Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

HJT Log, Attend to ASAP please


  • Please log in to reply
14 replies to this topic

#1 CPJC

CPJC

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 27 October 2004 - 07:43 PM

Logfile of HijackThis v1.98.2
Scan saved at 01:14:12, on 28/10/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\IGFXTRAY.EXE
C:\WINDOWS\SYSTEM\HKCMD.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\EWXNEUOY.EXE
C:\WINDOWS\TEMP\YGQUTGY.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\TEMP\JNLW.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\TEMP\AEMVJSOEX.EXE
C:\WINDOWS\TEMP\74OS.EXE
C:\WINDOWS\TEMP\9W.EXE
C:\WINDOWS\TEMP\WCMDNF218.EXE
C:\WINDOWS\TEMP\EVK7EAWZ.EXE
C:\WINDOWS\TEMP\QMD.EXE
C:\WINDOWS\TEMP\V.EXE
C:\WINDOWS\TEMP\GQXU.EXE
C:\WINDOWS\TEMP\S7VNJGYHD.EXE
C:\WINDOWS\TEMP\3DO.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\WINDOWS\TEMP\YGQUTGY.EXE
C:\WINDOWS\TEMP\JNLW.EXE
C:\WINDOWS\TEMP\AEMVJSOEX.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\TEMP\QMD.EXE
C:\WINDOWS\TEMP\74OS.EXE
C:\WINDOWS\TEMP\V.EXE
C:\WINDOWS\TEMP\EVK7EAWZ.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\WINDOWS\TEMP\GQXU.EXE
C:\WINDOWS\TEMP\9W.EXE
C:\WINDOWS\TEMP\WCMDNF218.EXE
C:\WINDOWS\TEMP\S7VNJGYHD.EXE
C:\WINDOWS\TEMP\3DO.EXE
C:\WINDOWS\TEMP\R5VPD.EXE
C:\WINDOWS\TEMP\UVMUWO.EXE
C:\WINDOWS\TEMP\ND0I.EXE
C:\WINDOWS\TEMP\IHCZR.EXE
C:\WINDOWS\TEMP\M5.EXE
C:\WINDOWS\TEMP\E.EXE
C:\WINDOWS\TEMP\XEKWND.EXE
C:\PROGRAM FILES\WIN COMM\WINCOMM.EXE
C:\PROGRAM FILES\COMMON FILES\SEARCHUPGRADER\SEARCHUPGRADER.EXE
C:\WINDOWS\TEMP\QC.EXE
C:\WINDOWS\TEMP\OEPVO8I.EXE
C:\WINDOWS\TEMP\UONRL4OSC.EXE
C:\WINDOWS\TEMP\LMDXEJ.EXE
C:\WINDOWS\TEMP\H.EXE
C:\PROGRAM FILES\WIN COMM\WINLOCK.EXE
C:\WINDOWS\SYSTEM\SECUR323.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
C:\WINDOWS\APPLICATION DATA\TDHE.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\WINDOWS\SYSTEM\LUR22B.EXE
C:\WINDOWS\SYSTEM\GRXE.EXE
C:\PROGRAM FILES\REALVNC\WINVNC\WINVNC.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\TEMP\RAR$EX09.463\HIJACKTHIS.EXE
C:\WINDOWS\NOTEPAD.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer,SearchURL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://super-spider.com/sp.htm?id=11034
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://win-eto.com/hp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\TEMP\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = file://C:\WINDOWS\TEMP\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\WINDOWS\TEMP\sp.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://win-eto.com/hp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R3 - URLSearchHook: (no name) - {20EC3D2D-33C1-4C9D-BC37-C2D500688DA2} - C:\PROGRAM FILES\TV MEDIA\TVMBHO.DLL
F1 - win.ini: run=C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O2 - BHO: (no name) - {467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E} - C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
O3 - Toolbar: &Search - {3F5A62E2-51F2-11D3-A075-CC7364CAE42A} - C:\WINDOWS\SYSTEM\JFI.DLL
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\WINDOWS\DOWNLOADED PROGRAM FILES\YCOMP5_3_16_0.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: (no name) - {0E1230F8-EA50-42A9-983C-D22ABC2EED3B} - (no file)
O3 - Toolbar: Band Class - {C5183ABC-EB6E-4E05-B8C9-500A16B6CF94} - C:\PROGRAM FILES\SEP\SEP.DLL
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [winupd] C:\WINDOWS\SYSTEM\winupd.exe
O4 - HKLM\..\Run: [uukuohar] C:\WINDOWS\SYSTEM\ewxneuoy.exe
O4 - HKLM\..\Run: [pnpsvc_lock] C:\WINDOWS\SYSTEM\375671.EXE
O4 - HKLM\..\Run: [Ygqutgy] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKLM\..\Run: [Jnlw] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [74os] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [9w] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [Evk7eawz] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Qmd] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [V] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Gqxu] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [S7VNJGYHD] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [Windows SyncroAd] C:\PROGRAM FILES\WINDOWS SYNCROAD\SYNCROAD.EXE
O4 - HKLM\..\Run: [WebRebates0] "C:\PROGRAM FILES\WEB_REBATES\WebRebates0.exe"
O4 - HKLM\..\Run: [Ygqutgy.exe] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [Jnlw.exe] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX.EXE] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [Qmd.exe] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [74os.exe] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [V.exe] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Evk7eawz.exe] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Gqxu.exe] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [9w.exe] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218.EXE] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [S7VNJGYHD.EXE] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do.exe] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [R5vpd.exe] C:\WINDOWS\TEMP\R5VPD.EXE
O4 - HKLM\..\Run: [Uvmuwo.exe] C:\WINDOWS\TEMP\UVMUWO.EXE
O4 - HKLM\..\Run: [Nd0i.exe] C:\WINDOWS\TEMP\ND0I.EXE
O4 - HKLM\..\Run: [Ihczr.exe] C:\WINDOWS\TEMP\IHCZR.EXE
O4 - HKLM\..\Run: [M5.exe] C:\WINDOWS\TEMP\M5.EXE
O4 - HKLM\..\Run: [E.exe] C:\WINDOWS\TEMP\E.EXE
O4 - HKLM\..\Run: [Xekwnd.exe] C:\WINDOWS\TEMP\XEKWND.EXE
O4 - HKLM\..\Run: [Win Comm] C:\PROGRAM FILES\WIN COMM\WINCOMM.EXE
O4 - HKLM\..\Run: [SearchUpgrader] C:\Program Files\Common files\SearchUpgrader\SearchUpgrader.exe
O4 - HKLM\..\Run: [Qc.exe] C:\WINDOWS\TEMP\QC.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\OfnVO.exe
O4 - HKLM\..\Run: [Oepvo8i.exe] C:\WINDOWS\TEMP\OEPVO8I.EXE
O4 - HKLM\..\Run: [UONRL4OSC.EXE] C:\WINDOWS\TEMP\UONRL4OSC.EXE
O4 - HKLM\..\Run: [Lmdxej.exe] C:\WINDOWS\TEMP\LMDXEJ.EXE
O4 - HKLM\..\Run: [H.exe] C:\WINDOWS\TEMP\H.EXE
O4 - HKLM\..\Run: [44eed76354fc] C:\WINDOWS\SYSTEM\SECUR323.exe
O4 - HKLM\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKCU\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - HKCU\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKCU\..\RunServices: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\RunServices: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\RunServices: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\RunServices: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - HKCU\..\RunServices: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Web Rebates - file://C:\PROGRAM FILES\WEB_REBATES\Sy1150\Tp1150\scri1150a.htm
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: SideFind - {10E42047-DEB9-4535-A118-B3F6EC39B807} - C:\PROGRAM FILES\SIDEFIND\SIDEFIND.DLL
O9 - Extra button: (no name) - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O9 - Extra 'Tools' menuitem: MaxSpeed - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O15 - Trusted Zone: *.greg-search.com
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.com/...s/yinst0401.cab
O16 - DPF: {EF99BD32-C1FB-11D2-892F-0090271D4F88} (Yahoo! Companion) - http://us.dl1.yimg.com/download.companion....bio5_3_16_0.cab
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://imgfarm.com/images/nocache/funwebpr...etup1.0.0.8.cab
O16 - DPF: {C3DFA998-A486-11D4-AA25-00C04F72DAEB} (MSN Photo Upload Tool) - http://sc.groups.msn.com/controls/PhotoUC/MsnPUpld.cab
O16 - DPF: {11010101-1001-1111-1000-110112345678} - ms-its:mhtml:file://c:\nosuch.mht!http://69.50.173.252/coopto.chm::/wintbl32.exe
O16 - DPF: {12398DD6-40AA-4C40-A4EC-A42CFC0DE797} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab28578.cab
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab28578.cab
O16 - DPF: {AD688740-5246-40C3-AF27-090006046834} - http://www.xpehbam.biz/s/load.exe
O16 - DPF: {FF65677A-8977-48CA-916A-DFF81B037DF3} (WMService Class) - http://download.overpro.com/WildApp.cab
O16 - DPF: {386A771C-E96A-421F-8BA7-32F1B706892F} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CC} - http://direct.data-line.us/gbn1343.exe
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CD} - http://direct.data-line.us/gba208.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/17bbc2bd96ec8f...ip/RdxIE601.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://messenger.zone.msn.com/binary/ZIntro.cab30149.cab
O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab30149.cab
O16 - DPF: {E6187999-9FEC-46A1-A20F-F4CA977D5643} (ZoneChess Object) - http://messenger.zone.msn.com/binary/Chess.cab30149.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-download.com/MediaTicketsInstaller.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab31267.cab
O16 - DPF: ppctlcab - http://www.pestscan.com/scanner/ppctlcab.cab
O16 - DPF: {2FC9A21E-2069-4E47-8235-36318989DB13} (PPSDKActiveXScanner.MainScreen) - http://www.pestscan.com/scanner/axscanner.cab
O16 - DPF: {AD7FAFB0-16D6-40C3-AF27-585D6E6453FD} (loader Class) - http://juicyland.com/cab/loader.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_file.php...93d90b6f3b1da5e
O18 - Filter: text/html - (no CLSID) - (no file)
O18 - Filter: text/plain - (no CLSID) - (no file)
O19 - User stylesheet: (file missing)

BC AdBot (Login to Remove)

 


#2 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 28 October 2004 - 09:29 AM

Please follow these steps in order to clean your computer of Malware which can include Viruses, Trojans, Worms, Spyware, Hijackers and Dialers.

Step 1:
Download Spybot and Adaware from the following locations and install them. You should run both programs and clean up what it finds. This is to gaurantee that you find the most malware you can installed on your computer.

Before running the scans on both programs, it is mandatory that you update the programs. There are update options in each program when you run them.

Spybot

Ad-aware

If you would like to learn more about how to use these two programs with the proper settings you can read the tutorials below:

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer.

Using Spybot - Search & Destroy to remove Spyware, Malware, & Hijackers from Your Computer.


When you scan with both programs, fix everything that it finds.

When you are done with the scan and fixing the items. Please continue with the next step.

Step 2:

It is important that you run Spybot and Adaware before you proceed with this step. Fixing enties with Hijackthis may leave behind unwanted files on your computer if the previous step was not done first.

Create a directory on your hardrive to save HijackThis.exe. A directory like c:\hijackthis. If you do not do this, you will not be able to use the backup/restore features.

Download HijackThis from:

HijackThis Download Site

Save this file into the directory you made previously and then run the program. Click on the Scan button and when it is finished click on the Save Log button. A Notepad window will open with the contents of this log. Click on Edit then click on Select all. Then click on Edit and then Click on Copy.

Create a reply to this post here, and right click in message area and select paste to paste the log into the post.

Someone will reply to you after reading this post. DO NOT fix any entries unless you understand what you are doing.

To see a tutorial on using HijackThis you can click on the link below:

Using HijackThis to Remove Spyware, Browser Hijackers, and Dialers

#3 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 28 October 2004 - 02:29 PM

Logfile of HijackThis v1.98.2
Scan saved at 01:14:12, on 28/10/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\IGFXTRAY.EXE
C:\WINDOWS\SYSTEM\HKCMD.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\EWXNEUOY.EXE
C:\WINDOWS\TEMP\YGQUTGY.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\TEMP\JNLW.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\TEMP\AEMVJSOEX.EXE
C:\WINDOWS\TEMP\74OS.EXE
C:\WINDOWS\TEMP\9W.EXE
C:\WINDOWS\TEMP\WCMDNF218.EXE
C:\WINDOWS\TEMP\EVK7EAWZ.EXE
C:\WINDOWS\TEMP\QMD.EXE
C:\WINDOWS\TEMP\V.EXE
C:\WINDOWS\TEMP\GQXU.EXE
C:\WINDOWS\TEMP\S7VNJGYHD.EXE
C:\WINDOWS\TEMP\3DO.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\WINDOWS\TEMP\YGQUTGY.EXE
C:\WINDOWS\TEMP\JNLW.EXE
C:\WINDOWS\TEMP\AEMVJSOEX.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\TEMP\QMD.EXE
C:\WINDOWS\TEMP\74OS.EXE
C:\WINDOWS\TEMP\V.EXE
C:\WINDOWS\TEMP\EVK7EAWZ.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\WINDOWS\TEMP\GQXU.EXE
C:\WINDOWS\TEMP\9W.EXE
C:\WINDOWS\TEMP\WCMDNF218.EXE
C:\WINDOWS\TEMP\S7VNJGYHD.EXE
C:\WINDOWS\TEMP\3DO.EXE
C:\WINDOWS\TEMP\R5VPD.EXE
C:\WINDOWS\TEMP\UVMUWO.EXE
C:\WINDOWS\TEMP\ND0I.EXE
C:\WINDOWS\TEMP\IHCZR.EXE
C:\WINDOWS\TEMP\M5.EXE
C:\WINDOWS\TEMP\E.EXE
C:\WINDOWS\TEMP\XEKWND.EXE
C:\PROGRAM FILES\WIN COMM\WINCOMM.EXE
C:\PROGRAM FILES\COMMON FILES\SEARCHUPGRADER\SEARCHUPGRADER.EXE
C:\WINDOWS\TEMP\QC.EXE
C:\WINDOWS\TEMP\OEPVO8I.EXE
C:\WINDOWS\TEMP\UONRL4OSC.EXE
C:\WINDOWS\TEMP\LMDXEJ.EXE
C:\WINDOWS\TEMP\H.EXE
C:\PROGRAM FILES\WIN COMM\WINLOCK.EXE
C:\WINDOWS\SYSTEM\SECUR323.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
C:\WINDOWS\APPLICATION DATA\TDHE.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\WINDOWS\SYSTEM\LUR22B.EXE
C:\WINDOWS\SYSTEM\GRXE.EXE
C:\PROGRAM FILES\REALVNC\WINVNC\WINVNC.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\TEMP\RAR$EX09.463\HIJACKTHIS.EXE
C:\WINDOWS\NOTEPAD.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer,SearchURL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://super-spider.com/sp.htm?id=11034
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://win-eto.com/hp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\TEMP\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = file://C:\WINDOWS\TEMP\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\WINDOWS\TEMP\sp.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://win-eto.com/hp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R3 - URLSearchHook: (no name) - {20EC3D2D-33C1-4C9D-BC37-C2D500688DA2} - C:\PROGRAM FILES\TV MEDIA\TVMBHO.DLL
F1 - win.ini: run=C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O2 - BHO: (no name) - {467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E} - C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
O3 - Toolbar: &Search - {3F5A62E2-51F2-11D3-A075-CC7364CAE42A} - C:\WINDOWS\SYSTEM\JFI.DLL
O3 - Toolbar: Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\WINDOWS\DOWNLOADED PROGRAM FILES\YCOMP5_3_16_0.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: (no name) - {0E1230F8-EA50-42A9-983C-D22ABC2EED3B} - (no file)
O3 - Toolbar: Band Class - {C5183ABC-EB6E-4E05-B8C9-500A16B6CF94} - C:\PROGRAM FILES\SEP\SEP.DLL
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [winupd] C:\WINDOWS\SYSTEM\winupd.exe
O4 - HKLM\..\Run: [uukuohar] C:\WINDOWS\SYSTEM\ewxneuoy.exe
O4 - HKLM\..\Run: [pnpsvc_lock] C:\WINDOWS\SYSTEM\375671.EXE
O4 - HKLM\..\Run: [Ygqutgy] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKLM\..\Run: [Jnlw] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [74os] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [9w] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [Evk7eawz] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Qmd] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [V] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Gqxu] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [S7VNJGYHD] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [Windows SyncroAd] C:\PROGRAM FILES\WINDOWS SYNCROAD\SYNCROAD.EXE
O4 - HKLM\..\Run: [WebRebates0] "C:\PROGRAM FILES\WEB_REBATES\WebRebates0.exe"
O4 - HKLM\..\Run: [Ygqutgy.exe] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [Jnlw.exe] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX.EXE] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [Qmd.exe] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [74os.exe] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [V.exe] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Evk7eawz.exe] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Gqxu.exe] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [9w.exe] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218.EXE] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [S7VNJGYHD.EXE] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do.exe] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [R5vpd.exe] C:\WINDOWS\TEMP\R5VPD.EXE
O4 - HKLM\..\Run: [Uvmuwo.exe] C:\WINDOWS\TEMP\UVMUWO.EXE
O4 - HKLM\..\Run: [Nd0i.exe] C:\WINDOWS\TEMP\ND0I.EXE
O4 - HKLM\..\Run: [Ihczr.exe] C:\WINDOWS\TEMP\IHCZR.EXE
O4 - HKLM\..\Run: [M5.exe] C:\WINDOWS\TEMP\M5.EXE
O4 - HKLM\..\Run: [E.exe] C:\WINDOWS\TEMP\E.EXE
O4 - HKLM\..\Run: [Xekwnd.exe] C:\WINDOWS\TEMP\XEKWND.EXE
O4 - HKLM\..\Run: [Win Comm] C:\PROGRAM FILES\WIN COMM\WINCOMM.EXE
O4 - HKLM\..\Run: [SearchUpgrader] C:\Program Files\Common files\SearchUpgrader\SearchUpgrader.exe
O4 - HKLM\..\Run: [Qc.exe] C:\WINDOWS\TEMP\QC.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\OfnVO.exe
O4 - HKLM\..\Run: [Oepvo8i.exe] C:\WINDOWS\TEMP\OEPVO8I.EXE
O4 - HKLM\..\Run: [UONRL4OSC.EXE] C:\WINDOWS\TEMP\UONRL4OSC.EXE
O4 - HKLM\..\Run: [Lmdxej.exe] C:\WINDOWS\TEMP\LMDXEJ.EXE
O4 - HKLM\..\Run: [H.exe] C:\WINDOWS\TEMP\H.EXE
O4 - HKLM\..\Run: [44eed76354fc] C:\WINDOWS\SYSTEM\SECUR323.exe
O4 - HKLM\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKCU\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - HKCU\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKCU\..\RunServices: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\RunServices: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\RunServices: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\RunServices: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - HKCU\..\RunServices: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
O8 - Extra context menu item: Web Rebates - file://C:\PROGRAM FILES\WEB_REBATES\Sy1150\Tp1150\scri1150a.htm
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: SideFind - {10E42047-DEB9-4535-A118-B3F6EC39B807} - C:\PROGRAM FILES\SIDEFIND\SIDEFIND.DLL
O9 - Extra button: (no name) - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O9 - Extra 'Tools' menuitem: MaxSpeed - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O15 - Trusted Zone: *.greg-search.com
O16 - DPF: {30528230-99F7-4BB4-88D8-FA1D4F56A2AB} (YInstStarter Class) - http://us.dl1.yimg.com/download.yahoo.com/...s/yinst0401.cab
O16 - DPF: {EF99BD32-C1FB-11D2-892F-0090271D4F88} (Yahoo! Companion) - http://us.dl1.yimg.com/download.companion....bio5_3_16_0.cab
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://imgfarm.com/images/nocache/funwebpr...etup1.0.0.8.cab
O16 - DPF: {C3DFA998-A486-11D4-AA25-00C04F72DAEB} (MSN Photo Upload Tool) - http://sc.groups.msn.com/controls/PhotoUC/MsnPUpld.cab
O16 - DPF: {11010101-1001-1111-1000-110112345678} - ms-its:mhtml:file://c:\nosuch.mht!http://69.50.173.252/coopto.chm::/wintbl32.exe
O16 - DPF: {12398DD6-40AA-4C40-A4EC-A42CFC0DE797} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab28578.cab
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab28578.cab
O16 - DPF: {AD688740-5246-40C3-AF27-090006046834} - http://www.xpehbam.biz/s/load.exe
O16 - DPF: {FF65677A-8977-48CA-916A-DFF81B037DF3} (WMService Class) - http://download.overpro.com/WildApp.cab
O16 - DPF: {386A771C-E96A-421F-8BA7-32F1B706892F} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CC} - http://direct.data-line.us/gbn1343.exe
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CD} - http://direct.data-line.us/gba208.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/17bbc2bd96ec8f...ip/RdxIE601.cab
O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (ZoneIntro Class) - http://messenger.zone.msn.com/binary/ZIntro.cab30149.cab
O16 - DPF: {14B87622-7E19-4EA8-93B3-97215F77A6BC} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/Messe...nt.cab30149.cab
O16 - DPF: {E6187999-9FEC-46A1-A20F-F4CA977D5643} (ZoneChess Object) - http://messenger.zone.msn.com/binary/Chess.cab30149.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-download.com/MediaTicketsInstaller.cab
O16 - DPF: {BD393C14-72AD-4790-A095-76522973D6B8} (CBreakshotControl Class) - http://messenger.zone.msn.com/binary/Bankshot.cab31267.cab
O16 - DPF: ppctlcab - http://www.pestscan.com/scanner/ppctlcab.cab
O16 - DPF: {2FC9A21E-2069-4E47-8235-36318989DB13} (PPSDKActiveXScanner.MainScreen) - http://www.pestscan.com/scanner/axscanner.cab
O16 - DPF: {AD7FAFB0-16D6-40C3-AF27-585D6E6453FD} (loader Class) - http://juicyland.com/cab/loader.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_file.php...93d90b6f3b1da5e
O18 - Filter: text/html - (no CLSID) - (no file)
O18 - Filter: text/plain - (no CLSID) - (no file)
O19 - User stylesheet: (file missing)

#4 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 28 October 2004 - 02:50 PM

WOW...you got a lot of stuff in there :thumbsup:

I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button

R1 - HKCU\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://super-spider.com/sp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer,Search = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer,SearchURL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://super-spider.com/sp.htm?id=11034
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://win-eto.com/hp.htm?id=11034
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://7842.directwebsearch.net/search.php
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\TEMP\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = file://C:\WINDOWS\TEMP\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://super-spider.com/sp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\WINDOWS\TEMP\sp.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://7842.directwebsearch.net/search.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = http://win-eto.com/hp.htm?id=11034
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R3 - URLSearchHook: (no name) - {20EC3D2D-33C1-4C9D-BC37-C2D500688DA2} - C:\PROGRAM FILES\TV MEDIA\TVMBHO.DLL
F1 - win.ini: run=C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O2 - BHO: (no name) - {467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E} - C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
O3 - Toolbar: &Search - {3F5A62E2-51F2-11D3-A075-CC7364CAE42A} - C:\WINDOWS\SYSTEM\JFI.DLL
O3 - Toolbar: (no name) - {0E1230F8-EA50-42A9-983C-D22ABC2EED3B} - (no file)
O3 - Toolbar: Band Class - {C5183ABC-EB6E-4E05-B8C9-500A16B6CF94} - C:\PROGRAM FILES\SEP\SEP.DLL
O4 - HKLM\..\Run: [winupd] C:\WINDOWS\SYSTEM\winupd.exe
O4 - HKLM\..\Run: [uukuohar] C:\WINDOWS\SYSTEM\ewxneuoy.exe
O4 - HKLM\..\Run: [pnpsvc_lock] C:\WINDOWS\SYSTEM\375671.EXE
O4 - HKLM\..\Run: [Ygqutgy] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKLM\..\Run: [Jnlw] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [74os] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [9w] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [Evk7eawz] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Qmd] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [V] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Gqxu] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [S7VNJGYHD] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [Windows SyncroAd] C:\PROGRAM FILES\WINDOWS SYNCROAD\SYNCROAD.EXE
O4 - HKLM\..\Run: [WebRebates0] "C:\PROGRAM FILES\WEB_REBATES\WebRebates0.exe"
O4 - HKLM\..\Run: [Ygqutgy.exe] C:\WINDOWS\TEMP\YGQUTGY.EXE
O4 - HKLM\..\Run: [Jnlw.exe] C:\WINDOWS\TEMP\JNLW.EXE
O4 - HKLM\..\Run: [AEMVJSOEX.EXE] C:\WINDOWS\TEMP\AEMVJSOEX.EXE
O4 - HKLM\..\Run: [Qmd.exe] C:\WINDOWS\TEMP\QMD.EXE
O4 - HKLM\..\Run: [74os.exe] C:\WINDOWS\TEMP\74OS.EXE
O4 - HKLM\..\Run: [V.exe] C:\WINDOWS\TEMP\V.EXE
O4 - HKLM\..\Run: [Evk7eawz.exe] C:\WINDOWS\TEMP\EVK7EAWZ.EXE
O4 - HKLM\..\Run: [Gqxu.exe] C:\WINDOWS\TEMP\GQXU.EXE
O4 - HKLM\..\Run: [9w.exe] C:\WINDOWS\TEMP\9W.EXE
O4 - HKLM\..\Run: [WCMDNF218.EXE] C:\WINDOWS\TEMP\WCMDNF218.EXE
O4 - HKLM\..\Run: [S7VNJGYHD.EXE] C:\WINDOWS\TEMP\S7VNJGYHD.EXE
O4 - HKLM\..\Run: [3do.exe] C:\WINDOWS\TEMP\3DO.EXE
O4 - HKLM\..\Run: [R5vpd.exe] C:\WINDOWS\TEMP\R5VPD.EXE
O4 - HKLM\..\Run: [Uvmuwo.exe] C:\WINDOWS\TEMP\UVMUWO.EXE
O4 - HKLM\..\Run: [Nd0i.exe] C:\WINDOWS\TEMP\ND0I.EXE
O4 - HKLM\..\Run: [Ihczr.exe] C:\WINDOWS\TEMP\IHCZR.EXE
O4 - HKLM\..\Run: [M5.exe] C:\WINDOWS\TEMP\M5.EXE
O4 - HKLM\..\Run: [E.exe] C:\WINDOWS\TEMP\E.EXE
O4 - HKLM\..\Run: [Xekwnd.exe] C:\WINDOWS\TEMP\XEKWND.EXE
O4 - HKLM\..\Run: [SearchUpgrader] C:\Program Files\Common files\SearchUpgrader\SearchUpgrader.exe
O4 - HKLM\..\Run: [Qc.exe] C:\WINDOWS\TEMP\QC.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\OfnVO.exe
O4 - HKLM\..\Run: [Oepvo8i.exe] C:\WINDOWS\TEMP\OEPVO8I.EXE
O4 - HKLM\..\Run: [UONRL4OSC.EXE] C:\WINDOWS\TEMP\UONRL4OSC.EXE
O4 - HKLM\..\Run: [Lmdxej.exe] C:\WINDOWS\TEMP\LMDXEJ.EXE
O4 - HKLM\..\Run: [H.exe] C:\WINDOWS\TEMP\H.EXE
O4 - HKLM\..\Run: [44eed76354fc] C:\WINDOWS\SYSTEM\SECUR323.exe
O4 - HKLM\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKCU\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\Run: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O4 - HKCU\..\RunServices: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\RunServices: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\RunServices: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - HKCU\..\RunServices: [TV Media] C:\PROGRAM FILES\TV MEDIA\Tvm.exe
O8 - Extra context menu item: Web Rebates - file://C:\PROGRAM FILES\WEB_REBATES\Sy1150\Tp1150\scri1150a.htm
O9 - Extra button: SideFind - {10E42047-DEB9-4535-A118-B3F6EC39B807} - C:\PROGRAM FILES\SIDEFIND\SIDEFIND.DLL
O9 - Extra button: (no name) - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O9 - Extra 'Tools' menuitem: MaxSpeed - {120E090D-9136-4b78-8258-F0B44B4BD2AC} - C:\WINDOWS\SYSTEM\maxspeed.exe
O15 - Trusted Zone: *.greg-search.com
O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://imgfarm.com/images/nocache/funwebpr...etup1.0.0.8.cab
O16 - DPF: {11010101-1001-1111-1000-110112345678} - ms-its:mhtml:file://c:\nosuch.mht!http://69.50.173.252/coopto.chm::/wintbl32.exe
O16 - DPF: {12398DD6-40AA-4C40-A4EC-A42CFC0DE797} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {AD688740-5246-40C3-AF27-090006046834} - http://www.xpehbam.biz/s/load.exe
O16 - DPF: {FF65677A-8977-48CA-916A-DFF81B037DF3} (WMService Class) - http://download.overpro.com/WildApp.cab
O16 - DPF: {386A771C-E96A-421F-8BA7-32F1B706892F} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4...006_regular.cab
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CC} - http://direct.data-line.us/gbn1343.exe
O16 - DPF: {FFFF0003-0001-101A-A3C9-08002B23E0CD} - http://direct.data-line.us/gba208.exe
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/17bbc2bd96ec8f...ip/RdxIE601.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-download.com/MediaTicketsInstaller.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_file.php...93d90b6f3b1da5e
O18 - Filter: text/html - (no CLSID) - (no file)
O18 - Filter: text/plain - (no CLSID) - (no file)
O19 - User stylesheet: (file missing)
Reboot your computer into Safe Mode

Then delete these files or directories (Do not be concerned if they do not exist)

C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
C:\WINDOWS\SYSTEM\JFI.DLL
C:\PROGRAM FILES\SEP\SEP.DLL
C:\WINDOWS\SYSTEM\winupd.exe
C:\PROGRAM FILES\WINDOWS SYNCROAD\
C:\Program Files\Common files\SearchUpgrader\
C:\WINDOWS\SYSTEM\OfnVO.exe
C:\WINDOWS\SYSTEM\SECUR323.exe
C:\WINDOWS\SYSTEM\SERVICES\
C:\WINDOWS\Application Data\tdhe.exe
C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
C:\WINDOWS\Application Data\tdhe.exe
C:\PROGRAM FILES\TV MEDIA\
C:\PROGRAM FILES\WEB_REBATES\
C:\PROGRAM FILES\SIDEFIND\
C:\WINDOWS\SYSTEM\maxspeed.exe

Then clean out your Temp files and your Temporary Internet Files. Please do both steps:

Step 1:Delete Temp Files
To clean out your temp files, click on Start and then run, and type %temp% and press the ok button.

This should open up the temp directory that your machine uses. Please delete all files that are found there. If you get an error when deleting a file, skip that file and delete all the others. If you had trouble deleting a file, reboot into Safe Mode and follow this step again. You should now be able to delete all the files.

Step 2: Delete Temporary Internet Files
Now I want you to open up Internet Explorer, and click on the Tools menu and then Internet Options. At the General tab, which should be the first tab you are currently on, click on the Delete Files button and put a checkmark in Delete offline content. Then press the OK button. This may take quite a while, so do not be alarmed with how long it takes. When it is done, your Temporary Internet Files will now be deleted.

Reboot your computer to go back to normal mode and post a new log.

#5 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 30 October 2004 - 10:47 AM

Logfile of HijackThis v1.98.2
Scan saved at 16:44:13, on 30/10/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\IGFXTRAY.EXE
C:\WINDOWS\SYSTEM\HKCMD.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\WINDOWS ADTOOLS\WINRATCHET.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\SYSTEM\CYE0O.EXE
C:\WINDOWS\SYSTEM\OQDT0XMQ.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\PROGRAM FILES\REALVNC\WINVNC\WINVNC.EXE
C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE
C:\WINDOWS\NOTEPAD.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\PROGRAM FILES\WINRAR\WINRAR.EXE
C:\WINDOWS\TEMP\RAR$EX00.206\HIJACKTHIS.EXE

F1 - win.ini: run=C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O2 - BHO: (no name) - {467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E} - C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
O4 - HKLM\..\Run: [Sjybk.exe] C:\WINDOWS\TEMP\SJYBK.EXE
O4 - HKLM\..\Run: [DCACDGEJK.EXE] C:\WINDOWS\TEMP\DCACDGEJK.EXE
O4 - HKLM\..\Run: [Dvaja.exe] C:\WINDOWS\TEMP\DVAJA.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\Hcj2s6.exe
O4 - HKLM\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - HKCU\..\Run: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

#6 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 30 October 2004 - 01:05 PM

I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Reboot your computer into Safe Mode

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button

F1 - win.ini: run=C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O2 - BHO: (no name) - {467FAEB2-5F5B-4c81-BAE0-2A4752CA7F4E} - C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
O4 - HKLM\..\Run: [Sjybk.exe] C:\WINDOWS\TEMP\SJYBK.EXE
O4 - HKLM\..\Run: [DCACDGEJK.EXE] C:\WINDOWS\TEMP\DCACDGEJK.EXE
O4 - HKLM\..\Run: [Dvaja.exe] C:\WINDOWS\TEMP\DVAJA.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\Hcj2s6.exe
O4 - HKLM\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [romahere2] C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
O4 - HKCU\..\Run: [xpsystem] C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe

Then delete these files or directories (Do not be concerned if they do not exist)

C:\WINDOWS\SYSTEM\SERVICES\ <-- Delete this directory, not the file.
C:\WINDOWS\SYSTEM\UTRRPD~1.DLL
C:\PROGRAM FILES\WINDOWS ADTOOLS\
C:\WINDOWS\TEMP\SJYBK.EXE
C:\WINDOWS\TEMP\DCACDGEJK.EXE
C:\WINDOWS\TEMP\DVAJA.EXE
C:\WINDOWS\SYSTEM\Hcj2s6.exe
C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
C:\WINDOWS\SYSTEM\4E7WB6HDZ3CHL3.EXE
C:\WINDOWS\SYSTEM\SERVICES\MSXMIDI.EXE
O4 - HKCU\..\Run: [Iass] C:\WINDOWS\Application Data\tdhe.exe

Reboot your computer to go back to normal mode and post a new log.

#7 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 02 November 2004 - 07:29 AM

Logfile of HijackThis v1.98.2
Scan saved at 12:27:03, on 02/11/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\MESSENGER PLUS! 3\MSGPLUS.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\IGFXTRAY.EXE
C:\WINDOWS\SYSTEM\HKCMD.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\WINDOWS ADTOOLS\WINRATCHET.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\WINDOWS\SYSTEM\VCNXJB.EXE
C:\WINDOWS\SYSTEM\VCNXJB.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\PROGRAM FILES\ERRORGUARD\ERRORGUARD.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\TEMP\RAR$EX00.219\HIJACKTHIS.EXE
C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = file://C:\WINDOWS\TEMP\sp.html
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = file://C:\WINDOWS\TEMP\sp.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\WINDOWS\TEMP\sp.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,HomeOldSP = about:blank
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [Dvaja.exe] C:\WINDOWS\TEMP\DVAJA.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\UdwF0Ifu.exe
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe"
O4 - HKCU\..\Run: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe" /WinStart
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

#8 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 02 November 2004 - 09:23 AM

You are currently using hijackthis from a temp directory. This can cause problems. Please create a directory on your c: drive called c:\hijackthis and download and unzip hijackthis into that directory. Run the program from that directory from now on.

For a tutorial on how to use HijackThis please see the following link:

Using HijackThis to Remove Spyware, Browser Hijackers, and Dialers
------------

You have Messenger Plus installed. This program is known to install malware. I would advise that you remove this program from your computer. You can do this by going into Control Panel and Then Add/Remove programs and uninstalling Messenger Plus.You have Messenger Plus installed. This program is known to install malware. I would advise that you remove this program from your computer. You can do this by going into Control Panel and Then Add/Remove programs and uninstalling Messenger Plus.


-----------

Can you please zip and email the following files to grinler@yahoo.com:

C:\PROGRAM FILES\WINDOWS ADTOOLS\

When you email me, please include a link to this topic.

Thanks


-----------

You have a Peper infection

Download the removal tool :

Peper Removal Tool

! NOTE: YOU MUST BE ONLINE WHEN RUNNING IT and let is have access to pass the firewall.

!!! Please run this twice with a reboot in between.


----------


I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button

O4 - HKLM\..\Run: [Dvaja.exe] C:\WINDOWS\TEMP\DVAJA.EXE
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\UdwF0Ifu.exe
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE

Reboot your computer into Safe Mode

Then delete these files or directories (Do not be concerned if they do not exist)

C:\WINDOWS\TEMP\DVAJA.EXE
C:\WINDOWS\SYSTEM\UdwF0Ifu.exe
C:\PROGRAM FILES\WINDOWS ADTOOLS\

Reboot your computer to go back to normal mode and do the following:



Please follow these steps:

Step 1:

1. Click on Start, then Run and type msinfo32 and press the OK button.
2. Expand the Software Environment section.
3. Expand the System Hooks Section.
4. Look for the which may be listed As:

-Hook type: Window Procedure
-Hooked by: XXXXX.dll
-Application: RUNDLL32.EXE
-Dll path: C:\WINDOWS\SYSTEM\XXXXX.dll
-Application path: C:\WINDOWS\RUNDLL32.EXE

Where XXXXX..dll is the file name.

If you find that file, highlight it with your mouse and click on edit then copy to copy the filename.

Then post that filename with the information in the next step in a reply to this post.

5. Continue to Step 2.

Step 2:

1. Download: "StartDreck" from:

http://www.niksoft.at/download/startdreck.htm

2. Extract the file into c:\startdreck.

3. Navigate to c:\startdreck and double-click on Startdreck.exe

4. When the program opens click on the Config button.

5. Then click on the unmark all button.

6. Then put checkmarks in the following checkboxes:

Under Registry put a checkmark in the Run Keys checkbox.

Under System/Drivers put a check in the Running Proccess checkbox.

7. Press the OK button.

8. Press the Save button. Type in the location you want to save the log to, or use the defaults which will save the log into the directory you are running the program from. If you choose the defaults the filename for the log will be StartDreck.log.

9. Post a copy of the log as a reply to this post.

#9 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 02 November 2004 - 11:11 AM

StartDreck (build 2.1.7 public stable) - 2004-11-02 @ 16:09:51 (GMT +00:00)
Platform: Windows 98 SE (Win 4.10.2222 A)
Internet Explorer: 5.00.2614.3500
Logged in as Home P.C at O7M5K0

舞egistry
舞un Keys
翟urrent User
舞un
*msnmsgr="C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
舞unOnce
聞efault User
舞un
*msnmsgr="C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
舞unOnce
腿ocal Machine
舞un
*ScanRegistry=C:\WINDOWS\scanregw.exe /autorun
*TaskMonitor=C:\WINDOWS\taskmon.exe
*SystemTray=SysTray.Exe
*LoadPowerProfile=Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
*IgfxTray=C:\WINDOWS\SYSTEM\igfxtray.exe
*HotKeysCmds=C:\WINDOWS\SYSTEM\hkcmd.exe
*StillImageMonitor=C:\WINDOWS\SYSTEM\STIMON.EXE
*Gearbox="C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
*LoadQM=loadqm.exe
*TaskMates=c:\program files\taskmates\taskmates.exe
*LexStart=lexstart.exe
*QuickTime Task="C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
*TkBellExe="C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
*5FTC4JW4CFSYLG=C:\WINDOWS\SYSTEM\Xfvz.exe
*Windows AdTools=C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
+OptionalComponents
+IMAIL
*Installed=1
+MAPI
*NoChange=1
*Installed=1
+MAPI
*NoChange=1

#10 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 02 November 2004 - 12:34 PM

C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\Xfvz.exe
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe"
O4 - HKCU\..\Run: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe" /WinStart
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

Ive fixed most problems just want to know if theres anymore Please ignore Msn Plus i wud like to keep it.

#11 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 02 November 2004 - 12:56 PM

I want you to fix some of those entries. Please do the following:

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:

How to see hidden files in Windows

Run Hijackthis again, click scan, and Put a checkmark next to each of these. Then click the Fix button

O4 - HKLM\..\Run: [5FTC4JW4CFSYLG] C:\WINDOWS\SYSTEM\Xfvz.exe
O4 - HKLM\..\Run: [Windows AdTools] C:\PROGRAM FILES\WINDOWS ADTOOLS\WINADTOOLS.EXE

Reboot your computer into Safe Mode

Then delete these files or directories (Do not be concerned if they do not exist)

C:\WINDOWS\SYSTEM\Xfvz.exe
C:\PROGRAM FILES\WINDOWS ADTOOLS\

Reboot your computer to go back to normal mode and post a new log.

#12 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 02 November 2004 - 03:55 PM

Logfile of HijackThis v1.98.2
Scan saved at 20:53:40, on 02/11/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\PROGRAM FILES\MESSENGER PLUS! 3\MSGPLUS.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\TASKMON.EXE
C:\WINDOWS\SYSTEM\IGFXTRAY.EXE
C:\WINDOWS\SYSTEM\HKCMD.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\CONFSVR.EXE
C:\WINDOWS\LOADQM.EXE
C:\WINDOWS\SYSTEM\QTTASK.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\PROGRAM FILES\GEARBOX CONNECTION KIT\BIN\GBTASK.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.google.co.uk/
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\SYSTEM\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\SYSTEM\hkcmd.exe
O4 - HKLM\..\Run: [StillImageMonitor] C:\WINDOWS\SYSTEM\STIMON.EXE
O4 - HKLM\..\Run: [Gearbox] "C:\Program Files\Gearbox Connection Kit\bin\confsvr.exe"
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [TaskMates] c:\program files\taskmates\taskmates.exe
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe"
O4 - HKCU\..\Run: [MessengerPlus3] "C:\Program Files\Messenger Plus! 3\MsgPlus.exe" /WinStart
O4 - HKCU\..\Run: [msnmsgr] "C:\PROGRAM FILES\MSN MESSENGER\MSNMSGR.EXE" /background
O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE

#13 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 02 November 2004 - 07:16 PM

Log looks clean...great job!

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:
  • Disable and Enable System Restore. - If you are using Windows ME or XP then you should disable and reenable system restore to make sure there are no infected files found in a restore point.

    You can find instructions on how to enable and reenable system restore here:

    Managing Windows Millenium System Restore

    or

    Windows XP System Restore Guide

    Renable system restore with instructions from tutorial above

  • Make your Internet Explorer more secure - This can be done by following these simple instructions:
    • From within Internet Explorer click on the Tools menu and then click on Options.
    • Click once on the Security tab
    • Click once on the Internet icon so it becomes highlighted.
    • Click once on the Custom Level button.
      • Change the Download signed ActiveX controls to Prompt
      • Change the Download unsigned ActiveX controls to Disable
      • Change the Initialize and script ActiveX controls not marked as safe to Disable
      • Change the Installation of desktop items to Prompt
      • Change the Launching programs and files in an IFRAME to Prompt
      • Change the Navigate sub-frames across different domains to Prompt
      • When all these settings have been made, click on the OK button.
      • If it prompts you as to whether or not you want to save the settings, press the Yes button.
    • Next press the Apply button and then the OK to exit the Internet Properties page.
  • Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.

    See this link for a listing of some online & their stand-alone antivirus programs:

    Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.

  • Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is succeptible to being hacked and taken over. I am very serious about this and see it happen almost every day with my clients. Simply using a Firewall in its default configuration can lower your risk greatly.

    For a tutorial on Firewalls and a listing of some available ones see the link below:

    Understanding and Using Firewalls

  • Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

  • Install Spybot - Search and Destroy - Install and download Spybot - Search and Destroy with its TeaTimer option. This will provide realtime spyware & hijacker protection on your computer alongside your virus protection. You should also scan your computer with program on a regular basis just as you would an antivirus software.

    A tutorial on installing & using this product can be found here:

    Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers

  • Install Ad-Aware - Install and download Ad-Aware. ou should also scan your computer with program on a regular basis just as you would an antivirus software in conjunction with Spybot.

    A tutorial on installing & using this product can be found here:

    Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

    A tutorial on installing & using this product can be found here:

    Using SpywareBlaster to protect your computer from Spyware and Malware

  • Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Glad I was able to help.

#14 CPJC

CPJC
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:11:54 PM

Posted 03 November 2004 - 10:36 AM

Thank you for ur help but in ur last reply u said Disable and Enable System Restore
but you only listen how to do this for xp and Windows ME. i have windows 98 so could you please explain how i may do this On windows 98
Chris :thumbsup:

#15 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,659 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:54 PM

Posted 03 November 2004 - 11:44 AM

You can ignore the system restore step if you have 98




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users