Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

About:blank. Help Needed To Interpret Hijackthis Log


  • Please log in to reply
5 replies to this topic

#1 Faina

Faina

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:30 PM

Posted 05 November 2005 - 12:04 AM

All,
please help! When I start my IE the home page is redirected to about:blank.

Hijackthis log is below

Thanks for your help

Logfile of HijackThis v1.99.1
Scan saved at 10:40:41 PM, on 11/4/05
Platform: Windows 98 Gold (Win9x 4.10.1998)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\ATI2EVAE.EXE
C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\PROGRAM FILES\AOL COMPUTER CHECK-UP\ACCAGNT.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\PROGRAM FILES\ZONE LABS\ZONEALARM\ZLCLIENT.EXE
C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\TEMP\8275.TMP
C:\WINDOWS\SYSTEM\JAVABQ32.EXE
C:\WINDOWS\TEMP\9002.TMP
C:\WINDOWS\TEMP\9005.TMP
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\FAINADATA\HIJACKTHIS\HIJACKTHIS1\HIJACKTHIS.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\IERD32.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\oktne.dll/sp.html#14044
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {46DF9E4E-6ABF-AF0F-CC5D-F83F52011A48} - blank (file missing)
O2 - BHO: Class - {84B595BB-1DC9-852C-6316-3392A8C5B814} - blank (file missing)
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDSG.DLL
O2 - BHO: Class - {551449AB-9844-4A44-63DD-1711AF6EBB62} - C:\WINDOWS\SYSTEM\IPPL32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [cploader.exe] C:\WINDOWS\SYSTEM\cploader.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [IERD32.EXE] C:\WINDOWS\SYSTEM\IERD32.EXE
O4 - HKLM\..\Run: [9002.TMP] C:\WINDOWS\TEMP\9002.TMP.exe
O4 - HKLM\..\Run: [9005.TMP] C:\WINDOWS\TEMP\9005.TMP.exe
O4 - HKLM\..\RunServices: [ATIPOLAB] ati2evae.exe
O4 - HKLM\..\RunServices: [TrueVector] C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service
O4 - HKLM\..\RunServices: [NTQG32.EXE] C:\WINDOWS\SYSTEM\NTQG32.EXE /s
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [MSPS32.EXE] C:\WINDOWS\MSPS32.EXE /s
O4 - HKLM\..\RunServices: [APIEV32.EXE] C:\WINDOWS\APIEV32.EXE /s
O4 - HKLM\..\RunServices: [ATLYQ32.EXE] C:\WINDOWS\SYSTEM\ATLYQ32.EXE /s
O4 - HKLM\..\RunServices: [ADDXO.EXE] C:\WINDOWS\SYSTEM\ADDXO.EXE /s
O4 - HKLM\..\RunServices: [APPGS32.EXE] C:\WINDOWS\SYSTEM\APPGS32.EXE /s
O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s
O4 - HKLM\..\RunServices: [ATLWM32.EXE] C:\WINDOWS\SYSTEM\ATLWM32.EXE /s
O4 - HKLM\..\RunServices: [SDKQD32.EXE] C:\WINDOWS\SDKQD32.EXE /s
O4 - HKLM\..\RunServices: [CRFP.EXE] C:\WINDOWS\CRFP.EXE /s
O4 - HKLM\..\RunServices: [NETTS32.EXE] C:\WINDOWS\NETTS32.EXE /s
O4 - HKLM\..\RunServices: [APIRR32.EXE] C:\WINDOWS\SYSTEM\APIRR32.EXE /s
O4 - HKLM\..\RunServices: [APIIX.EXE] C:\WINDOWS\SYSTEM\APIIX.EXE /s
O4 - HKLM\..\RunServices: [NETSB32.EXE] C:\WINDOWS\SYSTEM\NETSB32.EXE /s
O4 - HKLM\..\RunServices: [APIIQ.EXE] C:\WINDOWS\SYSTEM\APIIQ.EXE /s
O4 - HKLM\..\RunServices: [IPXW32.EXE] C:\WINDOWS\SYSTEM\IPXW32.EXE /s
O4 - HKLM\..\RunServices: [MFCND32.EXE] C:\WINDOWS\SYSTEM\MFCND32.EXE /s
O4 - HKLM\..\RunServices: [MSSS.EXE] C:\WINDOWS\SYSTEM\MSSS.EXE /s
O4 - HKLM\..\RunServices: [APIRM.EXE] C:\WINDOWS\SYSTEM\APIRM.EXE /s
O4 - HKLM\..\RunServices: [AOLCC] "C:\Program Files\AOL Computer Check-Up\ACCAgnt.exe" /startup
O4 - HKLM\..\RunServices: [JAVABQ32.EXE] C:\WINDOWS\SYSTEM\JAVABQ32.EXE /s
O4 - HKCU\..\Run: [Spyware Doctor] "C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE" /Q
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: Event Reminder.lnk = C:\PMG4\PMREMIND.EXE
O8 - Extra context menu item: Get It With Kontiki - res://C:\PROGRAM FILES\KONTIKI\BIN\BH309190.DLL/201
O8 - Extra context menu item: &AIM Search - res://C:\PROGRAM FILES\AIM TOOLBAR\AIMBAR.DLL/aimsearch.htm
O8 - Extra context menu item: &AOL Toolbar search - res://C:\PROGRAM FILES\AOL TOOLBAR\TOOLBAR.DLL/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra button: MktBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra 'Tools' menuitem: MarketBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O10 - Unknown file in Winsock LSP: c:\progra~1\aventail\connect\asdns.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {B24F0664-7DDA-40B6-B38C-A4FD68DE8685} (CentraDownloaderCtl Class) - http://prod1.centra.com/SiteRoots/main/Ins...aDownloader.cab
O16 - DPF: {70BA88C8-DAE8-4CE9-92BB-979C4A75F53B} (GSDACtl Class) - https://www.gamespyid.com/alaunch.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {1663ed61-23eb-11d2-b92f-008048fdd814} (MeadCo ScriptX Advanced) - http://www.stonyfield.com/coupons/scriptX/smsx.cab
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 85.255.114.76,85.255.112.136

