Lots of problems due to nontrusted sites.

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

BradN10

Thread Starter
Joined
Oct 26, 2001
Messages
135
I just scanned with Adaware and it showed that over 400 files were critical. But when i go to delete them it freezes. my computer acting so slow, and popups about adware is popping up and chaning my homepage. i know it's from my family who gets on sites thats not trusted. please help. here's the hijackthis log: if it helpsLogfile of HijackThis v1.98.2
Scan saved at 9:26:27 PM, on 9/1/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\LOADQM.EXE
C:\PROGRAM FILES\MICROSOFT HARDWARE\KEYBOARD\TYPE32.EXE
C:\PROGRAM FILES\WINAD CLIENT\WINAD.EXE
C:\PROGRAM FILES\WINAD CLIENT\WINCLT.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\HIJACKTHIS1982.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://find4u.net/sp.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://find4u.net/index.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\kkdsu.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\kkdsu.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\kkdsu.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\kkdsu.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://find4u.net/sp.htm
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://find4u.net/index.htm
R3 - Default URLSearchHook is missing
O2 - BHO: twaintecObj Class - {000020DD-C72E-4113-AF77-DD56626C6C42} - C:\WINDOWS\TWAINTEC.DLL
O2 - BHO: Class - {8A512041-7085-7C2F-ABCB-5C2E0FF49B4E} - C:\WINDOWS\SYSTEM\JAVAEQ.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRAM FILES\YAHOO!\COMPANION\INSTALLS\CPN\YCOMP5_3_12_0.DLL
O3 - Toolbar: ISTbar - {5F1ABCDB-A875-46c1-8345-B72A4567E486} - C:\PROGRAM FILES\ISTBAR\ISTBAR.DLL (file missing)
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [LoadQM] loadqm.exe
O4 - HKLM\..\Run: [SMSERIAL] sm56hlpr.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\WINDOWS\SYSTEM\QTTASK.EXE" -atboottime
O4 - HKLM\..\Run: [IntelliType] "C:\Program Files\Microsoft Hardware\Keyboard\type32.exe"
O4 - HKLM\..\Run: [C-Media Mixer] Mixer.exe /startup
O4 - HKLM\..\Run: [Lexmark X74-X75] "C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe"
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [Winad Client] C:\PROGRAM FILES\WINAD CLIENT\WINAD.EXE
O4 - HKLM\..\Run: [IST Service] C:\Program Files\ISTsvc\istsvc.exe
O4 - HKLM\..\Run: [Internet Optimizer] "C:\Program Files\Internet Optimizer\optimize.exe"
O4 - HKLM\..\Run: [xmxwebim] C:\WINDOWS\SYSTEM\kxfvvvm.exe
O4 - HKLM\..\Run: [WebRebates0] "C:\PROGRAM FILES\WEB_REBATES\WebRebates0.exe"
O4 - HKLM\..\Run: [BullsEye Network] C:\Program Files\BullsEye Network\bin\bargains.exe
O4 - HKLM\..\Run: [PestPatrol Control Center] C:\PROGRA~1\PESTPA~1\PPControl.exe
O4 - HKLM\..\Run: [PPMemCheck] C:\PROGRA~1\PESTPA~1\PPMemCheck.exe
O4 - HKLM\..\Run: [CookiePatrol] C:\PROGRA~1\PESTPA~1\CookiePatrol.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [APIIP32.EXE] C:\WINDOWS\APIIP32.EXE
O4 - HKLM\..\RunServices: [ATLRU32.EXE] C:\WINDOWS\SYSTEM\ATLRU32.EXE
O4 - HKLM\..\RunServices: [WINWR.EXE] C:\WINDOWS\SYSTEM\WINWR.EXE
O4 - HKLM\..\RunServices: [NETPZ.EXE] C:\WINDOWS\SYSTEM\NETPZ.EXE
O4 - HKLM\..\RunServices: [MFCSD32.EXE] C:\WINDOWS\MFCSD32.EXE
O4 - HKLM\..\RunServices: [SDKCB.EXE] C:\WINDOWS\SDKCB.EXE
O4 - HKLM\..\RunServices: [D3EQ.EXE] C:\WINDOWS\D3EQ.EXE
O4 - HKLM\..\RunServices: [IPBS.EXE] C:\WINDOWS\SYSTEM\IPBS.EXE
O4 - HKLM\..\RunServices: [JAVALF32.EXE] C:\WINDOWS\JAVALF32.EXE
O4 - HKLM\..\RunServices: [SYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE
O4 - HKLM\..\RunServices: [CRTT32.EXE] C:\WINDOWS\CRTT32.EXE
O4 - HKLM\..\RunServices: [NETEK32.EXE] C:\WINDOWS\SYSTEM\NETEK32.EXE
O4 - HKLM\..\RunServices: [MFCGK.EXE] C:\WINDOWS\SYSTEM\MFCGK.EXE
O4 - HKLM\..\RunServices: [NTAC32.EXE] C:\WINDOWS\NTAC32.EXE
O4 - HKLM\..\RunServices: [NETAJ.EXE] C:\WINDOWS\SYSTEM\NETAJ.EXE
