1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

ilxt.info HIJACK...analysis needed...

Discussion in 'Virus & Other Malware Removal' started by sailorman, Sep 12, 2004.

Thread Status:
Not open for further replies.
Advertisement
  1. sailorman

    sailorman Thread Starter

    Joined:
    Sep 12, 2004
    Messages:
    38
    Well after reading other posts in the forum, I have done the Adaware step (2 items removed) and the HijackThis step (nothing unfamiliar found, all related to commercial applications) and now I'm down to the FINDnFIX step. There do seem to be some suspicious files found, but I'd like a second look from someone else. The FNF log file is pasted in below.

    Also I've seen elsewhere reference to "randomly named file in the system 32 directory." I've got some pretty strnage items there too with only one tab, no owner, etc., for example:

    filenames: noise, wbcache, wbdbase
    with extensions: .deu, .enu, .eng, .esn, .fra, .ita, .nld, .sve,

    looks like maybe language related, but also looks like garbage...

    all help appreciated...

    ========================================================

    Sun 12 Sep 04 14:51:23

    »»»»»»»»»»»»»»»»»»***LOG!***(*updated *9/1*)»»»»»»»»»»»»»»»»

    *System:
    Microsoft Windows XP Professional 5.1 Service Pack 2 (Build 2600)
    *IE version:
    6.0.2900.2180 SP2

    The type of the file system is FAT32.


    MS-DOS Version 5.00.500

    *command.com test passed!

    __________________________________
    !!*Creating backups...!!

    The operation completed successfully
    14:51:20.73 Sun 09/12/2004
    __________________________________

    *Local time:
    Sunday, September 12, 2004 (9/12/2004)
    2:51 PM, Eastern Daylight Time
    *Uptime:
    14:51:26 up 0 days, 0:26:20

    *Path:
    C:\FINDnFIX
    ----------------------------------------------------
    »»Member of...: ("ADMIN" logon + group match required!)

    User is a member of group DESKTOPONE\None.
    User is a member of group \Everyone.
    User is a member of group BUILTIN\Administrators.
    User is a member of group BUILTIN\Users.
    User is a member of group NT AUTHORITY\INTERACTIVE.
    User is a member of group NT AUTHORITY\Authenticated Users.
    User is a member of group \LOCAL.
    !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

    Group BUILTIN\Administrators matches list.
    Group BUILTIN\Users matches list.

    !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

    User: [DESKTOPONE\Ned], is a member of:

    BUILTIN\Administrators
    \Everyone

    Running in WORKSTATION MODE.

    SystemDrive is C:
    SystemRoot is C:\WINXP
    Logon Domain is DESKTOPONE
    Administrator's Name is Ned
    Computer Name is DESKTOPONE
    LOGON SERVER is \\DESKTOPONE

    »»»»»»»»»»»»»»»»»»*** Note! ***»»»»»»»»»»»»»»»»
    The list will produce a small database of files that will match certain criteria.
    Ex: read only files, s/h files, last modified date. size, etc.
    The filters provided and registry scan should match the
    corresponding file(s) listed.
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    Unless the file match the entire criteria, it should not be pointed to remove
    without attempting to confirm it's nature!
    »»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»»
    At times there could be several (legit) files flagged, and/or duplicate culprit file(s)!
    If in doubt, always search the file(s) and properties according to criteria!

    The file(s) found should be moved to \FINDnFIX\"junkxxx" Subfolder

    ______________________________________________________________________________
    ***YOU NEED TO DISABLE YOUR ACTIVE ANTI VIRUS PROTECTION TO AVOID CONFLICTS!***
    ______________________________________________________________________________

    ......Scanning for file(s)...
    *Note! The list(s) may include legitimate files!
    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»

    »»»»» (*1*) »»»»» .........
    »»Read access error(s)...

    C:\WINXP\SYSTEM32\RESNB.DLL +++ File read error
    \\?\C:\WINXP\System32\RESNB.DLL +++ File read error

    »»»»» (*2*) »»»»»........
    RESNB.DLL Can't Open!

    »»»»» (*3*) »»»»»........

    C:\WINXP\SYSTEM32\
    resnb.dll Wed Jun 23 2004 11:00:52p ....R 57,344 56.00 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 57,344 bytes 56.00 K

    unknown/hidden files...

    No matches found.

    »»»»» (*4*) »»»»».........
    Sniffing..........
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\RESNB.DLL
    SNiF 1.34 statistics

    Matching files : 1 Amount in bytes : 57344
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL

    »»»»»(*5*)»»»»»
    ¯ Access denied ® ..................... RESNB.DLL .....57344 23.06.2004

    »»»»»(*6*)»»»»»
    fgrep: can't open input C:\WINXP\SYSTEM32\RESNB.DLL

    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»
    »»»»»Search by size...
    *List of files and specs according to 'size' :
    *Note: Not all files listed here are infected, but *may include* the
    name and spces of the offending file...
    ___________________________________________________________________________
    Path: C:\WINXP\SYSTEM32 Including: *.DLL

    224. Dpwsockx Dll 57,344 . . . . A 8-04-04 3:56 am
    622. Msasn1 Dll 57,344 . . . . A 8-04-04 3:56 am
    930. Resnb Dll 57,344 . . R . . 6-23-04 11:00 pm
    195. Dmloader Dll 35,840 . . . . A 8-04-04 3:56 am
    353. Imgutil Dll 35,840 . . . . A 8-04-04 3:56 am
    1085. Umandlg Dll 35,840 . . . . A 8-04-04 3:56 am
    220. Dpvacm Dll 21,504 . . . . A 8-04-04 3:56 am
    275. Feclient Dll 21,504 . . . . A 8-04-04 3:56 am
    303. Hidserv Dll 21,504 . . . . A 8-04-04 3:56 am

    ____________________________________________________________________________
    *By size and date...


    C:\WINXP\SYSTEM32\
    msasn1.dll Wed Aug 4 2004 3:56:42a A.... 57,344 56.00 K
    resnb.dll Wed Jun 23 2004 11:00:52p ....R 57,344 56.00 K
    dpwsockx.dll Wed Aug 4 2004 3:56:42a A.... 57,344 56.00 K

    3 items found: 3 files, 0 directories.
    Total of file sizes: 172,032 bytes 168.00 K

    C:\WINXP\SYSTEM32\
    dmloader.dll Wed Aug 4 2004 3:56:42a A.... 35,840 35.00 K
    umandlg.dll Wed Aug 4 2004 3:56:46a A.... 35,840 35.00 K
    imgutil.dll Wed Aug 4 2004 3:56:42a A.... 35,840 35.00 K

    3 items found: 3 files, 0 directories.
    Total of file sizes: 107,520 bytes 105.00 K

    C:\WINXP\SYSTEM32\
    dpvacm.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K
    feclient.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K
    hidserv.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K

    3 items found: 3 files, 0 directories.
    Total of file sizes: 64,512 bytes 63.00 K

    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\MSASN1.DLL
    Sniffed -> C:\WINXP\SYSTEM32\RESNB.DLL
    Sniffed -> C:\WINXP\SYSTEM32\DPWSOCKX.DLL
    SNiF 1.34 statistics

    Matching files : 3 Amount in bytes : 172032
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\DMLOADER.DLL
    Sniffed -> C:\WINXP\SYSTEM32\UMANDLG.DLL
    Sniffed -> C:\WINXP\SYSTEM32\IMGUTIL.DLL
    SNiF 1.34 statistics

    Matching files : 3 Amount in bytes : 107520
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\DPVACM.DLL
    Sniffed -> C:\WINXP\SYSTEM32\FECLIENT.DLL
    Sniffed -> C:\WINXP\SYSTEM32\HIDSERV.DLL
    SNiF 1.34 statistics

    Matching files : 3 Amount in bytes : 64512
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL

    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»


    BHO search and other files...

    **File C:\WINXP\SYSTEM32\BIHL.DLL
    000020E4: 25 25 25 30 32 78 00 00 . 00 00 00 00 C0 82 05 B3 %%%02x.. ....À‚.³
    fgrep: can't open input C:\WINXP\SYSTEM32\RESNB.DLL


    No matches found.

    "C:\WINXP\system32\"
    bihl.dll Sep 12 2004 31744 "bihl.dll"
    rtipxmib.dll Aug 4 2004 31744 "rtipxmib.dll"

    2 items found: 2 files, 0 directories.
    Total of file sizes: 63,488 bytes 62.00 K

    *sp.html found in temp folder:
    --a-- - - - - - 7,976 09-12-2004 sp.html
    File: <C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html>CRC-32 : 93866C48MD5 : CE5B5B5B DFD4A959 9F4A95C7 6FA46BD2
    *Filter keys search...
    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html
    CLSID = {38D44BE4-1655-4227-A086-89C7E047250D}

    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain
    CLSID = {38D44BE4-1655-4227-A086-89C7E047250D}

    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»
    »»Size of Windows key:
    (*Default-450 *No AppInit-398 *fake(infected)-448,504,512...)

    Size of HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Windows: 448

    »»Checking for AppInit_DLLs (empty) value...
    ________________________________
    !"AppInit_DLLs"=""!

    Value does not match
    ________________________________

    »»Comparing *saved* key with *original*...

    REGDIFF 2.1 - Freeware written by Gerson Kurz (http://www.p-nand-q.com)

    Comparing File #1 (Keys1\winkey.reg) with File #2 (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows).

    Value "AppInit_DLLs" in key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" has different lengths (1 vs 28)

    »»Dumping Values........
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\DeviceNotSelectedTimeout SZ 15
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\GDIProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Spooler SZ yes
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\swapdisk SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\TransmissionRetryTimeout SZ 90
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\USERProcessHandleQuota DWORD 00002710

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    AppInit_DLLs = (*** MISSING TRAILING NULL CHARACTER ***)
    DeviceNotSelectedTimeout = 15
    GDIProcessHandleQuota = REG_DWORD 0x00002710
    Spooler = yes
    swapdisk =
    TransmissionRetryTimeout = 90
    USERProcessHandleQuota = REG_DWORD 0x00002710

    »»Security settings for 'Windows' key:


    RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
    Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
    This program is Freeware, use it on your own risk!

