Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Many Issues HJT and CA Virus Info Center


  • Please log in to reply
5 replies to this topic

#1 tbarley

tbarley

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 18 April 2005 - 01:37 AM

My Nephew brought an old laptop I gave him a few years ago so I could trouble shoot the pop up ads he is getting. He's using Win98 Here's the HJT log: and the results from CA Virus Info Center Scan:

Thanks for the help in advance.

Theo

Logfile of HijackThis v1.99.1
Scan saved at 11:00:26 PM, on 4/17/05
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\TEJECT.DRV
C:\WINDOWS\SYSTEM\SSDPSRV.EXE
C:\WINDOWS\SYSTEM\WINAI32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\ATLIC32.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\IRMON.EXE
C:\WINDOWS\SYSTEM\THOTKEY.EXE
C:\WINDOWS\SYSTEM\TFUNCKEY.EXE
C:\WINDOWS\SYSTEM\TPWRMGR.EXE
C:\WINDOWS\SYSTEM\THOTSWAP.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\WINAMP\WINAMPA.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\HP SOFTWARE UPDATE\HPWUSCHD2.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\DIGITAL IMAGING\BIN\HPOTDD01.EXE
C:\PROGRAM FILES\D-LINK\AIR UTILITY\AIRCFG.EXE
C:\PROGRAM FILES\ALPHA NETWORKS\ANIWZCS SERVICE\WZCSLDR.EXE
C:\WINDOWS\SYSTEM\CRIS32.EXE
C:\PROGRAM FILES\NETSCAPE\NETSCAPE\NETSCP.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\SYSTEM\WINAI32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\ATLII32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\NETKY.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\APIXP.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\SYSTEM\ATLNC.EXE
C:\WINDOWS\SYSTEM\ATLNC.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\SYSPX32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\NETKY.EXE
C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\jvdqx.dll/sp.html#12345
R3 - Default URLSearchHook is missing
N3 - Netscape 7: user_pref("browser.startup.homepage", "http://pbskids.org/"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CPROGRAM%20FILES%5CNETSCAPE%5CNETSCAPE%5Csearchplugins%5CSBWeb_01.src"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: Class - {41993592-58BC-3E87-A3D0-7A94BD59535D} - C:\WINDOWS\D3YO32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [THotkey] THotkey.Exe
O4 - HKLM\..\Run: [TFunckey] TFunckey.Exe
O4 - HKLM\..\Run: [TPwrMgr] TPwrMgr.Exe
O4 - HKLM\..\Run: [THotSwap] THotSwap.Exe
O4 - HKLM\..\Run: [TDspOff] TDspOff.Exe B
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [WinampAgent] "C:\PROGRAM FILES\WINAMP\WINAMPa.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [DeviceDiscovery] C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
O4 - HKLM\..\Run: [D-Link Air Utility] C:\Program Files\D-Link\Air Utility\AirCFG.exe
O4 - HKLM\..\Run: [ANIWZCSService] C:\Program Files\Alpha Networks\ANIWZCS Service\WZCSLDR.exe
O4 - HKLM\..\Run: [CRIS32.EXE] C:\WINDOWS\SYSTEM\CRIS32.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [TDockNUndock] Teject.Drv
O4 - HKLM\..\RunServices: [SSDPSRV] C:\WINDOWS\SYSTEM\ssdpsrv.exe
O4 - HKLM\..\RunServices: [WINAI32.EXE] C:\WINDOWS\SYSTEM\WINAI32.EXE /s
O4 - HKLM\..\RunServices: [APIXW.EXE] C:\WINDOWS\SYSTEM\APIXW.EXE /s
O4 - HKLM\..\RunServices: [ATLII32.EXE] C:\WINDOWS\ATLII32.EXE /s
O4 - HKLM\..\RunServices: [ATLIC32.EXE] C:\WINDOWS\ATLIC32.EXE /s
O4 - HKLM\..\RunServices: [NETKY.EXE] C:\WINDOWS\NETKY.EXE /s
O4 - HKLM\..\RunServices: [APIXP.EXE] C:\WINDOWS\APIXP.EXE /s
O4 - HKLM\..\RunServices: [ATLNC.EXE] C:\WINDOWS\SYSTEM\ATLNC.EXE /s
O4 - HKLM\..\RunServices: [WINHC.EXE] C:\WINDOWS\SYSTEM\WINHC.EXE /s
O4 - HKLM\..\RunServices: [SYSPX32.EXE] C:\WINDOWS\SYSTEM\SYSPX32.EXE /s
O4 - HKCU\..\Run: [Mozilla Quick Launch] "C:\Program Files\Netscape\Netscape\Netscp.exe" -turbo
O4 - HKCU\..\Run: [Forbes] C:\Program Files\Forbes\ForbesAlerts.exe
O4 - Startup: PowerReg Scheduler V3.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www3.ca.com/securityadvisor/virusinfo/webscan.cab


