Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Help wanted..


  • Please log in to reply
7 replies to this topic

#1 Hampus

Hampus

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:09:29 AM

Posted 11 August 2005 - 08:18 AM

Logfile of HijackThis v1.99.1
Scan saved at 15:15:46, on 2005-08-11
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\HPConfig.exe
C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe
C:\Program\Messenger\msmsgs.exe
C:\WINDOWS\System32\shnlog.exe
C:\WINDOWS\popuper.exe
C:\WINDOWS\System32\msole32.exe
C:\WINDOWS\System32\carpserv.exe
C:\WINDOWS\System32\intmonp.exe
C:\WINDOWS\System32\intmon.exe
C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
C:\Program\Synaptics\SynTP\SynTPLpr.exe
C:\Program\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
C:\Program\Personal\bin\Personal.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.bestwebslinks.com/bar.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://www.bestwebslinks.com/search.php?qq=%1
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://www.bestwebslinks.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Lnkar
O2 - BHO: HP Class - {FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFA} - C:\WINDOWS\System32\hpB5BE.tmp
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PreloadApp] c:\hp\drivers\printers\photosmart\hphprld.exe c:\hp\drivers\printers\photosmart\setup.exe -d
O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe
O4 - HKLM\..\Run: [Display Settings] C:\Program\HPQ\Notebook Utilities\hptasks.exe /s
O4 - HKLM\..\Run: [QT4HPOT] C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
O4 - HKLM\..\Run: [SynTPLpr] C:\Program\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program\HPQ\Default Settings\cpqset.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program\Delade filer\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: D-Link AirPlus G+ Wireless Adapter Utility.lnk = C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Personal.lnk = C:\Program\Personal\bin\Personal.exe
O23 - Service: Workstation NetLogon Service ( 11F#`I) - Unknown owner - C:\WINDOWS\mszy.exe (file missing)
O23 - Service: HP Configuration Interface Service (HPConfig) - Hewlett-Packard - C:\WINDOWS\system32\HPConfig.exe
O23 - Service: HPWirelessMgr - Hewlett-Packard Co. - C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe

BC AdBot (Login to Remove)

 


#2 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:10:29 AM

Posted 14 August 2005 - 01:58 PM

Hello Hampus and welcome to the BC HijackThis forum. After reviewing your log I see a few items that require our attention. Please print these directions and then proceed with the following steps in order.

Please print these directions and then proceed with the following steps in order.

Step #1

Download smitRem.exe and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop.

Place a shortcut to Panda ActiveScan on your desktop.

Step #2

Please download the trial version of Ewido Security Suite here: http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

Step #3

If you do not already have Ad-Aware SE 1.06 then follow these download and setup instructions: [/b]Ad-Aware SE Setup[/b]. Otherwise, just check for updates.
Don't run it yet!

Step #4

Open Notepad and copy/paste the text in the quotebox below into the new document:

@ECHO OFF
cd\windows
sc config  11F#`I start= disabled
sc stop  11F#`I
sc delete  11F#`I
attrib -s -r -h C:\WINDOWS\mszy.exe
del C:\WINDOWS\mszy.exe
exit


Save the document to your desktop as rservice.bat and close Notepad. Locate the rservice.bat file on your desktop and double-click on it to run the batch file.

Step #5

Start in Safe Mode Using the F8 method:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until the boot menu appears.
  • Use the arrow keys to select the Safe Mode menu item.
  • Press the Enter key.
Step #6

Start HijackThis and click the Scan button to perform a scan. Look for the following items and click in the checkbox in front of each item to select it:R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://www.bestwebslinks.com/bar.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://www.bestwebslinks.com/search.php?qq=%1
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://www.bestwebslinks.com/search.php?qq=%1
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://www.bestwebslinks.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Lnkar
O2 - BHO: HP Class - {FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFA} - C:\WINDOWS\System32\hpB5BE.tmp

Now close ALL open windows except HijackThis and click the Fix Checked button to finish the repair.

Step #7

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.

Step #8

Start Ad-aware SE, click the Start button and choose Perform Full System Scan. Click the Next button and wait for the scan to complete. If anything was found, right-click on the list and choose Select All and remove all it finds.

Step #9

Run Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • NOTE: During some scans with ewido it is finding cases of false positives.
  • You will need to step through the process of cleaning files one-by-one.
  • If ewido detects a file you KNOW to be legitimate, select none as the action.
  • DO NOT select "Perform action on all infections"
  • If you are unsure of any entry found select none for now.
  • When the scan is finished, click the Save report button at the bottom of the screen.
  • Save the report to your desktop
Close Ewido

Step #10

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

Step #11

Reboot back into Windows and click the Panda ActiveScan shortcut, then do a full system scan. Make sure the autoclean box is checked!