    Access Control List for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    (NI) ALLOW Read BUILTIN\Users
    (IO) ALLOW Read BUILTIN\Users
    (NI) ALLOW Read BUILTIN\Power Users
    (IO) ALLOW Read BUILTIN\Power Users
    (NI) ALLOW Full access BUILTIN\Administrators
    (IO) ALLOW Full access BUILTIN\Administrators
    (NI) ALLOW Full access NT AUTHORITY\SYSTEM
    (IO) ALLOW Full access NT AUTHORITY\SYSTEM
    (NI) ALLOW Full access BUILTIN\Administrators
    (IO) ALLOW Full access CREATOR OWNER

    Effective permissions for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    Read BUILTIN\Users
    Read BUILTIN\Power Users
    Full access BUILTIN\Administrators
    Full access NT AUTHORITY\SYSTEM



    »»Performing string scan....
    00001150: ?
    00001190: vk 8 f AppInit_
    000011D0:DLLs G C : \ W I N X P \ S y s t e m 3 2 \ r e s n b . d l
    00001210:l vk P UDeviceNotSelectedTimeout
    00001250: 1 5 ( W 9 0 ! vk ' zGDIProce
    00001290:ssHandleQuota" vk Spooler2 y e s
    000012D0: p vk =pswapdisk vk
    00001310: ` R TransmissionRetryTimeout p
    00001350: X vk ' A USERProcessHandleQuotat x
    00001390:
    000013D0:
    00001410:
    00001450:
    00001490:
    000014D0:
    00001510:
    00001550:
    00001590:
    000015D0:

    ---------- WIN.TXT
    fùAppInit_DLLs֍æGÀÿÿÿC
    --------------
    --------------
    $011C8: AppInit_DLLs
    $01237: UDeviceNotSelectedTimeout
    $01287: zGDIProcessHandleQuota
    $01320: TransmissionRetryTimeout
    $01370: USERProcessHandleQuotat
    --------------
    --------------
    SHLWAPI.dll
    C:\WINXP\System32\resnb.dll
    --------------
    --------------
    REGEDIT4

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows]
    "AppInit_DLLs"=""
    "DeviceNotSelectedTimeout"="15"
    "GDIProcessHandleQuota"=dword:00002710
    "Spooler"="yes"
    "swapdisk"=""
    "TransmissionRetryTimeout"="90"
    "USERProcessHandleQuota"=dword:00002710

    .............
    A handle was successfully obtained for the
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows key.
    This key has 0 subkeys.
    The AppInitDLLs value exists and reports as 56 bytes, including the 2 for string termination.

    [AppInitDLLs]
    Ansi string : "C:\WINXP\System32\resnb.dll"
    0000 43 00 3a 00 5c 00 57 00 49 00 4e 00 58 00 50 00 | C.:.\.W.I.N.X.P.
    0010 5c 00 53 00 79 00 73 00 74 00 65 00 6d 00 33 00 | \.S.y.s.t.e.m.3.
    0020 32 00 5c 00 72 00 65 00 73 00 6e 00 62 00 2e 00 | 2.\.r.e.s.n.b...
    0030 64 00 6c 00 6c 00 00 00 | d.l.l...
    -----------------------

    »»»»»»Backups list...»»»»»»
    14:57:01 up 0 days, 0:31:54
    -----------------------
    Sun 12 Sep 04 14:57:01


    C:\FINDNFIX\
    keyback.hiv Sun Sep 12 2004 2:51:22p A.... 8,192 8.00 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 8,192 bytes 8.00 K

    C:\FINDNFIX\KEYS1\
    winkey.reg Sun Sep 12 2004 2:51:24p A.... 287 0.28 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 287 bytes 0.28 K

    *Temp backups...

    "C:\Documents and Settings\Ned\Local Settings\Temp\Backs2\"
    keyback2.hi_ Sep 12 2004 8192 "keyback2.hi_"
    winkey2.re_ Sep 12 2004 287 "winkey2.re_"

    2 items found: 2 files, 0 directories.
    Total of file sizes: 8,479 bytes 8.28 K
    -D---- JUNKXXX 00000000 14:51.22 12/09/2004
    A----- STARTIT .BAT 00000060 14:51.22 12/09/2004

    ________________________________________________________________________________
    ***THE FIX IS NOT COMPATIBLE WITH EARLIER;UNPATCHED VERSIONS OF WIN2K'(SP3 and BELLOW)'
    AND/OR LAX OF SECURITY UPDATES AND SERVICE PACKS FOR ALL PLATFORMS!
    MINIMAL REQUIREMENTS INCLUDE:
    _________XP HOME/PRO; SP1; IE6/SP1
    _________2K/SP4; IE6/SP1
    ________________________________________________________________________________
    »»»»»*** www10.brinkster.com/expl0iter/freeatlast/FNF/ ***»»»»»
    -----END------
    Sun 12 Sep 04 14:57:06
    
     
  2. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    Hi sailorman

    Welcome to TSG! :)

    Be sure to Follow the next set of steps carefully, in the exact order specified.

    ***FIRST YOU NEED TO DISABLE YOUR ACTIVE ANTI VIRUS PROTECTION TO AVOID CONFLICTS!***

    Get ready to restart:
    First doubleClick on the FIX.bat file in the C:\FINDnFIX\Keys1 folder.
    Wait for the popup -Alert to restart your computer in 15 seconds.

    After the computer restarts and you are back in Windows, navigate to C:\Windows\System32 folder:
    Locate and select the RESNB.DLL file (as it will be visible)
    And use the folder's top menu and got to Edit >
    Move to Folder...
    Select the C:\FINDnFIX\junkxxx as destination and move
    the RESNB.DLL there.

    Note; Move the RESNB.DLL file and DO NOT move any other file except for that one to the junkxxx folder. Doublecheck to be sure you are moving the right file.
    -----------------------------------------------------------------------------------------------------------

    Now look in the C:\FINDnFIX folder and locate the RESTORE.bat file. Doubleclick it to run it.

    Wait for it to run and it will and it will produce a 'log1.txt' file! Copy that log and paste it here!

    -----------------------------------------------------------------------------------------------------------

    *Note:
    Do not change/move around or
    tamper with any of the file(s) folder(s) and path
    included in the 'FINDnFIX' folder.
     
  3. sailorman

    sailorman Thread Starter

    Joined:
    Sep 12, 2004
    Messages:
    38
    Thx very much, flrman1!! Here is the log2.txt file (there was a log.txt but no log1.txt):

    Sun 12 Sep 04 23:19:46

    »»»»»»»»»»»»»»»»»»***LOG2!(*updated *9/1*)***»»»»»»»»»»»»»»»»

    *System:
    Microsoft Windows XP Professional 5.1 Service Pack 2 (Build 2600)
    *IE version:
    6.0.2900.2180 SP2

    The type of the file system is FAT32.

    ___________________________________________
    !!Restoring backups!!

    Error: Access is denied.


    Error: Access is denied.

    23:19:44.65 Sun 09/12/2004
    ___________________________________________

    *Local time:
    Sunday, September 12, 2004 (9/12/2004)
    11:19 PM, Eastern Daylight Time
    *Uptime:
    23:19:47 up 0 days, 0:03:09

    *path:
    C:\FINDnFIX
    Running in WORKSTATION MODE.

    SystemDrive is C:
    SystemRoot is C:\WINXP
    Logon Domain is DESKTOPONE
    Administrator's Name is Ned
    Computer Name is DESKTOPONE
    LOGON SERVER is \\DESKTOPONE
    ------------------------------------------


    This log will confirm if the file was successfully moved, and/or
    the right file was selected...

    Scanning for file(s) in System32...

    »»»»»»» (1) »»»»»»»

    »»»»»»» (2) »»»»»»»

    »»»»»»» (3) »»»»»»»

    No matches found.
    Unknown/hidden files...

    No matches found.

    »»»»»»» (4) »»»»»»»
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    SNiF 1.34 statistics

    Matching files : 0 Amount in bytes : 0
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL

    »»»»»(5)»»»»»

    »»»»»(6)»»»»»

    »»»»»»» Search by size And Date...

    *List of files specs according to size:
    *Note: Not all files listed here are infected!
    ____________________________________________________________________________
    Path: C:\WINXP\SYSTEM32 Including: *.DLL

    223. Dpwsockx Dll 57,344 . . . . A 8-04-04 3:56 am
    621. Msasn1 Dll 57,344 . . . . A 8-04-04 3:56 am
    194. Dmloader Dll 35,840 . . . . A 8-04-04 3:56 am
    352. Imgutil Dll 35,840 . . . . A 8-04-04 3:56 am
    1083. Umandlg Dll 35,840 . . . . A 8-04-04 3:56 am
    219. Dpvacm Dll 21,504 . . . . A 8-04-04 3:56 am
    274. Feclient Dll 21,504 . . . . A 8-04-04 3:56 am
    302. Hidserv Dll 21,504 . . . . A 8-04-04 3:56 am

    ____________________________________________________________________________

    C:\WINXP\SYSTEM32\
    msasn1.dll Wed Aug 4 2004 3:56:42a A.... 57,344 56.00 K
    dpwsockx.dll Wed Aug 4 2004 3:56:42a A.... 57,344 56.00 K

    2 items found: 2 files, 0 directories.
    Total of file sizes: 114,688 bytes 112.00 K

    C:\WINXP\SYSTEM32\
    dmloader.dll Wed Aug 4 2004 3:56:42a A.... 35,840 35.00 K
    umandlg.dll Wed Aug 4 2004 3:56:46a A.... 35,840 35.00 K
    imgutil.dll Wed Aug 4 2004 3:56:42a A.... 35,840 35.00 K

    3 items found: 3 files, 0 directories.
    Total of file sizes: 107,520 bytes 105.00 K

    C:\WINXP\SYSTEM32\
    dpvacm.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K
    feclient.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K
    hidserv.dll Wed Aug 4 2004 3:56:42a A.... 21,504 21.00 K

    3 items found: 3 files, 0 directories.
    Total of file sizes: 64,512 bytes 63.00 K

    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\MSASN1.DLL
    Sniffed -> C:\WINXP\SYSTEM32\DPWSOCKX.DLL
    SNiF 1.34 statistics

    Matching files : 2 Amount in bytes : 114688
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\DMLOADER.DLL
    Sniffed -> C:\WINXP\SYSTEM32\UMANDLG.DLL
    Sniffed -> C:\WINXP\SYSTEM32\IMGUTIL.DLL
    SNiF 1.34 statistics

    Matching files : 3 Amount in bytes : 107520
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL
    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\WINXP\SYSTEM32\DPVACM.DLL
    Sniffed -> C:\WINXP\SYSTEM32\FECLIENT.DLL
    Sniffed -> C:\WINXP\SYSTEM32\HIDSERV.DLL
    SNiF 1.34 statistics

    Matching files : 3 Amount in bytes : 64512
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.DLL

    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»

    BHO search and other files...



    No matches found.

    "C:\WINXP\system32\"
    rtipxmib.dll Aug 4 2004 31744 "rtipxmib.dll"

    1 item found: 1 file, 0 directories.
    Total of file sizes: 31,744 bytes 31.00 K


    No matches found.

    --*sp.html in temp folder was NOT FOUND!--

    *Filter keys search...
    REGDMP: Unable to open key 'HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html' (2)

    --(*text/html Subkey was NOT FOUND!)--

    REGDMP: Unable to open key 'HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain' (2)

    --(*text/plain Subkey was NOT FOUND!)--

    »»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»*»»»

    »»»*»»» Scanning for moved file... »»»*»»»

    * result\\?\C:\FINDnFIX\junkxxx\RESNB.333


    C:\FINDNFIX\JUNKXXX\
    resnb.333 Wed Jun 23 2004 11:00:52p A.... 57,344 56.00 K

    1 item found: 1 file, 0 directories.
    Total of file sizes: 57,344 bytes 56.00 K

    Power SNiF 1.34 - The Ultimate File Snifferdog. Created Mar 16 1992, 21:09:15.

    Sniffed -> C:\FINDNFIX\JUNKXXX\RESNB.333
    SNiF 1.34 statistics

    Matching files : 1 Amount in bytes : 57344
    Directories searched : 1 Commands executed : 0

    Masks sniffed for: *.*

    **File C:\FINDNFIX\JUNKXXX\RESNB.333
    0000DEBE: 67 44 65 76 69 63 65 00 . 00 53 74 72 65 61 6D 69 gDevice. .Streami
    0000DED3: 63 65 53 65 74 75 70 00 . 32 00 00 00 00 00 E0 01 ceSetup. 2.....à.

    A----- RESNB .333 0000E000 23:00.52 23/06/2004

    Analyzer v1.36 by Boogie Copyright (C) 1997 ESP Team
    Files: C:\FINDNFIX\JUNKXXX\*.*
    Ä
    RESNB.333 MS Windows 95 / Windows NT Exe
    Ä


    Volume: None * DDIR * 11:22 pm | Sun, 9-12-04
    Ser #: 07D0-0714 DOS Ver. 5.00 5% Used space
    Path: C:\FINDNFIX\JUNKXXX All files selected

    1. Resnb 333 57,344 . . . . A 6-23-04 11:00 pm

    No. of files: 1 | List size: 57,344
    Disk size: 976.5 M | Actual spc: 65,024
    Bytes free: 969,052,672 | Wasted space: 7,680

    --a-- W32i - - - - 57,344 06-23-2004 resnb.333
    A C:\FINDnFIX\junkxxx\resnb.333

    CHK-SAFE.EXE Ver 2.51 by Bill Lambdin Don Peters and Robert Bullock.
    MD5 Message Digest Algorithm by RSA Data Security, Inc.

    File name Size Date Time MD5 Hash
    ________________________________________________________________________
    RESNB.333 57344 06-23-104 23:00 c185b36f9969d3a6d2122ba7cbc02249

    CRC-Cyclic Redundancy Checker, Version 1.20, 08-Feb-92, rtk

    C:\FINDNFIX\JUNKXXX
    RESNB.333 : crc16=3138 crc32=D5C9FB2E

    File: <C:\FINDnFIX\junkxxx\resnb.333>

    CRC-32 : D5C9FB2E

    MD5 : C185B36F 9969D3A6 D2122BA7 CBC02249




    #######################################################
    *Known files are...
    --------------------
    File: ((56k; (57,344 bytes)
    CRC-32 : D5C9FB2E
    MD5 : C185B36F 9969D3A6 D2122BA7 CBC02249
    --------------------
    File: ((35k; (35,840 bytes)
    CRC-32 : 33081C8B
    MD5 : 1DE9A8E2 4C826006 7A479B09 577D9CAE
    --------------------
    File: ((21k; (21,504 bytes)
    CRC-32 : 2258F59E
    MD5 : EFEE2CB3 B342A351 51802356 9637F8E6
    #######################################################
    »»Permissions:
    C:\FINDnFIX\junkxxx\resnb.333 No permissions are set. All user have full control.
    Directory "C:\FINDnFIX\junkxxx\."
    Permissions:
    NA

    Auditing:
    NA

    Owner: \Everyone

    Primary Group: \Everyone

    Directory "C:\FINDnFIX\junkxxx\.."
    Permissions:
    NA

    Auditing:
    NA

    Owner: \Everyone

    Primary Group: \Everyone

    File "C:\FINDnFIX\junkxxx\resnb.333"
    Permissions:
    NA

    Auditing:
    NA

    Owner: \Everyone

    Primary Group: \Everyone


    This file system is FAT32, it does not enforce ACLs !


    »»Size of Windows key:
    (*Default-450 *No AppInit-398 *fake(infected)-448,504,512...)

    Size of HKEY_LOCAL_MACHINE\software\microsoft\Windows NT\CurrentVersion\Windows: 450

    »»Checking for AppInit_DLLs (empty) value...
    ________________________________
    !"AppInit_DLLs"=""!

    Value Matches
    ________________________________

    »»Comparing *saved* key with *original*...

    REGDIFF 2.1 - Freeware written by Gerson Kurz (http://www.p-nand-q.com)

    Comparing File #1 (Keys1\winkey.reg) with File #2 (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows).

    No differences found.

    »»Dumping Values:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\DeviceNotSelectedTimeout SZ 15
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\GDIProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\Spooler SZ yes
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\swapdisk SZ
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\TransmissionRetryTimeout SZ 90
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\USERProcessHandleQuota DWORD 00002710
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs SZ

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
    DeviceNotSelectedTimeout = 15
    GDIProcessHandleQuota = REG_DWORD 0x00002710
    Spooler = yes
    swapdisk =
    TransmissionRetryTimeout = 90
    USERProcessHandleQuota = REG_DWORD 0x00002710
    AppInit_DLLs =

    »»Security settings for 'Windows' key:


    RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
    Copyright (c) 1999-2001 Frank Heyne Software (http://www.heysoft.de)
    This program is Freeware, use it on your own risk!

    Access Control List for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    (ID-NI) ALLOW Read BUILTIN\Users
    (ID-IO) ALLOW Read BUILTIN\Users
    (ID-NI) ALLOW QWCEN-DS-- BUILTIN\Power Users
    (ID-IO) ALLOW QWCEN-DS-- BUILTIN\Power Users
    (ID-NI) ALLOW Full access BUILTIN\Administrators
    (ID-IO) ALLOW Full access BUILTIN\Administrators
    (ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
    (ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
    (ID-NI) ALLOW Full access DESKTOPONE\Ned
    (ID-IO) ALLOW Full access CREATOR OWNER

    Effective permissions for Registry key hklm\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows:
    Read BUILTIN\Users
    QWCEN-DS-- BUILTIN\Power Users
    Full access BUILTIN\Administrators
    Full access NT AUTHORITY\SYSTEM
    Full access DESKTOPONE\Ned



    00001150: $ ? zZ35 2
    00001190: zZ35 2 zZ35 2
    000011D0: vk DeviceNotSelectedTimeout 1 5
    00001210: x `?E vk ' x GDIProcessHandleQuota
    00001250: 9 0 I n s vk x Spooler y e s 3 }
    00001290: vk swapdisk ` vk
    000012D0: P 92TransmissionRetryTimeout vk ' =
    00001310:USERProcessHandleQuotaTa ` H vk
    00001350: oHAppInit_DLLs [email protected]
    00001390:
    000013D0:
    00001410:
    00001450:
    00001490:
    000014D0:
    00001510:
    00001550:

    ---------- NEWWIN.TXT
    oHAppInit_DLLsê[email protected]
    --------------
    --------------
    $011F0: DeviceNotSelectedTimeout
    $01238: GDIProcessHandleQuota
    $012E0: TransmissionRetryTimeout
    $01310: USERProcessHandleQuotaTa
    $0135E: oHAppInit_DLLs
    --------------
    --------------
    No strings found.

    --------------
    --------------
    d.... 0 Sep 12 14:51 .
    d.... 0 Sep 12 14:51 ..
    ....a 57344 Jun 23 23:00 resnb.333

    3 files found occupying 55296 bytes

    -------- C:\FINDNFIX\JUNKXXX\RESNB.333
    InstallStreamingDeviceStreamingDeviceSetupStreamingDeviceSetup2
    ===============================================================================
    57,344 bytes 5,734,400 cps
    Files: 1 Records: 13,139 Matches: 3 Elapsed Time: 00:00:00.01

    VDIR v1.00
    Path: C:\FINDNFIX\JUNKXXX\*.*
    ---------------------------------------+---------------------------------------
    . <dir> 09-12-:4 14:51|RESNB 333 57344 A 06-23-:4 23:00
    .. <dir> 09-12-:4 14:51|
    ---------------------------------------+---------------------------------------
    3 files totaling 57344 bytes consuming 65024 bytes of disk space.
    29528576 bytes available on Drive C: No volume label

    ...File dump...

    junkxxx\resnb.333
    1 file(s) copied.
    56880 00000000 4b45524e 454c3332 2e444c4c |....KERNEL32.DLL| 0de30
    56896 00004c6f 61644c69 62726172 79410000 |..LoadLibraryA..| 0de40
    56912 47657450 726f6341 64647265 73730000 |GetProcAddress..| 0de50
    56928 00000000 00000000 00000000 a6f00100 |................| 0de60
    56944 01000000 03000000 03000000 88f00100 |................| 0de70
    56960 94f00100 a0f00100 05270000 9a230000 |.........'...#..| 0de80
    56976 242a0000 a7f00100 bef00100 d3f00100 |$*..............| 0de90
    56992 00000100 02000049 6e737461 6c6c5374 |.......InstallSt| 0dea0
    57008 7265616d 696e6744 65766963 65005374 |reamingDevice.St| 0deb0
    57024 7265616d 696e6744 65766963 65536574 |reamingDeviceSet| 0dec0
    57040 75700053 74726561 6d696e67 44657669 |up.StreamingDevi| 0ded0
    57056 63655365 74757032 |ceSetup2 | 0dee0

    Detecting...

    C:\FINDnFIX\junkxxx
    .. SD has a NULL DACL which explicitly allows all access to Everyone
    resnb.333 SD has a NULL DACL which explicitly allows all access to Everyone
    Error - Shutting Down...
    =========================================
    57344 C:\FINDnFIX\junkxxx\resnb.333 Everyone
    57344 C:\FINDnFIX\junkxxx (DIR Total)

    Owner No. Files Total Size
    =========================================
    Everyone 1 57344
    ________________________________________________________________________________
    ***THE FIX IS NOT COMPATIBLE WITH EARLIER;UNPATCHED VERSIONS OF WIN2K'(SP3 and BELLOW)'
    AND/OR LAX OF SECURITY UPDATES AND SERVICE PACKS FOR ALL PLATFORMS!
    MINIMAL REQUIREMENTS INCLUDE:
    _________XP HOME/PRO; SP1; IE6/SP1
    _________2K/SP4; IE6/SP1
    ________________________________________________________________________________
    »»»»»»»»*** www10.brinkster.com/expl0iter/freeatlast/FNF/ ***»»»»»»»
    Sun 12 Sep 04 23:22:12
    -----END-----
    
     
  4. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    -Open the FINDnFIX\Files2< Subfolder:
    Run the -> ZIPZAP.bat file.
    It will quickly clean the rest and
    will make a copy of the bad file(s) in the same
    folder (junkxxx.zip) and open your email client with instructions:
    Simply drag and drop the 'junkxxx.zip' file from
    the folder into the mail message and submit
    to the specified addresses! Thanks!

    Note: If you encounter an error trying to email the file, just skip it and move on.

    When done, restart your computer and
    Delete and entire C:\FINDnFIX folder and its subfolders
    and be sure the junkxxx folder
    was deleted (as part of the cleanup process)


    Click here to download CWShredder. Close all browser windows, click on the cwshredder.exe then click "Fix" (Not "Scan only") and let it do it's thing.

    When it is finished restart your computer.



    Go here and download Adaware SE.

    Install the program and launch it.

    First in the main window look in the bottom right corner and click on Check for updates now then click Connect and download the latest reference files.

    From main window :Click Start then under Select a scan Mode tick Perform full system scan.

    Next deselect Search for negligible risk entries.

    Now to scan just click the Next button.

    When the scan is finished mark everything for removal and get rid of it.(Right-click the window and choose select all from the drop down menu and click Next)

    Restart your computer.


    After doing all that create a permanent folder somewhere like in My Documents and name it Hijack This.

    Now Click here to download Hijack This. Download and save the file to the Hijack This folder you just created.

    Click on Hijackthis.exe to launch the program.

    Click the "Scan" button when the scan is finished the scan button will become "Save Log" click that and save the log.

    The log should open in notepad. Click on "Edit > Select All" then click on "Edit > Copy" then Paste the log back here in a reply.
     
  5. sailorman

    sailorman Thread Starter

    Joined:
    Sep 12, 2004
    Messages:
    38
    As requested:

    Logfile of HijackThis v1.97.7
    Scan saved at 9:13:37 PM, on 9/13/2004
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINXP\System32\smss.exe
    C:\WINXP\system32\winlogon.exe
    C:\WINXP\system32\services.exe
    C:\WINXP\system32\lsass.exe
    C:\WINXP\system32\svchost.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\system32\spoolsv.exe
    C:\PROGRA~1\COMMON~1\AOL\ACS\AOLACSD.EXE
    C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
    C:\WINXP\System32\nvsvc32.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\wanmpsvc.exe
    C:\WINXP\system32\wuauclt.exe
    C:\WINXP\Explorer.EXE
    C:\WINXP\system32\wscntfy.exe
    C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE
    C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe
    C:\WINXP\system32\devldr32.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\Handspring\HotSync.exe
    C:\Documents and Settings\Ned\My Documents\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html
    O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O4 - HKLM\..\Run: [EPSON Stylus Photo R800] C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE /P23 "EPSON Stylus Photo R800" /O6 "USB001" /M "Stylus Photo R800"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINXP\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AWMON] "C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "D:\- OLD Program Files - 05.15.04\Panicware\Pop-Up Stopper Free Edition\PSFree.exe"
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O4 - Startup: HotSync Manager.lnk = C:\Program Files\Handspring\HotSync.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
    O9 - Extra button: AOL Toolbar (HKLM)
    O9 - Extra 'Tools' menuitem: AOL Toolbar (HKLM)
    O9 - Extra button: Real.com (HKLM)
    O9 - Extra button: Messenger (HKLM)
    O9 - Extra 'Tools' menuitem: Windows Messenger (HKLM)
    O12 - Plugin for .pdf: C:\PROGRA~1\INTERN~1\PLUGINS\nppdf32.dll
    O16 - DPF: {3334504D-9980-0010-8000-00AA00389B71} - http://download.microsoft.com/download/0/C/8/0C8EDFAB-30BC-4792-898E-2DABE27B2C4D/mp43dmo.CAB
    O16 - DPF: {3E68E405-C6DE-49FF-83AE-41EE9F4C36CE} (Office Update Installation Engine) - http://office.microsoft.com/officeupdate/content/opuc.cab
    O16 - DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} - http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/iuctl.CAB?38119.8143634259
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

    Thx very much for all the effort!!!
     
  6. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    Run Hijack This again and put a check by these. Close ALL windows except HijackThis and click "Fix checked"

    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html

    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html


    Restart to safe mode.

    How to start your computer in safe mode

    Because XP will not always show you hidden files and folders by default, Go to Start > Search and under "More advanced search options".
    Make sure there is a check by "Search System Folders" and "Search hidden files and folders" and "Search system subfolders"

    Next click on My Computer. Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked. Also uncheck "Hide protected operating system files" and "Hide extensions for known file types" . Now click "Apply to all folders"
    Click "Apply" then "OK"

    in safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

    Go to Start > Run and type %temp% in the Run box. The Temp folder will open. Click Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

    Finally go to Control Panel > Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.


    Empty the Recycle Bin

    Also a A new version of Hijack This has been released so get rid of the old one and Click here to download the new one, come back here and post the log from it.
     
