• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
Sign in to follow this  
Followers 0
baldeagle

hijacked to ---- res://autdu.dll/index.html#27063

2 posts in this topic

Here is my Highjack This log.

 

I've tried to fix the R0,R1, and R3 but they keep comming back

 

 

Logfile of HijackThis v1.98.0

Scan saved at 8:40:48 AM, on 7/29/2004

Platform: Windows 2000 SP4 (WinNT 5.00.2195)

MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

 

Running processes:

F:\WINNT\System32\smss.exe

F:\WINNT\system32\csrss.exe

F:\WINNT\system32\winlogon.exe

F:\WINNT\system32\services.exe

F:\WINNT\system32\lsass.exe

F:\WINNT\system32\svchost.exe

F:\WINNT\system32\spoolsv.exe

F:\WINNT\System32\svchost.exe

F:\WINNT\System32\nvsvc32.exe

F:\WINNT\system32\regsvc.exe

F:\WINNT\system32\MSTask.exe

F:\WINNT\System32\tcpsvcs.exe

F:\WINNT\System32\snmp.exe

F:\WINNT\System32\WBEM\WinMgmt.exe

F:\WINNT\system32\svchost.exe

F:\WINNT\ipfw.exe

F:\WINNT\mscd32.exe

F:\WINNT\system32\RUNDLL32.EXE

C:\Program Files\Adobe\Distillr\AcroTray.exe

F:\WINNT\explorer.exe

F:\WINNT\system32\ctfmon.exe

F:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe

F:\WINNT\System32\svchost.exe

F:\WINNT\system32\wuauclt.exe

F:\Program Files\ACD Systems\ACDZip\ACDZip.exe

F:\DOCUME~1\THOMAS~1\LOCALS~1\Temp\arcAC.tmp\HijackThis.exe

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://F:\WINNT\autdu.dll/sp.html#27063

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://autdu.dll/index.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://autdu.dll/index.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://F:\WINNT\autdu.dll/sp.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://F:\WINNT\autdu.dll/sp.html#27063

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://autdu.dll/index.html#27063

R3 - Default URLSearchHook is missing

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\program files\adobe\Acrobat\ActiveX\AcroIEHelper.ocx

O2 - BHO: (no name) - {5ADD5970-5B7F-1673-E6A8-65650A95D1C3} - F:\WINNT\system32\appnz.dll

O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - F:\WINNT\system32\msdxm.ocx

O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - F:\Program Files\Yahoo!\Companion\Installs\cpn\ycomp5_3_19_0.dll

O4 - HKLM\..\Run: [synchronization Manager] mobsync.exe /logon

O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE F:\WINNT\System32\NvCpl.dll,NvStartup

O4 - HKLM\..\Run: [nwiz] nwiz.exe /install

O4 - HKLM\..\Run: [mscd32.exe] F:\WINNT\mscd32.exe

O4 - HKLM\..\Run: [NeroCheck] F:\WINNT\system32\NeroCheck.exe

O4 - HKCU\..\Run: [NvMediaCenter] RUNDLL32.EXE F:\WINNT\System32\NVMCTRAY.DLL,NvTaskbarInit

O4 - HKCU\..\Run: [spySweeper] "F:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /0

O4 - Global Startup: Acrobat Assistant.lnk = Adobe\Distillr\AcroTray.exe

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL

O12 - Plugin for .spop: F:\Program Files\Internet Explorer\Plugins\NPDocBox.dll

O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - F:\WINNT\msopt.dll

 

 

 

StartupList report, 7/30/2004, 7:27:03 AM

StartupList version: 1.52.2

Started from : F:\DOCUME~1\THOMAS~1\LOCALS~1\Temp\arcAF.tmp\HijackThis.EXE

Detected: Windows 2000 SP4 (WinNT 5.00.2195)

Detected: Internet Explorer v6.00 SP1 (6.00.2800.1106)

* Using default options

==================================================

 

Running processes:

 

F:\WINNT\System32\smss.exe

F:\WINNT\system32\csrss.exe

F:\WINNT\system32\winlogon.exe

F:\WINNT\system32\services.exe

F:\WINNT\system32\lsass.exe

F:\WINNT\system32\svchost.exe

F:\WINNT\system32\spoolsv.exe

F:\WINNT\System32\svchost.exe

F:\WINNT\System32\nvsvc32.exe

F:\WINNT\system32\regsvc.exe

F:\WINNT\system32\MSTask.exe

F:\WINNT\System32\tcpsvcs.exe

F:\WINNT\System32\snmp.exe

F:\WINNT\System32\WBEM\WinMgmt.exe

F:\WINNT\system32\svchost.exe

F:\WINNT\ipfw.exe

F:\WINNT\mscd32.exe

F:\WINNT\system32\RUNDLL32.EXE

C:\Program Files\Adobe\Distillr\AcroTray.exe

F:\WINNT\explorer.exe

F:\WINNT\system32\ctfmon.exe

F:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe

F:\WINNT\System32\svchost.exe

F:\WINNT\system32\wuauclt.exe

F:\Program Files\Internet Explorer\IEXPLORE.EXE

F:\Program Files\Internet Explorer\IEXPLORE.EXE

F:\Program Files\ACD Systems\ACDZip\ACDZip.exe

F:\Program Files\ACD Systems\ACDZip\ACDZip.exe

F:\DOCUME~1\THOMAS~1\LOCALS~1\Temp\arcAF.tmp\HijackThis.exe

F:\WINNT\system32\NOTEPAD.EXE

F:\WINNT\system32\rundll32.exe

 

--------------------------------------------------

 

Listing of startup folders:

 

Shell folders Common Startup:

[F:\Documents and Settings\All Users\Start Menu\Programs\Startup]

Acrobat Assistant.lnk = Adobe\Distillr\AcroTray.exe

 

--------------------------------------------------

 

Checking Windows NT UserInit:

 

[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]

UserInit = F:\WINNT\system32\userinit.exe,

 

--------------------------------------------------

 

Autorun entries from Registry:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

 

Synchronization Manager = mobsync.exe /logon

NvCplDaemon = RUNDLL32.EXE F:\WINNT\System32\NvCpl.dll,NvStartup

nwiz = nwiz.exe /install

mscd32.exe = F:\WINNT\mscd32.exe

NeroCheck = F:\WINNT\system32\NeroCheck.exe

 

--------------------------------------------------

 

Autorun entries from Registry:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run

 

NvMediaCenter = RUNDLL32.EXE F:\WINNT\System32\NVMCTRAY.DLL,NvTaskbarInit

SpySweeper = "F:\Program Files\Webroot\Spy Sweeper\SpySweeper.exe" /0

 

--------------------------------------------------

 

Shell & screensaver key from F:\WINNT\SYSTEM.INI:

 

Shell=*INI section not found*

SCRNSAVE.EXE=*INI section not found*

drivers=*INI section not found*

 

Shell & screensaver key from Registry:

 

Shell=Explorer.exe

SCRNSAVE.EXE=*Registry value not found*

drivers=*Registry value not found*

 

Policies Shell key:

 

HKCU\..\Policies: Shell=*Registry key not found*

HKLM\..\Policies: Shell=*Registry value not found*

 

--------------------------------------------------

 

 

Enumerating Browser Helper Objects:

 

(no name) - c:\program files\adobe\Acrobat\ActiveX\AcroIEHelper.ocx - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}

(no name) - F:\WINNT\system32\appnz.dll - {5ADD5970-5B7F-1673-E6A8-65650A95D1C3}

 

--------------------------------------------------

 

Enumerating Download Program Files:

 

[shockwave ActiveX Control]

InProcServer32 = F:\WINNT\system32\Macromed\Director\SwDir.dll

CODEBASE = http://download.macromedia.com/pub/shockwa...director/sw.cab

 

[{33564D57-0000-0010-8000-00AA00389B71}]

CODEBASE = http://download.microsoft.com/download/F/6...922/wmv9VCM.CAB

 

--------------------------------------------------

 

Enumerating Windows NT logon/logoff scripts:

*No scripts set to run*

 

Windows NT checkdisk command:

BootExecute = autocheck autochk *

 

Windows NT 'Wininit.ini':

PendingFileRenameOperations: f:\winnt\system\serve.exe||f:\documents and settings\thomas ross\cookies\thomas ross@hitbox[1].txt||f:\documents and settings\thomas ross\cookies\thomas ross@doubleclick[1].txt||f:\documents and settings\thomas ross\cookies\thomas ross@z1.adserver[1].txt||f:\documents and settings\thomas ross\cookies\thomas ross@phg.hitbox[1].txt||f:\documents and settings\thomas ross\cookies\thomas ross@atdmt[2].txt||F:\DOCUME~1\THOMAS~1\LOCALS~1\Temp\GLB1A2B.EXE|||h