File Infection Status Path
winai32.exe Win32.Winshow.BM cannot delete C:\WINDOWS\SYSTEM\
atlnc.exe Win32.Winshow.BM cannot delete C:\WINDOWS\SYSTEM\
winhc.exe Win32.Winshow.BM cannot delete C:\WINDOWS\SYSTEM\
syspx32.exe Win32.Winshow.BM cannot delete C:\WINDOWS\SYSTEM\
atlii32.exe Win32.Winshow.BM cannot delete C:\WINDOWS\
atlic32.exe Win32.Winshow.BM cannot delete C:\WINDOWS\
netky.exe Win32.Winshow.BM cannot delete C:\WINDOWS\
apixp.exe Win32.Winshow.BM cannot delete C:\WINDOWS\

BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:06:21 AM

Posted 18 April 2005 - 06:37 AM

Download cwshredder 2.12 from here:

http://cwshredder.net/bin/CWShredder.exe

Run the file after it is downloaded and click on the fix button. Let it do its thing and when its done, even if it crashes.

When its done run hijackthis again post a new log

#3 tbarley

tbarley
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 18 April 2005 - 08:22 AM

Ran CWShreeder and here's the new HJT Log:

Thanks again,

-Theo

Logfile of HijackThis v1.99.1
Scan saved at 6:07:50 AM, on 4/18/05
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\TEJECT.DRV
C:\WINDOWS\SYSTEM\SSDPSRV.EXE
C:\WINDOWS\SYSTEM\WINAI32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\ATLIC32.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\IRMON.EXE
C:\WINDOWS\SYSTEM\THOTKEY.EXE
C:\WINDOWS\SYSTEM\TFUNCKEY.EXE
C:\WINDOWS\SYSTEM\TPWRMGR.EXE
C:\WINDOWS\SYSTEM\THOTSWAP.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\WINAMP\WINAMPA.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\HP SOFTWARE UPDATE\HPWUSCHD2.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\DIGITAL IMAGING\BIN\HPOTDD01.EXE
C:\PROGRAM FILES\D-LINK\AIR UTILITY\AIRCFG.EXE
C:\PROGRAM FILES\ALPHA NETWORKS\ANIWZCS SERVICE\WZCSLDR.EXE
C:\WINDOWS\SYSTEM\CRIS32.EXE
C:\PROGRAM FILES\NETSCAPE\NETSCAPE\NETSCP.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\SYSTEM\WINAI32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\NETKY.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\APIXP.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\SYSTEM\ATLNC.EXE
C:\WINDOWS\SYSTEM\ATLNC.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\SYSPX32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\NETKY.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\SDKWX32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\CRPG32.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\SYSTEM\NETNM32.EXE
C:\HIJACKTHIS.EXE

