HELP! Hijacked, raped, pillaged!

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

u142461

Thread Starter
Joined
Feb 10, 2005
Messages
2
Please, help, I’m at wit’s end. I have searched every site and tried SO many things, I’m desperate! I have tried most everything suggested on many sites, I’m only making it worse every time. I have so many anti-spyware programs on my computer it’s not even funny. I’m sure when you experts see my log file, you’ll understand I really have no clue what the heck I’m doing. (Also seen in that I am running Win ME…I’m immune to the snickering). I’ve tried deleting the trusted sites, I’ve run CWshredder , I’ve run spybot, have spy sweeper, Ad aware, spyware doctor (which I was foolish enough to pay for and it’s done nothing but tell me I’ve gone from 10 to 26 to 32 to 60 infections and not removed any of them.
I have never attempted to use a forum and am also new at this stuff. I'm just about ready to format c:
Enough rambling, I FINALLY got hijack this to download and here is my logfile from HijackThis:
Logfile of HijackThis v1.99.0
Scan saved at 9:08:04 PM, on 2/9/2005
Platform: Windows ME (Win9x 4.90.3000)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\PROGRAM FILES\NORTON ANTIVIRUS\RTVSCN95.EXE
C:\PROGRAM FILES\NORTON ANTIVIRUS\DEFWATCH.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\NTSH.EXE
C:\WINDOWS\SYSTEM\NTYW.EXE
C:\WINDOWS\SDKPY.EXE
C:\WINDOWS\SYSTEM\ATLRP32.EXE
C:\WINDOWS\SYSTEM\NTCH.EXE
C:\WINDOWS\SYSTEM\ATLDK.EXE
C:\WINDOWS\SYSTEM\ATLGA32.EXE
C:\WINDOWS\MFCRV32.EXE
C:\WINDOWS\SYSTEM\NETGY.EXE
C:\WINDOWS\SYSTEM\SYSPS32.EXE
C:\WINDOWS\NETAE32.EXE
C:\WINDOWS\NETQW.EXE
C:\WINDOWS\MFCCC32.EXE
C:\WINDOWS\SYSTEM\APPKP.EXE
C:\WINDOWS\SYSTEM\ATLXT32.EXE
C:\WINDOWS\MSLS32.EXE
C:\WINDOWS\APPWO32.EXE
C:\WINDOWS\SYSTEM\CRQN32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\CSAFE\AUTOCHK.EXE
C:\PROGRAM FILES\NORTON ANTIVIRUS\VPTRAY.EXE
C:\WINDOWS\SYSTEM\TIBS5.EXE
C:\WINDOWS\D3DY.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\PROGRAM FILES\SPYWARE DOCTOR\SWDOCTOR.EXE
C:\PROGRAM FILES\WEBROOT\SPY SWEEPER\SPYSWEEPER.EXE
C:\PROGRAM FILES\EARTHLINK TOTALACCESS\TASKPANL.EXE
C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE\OSA.EXE
C:\WINDOWS\NETAE32.EXE
C:\PROGRAM FILES\CHECKPOINT\SESSION AUTHENTICATION AGENT\FWSESSION.EXE
C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE\MSOFFICE.EXE
C:\PROGRAM FILES\INTERMUTE\SPYSUBTRACT\SPYSUB.EXE
C:\WINDOWS\NTSH.EXE
C:\WINDOWS\SYSTEM\TAPISRV.EXE
C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SNDVOL32.EXE
C:\WINDOWS\SYSTEM\HPFBKG07.EXE
C:\WINDOWS\SYSTEM\HPFTBX07.EXE
C:\WINDOWS\SYSTEM\STIMON.EXE
C:\PROGRAM FILES\WINZIP\WINZIP32.EXE
C:\WINDOWS\TEMP\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://start.earthlink.net
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.earthlink.net/partner/more/msie/button/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129
R3 - Default URLSearchHook is missing
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Class - {263C1766-1226-AEB8-FBCE-9E775DCC183F} - C:\WINDOWS\WINIG32.DLL
O2 - BHO: Class - {E7E2D484-7A26-EF23-C096-5401260E38B0} - C:\WINDOWS\ATLXP32.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [ESSOLO] ESSOLO.EXE
O4 - HKLM\..\Run: [ConfigSafe] C:\CSAFE\AUTOCHK.EXE
O4 - HKLM\..\Run: [vptray] c:\PROGRA~1\NORTON~1\vptray.exe
O4 - HKLM\..\Run: [PCHealth] c:\windows\PCHealth\Support\PCHSchd.exe -s
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [BillMinder] C:\QUICKENW\BILLMIND.EXE
O4 - HKLM\..\Run: [41A4.TMP] C:\WINDOWS\TEMP\41A4.TMP.exe 0 28129
O4 - HKLM\..\Run: [tibs5] C:\WINDOWS\SYSTEM\tibs5.exe
O4 - HKLM\..\Run: [D3DY.EXE] C:\WINDOWS\D3DY.EXE
O4 - HKLM\..\Run: [41A4.TMP.EXE] C:\WINDOWS\TEMP\41A4.TMP.EXE 3 28129
O4 - HKLM\..\RunServices: [rtvscn95] c:\PROGRA~1\NORTON~1\rtvscn95.exe
O4 - HKLM\..\RunServices: [defwatch] c:\PROGRA~1\NORTON~1\defwatch.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe
O4 - HKLM\..\RunServices: [NTYW.EXE] C:\WINDOWS\SYSTEM\NTYW.EXE
O4 - HKLM\..\RunServices: [MFCRV32.EXE] C:\WINDOWS\MFCRV32.EXE
O4 - HKLM\..\RunServices: [SDKPY.EXE] C:\WINDOWS\SDKPY.EXE
O4 - HKLM\..\RunServices: [ATLRP32.EXE] C:\WINDOWS\SYSTEM\ATLRP32.EXE
O4 - HKLM\..\RunServices: [NETAE32.EXE] C:\WINDOWS\NETAE32.EXE
O4 - HKLM\..\RunServices: [NTCH.EXE] C:\WINDOWS\SYSTEM\NTCH.EXE
O4 - HKLM\..\RunServices: [ATLGA32.EXE] C:\WINDOWS\SYSTEM\ATLGA32.EXE
O4 - HKLM\..\RunServices: [SYSPS32.EXE] C:\WINDOWS\SYSTEM\SYSPS32.EXE
O4 - HKLM\..\RunServices: [NETGY.EXE] C:\WINDOWS\SYSTEM\NETGY.EXE
O4 - HKLM\..\RunServices: [NTSH.EXE] C:\WINDOWS\NTSH.EXE
O4 - HKLM\..\RunServices: [MFCCC32.EXE] C:\WINDOWS\MFCCC32.EXE
O4 - HKLM\..\RunServices: [ATLDK.EXE] C:\WINDOWS\SYSTEM\ATLDK.EXE
O4 - HKLM\..\RunServices: [APPKP.EXE] C:\WINDOWS\SYSTEM\APPKP.EXE
O4 - HKLM\..\RunServices: [ATLXT32.EXE] C:\WINDOWS\SYSTEM\ATLXT32.EXE
O4 - HKLM\..\RunServices: [NETQW.EXE] C:\WINDOWS\NETQW.EXE
O4 - HKLM\..\RunServices: [CRQN32.EXE] C:\WINDOWS\SYSTEM\CRQN32.EXE
O4 - HKLM\..\RunServices: [APPWO32.EXE] C:\WINDOWS\APPWO32.EXE
O4 - HKLM\..\RunServices: [MSLS32.EXE] C:\WINDOWS\MSLS32.EXE
O4 - HKCU\..\Run: [Spyware Doctor] "C:\PROGRAM FILES\SPYWARE DOCTOR\SWDOCTOR.EXE" /Q
O4 - HKCU\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SPYSWEEPER.EXE" /0
O4 - HKCU\..\Run: [E6TaskPanel] "C:\PROGRAM FILES\EARTHLINK TOTALACCESS\TASKPANL.EXE" -winstart
O4 - Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Startup: Session Authentication Agent.lnk = C:\Program Files\CheckPoint\Session Authentication Agent\FWSession.exe
O4 - Startup: Microsoft Office Shortcut Bar.lnk = C:\Program Files\Microsoft Office\Office\MSOFFICE.EXE
O4 - Startup: Microsoft Find Fast.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Startup: SpySubtract.lnk = C:\Program Files\interMute\SpySubtract\SpySub.exe
O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
O8 - Extra context menu item: Backward Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
O8 - Extra context menu item: Translate into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\PROGRA~1\MESSEN~1\MSMSGS.EXE
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~2\TOOLS\IESDPB.DLL
O12 - Plugin for .qt: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O12 - Plugin for .mid: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O12 - Plugin for .au: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O15 - Trusted Zone: *.frame.crazywinnings.com
O15 - Trusted Zone: *.static.topconverting.com
O15 - Trusted Zone: *.frame.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.static.topconverting.com (HKLM)
O15 - Trusted IP range: 206.161.124.130 (HKLM)
 

Cookiegal

Karen
Administrator
Malware Specialist Coordinator
Joined
Aug 27, 2003
Messages
117,026
First copy the contents of the quotebox to notepad. Go to File > Save As and name it Fix.reg (save as type: 'all files' )

REGEDIT4


[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HSA]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SE]

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SW]
__________________________________________________________________________

Click: http://www.intermute.com/spysubtrac...r_download.html to download CWShredder. Do Not run it yet. Download it to the desktop and have it ready to run later.

____________________________________________________________________

Click: http://www.downloads.subratam.org/AboutBuster.zip to download AboutBuster created by Rubber Ducky.

Unzip AboutBuster to the Desktop then click the "Update Button" then click "Check for Update" and download the updates and then click "Exit" because I don’t want you to run it yet. Just get the updates so it is ready to run later in safe mode.
_____________________________________________________________________

Now go ahead and set your computer to show hidden files like so:

Click on My Computer.
Select the Tools menu and click Folder Options.
Select the View Tab.
Under the Hidden files and folders heading select Show hidden files and folders.
Uncheck the Hide protected operating system files (recommended) option.
Click Apply then OK. Click Yes to confirm.


______________________________________________________________________

Sign off the Internet and remain offline until this procedure is complete. Unplug your modem or disconnect the cable or phone line. Copy these instructions to notepad and save them on your desktop for easy access. You must follow these directions exactly and you cannot skip any part of it.
______________________________________________________________________

Restart to safe mode.

How to start your computer in safe mode

Perform the following steps in safe mode:
____________________________________________________________________

Double click on the fix.reg file you saved at the beginning to enter into the registry. Answer yes when asked to have its contents added to the registry.
____________________________________________________________________

Go to Start > Run and type Hijackthis. Press enter to start HijackThis. DO NOT OPEN ANYTHING ELSE!

Put a check by these entries in Hijack This and click the "Fix Checked" button:


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\yagyl.dll/sp.html#28129

R3 - Default URLSearchHook is missing

O2 - BHO: Class - {263C1766-1226-AEB8-FBCE-9E775DCC183F} - C:\WINDOWS\WINIG32.DLL

O2 - BHO: Class - {E7E2D484-7A26-EF23-C096-5401260E38B0} - C:\WINDOWS\ATLXP32.DLL

O4 - HKLM\..\Run: [41A4.TMP] C:\WINDOWS\TEMP\41A4.TMP.exe 0 28129

O4 - HKLM\..\Run: [tibs5] C:\WINDOWS\SYSTEM\tibs5.exe

O4 - HKLM\..\Run: [D3DY.EXE] C:\WINDOWS\D3DY.EXE

O4 - HKLM\..\Run: [41A4.TMP.EXE] C:\WINDOWS\TEMP\41A4.TMP.EXE 3 28129

O4 - HKLM\..\RunServices: [NTYW.EXE] C:\WINDOWS\SYSTEM\NTYW.EXE

O4 - HKLM\..\RunServices: [MFCRV32.EXE] C:\WINDOWS\MFCRV32.EXE

O4 - HKLM\..\RunServices: [SDKPY.EXE] C:\WINDOWS\SDKPY.EXE

O4 - HKLM\..\RunServices: [ATLRP32.EXE] C:\WINDOWS\SYSTEM\ATLRP32.EXE

O4 - HKLM\..\RunServices: [NETAE32.EXE] C:\WINDOWS\NETAE32.EXE

O4 - HKLM\..\RunServices: [NTCH.EXE] C:\WINDOWS\SYSTEM\NTCH.EXE

O4 - HKLM\..\RunServices: [ATLGA32.EXE] C:\WINDOWS\SYSTEM\ATLGA32.EXE

O4 - HKLM\..\RunServices: [SYSPS32.EXE] C:\WINDOWS\SYSTEM\SYSPS32.EXE

O4 - HKLM\..\RunServices: [NETGY.EXE] C:\WINDOWS\SYSTEM\NETGY.EXE

O4 - HKLM\..\RunServices: [NTSH.EXE] C:\WINDOWS\NTSH.EXE

O4 - HKLM\..\RunServices: [MFCCC32.EXE] C:\WINDOWS\MFCCC32.EXE

O4 - HKLM\..\RunServices: [ATLDK.EXE] C:\WINDOWS\SYSTEM\ATLDK.EXE

O4 - HKLM\..\RunServices: [APPKP.EXE] C:\WINDOWS\SYSTEM\APPKP.EXE

O4 - HKLM\..\RunServices: [ATLXT32.EXE] C:\WINDOWS\SYSTEM\ATLXT32.EXE

O4 - HKLM\..\RunServices: [NETQW.EXE] C:\WINDOWS\NETQW.EXE

O4 - HKLM\..\RunServices: [CRQN32.EXE] C:\WINDOWS\SYSTEM\CRQN32.EXE

O4 - HKLM\..\RunServices: [APPWO32.EXE] C:\WINDOWS\APPWO32.EXE

O4 - HKLM\..\RunServices: [MSLS32.EXE] C:\WINDOWS\MSLS32.EXE


Find and delete these files:

C:\WINDOWS\system\yagyl.dll
C:\WINDOWS\WINIG32.DLL
C:\WINDOWS\ATLXP32.DLL
C:\WINDOWS\TEMP\41A4.TMP.exe 0 28129
C:\WINDOWS\SYSTEM\tibs5.exe
C:\WINDOWS\D3DY.EXE
C:\WINDOWS\TEMP\41A4.TMP.EXE 3 28129
C:\WINDOWS\SYSTEM\NTYW.EXE
C:\WINDOWS\MFCRV32.EXE
C:\WINDOWS\SDKPY.EXE
C:\WINDOWS\SYSTEM\ATLRP32.EXE
C:\WINDOWS\NETAE32.EXE
C:\WINDOWS\SYSTEM\NTCH.EXE
C:\WINDOWS\SYSTEM\ATLGA32.EXE
C:\WINDOWS\SYSTEM\SYSPS32.EXE
C:\WINDOWS\SYSTEM\NETGY.EXE
C:\WINDOWS\NTSH.EXE
C:\WINDOWS\MFCCC32.EXE
C:\WINDOWS\SYSTEM\ATLDK.EXE
C:\WINDOWS\SYSTEM\APPKP.EXE
C:\WINDOWS\SYSTEM\ATLXT32.EXE
C:\WINDOWS\NETQW.EXE
C:\WINDOWS\SYSTEM\CRQN32.EXE
C:\WINDOWS\APPWO32.EXE
C:\WINDOWS\MSLS32.EXE

Navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

Finally go to Control Panel > Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.
________________________________________________________________________

Next run aboutbuster. Double click aboutbuster.exe, click OK, click Start, then click OK. This will scan your computer for the bad files and delete them.
_______________________________________________________________________

Finally, run CWShredder. Just click on the cwshredder.exe then click "Fix" (Not "Scan only") and let it do its thing.
_______________________________________________________________________

Boot back into Windows now.


Turn off System Restore:

Click Start, Settings, and then click Control Panel.
Double-click the System icon. The System Properties dialog box appears.

NOTE: If the System icon is not visible, click "View all Control Panel options" to display it.

Click the Performance tab, and then click File System.
Click the Troubleshooting tab, and then check Disable System Restore.
Click OK. Click Yes, when you are prompted to restart Windows.

Go to: http://housecall.trendmicro.com/ and do an online virus scan.

Be sure and put a check in the box by "Auto Clean" before you do the scan. If it finds anything that it cannot clean have it delete it or make a note of the file location so you can delete it yourself. Housecall will detect the leftover files from this hijacker.

This hijacker is known to alter or delete certain files so check this out please:

Download the Hoster from: http://members.aol.com/toadbee/hoster.zip. UnZip the file and press "Restore Original Hosts" and press "OK". Exit Program.

If you have Spybot S&D installed you will also need to replace one file. Go to: http://www.spywareinfo.com/~merijn/winfiles.html and download SDHelper.dll. Copy the file to the folder containing your Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

control.exe may have been deleted.
See if control.exe is present in C:\windows\system

If control.exe isn't there, go to: http://www.richardthelionhearted.com/~merijn/winfiles.html#control, and download control.exe per the instructions at the site.

Unzip the file and copy the new control.exe file to the C:\Windows\System folder.

IMPORTANT!: Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended here: http://www.jfitz.com/tips/ie_security_config.html.

Reboot and post another Hijack This log please.
 

u142461

Thread Starter
Joined
Feb 10, 2005
Messages
2
Geez Looize, this has been nightmarish. If it weren’t for you saints, us clueless people would be TOAST! Thank you SSOOOOOooo much for the help. If I "make it out of here alive", could you recommend a spyware program? I have spyware doctor, adaware and others. I'm hoping you won't say SpySweeper, as I have that and it's pretty irritating the way it keeps "popping up". If you say it's good, I'll go with it though.
I did everything exactly like you said except:
1. I ran my updated Norton anti-virus since I could get Housecall, loaded, but could not get it to run. No viruses detected.
2. I deleted Spybot Search and Destroy during one of the gyrations of the battle, so the Sdhelper.dll was not done…moot point.
3. I could not do is find Control.EXE where you told me to go. Please go to the site you directed me to: http://www.richardthelionhearted.com/~merijn/winfiles.html#control
And tell me I and NOT seeing a Christmas cartoon with Santa up a reindeer!! That was a shock. I thought I was back to being re-directed to places I did not what to go….Is there another “safe” location to download this?
4. Lastly, I had made myself a vow that if I got out of this mess without having to format C: or having to spend hundreds on either a new PC or a person to repair, that I would switch to Foxfire browser and leave the rest of the world to fight Internet Explorer’s security issues. And that is what I am now using…Yahoo even has a beta version of a toolbar for Foxfire now!
ENOUGH with the rambling here’s my latest and hopefully greatest and LAST hijack this log. Please let me know if I am “cleansed”, and again, thanks for “taking my case”. (Because I was already a basket case!) YOU ROCK!!
---------------
Logfile of HijackThis v1.99.0
Scan saved at 11:27:43 PM, on 2/10/2005
Platform: Windows ME (Win9x 4.90.3000)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\RESTORE\STMGR.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\HIJACKTHIS\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://start.earthlink.net
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://www.earthlink.net/partner/more/msie/button/search.html
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [ESSOLO] ESSOLO.EXE
O4 - HKLM\..\Run: [ConfigSafe] C:\CSAFE\AUTOCHK.EXE
O4 - HKLM\..\Run: [vptray] c:\PROGRA~1\NORTON~1\vptray.exe
O4 - HKLM\..\Run: [PCHealth] c:\windows\PCHealth\Support\PCHSchd.exe -s
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [BillMinder] C:\QUICKENW\BILLMIND.EXE
O4 - HKLM\..\RunServices: [rtvscn95] c:\PROGRA~1\NORTON~1\rtvscn95.exe
O4 - HKLM\..\RunServices: [defwatch] c:\PROGRA~1\NORTON~1\defwatch.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [*StateMgr] C:\WINDOWS\System\Restore\StateMgr.exe
O4 - HKCU\..\Run: [Spyware Doctor] "C:\PROGRAM FILES\SPYWARE DOCTOR\SWDOCTOR.EXE" /Q
O4 - HKCU\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SPYSWEEPER.EXE" /0
O4 - HKCU\..\Run: [E6TaskPanel] "C:\PROGRAM FILES\EARTHLINK TOTALACCESS\TASKPANL.EXE" -winstart
O4 - Startup: Office Startup.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE
O4 - Startup: Session Authentication Agent.lnk = C:\Program Files\CheckPoint\Session Authentication Agent\FWSession.exe
O4 - Startup: Microsoft Office Shortcut Bar.lnk = C:\Program Files\Microsoft Office\Office\MSOFFICE.EXE
O4 - Startup: Microsoft Find Fast.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE
O4 - Startup: SpySubtract.lnk = C:\Program Files\interMute\SpySubtract\SpySub.exe
O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
O8 - Extra context menu item: Backward Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
O8 - Extra context menu item: Translate into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
O9 - Extra button: Spyware Doctor - {2D663D1A-8670-49D9-A1A5-4C56B4E14E84} - C:\PROGRA~1\SPYWAR~2\TOOLS\IESDPB.DLL (file missing)
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_01\bin\npjpi150_01.dll
O12 - Plugin for .qt: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O12 - Plugin for .mid: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O12 - Plugin for .au: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
O15 - Trusted IP range: (HKLM)
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Members online

Top