Older PC with Spyware, Malware and possible Trojans

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

magnum35

Thread Starter
Joined
Sep 30, 2008
Messages
1
I just ran Eusing registry cleaner as it seems to do the best I have found thus far. Below is my hijackthis log.
Please help out thanks
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 9:51:46 AM, on 9/30/2008
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)
Boot mode: Normal

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\msdtc.exe
C:\WINNT\system32\ntvk32.exe
C:\WINNT\System32\llssrv.exe
C:\WINNT\System32\tcpsvcs.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\snmp.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\Dfssvc.exe
C:\WINNT\System32\dns.exe
C:\WINNT\system32\mqsvc.exe
C:\WINNT\Explorer.EXE
C:\WINNT\msvj32.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\iTunes\iTunes.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\WINNT\system32\wuauclt.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\WINNT\system32\taskmgr.exe
C:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = :0
R3 - Default URLSearchHook is missing
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Class - {079FB08C-366B-FDEB-3E89-978A67746224} - (no file)
O2 - BHO: Class - {30B36CC6-8E7C-0A94-5B94-E15C49EE738E} - (no file)
O2 - BHO: Class - {34575C2A-5B57-EBAD-7D49-F18EE966FA39} - C:\WINNT\winig.dll
O2 - BHO: Class - {7679089D-A1D1-C4EB-172C-010E8E0B8980} - C:\WINNT\system32\appvx.dll
O2 - BHO: Class - {869AC35F-5F1A-ABC7-04D4-AA0D80E2EF03} - C:\WINNT\system32\javakt.dll
O2 - BHO: Class - {8F301203-B818-4B05-7652-223F1BE22BEC} - C:\WINNT\system32\d3of32.dll
O2 - BHO: Class - {9B55D29F-0137-085F-0C25-C369179408EE} - (no file)
O2 - BHO: Class - {A02EE2AB-468C-2B54-8C41-14A6846BFF9B} - C:\WINNT\ipnp.dll
O2 - BHO: Class - {D78BEB28-D826-058E-BDBF-3E7CDDE87971} - C:\WINNT\ieqt32.dll
O2 - BHO: Class - {D81BDAA1-D347-C3BB-C8BF-0B48177F18A1} - C:\WINNT\ipki.dll
O2 - BHO: Class - {DEFC7FFB-2275-95B8-5F00-2B0707AC3773} - C:\WINNT\sysqe.dll
O2 - BHO: Class - {E2A44EF0-FD55-E652-D543-A3B9FF538C37} - C:\WINNT\system32\appwd.dll
O2 - BHO: Class - {F6CBE672-2D4A-4D8F-BFA0-EE3A0AA5E340} - C:\WINNT\system32\mfcdi32.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - (no file)
O4 - HKLM\..\Run: [HPLJ Config] C:\Program Files\Hewlett-Packard\hp LaserJet 1150_1300\SetConfig.exe -c Direct -p LPT1: -pn "hp LaserJet 1300 PCL 6" -n 0 -l 1033 -sl 120000
O4 - HKLM\..\Run: [wintv32.exe] C:\WINNT\system32\wintv32.exe
O4 - HKLM\..\Run: [msvj32.exe] C:\WINNT\msvj32.exe
O4 - HKUS\S-1-5-21-1229272821-1454471165-725345543-1001\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'NetShowServices')
O4 - HKUS\.DEFAULT\..\RunOnce: [^SetupICWDesktop] C:\Program Files\Internet Explorer\Connection Wizard\icwconn1.exe /desktop (User 'Default user')
O4 - Global Startup: Cisco Systems VPN Client.lnk.disabled
O4 - Global Startup: WinZip Quick Pick.lnk.disabled
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
O16 - DPF: DigiChat Applet - http://host7.digichat.com/DigiChat/DigiClasses/Client_IE.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=36467&clcid=0x409
O16 - DPF: {22A88341-AFCB-45F0-A856-C2BAE74F878E} (InstallX Class) - http://www.75tz.com/codac/inst2_ax.cab
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Program Files\Yahoo!\Common\yinsthelper.dll
O16 - DPF: {41F17733-B041-4099-A042-B518BB6A408C} - http://a1540.g.akamai.net/7/1540/52...pple.com/bonnie/us/win/QuickTimeInstaller.exe
O16 - DPF: {9B03C5F1-F5AB-47EE-937D-A8EDA626F876} (Anonymizer Anti-Spyware Scanner) - http://download.zonelabs.com/bin/promotions/spywaredetector/WebAAS.cab
O16 - DPF: {FFFFFFFF-CACE-BABE-BABE-00AA0055595A} - http://www.trueswitch.com/comcast/TrueInstallComcast.exe
O23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINNT\system32\ntvk32.exe
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - Service: iPod Service (iPodService) - Apple Computer, Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINNT\system32\HPZipm12.exe

--
End of file - 6562 bytes
 
Joined
Feb 15, 2004
Messages
12,302
hi there, you have an old hijacker!


You don't appear to ahve either a firewall or an anti virus, download these and instlal them, once instlaled update anti vir!


Comodo firewall. Sign up it's free!

http://www.personalfirewall.trustix.com/


Threads on comodo!

http://www.wilderssecurity.com/forumdisplay.php?f=31




Anti-vir

http://www.free-av.com/


You will need to download the following tools and have them ready to run.
Do not run any of them until instructed to do so:

Click: http://castlecops.com/zx/flrman1/cwsserviceremove.zip to download
cwsserviceremove.zip and unzip it to your desktop.


Download Killbox here: http://www.thespykiller.co.uk/files/killbox.exe and
save it to your desktop.


Click here: http://cwshredder.net/bin/CWSInstall.exe to download
CWSinstall.exe to the desktop.


Click: http://www.downloads.subratam.org/AboutBuster.zip to download
AboutBuster created by Rubber Ducky.


Unzip AboutBuster to the Desktop then click the "Update Button" then click
"Check for Update" and download the updates and then click "Exit" because I
don't want you to run it yet. Just get the updates so it is ready to run
later in safe mode.


Now go ahead and set your computer to show hidden files like so:


Because XP will not always show you hidden files and folders by default,
Go to Start > Search and under "More advanced search options".
Make sure there is a check by "Search System Folders" and "Search hidden
files and folders" and "Search system subfolders"

Next click on My Computer. Go to Tools > Folder Options. Click on the View
tab and make sure that "Show hidden files and folders" is checked. Also
uncheck "Hide protected operating system files" and "Hide extensions for
known file types" . Now click "Apply to all folders"
Click "Apply" then "OK"


______________________________________________________________________

Sign off the Internet and remain offline until this procedure is complete.
Unplug your modem or disconnect the cable or phone line. Copy these
instructions to notepad and save them on your desktop for easy access. You
must follow these directions exactly and you cannot skip any part of it.
______________________________________________________________________


Click Start > Run > and type in:

services.msc

Click OK.

In the services window find Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I)
Right click and choose "Properties". On the "General" tab under "Service
Status" click the "Stop" button to stop the service. Beside "Startup Type"
in the dropdown menu select "Disabled". Click Apply then OK. Exit the
Services utility.


CAUTION: There is also a service named Remote Procedure Call (RPC) Locator
and one called Remote Procedure Call (RPC) . These
are the legitimate services. Do not stop those two.


Note: You may get an error here when trying to access the properties of the
service. If you do get an error, just select the service and look there in
the top left of the main service window and click "Stop" to stop the
service. If that gives an error or it is already stopped, just skip this
step and proceed with the rest.


Remote Procedure Call (RPC) Helper
Network Security Service
Workstation Netlogon Service
Network Security Service (NSS)



______________________________________________________________________
In Hijack This, click on the "Open Misc Tools section" button. Next click
the
"Delete an NT service" button. Copy and paste the following in that box:

11Fßä#·ºÄÖ`I


Click OK.


Restart to safe mode.

http://service1.symantec.com/SUPPOR...001052409420406

Perform the following steps in safe mode:
____________________________________________________________________

Double click on the cwsserviceemove.reg file you downloaded at the beginning
to enter into the registry. Answer yes when asked to have its contents added
to the registry.
____________________________________________________________________

Go to Start > Run and type Hijackthis. Press enter to start HijackThis.
DO NOT OPEN ANYTHING ELSE!



Put a check by these entries in Hijack This and click the "Fix Checked"
button:


R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINNT\zflfg.dll/sp.html#37049
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINNT\zflfg.dll/sp.html#37049
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {079FB08C-366B-FDEB-3E89-978A67746224} - (no file)
O2 - BHO: Class - {30B36CC6-8E7C-0A94-5B94-E15C49EE738E} - (no file)
O2 - BHO: Class - {34575C2A-5B57-EBAD-7D49-F18EE966FA39} - C:\WINNT\winig.dll
O2 - BHO: Class - {7679089D-A1D1-C4EB-172C-010E8E0B8980} - C:\WINNT\system32\appvx.dll
O2 - BHO: Class - {869AC35F-5F1A-ABC7-04D4-AA0D80E2EF03} - C:\WINNT\system32\javakt.dll
O2 - BHO: Class - {8F301203-B818-4B05-7652-223F1BE22BEC} - C:\WINNT\system32\d3of32.dll
O2 - BHO: Class - {9B55D29F-0137-085F-0C25-C369179408EE} - (no file)
O2 - BHO: Class - {A02EE2AB-468C-2B54-8C41-14A6846BFF9B} - C:\WINNT\ipnp.dll
O2 - BHO: Class - {D78BEB28-D826-058E-BDBF-3E7CDDE87971} - C:\WINNT\ieqt32.dll
O2 - BHO: Class - {D81BDAA1-D347-C3BB-C8BF-0B48177F18A1} - C:\WINNT\ipki.dll
O2 - BHO: Class - {DEFC7FFB-2275-95B8-5F00-2B0707AC3773} - C:\WINNT\sysqe.dll
O2 - BHO: Class - {E2A44EF0-FD55-E652-D543-A3B9FF538C37} - C:\WINNT\system32\appwd.dll
O2 - BHO: Class - {F6CBE672-2D4A-4D8F-BFA0-EE3A0AA5E340} - C:\WINNT\system32\mfcdi32.dll
O4 - HKLM\..\Run: [wintv32.exe] C:\WINNT\system32\wintv32.exe
O4 - HKLM\..\Run: [msvj32.exe] C:\WINNT\msvj32.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - Extra button: (no name) - {6685509E-B47B-4f47-8E16-9A5F3A62F683} - file://C:\Program Files\Ebates_MoeMoneyMaker\Sy350\Tp350\scri350a.htm (file missing) (HKCU)
O23 - Service: Remote Procedure Call (RPC) Helper ( 11Fßä#·ºÄÖ`I) - Unknown owner - C:\WINNT\system32\ntvk32.exe

___________________________________________________________________


Next run aboutbuster. Double click aboutbuster.exe, click OK, click Start,
then click OK. This will scan your computer for the bad files and delete
them.
_______________________________________________________________________

Finally, run CWShredder. Just click on the cwshredder.exe then click "Fix"
(Not "Scan only") and let it do its thing.

_______________________________________________________________________


Now run cleanup




Double-click on Killbox.exe to run it. Now put a tick by Standard File Kill.
In the Full Path of File to Delete box, copy and paste each of the following
lines one at a time then click on the button that has the red circle with
the
X in the middle after you enter each file. It will ask for confirmation to
delete the file. Click Yes. Continue with that same procedure until you have
copied and pasted all of these in the Paste Full Path of File to Delete box.



Note: It is possible that Killbox will tell you that one or more files do
not
exist. If that happens, just continue on with all the files. Be sure you
don't miss any.


C:\WINNT\system32\wintv32.exe
C:\WINNT\msvj32.exe
C:\Program Files\Ebates_MoeMoneyMaker
C:\WINNT\system32\ntvk32.exe


__________________________________________________________

In safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder
and
go to Edit > Select All then Edit > Delete to delete the entire contents of
the Temp folder.

Go to Start > Run and type %temp% in the Run box. The Temp folder will open.
Click Edit > Select All then Edit > Delete to delete the entire contents of
the Temp folder.