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R3 - Default URLSearchHook is missing
N3 - Netscape 7: user_pref("browser.startup.homepage", "http://pbskids.org/"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CPROGRAM%20FILES%5CNETSCAPE%5CNETSCAPE%5Csearchplugins%5CSBWeb_01.src"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: Class - {41993592-58BC-3E87-A3D0-7A94BD59535D} - C:\WINDOWS\D3YO32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [THotkey] THotkey.Exe
O4 - HKLM\..\Run: [TFunckey] TFunckey.Exe
O4 - HKLM\..\Run: [TPwrMgr] TPwrMgr.Exe
O4 - HKLM\..\Run: [THotSwap] THotSwap.Exe
O4 - HKLM\..\Run: [TDspOff] TDspOff.Exe B
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [WinampAgent] "C:\PROGRAM FILES\WINAMP\WINAMPa.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [DeviceDiscovery] C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
O4 - HKLM\..\Run: [D-Link Air Utility] C:\Program Files\D-Link\Air Utility\AirCFG.exe
O4 - HKLM\..\Run: [ANIWZCSService] C:\Program Files\Alpha Networks\ANIWZCS Service\WZCSLDR.exe
O4 - HKLM\..\Run: [CRIS32.EXE] C:\WINDOWS\SYSTEM\CRIS32.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [TDockNUndock] Teject.Drv
O4 - HKLM\..\RunServices: [SSDPSRV] C:\WINDOWS\SYSTEM\ssdpsrv.exe
O4 - HKLM\..\RunServices: [WINAI32.EXE] C:\WINDOWS\SYSTEM\WINAI32.EXE /s
O4 - HKLM\..\RunServices: [APIXW.EXE] C:\WINDOWS\SYSTEM\APIXW.EXE /s
O4 - HKLM\..\RunServices: [ATLII32.EXE] C:\WINDOWS\ATLII32.EXE /s
O4 - HKLM\..\RunServices: [ATLIC32.EXE] C:\WINDOWS\ATLIC32.EXE /s
O4 - HKLM\..\RunServices: [NETKY.EXE] C:\WINDOWS\NETKY.EXE /s
O4 - HKLM\..\RunServices: [APIXP.EXE] C:\WINDOWS\APIXP.EXE /s
O4 - HKLM\..\RunServices: [ATLNC.EXE] C:\WINDOWS\SYSTEM\ATLNC.EXE /s
O4 - HKLM\..\RunServices: [WINHC.EXE] C:\WINDOWS\SYSTEM\WINHC.EXE /s
O4 - HKLM\..\RunServices: [SYSPX32.EXE] C:\WINDOWS\SYSTEM\SYSPX32.EXE /s
O4 - HKLM\..\RunServices: [SDKWX32.EXE] C:\WINDOWS\SYSTEM\SDKWX32.EXE /s
O4 - HKLM\..\RunServices: [CRPG32.EXE] C:\WINDOWS\CRPG32.EXE /s
O4 - HKLM\..\RunServices: [NETNM32.EXE] C:\WINDOWS\SYSTEM\NETNM32.EXE /s
O4 - HKCU\..\Run: [Mozilla Quick Launch] "C:\Program Files\Netscape\Netscape\Netscp.exe" -turbo
O4 - HKCU\..\Run: [Forbes] C:\Program Files\Forbes\ForbesAlerts.exe
O4 - HKCU\..\RunServices: [Mozilla Quick Launch] "C:\Program Files\Netscape\Netscape\Netscp.exe" -turbo
O4 - HKCU\..\RunServices: [Forbes] C:\Program Files\Forbes\ForbesAlerts.exe
O4 - Startup: PowerReg Scheduler V3.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www3.ca.com/securityadvisor/virusinfo/webscan.cab
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab

#4 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:06:21 AM

Posted 18 April 2005 - 04:29 PM

Print out these instructions and then close all windows including Internet Explorer.

Then I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button:


R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {41993592-58BC-3E87-A3D0-7A94BD59535D} - C:\WINDOWS\D3YO32.DLL
O4 - HKLM\..\Run: [CRIS32.EXE] C:\WINDOWS\SYSTEM\CRIS32.EXE
O4 - HKLM\..\RunServices: [WINAI32.EXE] C:\WINDOWS\SYSTEM\WINAI32.EXE /s
O4 - HKLM\..\RunServices: [APIXW.EXE] C:\WINDOWS\SYSTEM\APIXW.EXE /s
O4 - HKLM\..\RunServices: [ATLII32.EXE] C:\WINDOWS\ATLII32.EXE /s
O4 - HKLM\..\RunServices: [ATLIC32.EXE] C:\WINDOWS\ATLIC32.EXE /s
O4 - HKLM\..\RunServices: [NETKY.EXE] C:\WINDOWS\NETKY.EXE /s
O4 - HKLM\..\RunServices: [APIXP.EXE] C:\WINDOWS\APIXP.EXE /s
O4 - HKLM\..\RunServices: [ATLNC.EXE] C:\WINDOWS\SYSTEM\ATLNC.EXE /s
O4 - HKLM\..\RunServices: [WINHC.EXE] C:\WINDOWS\SYSTEM\WINHC.EXE /s
O4 - HKLM\..\RunServices: [SYSPX32.EXE] C:\WINDOWS\SYSTEM\SYSPX32.EXE /s
O4 - HKLM\..\RunServices: [SDKWX32.EXE] C:\WINDOWS\SYSTEM\SDKWX32.EXE /s
O4 - HKLM\..\RunServices: [CRPG32.EXE] C:\WINDOWS\CRPG32.EXE /s
O4 - HKLM\..\RunServices: [NETNM32.EXE] C:\WINDOWS\SYSTEM\NETNM32.EXE /s
O4 - HKCU\..\Run: [Forbes] C:\Program Files\Forbes\ForbesAlerts.exe
O4 - HKCU\..\RunServices: [Forbes] C:\Program Files\Forbes\ForbesAlerts.exe
O4 - Startup: PowerReg Scheduler V3.exe

Reboot your computer into Safe Mode

Then delete these files or directories (Do not be concerned if they do not exist)


C:\WINDOWS\D3YO32.DLL
C:\WINDOWS\SYSTEM\CRIS32.EXE
C:\WINDOWS\SYSTEM\WINAI32.EXE
C:\WINDOWS\SYSTEM\APIXW.EXE
C:\WINDOWS\ATLII32.EXE
C:\WINDOWS\ATLIC32.EXE
C:\WINDOWS\NETKY.EXE
C:\WINDOWS\APIXP.EXE
C:\WINDOWS\SYSTEM\ATLNC.EXE
C:\WINDOWS\SYSTEM\WINHC.EXE
C:\WINDOWS\SYSTEM\SYSPX32.EXE
C:\WINDOWS\SYSTEM\SDKWX32.EXE
C:\WINDOWS\CRPG32.EXE
C:\WINDOWS\SYSTEM\NETNM32.EXE
C:\Program Files\Forbes\

Reboot your computer to go back to normal mode and post a new log.

#5 tbarley

tbarley
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:05:21 AM

Posted 18 April 2005 - 06:55 PM

Did what you recommended and I got the auto:blank back after restart and crpg32.exe and delted them both again via HJT. Have not restarted yet because both Netscape and IE are moving extremly slow now and still getting popups

Here's the log:

Logfile of HijackThis v1.99.1
Scan saved at 4:36:22 PM, on 4/18/05
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\TEJECT.DRV
C:\WINDOWS\SYSTEM\SSDPSRV.EXE
C:\WINDOWS\CRNL32.EXE
C:\WINDOWS\SYSTEM\IERS32.EXE
C:\WINDOWS\SYSTEM\IELP.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\JAVAFC.EXE
C:\WINDOWS\SYSTEM\IELH32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\SYSTEM\WINJB32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\IRMON.EXE
C:\WINDOWS\SYSTEM\THOTKEY.EXE
C:\WINDOWS\SYSTEM\TFUNCKEY.EXE
C:\WINDOWS\SYSTEM\TPWRMGR.EXE
C:\WINDOWS\SYSTEM\THOTSWAP.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\WINAMP\WINAMPA.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\HP SOFTWARE UPDATE\HPWUSCHD2.EXE
C:\PROGRAM FILES\HEWLETT-PACKARD\DIGITAL IMAGING\BIN\HPOTDD01.EXE
C:\PROGRAM FILES\D-LINK\AIR UTILITY\AIRCFG.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\PROGRAM FILES\ALPHA NETWORKS\ANIWZCS SERVICE\WZCSLDR.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\CRNL32.EXE
C:\WINDOWS\MSBR32.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\PROGRAM FILES\NETSCAPE\NETSCAPE\NETSCP.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\NOTEPAD.EXE
C:\WINDOWS\DESKTOP\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R3 - Default URLSearchHook is missing
N3 - Netscape 7: user_pref("browser.startup.homepage", "http://pbskids.org/"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
N3 - Netscape 7: user_pref("browser.search.defaultengine", "engine://C%3A%5CPROGRAM%20FILES%5CNETSCAPE%5CNETSCAPE%5Csearchplugins%5CSBWeb_01.src"); (C:\WINDOWS\Application Data\Mozilla\Profiles\default\u6opxqft.slt\prefs.js)
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: Class - {2D803A3C-BE44-E371-10B4-8A9913C5F1C1} - C:\WINDOWS\IPGO32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [IrMon] IrMon.exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [THotkey] THotkey.Exe
O4 - HKLM\..\Run: [TFunckey] TFunckey.Exe
O4 - HKLM\..\Run: [TPwrMgr] TPwrMgr.Exe
O4 - HKLM\..\Run: [THotSwap] THotSwap.Exe
O4 - HKLM\..\Run: [TDspOff] TDspOff.Exe B
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [WinampAgent] "C:\PROGRAM FILES\WINAMP\WINAMPa.exe"
O4 - HKLM\..\Run: [HP Software Update] "C:\Program Files\Hewlett-Packard\HP Software Update\HPWuSchd2.exe"
O4 - HKLM\..\Run: [DeviceDiscovery] C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
O4 - HKLM\..\Run: [D-Link Air Utility] C:\Program Files\D-Link\Air Utility\AirCFG.exe
O4 - HKLM\..\Run: [ANIWZCSService] C:\Program Files\Alpha Networks\ANIWZCS Service\WZCSLDR.exe
O4 - HKLM\..\Run: [WINJB32.EXE] C:\WINDOWS\SYSTEM\WINJB32.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [TDockNUndock] Teject.Drv
O4 - HKLM\..\RunServices: [SSDPSRV] C:\WINDOWS\SYSTEM\ssdpsrv.exe
O4 - HKLM\..\RunServices: [CRNL32.EXE] C:\WINDOWS\CRNL32.EXE /s
O4 - HKLM\..\RunServices: [IERS32.EXE] C:\WINDOWS\SYSTEM\IERS32.EXE /s
O4 - HKLM\..\RunServices: [IELP.EXE] C:\WINDOWS\SYSTEM\IELP.EXE /s
O4 - HKLM\..\RunServices: [JAVAFC.EXE] C:\WINDOWS\JAVAFC.EXE /s
O4 - HKLM\..\RunServices: [IELH32.EXE] C:\WINDOWS\SYSTEM\IELH32.EXE /s
O4 - HKLM\..\RunServices: [APIYD32.EXE] C:\WINDOWS\SYSTEM\APIYD32.EXE /s
O4 - HKLM\..\RunServices: [MSBR32.EXE] C:\WINDOWS\MSBR32.EXE /s
O4 - HKCU\..\Run: [Mozilla Quick Launch] "C:\Program Files\Netscape\Netscape\Netscp.exe" -turbo
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061...all/xscan53.cab
O16 - DPF: {7B297BFD-85E4-4092-B2AF-16A91B2EA103} (WScanCtl Class) - http://www3.ca.com/securityadvisor/virusinfo/webscan.cab
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab

#6 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:06:21 AM

Posted 18 April 2005 - 11:24 PM

You may want to print out these directions as the Internet will not be available. Please continue with the next step if you run into a problem with the current one. Just be sure to let us know what the problem was when you reply.

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Please download About:Buster from here: About:Buster Download. Once it is downloaded extract it to
c:\aboutbuster. We will use that program later in this process.

Reboot your computer into Safe Mode and follow these steps:

Step 1:
Then close all programs and windows and run hijackthis. Put a checkmark next to each of these entries and press the fix button when ready:


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\mmbgv.dll/sp.html#12345
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {2D803A3C-BE44-E371-10B4-8A9913C5F1C1} - C:\WINDOWS\IPGO32.DLL
O4 - HKLM\..\Run: [WINJB32.EXE] C:\WINDOWS\SYSTEM\WINJB32.EXE
O4 - HKLM\..\RunServices: [SSDPSRV] C:\WINDOWS\SYSTEM\ssdpsrv.exe
O4 - HKLM\..\RunServices: [CRNL32.EXE] C:\WINDOWS\CRNL32.EXE /s
O4 - HKLM\..\RunServices: [IERS32.EXE] C:\WINDOWS\SYSTEM\IERS32.EXE /s
O4 - HKLM\..\RunServices: [IELP.EXE] C:\WINDOWS\SYSTEM\IELP.EXE /s
O4 - HKLM\..\RunServices: [JAVAFC.EXE] C:\WINDOWS\JAVAFC.EXE /s
O4 - HKLM\..\RunServices: [IELH32.EXE] C:\WINDOWS\SYSTEM\IELH32.EXE /s
O4 - HKLM\..\RunServices: [APIYD32.EXE] C:\WINDOWS\SYSTEM\APIYD32.EXE /s
O4 - HKLM\..\RunServices: [MSBR32.EXE] C:\WINDOWS\MSBR32.EXE /s

Step 2:
I now need you to delete the following files:


C:\WINDOWS\CRNL32.EXE
C:\WINDOWS\SYSTEM\IERS32.EXE
C:\WINDOWS\SYSTEM\IELP.EXE
C:\WINDOWS\JAVAFC.EXE
C:\WINDOWS\SYSTEM\IELH32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\SYSTEM\WINJB32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\CRNL32.EXE
C:\WINDOWS\MSBR32.EXE
C:\WINDOWS\SYSTEM\APIYD32.EXE
C:\WINDOWS\mmbgv.dll
C:\WINDOWS\IPGO32.DLL

If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. if it is uncheck it and try again.

Step 3:

Copy the contents of the Quote Box below to Notepad.
Name the file as fix.reg
Change the Save as Type to All Files
Save this file on the desktop

REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]


Then double-click on the fix.reg file, and when it prompts to merge say yes, and this will clear some registry entries left behind by the process.

Step 4:

This is the step where we will use About:Buster that you had downloaded previously.

Navigate to the c:\aboutbuster directory and double-click on aboutbuster.exe When the tool is open press the OK button, then the Start button, then the OK button, and then finally the Yes button. It will start scanning your computer for files. If it asks if you would like to do a second pass, allow it to do so.

When it completed move on to step 5.


Step 5:
Reboot your computer back to normal mode so that we can restore files that were deleted by this infection:
  • This infection deletes the windows file, shell.dll.

    If you are using XP,2000, or NT please download shell.dll from here: shell-dll.zip. Once the file is downloaded uncompress the zip file and copy shell.dll to the following locations (%windir% being the windows or winnt directory):

    %windir%\system32
    %windir%\system

    If you are using Windows 98 please download shell.dll from here: shell-dll98.zip. Once the file is downloaded uncompress the zip file and copy shell.dll to the following locations (%windir% being the windows or winnt directory):

    %windir%\system

    If you are using Windows ME please download shell.dll from here: shell-dll98.zip. Once the file is downloaded uncompress the zip file and copy shell.dll to the following locations (%windir% being the windows or winnt directory):

    %windir%\system

  • Download the Hoster from here. Press "Restore Original Hosts" and press "OK". Exit Program. This will restore the original deleted Hosts file.

  • If you have Spybot S&D installed you will also need to replace one file. Go here: SDHelper.zip and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy). Then click Start > Run > regsvr32 "C:\Program Files\Spybot - Search & Destroy\SDHelper.dll" and press the OK button

  • If you are using Windows 95, 98, or ME it is possible that the malware deleted your control.exe. Please check for the existence of this file by going to to Merijn Files control.exe and examine where the file should be for your operating system. If the file is missing then download the appropriate file and place it in the proper place according to this information.
Step 6:

Run an online antivirus scan at:

http://housecall.antivirus.com/

Reboot and post a last log




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users