BC AdBot (Login to Remove)

 


#2 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:06:30 PM

Posted 05 November 2005 - 04:45 AM

Hi

Download the stand-alone version of CWShredder from here

Make sure all browser windows are closed and run cwshredder.exe, and click on the FIX button (not the "Scan only" button) and let it scan your computer.

REBOOT your computer and post a new hijackthis log please.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#3 Faina

Faina
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:30 PM

Posted 05 November 2005 - 04:16 PM

Hi

Download the stand-alone version of CWShredder from here

Make sure all browser windows are closed and run cwshredder.exe, and click on the FIX button (not the "Scan only" button) and let it scan your computer.

REBOOT your computer and post a new hijackthis log please.



Hello,

New log is posted. Thanks for your help

Logfile of HijackThis v1.99.1
Scan saved at 3:13:25 PM, on 11/5/05
Platform: Windows 98 Gold (Win9x 4.10.1998)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\ATI2EVAE.EXE
C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\PROGRAM FILES\AOL COMPUTER CHECK-UP\ACCAGNT.EXE
C:\WINDOWS\SYSTEM\JAVABQ32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\ZONE LABS\ZONEALARM\ZLCLIENT.EXE
C:\WINDOWS\SYSTEM\IERD32.EXE
C:\WINDOWS\TEMP\9002.TMP.EXE
C:\WINDOWS\TEMP\9005.TMP.EXE
C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE
C:\WINSTALL.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\FAINADATA\HIJACKTHIS\HIJACKTHIS1\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {46DF9E4E-6ABF-AF0F-CC5D-F83F52011A48} - blank (file missing)
O2 - BHO: Class - {84B595BB-1DC9-852C-6316-3392A8C5B814} - blank (file missing)
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDSG.DLL
O2 - BHO: Class - {551449AB-9844-4A44-63DD-1711AF6EBB62} - C:\WINDOWS\SYSTEM\IPPL32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [cploader.exe] C:\WINDOWS\SYSTEM\cploader.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [IERD32.EXE] C:\WINDOWS\SYSTEM\IERD32.EXE
O4 - HKLM\..\Run: [9002.TMP] C:\WINDOWS\TEMP\9002.TMP.exe
O4 - HKLM\..\Run: [9005.TMP] C:\WINDOWS\TEMP\9005.TMP.exe
O4 - HKLM\..\Run: [9002.TMP.EXE] C:\WINDOWS\TEMP\9002.TMP.EXE
O4 - HKLM\..\Run: [9005.TMP.EXE] C:\WINDOWS\TEMP\9005.TMP.EXE
O4 - HKLM\..\RunServices: [ATIPOLAB] ati2evae.exe
O4 - HKLM\..\RunServices: [TrueVector] C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service
O4 - HKLM\..\RunServices: [NTQG32.EXE] C:\WINDOWS\SYSTEM\NTQG32.EXE /s
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [MSPS32.EXE] C:\WINDOWS\MSPS32.EXE /s
O4 - HKLM\..\RunServices: [APIEV32.EXE] C:\WINDOWS\APIEV32.EXE /s
O4 - HKLM\..\RunServices: [ATLYQ32.EXE] C:\WINDOWS\SYSTEM\ATLYQ32.EXE /s
O4 - HKLM\..\RunServices: [ADDXO.EXE] C:\WINDOWS\SYSTEM\ADDXO.EXE /s
O4 - HKLM\..\RunServices: [APPGS32.EXE] C:\WINDOWS\SYSTEM\APPGS32.EXE /s
O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s
O4 - HKLM\..\RunServices: [ATLWM32.EXE] C:\WINDOWS\SYSTEM\ATLWM32.EXE /s
O4 - HKLM\..\RunServices: [SDKQD32.EXE] C:\WINDOWS\SDKQD32.EXE /s
O4 - HKLM\..\RunServices: [CRFP.EXE] C:\WINDOWS\CRFP.EXE /s
O4 - HKLM\..\RunServices: [NETTS32.EXE] C:\WINDOWS\NETTS32.EXE /s
O4 - HKLM\..\RunServices: [APIRR32.EXE] C:\WINDOWS\SYSTEM\APIRR32.EXE /s