Finally go to Control Panel > Internet Options. On the General tab under
"Temporary Internet Files" Click "Delete Files". Put a check by "Delete
Offline Content" and click OK. Click on the Programs tab then click the
"Reset Web Settings" button. Click Apply then OK.
_______________________________________________________________________



Boot back into Windows now.




This hijacker is known to alter or delete certain files so check this out
please:


Download the Hoster from:
http://www.funkytoad.com/download/hoster.zip UnZip
the file and press "Restore Original Hosts" and press "OK". Exit Program.


If you have Spybot S&D installed you will also need to replace one file. Go
to: http://www.spywareinfo.com/~merijn/winfiles.html and download
SDHelper.dll. Copy the file to the folder containing your Spybot S&D program
(normally C:\Program Files\Spybot - Search & Destroy)


Check in the C:\Windows\system32 folder to be sure you have a file named
Shell.dll. If you do not have one, go to the C:\Windows\system32\dllcache
folder.


Find shell.dll and right click on it. Choose Copy from the menu.
Open the System32 folder and right click on an empty space in the window.
Choose Paste from the menu. Otherwise, you can download following the
instructions here: http://www.bleepingcomputer.com/files/shellxp.php


control.exe may have been deleted.
See if control.exe is present in C:\windows\system32


If control.exe isn't there, go to:
http://www.richardthelionhearted.co...es.html#control, and download
control.exe per the instructions at the site.


IMPORTANT!: Please check your ActiveX security settings. They may have been
changed by this CWS variant to allow ALL ActiveX!! Reset your ActiveX
security settings like so... Go to Internet Options > Security > Internet,
press 'default level', then OK.
Now press "Custom Level."
In the ActiveX section, set the first two options (Download signed and
unsigned ActiveX
controls) to 'prompt', and 'Initialize and Script ActiveX controls not
marked as safe" to 'disable'.




Please download Malwarebytes Anti-Malware and save it to your desktop. alternate download link 1 alternate download link 2

http://malwarebytes.gt500.org/mbam-setup.exe

http://www.majorgeeks.com/Malwarebytes_Anti-Malware_d5756.html

* Make sure you are connected to the Internet.
* Double-click on Download_mbam-setup.exe to install the application.
* When the installation begins, follow the prompts and do not make any changes to default settings.
* When installation has finished, make sure you leave both of these checked:
o Update Malwarebytes' Anti-Malware
o Launch Malwarebytes' Anti-Malware
* Then click Finish.
* MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
* On the Scanner tab:
o Make sure the "Perform Quick Scan" option is selected.
o Then click on the Scan button.
* If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
* The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
* When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
* Click OK to close the message box and continue with the removal process.
* Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
* Make sure that everything is checked, and click Remove Selected.
* When removal is completed, a log report will open in Notepad and you may be prompted to restart your computer. (see Note below)
* The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
* Copy and paste the contents of that report in your next reply with a new hijackthis log.

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts. Click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




* Download Dr.Web CureIt to the desktop:
ftp://ftp.drweb.com/pub/drweb/cureit/drweb-cureit.exe

* Doubleclick the drweb-cureit.exe file and Allow to run the express scan
* This will scan the files currently running in memory and when something is
found,
click the yes button when it asks you if you want to cure it. This is only a
short scan.
* Once the short scan has finished, Click Options > Change settings
* Choose the "Scan"-tab, remove the mark at "Heuristic analysis".
* Back at the main window, mark the drives that you want to scan.
* Select all drives. A red dot shows which drives have been chosen.
* Click the green arrow at the right, and the scan will start.
* Click 'Yes to all' if it asks if you want to cure/move the file.
* When the scan has finished, look if you can click next icon next to the
files found: IPB Image
* If so, click it and then click the next icon right below and select Move
incurable as you'll see in next image:
IPB Image
This will move it to the %userprofile%\DoctorWeb\quarantaine-folder if it
can't be cured. (this in case if we need samples)
* After selecting, in the Dr.Web CureIt menu on top, click file and choose
save report list
* Save the report to your desktop. The report will be called DrWeb.csv
* Close Dr.Web Cureit.
* Reboot your computer!! Because it could be possible that files in use will
be moved/deleted during reboot.





post another hijack this log, the malwarebytes and dr web log
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top