 

--------------------------------------------------

 

Enumerating ShellServiceObjectDelayLoad items:

 

Network.ConnectionTray: F:\WINNT\system32\NETSHELL.dll

WebCheck: F:\WINNT\system32\webcheck.dll

SysTray: stobject.dll

 

--------------------------------------------------

End of report, 5,347 bytes

Report generated in 0.851 seconds

 

Command line options:

/verbose - to add additional info on each section

/complete - to include empty sections and unsuspicious data

/full - to include several rarely-important sections

/force9x - to include Win9x-only startups even if running on WinNT

/forcent - to include WinNT-only startups even if running on Win9x

/forceall - to include all Win9x and WinNT startups, regardless of platform

/history - to list version history only

 

 

Thank you for any help

Share this post


Link to post
Share on other sites

Hello please download About:Buster and unzip it to your desktop. Don´t run it yet.

 

How to use Ad-Aware to remove Spyware <= Please check this link for instructions on how to download, install and then use adaware. Don´t use it yet.

1 You already have Adaware installed. Make sure it's up to date. Just open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. You should now see Reference File # : 01R333 18.07.2004 or higher listed.

 

2 Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.

 

3. Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok

Scroll down and find the service called "Network Security Service". When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows. This service is installed by the malware. If this service is not listed go ahead with the next step.

 

4. Reboot to Safe Mode

How to start the computer in

Safe mode

 

 

5. Make sure your PC is configured to show hidden files

 

Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked.

Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"

Click "Apply" then "OK"

 

6.CLOSE ALL WINDOWS AND BROWSERS Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

 

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://F:\WINNT\autdu.dll/sp.html#27063

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = res://autdu.dll/index.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = res://autdu.dll/index.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://F:\WINNT\autdu.dll/sp.html#27063

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://F:\WINNT\autdu.dll/sp.html#27063

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = res://autdu.dll/index.html#27063

R3 - Default URLSearchHook is missing

O2 - BHO: (no name) - {5ADD5970-5B7F-1673-E6A8-65650A95D1C3} - F:\WINNT\system32\appnz.dll

O4 - HKLM\..\Run: [mscd32.exe] F:\WINNT\mscd32.exe

O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - F:\WINNT\msopt.dll

 

7. Delete the following files if present.

F:\WINNT\ipfw.exe

F:\WINNT\autdu.dll

F:\WINNT\system32\appnz.dll

F:\WINNT\mscd32.exe

F:\WINNT\msopt.dll

 

8.Copy the information within the quote box to a notepad document.

 

 

REGEDIT4

 

 

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4A8DADD4-5A25-4D41-8599-CB7458766220}]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\icoo]

 

 

Save the file to your desktop as type: "all files" and name it icoo.reg.

 

Double click on it and give permission to add the items to your registry.

 

9. Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

 

10. Scan with Adaware and let it remove any bad files found.

 

11. Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

 

 

Temporary Files

Temporary Internet Files

Recycle Bin

 

12. Reboot to normal mode, scan again with Hijack This and post a new log here.

 

13. Finally, do an online scan HERE. Let it remove any infected files found.

 

Replace Deleted Files

It is also possible that the infection may have deleted up to three files from your system. If these files are present, to be safe I suggest you overwrite them with a new copy.

 

Go here and download the version of control.exe for your operating system. If you are running Windows 2000, copy it to c:\winnt\system32\. For Windows XP, copy it to c:\windows\system32\.

 

Download the Hoster from here Press 'Restore Original Hosts' and press 'OK'

Exit Program.

 

If you have Spybot S&D installed you may also need to replace one file.

Go here and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

 

Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended.

Go to Internet Options/Security/Internet, press 'default level', then OK.

Now press "Custom Level."

In the ActiveX section, set the first option, 'Download signed controls', to 'Prompt; set the

second option, 'Download unsigned controls', to 'Disable'; and finally, set 'Initialize and Script ActiveX controls not marked as safe" to 'Disable'.

Share this post


Link to post
Share on other sites
Sign in to follow this  
Followers 0