1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

ad-aware hang!! annoying popup!!

Discussion in 'Malware and Virus Removal Archive' started by kengster, 2004/12/26.

Thread Status:
Not open for further replies.
  1. 2004/12/26
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    ive got a problem with spyware.. its "play poker" n "windows security update" which i think not actually from microsoft.. they keep popping up.. i use windows xp home SP1.. i installed ad-aware n updated the definition.. but they keep always hang at microsoft/software... at that time, they usually detected 18 threats.. n i hv to force-close it.. ive try spybot they detected more spyware but unable to delete 2 of them.. i even try to run them both in safe mode.. both run perfectly.. ad aware detect nothing and spybot detect more than 10.. but still cant delete the two because of they still "in memory ". here is my hijackthis log.. could someone pls help me...


    Logfile of HijackThis v1.98.2
    Scan saved at 12:04:20 AM, on 12/27/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
    C:\Program Files\Athan\Athan.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\WINDOWS\System32\ScsiAccess.EXE
    C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
    C:\WINDOWS\System32\wdfmgr.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    C:\WINDOWS\System32\openconf.exe
    C:\WINDOWS\System32\unlodctl.exe
    C:\WINDOWS\System32\unlodctl.exe
    C:\Program Files\Yahoo!\Messenger\ypager.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\winxp\Desktop\new\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.co.uk/
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://msaps.dll/search.html
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    R3 - URLSearchHook: MailTo Class - {FDE3577A-6254-181C-4E11-339E4F746BD3} - C:\WINDOWS\System32\wins32t.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\YAHOO!\COMPAN~1\INSTALLS\cpn\ycomp5_3_12_0.dll
    O3 - Toolbar: FreshBar - {06ABAA2D-34AB-4902-A326-409BD9B9A7A5} - C:\WINDOWS\System32\iecust.dll
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Q-HotkeyMgr] "C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe "
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe "
    O4 - HKLM\..\Run: [PCCClient.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe "
    O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe "
    O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe
    O4 - HKLM\..\RunServicesOnce: [washindex] C:\Program Files\Washer\washidx.exe "winxp "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O14 - IERESET.INF: START_PAGE_URL=http://WWW.BenQ.COM/
    O15 - Trusted Zone: http://*.63.219.181.7
    O15 - Trusted Zone: http://*.search-soft.net
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/c381/chat.cab
    O16 - DPF: {02C20140-76F8-4763-83D5-B660107B7A90} (Moniker32 Class) - http://63.219.181.7/cax.cab
    O16 - DPF: {10000000-1000-0000-1000-000000000000} - file://C:\Program Files\Internet Explorer\eeheiwdr.exe
    O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} (Yahoo! Audio Conferencing) - http://us.chat1.yimg.com/us.yimg.com/i/chat/applet/v45/yacscom.cab
    O16 - DPF: {31B7EB4E-8B4B-11D1-A789-00A0CC6651A8} (Cult3D ActiveX Player) - http://www.cult3d.com/download/cult.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by17fd.bay17.hotmail.msn.com/resources/MsnPUpld.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...ls/en/x86/client/wuweb_site.cab?1104051515668
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/MsnMessengerSetupDownloader.cab
    O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} (YAddBook Class) - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/suite/autocomplete.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{61ECA06C-30CD-46A3-A307-9FB356822EF2}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{6818920C-1518-4EE2-BAEF-01367A8C9689}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
     
  2. 2004/12/26
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Interesting kengster. You've picked up a trojan I haven't seen on a PC before. StartPage-FJ (McAfee's name for it) is recent - last month - and is probably causing your problems.

    Before I get into specifics on dealing with the critter, you need to do two things before you start the removal process.

    - get the most recent version of HJT. 1.99 is available.
    - when you get it, create a folder for it that is not a part of your desktop. Something directly under C:\ would be good so maybe c:\hjt.

    %system%\tss.exe
    %system%\wins32t.dll

    Close all windows including windows explorer and any browser sessions then run Hijackthis, scan, and check the following for removal.

