Solved: sspmydoom.cih please help

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

nursecori

Thread Starter
Joined
Feb 8, 2005
Messages
3
It seems as though I have this too. Unsucessfully have tried to eliminate it, so now I am pleading for your help. Here is my Hijackthis log. Much appreciation in advance.
~Cori

Logfile of HijackThis v1.99.0
Scan saved at 2:29:40 PM, on 2/8/05
Platform: Windows 98 Gold (Win9x 4.10.1998)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\WINMODEM.101\wmexe.exe
C:\WINDOWS\SYSTEM\ADDLF.EXE
C:\WINDOWS\WINME32.EXE
C:\WINDOWS\SYSTEM\ADDWV32.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\SYSTEM\NETXD.EXE
C:\WINDOWS\SYSTEM\APINO.EXE
C:\WINDOWS\SYSTEM\IEQL32.EXE
C:\WINDOWS\ADDEQ.EXE
C:\WINDOWS\SYSYN.EXE
C:\WINDOWS\SYSTEM\SDKQA.EXE
C:\WINDOWS\D3PS32.EXE
C:\WINDOWS\SYSTEM\APPHC32.EXE
C:\WINDOWS\SYSTEM\NTEE.EXE
C:\WINDOWS\IEDV32.EXE
C:\WINDOWS\MSOD32.EXE
C:\WINDOWS\IPVP.EXE
C:\WINDOWS\APPAV32.EXE
C:\WINDOWS\NETZO32.EXE
C:\WINDOWS\SYSTEM\NTYJ32.EXE
C:\WINDOWS\NTUO32.EXE
C:\WINDOWS\SYSTEM\NETNG.EXE
C:\WINDOWS\SYSTEM\MSZF.EXE
C:\WINDOWS\NETUY32.EXE
C:\WINDOWS\JAVATD32.EXE
C:\WINDOWS\SYSTEM\CRNH32.EXE
C:\WINDOWS\APPBO32.EXE
C:\WINDOWS\WINTS32.EXE
C:\WINDOWS\SYSTEM\WINHL32.EXE
C:\WINDOWS\SYSTEM\SDKTJ.EXE
C:\WINDOWS\IEUG.EXE
C:\WINDOWS\IPEI32.EXE
C:\WINDOWS\SYSTEM\JAVAZN32.EXE
C:\WINDOWS\SYSTEM\MFCVP32.EXE
C:\WINDOWS\SYSTEM\ATLUE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\NTZO.EXE
C:\WINDOWS\SYSTEM\IPDR.EXE
C:\WINDOWS\SYSTEM\MFCOG32.EXE
C:\WINDOWS\SYSJG.EXE
C:\WINDOWS\NTPP.EXE
C:\WINDOWS\SYSTEM\IPEK32.EXE
C:\WINDOWS\SYSTEM\CRGP32.EXE
C:\WINDOWS\SYSTEM\NETCA32.EXE
C:\WINDOWS\ADDFI.EXE
C:\WINDOWS\NTJN32.EXE
C:\WINDOWS\ATLKN.EXE
C:\WINDOWS\SYSTEM\APIJU.EXE
C:\WINDOWS\SYSTEM\APPYM.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE
C:\WINDOWS\JAVATK.EXE
C:\WINDOWS\D3SA.EXE
C:\WINDOWS\IENP32.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\PROGRAM FILES\ADWAREFILTER\ADWAREFILTER.EXE
C:\PROGRAM FILES\INTERMUTE\SPYSUBTRACT\SPYSUB.EXE
C:\WINDOWS\SYSTEM\PSTORES.EXE
C:\WINDOWS\NETHR32.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE
C:\WINDOWS\SYSTEM\CRNH32.EXE
C:\WINDOWS\WINME32.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE
C:\WINDOWS\SYSTEM\D3KU32.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE
C:\WINDOWS\SYSTEM\MSED32.EXE
C:\WINDOWS\SYSTEM\MSED32.EXE
C:\WINDOWS\SYSTEM\ADDUK32.EXE
C:\WINDOWS\SYSTEM\ADDUK32.EXE
C:\WINDOWS\SYSYU32.EXE
C:\WINDOWS\SYSYU32.EXE
C:\WINDOWS\SYSTEM\ATLYL32.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\SYSTEM\IEJB32.EXE
C:\WINDOWS\SYSTEM\IEJB32.EXE
C:\WINDOWS\D3IS.EXE
C:\WINDOWS\D3IS.EXE
C:\WINDOWS\ADDMU32.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\D3IS.EXE
C:\WINDOWS\D3IS.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\MSEP32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\WINDOWS\MSEP32.EXE
C:\WINDOWS\WINCF32.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\SYSTEM\MFCQL.EXE
C:\HIJACKTHIS\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = AT&T Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 12.242.16.8:8000
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 12.242.16.8
R3 - Default URLSearchHook is missing
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: Class - {66FA80F9-52FD-7BB6-C167-60D460407FC1} - C:\WINDOWS\SDKAL.DLL
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [NETHR32.EXE] C:\WINDOWS\NETHR32.EXE
O4 - HKLM\..\RunServices: [winmodem] WINMODEM.101\wmexe.exe
O4 - HKLM\..\RunServices: [ADDWV32.EXE] C:\WINDOWS\SYSTEM\ADDWV32.EXE
O4 - HKLM\..\RunServices: [NETXD.EXE] C:\WINDOWS\SYSTEM\NETXD.EXE
O4 - HKLM\..\RunServices: [ADDLF.EXE] C:\WINDOWS\SYSTEM\ADDLF.EXE
O4 - HKLM\..\RunServices: [CRHM.EXE] C:\WINDOWS\CRHM.EXE
O4 - HKLM\..\RunServices: [APINO.EXE] C:\WINDOWS\SYSTEM\APINO.EXE
O4 - HKLM\..\RunServices: [WINME32.EXE] C:\WINDOWS\WINME32.EXE
O4 - HKLM\..\RunServices: [CRRY.EXE] C:\WINDOWS\SYSTEM\CRRY.EXE
O4 - HKLM\..\RunServices: [IEQL32.EXE] C:\WINDOWS\SYSTEM\IEQL32.EXE
O4 - HKLM\..\RunServices: [ADDEQ.EXE] C:\WINDOWS\ADDEQ.EXE
O4 - HKLM\..\RunServices: [SYSYN.EXE] C:\WINDOWS\SYSYN.EXE
O4 - HKLM\..\RunServices: [SDKQA.EXE] C:\WINDOWS\SYSTEM\SDKQA.EXE
O4 - HKLM\..\RunServices: [APPHC32.EXE] C:\WINDOWS\SYSTEM\APPHC32.EXE
O4 - HKLM\..\RunServices: [D3PS32.EXE] C:\WINDOWS\D3PS32.EXE
O4 - HKLM\..\RunServices: [IEDV32.EXE] C:\WINDOWS\IEDV32.EXE
O4 - HKLM\..\RunServices: [NTEE.EXE] C:\WINDOWS\SYSTEM\NTEE.EXE
O4 - HKLM\..\RunServices: [MSOD32.EXE] C:\WINDOWS\MSOD32.EXE
O4 - HKLM\..\RunServices: [IPVP.EXE] C:\WINDOWS\IPVP.EXE
O4 - HKLM\..\RunServices: [WINCP32.EXE] C:\WINDOWS\WINCP32.EXE
O4 - HKLM\..\RunServices: [APPAV32.EXE] C:\WINDOWS\APPAV32.EXE
O4 - HKLM\..\RunServices: [NETZO32.EXE] C:\WINDOWS\NETZO32.EXE
O4 - HKLM\..\RunServices: [NTYJ32.EXE] C:\WINDOWS\SYSTEM\NTYJ32.EXE
O4 - HKLM\..\RunServices: [NTUO32.EXE] C:\WINDOWS\NTUO32.EXE
O4 - HKLM\..\RunServices: [NETNG.EXE] C:\WINDOWS\SYSTEM\NETNG.EXE
O4 - HKLM\..\RunServices: [MSZF.EXE] C:\WINDOWS\SYSTEM\MSZF.EXE
O4 - HKLM\..\RunServices: [JAVATD32.EXE] C:\WINDOWS\JAVATD32.EXE
O4 - HKLM\..\RunServices: [NETUY32.EXE] C:\WINDOWS\NETUY32.EXE
O4 - HKLM\..\RunServices: [APPBO32.EXE] C:\WINDOWS\APPBO32.EXE
O4 - HKLM\..\RunServices: [CRNH32.EXE] C:\WINDOWS\SYSTEM\CRNH32.EXE
O4 - HKLM\..\RunServices: [WINTS32.EXE] C:\WINDOWS\WINTS32.EXE
O4 - HKLM\..\RunServices: [WINHL32.EXE] C:\WINDOWS\SYSTEM\WINHL32.EXE
O4 - HKLM\..\RunServices: [SDKTJ.EXE] C:\WINDOWS\SYSTEM\SDKTJ.EXE
O4 - HKLM\..\RunServices: [IEUG.EXE] C:\WINDOWS\IEUG.EXE
O4 - HKLM\..\RunServices: [IPEI32.EXE] C:\WINDOWS\IPEI32.EXE
O4 - HKLM\..\RunServices: [JAVAZN32.EXE] C:\WINDOWS\SYSTEM\JAVAZN32.EXE
O4 - HKLM\..\RunServices: [MFCVP32.EXE] C:\WINDOWS\SYSTEM\MFCVP32.EXE
O4 - HKLM\..\RunServices: [ATLUE.EXE] C:\WINDOWS\SYSTEM\ATLUE.EXE
O4 - HKLM\..\RunServices: [SYSJG.EXE] C:\WINDOWS\SYSJG.EXE
O4 - HKLM\..\RunServices: [IPDR.EXE] C:\WINDOWS\SYSTEM\IPDR.EXE
O4 - HKLM\..\RunServices: [MFCOG32.EXE] C:\WINDOWS\SYSTEM\MFCOG32.EXE
O4 - HKLM\..\RunServices: [NTZO.EXE] C:\WINDOWS\SYSTEM\NTZO.EXE
O4 - HKLM\..\RunServices: [NTPP.EXE] C:\WINDOWS\NTPP.EXE
O4 - HKLM\..\RunServices: [IPEK32.EXE] C:\WINDOWS\SYSTEM\IPEK32.EXE
O4 - HKLM\..\RunServices: [NTJN32.EXE] C:\WINDOWS\NTJN32.EXE
O4 - HKLM\..\RunServices: [CRGP32.EXE] C:\WINDOWS\SYSTEM\CRGP32.EXE
O4 - HKLM\..\RunServices: [ADDFI.EXE] C:\WINDOWS\ADDFI.EXE
O4 - HKLM\..\RunServices: [ATLKN.EXE] C:\WINDOWS\ATLKN.EXE
O4 - HKLM\..\RunServices: [NETCA32.EXE] C:\WINDOWS\SYSTEM\NETCA32.EXE
O4 - HKLM\..\RunServices: [APIJU.EXE] C:\WINDOWS\SYSTEM\APIJU.EXE
O4 - HKLM\..\RunServices: [APPYM.EXE] C:\WINDOWS\SYSTEM\APPYM.EXE
O4 - HKLM\..\RunServices: [WINPJ32.EXE] C:\WINDOWS\SYSTEM\WINPJ32.EXE
O4 - HKLM\..\RunServices: [JAVATK.EXE] C:\WINDOWS\JAVATK.EXE
O4 - HKLM\..\RunServices: [IENP32.EXE] C:\WINDOWS\IENP32.EXE
O4 - HKLM\..\RunServices: [D3SA.EXE] C:\WINDOWS\D3SA.EXE
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [D3KU32.EXE] C:\WINDOWS\SYSTEM\D3KU32.EXE
O4 - HKLM\..\RunServices: [MSED32.EXE] C:\WINDOWS\SYSTEM\MSED32.EXE
O4 - HKLM\..\RunServices: [ADDUK32.EXE] C:\WINDOWS\SYSTEM\ADDUK32.EXE
O4 - HKLM\..\RunServices: [SYSYU32.EXE] C:\WINDOWS\SYSYU32.EXE
O4 - HKLM\..\RunServices: [ATLYL32.EXE] C:\WINDOWS\SYSTEM\ATLYL32.EXE
O4 - HKLM\..\RunServices: [IEJB32.EXE] C:\WINDOWS\SYSTEM\IEJB32.EXE
O4 - HKLM\..\RunServices: [D3IS.EXE] C:\WINDOWS\D3IS.EXE
O4 - HKLM\..\RunServices: [ADDMU32.EXE] C:\WINDOWS\ADDMU32.EXE
O4 - HKLM\..\RunServices: [MSEP32.EXE] C:\WINDOWS\MSEP32.EXE
O4 - HKLM\..\RunServices: [WINCF32.EXE] C:\WINDOWS\WINCF32.EXE
O4 - HKLM\..\RunServices: [MFCQL.EXE] C:\WINDOWS\SYSTEM\MFCQL.EXE
O4 - Startup: Adware Filter.lnk = C:\Program Files\AdwareFilter\AdwareFilter.exe
O4 - Startup: SpySubtract.lnk = C:\Program Files\interMute\SpySubtract\SpySub.exe
O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
O8 - Extra context menu item: Backward Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
O8 - Extra context menu item: Translate into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O12 - Plugin for *: C:\PROGRAM FILES\NETSCAPE\COMMUNICATOR\PROGRAM\PLUGINS\npnul32.dll
O12 - Plugin for .bpt: C:\PROGRA~1\INTERN~1\Plugins\NPBelv32.dll
O12 - Plugin for .bcf: C:\PROGRA~1\INTERN~1\Plugins\NPBelv32.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O16 - DPF: {6EBE5A5B-2621-11D1-905C-00A0244D4224} (ReadHTML.GetHTML) - file://C:\DELL\ie4si\ReadHTML.CAB
O16 - DPF: Yahoo! Hearts - http://download.games.yahoo.com/games/clients/y/ht1_x.cab
O16 - DPF: Yahoo! NFL GameChannel StatTracker - http://aud12.sports.sc5.yahoo.com/java/y/nflgcst1010_x.cab
O16 - DPF: {6F750200-1362-4815-A476-88533DE61D0C} (Ofoto Upload Manager Class) - http://www.ofoto.com/downloads/BUM/BUM_WIN_IE_1/axofupld.cab
O16 - DPF: {17D72920-7A15-11D4-921E-0080C8DA7A5E} (AimSp32 Class) - http://makeover.substance.com/save/makeover.cab
O16 - DPF: {F7A05BAC-9778-410A-9CDE-BFBD4D5D2B7F} (iPIX Media Send Class) - http://216.249.24.60/code/iPIX-ImageWell-ipix.cab
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} (Shutterfly Picture Upload Plugin) - http://web1.shutterfly.com/downloads/Uploader.cab
O16 - DPF: Win32 Classes - file://C:\WINDOWS\Java\classes\win32ie4.cab
 

cybertech

Retired Moderator
Joined
Apr 16, 2002
Messages
72,115
Hi nursecori, Welcome to TSG!! :)


Click here to download CWShredder. Do Not run it yet. Download it to the desktop and have it ready to run later.

____________________________________________________________________

Click here to download AboutBuster created by Rubber Ducky.

Unzip AboutBuster to the Desktop then click the "Update Button" then click "Check for Update" and download the updates and then click "Exit" because I don't want you to run it yet. Just get the updates so it is ready to run later in safe mode.
_____________________________________________________________________


Print out these instructions or save them to your desktop as a text file with Notepad.
______________________________________________________________________

Sign off the internet and remain offline until this procedure is complete. Unplug your modem or disconnect the cable or phone line. You must follow these directions exactly and you cannot skip any part of it.

If you have any questions ask them before you begin if you don't have another computer to access the internet.
______________________________________________________________________

Restart to safe mode.
How to start your computer in safe mode


Perform the following steps in safe mode:


Run HJT again and put a check in the following:

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\krwmb.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = AT&T Internet Explorer
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 12.242.16.8:8000
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 12.242.16.8
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {66FA80F9-52FD-7BB6-C167-60D460407FC1} - C:\WINDOWS\SDKAL.DLL
O4 - HKLM\..\Run: [NETHR32.EXE] C:\WINDOWS\NETHR32.EXE
O4 - HKLM\..\RunServices: [ADDWV32.EXE] C:\WINDOWS\SYSTEM\ADDWV32.EXE
O4 - HKLM\..\RunServices: [NETXD.EXE] C:\WINDOWS\SYSTEM\NETXD.EXE
O4 - HKLM\..\RunServices: [ADDLF.EXE] C:\WINDOWS\SYSTEM\ADDLF.EXE
O4 - HKLM\..\RunServices: [CRHM.EXE] C:\WINDOWS\CRHM.EXE
O4 - HKLM\..\RunServices: [APINO.EXE] C:\WINDOWS\SYSTEM\APINO.EXE
O4 - HKLM\..\RunServices: [WINME32.EXE] C:\WINDOWS\WINME32.EXE
O4 - HKLM\..\RunServices: [CRRY.EXE] C:\WINDOWS\SYSTEM\CRRY.EXE
O4 - HKLM\..\RunServices: [IEQL32.EXE] C:\WINDOWS\SYSTEM\IEQL32.EXE
O4 - HKLM\..\RunServices: [ADDEQ.EXE] C:\WINDOWS\ADDEQ.EXE
O4 - HKLM\..\RunServices: [SYSYN.EXE] C:\WINDOWS\SYSYN.EXE
O4 - HKLM\..\RunServices: [SDKQA.EXE] C:\WINDOWS\SYSTEM\SDKQA.EXE
O4 - HKLM\..\RunServices: [APPHC32.EXE] C:\WINDOWS\SYSTEM\APPHC32.EXE
O4 - HKLM\..\RunServices: [D3PS32.EXE] C:\WINDOWS\D3PS32.EXE
O4 - HKLM\..\RunServices: [IEDV32.EXE] C:\WINDOWS\IEDV32.EXE
O4 - HKLM\..\RunServices: [NTEE.EXE] C:\WINDOWS\SYSTEM\NTEE.EXE
O4 - HKLM\..\RunServices: [MSOD32.EXE] C:\WINDOWS\MSOD32.EXE
O4 - HKLM\..\RunServices: [IPVP.EXE] C:\WINDOWS\IPVP.EXE
O4 - HKLM\..\RunServices: [WINCP32.EXE] C:\WINDOWS\WINCP32.EXE
O4 - HKLM\..\RunServices: [APPAV32.EXE] C:\WINDOWS\APPAV32.EXE
O4 - HKLM\..\RunServices: [NETZO32.EXE] C:\WINDOWS\NETZO32.EXE
O4 - HKLM\..\RunServices: [NTYJ32.EXE] C:\WINDOWS\SYSTEM\NTYJ32.EXE
O4 - HKLM\..\RunServices: [NTUO32.EXE] C:\WINDOWS\NTUO32.EXE
O4 - HKLM\..\RunServices: [NETNG.EXE] C:\WINDOWS\SYSTEM\NETNG.EXE
O4 - HKLM\..\RunServices: [MSZF.EXE] C:\WINDOWS\SYSTEM\MSZF.EXE
O4 - HKLM\..\RunServices: [JAVATD32.EXE] C:\WINDOWS\JAVATD32.EXE
O4 - HKLM\..\RunServices: [NETUY32.EXE] C:\WINDOWS\NETUY32.EXE
O4 - HKLM\..\RunServices: [APPBO32.EXE] C:\WINDOWS\APPBO32.EXE
O4 - HKLM\..\RunServices: [CRNH32.EXE] C:\WINDOWS\SYSTEM\CRNH32.EXE
O4 - HKLM\..\RunServices: [WINTS32.EXE] C:\WINDOWS\WINTS32.EXE
O4 - HKLM\..\RunServices: [WINHL32.EXE] C:\WINDOWS\SYSTEM\WINHL32.EXE
O4 - HKLM\..\RunServices: [SDKTJ.EXE] C:\WINDOWS\SYSTEM\SDKTJ.EXE
O4 - HKLM\..\RunServices: [IEUG.EXE] C:\WINDOWS\IEUG.EXE
O4 - HKLM\..\RunServices: [IPEI32.EXE] C:\WINDOWS\IPEI32.EXE
O4 - HKLM\..\RunServices: [JAVAZN32.EXE] C:\WINDOWS\SYSTEM\JAVAZN32.EXE
O4 - HKLM\..\RunServices: [MFCVP32.EXE] C:\WINDOWS\SYSTEM\MFCVP32.EXE
O4 - HKLM\..\RunServices: [ATLUE.EXE] C:\WINDOWS\SYSTEM\ATLUE.EXE
O4 - HKLM\..\RunServices: [SYSJG.EXE] C:\WINDOWS\SYSJG.EXE
O4 - HKLM\..\RunServices: [IPDR.EXE] C:\WINDOWS\SYSTEM\IPDR.EXE
O4 - HKLM\..\RunServices: [MFCOG32.EXE] C:\WINDOWS\SYSTEM\MFCOG32.EXE
O4 - HKLM\..\RunServices: [NTZO.EXE] C:\WINDOWS\SYSTEM\NTZO.EXE
O4 - HKLM\..\RunServices: [NTPP.EXE] C:\WINDOWS\NTPP.EXE
O4 - HKLM\..\RunServices: [IPEK32.EXE] C:\WINDOWS\SYSTEM\IPEK32.EXE
O4 - HKLM\..\RunServices: [NTJN32.EXE] C:\WINDOWS\NTJN32.EXE
O4 - HKLM\..\RunServices: [CRGP32.EXE] C:\WINDOWS\SYSTEM\CRGP32.EXE
O4 - HKLM\..\RunServices: [ADDFI.EXE] C:\WINDOWS\ADDFI.EXE
O4 - HKLM\..\RunServices: [ATLKN.EXE] C:\WINDOWS\ATLKN.EXE
O4 - HKLM\..\RunServices: [NETCA32.EXE] C:\WINDOWS\SYSTEM\NETCA32.EXE
O4 - HKLM\..\RunServices: [APIJU.EXE] C:\WINDOWS\SYSTEM\APIJU.EXE
O4 - HKLM\..\RunServices: [APPYM.EXE] C:\WINDOWS\SYSTEM\APPYM.EXE
O4 - HKLM\..\RunServices: [WINPJ32.EXE] C:\WINDOWS\SYSTEM\WINPJ32.EXE
O4 - HKLM\..\RunServices: [JAVATK.EXE] C:\WINDOWS\JAVATK.EXE
O4 - HKLM\..\RunServices: [IENP32.EXE] C:\WINDOWS\IENP32.EXE
O4 - HKLM\..\RunServices: [D3SA.EXE] C:\WINDOWS\D3SA.EXE
O4 - HKLM\..\RunServices: [D3KU32.EXE] C:\WINDOWS\SYSTEM\D3KU32.EXE
O4 - HKLM\..\RunServices: [MSED32.EXE] C:\WINDOWS\SYSTEM\MSED32.EXE
O4 - HKLM\..\RunServices: [ADDUK32.EXE] C:\WINDOWS\SYSTEM\ADDUK32.EXE
O4 - HKLM\..\RunServices: [SYSYU32.EXE] C:\WINDOWS\SYSYU32.EXE
O4 - HKLM\..\RunServices: [ATLYL32.EXE] C:\WINDOWS\SYSTEM\ATLYL32.EXE
O4 - HKLM\..\RunServices: [IEJB32.EXE] C:\WINDOWS\SYSTEM\IEJB32.EXE
O4 - HKLM\..\RunServices: [D3IS.EXE] C:\WINDOWS\D3IS.EXE
O4 - HKLM\..\RunServices: [ADDMU32.EXE] C:\WINDOWS\ADDMU32.EXE
O4 - HKLM\..\RunServices: [MSEP32.EXE] C:\WINDOWS\MSEP32.EXE
O4 - HKLM\..\RunServices: [WINCF32.EXE] C:\WINDOWS\WINCF32.EXE
O4 - HKLM\..\RunServices: [MFCQL.EXE] C:\WINDOWS\SYSTEM\MFCQL.EXE
O16 - DPF: {F7A05BAC-9778-410A-9CDE-BFBD4D5D2B7F} (iPIX Media Send Class) - http://216.249.24.60/code/iPIX-ImageWell-ipix.cab


Close all applications and browser windows before you click "fix checked".

Delete these files:
C:\WINDOWS\ADDEQ.EXE
C:\WINDOWS\ADDFI.EXE
C:\WINDOWS\ADDMU32.EXE
C:\WINDOWS\APPAV32.EXE
C:\WINDOWS\APPBO32.EXE
C:\WINDOWS\ATLKN.EXE
C:\WINDOWS\CRHM.EXE
C:\WINDOWS\D3IS.EXE
C:\WINDOWS\D3PS32.EXE
C:\WINDOWS\D3SA.EXE
C:\WINDOWS\IEDV32.EXE
C:\WINDOWS\IENP32.EXE
C:\WINDOWS\IEUG.EXE
C:\WINDOWS\IPEI32.EXE
C:\WINDOWS\IPVP.EXE
C:\WINDOWS\JAVATD32.EXE
C:\WINDOWS\JAVATK.EXE
C:\WINDOWS\krwmb.dll
C:\WINDOWS\MSEP32.EXE
C:\WINDOWS\MSOD32.EXE
C:\WINDOWS\NETHR32.EXE
C:\WINDOWS\NETUY32.EXE
C:\WINDOWS\NETZO32.EXE
C:\WINDOWS\NTJN32.EXE
C:\WINDOWS\NTPP.EXE
C:\WINDOWS\NTUO32.EXE
C:\WINDOWS\SYSJG.EXE
C:\WINDOWS\SYSYN.EXE
C:\WINDOWS\SYSYU32.EXE
C:\WINDOWS\WINCF32.EXE
C:\WINDOWS\WINCP32.EXE
C:\WINDOWS\WINME32.EXE
C:\WINDOWS\WINTS32.EXE
C:\WINDOWS\SYSTEM\ADDLF.EXE
C:\WINDOWS\SYSTEM\ADDUK32.EXE
C:\WINDOWS\SYSTEM\ADDWV32.EXE
C:\WINDOWS\SYSTEM\APIJU.EXE
C:\WINDOWS\SYSTEM\APINO.EXE
C:\WINDOWS\SYSTEM\APPHC32.EXE
C:\WINDOWS\SYSTEM\APPYM.EXE
C:\WINDOWS\SYSTEM\ATLUE.EXE
C:\WINDOWS\SYSTEM\ATLYL32.EXE
C:\WINDOWS\SYSTEM\CRGP32.EXE
C:\WINDOWS\SYSTEM\CRNH32.EXE
C:\WINDOWS\SYSTEM\CRRY.EXE
C:\WINDOWS\SYSTEM\D3KU32.EXE
C:\WINDOWS\SYSTEM\IEJB32.EXE
C:\WINDOWS\SYSTEM\IEQL32.EXE
C:\WINDOWS\SYSTEM\IPDR.EXE
C:\WINDOWS\SYSTEM\IPEK32.EXE
C:\WINDOWS\SYSTEM\JAVAZN32.EXE
C:\WINDOWS\SYSTEM\MFCOG32.EXE
C:\WINDOWS\SYSTEM\MFCQL.EXE
C:\WINDOWS\SYSTEM\MFCVP32.EXE
C:\WINDOWS\SYSTEM\MSED32.EXE
C:\WINDOWS\SYSTEM\MSZF.EXE
C:\WINDOWS\SYSTEM\NETCA32.EXE
C:\WINDOWS\SYSTEM\NETNG.EXE
C:\WINDOWS\SYSTEM\NETXD.EXE
C:\WINDOWS\SYSTEM\NTEE.EXE
C:\WINDOWS\SYSTEM\NTYJ32.EXE
C:\WINDOWS\SYSTEM\NTZO.EXE
C:\WINDOWS\SYSTEM\SDKQA.EXE
C:\WINDOWS\SYSTEM\SDKTJ.EXE
C:\WINDOWS\SYSTEM\WINHL32.EXE
C:\WINDOWS\SYSTEM\WINPJ32.EXE



Navigate to the C:\Windows\Temp folder. Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

Finally go to Control Panel > Internet Options. On the General tab under "Temporary Internet Files" Click "Delete Files". Put a check by "Delete Offline Content" and click OK. Click on the Programs tab then click the "Reset Web Settings" button. Click Apply then OK.

________________________________________________________________________

Next run aboutbuster. Double click aboutbuster.exe, click OK, click Start, then click OK. This will scan your computer for the bad files and delete them.
_______________________________________________________________________

Finally, run CWShredder. Just click on the cwshredder.exe then click "Fix" (Not "Scan only") and let it do it's thing.
_______________________________________________________________________

Boot back into Windows now.

Go here and do an online virus scan.

Be sure and put a check in the box by "Auto Clean" before you do the scan. If it finds anything that it cannot clean have it delete it or make a note of the file location so you can delete it yourself. Housecall will detect the leftover files from this hijacker.



This hijacker is known to alter or delete certain files so check this out please:

Download the Hoster from here . UnZip the file and press "Restore Original Hosts" and press "OK". Exit Program.

If you have Spybot S&D installed you will also need to replace one file.
Go here and download SDHelper.dll. Copy the file to the folder containing your Spybot S&D program (normally C:\Program Files\Spybot - Search & Destroy)


control.exe may have been deleted.
See if control.exe is present in C:\windows\system

If control.exe isn't there, go here, and download control.exe per the instructions at the site.

IMPORTANT!: Please check your ActiveX security settings. They may have been changed by this CWS variant to allow ALL ActiveX!! If they have been changed, reset your active x security settings in IE as recommended here.



Post another HJT log.
 

nursecori

Thread Starter
Joined
Feb 8, 2005
Messages
3
Hi...
Okay, I did as you asked but did run into a couple problems:
1. I don't have a file with this name:
Next navigate to the C:\Documents and Settings\Administrator (Repeat for all user names)\Local Settings\Temp folder.
Open the Temp folder and go to Edit > Select All then Edit > Delete to delete the entire contents of the Temp folder.

2. I don't have a 'System Restore' tab on 'My Computer':
On the Desktop, right-click My Computer.
Click Properties.
Click the System Restore tab.
Check Turn off System Restore.
Click Apply, and then click OK.
Restart your computer.

THANK YOU so very much for helping me with this. I can't tell you how much I appreciate it.
Here is my updated HJT file...
~Cori

Logfile of HijackThis v1.99.0
Scan saved at 8:25:46 PM, on 2/10/05
Platform: Windows 98 Gold (Win9x 4.10.1998)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\PROGRAM FILES\ENCOMPASS\MONITOR.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
C:\PROGRAM FILES\WINZIP\WZQKPICK.EXE
C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE\WINWORD.EXE
C:\WINDOWS\SYSTEM\SPOOL32.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\PROGRAM FILES\INTERNET EXPLORER\IEXPLORE.EXE
C:\HJT\HIJACKTHIS.EXE

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] C:\WINDOWS\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [EncMonitor] C:\Program Files\Encompass\Monitor.exe
O4 - HKCU\..\Run: [SpySweeper] "C:\Program Files\Webroot\Spy Sweeper\SPYSWEEPER.EXE" /0
O4 - Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
O8 - Extra context menu item: &Google Search - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsearch.html
O8 - Extra context menu item: Cached Snapshot of Page - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmcache.html
O8 - Extra context menu item: Similar Pages - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmsimilar.html
O8 - Extra context menu item: Backward Links - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmbacklinks.html
O8 - Extra context menu item: Translate into English - res://C:\PROGRAM FILES\GOOGLE\GOOGLETOOLBAR1.DLL/cmtrans.html
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra 'Tools' menuitem: MSN Messenger Service - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
O9 - Extra button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra 'Tools' menuitem: Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\PROGRA~1\MICROS~1\INETREPL.DLL
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O12 - Plugin for *: C:\PROGRAM FILES\NETSCAPE\COMMUNICATOR\PROGRAM\PLUGINS\npnul32.dll
O12 - Plugin for .bpt: C:\PROGRA~1\INTERN~1\Plugins\NPBelv32.dll
O12 - Plugin for .bcf: C:\PROGRA~1\INTERN~1\Plugins\NPBelv32.dll
O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
O15 - Trusted Zone: http://housecall.trendmicro.com
O16 - DPF: {6EBE5A5B-2621-11D1-905C-00A0244D4224} (ReadHTML.GetHTML) - file://C:\DELL\ie4si\ReadHTML.CAB
O16 - DPF: Yahoo! Hearts - http://download.games.yahoo.com/games/clients/y/ht1_x.cab
O16 - DPF: Yahoo! NFL GameChannel StatTracker - http://aud12.sports.sc5.yahoo.com/java/y/nflgcst1010_x.cab
O16 - DPF: {6F750200-1362-4815-A476-88533DE61D0C} (Ofoto Upload Manager Class) - http://www.ofoto.com/downloads/BUM/BUM_WIN_IE_1/axofupld.cab
O16 - DPF: {17D72920-7A15-11D4-921E-0080C8DA7A5E} (AimSp32 Class) - http://makeover.substance.com/save/makeover.cab
O16 - DPF: {9600F64D-755F-11D4-A47F-0001023E6D5A} (Shutterfly Picture Upload Plugin) - http://web1.shutterfly.com/downloads/Uploader.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
 

nursecori

Thread Starter
Joined
Feb 8, 2005
Messages
3
No, I think we are good!!! YOU ARE AWESOME! Thank you so much. You saved my sanity, my computer AND the window it almost ended up going through :)
~Cori
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Top