Save the scan log and post it along with a new HijackThis Log, the contents of the smitfiles.txt log and the Ewido Log by using Add Reply.

Let us know if any problems persist.

Cheers.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#3 Hampus

Hampus
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:09:29 AM

Posted 15 August 2005 - 02:51 AM

Logfile of HijackThis v1.99.1
Scan saved at 09:35:58, on 2005-08-15
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\HPConfig.exe
C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe
C:\Program\Messenger\msmsgs.exe
C:\WINDOWS\System32\carpserv.exe
C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
C:\Program\Synaptics\SynTP\SynTPLpr.exe
C:\Program\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
C:\Program\Personal\bin\Personal.exe
C:\Program\Internet Explorer\iexplore.exe
C:\WINDOWS\System32\wuauclt.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PreloadApp] c:\hp\drivers\printers\photosmart\hphprld.exe c:\hp\drivers\printers\photosmart\setup.exe -d
O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe
O4 - HKLM\..\Run: [Display Settings] C:\Program\HPQ\Notebook Utilities\hptasks.exe /s
O4 - HKLM\..\Run: [QT4HPOT] C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
O4 - HKLM\..\Run: [SynTPLpr] C:\Program\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program\HPQ\Default Settings\cpqset.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program\Delade filer\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: D-Link AirPlus G+ Wireless Adapter Utility.lnk = C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: Personal.lnk = C:\Program\Personal\bin\Personal.exe
O23 - Service: Workstation NetLogon Service ( 11F#`I) - Unknown owner - C:\WINDOWS\mszy.exe (file missing)
O23 - Service: ewido security suite control - ewido networks - C:\Program\ewido\security suite\ewidoctrl.exe
O23 - Service: HP Configuration Interface Service (HPConfig) - Hewlett-Packard - C:\WINDOWS\system32\HPConfig.exe
O23 - Service: HPWirelessMgr - Hewlett-Packard Co. - C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe

---------------------------------------------------------
ewido security suite - Scan report
---------------------------------------------------------

+ Created on: 09:28:55, 2005-08-15
+ Report-Checksum: AAA644A6

+ Scan result:

HKLM\SOFTWARE\Classes\CLSID\{029DB004-6BCD-0E73-3AEA-F205B565F0F8} -> Spyware.CoolWebSearch : Cleaned with backup
HKLM\SOFTWARE\Classes\CLSID\{357A87ED-3E5D-437d-B334-DEB7EB4982A3} -> Trojan.Agent.eo : Cleaned with backup
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Update\{357A87ED-3E5D-437d-B334-DEB7EB4982A3} -> Trojan.Agent.eo : Cleaned with backup
[448] C:\WINDOWS\system32\OLEEXT.dll -> Trojan.Agent.ff : Cleaned with backup
[720] C:\WINDOWS\System32\OLEEXT.dll -> Trojan.Agent.ff : Error during cleaning
C:\Documents and Settings\Petri Kljutschnik\Lokala instllningar\Temp\6.tmp -> TrojanDownloader.Small.bau : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Lokala instllningar\Temp\9.exe -> Dialer.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050811-144727-768.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050811-145652-380.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050811-145710-630.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050811-150035-399.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050811-150035-784.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050812-104040-269.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\backups\backup-20050815-084757-912.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\loader.exe -> TrojanDownloader.Tibs.h : Cleaned with backup
C:\ms32.tmp -> TrojanDownloader.Small.azk : Cleaned with backup
C:\Program\PSGuard -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\Core.dll -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\database.pkg -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\Localization.dll -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\Logfile.txt -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\msvcp71.dll -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\msvcr71.dll -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\PSGuard.exe -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\PSGuard.exe.local -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\Quarantine -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\Uninstall.exe -> Spyware.PSGuard : Cleaned with backup
C:\Program\PSGuard\WndSystem.dll -> Spyware.PSGuard : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001735.exe -> Trojan.Small.ev : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001736.exe -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001737.exe -> TrojanDownloader.Zlob.af : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001742.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001743.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001744.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001745.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001746.exe -> Trojan.Small.ev : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001747.exe -> TrojanDownloader.Zlob.af : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001751.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001752.exe -> Trojan.Agent.bi : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001753.exe -> Trojan.Agent.bi : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001761.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001762.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP44\A0001763.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001770.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001771.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001772.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001777.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001778.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001779.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001780.exe -> Trojan.Small.ev : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001793.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001794.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001795.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001796.exe -> Trojan.Small.ev : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001811.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001812.exe -> Trojan.Puper.an : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001813.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001814.exe -> Trojan.Small.ev : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001936.dll -> Spyware.SearchPage : Cleaned with backup
C:\System Volume Information\_restore{370D4526-C67A-4FFB-B18F-680143C4A14B}\RP45\A0001937.exe -> Trojan.Puper.an : Cleaned with backup
C:\WINDOWS\comsetup.log:hoeow -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\d3al.dll -> TrojanDownloader.Agent.bc : Cleaned with backup
C:\WINDOWS\popuper.exe -> Trojan.Puper.w : Cleaned with backup
C:\WINDOWS\system32\appku32.exe -> TrojanDownloader.Agent.bq : Cleaned with backup
C:\WINDOWS\system32\hhk.dll -> Spyware.Hijacker.Generic : Cleaned with backup
C:\WINDOWS\system32\intell32.exe -> Spyware.PSGuard : Cleaned with backup
C:\WINDOWS\system32\intmon.exe -> Trojan.Puper.an : Cleaned with backup
C:\WINDOWS\system32\msole32.exe -> Spyware.Hijacker.Generic : Cleaned with backup
C:\WINDOWS\system32\oleext.dll -> Trojan.Small.ev : Cleaned with backup
C:\WINDOWS\system32\shnlog.exe -> Spyware.Hijacker.Generic : Cleaned with backup
C:\WINDOWS\system32\wppp.html -> Spyware.PSGuard : Cleaned with backup
C:\WINDOWS\uninstIU.exe -> Trojan.Small.ev : Cleaned with backup
C:\WINDOWS\winnt256.bmp:kwnea -> TrojanDownloader.Agent.bc : Cleaned with backup