O4 - HKLM\..\RunServices: [D3KF32.EXE] C:\WINDOWS\D3KF32.EXE
O4 - HKLM\..\RunServices: [SDKYL.EXE] C:\WINDOWS\SYSTEM\SDKYL.EXE
O4 - HKLM\..\RunServices: [APIOQ32.EXE] C:\WINDOWS\SYSTEM\APIOQ32.EXE
O4 - HKLM\..\RunServices: [JAVAVB.EXE] C:\WINDOWS\JAVAVB.EXE
O4 - HKLM\..\RunServices: [IPKL.EXE] C:\WINDOWS\IPKL.EXE
O4 - HKLM\..\RunServices: [SYSWU.EXE] C:\WINDOWS\SYSTEM\SYSWU.EXE
O4 - HKLM\..\RunServices: [MFCWL32.EXE] C:\WINDOWS\SYSTEM\MFCWL32.EXE
O4 - HKLM\..\RunServices: [APPBY32.EXE] C:\WINDOWS\APPBY32.EXE
O4 - HKLM\..\RunServices: [MFCNX32.EXE] C:\WINDOWS\SYSTEM\MFCNX32.EXE
O4 - HKLM\..\RunServices: [APPNR32.EXE] C:\WINDOWS\APPNR32.EXE
O4 - HKLM\..\RunServices: [ATLOX32.EXE] C:\WINDOWS\ATLOX32.EXE
O4 - HKLM\..\RunServices: [APIGV32.EXE] C:\WINDOWS\APIGV32.EXE
O4 - HKLM\..\RunServices: [NETCN32.EXE] C:\WINDOWS\NETCN32.EXE
O4 - HKLM\..\RunServices: [MFCZP.EXE] C:\WINDOWS\MFCZP.EXE
O4 - HKLM\..\RunServices: [WINMP.EXE] C:\WINDOWS\WINMP.EXE
O4 - HKLM\..\RunServices: [WINOQ.EXE] C:\WINDOWS\WINOQ.EXE
O4 - HKLM\..\RunServices: [WINKY.EXE] C:\WINDOWS\WINKY.EXE
O4 - HKLM\..\RunServices: [APIBQ.EXE] C:\WINDOWS\SYSTEM\APIBQ.EXE
O4 - HKLM\..\RunServices: [WINPW.EXE] C:\WINDOWS\SYSTEM\WINPW.EXE
O4 - HKLM\..\RunServices: [ADDZG.EXE] C:\WINDOWS\ADDZG.EXE
O4 - HKLM\..\RunServices: [ATLJY32.EXE] C:\WINDOWS\SYSTEM\ATLJY32.EXE
O4 - HKLM\..\RunServices: [ADDNF32.EXE] C:\WINDOWS\SYSTEM\ADDNF32.EXE
O4 - HKLM\..\RunServices: [APIUQ32.EXE] C:\WINDOWS\APIUQ32.EXE
O4 - HKLM\..\RunServices: [NTDE.EXE] C:\WINDOWS\SYSTEM\NTDE.EXE
O4 - HKLM\..\RunServices: [CRXQ32.EXE] C:\WINDOWS\SYSTEM\CRXQ32.EXE
O4 - HKLM\..\RunServices: [IETQ32.EXE] C:\WINDOWS\IETQ32.EXE
O4 - HKLM\..\RunServices: [MFCTT32.EXE] C:\WINDOWS\MFCTT32.EXE
O4 - HKLM\..\RunServices: [SDKIW.EXE] C:\WINDOWS\SYSTEM\SDKIW.EXE
O4 - HKLM\..\RunServices: [NETTQ32.EXE] C:\WINDOWS\SYSTEM\NETTQ32.EXE
O4 - HKCU\..\Run: [Yahoo! Pager] C:\Program Files\Yahoo!\Messenger\ypager.exe -quiet
O4 - HKCU\..\Run: [Jhmunae] C:\WINDOWS\SYSTEM\aktkx.exe
O8 - Extra context menu item: Web Rebates - file://C:\PROGRAM FILES\WEB_REBATES\Sy1150\Tp1150\scri1150a.htm
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YHEXBMES0521.DLL
O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\PROGRAM FILES\YAHOO!\MESSENGER\YHEXBMES0521.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\PROGRAM FILES\AIM\AIM.EXE
O9 - Extra button: SideFind - {10E42047-DEB9-4535-A118-B3F6EC39B807} - C:\PROGRAM FILES\SIDEFIND\SIDEFIND.DLL
O15 - Trusted Zone: *.05p.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.clickspring.net
O15 - Trusted Zone: *.blazefind.com
O15 - Trusted Zone: *.mt-download.com
O15 - Trusted Zone: *.flingstone.com
O15 - Trusted Zone: *.slotch.com
O15 - Trusted Zone: *.my-internet.info
O15 - Trusted Zone: *.scoobidoo.com
O15 - Trusted Zone: *.searchbarcash.com
O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} (YAddBook Class) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/suite/yautocomplete.cab
O16 - DPF: Yahoo! Literati - http://download.games.yahoo.com/games/clients/y/tt3_x.cab
O16 - DPF: ppctlcab - http://www.pestscan.com/scanner/ppctlcab.cab
O16 - DPF: {2FC9A21E-2069-4E47-8235-36318989DB13} (PPSDKActiveXScanner.MainScreen) - http://www.pestscan.com/scanner/axscanner.cab
O16 - DPF: Yahoo! Checkers - http://download.games.yahoo.com/games/clients/y/kt4_x.cab
O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
O16 - DPF: Yahoo! Graffiti - http://download.games.yahoo.com/games/clients/y/grt5_x.cab
O16 - DPF: Yahoo! Towers 2.0 - http://download.games.yahoo.com/games/clients/y/ywt0_x.cab
O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_f...3d36297b2b37:b70ac5aa8ec48e2e58a29296baabe1d6
O16 - DPF: {386A771C-E96A-421F-8BA7-32F1B706892F} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4.0/0006_regular.cab
O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-download.com/MediaTicketsInstaller.cab
O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - C:\WINDOWS\MSOPT.DLL
 
Joined
Feb 23, 2003
Messages
16,274
Printing this may help you

1. Download this tool called about:Buster http://www.dotcomsecurity.org/downloads/AboutBuster.zip

Unzip it to your Desktop.

Start about:Buster. Then hit update. A new screen should pop up. On that screen, hit Check for Updates. If it says it found an update, hit Download Updates. If it doesnt find an update, it will automatically tell you and exit.

Do nothing more with the program at this time.

2. Click here http://www.lavasoftusa.com/support/download/ to download Ad-Aware SE and install. Open the program and click on "check for updates now" to make sure you have the latest reference file. If not, click *ok* and let it download and install the updates by clicking on *Finish* after the update download is completed. Exit the program.

3. Print out these instructions so you have them handy as most of the steps need to be done in Safe Mode and you may not be able to go online.

4. Make sure your PC is configured to show hidden files and folders....
http://dotcomsecurity.org/forums/index.php?showtopic=57

5. Next, go to Start->Run and type "Services.msc" (without quotes) then hit Ok You may not find it, if not go on to step 6

Scroll down and find the service called "Network Security Service." When you find it, double-click on it. In the next window that opens, click the Stop button, then click on properties and, under the General Tab, change the Startup Type to Disabled. Now hit Apply and then Ok and close any open windows.

6. Reboot to Safe Mode http://dotcomsecurity.org/forums/index.php?showtopic=55



7. Scan with Hijack This and put checks next to all the following, then with all other windows closed click "Fix Checked"









R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://find4u.net/sp.htm

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://find4u.net/index.htm

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\kkdsu.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\kkdsu.dll/sp.html#28129

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\kkdsu.dll/sp.html#28129

R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\kkdsu.dll/sp.html#28129

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://find4u.net/sp.htm

R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://find4u.net/index.htm

R3 - Default URLSearchHook is missing

O2 - BHO: twaintecObj Class - {000020DD-C72E-4113-AF77-DD56626C6C42} - C:\WINDOWS\TWAINTEC.DLL

O2 - BHO: Class - {8A512041-7085-7C2F-ABCB-5C2E0FF49B4E} - C:\WINDOWS\SYSTEM\JAVAEQ.DLL

O3 - Toolbar: ISTbar - {5F1ABCDB-A875-46c1-8345-B72A4567E486} - C:\PROGRAM FILES\ISTBAR\ISTBAR.DLL (file missing)

O4 - HKLM\..\Run: [IST Service] C:\Program Files\ISTsvc\istsvc.exe

O4 - HKLM\..\Run: [Internet Optimizer] "C:\Program Files\Internet Optimizer\optimize.exe"

O4 - HKLM\..\Run: [xmxwebim] C:\WINDOWS\SYSTEM\kxfvvvm.exe

O4 - HKLM\..\Run: [WebRebates0] "C:\PROGRAM FILES\WEB_REBATES\WebRebates0.exe"

O4 - HKLM\..\Run: [BullsEye Network] C:\Program Files\BullsEye Network\bin\bargains.exe

O4 - HKLM\..\RunServices: [APIIP32.EXE] C:\WINDOWS\APIIP32.EXE

O4 - HKLM\..\RunServices: [ATLRU32.EXE] C:\WINDOWS\SYSTEM\ATLRU32.EXE

O4 - HKLM\..\RunServices: [WINWR.EXE] C:\WINDOWS\SYSTEM\WINWR.EXE

O4 - HKLM\..\RunServices: [NETPZ.EXE] C:\WINDOWS\SYSTEM\NETPZ.EXE

O4 - HKLM\..\RunServices: [MFCSD32.EXE] C:\WINDOWS\MFCSD32.EXE

O4 - HKLM\..\RunServices: [SDKCB.EXE] C:\WINDOWS\SDKCB.EXE

O4 - HKLM\..\RunServices: [D3EQ.EXE] C:\WINDOWS\D3EQ.EXE

O4 - HKLM\..\RunServices: [IPBS.EXE] C:\WINDOWS\SYSTEM\IPBS.EXE

O4 - HKLM\..\RunServices: [JAVALF32.EXE] C:\WINDOWS\JAVALF32.EXE

O4 - HKLM\..\RunServices: [SYSWB.EXE] C:\WINDOWS\SYSTEM\SYSWB.EXE

O4 - HKLM\..\RunServices: [CRTT32.EXE] C:\WINDOWS\CRTT32.EXE

O4 - HKLM\..\RunServices: [NETEK32.EXE] C:\WINDOWS\SYSTEM\NETEK32.EXE

O4 - HKLM\..\RunServices: [MFCGK.EXE] C:\WINDOWS\SYSTEM\MFCGK.EXE

O4 - HKLM\..\RunServices: [NTAC32.EXE] C:\WINDOWS\NTAC32.EXE

O4 - HKLM\..\RunServices: [NETAJ.EXE] C:\WINDOWS\SYSTEM\NETAJ.EXE

O4 - HKLM\..\RunServices: [D3KF32.EXE] C:\WINDOWS\D3KF32.EXE

O4 - HKLM\..\RunServices: [SDKYL.EXE] C:\WINDOWS\SYSTEM\SDKYL.EXE

O4 - HKLM\..\RunServices: [APIOQ32.EXE] C:\WINDOWS\SYSTEM\APIOQ32.EXE

O4 - HKLM\..\RunServices: [JAVAVB.EXE] C:\WINDOWS\JAVAVB.EXE

O4 - HKLM\..\RunServices: [IPKL.EXE] C:\WINDOWS\IPKL.EXE

O4 - HKLM\..\RunServices: [SYSWU.EXE] C:\WINDOWS\SYSTEM\SYSWU.EXE

O4 - HKLM\..\RunServices: [MFCWL32.EXE] C:\WINDOWS\SYSTEM\MFCWL32.EXE

O4 - HKLM\..\RunServices: [APPBY32.EXE] C:\WINDOWS\APPBY32.EXE

O4 - HKLM\..\RunServices: [MFCNX32.EXE] C:\WINDOWS\SYSTEM\MFCNX32.EXE

O4 - HKLM\..\RunServices: [APPNR32.EXE] C:\WINDOWS\APPNR32.EXE

O4 - HKLM\..\RunServices: [ATLOX32.EXE] C:\WINDOWS\ATLOX32.EXE

O4 - HKLM\..\RunServices: [APIGV32.EXE] C:\WINDOWS\APIGV32.EXE

O4 - HKLM\..\RunServices: [NETCN32.EXE] C:\WINDOWS\NETCN32.EXE

O4 - HKLM\..\RunServices: [MFCZP.EXE] C:\WINDOWS\MFCZP.EXE

O4 - HKLM\..\RunServices: [WINMP.EXE] C:\WINDOWS\WINMP.EXE

O4 - HKLM\..\RunServices: [WINOQ.EXE] C:\WINDOWS\WINOQ.EXE

O4 - HKLM\..\RunServices: [WINKY.EXE] C:\WINDOWS\WINKY.EXE

O4 - HKLM\..\RunServices: [APIBQ.EXE] C:\WINDOWS\SYSTEM\APIBQ.EXE

O4 - HKLM\..\RunServices: [WINPW.EXE] C:\WINDOWS\SYSTEM\WINPW.EXE

O4 - HKLM\..\RunServices: [ADDZG.EXE] C:\WINDOWS\ADDZG.EXE

O4 - HKLM\..\RunServices: [ATLJY32.EXE] C:\WINDOWS\SYSTEM\ATLJY32.EXE

O4 - HKLM\..\RunServices: [ADDNF32.EXE] C:\WINDOWS\SYSTEM\ADDNF32.EXE

O4 - HKLM\..\RunServices: [APIUQ32.EXE] C:\WINDOWS\APIUQ32.EXE

O4 - HKLM\..\RunServices: [NTDE.EXE] C:\WINDOWS\SYSTEM\NTDE.EXE

O4 - HKLM\..\RunServices: [CRXQ32.EXE] C:\WINDOWS\SYSTEM\CRXQ32.EXE

O4 - HKLM\..\RunServices: [IETQ32.EXE] C:\WINDOWS\IETQ32.EXE

O4 - HKLM\..\RunServices: [MFCTT32.EXE] C:\WINDOWS\MFCTT32.EXE

O4 - HKLM\..\RunServices: [SDKIW.EXE] C:\WINDOWS\SYSTEM\SDKIW.EXE

O4 - HKLM\..\RunServices: [NETTQ32.EXE] C:\WINDOWS\SYSTEM\NETTQ32.EXE

O4 - HKCU\..\Run: [Jhmunae] C:\WINDOWS\SYSTEM\aktkx.exe

O8 - Extra context menu item: Web Rebates - file://C:\PROGRAM FILES\WEB_REBATES\Sy1150\Tp1150\scri1150a.htm

O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm

O15 - Trusted Zone: *.05p.com
O15 - Trusted Zone: *.searchmiracle.com
O15 - Trusted Zone: *.clickspring.net
O15 - Trusted Zone: *.blazefind.com
O15 - Trusted Zone: *.mt-download.com
O15 - Trusted Zone: *.flingstone.com
O15 - Trusted Zone: *.slotch.com
O15 - Trusted Zone: *.my-internet.info
O15 - Trusted Zone: *.scoobidoo.com
O15 - Trusted Zone: *.searchbarcash.com

O16 - DPF: {15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6} - http://public.windupdates.com/get_f...3d36297b2b37:b70ac5aa8ec48e2e58a29296baabe1d6

O16 - DPF: {386A771C-E96A-421F-8BA7-32F1B706892F} (Installer Class) - http://www.xxxtoolbar.com/ist/softwares/v4.0/0006_regular.cab

O16 - DPF: {9EB320CE-BE1D-4304-A081-4B4665414BEF} (MediaTicketsInstaller Control) - http://www.mt-download.com/MediaTicketsInstaller.cab

O18 - Protocol: icoo - {4A8DADD4-5A25-4D41-8599-CB7458766220} - C:\WINDOWS\MSOPT.DLL

Now, search for, and delete if found, (some files may not be present after previous steps) the following files:

C:\PROGRAM FILES\WEB_REBATES
C:\Program Files\ISTsvc
C:\Program Files\Internet Optimizer
C:\WINDOWS\SYSTEM\kxfvvvm.exe
C:\Program Files\BullsEye Network

8. Go to Start->Run and type Regedit then click Ok. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
and highlight Services in the left pane. In the right pane, look for any of these entries:

__NS_Service
__NS_Service_2
__NS_Service_3

If any are listed, right-click that entry in the right pane and choose Delete.

Again in Regedit, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root and highlight Root in the Left Pane. In the right pane, look for these entries (the number at the end should correspond to the first one you deleted above):

LEGACY___NS_Service
LEGACY___NS_Service_2
LEGACY___NS_Service_3

If you find it, right-click it in the right-pane and choose delete.

Remain in Safe Mode....

9. Double click on about:Buster to start the program. Hit Start and then Ok. The program should start scanning. When it's finished, hit Exit and reboot, again in Safe Mode.

Run about:Buster once more to make sure everything is ok. Reboot into Safe Mode when finished.

Save the about:Buster report (copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

10. Remaining in Safe Mode, Reconfigure Ad-Aware SE for a custom scan:

Launch the program, and click on the Gear at the top of the start screen.

Under "General Settings" all available options should be selected.

Click the "Scanning" button.
Under "Drives, Folders and Files," select "Scan within Archives".
Click "Drives and folders to scan" and select your installed hard drives.
Under "Memory & Registry," select all options.

Click the "Advanced" button.
Under "Logfile detail level," select all options.

Click the "Defaults" button.
If you want to keep your current settings for your homepage and searchpage,
select "Read current settings from system." Otherwise, Ad-aware will reset them.

Click the "Tweak" button.
Under "Scanning Engine," select the following:
"Unload recognized processes during scanning."
Under "Cleaning Engine," select the following:
"Always try to unload modules before deletion."
"During removal unload Explorer and IE if necessary."
"Let Windows remove files in use after reboot."
Click on "Proceed" to save these Preferences.

Run the Ad-Aware scan, making sure that the mode selected is "Use custom scanning options."

When the scan is finished, the screen will tell you if anything has been found, click "Next." The bad files will be listed, right click the pane and click "Select all objects" - this will put a check mark in the box at the side, click "Next" again and click "OK" at the prompt "# objects will be removed. Continue?"

11. Clean out temporary and TIF files.....

Delete your temporary files by deleting all files and folders that are in those folders (do not delete the temp folder itself) like for example:

C:\WINDOWS\Temp\

C:\Temp\

C:\Documents and Settings\username\Local Settings\Temp\

Also delete your Temporary Internet Files, be sure to also select "delete all offline content."

Empty your Recycle Bin and reboot into normal mode.

12. Perform online virus scans at Trend Micro and Panda Software (See links below). Allow the programs to delete anything they may find. Reboot after each scan.

13. Download and install this free anti-Trojan program: http://www.emsisoft.com/en/software/free/

Perform a scan and allow the program to remove anything it may find.

14. Go to the Windows Update site (see link below) to download and install ALL critical updates. Reboot when finished.

15. NOTE: Two possibly three files may have been deleted from your computer by the hijacker and may need to be replaced. Check to see if these are missing.

a. Control.exe

b. hosts (with no extension)

c. SDHelper.dll (if you are using Spybot Search & Destroy)

If control. exe is missing
Go here: http://www.spywareinfo.com/~merijn/...es.html#control
and download the version of control.exe for your operating system. If you are running Windows 95/98/98SE/ME: copy it to C:\WINDOWS
Windows 2000, copy it to c:\winnt\system32\.
For Windows XP, copy it to c:\windows\system32\.

Download the Hoster from here: http://members.aol.com/toadbee/hoster.zip
Press 'Restore Original Hosts' and press 'OK'
Exit Program.
Note: if you were using a custom Hosts file you will need to replace any of those entries yourself

If you have Spybot S&D installed and SDHelper.dll is missing, replace it
Here
and download SDHelper.dll. Copy the file to the folder containing you Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)

16. Additionally, Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended here:
http://www.spywareinfo.com/articles...ked/prevent.php
QUOTE
ActiveX controls and plug-ins

* Download signed ActiveX controls (Prompt)
* Download unsigned ActiveX controls (Disable)
* Initialize and script ActiveX controls not marked as safe (Disable)
* Run ActiveX controls and plug-ins (Enabled) (This actually refers to Java and Flash, not ActiveX)
* Script ActiveX controls marked safe for scripting (Prompt)


17. Reboot to Normal Mode, then scan with HijackThis and post a fresh log into this same thread along with your about:Buster log.
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Top