTicketsInstaller.OCX
ProductName : MediaTicketsInstaller ActiveX Control Module



ClickSpring Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{9EB320CE-BE1D-4304-A081-4B4665414BEF}


ClickSpring Object recognized!
Type : RegKey
Data : c:\windows\downloaded program files\mediaticketsinstaller.ocx
Rootkey : HKEY_CLASSES_ROOT
Object : TYPELIB\{46605C8C-D306-4E2D-B367-9B53690CB867}


ClickSpring Object recognized!
Type : File
Data : mediaticketsinstaller.ocx
Object : c:\windows\downloaded program files\
FileSize : 124 KB
FileVersion : 1, 0, 0, 1
ProductVersion : 1, 0, 0, 1
Copyright : Copyright © 2003
CompanyName : PowerTeam Corporation
FileDescription : MediaTicketsInstaller ActiveX Control Module
InternalName : MediaTicketsInstaller
OriginalFilename : MediaTicketsInstaller.OCX
ProductName : MediaTicketsInstaller ActiveX Control Module
Created on : 7/2/2004 9:11:48 PM
Last accessed : 8/3/2004 8:36:07 AM
Last modified : 7/2/2004 9:11:48 PM



ClickSpring Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : MEDIATICKETSINSTALLER.MediaTicketsInstallerCtrl.1

Trusted zone presumably compromised : blazefind.com

Possible Browser Hijack attempt Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\blazefind.com

Trusted zone presumably compromised : flingstone.com

Possible Browser Hijack attempt Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\flingstone.com

Trusted zone presumably compromised : searchbarcash.com

Possible Browser Hijack attempt Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchbarcash.com

Trusted zone presumably compromised : slotch.com

Possible Browser Hijack attempt Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\slotch.com

Trusted zone presumably compromised : xxxtoolbar.com

Possible Browser Hijack attempt Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\xxxtoolbar.com

Trusted zone presumably compromised : searchbarcash.com

ClickSpring Object recognized!
Type : RegValue
Data : c:\windows\downloaded program files\mediaticketsinstaller.ocx
Rootkey : HKEY_LOCAL_MACHINE
Object : Software\Microsoft\Windows\CurrentVersion\SharedDLLs
Value : C:\WINDOWS\Downloaded Program Files\MediaTicketsInstaller.ocx


Win32.Adverts.TrojanDownloader Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : PROTOCOLS\Handler\icoo


Deep registry scan result :
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ
New objects : 15
Objects found so far: 50


ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

Tracking Cookie Object recognized!
Type : File
Data : beasleys@advertising[2].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 5:50:01 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 6:38:21 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@atdmt[2].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 6:54:16 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 6:54:16 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@doubleclick[1].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 6:55:05 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 6:57:01 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@edge.ru4[2].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 5:51:02 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 5:51:02 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@fastclick[2].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 7:30:57 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 7:30:57 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@mediaplex[1].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 5:49:37 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 5:49:37 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@questionmarket[1].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 7:12:24 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 7:19:53 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@servedby.advertising[1].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 5:50:01 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 6:38:20 AM



Tracking Cookie Object recognized!
Type : File
Data : beasleys@tribalfusion[1].txt
Object : C:\Documents and Settings\Beasleys\Cookies\

Created on : 8/3/2004 7:31:00 AM
Last accessed : 8/3/2004 8:37:52 AM
Last modified : 8/3/2004 7:31:00 AM


ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ


Deep scanning and examining files (C:)
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

VX2 Object recognized!
Type : File
Data : bih.exe
Object : C:\WINDOWS\System32\
FileSize : 132 KB
Created on : 3/29/2004 5:59:01 PM
Last accessed : 8/3/2004 8:37:55 AM
Last modified : 3/29/2004 5:59:01 PM



AdRotator Object recognized!
Type : File
Data : cdsm32.dll
Object : C:\WINDOWS\System32\
FileSize : 32 KB
FileVersion : 2, 0, 0, 8
ProductVersion : 2, 0, 0, 8
Copyright : Copyright 2004
OriginalFilename : cdsm32.dll
Created on : 6/6/2004 7:58:24 PM
Last accessed : 8/3/2004 8:37:57 AM
Last modified : 6/6/2004 2:26:26 AM



PeopleOnPage Object recognized!
Type : File
Data : icmrtosa.exe
Object : C:\WINDOWS\System32\
FileSize : 104 KB
Created on : 7/21/2004 3:44:45 AM
Last accessed : 8/3/2004 8:38:09 AM
Last modified : 7/21/2004 3:44:00 AM



PeopleOnPage Object recognized!
Type : File
Data : icwonf.exe
Object : C:\WINDOWS\System32\
FileSize : 84 KB
Created on : 7/21/2004 3:44:46 AM
Last accessed : 8/3/2004 8:38:09 AM
Last modified : 7/21/2004 3:44:00 AM



Win32.Delf.Trojan.A Object recognized!
Type : File
Data : regsvrac32.exe
Object : C:\WINDOWS\System32\
FileSize : 123 KB
Created on : 5/28/2004 5:17:16 AM
Last accessed : 8/3/2004 8:38:32 AM
Last modified : 6/6/2004 3:45:23 AM



CoolWebSearch Object recognized!
Type : File
Data : terrabyte.exe
Object : C:\WINDOWS\System32\
FileSize : 124 KB
FileVersion : 2.00.0011
ProductVersion : 2.00.0011
InternalName : terrabyte
OriginalFilename : terrabyte.exe
ProductName : terrabyte
Created on : 4/20/2004 12:51:30 PM
Last accessed : 8/3/2004 8:38:39 AM
Last modified : 4/20/2004 12:51:30 PM



Veevo Object recognized!
Type : File
Data : veevo.dll
Object : C:\WINDOWS\System32\
FileSize : 164 KB
FileVersion : 1.0.0.5
ProductVersion : 1.0.0.5
Copyright : © 2003 Veevo Corporation. All rights reserved.
CompanyName : Veevo Corporation
FileDescription : Veevo Common Library
InternalName : Veevo.dll
OriginalFilename : Veevo.dll
ProductName : Veevo
Created on : 11/19/2003 5:37:06 PM
Last accessed : 8/3/2004 8:38:42 AM
Last modified : 11/19/2003 5:37:06 PM




Performing conditional scans..
ŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻŻ

ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{3E589169-86AD-44FE-B426-F0BF105D5582}


ImIServer IEPlugin Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{E4458B4A-6149-4450-84F2-864ADB7E8C52}


ImIServer IEPlugin Object recognized!
Type : File
Data : lu.dat
Object : c:\windows\
FileSize : 3 KB
Created on : 6/15/2004 12:47:53 AM
Last accessed : 8/3/2004 8:38:46 AM
Last modified : 6/15/2004 12:53:05 AM



ImIServer IEPlugin Object recognized!
Type : File
Data : redir.txt
Object : c:\windows\

Created on : 5/28/2004 7:09:17 PM
Last accessed : 8/3/2004 8:38:46 AM
Last modified : 5/28/2004 7:09:17 PM



MemoryWatcher Object recognized!
Type : Folder
Object : c:\program files\MemoryWatcher


MemoryWatcher Object recognized!
Type : File
Data : comctl32.ocx
Object : c:\program files\memorywatcher\
FileSize : 594 KB
FileVersion : 6.00.8105
ProductVersion : 6.00.8105
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : Windows Common Controls ActiveX Control DLL
InternalName : COMCTL
OriginalFilename : COMCTL32.OCX
ProductName : COMCTL
Created on : 8/31/2003 6:04:36 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/31/2003 6:04:36 PM



MemoryWatcher Object recognized!
Type : File
Data : eula.url
Object : c:\program files\memorywatcher\

Created on : 7/14/2004 2:41:58 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/14/2004 2:41:58 AM



MemoryWatcher Object recognized!
Type : File
Data : memorywatcher.exe
Object : c:\program files\memorywatcher\
FileSize : 52 KB
FileVersion : 1.00
ProductVersion : 1.00
Copyright : Memory Watcher 2003
CompanyName : Memory Watcher
FileDescription : Memory Watcher
InternalName : MemoryWatcher
OriginalFilename : MemoryWatcher.exe
ProductName : Memory Watcher
Created on : 10/17/2003 6:17:00 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 10/17/2003 6:17:00 PM



MemoryWatcher Object recognized!
Type : File
Data : trayicon.ocx
Object : c:\program files\memorywatcher\
FileSize : 36 KB
FileVersion : 1.00
ProductVersion : 1.00
CompanyName : Robdogg Inc.
InternalName : TrayIcon
OriginalFilename : TrayIcon.ocx
ProductName : vbRad
Created on : 8/30/2003 10:27:34 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/30/2003 10:27:34 PM



MemoryWatcher Object recognized!
Type : File
Data : uninst.exe
Object : c:\program files\memorywatcher\
FileSize : 83 KB
Created on : 7/14/2004 2:28:03 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/14/2004 2:28:03 AM



PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{A2872B10-39F2-42DF-9335-7DD38CF75255}


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A1558B18-F76C-40FE-B358-9E47449F3CFE}


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A2872B10-39F2-42DF-9335-7DD38CF75255}


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : Interface\{A7D0472E-C1FC-4D8F-ABA1-98A7692561BF}


PeopleOnPage Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_LOCAL_MACHINE
Object : SOFTWARE\AutoLoader


PeopleOnPage Object recognized!
Type : Folder
Object : c:\docume~1\beasleys\locals~1\temp\AutoUpdate0


PeopleOnPage Object recognized!
Type : Folder
Object : c:\docume~1\beasleys\locals~1\temp\~apropos0


PeopleOnPage Object recognized!
Type : Folder
Object : c:\program files\SysAI


PeopleOnPage Object recognized!
Type : File
Data : auto_update_uninstall.exe
Object : c:\windows\system32\
FileSize : 228 KB
Created on : 7/31/2004 3:15:17 AM
Last accessed : 8/3/2004 8:37:54 AM
Last modified : 8/2/2004 11:48:36 PM



PeopleOnPage Object recognized!
Type : File
Data : auto_update_uninstall.log
Object : c:\windows\system32\

Created on : 7/31/2004 3:15:17 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:48:45 PM



PeopleOnPage Object recognized!
Type : File
Data : atla.dll
Object : c:\docume~1\beasleys\locals~1\temp\~apropos0\
FileSize : 72 KB
FileVersion : 3.00.8449
ProductVersion : 6.00.8449
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : ATL Module for Windows (ANSI)
InternalName : ATL
OriginalFilename : ATL.DLL
ProductName : Microsoft ® Visual C++
Created on : 8/2/2004 11:49:25 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : atlw.dll
Object : c:\docume~1\beasleys\locals~1\temp\~apropos0\
FileSize : 73 KB
FileVersion : 3.00.9435
ProductVersion : 6.00.9435
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : ATL Module for Windows NT (Unicode)
InternalName : ATL
OriginalFilename : ATL.DLL
ProductName : Microsoft ® Visual C++
Created on : 8/2/2004 11:49:25 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : setup.inf
Object : c:\docume~1\beasleys\locals~1\temp\~apropos0\
FileSize : 1 KB
Created on : 8/2/2004 11:49:25 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : ace.dll
Object : c:\program files\sysai\
FileSize : 568 KB
FileVersion : 5.1.18
ProductVersion : 5.1.18
FileDescription : ACE
InternalName : ACEDLL
OriginalFilename : ACE.DLL
ProductName : ACE
Created on : 8/2/2004 11:49:29 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : ai_01-08-2004.log
Object : c:\program files\sysai\

Created on : 8/1/2004 11:48:42 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/1/2004 11:48:42 PM



PeopleOnPage Object recognized!
Type : File
Data : ai_02-08-2004.log
Object : c:\program files\sysai\

Created on : 8/2/2004 11:49:31 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:31 PM



PeopleOnPage Object recognized!
Type : File
Data : ai_27-07-2004.log
Object : c:\program files\sysai\

Created on : 7/27/2004 10:21:26 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/27/2004 10:21:26 PM



PeopleOnPage Object recognized!
Type : File
Data : ai_28-07-2004.log
Object : c:\program files\sysai\

Created on : 7/28/2004 10:22:26 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/28/2004 10:22:26 PM



PeopleOnPage Object recognized!
Type : File
Data : ai_29-07-2004.log
Object : c:\program files\sysai\

Created on : 7/30/2004 3:15:28 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/30/2004 3:15:28 AM



PeopleOnPage Object recognized!
Type : File
Data : ai_30-07-2004.log
Object : c:\program files\sysai\

Created on : 7/31/2004 3:15:40 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/31/2004 3:15:40 AM



PeopleOnPage Object recognized!
Type : File
Data : ai_31-07-2004.log
Object : c:\program files\sysai\

Created on : 7/31/2004 5:48:40 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 7/31/2004 5:48:40 PM



PeopleOnPage Object recognized!
Type : File
Data : atl.dll
Object : c:\program files\sysai\
FileSize : 73 KB
FileVersion : 3.00.9435
ProductVersion : 6.00.9435
Copyright : Copyright
CompanyName : Microsoft Corporation
FileDescription : ATL Module for Windows NT (Unicode)
InternalName : ATL
OriginalFilename : ATL.DLL
ProductName : Microsoft ® Visual C++
Created on : 8/2/2004 11:49:30 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : data.bin
Object : c:\program files\sysai\
FileSize : 114 KB
Created on : 8/2/2004 11:49:31 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : libexpat.dll
Object : c:\program files\sysai\
FileSize : 140 KB
Created on : 8/2/2004 11:49:29 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : proxystub.dll
Object : c:\program files\sysai\
FileSize : 28 KB
Created on : 8/2/2004 11:49:29 PM
Last accessed : 8/3/2004 8:36:42 AM
Last modified : 8/2/2004 11:49:24 PM



PeopleOnPage Object recognized!
Type : File
Data : sysai.exe
Object : c:\program files\sysai\
FileSize : 612 KB
FileVersion : 1, 0, 0, 1
ProductVersion : 1, 0, 0, 1
Copyright : Copyright
CompanyName : Apropos Media
FileDescription : Internet Explorer
InternalName : Ads.
OriginalFilename : SysAI.exe
ProductName : Ads
Created on : 8/2/2004 11:49:29 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:24 PM



PeopleOnPage Object recognized!
Type : File
Data : uninstaller.exe
Object : c:\program files\sysai\
FileSize : 136 KB
Created on : 8/2/2004 11:49:30 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : wingenerics.dll
Object : c:\program files\sysai\
FileSize : 568 KB
Created on : 8/2/2004 11:49:30 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:49:25 PM



PeopleOnPage Object recognized!
Type : File
Data : auto_update_install.exe
Object : c:\docume~1\beasleys\locals~1\temp\autoupdate0\
FileSize : 248 KB
Created on : 8/2/2004 11:48:36 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:48:36 PM



PeopleOnPage Object recognized!
Type : File
Data : setup.inf
Object : c:\docume~1\beasleys\locals~1\temp\autoupdate0\
FileSize : 2 KB
Created on : 8/2/2004 11:48:36 PM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 11:48:36 PM



VX2 Object recognized!
Type : File
Data : dummy.htm
Object : c:\docume~1\beasleys\locals~1\temp\

Created on : 5/28/2004 5:07:06 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 5/28/2004 5:07:06 AM



VX2 Object recognized!
Type : File
Data : twtini.cab
Object : c:\docume~1\beasleys\locals~1\temp\
FileSize : 85 KB
Created on : 5/28/2004 5:12:15 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 8/2/2004 8:13:39 AM



VX2 Object recognized!
Type : File
Data : twtini.inf
Object : c:\docume~1\beasleys\locals~1\temp\

Created on : 5/28/2004 5:12:16 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 12/12/2003 3:51:04 PM



VX2 Object recognized!
Type : File
Data : twtini.inf
Object : c:\windows\inf\

Created on : 5/28/2004 5:12:16 AM
Last accessed : 8/3/2004 8:38:47 AM
Last modified : 12/12/2003 3:51:04 PM



Win32.Adverts.TrojanDownloader Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CURRENT_USER
Object : Software\Adverts


Win32.Adverts.TrojanDownloader Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : icoo


CoolWebSearch Object recognized!
Type : RegKey
Data :
Rootkey : HKEY_CLASSES_ROOT
Object : CLSID\{3F143C3A-1457-6CCA-03A7-7AA23B61E40F}\InProcServer32


CoolWebSearch Object recognized!
Type : RegKey
Data

Edited by rallymonkey, 03 August 2004 - 03:45 AM.


#8 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 03 August 2004 - 09:58 AM

Do not reboot

1) Right-click on the taskbar at the bottom of the screen and select "Task Manager".
2) Select the tab marked "Processes".
3) Under the "Image Name" select the process for:
appjb32.exe<click "End Process"
mfckp32.exe<click "End Process"

4) Close Task Manager.

CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mkecw.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://mkecw.dll/index.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://mkecw.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mkecw.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://mkecw.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\mkecw.dll/sp.html#96676
O2 - BHO: (no name) - {29292D86-4874-4575-BB37-B5ADBFB2C0AA} - C:\WINDOWS\winvt32.dll
O4 - HKLM\..\Run: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKLM\..\Run: [b1XGY] C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
O4 - HKLM\..\Run: [mfckp32.exe] C:\WINDOWS\mfckp32.exe
O4 - HKLM\..\RunServices: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKCU\..\RunServices: [exploer.exe] C:\WINDOWS\System32\exploer.exe
O4 - HKLM\..\RunOnce: [ipbn32.exe] C:\WINDOWS\system32\ipbn32.exe
O16 - DPF: {13197ACE-6851-45C3-A7FF-C281324D5489} - http://www.2nd-thoug.../install026.exe
O16 - DPF: {886DDE35-E955-11D0-A707-000000521958} - http://69.56.176.78/webplugin.cab


Delete these files:
C:\WINDOWS\ mkecw.dll
C:\WINDOWS\winvt32.dll
C:\WINDOWS\System32\exploer.exe
C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
C:\WINDOWS\mfckp32.exe
C:\WINDOWS\system32\ipbn32.exe
C:\WINDOWS\appjb32.exe
C:\WINDOWS\mfckp32.exe

Double click AboutBuster.exe. Run the program twice, save both logs.

Scan with Adaware and let it remove any bad files found.
Post a new Hijack This log and the About Buster logs.

#9 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 04 August 2004 - 03:29 AM

Thanks!!! Here you go:

Logfile of HijackThis v1.97.7
Scan saved at 1:27:15 AM, on 8/4/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
C:\WINDOWS\javaht.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\appjb32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\xljsi.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://xljsi.dll/index.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://xljsi.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\xljsi.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://xljsi.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\xljsi.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {84AA3CA6-585D-1802-BCC6-20C398800817} - C:\WINDOWS\system32\ntoa.dll
O2 - BHO: Search Help - {E8EAEB34-F7B5-4C55-87FF-720FAF53D841} - C:\documents and settings\beasleys\local settings\temp\mw0v.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [b1XGY] C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
O4 - HKLM\..\Run: [javaht.exe] C:\WINDOWS\javaht.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKLM\..\RunOnce: [appjb32.exe] C:\WINDOWS\appjb32.exe
O4 - HKLM\..\RunOnce: [ntec.exe] C:\WINDOWS\system32\ntec.exe
O4 - HKLM\..\RunOnce: [apilf.exe] C:\WINDOWS\apilf.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab




-- Scan 1 --------
About:Buster Version 2.0
Deleted Service Key Successfully!
Removed! : C:\WINDOWS\bcgnq.dat
Removed! : C:\WINDOWS\kgtgk.dat
Removed! : C:\WINDOWS\kkuee.dat
Removed! : C:\WINDOWS\sxnpr.dat
Removed! : C:\WINDOWS\vywen.dat
Removed! : C:\WINDOWS\zicpb.dat
Removed! : C:\WINDOWS\System32\apirj.exe
Removed! : C:\WINDOWS\System32\cmafy.dat
Removed! : C:\WINDOWS\System32\gicro.dat
Removed! : C:\WINDOWS\System32\jvbjp.dat
Removed! : C:\WINDOWS\System32\kogdz.dat
Removed! : C:\WINDOWS\System32\mnebr.dat
Removed! : C:\WINDOWS\System32\qcpzu.dat
Removed! : C:\WINDOWS\System32\rfivh.dat
Removed! : C:\WINDOWS\System32\uvlqa.dat
Removed! : C:\WINDOWS\System32\whyww.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

-- Scan 2 --------
About:Buster Version 2.0
Removed! : C:\WINDOWS\zicpb.dat
Removed! : C:\WINDOWS\System32\cmafy.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

Oh, yeah I have 2 minor questions:
1. I have another computer, and I had to reinstall Windows XP on it, and when I try and Activate windows, the product key doesn't work. Do you know what I can do?

2. How do you know all of this stuff?!?! (cause I'm glad you do!)

#10 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 04 August 2004 - 10:06 AM

Do not reboot

1) Right-click on the taskbar at the bottom of the screen and select "Task Manager".
2) Select the tab marked "Processes".
3) Under the "Image Name" select the process for:
appjb32.exe <click "End Process"
javaht.exe <click "End Process"
b1XGY.exe <click "End Process"
4) Close Task Manager.

CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\xljsi.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://xljsi.dll/index.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://xljsi.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\xljsi.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://xljsi.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\xljsi.dll/sp.html#96676
O2 - BHO: (no name) - {84AA3CA6-585D-1802-BCC6-20C398800817} - C:\WINDOWS\system32\ntoa.dll
O2 - BHO: Search Help - {E8EAEB34-F7B5-4C55-87FF-720FAF53D841} - C:\documents and settings\beasleys\local settings\temp\mw0v.dll
O4 - HKLM\..\RunOnce: [appjb32.exe] C:\WINDOWS\appjb32.exe
O4 - HKLM\..\RunOnce: [ntec.exe] C:\WINDOWS\system32\ntec.exe
O4 - HKLM\..\RunOnce: [apilf.exe] C:\WINDOWS\apilf.exe


Delete these files:
C:\WINDOWS\xljsi.dll
C:\WINDOWS\system32\ntoa.dll
C:\WINDOWS\appjb32.exe
C:\WINDOWS\system32\ntec.exe
C:\WINDOWS\apilf.exe
C:\WINDOWS\javaht.exe

Delete the content of this folder Not the folder itself
C:\documents and settings\beasleys\local settings\temp< all the files inside this folder.

Double click AboutBuster.exe. Run the program twice, save both logs.

Scan with Adaware and let it remove any bad files found.
Post a new Hijack This log and the About Buster logs.

Answers.
1 If you´re installing the same windows you have in this computer install a program called AIDA32 (google for it) in this pc and it will give you a lot of info about your computer, and the Windows key too, use that key to install the os in the other pc.
2. We are trained here at SWI.
:cool:

#11 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 07 August 2004 - 02:36 AM

Here's the log:

Logfile of HijackThis v1.97.7
Scan saved at 12:33:29 AM, on 8/7/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\WINDOWS\sysok32.exe
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Beasleys\Desktop\AboutBuster.exe
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {2D75623F-2853-A6AA-2E3A-A24FD907FEC3} - C:\WINDOWS\apiyh.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [b1XGY] C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
O4 - HKLM\..\Run: [javaht.exe] C:\WINDOWS\javaht.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

-- Scan 1 --------
About:Buster Version 2.0
Removed! : C:\WINDOWS\aaeju.dat
Removed! : C:\WINDOWS\acnfq.dat
Removed! : C:\WINDOWS\alcca.dat
Removed! : C:\WINDOWS\bndnh.dat
Removed! : C:\WINDOWS\bnfbu.dat
Removed! : C:\WINDOWS\boobv.dat
Removed! : C:\WINDOWS\brlcv.dat
Removed! : C:\WINDOWS\bssky.dat
Removed! : C:\WINDOWS\cbhxu.dat
Removed! : C:\WINDOWS\chtwb.dat
Removed! : C:\WINDOWS\corir.dat
Removed! : C:\WINDOWS\dpvkg.dat
Removed! : C:\WINDOWS\dwjma.dat
Removed! : C:\WINDOWS\eiaet.dat
Removed! : C:\WINDOWS\faggt.dat
Removed! : C:\WINDOWS\fssbc.dat
Removed! : C:\WINDOWS\gdkyx.dat
Removed! : C:\WINDOWS\hadbg.dat
Removed! : C:\WINDOWS\hgojb.dat
Removed! : C:\WINDOWS\hscbw.dat
Removed! : C:\WINDOWS\iiqlm.dat
Removed! : C:\WINDOWS\ilefa.dat
Removed! : C:\WINDOWS\iyxbi.dat
Removed! : C:\WINDOWS\jcmiy.dat
Removed! : C:\WINDOWS\jlahz.dat
Removed! : C:\WINDOWS\jnast.dat
Removed! : C:\WINDOWS\jpmjb.dat
Removed! : C:\WINDOWS\khwqa.dat
Removed! : C:\WINDOWS\ljyqr.dat
Removed! : C:\WINDOWS\lumkc.dat
Removed! : C:\WINDOWS\mvnzy.dat
Removed! : C:\WINDOWS\mxiqt.dat
Removed! : C:\WINDOWS\npcaz.dat
Removed! : C:\WINDOWS\npnse.dat
Removed! : C:\WINDOWS\orlxv.dat
Removed! : C:\WINDOWS\oztxh.dat
Removed! : C:\WINDOWS\pfosi.dat
Removed! : C:\WINDOWS\pfpsd.dat
Removed! : C:\WINDOWS\pfrkv.dat
Removed! : C:\WINDOWS\puote.dat
Removed! : C:\WINDOWS\rbnrb.dat
Removed! : C:\WINDOWS\rgnbb.dat
Removed! : C:\WINDOWS\spmft.dat
Removed! : C:\WINDOWS\txdgh.dat
Removed! : C:\WINDOWS\uiocu.dat
Removed! : C:\WINDOWS\uvjec.dat
Removed! : C:\WINDOWS\vflwo.dat
Removed! : C:\WINDOWS\vjdrr.dat
Removed! : C:\WINDOWS\vwbmd.dat
Removed! : C:\WINDOWS\vwjbu.dat
Removed! : C:\WINDOWS\wbdav.dat
Removed! : C:\WINDOWS\wkeow.dat
Removed! : C:\WINDOWS\wpogn.dat
Removed! : C:\WINDOWS\wrrmu.dat
Removed! : C:\WINDOWS\xercg.dat
Removed! : C:\WINDOWS\xhuin.dat
Removed! : C:\WINDOWS\zibyb.dat
Removed! : C:\WINDOWS\zicpb.dat
Removed! : C:\WINDOWS\zpiwz.dat
Removed! : C:\WINDOWS\System32\aabgg.dat
Removed! : C:\WINDOWS\System32\aznio.dat
Removed! : C:\WINDOWS\System32\azzlt.dat
Removed! : C:\WINDOWS\System32\bcxej.dat
Removed! : C:\WINDOWS\System32\bflcy.dat
Removed! : C:\WINDOWS\System32\bkkhf.dat
Removed! : C:\WINDOWS\System32\bliwr.dat
Removed! : C:\WINDOWS\System32\btxmm.dat
Removed! : C:\WINDOWS\System32\bvcdm.dat
Removed! : C:\WINDOWS\System32\bwnqt.dat
Removed! : C:\WINDOWS\System32\cglve.dat
Removed! : C:\WINDOWS\System32\cltde.dat
Removed! : C:\WINDOWS\System32\cmafy.dat
Removed! : C:\WINDOWS\System32\cqlap.dat
Removed! : C:\WINDOWS\System32\ctqpn.dat
Removed! : C:\WINDOWS\System32\ctwen.dat
Removed! : C:\WINDOWS\System32\debgp.dat
Removed! : C:\WINDOWS\System32\dgiyd.dat
Removed! : C:\WINDOWS\System32\dmvks.dat
Removed! : C:\WINDOWS\System32\dphfp.dat
Removed! : C:\WINDOWS\System32\dunrf.dat
Removed! : C:\WINDOWS\System32\dwtem.dat
Removed! : C:\WINDOWS\System32\dzhxi.dat
Removed! : C:\WINDOWS\System32\dzmsj.dat
Removed! : C:\WINDOWS\System32\ebfdz.dat
Removed! : C:\WINDOWS\System32\edfzy.dat
Removed! : C:\WINDOWS\System32\eetpi.dat
Removed! : C:\WINDOWS\System32\ehbmq.dat
Removed! : C:\WINDOWS\System32\eratj.dat
Removed! : C:\WINDOWS\System32\etygt.dat
Removed! : C:\WINDOWS\System32\fgqnl.dat
Removed! : C:\WINDOWS\System32\fgrub.dat
Removed! : C:\WINDOWS\System32\fokmi.dat
Removed! : C:\WINDOWS\System32\fwxoi.dat
Removed! : C:\WINDOWS\System32\gruid.dat
Removed! : C:\WINDOWS\System32\gydqv.dat
Removed! : C:\WINDOWS\System32\htqdb.dat
Removed! : C:\WINDOWS\System32\hyzvp.dat
Removed! : C:\WINDOWS\System32\iidhs.dat
Removed! : C:\WINDOWS\System32\imjos.dat
Removed! : C:\WINDOWS\System32\ismbd.dat
Removed! : C:\WINDOWS\System32\iszfo.dat
Removed! : C:\WINDOWS\System32\jeduo.dat
Removed! : C:\WINDOWS\System32\jtptb.dat
Removed! : C:\WINDOWS\System32\labtl.dat
Removed! : C:\WINDOWS\System32\lmuvj.dat
Removed! : C:\WINDOWS\System32\mflaw.dat
Removed! : C:\WINDOWS\System32\ncfrp.dat
Removed! : C:\WINDOWS\System32\nkzbg.dat
Removed! : C:\WINDOWS\System32\ouvwv.dat
Removed! : C:\WINDOWS\System32\pkmpr.dat
Removed! : C:\WINDOWS\System32\pnjqf.dat
Removed! : C:\WINDOWS\System32\qtopw.dat
Removed! : C:\WINDOWS\System32\qvcfo.dat
Removed! : C:\WINDOWS\System32\qwfty.dat
Removed! : C:\WINDOWS\System32\rljcu.dat
Removed! : C:\WINDOWS\System32\suuuu.dat
Removed! : C:\WINDOWS\System32\tddch.dat
Removed! : C:\WINDOWS\System32\tgipd.dat
Removed! : C:\WINDOWS\System32\tlqfz.dat
Removed! : C:\WINDOWS\System32\ublsy.dat
Removed! : C:\WINDOWS\System32\vebqc.dat
Removed! : C:\WINDOWS\System32\vhyno.dat
Removed! : C:\WINDOWS\System32\wbhfp.dat
Removed! : C:\WINDOWS\System32\whyww.dat
Removed! : C:\WINDOWS\System32\wlhyh.dat
Removed! : C:\WINDOWS\System32\wzttf.dat
Removed! : C:\WINDOWS\System32\xapvb.dat
Removed! : C:\WINDOWS\System32\xmbqn.dat
Removed! : C:\WINDOWS\System32\ymysg.dat
Removed! : C:\WINDOWS\System32\yrfwk.dat
Removed! : C:\WINDOWS\System32\ywbrs.dat
Removed! : C:\WINDOWS\System32\zcpsy.dat
Removed! : C:\WINDOWS\System32\zpxqd.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

-- Scan 2 --------
About:Buster Version 2.0
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

#12 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 07 August 2004 - 10:43 AM

:hmmm:
Do not reboot

1) Right-click on the taskbar at the bottom of the screen and select "Task Manager".
2) Select the tab marked "Processes".
3) Under the "Image Name" select the process for:
sysok32.exe<click "End Process"
4) Close Task Manager.

CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\phdxe.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\phdxe.dll/sp.html#96676
O2 - BHO: (no name) - {2D75623F-2853-A6AA-2E3A-A24FD907FEC3} - C:\WINDOWS\apiyh.dll
O4 - HKLM\..\Run: [b1XGY] C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
O4 - HKLM\..\Run: [javaht.exe] C:\WINDOWS\javaht.exe


Dlelte these files:
C:\WINDOWS\phdxe.dll
C:\WINDOWS\apiyh.dll
C:\documents and settings\beasleys\local settings\temp\b1XGY.exe
C:\WINDOWS\javaht.exe
C:\WINDOWS\sysok32.exe

Double click AboutBuster.exe. Run the program twice, save both logs.

Scan with Adaware and let it remove any bad files found.
Post a new Hijack This log and the About Buster logs.

#13 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 07 August 2004 - 12:49 PM

Here you go:

-- Scan 1 --------
About:Buster Version 2.0
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

-- Scan 2 --------
About:Buster Version 2.0
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

Logfile of HijackThis v1.97.7
Scan saved at 10:48:12 AM, on 8/7/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\javaht.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\WINDOWS\sysok32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\ayevp.dll/index.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\ayevp.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://C:\WINDOWS\ayevp.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ayevp.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {D4A99041-BBC8-A963-8327-6E17563E936B} - C:\WINDOWS\system32\atlid32.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [javaht.exe] C:\WINDOWS\javaht.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

For some reason I couldn't delete these files:
C:\WINDOWS\javaht.exe
C:\WINDOWS\sysok32.exe

It kept saying that access was denied.

#14 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 07 August 2004 - 12:58 PM

try right clicking on them and unmarking read only

#15 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 08 August 2004 - 09:20 PM

Wow. that worked! Is there anything else I need to do? Or would it be easier to just get my hard drive erased?

#16 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 09 August 2004 - 03:14 PM

Post a new log please.

#17 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 09 August 2004 - 07:17 PM

Here you go:

Logfile of HijackThis v1.97.7
Scan saved at 5:11:26 PM, on 8/9/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\mfctr.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\javaln.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\All Users\Documents\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,Shellnext = http://www.dellnet.com/
O2 - BHO: (no name) - {E094EFAF-213F-3C45-33AF-72854344A750} - C:\WINDOWS\system32\syshm.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [javaln.exe] C:\WINDOWS\system32\javaln.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - HKLM\..\RunOnce: [mfctr.exe] C:\WINDOWS\mfctr.exe
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
O9 - Extra 'Tools' menuitem: MaxSpeed (HKLM)
O9 - Extra button: AIM (HKLM)
O9 - Extra button: Real.com (HKLM)
O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macr...ector/swdir.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

-- Scan 1 --------
About:Buster Version 2.0
Removed! : C:\WINDOWS\foyiw.dat
Removed! : C:\WINDOWS\javaht.exe
Removed! : C:\WINDOWS\jkzch.dat
Removed! : C:\WINDOWS\srbqo.dat
Removed! : C:\WINDOWS\twqeo.dat
Removed! : C:\WINDOWS\System32\dtfbk.dat
Removed! : C:\WINDOWS\System32\kvexr.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

-- Scan 2 --------
About:Buster Version 2.0
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

So, would it just be easier to get my harddrive and motherboard erased?

#18 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 09 August 2004 - 07:47 PM

Your version of Hijack this is outdated. Please download version 1.98.2 from either of the following links:
LINK 1
or
LINK 2

And post a new log, and be patient, you´re going to make it.

#19 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 09 August 2004 - 11:42 PM

Here you go:
Logfile of HijackThis v1.98.2
Scan saved at 9:41:12 PM, on 8/9/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\mfctr.exe
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\javaln.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Ares\Ares.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Documents and Settings\Beasleys\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
R3 - Default URLSearchHook is missing
O2 - BHO: (no name) - {2CBD849C-6E3B-0F03-E5F3-7BB2616729D8} - C:\WINDOWS\system32\syshm.dll
O2 - BHO: (no name) - {E094EFAF-213F-3C45-33AF-72854344A750} - C:\WINDOWS\system32\syshm.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [javaln.exe] C:\WINDOWS\system32\javaln.exe
O4 - HKLM\..\RunOnce: [mfctr.exe] C:\WINDOWS\mfctr.exe
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)
O9 - Extra button: (no name) - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\System32\ms.exe
O9 - Extra 'Tools' menuitem: MaxSpeed - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\System32\ms.exe
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab
O21 - SSODL: System - {3FA801E8-7214-4F70-84C6-453CD342B82B} - C:\WINDOWS\system32\system32.dll (file missing)

alright, I"ll hang in there...

#20 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 10 August 2004 - 09:43 AM

Let´s repeat the steps of my first reply. But before I have two questions, Do you have a program called SafeGuard Popup blocker installed? And what is this Ares Program that you have installed. Is it a P2P downloader?, Did you install it?

And don´t worry I´ve ALWAYS beaten this infection, so follow my instructions and we´ll gonna make it.

#21 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 10 August 2004 - 06:19 PM

Ok. First question, No. Second one, yes, but I'm getting rid of it today.

#22 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 10 August 2004 - 06:33 PM

Move Hijack This to its own folder.Click My Computer, then C:\
In the menu bar, File->New->Folder.
That will create a folder named New Folder, which you can rename to "HJT" or "HijackThis". Now you have C:\HJT\ folder. Move hijack this there. Hijack this makes backups of everything you fix, these backups are saved in the same folder the program is.



Download the latest release of About:Buster and unzip it to your desktop. Don´t run it yet.

1 You already have Adaware installed. Make sure it's up to date. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # : 01R336 06.08.2004 or higher listed.

2 Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.

3. Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok
Scroll down and find the service called "Network Security Service". When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. This service is installed by the malware. If this service is not listed go ahead with the next step.

4. Reboot to Safe Mode
How to start the computer in Safe mode


5. Make sure your PC is configured to show hidden files

Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked.
Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"
Click "Apply" then "OK"

6.CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://C:\WINDOWS\oyiwv.dll/index.html#96676
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\oyiwv.dll/sp.html#96676
O2 - BHO: (no name) - {2CBD849C-6E3B-0F03-E5F3-7BB2616729D8} - C:\WINDOWS\system32\syshm.dll
O2 - BHO: (no name) - {E094EFAF-213F-3C45-33AF-72854344A750} - C:\WINDOWS\system32\syshm.dll
O4 - HKLM\..\Run: [SafeGuard Popup Blocker Updater (required)] regsvr32 /s C:\WINDOWS\System32\sfg70f6.dll
O4 - HKLM\..\Run: [javaln.exe] C:\WINDOWS\system32\javaln.exe
O4 - HKLM\..\RunOnce: [mfctr.exe] C:\WINDOWS\mfctr.exe
O4 - HKCU\..\Run: [ares] "C:\Program Files\Ares\Ares.exe" -h
O9 - Extra button: (no name) - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\System32\ms.exe
O9 - Extra 'Tools' menuitem: MaxSpeed - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\System32\ms.exe
O21 - SSODL: System - {3FA801E8-7214-4F70-84C6-453CD342B82B} - C:\WINDOWS\system32\system32.dll (file missing)


Go to Add/Remove Programs in the Control Panel and uninstall:
Ares if present.


7. Delete the following files if present.
C:\WINDOWS\oyiwv.dll
C:\WINDOWS\mfctr.exe
C:\WINDOWS\system32\syshm.dll
C:\WINDOWS\system32\sfg70f6.dll
C:\WINDOWS\system32\javaln.exe
C:\WINDOWS\system32\ms.exe



8. Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

9. Scan with Adaware and let it remove any bad files found.

10. Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:


Temporary Files
Temporary Internet Files
Recycle Bin


11. Reboot to normal mode, scan again with Hijack This and post a new log here.

12. Finally, do an online scan HERE. Let it remove any infected files found.

Replace Deleted Files
It is also possible that the infection may have deleted up to three files from your system. If these files are present, to be safe I suggest you overwrite them with a new copy.

Go here and download the version of control.exe for your operating system. If you are running Windows 2000, copy it to c:\winnt\system32\. For Windows XP, copy it to c:\windows\system32\.

Download the Hoster from here Press 'Restore Original Hosts' and press 'OK'
Exit Program.

If you have Spybot S&D installed you may also need to replace one file.
Go here and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended.
Go to Internet Options/Security/Internet, press 'default level', then OK.
Now press "Custom Level."
In the ActiveX section, set the first option, 'Download signed controls', to 'Prompt; set the
second option, 'Download unsigned controls', to 'Disable'; and finally, set 'Initialize and Script ActiveX controls not marked as safe" to 'Disable'.

#23 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 10 August 2004 - 08:44 PM

Here you go:
Logfile of HijackThis v1.98.2
Scan saved at 6:44:06 PM, on 8/10/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Hijack This\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\xjguy.dll/sp.html#37049
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\xjguy.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\xjguy.dll/sp.html#37049
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
R3 - Default URLSearchHook is missing
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

-- Scan 1 --------
About:Buster Version 2.0
Removed! : C:\WINDOWS\viknb.dat
Removed! : C:\WINDOWS\System32\cipfm.dat
Removed! : C:\WINDOWS\System32\pycav.dat
Attempted Clean Of Temp folder.
Removed Uninstall Key (HSA)
Removed Uninstall Key (SE)
Removed Uninstall Key (SW)
Pages Reset... Done!

-- Scan 2 --------
About:Buster Version 2.0
Attempted Clean Of Temp folder.
Pages Reset... Done!

#24 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 11 August 2004 - 07:42 AM

Almost clean.
CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\xjguy.dll/sp.html#37049
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\xjguy.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\xjguy.dll/sp.html#37049


Delete :
C:\WINDOWS\xjguy.dll

Your version of about buster is out to date, Download the latest release of About:Buster
Double click AboutBuster.exe, save the log.
Scan with Adaware and let it remove any bad files found.
And post a new log.

#25 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 11 August 2004 - 07:45 PM

Here you go:
Logfile of HijackThis v1.98.2
Scan saved at 5:23:20 PM, on 8/11/2004
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Dell\EUSW\Support.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
C:\WINDOWS\BCMSMMSG.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\AIM\aim.exe
C:\Program Files\Dell\Support\Alert\bin\NotifyAlert.exe
C:\Program Files\Norton SystemWorks\Norton Utilities\NPROTECT.EXE
C:\PROGRA~1\NORTON~1\SPEEDD~1\nopdb.exe
C:\WINDOWS\System32\svchost.exe
C:\Hijack This\HijackThis.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.google.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.google.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.google.com
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.com
R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = http://www.dellnet.com/
R3 - Default URLSearchHook is missing
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [DwlClient] C:\Program Files\Common Files\Dell\EUSW\Support.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\j2re1.4.2_04\bin\jusched.exe
O4 - HKLM\..\Run: [BCMSMMSG] BCMSMMSG.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [AIM] C:\Program Files\AIM\aim.exe -cnetwait.odl
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
O4 - Global Startup: Event Reminder.lnk = C:\Program Files\Broderbund\PrintMaster\PMREMIND.EXE
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\System32\Shdocvw.dll
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.syma...bin/AvSniff.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.syma...n/bin/cabsa.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai...all/xscan53.cab

-- Scan 1 ---------------------------
About:Buster Version 3.0
Reference List : 14

No ADS found on system
Removed 2 Random Key Entries
Deleted 1 Service Keys Successfully!
Removed! : C:\WINDOWS\apiau.exe
Removed! : C:\WINDOWS\apiex.exe
Removed! : C:\WINDOWS\apinq32.exe
Removed! : C:\WINDOWS\ayevp.dll
Removed! : C:\WINDOWS\cvdhl.dll
Removed! : C:\WINDOWS\dkmss.dll
Removed! : C:\WINDOWS\ehyyx.dll
Removed! : C:\WINDOWS\faggt.dll
Removed! : C:\WINDOWS\fllbg.dll
Removed! : C:\WINDOWS\foyiw.dat
Removed! : C:\WINDOWS\fuinm.dll
Removed! : C:\WINDOWS\hjiky.dll
Removed! : C:\WINDOWS\jhypt.dll
Removed! : C:\WINDOWS\lgxte.dat
Removed! : C:\WINDOWS\lxofc.dll
Removed! : C:\WINDOWS\mpstr.dll
Removed! : C:\WINDOWS\msgnn.dll
Removed! : C:\WINDOWS\msyd32.exe
Removed! : C:\WINDOWS\nfeol.dll
Removed! : C:\WINDOWS\ntma32.exe
Removed! : C:\WINDOWS\osyoq.dll
Removed! : C:\WINDOWS\pfxpx.dll
Removed! : C:\WINDOWS\qqjko.dll
Removed! : C:\WINDOWS\rizpd.dll
Removed! : C:\WINDOWS\rnwme.dll
Removed! : C:\WINDOWS\shavs.dll
Removed! : C:\WINDOWS\sqsjc.dll
Removed! : C:\WINDOWS\vnjbs.dll
Removed! : C:\WINDOWS\wrvan.dll
Removed! : C:\WINDOWS\wtedd.dll
Removed! : C:\WINDOWS\xdmtr.dll
Removed! : C:\WINDOWS\xfrcc.dll
Removed! : C:\WINDOWS\xiexx.dll
Removed! : C:\WINDOWS\ynplr.dll
Removed! : C:\WINDOWS\yxiry.dll
Removed! : C:\WINDOWS\yzplv.dll
Removed! : C:\WINDOWS\System32\addlw32.exe
Removed! : C:\WINDOWS\System32\aiwid.dll
Removed! : C:\WINDOWS\System32\appbe.exe
Removed! : C:\WINDOWS\System32\blxfh.dll
Removed! : C:\WINDOWS\System32\bmsza.dll
Removed! : C:\WINDOWS\System32\bynjv.dll
Removed! : C:\WINDOWS\System32\cgaay.dll
Removed! : C:\WINDOWS\System32\crvo.exe
Removed! : C:\WINDOWS\System32\cryq.exe
Removed! : C:\WINDOWS\System32\dnalp.dll
Removed! : C:\WINDOWS\System32\epuuk.dll
Removed! : C:\WINDOWS\System32\hmvob.dll
Removed! : C:\WINDOWS\System32\igvuj.dll
Removed! : C:\WINDOWS\System32\ipaz32.exe
Removed! : C:\WINDOWS\System32\javaov32.exe
Removed! : C:\WINDOWS\System32\kqzeq.dll
Removed! : C:\WINDOWS\System32\lmfnv.dll
Removed! : C:\WINDOWS\System32\lnxel.dll
Removed! : C:\WINDOWS\System32\lswfo.dll
Removed! : C:\WINDOWS\System32\mqcvp.dll
Removed! : C:\WINDOWS\System32\nettm.exe
Removed! : C:\WINDOWS\System32\nsexm.dll
Removed! : C:\WINDOWS\System32\ouqtg.dat
Removed! : C:\WINDOWS\System32\qcmuu.dll
Removed! : C:\WINDOWS\System32\syspx.exe
Removed! : C:\WINDOWS\System32\tsxcg.dll
Removed! : C:\WINDOWS\System32\wcjtc.dll
Removed! : C:\WINDOWS\System32\wqjgx.dll
Removed! : C:\WINDOWS\System32\wrhcz.dll
Removed! : C:\WINDOWS\System32\wrlpq.dll
Removed! : C:\WINDOWS\System32\wzjfe.dll
Removed! : C:\WINDOWS\System32\xhtiq.dll
Removed! : C:\WINDOWS\System32\ykmeh.dll
Removed! : C:\WINDOWS\System32\zahtd.dll
Attempted Clean Of Temp folder.
Pages Reset... Done!

-- Scan 2 ---------------------------
About:Buster Version 3.0
Reference List : 14

No ADS found on system
Attempted Clean Of Temp folder.
Pages Reset... Done!

#26 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 12 August 2004 - 10:41 AM

Good job!

You have RealPlayer running at Startup and this is not necessary. You can fix this with HJT, but you will also need to set it not to load in RealPlayer itself to keep it from resetting itself. This is the item to fix in HJT:
O4 - HKLM\..\Run: [TkBellExe] "C:\ProgramFiles\Common Files\Real\Update_OB\realsched.exe" –osboot

Here are some tips, to reduce the potential for spyware infection in the future, I strongly recommend installing the following applications:
  • Spywareblaster <= SpywareBlaster will prevent spyware from being installed.
  • Spywareguard <= SpywareGuard offers realtime protection from spyware installation attempts.
  • How to use Ad-Aware to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Ad-Aware.
  • How to use Spybot to remove Spyware <= If you suspect that you have spyware installed on your computer, here are instructions on how to download, install and then use Spybot. Similar to Ad-Aware, I strongly recommend both to catch most spyware.
To protect yourself further:
  • IE/Spyad <= IE/Spyad places over 4000 websites and domains in the IE Restricted list which will severely impair attempts to infect your system. It basically prevents any downloads (Cookies etc) from the sites listed, although you will still be able to connect to the sites.
  • MVPS Hosts file <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your coputer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
  • Google Toolbar <= Get the free google toolbar to help stop pop up windows.
I also suggest that you delete any files from "temp", "tmp" folders. In Internet Explorer, click on "Tools" => "Internet Options" => "Delete Files" and select the box that says "Delete All Offline Content" and click on "OK" twice. Also, empty the recycle bin by right clicking on it and selecting "Empty Recycle Bin". These steps should be done on a regular basis.

And also see TonyKlein's good advice
So how did I get infected in the first place?

Good luck :D

#27 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 12 August 2004 - 06:20 PM

THANK YOU!!!! I just have a few follow-up questions:
1. My desktop background is still hijacked, what can I do?
2. Is there anywhere that I could learn some of the stuff that you know?
3. I think my IP adress may have been comprimised. Is there anything I can do?
4. Is there anyway that I can make a donation to you guys?
5. THANK YOU AGAIN!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Edited by rallymonkey, 12 August 2004 - 06:22 PM.


#28 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 12 August 2004 - 06:57 PM

Your welcome.
1. Your log does not show any evidence of malware.
Try resetting your desktop configuration, right click on it, go to properties > desktop.
Also do an online scan HERE. Let it remove any infected files found.
2.Please see The various helper groups here. Do join the team if you want to post help, we'd love to have you with us.
3. Click on start> right click on my network go to properties, then right click on your connection and go to properties, in the list click on Internet protocol and click on the properties button, there you can input your right ip address.
4.In the header of the page click on the Donate to this site link , if is unavailable try again later .
5. Glad we could help :)

#29 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 12 August 2004 - 10:34 PM

Well, the online scan didn't find anything, and when I right clicked, all it has is file://C:\WINDOWS\Web\desktop.html under the properties. What should I do?

#30 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 13 August 2004 - 09:45 AM

Can you print the screen and upload a snapshot of the desktop properties.

#31 rallymonkey

rallymonkey

    Member

  • Full Member
  • Pip
  • 38 posts

Posted 13 August 2004 - 06:32 PM

Never mind. I fixed it. What had happened was that went to control panel>appearance and themes>change computer's background, and under the desktop tap I went to customize desktop, and under web, a page title security was check. I deleted it and now my desktop is fine. Thank You Very Much for that you have done! Hope to talk to you again!

#32 mmxx66

mmxx66

    The SWI drummer

  • Retired Staff
  • PipPipPipPipPip
  • 4,412 posts

Posted 13 August 2004 - 07:56 PM

Your welcome.
Glad we could help :)

Good luck!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button