::Report End



smitRem log file
version 2.3

by noahdfear


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Pre-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~

ole32vbs.exe
logfiles


~~~ Icons in System32 ~~~



~~~ Windows directory ~~~

sites.ini


~~~ Drive root ~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Post-run Files Present


~~~ Program Files ~~~



~~~ Shortcuts ~~~



~~~ Favorites ~~~



~~~ system32 folder ~~~



~~~ Icons in System32 ~~~



~~~ Windows directory ~~~



~~~ Drive root ~~~



~~~ Wininet.dll ~~~

wininet.dll INFECTED!! :thumbsup: Starting replacement procedure.


~~~~ Looking for C:\WINDOWS\system32\dllcache\wininet.dll ~~~~


~~~~ dllcache\wininet.dll not present! ~~~~


~~~~ Looking for C:\WINDOWS\$hf_mig$\KB890923\SP2QFE\wininet.dll ~~~~


~~~~ KB890923\SP2QFE\wininet.dll not present! ~~~~


~~~~ Looking for C:\WINDOWS\$hf_mig$\KB867282\SP2QFE\wininet.dll ~~~~


~~~~ KB867282\SP2QFE\wininet.dll not present! ~~~~


~~~~ Looking for C:\WINDOWS\$hf_mig$\KB883939\SP2QFE\wininet.dll ~~~~


~~~~ KB883939\SP2QFE\wininet.dll not present! ~~~~


~~~~ Looking for C:\WINDOWS\ServicePackFiles\i386\wininet.dll ~~~~


~~~~ C:\WINDOWS\ServicePackFiles\i386\wininet.dll not present! ~~~~

~~~ A good copy of wininet.dll was not found. Look for more locations. ~~~

#4 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:10:29 AM

Posted 15 August 2005 - 12:24 PM

Hi Hampus. that looks much better. It looks like we have a couple of left-over items to take care of yet.

We need to get a good copy of wininet.dll and replace the infected copy on this machine.

Go here: http://www.dll-files.com/dllindex/index-w.shtml and download a copy of Wininet.dll and save it to a place where you can find it later.

Now open Windows Explorer and navigate to the c:\windows\system32 folder.

We need to make sure all hidden files are showing so please:
  • Click Start.
  • Open My Computer.
  • Select the Tools menu and click Folder Options.
  • Select the View tab.
  • Under the Hidden files and folders heading select Show hidden files and folders.
  • Uncheck the Hide file extensions for known types option.
  • Uncheck the Hide protected operating system files (recommended) option.
  • Click Yes to confirm.
  • Click OK.
Find the wininet.dll file and rename it to wininet.old. Now copy the file you downloaded into the c:\windows\system32 folder and reboot the machine.

Now let's try and remove the process that is still present.

Re-run the rservice.bat file that we created in the last post and reboot the machine again.