    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://msaps.dll/search.html
    R3 - URLSearchHook: MailTo Class - {FDE3577A-6254-181C-4E11-339E4F746BD3} - C:\WINDOWS\System32\wins32t.dll
    O3 - Toolbar: FreshBar - {06ABAA2D-34AB-4902-A326-409BD9B9A7A5} - C:\WINDOWS\System32\iecust.dll
    O4 - HKLM\..\RunServicesOnce: [washindex] C:\Program Files\Washer\washidx.exe "winxp "
    ** note - this one is not malware but does not need to be running at every startup
    O15 - Trusted Zone: http://*.63.219.181.7
    O15 - Trusted Zone: http://*.search-soft.net

    ** note on the 016 entries - some of these are fine but all will be replaced when needed by a site so get rid of them
    O16 - DPF: Yahoo! Chat - http://us.chat1.yimg.com/us.yimg.co...t/c381/chat.cab
    O16 - DPF: {02C20140-76F8-4763-83D5-B660107B7A90} (Moniker32 Class) - http://63.219.181.7/cax.cab
    O16 - DPF: {10000000-1000-0000-1000-000000000000} - file://C:\Program Files\Internet Explorer\eeheiwdr.exe
    O16 - DPF: {2B323CD9-50E3-11D3-9466-00A0C9700498} (Yahoo! Audio Conferencing) - http://us.chat1.yimg.com/us.yimg.co...v45/yacscom.cab
    O16 - DPF: {31B7EB4E-8B4B-11D1-A789-00A0CC6651A8} (Cult3D ActiveX Player) - http://www.cult3d.com/download/cult.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by17fd.bay17.hotmail.msn.com...es/MsnPUpld.cab
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://v5.windowsupdate.microsoft.c...b?1104051515668
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/M...pDownloader.cab
    O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} (YAddBook Class) - http://us.dl1.yimg.com/download.yah...utocomplete.cab

    Locate and delete (note that %system% means whatever folder you use for running windows so likely c:\windows)
    %system%\tss.exe
    %system%\wins32t.dll
    msaps.dll in all locations. Probably at least one of them is a folder rather than a single file.

    Delete all
    - temporary internet files
    - temp files so the contents of
    .. c:\windows\temp
    .. c:\temp (may not exist)
    .. c:\documents & settings\username\local settings\temp (where username means do for all user accounts on your PC) and you will need windows explorer set to show hidden and system files to find these.

    Turn off system restore, reboot, run your anti-spyware scans again, then post a new HJT log.
     
    Newt,
    #2

  3. to hide this advert.

  4. 2004/12/26
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    In addition to Newt's recommendations, download the attached Export1.zip file and extract the .bat file inside to your desktop. Reboot to safe mode and double click the Export1.bat. It will create two text files in Local Disk C:, named Domains.txt and Ms4Hd.txt, which you need to copy and paste here in your next reply.

    While in safe mode, empty the temp folders noted by Newt as well as C:\Windows\Prefetch.
    Open My Computer, right click Local disk C: and choose properties, then disk cleanup. Check all boxes except compress old files and OK.

    Now try running a full scan with Ad-aware. When done, reboot back to Windows and do another HijackThis scan and post the log.
     
    Last edited: 2004/12/27
  5. 2004/12/26
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Thanks Dave. What are you looking for that I completely missed? I'll probably leave curing it to you pros but will be interested to add to my 'stuff to watch out for' list.
     
    Newt,
    #4
  6. 2004/12/27
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    Thats version three guys :)

    Download remv3.zip
    http://forums.skads.org/index.php?act=Attach&type=post&id=73

    Restart your PC into safe mode (otherwise it will not work)
    Reboot into safe mode
    Click Start, click Run, type msconfig in the Open box, and then click OK.
    click the boot.ini tab > Tick [X]/Safeboot, apply > OK restart windows.
    then choose safe.
    Unzip the files inside remv3.zip
    Run remv3.bat when its finished a text will open, close it

    Restart back to normal uncheck [ ]/safeboot
    hit apply then OK and let windows restart

    Post the Log text located here C:\Log.txt
     
  7. 2004/12/27
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    thanx guys for the fast reply...

    ok, here the result.

    I've run hijackthis 1.99 and deleted necessary entries. I also deleted all temp files except ~DF3DE.tmp which is still in use. I couldnt find tss.exe ( but i found it when i run msconfig before and disable it) and neither msasp.dll, find one wins32t.dll and delete it. I also extracted Export1.bat to desktop.

    Reboot to safe-mode.

    Couldnt find extracted Export1.bat in desktop. Run Ad-aware smart scan (I know i suppose to run the full run,didnt realize until now) and Ad-aware detects nothing. Run Spybot and there's 'Error during check' message at the end of scan. Spybot detects DSO Exploit (3 entries) and Web Dialer (2 entries). Spybot fixed all.

    Reboot back to Windows.

    Run Ad-aware smart scan. Ad-aware no longer hang but detects nothing. Run Spybot, there's also 'Error during check' message and detected DSO Exploit (5 entries) and fix all.

    As i write this, i noticed there is no longer pop-up or 'Your computer have spyware' message appear.

    And here is my latest Hijackthis log. Thanx guys.

    Logfile of HijackThis v1.99.0
    Scan saved at 12:53:42 PM, on 12/27/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\System32\alg.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\ScsiAccess.EXE
    C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
    C:\WINDOWS\System32\wdfmgr.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
    C:\Program Files\Athan\Athan.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\hijackthis199\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.co.uk/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\YAHOO!\COMPAN~1\INSTALLS\cpn\ycomp5_3_12_0.dll
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Q-HotkeyMgr] "C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe "
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe "
    O4 - HKLM\..\Run: [PCCClient.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe "
    O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe "
    O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe
    O4 - HKLM\..\RunServicesOnce: [washindex] C:\Program Files\Washer\washidx.exe "winxp "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [Washer] C:\Program Files\Washer\washer.exe /0
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O14 - IERESET.INF: START_PAGE_URL=http://WWW.BenQ.COM/
    O17 - HKLM\System\CCS\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{61ECA06C-30CD-46A3-A307-9FB356822EF2}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{6818920C-1518-4EE2-BAEF-01367A8C9689}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O23 - Service: LexBce Server - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: PC-cillin PersonalFirewall - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    O23 - Service: ScsiAccess - Unknown - C:\WINDOWS\System32\ScsiAccess.EXE
    O23 - Service: Trend NT Realtime Service - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
     
  8. 2004/12/27
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    didnt noticed lonny jones post before. Should i do it?
     
  9. 2004/12/27
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Hi Newt,

    As Lonny pointed out, version 3 of that dreaded trusted zone infection that hit a few weeks back. I was fishing for a list of filenames from the Ms4Hd registry key to make sure they're all covered by the latest removal tool Lonny linked to, and also checking the domains key to verify it's covered too.
     
  10. 2004/12/27
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    Hi kengster,

    Not seeing the entries in your HJT log for the trusted zone infection. Place the Export1.zip in Local Disk C: and reboot to safe mode, then extract it and run the export.bat.
     
  11. 2004/12/27
    Newt

    Newt Inactive

    Joined:
    2002/01/07
    Messages:
    10,974
    Likes Received:
    2
    Lonny/Dave - thanks.
     
  12. 2004/12/27
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    Thanx again guys.

    Before do both Export1 and remv3.
    There are still pop up and balloon msg but not as frequent. Ive run Pc-cillin 2002 with updated definition and it detected some viruses but unable to delete 2 viruses. They are TROJ_ALUREON.B (c:\windows\system32\mshi.dll) and TROJ_ALUROOT.A (c:\windows\system32\h3{2.dll). And error msg of virus detected keep popping up whenever i open new IE windows.

    Export1
    I do exactly like told but I cant because there error msg. "Cannot export F:\domains.txt. Error opening the file. There may be a disk or file system error ". I dont even have F drive.

    remv3
    Successfully done. Here the log.txt and bad1.txt

    log.txt

    Files Found.................
    ----------------------------------------
    spnping.exe
    openconf.exe
    nlsfuncs.exe

    Files Not deleted.................
    ----------------------------------------

    Merging registry entries
    -----------------------------------------------------------------
    The Registry Entries Found...
    -----------------------------------------------------------------


    Other bad files to be Manually deleted.. Please note that this might also list legit Files, be careful while deleting
    -----------------------------------------------------------------
    msi.dll
    mshi.dll
    Finished


    bad1.txt

    ! REG.EXE VERSION 3.0

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Hd
    <NO NAME> REG_BINARY E3DDF75854B5EF48A1267A0796277F15
    Name REG_BINARY 4CD415FBA2B4B92F90B59DA78A71F19D528DABC0D34E768A79329DE8

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Hd\#1#

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Hd\#2#

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Hd\#3#

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Hd\#4#


    Theres no longer virus detected error msg when i open new IE windows. At least for now. Thanx.
     
  13. 2004/12/27
    noahdfear

    noahdfear Inactive

    Joined:
    2003/04/06
    Messages:
    12,178
    Likes Received:
    15
    :( My mistake on the Export1.bat file. I wrote and tested it on my F: drive and failed to edit it for the C: drive before uploading it. Sorry. You can delete it. That mshi.dll file appears suspicious. Would you search for it and when found, zip up a copy and send to me here.
     
  14. 2004/12/27
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    Hello

    Open the folder where you have remv3.bat
    Open the ver3.txt, near the bottom add these file's

    iecust.exe
    iecust.dll
    mshi.dll

    save and exit, restart into safe mode,delete C:\log.txt run the batch(remv3.bat) file again.
    Restart back to normal post that Log.txt and a new Hijackthis log.

    Edit sorry dave we are posting at the same time,
    mshi.dll is definatly a baddie.
    would you like the files ive collected so far ?
     
  15. 2004/12/28
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    Done as instructed. Before i do it, i noticed that the pop-up and balloon msg no longer appear.

    Latest remv3 log
    Files Found.................
    ----------------------------------------
    iecust.dll

    Files Not deleted.................
    ----------------------------------------

    Merging registry entries
    -----------------------------------------------------------------
    The Registry Entries Found...
    -----------------------------------------------------------------


    Other bad files to be Manually deleted.. Please note that this might also list legit Files, be careful while deleting
    -----------------------------------------------------------------
    msi.dll
    Finished

    Latest Hijackthis log
    Logfile of HijackThis v1.99.0
    Scan saved at 9:46:06 AM, on 12/28/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\ScsiAccess.EXE
    C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
    C:\Program Files\Athan\Athan.exe
    C:\Program Files\QuickTime\qttask.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\MSN Messenger\msnmsgr.exe
    C:\Program Files\Washer\washer.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    C:\Program Files\WinZip\WZQKPICK.EXE
    C:\WINDOWS\System32\wuauclt.exe
    C:\hijackthis199\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.co.uk/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O2 - BHO: (no name) - {DD0EE379-C100-4FB3-AF5A-7AE15D062C73} - C:\WINDOWS\System32\mshi.dll (file missing)
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\YAHOO!\COMPAN~1\INSTALLS\cpn\ycomp5_3_12_0.dll
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Q-HotkeyMgr] "C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe "
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe "
    O4 - HKLM\..\Run: [PCCClient.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe "
    O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe "
    O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe
    O4 - HKLM\..\Run: [taskopen.exe] taskopen.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\RunServicesOnce: [washindex] C:\Program Files\Washer\washidx.exe "winxp "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [Washer] C:\Program Files\Washer\washer.exe /0
    O4 - Global Startup: WinZip Quick Pick.lnk = C:\Program Files\WinZip\WZQKPICK.EXE
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O14 - IERESET.INF: START_PAGE_URL=http://WWW.BenQ.COM/
    O15 - Trusted Zone: http://*.63.219.181.7
    O15 - Trusted Zone: http://*.search-soft.net
    O16 - DPF: {02C20140-76F8-4763-83D5-B660107B7A90} (Moniker32 Class) - http://63.219.181.7/cax.cab
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by12fd.bay12.hotmail.msn.com/resources/MsnPUpld.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{61ECA06C-30CD-46A3-A307-9FB356822EF2}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{6818920C-1518-4EE2-BAEF-01367A8C9689}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O23 - Service: LexBce Server - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: PC-cillin PersonalFirewall - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    O23 - Service: ScsiAccess - Unknown - C:\WINDOWS\System32\ScsiAccess.EXE
    O23 - Service: Trend NT Realtime Service - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
     
  16. 2004/12/28
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    noahdfear,

    I cant seem to find mshi.dll

    Thanx all
     
  17. 2004/12/28
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    Hello

    Start Hijackthis and place a check next to these items,
    Close all browser windows and shut down all other programs that show in the taskbar. (even Folders) Then Hit fix checked and close Hijackthis.

    O2 - BHO: (no name) - {DD0EE379-C100-4FB3-AF5A-7AE15D062C73} - C:\WINDOWS\System32\mshi.dll (file missing)

    O4 - HKLM\..\Run: [taskopen.exe] taskopen.exe

    O15 - Trusted Zone: http://*.63.219.181.7
    O15 - Trusted Zone: http://*.search-soft.net
    O16 - DPF: {02C20140-76F8-4763-83D5-B660107B7A90} (Moniker32 Class) - http://63.219.181.7/cax.cab
    =====================
    Now restart the PC, Let us know of any problems
    Post a new log.
     
  18. 2004/12/28
    kengster

    kengster Inactive Thread Starter

    Joined:
    2003/12/27
    Messages:
    52
    Likes Received:
    0
    Done successfully. No problem so far. Ill let u guys know if anything come up. Thanx a lot. I really appreciate it.

    Latest HJT log
    Logfile of HijackThis v1.99.0
    Scan saved at 1:36:33 PM, on 12/28/2004
    Platform: Windows XP SP1 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\LEXBCES.EXE
    C:\WINDOWS\system32\LEXPPS.EXE
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINDOWS\System32\ScsiAccess.EXE
    C:\WINDOWS\System32\hkcmd.exe
    C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    C:\WINDOWS\AGRSMMSG.exe
    C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
    C:\WINDOWS\System32\ctfmon.exe
    C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    C:\WINDOWS\System32\wuauclt.exe
    C:\hijackthis199\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.co.uk/
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = localhost
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
    O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\YAHOO!\COMPAN~1\INSTALLS\cpn\ycomp5_3_12_0.dll
    O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
    O4 - HKLM\..\Run: [SynTPLpr] C:\Program Files\Synaptics\SynTP\SynTPLpr.exe
    O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
    O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
    O4 - HKLM\..\Run: [Q-HotkeyMgr] "C:\Program Files\BenQ\Q-HotkeyMgr\HotkeySensor.exe "
    O4 - HKLM\..\Run: [pccguide.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\pccguide.exe "
    O4 - HKLM\..\Run: [PCCClient.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\PCCClient.exe "
    O4 - HKLM\..\Run: [Pop3trap.exe] "C:\Program Files\Trend Micro\PC-cillin 2002\Pop3trap.exe "
    O4 - HKLM\..\Run: [Athan] C:\Program Files\Athan\Athan.exe
    O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
    O4 - HKLM\..\RunServicesOnce: [washindex] C:\Program Files\Washer\washidx.exe "winxp "
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
    O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\MSN Messenger\msnmsgr.exe" /background
    O4 - HKCU\..\Run: [Washer] C:\Program Files\Washer\washer.exe /0
    O8 - Extra context menu item: &Yahoo! Search - file:///C:\Program Files\Yahoo!\Common/ycsrch.htm
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Yahoo! &Dictionary - file:///C:\Program Files\Yahoo!\Common/ycdict.htm
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\System32\msjava.dll
    O9 - Extra button: Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {4528BBE0-4E08-11D5-AD55-00010333D0AD} - C:\Program Files\Yahoo!\Messenger\yhexbmes0527.dll
    O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O9 - Extra 'Tools' menuitem: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\MSMSGS.EXE
    O14 - IERESET.INF: START_PAGE_URL=http://WWW.BenQ.COM/
    O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://by12fd.bay12.hotmail.msn.com/resources/MsnPUpld.cab
    O17 - HKLM\System\CCS\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{61ECA06C-30CD-46A3-A307-9FB356822EF2}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CCS\Services\Tcpip\..\{6818920C-1518-4EE2-BAEF-01367A8C9689}: NameServer = 69.50.166.94,69.31.80.244
    O17 - HKLM\System\CS1\Services\Tcpip\..\{08AFA2F7-FE42-4648-998C-05E36416AF46}: NameServer = 69.50.166.94,69.31.80.244
    O23 - Service: LexBce Server - Lexmark International, Inc. - C:\WINDOWS\system32\LEXBCES.EXE
    O23 - Service: PC-cillin PersonalFirewall - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\PCCPFW.exe
    O23 - Service: ScsiAccess - Unknown - C:\WINDOWS\System32\ScsiAccess.EXE
    O23 - Service: Trend NT Realtime Service - Trend Micro Inc. - C:\Program Files\Trend Micro\PC-cillin 2002\Tmntsrv.exe
     
  19. 2004/12/28
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    Looks good kengster

    It will have deleted any sites put in the restricted zone by programs such as SpywareBlaster, Spybot and IEspyadds. that will need to be redone.
     
  20. 2005/01/08
    ZDogg

    ZDogg Inactive

    Joined:
    2005/01/06
    Messages:
    6
    Likes Received:
    0
  21. 2005/01/09
    Lonny Jones

    Lonny Jones Inactive Alumni

    Joined:
    2002/12/16
    Messages:
    2,252
    Likes Received:
    0
    kengster

    Post another log and mention any problems, we need to do a few more cleanups.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.