O4 - HKLM\..\RunServices: [APIIX.EXE] C:\WINDOWS\SYSTEM\APIIX.EXE /s
O4 - HKLM\..\RunServices: [NETSB32.EXE] C:\WINDOWS\SYSTEM\NETSB32.EXE /s
O4 - HKLM\..\RunServices: [APIIQ.EXE] C:\WINDOWS\SYSTEM\APIIQ.EXE /s
O4 - HKLM\..\RunServices: [IPXW32.EXE] C:\WINDOWS\SYSTEM\IPXW32.EXE /s
O4 - HKLM\..\RunServices: [MFCND32.EXE] C:\WINDOWS\SYSTEM\MFCND32.EXE /s
O4 - HKLM\..\RunServices: [MSSS.EXE] C:\WINDOWS\SYSTEM\MSSS.EXE /s
O4 - HKLM\..\RunServices: [APIRM.EXE] C:\WINDOWS\SYSTEM\APIRM.EXE /s
O4 - HKLM\..\RunServices: [AOLCC] "C:\Program Files\AOL Computer Check-Up\ACCAgnt.exe" /startup
O4 - HKLM\..\RunServices: [JAVABQ32.EXE] C:\WINDOWS\SYSTEM\JAVABQ32.EXE /s
O4 - HKCU\..\Run: [Spyware Doctor] "C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE" /Q
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: Event Reminder.lnk = C:\PMG4\PMREMIND.EXE
O8 - Extra context menu item: Get It With Kontiki - res://C:\PROGRAM FILES\KONTIKI\BIN\BH309190.DLL/201
O8 - Extra context menu item: &AIM Search - res://C:\PROGRAM FILES\AIM TOOLBAR\AIMBAR.DLL/aimsearch.htm
O8 - Extra context menu item: &AOL Toolbar search - res://C:\PROGRAM FILES\AOL TOOLBAR\TOOLBAR.DLL/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra button: MktBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra 'Tools' menuitem: MarketBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O10 - Unknown file in Winsock LSP: c:\progra~1\aventail\connect\asdns.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {B24F0664-7DDA-40B6-B38C-A4FD68DE8685} (CentraDownloaderCtl Class) - http://prod1.centra.com/SiteRoots/main/Ins...aDownloader.cab
O16 - DPF: {70BA88C8-DAE8-4CE9-92BB-979C4A75F53B} (GSDACtl Class) - https://www.gamespyid.com/alaunch.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {1663ed61-23eb-11d2-b92f-008048fdd814} (MeadCo ScriptX Advanced) - http://www.stonyfield.com/coupons/scriptX/smsx.cab
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 85.255.114.76,85.255.112.136

#4 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:06:30 PM

Posted 05 November 2005 - 05:35 PM

You may want to print out these directions as the Internet will not be available. Please continue with the next step if you run into a problem with the current one. Just be sure to let us know what the problem was when you reply.

You have two nasty infections.

Disable or uninstall SPYWARE DOCTOR. It may interfere with the fix. You will enable it or reinstall it later.

This is very important ! Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail. (Steps 1 - 6)

Please make sure that you can view all hidden files:
A. On the Tools menu in Windows Explorer, click Folder Options.
B. Click the View tab.
C. Under Hidden files and folders, click Show hidden files and folders.
D. Uncheck Hide extensions for known filetypes and Hide protected operating system files.
How to see hidden files in Windows

Please download About:Buster from here: About:Buster Download. Once it is downloaded extract it to
c:\aboutbuster. We will use that program later in this process. Don't use it yet.

Download Ad-aware SE: here
Install it. When you get the last screen, with the "Finish" button and 3 options, uncheck those three items.
Open AdAware and click the "Check for updates now" link. Close AdAware. Don't use it yet.

Step 1:

Press control-alt-delete to get into the task manager and end the follow processes if they exist:

JAVABQ32.EXE
IERD32.EXE
9002.TMP.EXE
9005.TMP.EXE


This is very important ! Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail. (Steps 1 - 6)

Step 2:
Run HijackThis!, press "Scan" and tick the boxes next to all these, close all other windows and browsers, then press "Fix Checked" button.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {46DF9E4E-6ABF-AF0F-CC5D-F83F52011A48} - blank (file missing)
O2 - BHO: Class - {84B595BB-1DC9-852C-6316-3392A8C5B814} - blank (file missing)
O2 - BHO: Class - {551449AB-9844-4A44-63DD-1711AF6EBB62} - C:\WINDOWS\SYSTEM\IPPL32.DLL

O4 - HKLM\..\Run: [IERD32.EXE] C:\WINDOWS\SYSTEM\IERD32.EXE
O4 - HKLM\..\Run: [9002.TMP] C:\WINDOWS\TEMP\9002.TMP.exe
O4 - HKLM\..\Run: [9005.TMP] C:\WINDOWS\TEMP\9005.TMP.exe
O4 - HKLM\..\Run: [9002.TMP.EXE] C:\WINDOWS\TEMP\9002.TMP.EXE
O4 - HKLM\..\Run: [9005.TMP.EXE] C:\WINDOWS\TEMP\9005.TMP.EXE
O4 - HKLM\..\RunServices: [NTQG32.EXE] C:\WINDOWS\SYSTEM\NTQG32.EXE /s
O4 - HKLM\..\RunServices: [MSPS32.EXE] C:\WINDOWS\MSPS32.EXE /s
O4 - HKLM\..\RunServices: [APIEV32.EXE] C:\WINDOWS\APIEV32.EXE /s
O4 - HKLM\..\RunServices: [ATLYQ32.EXE] C:\WINDOWS\SYSTEM\ATLYQ32.EXE /s
O4 - HKLM\..\RunServices: [ADDXO.EXE] C:\WINDOWS\SYSTEM\ADDXO.EXE /s
O4 - HKLM\..\RunServices: [APPGS32.EXE] C:\WINDOWS\SYSTEM\APPGS32.EXE /s
O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s
O4 - HKLM\..\RunServices: [ATLWM32.EXE] C:\WINDOWS\SYSTEM\ATLWM32.EXE /s
O4 - HKLM\..\RunServices: [SDKQD32.EXE] C:\WINDOWS\SDKQD32.EXE /s
O4 - HKLM\..\RunServices: [CRFP.EXE] C:\WINDOWS\CRFP.EXE /s
O4 - HKLM\..\RunServices: [NETTS32.EXE] C:\WINDOWS\NETTS32.EXE /s
O4 - HKLM\..\RunServices: [APIRR32.EXE] C:\WINDOWS\SYSTEM\APIRR32.EXE /s
O4 - HKLM\..\RunServices: [APIIX.EXE] C:\WINDOWS\SYSTEM\APIIX.EXE /s
O4 - HKLM\..\RunServices: [NETSB32.EXE] C:\WINDOWS\SYSTEM\NETSB32.EXE /s
O4 - HKLM\..\RunServices: [APIIQ.EXE] C:\WINDOWS\SYSTEM\APIIQ.EXE /s
O4 - HKLM\..\RunServices: [IPXW32.EXE] C:\WINDOWS\SYSTEM\IPXW32.EXE /s
O4 - HKLM\..\RunServices: [MFCND32.EXE] C:\WINDOWS\SYSTEM\MFCND32.EXE /s
O4 - HKLM\..\RunServices: [MSSS.EXE] C:\WINDOWS\SYSTEM\MSSS.EXE /s
O4 - HKLM\..\RunServices: [APIRM.EXE] C:\WINDOWS\SYSTEM\APIRM.EXE /s
O4 - HKLM\..\RunServices: [JAVABQ32.EXE] C:\WINDOWS\SYSTEM\JAVABQ32.EXE /s


Step 3:
Reboot your computer into Safe Mode.

I now need you to delete the following files:

C:\WINDOWS\ueqlg.dll <-- this file
C:\WINDOWS\SYSTEM\IPPL32.DLL <-- this file

C:\WINDOWS\SYSTEM\IERD32.EXE <-- this file
C:\WINDOWS\TEMP\9002.TMP.exe <-- this file
C:\WINDOWS\TEMP\9005.TMP.exe <-- this file
C:\WINDOWS\TEMP\9002.TMP.EXE <-- this file
C:\WINDOWS\TEMP\9005.TMP.EXE <-- this file
C:\WINDOWS\SYSTEM\NTQG32.EXE <-- this file
C:\WINDOWS\MSPS32.EXE <-- this file
C:\WINDOWS\APIEV32.EXE <-- this file
C:\WINDOWS\SYSTEM\ATLYQ32.EXE <-- this file
C:\WINDOWS\SYSTEM\ADDXO.EXE <-- this file
C:\WINDOWS\SYSTEM\APPGS32.EXE <-- this file
C:\WINDOWS\IPFL.EXE <-- this file
C:\WINDOWS\SYSTEM\ATLWM32.EXE <-- this file
C:\WINDOWS\SDKQD32.EXE <-- this file
C:\WINDOWS\CRFP.EXE <-- this file
C:\WINDOWS\NETTS32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIRR32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIIX.EXE <-- this file
C:\WINDOWS\SYSTEM\NETSB32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIIQ.EXE <-- this file
C:\WINDOWS\SYSTEM\IPXW32.EXE <-- this file
C:\WINDOWS\SYSTEM\MFCND32.EXE <-- this file
C:\WINDOWS\SYSTEM\MSSS.EXE <-- this file
C:\WINDOWS\SYSTEM\APIRM.EXE <-- this file
C:\WINDOWS\SYSTEM\JAVABQ32.EXE <-- this file

If you get an error when deleting a file, right click on the file and check to see if the read only attribute is checked. if it is, uncheck it and try again.

Step 4:

This is the step where we will use About:Buster that you had downloaded previously.

Navigate to the c:\aboutbuster directory and double-click on aboutbuster.exe When the tool is open press the OK button, then the Start button, then the OK button, and then finally the Yes button. It will start scanning your computer for files. If it asks if you would like to do a second pass, allow it to do so.

When it completed move on to step 5.

Step 5:

Run AdAware again, press the "Start" button, uncheck "Scan for negligible risk entries" and "Search fo low risk threads", select "Perform full system scan" and press "Next". Let AdAware remove anything it finds.

Step 6:

Clean out temporary and Temporary Internet Files. Go to Start -> Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

Temporary Files
Temporary Internet Files
Recycle Bin

Step 7:
Reboot your computer back to normal mode:

[*]Download the Hoster from here. Press Restore Original Hosts and press OK. Exit Program. This will restore the original deleted Hosts file.

Step 8:

Please check Internet Explorer settings:
Open Internet Explorer - > Tools -> Internet Options ... -> click the Security tab -> click Internet icon -> press the Custom Level ,,, button.
Under ActiveX controls and plug-ins tick:
- Download signed ActiveX controls - Prompt
- Download unsigned ActiveX controls Disable
- Initialize and script ActiveX controls not marked as safe Disable
- Run ActiveX controls and plug-ins Enabled
- Script ActiveX controls marked safe for scripting Prompt

Run an online antivirus scan at:
http://housecall.antivirus.com/
Please make sure that AutoClean is checked.

Reboot and post a new HJT log.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image

#5 Faina

Faina
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:07:30 PM

Posted 06 November 2005 - 12:24 AM

You may want to print out these directions as the Internet will not be available. Please continue with the next step if you run into a problem with the current one. Just be sure to let us know what the problem was when you reply.

You have two nasty infections.

Disable or uninstall SPYWARE DOCTOR. It may interfere with the fix. You will enable it or reinstall it later.

This is very important ! Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail. (Steps 1 - 6)

Please make sure that you can view all hidden files:
A. On the Tools menu in Windows Explorer, click Folder Options.
B. Click the View tab.
C. Under Hidden files and folders, click Show hidden files and folders.
D. Uncheck Hide extensions for known filetypes and Hide protected operating system files.
How to see hidden files in Windows

Please download About:Buster from here: About:Buster Download. Once it is downloaded extract it to
c:\aboutbuster. We will use that program later in this process. Don't use it yet.

Download Ad-aware SE: here
Install it. When you get the last screen, with the "Finish" button and 3 options, uncheck those three items.
Open AdAware and click the "Check for updates now" link. Close AdAware. Don't use it yet.

Step 1:

Press control-alt-delete to get into the task manager and end the follow processes if they exist:

JAVABQ32.EXE
IERD32.EXE
9002.TMP.EXE
9005.TMP.EXE


This is very important ! Internet Explorer should remain closed during the cleanup. If you open Internet Explorer the fix will fail. (Steps 1 - 6)

Step 2:
Run HijackThis!, press "Scan" and tick the boxes next to all these, close all other windows and browsers, then press "Fix Checked" button.

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\ueqlg.dll/sp.html#14044
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {46DF9E4E-6ABF-AF0F-CC5D-F83F52011A48} - blank (file missing)
O2 - BHO: Class - {84B595BB-1DC9-852C-6316-3392A8C5B814} - blank (file missing)
O2 - BHO: Class - {551449AB-9844-4A44-63DD-1711AF6EBB62} - C:\WINDOWS\SYSTEM\IPPL32.DLL

O4 - HKLM\..\Run: [IERD32.EXE] C:\WINDOWS\SYSTEM\IERD32.EXE
O4 - HKLM\..\Run: [9002.TMP] C:\WINDOWS\TEMP\9002.TMP.exe
O4 - HKLM\..\Run: [9005.TMP] C:\WINDOWS\TEMP\9005.TMP.exe
O4 - HKLM\..\Run: [9002.TMP.EXE] C:\WINDOWS\TEMP\9002.TMP.EXE
O4 - HKLM\..\Run: [9005.TMP.EXE] C:\WINDOWS\TEMP\9005.TMP.EXE
O4 - HKLM\..\RunServices: [NTQG32.EXE] C:\WINDOWS\SYSTEM\NTQG32.EXE /s
O4 - HKLM\..\RunServices: [MSPS32.EXE] C:\WINDOWS\MSPS32.EXE /s
O4 - HKLM\..\RunServices: [APIEV32.EXE] C:\WINDOWS\APIEV32.EXE /s
O4 - HKLM\..\RunServices: [ATLYQ32.EXE] C:\WINDOWS\SYSTEM\ATLYQ32.EXE /s
O4 - HKLM\..\RunServices: [ADDXO.EXE] C:\WINDOWS\SYSTEM\ADDXO.EXE /s
O4 - HKLM\..\RunServices: [APPGS32.EXE] C:\WINDOWS\SYSTEM\APPGS32.EXE /s
O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s
O4 - HKLM\..\RunServices: [ATLWM32.EXE] C:\WINDOWS\SYSTEM\ATLWM32.EXE /s
O4 - HKLM\..\RunServices: [SDKQD32.EXE] C:\WINDOWS\SDKQD32.EXE /s
O4 - HKLM\..\RunServices: [CRFP.EXE] C:\WINDOWS\CRFP.EXE /s
O4 - HKLM\..\RunServices: [NETTS32.EXE] C:\WINDOWS\NETTS32.EXE /s
O4 - HKLM\..\RunServices: [APIRR32.EXE] C:\WINDOWS\SYSTEM\APIRR32.EXE /s
O4 - HKLM\..\RunServices: [APIIX.EXE] C:\WINDOWS\SYSTEM\APIIX.EXE /s
O4 - HKLM\..\RunServices: [NETSB32.EXE] C:\WINDOWS\SYSTEM\NETSB32.EXE /s
O4 - HKLM\..\RunServices: [APIIQ.EXE] C:\WINDOWS\SYSTEM\APIIQ.EXE /s
O4 - HKLM\..\RunServices: [IPXW32.EXE] C:\WINDOWS\SYSTEM\IPXW32.EXE /s
O4 - HKLM\..\RunServices: [MFCND32.EXE] C:\WINDOWS\SYSTEM\MFCND32.EXE /s
O4 - HKLM\..\RunServices: [MSSS.EXE] C:\WINDOWS\SYSTEM\MSSS.EXE /s
O4 - HKLM\..\RunServices: [APIRM.EXE] C:\WINDOWS\SYSTEM\APIRM.EXE /s
O4 - HKLM\..\RunServices: [JAVABQ32.EXE] C:\WINDOWS\SYSTEM\JAVABQ32.EXE /s


Step 3:
Reboot your computer into Safe Mode.

I now need you to delete the following files:

C:\WINDOWS\ueqlg.dll <-- this file
C:\WINDOWS\SYSTEM\IPPL32.DLL <-- this file

C:\WINDOWS\SYSTEM\IERD32.EXE <-- this file
C:\WINDOWS\TEMP\9002.TMP.exe <-- this file
C:\WINDOWS\TEMP\9005.TMP.exe <-- this file
C:\WINDOWS\TEMP\9002.TMP.EXE <-- this file
C:\WINDOWS\TEMP\9005.TMP.EXE <-- this file
C:\WINDOWS\SYSTEM\NTQG32.EXE <-- this file
C:\WINDOWS\MSPS32.EXE <-- this file
C:\WINDOWS\APIEV32.EXE <-- this file
C:\WINDOWS\SYSTEM\ATLYQ32.EXE <-- this file
C:\WINDOWS\SYSTEM\ADDXO.EXE <-- this file
C:\WINDOWS\SYSTEM\APPGS32.EXE <-- this file
C:\WINDOWS\IPFL.EXE <-- this file
C:\WINDOWS\SYSTEM\ATLWM32.EXE <-- this file
C:\WINDOWS\SDKQD32.EXE <-- this file
C:\WINDOWS\CRFP.EXE <-- this file
C:\WINDOWS\NETTS32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIRR32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIIX.EXE <-- this file
C:\WINDOWS\SYSTEM\NETSB32.EXE <-- this file
C:\WINDOWS\SYSTEM\APIIQ.EXE <-- this file
C:\WINDOWS\SYSTEM\IPXW32.EXE <-- this file
C:\WINDOWS\SYSTEM\MFCND32.EXE <-- this file
C:\WINDOWS\SYSTEM\MSSS.EXE <-- this file
C:\WINDOWS\SYSTEM\APIRM.EXE <-- this file
C:\WINDOWS\SYSTEM\JAVABQ32.EXE <-- this file

If you get an error when deleting a file, right click on the file and check to see if the read only attribute is checked. if it is, uncheck it and try again.

Step 4:

This is the step where we will use About:Buster that you had downloaded previously.

Navigate to the c:\aboutbuster directory and double-click on aboutbuster.exe When the tool is open press the OK button, then the Start button, then the OK button, and then finally the Yes button. It will start scanning your computer for files. If it asks if you would like to do a second pass, allow it to do so.

When it completed move on to step 5.

Step 5:

Run AdAware again, press the "Start" button, uncheck "Scan for negligible risk entries" and "Search fo low risk threads", select "Perform full system scan" and press "Next". Let AdAware remove anything it finds.

Step 6:

Clean out temporary and Temporary Internet Files. Go to Start -> Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

Temporary Files
Temporary Internet Files
Recycle Bin

Step 7:
Reboot your computer back to normal mode:

[*]Download the Hoster from here. Press Restore Original Hosts and press OK. Exit Program. This will restore the original deleted Hosts file.

Step 8:

Please check Internet Explorer settings:
Open Internet Explorer - > Tools -> Internet Options ... -> click the Security tab -> click Internet icon -> press the Custom Level ,,, button.
Under ActiveX controls and plug-ins tick:
- Download signed ActiveX controls - Prompt
- Download unsigned ActiveX controls Disable
- Initialize and script ActiveX controls not marked as safe Disable
- Run ActiveX controls and plug-ins Enabled
- Script ActiveX controls marked safe for scripting Prompt

Run an online antivirus scan at:
http://housecall.antivirus.com/
Please make sure that AutoClean is checked.

Reboot and post a new HJT log.



The about:blank issue is gone. My new Hijackthis log is below. If you still see any issues please let me know.
Also I would like to know how my computer became infected, since I run ZoneAlarm firewall all the time.

Thanks for your help again


Logfile of HijackThis v1.99.1
Scan saved at 11:19:05 PM, on 11/5/05
Platform: Windows 98 Gold (Win9x 4.10.1998)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\ATI2EVAE.EXE
C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\AOL COMPUTER CHECK-UP\ACCAGNT.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\ZONE LABS\ZONEALARM\ZLCLIENT.EXE
C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE
C:\WINSTALL.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\FAINADATA\HIJACKTHIS\HIJACKTHIS1\HIJACKTHIS.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =
O2 - BHO: PCTools Browser Monitor - {B56A7D7D-6927-48C8-A975-17DF180C71AC} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O2 - BHO: PCTools Site Guard - {5C8B2A36-3DB1-42A4-A3CB-D426709BBFEB} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDSG.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [cploader.exe] C:\WINDOWS\SYSTEM\cploader.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\RunServices: [ATIPOLAB] ati2evae.exe
O4 - HKLM\..\RunServices: [TrueVector] C:\WINDOWS\SYSTEM\ZONELABS\VSMON.EXE -service
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s
O4 - HKLM\..\RunServices: [AOLCC] "C:\Program Files\AOL Computer Check-Up\ACCAgnt.exe" /startup
O4 - HKCU\..\Run: [Spyware Doctor] "C:\FAINADATA\HIJACKTHIS\SPYWARE DOCTOR\SPYWARE DOCTOR\SWDOCTOR.EXE" /Q
O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O4 - Startup: Event Reminder.lnk = C:\PMG4\PMREMIND.EXE
O8 - Extra context menu item: Get It With Kontiki - res://C:\PROGRAM FILES\KONTIKI\BIN\BH309190.DLL/201
O8 - Extra context menu item: &AIM Search - res://C:\PROGRAM FILES\AIM TOOLBAR\AIMBAR.DLL/aimsearch.htm
O8 - Extra context menu item: &AOL Toolbar search - res://C:\PROGRAM FILES\AOL TOOLBAR\TOOLBAR.DLL/SEARCH.HTML
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\SYSTEM\MSJAVA.DLL
O9 - Extra button: MktBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra 'Tools' menuitem: MarketBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - (no file)
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\FAINAD~1\HIJACK~1\SPYWAR~1\SPYWAR~1\TOOLS\IESDPB.DLL
O9 - Extra button: WeatherBug - {AF6CABAB-61F9-4f12-A198-B7D41EF1CB52} - C:\Program Files\AWS\WeatherBug\Weather.exe (file missing) (HKCU)
O10 - Unknown file in Winsock LSP: c:\progra~1\aventail\connect\asdns.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {B24F0664-7DDA-40B6-B38C-A4FD68DE8685} (CentraDownloaderCtl Class) - http://prod1.centra.com/SiteRoots/main/Ins...aDownloader.cab
O16 - DPF: {70BA88C8-DAE8-4CE9-92BB-979C4A75F53B} - https://www.gamespyid.com/alaunch.cab
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} (Groove Control) - http://www.nick.com/common/groove/gx/GrooveAX27.cab
O16 - DPF: {1663ed61-23eb-11d2-b92f-008048fdd814} (MeadCo ScriptX Advanced) - http://www.stonyfield.com/coupons/scriptX/smsx.cab
O16 - DPF: {04E214E5-63AF-4236-83C6-A7ADCBF9BD02} (HouseCall Control) - http://housecall60.trendmicro.com/housecall/xscan60.cab
O17 - HKLM\System\CCS\Services\VxD\MSTCP: NameServer = 85.255.114.76,85.255.112.136

#6 Daisuke

Daisuke

    Cleaner on Duty


  • Members
  • 5,575 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Romania
  • Local time:06:30 PM

Posted 06 November 2005 - 05:17 AM

Download smitRem.exe and save the file to your desktop.
Double click on the file to extract it to it's own folder on the desktop.

Please download the trial version of Ewido Security Suite here:
http://www.ewido.net/en/download/

Please read Ewido Setup Instructions
Install it, and update the definitions to the newest files. Do NOT run a scan yet.

If you have not already installed Ad-Aware SE 1.06, follow these download and setup instructions, otherwise, check for updates:
Ad-Aware SE Setup
Don't run it yet!

Next, please reboot your computer in SafeMode by doing the following:
  • Restart your computer
  • After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
  • Instead of Windows loading as normal, a menu should appear
  • Select the first option, to run Windows in Safe Mode.
Now scan with HJT and place a checkmark next to each of the following items and click FIX CHECKED:

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page =

O4 - HKLM\..\RunServices: [IPFL.EXE] C:\WINDOWS\IPFL.EXE /s

O4 - HKCU\..\Run: [Windows installer] C:\winstall.exe


Fix these too, if you didn't install MarketBrowser yourself.
O9 - Extra button: MktBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy
O9 - Extra 'Tools' menuitem: MarketBrowser - {17A27031-71FC-11d4-815C-005004D0F1FA} - C:\PROGRAM FILES\MARKETBROWSER\LMT\MarketBrowser_Launch.xpy


Close HiJackThis.

Delete this folder if you fixed the two MarketBrowser entries::
C:\PROGRAM FILES\MARKETBROWSER\ <-- this folder

Open the smitRem folder, then double click the RunThis.bat file to start the tool. Follow the prompts on screen.
Wait for the tool to complete and disk cleanup to finish.

The tool will create a log named smitfiles.txt in the root of your drive, eg; Local Disk C: or partition where your operating system is installed. Please post that log along with all others requested in your next reply.

Open Ad-aware and do a full scan. Remove all it finds.

Run Ewido:
  • Click on scanner
  • Click on Complete System Scan and the scan will begin.
  • NOTE: During some scans with ewido it is finding cases of false positives.
  • You will need to step through the process of cleaning files one-by-one.
  • If ewido detects a file you KNOW to be legitimate, select none as the action.
  • DO NOT select "Perform action on all infections"
  • If you are unsure of any entry found select none for now.
  • When the scan is finished, click the Save report button at the bottom of the screen.
  • Save the report to your desktop
Close Ewido

Next go to Control Panel click Display > Desktop > Customize Desktop > Web > Uncheck "Security Info" if present.

Remove the check by "View my Active desktop as a web page".
Click OK then Apply and OK.

Reboot back into Windows

Click start>run and type command

Type:

copy c:\windows\system\wininet.dll c:\windows\desktop

Reboot. Scan the desktop folder with eTrust Web Scanner. When done, make sure the box is check for wininet.dll and click cure.

Reboot to command prompt and delete system\wininet and oleadm (oleext), then copy clean wininet from desktop.

del c:\windows\system\wininet.dll

del c:\windows\system\oleadm.dll (oleext.dll)

copy c:\windows\desktop\wininet.dll c:\windows\system


Post a new HijackThis Log, the contents of smitfiles.txt and the Ewido Log by using Add Reply.
Everyday is virus day. Do you know where your recovery CDs are ?
Did you create them yet ?

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users