OK. Start HijackThis and perform a new scan. Use the Add Reply button to post your new log file back here along with details of any problems you encountered performing the above steps and I will review it when it comes in.

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#5 Hampus

Hampus
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:09:29 AM

Posted 17 August 2005 - 02:49 PM

It works a lot better now.

Logfile of HijackThis v1.99.1
Scan saved at 21:45:36, on 2005-08-17
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\carpserv.exe
C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
C:\Program\Synaptics\SynTP\SynTPLpr.exe
C:\Program\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program\Messenger\msmsgs.exe
C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
C:\Program\NETGEAR\WG511v2\wlancfg5.exe
C:\Program\Personal\bin\Personal.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\HPConfig.exe
C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program\Internet Explorer\iexplore.exe
C:\Program\Outlook Express\msimn.exe
C:\Program\Internet Explorer\iexplore.exe
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PreloadApp] c:\hp\drivers\printers\photosmart\hphprld.exe c:\hp\drivers\printers\photosmart\setup.exe -d
O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe
O4 - HKLM\..\Run: [Display Settings] C:\Program\HPQ\Notebook Utilities\hptasks.exe /s
O4 - HKLM\..\Run: [QT4HPOT] C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
O4 - HKLM\..\Run: [SynTPLpr] C:\Program\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program\HPQ\Default Settings\cpqset.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program\Delade filer\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: D-Link AirPlus G+ Wireless Adapter Utility.lnk = C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: NETGEAR WG511v2 Wireless Assistant.lnk = ?
O4 - Global Startup: Personal.lnk = C:\Program\Personal\bin\Personal.exe
O23 - Service: Workstation NetLogon Service ( 11F#`I) - Unknown owner - C:\WINDOWS\mszy.exe (file missing)
O23 - Service: ewido security suite control - ewido networks - C:\Program\ewido\security suite\ewidoctrl.exe
O23 - Service: HP Configuration Interface Service (HPConfig) - Hewlett-Packard - C:\WINDOWS\system32\HPConfig.exe
O23 - Service: HPWirelessMgr - Hewlett-Packard Co. - C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe

#6 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:10:29 AM

Posted 18 August 2005 - 12:27 PM

Hi Hampus. That service just doesn't want to go away. Let's try a different approach.

Launch Notepad, and copy/paste the text in the quotebox below into the new document. Save it to your desktop as regfix.reg :

Windows Registry Editor Version 5.00

[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_ 11F#`I]
[-HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Enum\Root\LEGACY_ 11F#`I]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]
[-HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]
[-HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]
[-HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]


Locate regfix.reg on your Desktop and double-click on it. You will receive a prompt similar to: "Do you wish to merge the information into the registry?". Answer Yes and wait for a message to appear similar to Merged Successfully.

OK. Reboot your computer normally, start HijackThis and perform a new scan. Use the Add Reply button to post your new log file back here along with details of any problems you encountered performing the above steps and I will review it when it comes in.

OT

Edited by OldTimer, 18 August 2005 - 12:27 PM.

I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image

#7 Hampus

Hampus
  • Topic Starter

  • Members
  • 48 posts
  • OFFLINE
  •  
  • Local time:09:29 AM

Posted 19 August 2005 - 04:14 AM

I deleted messenger a few months ago, but when I got this problem with my cpu, it was installed again. Why is that?



Logfile of HijackThis v1.99.1
Scan saved at 11:09:01, on 2005-08-19
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\carpserv.exe
C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
C:\Program\Synaptics\SynTP\SynTPLpr.exe
C:\Program\Synaptics\SynTP\SynTPEnh.exe
C:\WINDOWS\System32\ctfmon.exe
C:\Program\Messenger\msmsgs.exe
C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
C:\Program\NETGEAR\WG511v2\wlancfg5.exe
C:\Program\Personal\bin\Personal.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\HPConfig.exe
C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe
C:\WINDOWS\System32\wuauclt.exe
C:\Program\Outlook Express\msimn.exe
C:\Program\Adobe\Illustrator CS\Support Files\Contents\Windows\Illustrator.exe
C:\Documents and Settings\Petri Kljutschnik\Skrivbord\Program\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.preventor.se/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [ATIModeChange] Ati2mdxx.exe
O4 - HKLM\..\Run: [CARPService] carpserv.exe
O4 - HKLM\..\Run: [ATIPTA] C:\Program\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [PreloadApp] c:\hp\drivers\printers\photosmart\hphprld.exe c:\hp\drivers\printers\photosmart\setup.exe -d
O4 - HKLM\..\Run: [srmclean] C:\Cpqs\Scom\srmclean.exe
O4 - HKLM\..\Run: [Display Settings] C:\Program\HPQ\Notebook Utilities\hptasks.exe /s
O4 - HKLM\..\Run: [QT4HPOT] C:\Program\HPQ\ONE-TO~1\OneTouch.EXE
O4 - HKLM\..\Run: [SynTPLpr] C:\Program\Synaptics\SynTP\SynTPLpr.exe
O4 - HKLM\..\Run: [SynTPEnh] C:\Program\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [Cpqset] C:\Program\HPQ\Default Settings\cpqset.exe
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe
O4 - HKCU\..\Run: [MSMSGS] "C:\Program\Messenger\msmsgs.exe" /background
O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program\Delade filer\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: D-Link AirPlus G+ Wireless Adapter Utility.lnk = C:\Program\D-Link\D-Link AirPlus G+ Wireless Adapter Utility\DWLGTI.EXE
O4 - Global Startup: Microsoft Office.lnk = C:\Program\Microsoft Office\Office10\OSA.EXE
O4 - Global Startup: NETGEAR WG511v2 Wireless Assistant.lnk = ?
O4 - Global Startup: Personal.lnk = C:\Program\Personal\bin\Personal.exe
O23 - Service: ewido security suite control - ewido networks - C:\Program\ewido\security suite\ewidoctrl.exe
O23 - Service: HP Configuration Interface Service (HPConfig) - Hewlett-Packard - C:\WINDOWS\system32\HPConfig.exe
O23 - Service: HPWirelessMgr - Hewlett-Packard Co. - C:\Program\HPQ\Notebook Utilities\HPWirelessMgr.exe

#8 OldTimer

OldTimer

    Malware Expert


  • Members
  • 11,092 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:North Carolina
  • Local time:10:29 AM

Posted 19 August 2005 - 02:34 PM

Hi Hampus. that looks good. How are things running? Any more problems?

When you say you uninstalled Messenger I'm assuming you meant MSN Messenger. That is not the same as msmsgs.exe file that is in the log. The latter is a part of the operating system and cannot be deleted. It can be disabled in the Services Console and by disabling it might or might not affect other programs. Test it and see. If it doesn't affect anything else then leave it disabled.

We have a couple of last steps to perform and then you're all set.

First, let's reset your hidden/system files and folders. System files are hidden for a reason and we don't want to have them openly available and susceptible to accidental deletion.
  • Click Start.
  • Open My Computer.
  • Select the Tools menu and click Folder Options.
  • Select the View tab.
  • Under the Hidden files and folders heading UNSELECT Show hidden files and folders.
  • CHECK the Hide protected operating system files (recommended) option.
  • Click Yes to confirm.
  • Click OK.
Next, let's clean your restore points and set a new one:

Reset and Re-enable your System Restore to remove infected files that have been backed up by Windows. The files in System Restore are protected to prevent any programs from changing those files. This is the only way to clean these files: (You will lose all previous restore points which are likely to be infected)
  • Turn off System Restore.
    • On the Desktop, right-click My Computer.
    • Click Properties.
    • Click the System Restore tab.
    • CHECK Turn off System Restore.
    • Click Apply, and then click OK.
  • Restart your computer.
  • Turn ON System Restore.
    • On the Desktop, right-click My Computer.
    • Click Properties.
    • Click the System Restore tab.
    • UN-Check Turn off System Restore.
    • Click Apply, and then click OK.
System Restore will now be active again.

Now that you are clean, to help protect your computer in the future I recommend the following free programs:
  • SpywareBlaster to help prevent spyware from installing in the first place.
  • SpywareGuard to catch and block spyware before it can execute.
  • IESpy-Ad to block access to malicious websites so you cannot be redirected to them from an infected site or email.
You should definitely have a good antivirus to stop infections before they can start and spread. Here are 3 free anti-virus programs that are available for personal use (I use each of these on various machines and they are all good):You should also have a good firewall for blocking unwanted access to and from your computer. These also are free for personal use:It is best to have both a firewall and anti virus to protect your system and to keep them updated.

To keep your operating system up to date visit Microsoft Windows Update monthly. Microsoft puts out new updates on the 2nd Tuesday of every month so be sure to check regularly.

And to keep your system clean be aware of what emails you open, what websites you visit, and update and run these free malware scanners once a week:To learn more about how to protect yourself while on the internet read this article by Tony Klien: So how did I get infected in the first place?

Have a safe and happy computing day!

OT
I do not respond to PM's requesting help. That's what the forums are here for. Please use them so that others may benefit from your questions and the responses you receive.
OldTimer

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users