  7. sailorman

    sailorman Thread Starter

    Joined:
    Sep 12, 2004
    Messages:
    38
    I'm afraid the 2 problem files are still around. Also Ad Aware show slingering problems with 3 registry modifications detected on restart. Below is the hijack this log file:

    Logfile of HijackThis v1.98.2
    Scan saved at 9:57:20 PM, on 9/13/2004
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINXP\System32\smss.exe
    C:\WINXP\system32\winlogon.exe
    C:\WINXP\system32\services.exe
    C:\WINXP\system32\lsass.exe
    C:\WINXP\system32\svchost.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\system32\spoolsv.exe
    C:\PROGRA~1\COMMON~1\AOL\ACS\AOLACSD.EXE
    C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
    C:\WINXP\System32\nvsvc32.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\wanmpsvc.exe
    C:\WINXP\Explorer.EXE
    C:\WINXP\system32\wscntfy.exe
    C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE
    C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\Handspring\HotSync.exe
    C:\WINXP\system32\devldr32.exe
    C:\WINXP\system32\wuauclt.exe
    C:\Program Files\Microsoft Office\Office10\POWERPNT.EXE
    C:\Documents and Settings\Ned\My Documents\HijackThis\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html
    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O4 - HKLM\..\Run: [EPSON Stylus Photo R800] C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE /P23 "EPSON Stylus Photo R800" /O6 "USB001" /M "Stylus Photo R800"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINXP\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AWMON] "C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "D:\- OLD Program Files - 05.15.04\Panicware\Pop-Up Stopper Free Edition\PSFree.exe"
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O4 - Startup: HotSync Manager.lnk = C:\Program Files\Handspring\HotSync.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
    O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINXP\System32\Shdocvw.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .pdf: C:\PROGRA~1\INTERN~1\PLUGINS\nppdf32.dll
     
  8. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    It looks to me like what is happening is that Ad-watch or SpywareGuard are not allowing the cahnge when these are fixed:

    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = file://C:\DOCUME~1\Ned\LOCALS~1\Temp\sp.html


    You are going to have to either disable those programs long enough to allow the change or when prompted by Ad-Watch or SpywareGuard you have to allow the change. If you have Ad-Watch set to "Auatomatically" Block the registry modifications, you need to change it to "Active" instead of Automatic so you have the choice to Allow or Block the change. I always keep mine set to Active so I have the choice because it can prevent you from making changes that you want to make. I'm sure that is the problem here because the infection is gone.
     
  9. sailorman

    sailorman Thread Starter

    Joined:
    Sep 12, 2004
    Messages:
    38
    You were right!! I think I'm clean now. Is there anything else I should check? More importantly, what should I do/not do to try to avoid this mess in the future?

    HijackThis log:

    Logfile of HijackThis v1.98.2
    Scan saved at 10:58:35 PM, on 9/13/2004
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINXP\System32\smss.exe
    C:\WINXP\system32\winlogon.exe
    C:\WINXP\system32\services.exe
    C:\WINXP\system32\lsass.exe
    C:\WINXP\system32\svchost.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\system32\spoolsv.exe
    C:\PROGRA~1\COMMON~1\AOL\ACS\AOLACSD.EXE
    C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
    C:\WINXP\System32\nvsvc32.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\wanmpsvc.exe
    C:\WINXP\Explorer.EXE
    C:\WINXP\system32\wscntfy.exe
    C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE
    C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe
    C:\WINXP\system32\devldr32.exe
    C:\Program Files\SpywareGuard\sgmain.exe
    C:\Program Files\Handspring\HotSync.exe
    C:\WINXP\system32\wuauclt.exe
    C:\Documents and Settings\Ned\My Documents\HijackThis\HijackThis.exe

    O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
    O2 - BHO: SpywareGuard Download Protection - {4A368E80-174F-4872-96B5-0B27DDD11DB2} - C:\Program Files\SpywareGuard\dlprotect.dll
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar2.dll
    O3 - Toolbar: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O4 - HKLM\..\Run: [EPSON Stylus Photo R800] C:\WINXP\System32\spool\DRIVERS\W32X86\3\E_S4I2J1.EXE /P23 "EPSON Stylus Photo R800" /O6 "USB001" /M "Stylus Photo R800"
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINXP\System32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [AWMON] "C:\PROGRA~1\LAVASOFT\AD-AWA~2\Ad-Watch.exe"
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKCU\..\Run: [PopUpStopperFreeEdition] "D:\- OLD Program Files - 05.15.04\Panicware\Pop-Up Stopper Free Edition\PSFree.exe"
    O4 - Startup: SpywareGuard.lnk = C:\Program Files\SpywareGuard\sgmain.exe
    O4 - Startup: HotSync Manager.lnk = C:\Program Files\Handspring\HotSync.exe
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
    O4 - Global Startup: Cisco Systems VPN Client.lnk = C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
    O8 - Extra context menu item: &AOL Toolbar search - res://C:\Program Files\AOL Toolbar\toolbar.dll/SEARCH.HTML
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar2.dll/cmsearch.html
    O8 - Extra context menu item: Backward Links - res://c:\program files\google\GoogleToolbar2.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://c:\program files\google\GoogleToolbar2.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://c:\program files\google\GoogleToolbar2.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar2.dll/cmtrans.html
    O9 - Extra button: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O9 - Extra 'Tools' menuitem: AOL Toolbar - {4982D40A-C53B-4615-B15B-B5B5E98D167C} - C:\Program Files\AOL Toolbar\toolbar.dll
    O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINXP\System32\Shdocvw.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O12 - Plugin for .pdf: C:\PROGRA~1\INTERN~1\PLUGINS\nppdf32.dll

    Thx again for all the help.
     
  10. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    Clean! (y)

    Check this out for info on how to tighten your security settings and some good free tools to help prevent this from happening again.
     
  11. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Similar Threads - ilxt info HIJACK
  1. Pinaar
    Replies:
    9
    Views:
    582
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/273200

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice