1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

safetyhomepage infection?

Discussion in 'Virus & Other Malware Removal' started by pons, Aug 3, 2006.

Thread Status:
Not open for further replies.
Advertisement
  1. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    Hi, I somehow got infected .
    When trying to reach my homepage (yahoo in this case), I get directed to a site that calls itself "safetyhomepage.com".
    Is there a simple way to get rid of it? Is there a program that can help me get rid of the pest?

    I run Win XP Pro, and my computer is protected (or I thought it was protected) by

    Avast, Kerio, SpyBot, Spy Blaster, and Evido.

    I don't know how bad this is, but I really, really want to clean my machine.
    Any help will be appreciated

    sebastian pons
     
  2. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    Please do this:

    Click here to download HJTsetup.exe
    • Save HJTsetup.exe to your desktop.
    • Double click on the HJTsetup.exe icon on your desktop.
    • By default it will install to C:\Program Files\Hijack This.
    • Continue to click Next in the setup dialogue boxes until you get to the Select Addition Tasks dialogue.
    • Put a check by Create a desktop icon then click Next again.
    • Continue to follow the rest of the prompts from there.
    • At the final dialogue box click Finish and it will launch Hijack This.
    • Click on the Do a system scan and save a log file button. It will scan and then ask you to save the log.
    • Click Save to save the log file and then the log will open in notepad.
    • Click on "Edit > Select All" then click on "Edit > Copy" to copy the entire contents of the log.
    • Come back here to this thread and Paste the log in your next reply.
    • DO NOT have Hijack This fix anything yet. Most of what it finds will be harmless or even required.
     
  3. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    Hi, thank you!
    Here is the HJT log:

    Logfile of HijackThis v1.99.1
    Scan saved at 23:44:37, on 03/08/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\Program Files\ewido anti-malware\ewidoctrl.exe
    C:\Program Files\ewido anti-malware\ewidoguard.exe
    C:\WINDOWS\System32\inetsrv\inetinfo.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\WINDOWS\system32\tcpsvcs.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\Program Files\IntCodec\isamonitor.exe
    C:\Program Files\IntCodec\pmsngr.exe
    C:\Program Files\IntCodec\isamini.exe
    C:\Program Files\IntCodec\pmmon.exe
    C:\WINDOWS\system32\drwtsn32.exe
    C:\WINDOWS\system32\drwtsn32.exe
    C:\WINDOWS\explorer.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\WINDOWS\System32\svchost.exe
    C:\Program Files\LeechGet 2004\LeechGet.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Micro$oft IE
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 3.3.4.99 rotem-fr
    O1 - Hosts: 40.1.1.12 mpl-natalie
    O1 - Hosts: 40.1.1.13 mpl-alex
    O1 - Hosts: 40.1.1.250 mpl-ibm
    O1 - Hosts: 20.20.20.27 silver27
    O1 - Hosts: 20.20.20.250 silverbyte
    O1 - Hosts: 172.16.0.1 yotvata-router
    O1 - Hosts: 172.16.0.103 pserver2
    O1 - Hosts: 172.16.0.104 yt-pserver4
    O1 - Hosts: 172.16.0.105 Yt-pserver5
    O1 - Hosts: 172.16.0.106 pserver-binyan1
    O1 - Hosts: 172.16.0.107 pserver-binyan2
    O1 - Hosts: 172.16.0.112 yotvata-nt
    O1 - Hosts: 172.16.0.112 yotvata
    O1 - Hosts: 172.16.0.113 yotvata-ts
    O1 - Hosts: 172.16.0.114 yotvata-ts2
    O1 - Hosts: 172.16.0.117 yotvata-office
    O1 - Hosts: 172.16.0.118 yotvata-office2
    O1 - Hosts: 172.16.0.119 tourism-office
    O1 - Hosts: 172.16.0.120 shaon-psyco
    O1 - Hosts: 172.16.0.179 yt-studio
    O1 - Hosts: 172.16.0.175 yt-gadash
    O1 - Hosts: 172.16.0.177 yt-costs
    O1 - Hosts: 172.16.0.180 yt-restaurant
    O1 - Hosts: 172.16.0.181 yt-cashier2
    O1 - Hosts: 172.16.0.182 yt-cashier1
    O1 - Hosts: 172.16.0.183 yt-cashier3
    O1 - Hosts: 172.16.0.184 yt-cashier4
    O1 - Hosts: 172.16.0.185 yt-cashier5
    O1 - Hosts: 172.16.0.186 yt-cashier6
    O1 - Hosts: 172.16.0.187 yt-cashier7
    O1 - Hosts: 172.16.0.190 yt-flight
    O1 - Hosts: 172.16.0.191 yt-minimarket1
    O1 - Hosts: 172.16.0.192 yt-minimarket2
    O1 - Hosts: 172.16.0.193 yt-minimarket3
    O1 - Hosts: 172.16.0.195 yotvata-dates
    O1 - Hosts: 172.16.0.196 yt-archive
    O1 - Hosts: 172.16.0.197 yt-garage
    O1 - Hosts: 172.16.0.198 yt-welding
    O1 - Hosts: 172.16.0.199 yt-yotitext
    O1 - Hosts: 172.16.0.200 yotvata-miznon
    O1 - Hosts: 172.16.0.201 yt-gizbar
    O1 - Hosts: 172.16.0.202 yt-erez
    O1 - Hosts: 172.16.0.203 yt-atzmon
    O1 - Hosts: 172.16.0.204 yt-construction
    O1 - Hosts: 172.16.0.205 yt-ira
    O1 - Hosts: 172.16.0.206 yt-lena
    O1 - Hosts: 172.16.0.207 yt-arie
    O1 - Hosts: 172.16.0.208 yt-orit
    O1 - Hosts: 172.16.0.209 yt-felicia
    O1 - Hosts: 172.16.0.210 yt-capon
    O1 - Hosts: 172.16.0.211 yt-tirza
    O1 - Hosts: 172.16.0.212 yt-sec2
    O1 - Hosts: 172.16.0.213 yt-malka
    O1 - Hosts: 172.16.0.214 yt-mp
    O1 - Hosts: 172.16.0.216 yt-naomi
    O1 - Hosts: 172.16.0.217 yt-secretary
    O1 - Hosts: 172.16.0.219 yt-services
    O1 - Hosts: 172.16.0.220 yt-manager
    O1 - Hosts: 172.16.0.221 yt-electricity
    O1 - Hosts: 172.16.0.222 yt-economy
    O1 - Hosts: 172.16.0.223 yt-clinic
    O1 - Hosts: 172.16.0.224 yt-wm
    O1 - Hosts: 172.16.0.226 yt-warehouse
    O1 - Hosts: 172.16.0.227 yt-consultation
    O1 - Hosts: 172.16.0.228 yt-miriam
    O1 - Hosts: 172.16.0.229 yt-vered
    O1 - Hosts: 172.16.0.230 ARD-PSICHOnew
    O1 - Hosts: 172.16.0.231 yt-cowshed
    O1 - Hosts: 172.16.0.232 yt-cowshed-plc
    O1 - Hosts: 172.16.0.233 yt-memco
    O1 - Hosts: 172.16.0.234 yt-quality
    O1 - Hosts: 172.16.0.235 yt-culture
    O1 - Hosts: 172.16.0.237 yt-library
    O1 - Hosts: 172.16.0.238 yt-project
    O1 - Hosts: 172.16.0.239 yt-elad
    O1 - Hosts: 172.16.0.240 yt-dent
    O1 - Hosts: 172.16.0.242 yt-adam5000
    O1 - Hosts: 172.16.0.243 yt-pension
    O1 - Hosts: 172.16.0.244 yt-dishes
    O1 - Hosts: 172.16.0.245 yt-nav
    O1 - Hosts: 172.16.0.246 yt-dvd
    O1 - Hosts: 172.16.0.247 yt-ulpan
    O1 - Hosts: 172.16.0.249 yt-watering
    O1 - Hosts: 172.16.0.250 yotvata-miznon
    O1 - Hosts: 172.16.0.252 yotvata-machleva
    O1 - Hosts: 172.16.1.66 ard-welfare1
    O1 - Hosts: 172.16.1.154 ard-tourism
    O1 - Hosts: 172.17.0.7 ktwest
    O1 - Hosts: 172.17.0.99 ketura-fr
    O1 - Hosts: 172.17.0.110 ketura-mail
    O1 - Hosts: 172.17.0.111 ketura
    O1 - Hosts: 172.17.0.111 ketura-nt
    O1 - Hosts: 172.17.0.113 textstore-nt
    O1 - Hosts: 172.17.0.116 ketura-ts
    O1 - Hosts: 172.17.0.117 ketura-ts2
    O1 - Hosts: 172.17.0.121 ketura-office
    O1 - Hosts: 172.17.0.215 ketura-garage-gestetner
    O1 - Hosts: 172.17.1.112 aies-nt
    O1 - Hosts: 172.17.1.112 aies
    O1 - Hosts: 172.17.1.114 aies-ts
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: (no name) - {5753791b-f607-48ca-814e-91c14d081f9e} - C:\Program Files\IntCodec\isaddon.dll
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [IE Privacy Keeper] "C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe" -startup
    O8 - Extra context menu item: Download using LeechGet - file://C:\Program Files\LeechGet 2004\\AddUrl.html
    O8 - Extra context menu item: Download using LeechGet Wizard - file://C:\Program Files\LeechGet 2004\\Wizard.html
    O8 - Extra context menu item: Parse with LeechGet - file://C:\Program Files\LeechGet 2004\\Parser.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O9 - Extra 'Tools' menuitem: IE Privacy Keeper - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {0D41B8C5-2599-4893-8183-00195EC8D5F9} (asusTek_sysctrl Class) - http://support.asus.com/common/asusTek_sys_ctrl.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1109405770531
    O16 - DPF: {82F2D6B2-6C58-4404-A930-9DB0FD90D4B1} (Driver_Detective_v43_Non_Member.DD_v43) - http://www.drivershq.com/cab/prod/Driver_Detective_v43_Non_Member.CAB
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - http://download.games.yahoo.com/games/web_games/popcap/bejeweled2/popcaploader_v6.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{14F1DEF8-35D4-4A20-9C34-884545DFFE41}: NameServer = 192.116.202.99,192.116.202.9,192.114.121.119
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C982A830-9003-406F-A899-72CB313260F8}: NameServer = 192.114.121.119,212.117.129.3
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: ewido security suite guard - ewido networks - C:\Program Files\ewido anti-malware\ewidoguard.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
    O23 - Service: Kerio Personal Firewall 4 (KPF4) - Kerio Technologies - C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe

    sebastian pons
     
  4. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    Please download SmitfraudFix (by S!Ri)

    Extract (unzip) the content (a folder named SmitfraudFix) to your Desktop. This is imperative for the tool to function properly. If using a utility such as winzip you will have to direct it there as it will not unzip to the desktop by default. The desination location should look like this (C: being your primary drive): C:\Documents and Settings\User\Desktop\SmitfraudFix

    Open the SmitfraudFix folder and double-click smitfraudfix.cmd
    Select option #1 - Search by typing 1 and press "Enter"; a text file will appear, which lists infected files (if present).
    Please copy/paste the content of that report into your next reply.

    Note : process.exe is detected by some antivirus programs (AntiVir, Dr.Web, Kaspersky) as a "RiskTool"; it is not a virus, but a program used to stop system processes. Antivirus programs cannot distinguish between "good" and "malicious" use of such programs, therefore they may alert the user.
    http://www.beyondlogic.org/consulting/proc...processutil.htm
     
  5. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    And here it is the log you asked for:

    SmitFraudFix v2.79

    Scan done at 13:25:34.70, 04/08/2006
    Run from C:\Documents and Settings\sebas\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    Fix ran in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» C:\


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS

    C:\WINDOWS\country.exe FOUND !
    C:\WINDOWS\secure32.html FOUND !
    C:\WINDOWS\toolbar.exe FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\Web


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32


    »»»»»»»»»»»»»»»»»»»»»»»» C:\WINDOWS\system32\LogFiles


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Documents and Settings\sebas\Application Data


    »»»»»»»»»»»»»»»»»»»»»»»» Start Menu


    »»»»»»»»»»»»»»»»»»»»»»»» C:\DOCUME~1\sebas\FAVORI~1


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop


    »»»»»»»»»»»»»»»»»»»»»»»» C:\Program Files

    C:\Program Files\IntCodec\ FOUND !

    »»»»»»»»»»»»»»»»»»»»»»»» Corrupted keys


    »»»»»»»»»»»»»»»»»»»»»»»» Desktop Components

    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Desktop\Components\0]
    "Source"="About:Home"
    "SubscribedURL"="About:Home"
    "FriendlyName"="My Current Home Page"


    »»»»»»»»»»»»»»»»»»»»»»»» Sharedtaskscheduler
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
    "bestreak"="{874443fe-aa33-4ebf-a6ac-73208787e62d}"


    »»»»»»»»»»»»»»»»»»»»»»»» Scanning wininet.dll infection


    »»»»»»»»»»»»»»»»»»»»»»»» End

    Thgnk you again. May I mentionthat I also get a popup about a kind of singles place
    in my Country?

    sebastian pons
     
  6. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    You should print out these instructions, or copy them to a NotePad file for reading while in Safe Mode, because you will not be able to connect to the Internet to read from this site.

    Next, please reboot your computer in Safe Mode by doing the following :
    • Restart your computer
    • After hearing your computer beep once during startup, but before the Windows icon appears, tap the F8 key continually;
    • Instead of Windows loading as normal, a menu with options should appear;
    • Select the first option, to run Windows in Safe Mode, then press "Enter".
    • Choose your usual account.
    Once in Safe Mode, open the SmitfraudFix folder again and double-click smitfraudfix.cmd
    Select option #2 - Clean by typing 2 and press "Enter" to delete infected files.

    You will be prompted: "Registry cleaning - Do you want to clean the registry?"; answer "Yes" by typing Y and press "Enter" in order to remove the Desktop background and clean registry keys associated with the infection.

    The tool will now check if wininet.dll is infected. You may be prompted to replace the infected file (if found); answer "Yes" by typing Y and press "Enter".

    The tool may need to restart your computer to finish the cleaning process; if it doesn't, please restart it into Normal Windows.

    A text file will appear onscreen, with results from the cleaning process; please copy/paste the content of that report into your next reply along with a new HijackThis log.

    The report can also be found at the root of the system drive, usually at C:\rapport.txt

    Warning: running option #2 on a non infected computer will remove your Desktop background.
     
  7. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    Hi, I thinkit maight be solved. At least I don't get any popups or friendly hookers offering whatever services they are offering....
    And to work. As you requested\:

    HJTLogfile of HijackThis v1.99.1
    Scan saved at 19:18:12, on 04/08/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\Program Files\ewido anti-malware\ewidoctrl.exe
    C:\WINDOWS\System32\inetsrv\inetinfo.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\tcpsvcs.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\Program Files\Hijackthis\HijackThis.exe
    C:\Program Files\Alwil Software\Avast4\setup\avast.setup

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Micro$oft IE
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 3.3.4.99 rotem-fr
    O1 - Hosts: 40.1.1.12 mpl-natalie
    O1 - Hosts: 40.1.1.13 mpl-alex
    O1 - Hosts: 40.1.1.250 mpl-ibm
    O1 - Hosts: 20.20.20.27 silver27
    O1 - Hosts: 20.20.20.250 silverbyte
    O1 - Hosts: 172.16.0.1 yotvata-router
    O1 - Hosts: 172.16.0.103 pserver2
    O1 - Hosts: 172.16.0.104 yt-pserver4
    O1 - Hosts: 172.16.0.105 Yt-pserver5
    O1 - Hosts: 172.16.0.106 pserver-binyan1
    O1 - Hosts: 172.16.0.107 pserver-binyan2
    O1 - Hosts: 172.16.0.112 yotvata-nt
    O1 - Hosts: 172.16.0.112 yotvata
    O1 - Hosts: 172.16.0.113 yotvata-ts
    O1 - Hosts: 172.16.0.114 yotvata-ts2
    O1 - Hosts: 172.16.0.117 yotvata-office
    O1 - Hosts: 172.16.0.118 yotvata-office2
    O1 - Hosts: 172.16.0.119 tourism-office
    O1 - Hosts: 172.16.0.120 shaon-psyco
    O1 - Hosts: 172.16.0.179 yt-studio
    O1 - Hosts: 172.16.0.175 yt-gadash
    O1 - Hosts: 172.16.0.177 yt-costs
    O1 - Hosts: 172.16.0.180 yt-restaurant
    O1 - Hosts: 172.16.0.181 yt-cashier2
    O1 - Hosts: 172.16.0.182 yt-cashier1
    O1 - Hosts: 172.16.0.183 yt-cashier3
    O1 - Hosts: 172.16.0.184 yt-cashier4
    O1 - Hosts: 172.16.0.185 yt-cashier5
    O1 - Hosts: 172.16.0.186 yt-cashier6
    O1 - Hosts: 172.16.0.187 yt-cashier7
    O1 - Hosts: 172.16.0.190 yt-flight
    O1 - Hosts: 172.16.0.191 yt-minimarket1
    O1 - Hosts: 172.16.0.192 yt-minimarket2
    O1 - Hosts: 172.16.0.193 yt-minimarket3
    O1 - Hosts: 172.16.0.195 yotvata-dates
    O1 - Hosts: 172.16.0.196 yt-archive
    O1 - Hosts: 172.16.0.197 yt-garage
    O1 - Hosts: 172.16.0.198 yt-welding
    O1 - Hosts: 172.16.0.199 yt-yotitext
    O1 - Hosts: 172.16.0.200 yotvata-miznon
    O1 - Hosts: 172.16.0.201 yt-gizbar
    O1 - Hosts: 172.16.0.202 yt-erez
    O1 - Hosts: 172.16.0.203 yt-atzmon
    O1 - Hosts: 172.16.0.204 yt-construction
    O1 - Hosts: 172.16.0.205 yt-ira
    O1 - Hosts: 172.16.0.206 yt-lena
    O1 - Hosts: 172.16.0.207 yt-arie
    O1 - Hosts: 172.16.0.208 yt-orit
    O1 - Hosts: 172.16.0.209 yt-felicia
    O1 - Hosts: 172.16.0.210 yt-capon
    O1 - Hosts: 172.16.0.211 yt-tirza
    O1 - Hosts: 172.16.0.212 yt-sec2
    O1 - Hosts: 172.16.0.213 yt-malka
    O1 - Hosts: 172.16.0.214 yt-mp
    O1 - Hosts: 172.16.0.216 yt-naomi
    O1 - Hosts: 172.16.0.217 yt-secretary
    O1 - Hosts: 172.16.0.219 yt-services
    O1 - Hosts: 172.16.0.220 yt-manager
    O1 - Hosts: 172.16.0.221 yt-electricity
    O1 - Hosts: 172.16.0.222 yt-economy
    O1 - Hosts: 172.16.0.223 yt-clinic
    O1 - Hosts: 172.16.0.224 yt-wm
    O1 - Hosts: 172.16.0.226 yt-warehouse
    O1 - Hosts: 172.16.0.227 yt-consultation
    O1 - Hosts: 172.16.0.228 yt-miriam
    O1 - Hosts: 172.16.0.229 yt-vered
    O1 - Hosts: 172.16.0.230 ARD-PSICHOnew
    O1 - Hosts: 172.16.0.231 yt-cowshed
    O1 - Hosts: 172.16.0.232 yt-cowshed-plc
    O1 - Hosts: 172.16.0.233 yt-memco
    O1 - Hosts: 172.16.0.234 yt-quality
    O1 - Hosts: 172.16.0.235 yt-culture
    O1 - Hosts: 172.16.0.237 yt-library
    O1 - Hosts: 172.16.0.238 yt-project
    O1 - Hosts: 172.16.0.239 yt-elad
    O1 - Hosts: 172.16.0.240 yt-dent
    O1 - Hosts: 172.16.0.242 yt-adam5000
    O1 - Hosts: 172.16.0.243 yt-pension
    O1 - Hosts: 172.16.0.244 yt-dishes
    O1 - Hosts: 172.16.0.245 yt-nav
    O1 - Hosts: 172.16.0.246 yt-dvd
    O1 - Hosts: 172.16.0.247 yt-ulpan
    O1 - Hosts: 172.16.0.249 yt-watering
    O1 - Hosts: 172.16.0.250 yotvata-miznon
    O1 - Hosts: 172.16.0.252 yotvata-machleva
    O1 - Hosts: 172.16.1.66 ard-welfare1
    O1 - Hosts: 172.16.1.154 ard-tourism
    O1 - Hosts: 172.17.0.7 ktwest
    O1 - Hosts: 172.17.0.99 ketura-fr
    O1 - Hosts: 172.17.0.110 ketura-mail
    O1 - Hosts: 172.17.0.111 ketura
    O1 - Hosts: 172.17.0.111 ketura-nt
    O1 - Hosts: 172.17.0.113 textstore-nt
    O1 - Hosts: 172.17.0.116 ketura-ts
    O1 - Hosts: 172.17.0.117 ketura-ts2
    O1 - Hosts: 172.17.0.121 ketura-office
    O1 - Hosts: 172.17.0.215 ketura-garage-gestetner
    O1 - Hosts: 172.17.1.112 aies-nt
    O1 - Hosts: 172.17.1.112 aies
    O1 - Hosts: 172.17.1.114 aies-ts
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [IE Privacy Keeper] "C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe" -startup
    O8 - Extra context menu item: Download using LeechGet - file://C:\Program Files\LeechGet 2004\\AddUrl.html
    O8 - Extra context menu item: Download using LeechGet Wizard - file://C:\Program Files\LeechGet 2004\\Wizard.html
    O8 - Extra context menu item: Parse with LeechGet - file://C:\Program Files\LeechGet 2004\\Parser.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O9 - Extra 'Tools' menuitem: IE Privacy Keeper - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - http://download.games.yahoo.com/games/web_games/popcap/bejeweled2/popcaploader_v6.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{14F1DEF8-35D4-4A20-9C34-884545DFFE41}: NameServer = 192.116.202.99,192.116.202.9,192.114.121.119
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C982A830-9003-406F-A899-72CB313260F8}: NameServer = 192.114.121.119,212.117.129.3
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido anti-malware\ewidoctrl.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
    O23 - Service: Kerio Personal Firewall 4 (KPF4) - Kerio Technologies - C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe
    -----------------------------------------------------------------------

    ---------------------------------------------------------------------------

    SmitFraudFix v2.79

    Scan done at 19:09:17.28, 04/08/2006
    Run from C:\Documents and Settings\sebas\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    Fix ran in safe mode

    »»»»»»»»»»»»»»»»»»»»»»»» Before SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll

    »»»»»»»»»»»»»»»»»»»»»»»» Killing process


    »»»»»»»»»»»»»»»»»»»»»»»» Generic Renos Fix

    GenericRenosFix by S!Ri


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting infected files


    »»»»»»»»»»»»»»»»»»»»»»»» Deleting Temp Files


    »»»»»»»»»»»»»»»»»»»»»»»» Registry Cleaning

    Registry Cleaning done.

    »»»»»»»»»»»»»»»»»»»»»»»» After SmitFraudFix
    !!!Attention, following keys are not inevitably infected!!!

    SrchSTS.exe by S!Ri
    Search SharedTaskScheduler's .dll


    »»»»»»»»»»»»»»»»»»»»»»»» End


    Thank you for your help
    sebastian pons
     
  8. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    I've never seen those hosts entries before. Are they entries that you put there intentionally?

    Download the trial version of Ewido Anti-spyware from HERE and save that file to your desktop. When the trial period expires it becomes freeware with reduced functions but still worth keeping.



    • Once you have downloaded Ewido Anti-spyware, locate the icon on the desktop and double-click it to launch the set up program.
    • Once the setup is complete you will need run Ewido and update the definition files.
    • On the main screen select the icon "Update" then select the "Update now" link.
    • Next select the "Start Update" button, the update will start and a progress bar will show the updates being installed.
    • Once the update has completed select the "Scanner" icon at the top of the screen, then select the "Settings" tab.
    • Once in the Settings screen click on "Recommended actions" and then select "Quarantine"
    • Under "Reports"
    • Select "Automatically generate report after every scan"
    • Un-Select "Only if threats were found"

    Close Ewido Anti-spyware, Do NOT run a scan yet. We will do that later in safe mode.


    • Reboot your computer into Safe Mode now. You can do this by restarting your computer and continually tapping the F8 key until a menu appears. Use your up arrow key to highlight Safe Mode then hit enter.
      IMPORTANT: Do not open any other windows or programs while Ewido is scanning as it may interfere with the scanning process:
    • Launch Ewido Anti-spyware by double-clicking the icon on your desktop.
    • Select the "Scanner" icon at the top and then the "Scan" tab then click on "Complete System Scan".
    • Ewido will now begin the scanning process. Be patient this may take a little time.
      Once the scan is complete do the following:
    • If you have any infections you will prompted, then select "Apply all actions"
    • Next select the "Reports" icon at the top.
    • Select the "Save report as" button in the lower left hand of the screen and save it to a text file on your system (make sure to remember where you saved that file, this is important).
    • Close Ewido and reboot your system back into Normal Mode.


    Post a new HijackThis log please.
     
  9. MFDnNC

    MFDnNC

    Joined:
    Sep 7, 2004
    Messages:
    49,014
    Cookie I saw those earlier, this has to be a business machine!
     
  10. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    Done! I think I am clean.
    BTW, MFDnSC got it partially right. I share a LAN connection with other computers,(therefore the large Hosts file) but it is not a business machine.

    Here is the latest HJT after the EVIDO scan that didn't find anything:

    Logfile of HijackThis v1.99.1
    Scan saved at 11:09:06, on 05/08/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    C:\Program Files\Alwil Software\Avast4\ashServ.exe
    C:\Program Files\ewido anti-spyware 4.0\guard.exe
    C:\WINDOWS\System32\inetsrv\inetinfo.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe
    C:\WINDOWS\system32\tcpsvcs.exe
    C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\Program Files\ewido anti-spyware 4.0\ewido.exe
    C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe
    C:\Program Files\Kerio\Personal Firewall 4\kpf4gui.exe
    C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    C:\Program Files\Alwil Software\Avast4\ashWebSv.exe
    C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Program Files\Hijackthis\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.yahoo.com/
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Micro$oft IE
    R3 - Default URLSearchHook is missing
    O1 - Hosts: 3.3.4.99 rotem-fr
    O1 - Hosts: 40.1.1.12 mpl-natalie
    O1 - Hosts: 40.1.1.13 mpl-alex
    O1 - Hosts: 40.1.1.250 mpl-ibm
    O1 - Hosts: 20.20.20.27 silver27
    O1 - Hosts: 20.20.20.250 silverbyte
    O1 - Hosts: 172.16.0.1 yotvata-router
    O1 - Hosts: 172.16.0.103 pserver2
    O1 - Hosts: 172.16.0.104 yt-pserver4
    O1 - Hosts: 172.16.0.105 Yt-pserver5
    O1 - Hosts: 172.16.0.106 pserver-binyan1
    O1 - Hosts: 172.16.0.107 pserver-binyan2
    O1 - Hosts: 172.16.0.112 yotvata-nt
    O1 - Hosts: 172.16.0.112 yotvata
    O1 - Hosts: 172.16.0.113 yotvata-ts
    O1 - Hosts: 172.16.0.114 yotvata-ts2
    O1 - Hosts: 172.16.0.117 yotvata-office
    O1 - Hosts: 172.16.0.118 yotvata-office2
    O1 - Hosts: 172.16.0.119 tourism-office
    O1 - Hosts: 172.16.0.120 shaon-psyco
    O1 - Hosts: 172.16.0.179 yt-studio
    O1 - Hosts: 172.16.0.175 yt-gadash
    O1 - Hosts: 172.16.0.177 yt-costs
    O1 - Hosts: 172.16.0.180 yt-restaurant
    O1 - Hosts: 172.16.0.181 yt-cashier2
    O1 - Hosts: 172.16.0.182 yt-cashier1
    O1 - Hosts: 172.16.0.183 yt-cashier3
    O1 - Hosts: 172.16.0.184 yt-cashier4
    O1 - Hosts: 172.16.0.185 yt-cashier5
    O1 - Hosts: 172.16.0.186 yt-cashier6
    O1 - Hosts: 172.16.0.187 yt-cashier7
    O1 - Hosts: 172.16.0.190 yt-flight
    O1 - Hosts: 172.16.0.191 yt-minimarket1
    O1 - Hosts: 172.16.0.192 yt-minimarket2
    O1 - Hosts: 172.16.0.193 yt-minimarket3
    O1 - Hosts: 172.16.0.195 yotvata-dates
    O1 - Hosts: 172.16.0.196 yt-archive
    O1 - Hosts: 172.16.0.197 yt-garage
    O1 - Hosts: 172.16.0.198 yt-welding
    O1 - Hosts: 172.16.0.199 yt-yotitext
    O1 - Hosts: 172.16.0.200 yotvata-miznon
    O1 - Hosts: 172.16.0.201 yt-gizbar
    O1 - Hosts: 172.16.0.202 yt-erez
    O1 - Hosts: 172.16.0.203 yt-atzmon
    O1 - Hosts: 172.16.0.204 yt-construction
    O1 - Hosts: 172.16.0.205 yt-ira
    O1 - Hosts: 172.16.0.206 yt-lena
    O1 - Hosts: 172.16.0.207 yt-arie
    O1 - Hosts: 172.16.0.208 yt-orit
    O1 - Hosts: 172.16.0.209 yt-felicia
    O1 - Hosts: 172.16.0.210 yt-capon
    O1 - Hosts: 172.16.0.211 yt-tirza
    O1 - Hosts: 172.16.0.212 yt-sec2
    O1 - Hosts: 172.16.0.213 yt-malka
    O1 - Hosts: 172.16.0.214 yt-mp
    O1 - Hosts: 172.16.0.216 yt-naomi
    O1 - Hosts: 172.16.0.217 yt-secretary
    O1 - Hosts: 172.16.0.219 yt-services
    O1 - Hosts: 172.16.0.220 yt-manager
    O1 - Hosts: 172.16.0.221 yt-electricity
    O1 - Hosts: 172.16.0.222 yt-economy
    O1 - Hosts: 172.16.0.223 yt-clinic
    O1 - Hosts: 172.16.0.224 yt-wm
    O1 - Hosts: 172.16.0.226 yt-warehouse
    O1 - Hosts: 172.16.0.227 yt-consultation
    O1 - Hosts: 172.16.0.228 yt-miriam
    O1 - Hosts: 172.16.0.229 yt-vered
    O1 - Hosts: 172.16.0.230 ARD-PSICHOnew
    O1 - Hosts: 172.16.0.231 yt-cowshed
    O1 - Hosts: 172.16.0.232 yt-cowshed-plc
    O1 - Hosts: 172.16.0.233 yt-memco
    O1 - Hosts: 172.16.0.234 yt-quality
    O1 - Hosts: 172.16.0.235 yt-culture
    O1 - Hosts: 172.16.0.237 yt-library
    O1 - Hosts: 172.16.0.238 yt-project
    O1 - Hosts: 172.16.0.239 yt-elad
    O1 - Hosts: 172.16.0.240 yt-dent
    O1 - Hosts: 172.16.0.242 yt-adam5000
    O1 - Hosts: 172.16.0.243 yt-pension
    O1 - Hosts: 172.16.0.244 yt-dishes
    O1 - Hosts: 172.16.0.245 yt-nav
    O1 - Hosts: 172.16.0.246 yt-dvd
    O1 - Hosts: 172.16.0.247 yt-ulpan
    O1 - Hosts: 172.16.0.249 yt-watering
    O1 - Hosts: 172.16.0.250 yotvata-miznon
    O1 - Hosts: 172.16.0.252 yotvata-machleva
    O1 - Hosts: 172.16.1.66 ard-welfare1
    O1 - Hosts: 172.16.1.154 ard-tourism
    O1 - Hosts: 172.17.0.7 ktwest
    O1 - Hosts: 172.17.0.99 ketura-fr
    O1 - Hosts: 172.17.0.110 ketura-mail
    O1 - Hosts: 172.17.0.111 ketura
    O1 - Hosts: 172.17.0.111 ketura-nt
    O1 - Hosts: 172.17.0.113 textstore-nt
    O1 - Hosts: 172.17.0.116 ketura-ts
    O1 - Hosts: 172.17.0.117 ketura-ts2
    O1 - Hosts: 172.17.0.121 ketura-office
    O1 - Hosts: 172.17.0.215 ketura-garage-gestetner
    O1 - Hosts: 172.17.1.112 aies-nt
    O1 - Hosts: 172.17.1.112 aies
    O1 - Hosts: 172.17.1.114 aies-ts
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [!ewido] "C:\Program Files\ewido anti-spyware 4.0\ewido.exe" /minimized
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\Run: [IE Privacy Keeper] "C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe" -startup
    O8 - Extra context menu item: Download using LeechGet - file://C:\Program Files\LeechGet 2004\\AddUrl.html
    O8 - Extra context menu item: Download using LeechGet Wizard - file://C:\Program Files\LeechGet 2004\\Wizard.html
    O8 - Extra context menu item: Parse with LeechGet - file://C:\Program Files\LeechGet 2004\\Parser.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_04\bin\npjpi150_04.dll
    O9 - Extra button: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell - {0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: (no name) - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra 'Tools' menuitem: ieSpell Options - {1606D6F9-9D3B-4aea-A025-ED5B2FD488E7} - C:\Program Files\ieSpell\iespell.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
    O9 - Extra button: (no name) - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O9 - Extra 'Tools' menuitem: IE Privacy Keeper - {D799B0E4-BEDE-41d2-AEE0-1E3A1C4EF918} - C:\Program Files\UnH Solutions\IE Privacy Keeper\IEPrivacyKeeper.exe (HKCU)
    O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
    O16 - DPF: {DF780F87-FF2B-4DF8-92D0-73DB16A1543A} - http://download.games.yahoo.com/games/web_games/popcap/bejeweled2/popcaploader_v6.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{14F1DEF8-35D4-4A20-9C34-884545DFFE41}: NameServer = 192.116.202.99,192.116.202.9,192.114.121.119
    O17 - HKLM\System\CCS\Services\Tcpip\..\{C982A830-9003-406F-A899-72CB313260F8}: NameServer = 192.114.121.119,212.117.129.3
    O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
    O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - Unknown owner - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe
    O23 - Service: avast! Antivirus - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashServ.exe
    O23 - Service: avast! Mail Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe" /service (file missing)
    O23 - Service: avast! Web Scanner - Unknown owner - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe" /service (file missing)
    O23 - Service: ewido anti-spyware 4.0 guard - Anti-Malware Development a.s. - C:\Program Files\ewido anti-spyware 4.0\guard.exe
    O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
    O23 - Service: Kerio Personal Firewall 4 (KPF4) - Kerio Technologies - C:\Program Files\Kerio\Personal Firewall 4\kpf4ss.exe
     
  11. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    Rescan with HijackThis, close all browser windows except HijackThis, put a check mark beside these entries and click fix checked.


    R3 - Default URLSearchHook is missing

    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k



    How are things running now?
     
  12. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    And thank you again. I6t seams that the bogeys are gone at last, and if you concurr I'd
    call the problem solved.(y)

    I got rid of the entries you adviced and I've been trying things around. So far everything checks. BTW, can you explain what those entries were?

    Take care
    sebastian pons
     
  13. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    The URL searchHook is what gets called on if you mistype a URL and is often set by malware to redirect you to their sites. This entry just means that there is no default value set.

    The other entry is a memory dump as the result of a system crash.


    Now you should turn system restore off to flush out all previous system restore points, then turn it back on and create a new restore point:

    To turn off system restore, on the Desktop, right click on My Computer and click on Properties.
    Click the System Restore tab.
    Check Turn off System Restore.
    Click Apply and then click OK.

    Restart your computer, turn System Restore back on and create a restore point.

    To create a new restore point, click on Start – All Programs – Accessories – System Tools and then select System Restore.

    In the System Restore wizard, select Create a restore point and click the Next button.

    Type a name for your new restore point then click on Create.


    I also recommend downloading SPYWAREBLASTER for added protection.

    Read here for info on how to tighten your security.



    Delete your temporary files:

    In safe mode navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit - Select All then Edit - Delete to delete the entire contents of the Temp folder.

    Go to Start - Run and type %temp% in the Run box. The Temp folder will open. Click Edit - Select All then hit Delete to delete the entire contents of the Temp folder.

    Finally go to Control Panel - Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.

    While still in safe mode, go to Start - Run and copy and paste then click OK:

    shell:cache\content.ie5

    This should open your content.ie5 folder. Select everything in there and click delete. You will not be able to delete the index.bat file and that’s normal.


    Empty the recycle bin.
     
  14. pons

    pons Thread Starter

    Joined:
    Nov 27, 2001
    Messages:
    354
    Hi, followed your last instructions to the T .
    Is there anything else I should be doing?

    sebastian pons
     
  15. Cookiegal

    Cookiegal Administrator Malware Specialist Coordinator

    Joined:
    Aug 27, 2003
    Messages:
    112,027
    No, that's it. :)
     
  16. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/489133

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice