Options

Another HSA victim - kristyp13

Hi- I have run AdAware and Spybot as instructed and am now posting my Hijackthis log. Trying to get rid of this monster and I will greatly appreciate your help - thanks!

Logfile of HijackThis v1.99.0
Scan saved at 3:19:18 PM, on 12/26/04
Platform: Windows 98 SE (Win9x 4.10.2222A)
MSIE: Internet Explorer v5.00 SP1 (5.00.2614.3500)

Running processes:
C:\WINDOWS\SYSTEM\KERNEL32.DLL
C:\WINDOWS\SYSTEM\MSGSRV32.EXE
C:\WINDOWS\SYSTEM\MPREXE.EXE
C:\WINDOWS\SYSTEM\mmtask.tsk
C:\WINDOWS\SYSTEM\MSTASK.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\WINES.EXE
C:\WINDOWS\MSKL32.EXE
C:\WINDOWS\JAVACM32.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\SDKEG32.EXE
C:\WINDOWS\EXPLORER.EXE
C:\WINDOWS\SYSTEM\HIDSERV.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\RNAAPP.EXE
C:\WINDOWS\SYSTEM\TAPISRV.EXE
C:\WINDOWS\SYSTEM\SYSTRAY.EXE
C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
C:\WINDOWS\SYSTEM\USBMMKBD.EXE
C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMGR.EXE
C:\WINDOWS\RunDLL.exe
C:\WINDOWS\SYSTEM\LEXBCES.EXE
C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMON.EXE
C:\WINDOWS\SYSTEM\RPCSS.EXE
C:\PROGRAM FILES\CALLWAVE\IAM.EXE
C:\WINDOWS\SYSTEM\LEXPPS.EXE
C:\WINDOWS\START MENU\PROGRAMS\STARTUP\HGFIGP.EXE
C:\WINDOWS\SYSTEM\WMIEXE.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\IENP.EXE
C:\WINDOWS\SYSTEM\DDHELP.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\IPJS.EXE
C:\WINDOWS\SYSTEM\SDKEG32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\SDKEG32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\IENP.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\IPJS.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\JAVACM32.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSTEM\IENP.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\IPJS.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SDKIZ32.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\ADDXR32.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSTEM\IENP.EXE
C:\WINDOWS\SYSTEM\APPRH.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSKO.EXE
C:\WINDOWS\SYSKO.EXE
C:\UNZIPPED\HIJACKTHIS\HIJACKTHIS.EXE

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
R3 - Default URLSearchHook is missing
O2 - BHO: Class - {097FBE5D-0CB9-381B-B07B-EDBEFEEADD4B} - C:\WINDOWS\IPIC.DLL
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [SystemTray] SysTray.ExE
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [AtiCwd32] Aticwd32.exe
O4 - HKLM\..\Run: [AtiKey] Atitask.exe
O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe
O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
O4 - HKLM\..\Run: [USBMMKBD] usbmmkbd.exe
O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.EXE -off
O4 - HKLM\..\Run: [Lexmark X74-X75] "C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe"
O4 - HKLM\..\Run: [LexStart] lexstart.exe
O4 - HKLM\..\Run: [8361.TMP] C:\WINDOWS\TEMP\8361.TMP.exe 0 28129
O4 - HKLM\..\Run: [CriticalUpdate] c:\windows\SYSTEM\wucrtupd.exe -startup
O4 - HKLM\..\Run: [8361.TMP.EXE] C:\WINDOWS\TEMP\8361.TMP.EXE 1 28129
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] c:\windows\SYSTEM\mstask.exe
O4 - HKLM\..\RunServices: [Encompass_ENCMONTR] C:\Program Files\Easy Internet\ENCMONTR.EXE
O4 - HKLM\..\RunServices: [Hidserv] Hidserv.exe run
O4 - HKLM\..\RunServices: [APPRH.EXE] C:\WINDOWS\SYSTEM\APPRH.EXE
O4 - HKLM\..\RunServices: [JAVACM32.EXE] C:\WINDOWS\JAVACM32.EXE
O4 - HKLM\..\RunServices: [SDKEG32.EXE] C:\WINDOWS\SYSTEM\SDKEG32.EXE
O4 - HKLM\..\RunServices: [MSKL32.EXE] C:\WINDOWS\MSKL32.EXE
O4 - HKLM\..\RunServices: [SDKIZ32.EXE] C:\WINDOWS\SDKIZ32.EXE
O4 - HKLM\..\RunServices: [WINES.EXE] C:\WINDOWS\SYSTEM\WINES.EXE
O4 - HKLM\..\RunServices: [ADDXR32.EXE] C:\WINDOWS\SYSTEM\ADDXR32.EXE
O4 - HKLM\..\RunServices: [SYSKO.EXE] C:\WINDOWS\SYSKO.EXE
O4 - HKLM\..\RunServices: [IENP.EXE] C:\WINDOWS\SYSTEM\IENP.EXE
O4 - HKLM\..\RunServices: [IPJS.EXE] C:\WINDOWS\IPJS.EXE
O4 - HKLM\..\RunOnce: [DelIE4SetupDir] rundll32.exe advpack.dll,DelNodeRunDLL32 C:\WINDOWS\SYSTEM\ie4setup,1
O4 - HKLM\..\RunOnce: [RunOnceEx] rundll32.exe iernonce.dll,RunOnceExProcess
O4 - HKLM\..\RunOnce: [GrpConv] grpconv.exe -o
O4 - HKLM\..\RunOnce: [BrandClearStubs] RUNDLL32 IEDKCS32.DLL,BrandCleanInstallStubs >{60B49E34-C7CC-11D0-8953-00A0C90347FF}MICROS
O4 - HKLM\..\RunOnce: [RegTLib] c:\windows\RegTLib.exe c:\windows\SYSTEM\StdOle2.Tlb
O4 - HKCU\..\Run: [Taskbar Display Controls] RunDLL deskcp16.dll,QUICKRES_RUNDLLENTRY
O4 - HKCU\..\RunOnce: [^SetupICWDesktop] C:\PROGRA~1\INTERN~1\Connection Wizard\icwconn1.exe /desktop
O4 - Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
O4 - Startup: Refresh.lnk = C:\Program Files\Iomega\Tools\REFRESH.EXE
O4 - Startup: Internet Answering Machine.lnk = C:\Program Files\CallWave\IAM.EXE
O4 - Startup: hgfigp.exe
O9 - Extra button: RealGuide - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\SYSTEM\Shdocvw.dll
O15 - Trusted Zone: *.frame.crazywinnings.com
O15 - Trusted Zone: *.static.topconverting.com
O15 - Trusted Zone: *.frame.crazywinnings.com (HKLM)
O15 - Trusted Zone: *.static.topconverting.com (HKLM)
O15 - Trusted IP range: 206.161.125.149
O15 - Trusted IP range: static.topconverting.com
O15 - Trusted IP range: frame.crazywinnings.com
O15 - Trusted IP range: static.topconverting.com
O15 - Trusted IP range: frame.crazywinnings.com
O15 - Trusted IP range: scoobidoo.com
O15 - Trusted IP range: flingstone.com
O15 - Trusted IP range: mt-download.com
O15 - Trusted IP range: clickspring.net
O15 - Trusted IP range: 05p.com
O15 - Trusted IP range: awmdabest.com
O15 - Trusted IP range: frame.crazywinnings.com
O15 - Trusted IP range: searchbarcash.com
O15 - Trusted IP range: my-internet.info
O15 - Trusted IP range: xxxtoolbar.com
O15 - Trusted IP range: slotch.com
O15 - Trusted IP range: blazefind.com
O15 - Trusted IP range: searchmiracle.com
O15 - Trusted IP range: static.topconverting.com
O15 - Trusted IP range: 206.161.124.130 (HKLM)
O15 - Trusted IP range: static.topconverting.com (HKLM)
O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
O15 - Trusted IP range: static.topconverting.com (HKLM)
O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
O15 - Trusted IP range: scoobidoo.com (HKLM)
O15 - Trusted IP range: flingstone.com (HKLM)
O15 - Trusted IP range: clickspring.net (HKLM)
O15 - Trusted IP range: 05p.com (HKLM)
O15 - Trusted IP range: awmdabest.com (HKLM)
O15 - Trusted IP range: searchbarcash.com (HKLM)
O15 - Trusted IP range: mt-download.com (HKLM)
O15 - Trusted IP range: my-internet.info (HKLM)
O15 - Trusted IP range: xxxtoolbar.com (HKLM)
O15 - Trusted IP range: slotch.com (HKLM)
O15 - Trusted IP range: blazefind.com (HKLM)
O15 - Trusted IP range: searchmiracle.com (HKLM)
O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} (MetaStreamCtl Class) - https://components.viewpoint.com/MTSInstallers/MetaStream3.cab?url=http://www.viewpoint.com/cgi-bin/installer.v3/vet_install_popup.pl?1&4&04.00.08.43&unknown&unknown&http://www.lookingyourbest.com/inamodel/index.html
O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-12.cab
O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab

Comments

  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited December 2004
    1. Download this tool called AboutBuster http://www.downloads.subratam.org/AboutBuster.zip

    Unzip it to your desktop but don't run it yet.

    2. Download CWShredder and install it. Check for updates and then exit program.
    http://cwshredder.net/bin/CWSInstall.exe

    3. Download Adaware from http://www.lavasoft.de/english/default.shtml. Install and open Adaware and click on *Check for Updates Now* and then *Connect*. It will find a new reference-file. Click *ok* and let it download and install the updates by clicking on *Finish* .This will return you to the main screen. Exit Adaware.

    4. Print out these instructions so you have them handy as most of the steps need to be done in safe mode and you may not be able to go online.

    5. Make sure your PC is configured to show hidden files

    Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked. Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"
    Click "Apply" then "OK"

    6. Reboot to Safe Mode
    Restart your computer and as soon as it starts booting up again continuously tap F8. A menu should come up where you will be given the option to enter Safe Mode. To get back to normal mode just restart the computer as you normally would.

    7. Scan with Hijack This and put checks next to all the following, then click "Fix Checked"

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\system\pjhox.dll/sp.html#28129
    R3 - Default URLSearchHook is missing
    O2 - BHO: Class - {097FBE5D-0CB9-381B-B07B-EDBEFEEADD4B} - C:\WINDOWS\IPIC.DLL
    O4 - HKLM\..\Run: [8361.TMP] C:\WINDOWS\TEMP\8361.TMP.exe 0 28129
    O4 - HKLM\..\Run: [8361.TMP.EXE] C:\WINDOWS\TEMP\8361.TMP.EXE 1 28129
    O4 - HKLM\..\RunServices: [APPRH.EXE] C:\WINDOWS\SYSTEM\APPRH.EXE
    O4 - HKLM\..\RunServices: [JAVACM32.EXE] C:\WINDOWS\JAVACM32.EXE
    O4 - HKLM\..\RunServices: [SDKEG32.EXE] C:\WINDOWS\SYSTEM\SDKEG32.EXE
    O4 - HKLM\..\RunServices: [MSKL32.EXE] C:\WINDOWS\MSKL32.EXE
    O4 - HKLM\..\RunServices: [SDKIZ32.EXE] C:\WINDOWS\SDKIZ32.EXE
    O4 - HKLM\..\RunServices: [WINES.EXE] C:\WINDOWS\SYSTEM\WINES.EXE
    O4 - HKLM\..\RunServices: [ADDXR32.EXE] C:\WINDOWS\SYSTEM\ADDXR32.EXE
    O4 - HKLM\..\RunServices: [SYSKO.EXE] C:\WINDOWS\SYSKO.EXE
    O4 - HKLM\..\RunServices: [IENP.EXE] C:\WINDOWS\SYSTEM\IENP.EXE
    O4 - HKLM\..\RunServices: [IPJS.EXE] C:\WINDOWS\IPJS.EXE
    O4 - HKLM\..\RunOnce: [DelIE4SetupDir] rundll32.exe advpack.dll,DelNodeRunDLL32 C:\WINDOWS\SYSTEM\ie4setup,1
    O4 - HKLM\..\RunOnce: [RunOnceEx] rundll32.exe iernonce.dll,RunOnceExProcess
    O4 - HKLM\..\RunOnce: [BrandClearStubs] RUNDLL32 IEDKCS32.DLL,BrandCleanInstallStubs >{60B49E34-C7CC-11D0-8953-00A0C90347FF}MICROS
    O15 - Trusted Zone: *.frame.crazywinnings.com
    O15 - Trusted Zone: *.static.topconverting.com
    O15 - Trusted Zone: *.frame.crazywinnings.com (HKLM)
    O15 - Trusted Zone: *.static.topconverting.com (HKLM)
    O15 - Trusted IP range: 206.161.125.149
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: scoobidoo.com
    O15 - Trusted IP range: flingstone.com
    O15 - Trusted IP range: mt-download.com
    O15 - Trusted IP range: clickspring.net
    O15 - Trusted IP range: 05p.com
    O15 - Trusted IP range: awmdabest.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: searchbarcash.com
    O15 - Trusted IP range: my-internet.info
    O15 - Trusted IP range: xxxtoolbar.com
    O15 - Trusted IP range: slotch.com
    O15 - Trusted IP range: blazefind.com
    O15 - Trusted IP range: searchmiracle.com
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: 206.161.124.130 (HKLM)
    O15 - Trusted IP range: static.topconverting.com (HKLM)
    O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
    O15 - Trusted IP range: static.topconverting.com (HKLM)
    O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
    O15 - Trusted IP range: scoobidoo.com (HKLM)
    O15 - Trusted IP range: flingstone.com (HKLM)
    O15 - Trusted IP range: clickspring.net (HKLM)
    O15 - Trusted IP range: 05p.com (HKLM)
    O15 - Trusted IP range: awmdabest.com (HKLM)
    O15 - Trusted IP range: searchbarcash.com (HKLM)
    O15 - Trusted IP range: mt-download.com (HKLM)
    O15 - Trusted IP range: my-internet.info (HKLM)
    O15 - Trusted IP range: xxxtoolbar.com (HKLM)
    O15 - Trusted IP range: slotch.com (HKLM)
    O15 - Trusted IP range: blazefind.com (HKLM)
    O15 - Trusted IP range: searchmiracle.com (HKLM)
    O16 - DPF: {03F998B2-0E00-11D3-A498-00104B6EB52E} (MetaStreamCtl Class) - https://components.viewpoint.com/MT...odel/index.html


    and delete the following files if present.

    C:\WINDOWS\system\pjhox.dll
    C:\WINDOWS\IPIC.DLL
    C:\WINDOWS\SYSTEM\APPRH.EXE
    C:\WINDOWS\JAVACM32.EXE
    C:\WINDOWS\SYSTEM\SDKEG32.EXE
    C:\WINDOWS\MSKL32.EXE
    C:\WINDOWS\SDKIZ32.EXE
    C:\WINDOWS\SYSTEM\WINES.EXE
    C:\WINDOWS\SYSTEM\ADDXR32.EXE
    C:\WINDOWS\SYSKO.EXE
    C:\WINDOWS\SYSTEM\IENP.EXE
    C:\WINDOWS\IPJS.EXE

    and delete everything within this folder, but not the folder itself:
    C:\WINDOWS\TEMP

    8. Double click AboutBuster.exe that you downloaded earlier. Click OK, click Start, then click OK. This will scan your computer for the bad files and delete them. Save the report(copy and paste into notepad or wordpad and save as a .txt file) and post a copy back here when you are done with all the steps.

    9. Run CWShredder.

    10. Scan with Adaware and let it remove any bad files found.

    11. Clean out temporary and TIF files. Go to Start > Run and type in the box: cleanmgr. Let it scan your system for files to remove. Make sure these 3 are checked and then press *ok* to remove:

    Temporary Files
    Temporary Internet Files
    Recycle Bin

    12. Reboot to normal mode, scan again with Hijack This and post a new log here.

    13. Finally, do an online scan at the following site. Let it remove any infected files found.
    Trend Micro (PC-cillin) - Free on-line Scan
    http://housecall.antivirus.com

    Post a fresh HijackThis log and the AboutBuster report back here please.
  • edited December 2004
    I followed all the steps above and it looks like my computer is clean now (knock on wood). I'm posting the new logs but did notice that after running the new hijackthis log, some of the deleted lines reappeared (for example, the O15 Trusted IP range ones). Hopefully it won't cause a problem. Thanks for the help!

    Logfile of HijackThis v1.99.0
    Scan saved at 5:15:39 PM, on 12/26/04
    Platform: Windows 98 SE (Win9x 4.10.2222A)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\SYSTEM\MSTASK.EXE
    C:\WINDOWS\EXPLORER.EXE
    C:\WINDOWS\NETTM32.EXE
    C:\WINDOWS\SYSTEM\HIDSERV.EXE
    C:\WINDOWS\SYSTEM\ATLOU.EXE
    C:\WINDOWS\APPEZ.EXE
    C:\WINDOWS\SYSTEM\NETSE32.EXE
    C:\WINDOWS\SYSTEM\MFCIN32.EXE
    C:\WINDOWS\SYSTEM\RNAAPP.EXE
    C:\WINDOWS\SYSTEM\TAPISRV.EXE
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
    C:\WINDOWS\SYSTEM\USBMMKBD.EXE
    C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMGR.EXE
    C:\WINDOWS\RunDLL.exe
    C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\WORKS SHARED\WKCALREM.EXE
    C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMON.EXE
    C:\WINDOWS\SYSTEM\LEXBCES.EXE
    C:\PROGRAM FILES\CALLWAVE\IAM.EXE
    C:\WINDOWS\SYSTEM\RPCSS.EXE
    C:\WINDOWS\START MENU\PROGRAMS\STARTUP\HGFIGP.EXE
    C:\WINDOWS\SYSTEM\WMIEXE.EXE
    C:\WINDOWS\SYSTEM\LEXPPS.EXE
    C:\UNZIPPED\HIJACKTHIS\HIJACKTHIS.EXE
    C:\WINDOWS\NOTEPAD.EXE

    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
    O4 - HKLM\..\Run: [SystemTray] SysTray.ExE
    O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\Run: [AtiCwd32] Aticwd32.exe
    O4 - HKLM\..\Run: [AtiKey] Atitask.exe
    O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe
    O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
    O4 - HKLM\..\Run: [USBMMKBD] usbmmkbd.exe
    O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.EXE -off
    O4 - HKLM\..\Run: [Lexmark X74-X75] "C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe"
    O4 - HKLM\..\Run: [LexStart] lexstart.exe
    O4 - HKLM\..\Run: [CriticalUpdate] c:\windows\SYSTEM\wucrtupd.exe -startup
    O4 - HKLM\..\Run: [Narrator] C:\WINDOWS\wuqguo.exe
    O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
    O4 - HKLM\..\RunServices: [Encompass_ENCMONTR] C:\Program Files\Easy Internet\ENCMONTR.EXE
    O4 - HKLM\..\RunServices: [Hidserv] Hidserv.exe run
    O4 - HKLM\..\RunServices: [NETSE32.EXE] C:\WINDOWS\SYSTEM\NETSE32.EXE
    O4 - HKLM\..\RunServices: [NETTM32.EXE] C:\WINDOWS\NETTM32.EXE
    O4 - HKLM\..\RunServices: [MFCIN32.EXE] C:\WINDOWS\SYSTEM\MFCIN32.EXE
    O4 - HKLM\..\RunServices: [APPEZ.EXE] C:\WINDOWS\APPEZ.EXE
    O4 - HKLM\..\RunServices: [ATLOU.EXE] C:\WINDOWS\SYSTEM\ATLOU.EXE
    O4 - HKCU\..\Run: [Taskbar Display Controls] RunDLL deskcp16.dll,QUICKRES_RUNDLLENTRY
    O4 - Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Startup: Refresh.lnk = C:\Program Files\Iomega\Tools\REFRESH.EXE
    O4 - Startup: Internet Answering Machine.lnk = C:\Program Files\CallWave\IAM.EXE
    O4 - Startup: hgfigp.exe
    O9 - Extra button: RealGuide - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\SYSTEM\Shdocvw.dll
    O15 - Trusted IP range: 206.161.125.149
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: scoobidoo.com
    O15 - Trusted IP range: flingstone.com
    O15 - Trusted IP range: mt-download.com
    O15 - Trusted IP range: clickspring.net
    O15 - Trusted IP range: 05p.com
    O15 - Trusted IP range: awmdabest.com
    O15 - Trusted IP range: frame.crazywinnings.com
    O15 - Trusted IP range: searchbarcash.com
    O15 - Trusted IP range: my-internet.info
    O15 - Trusted IP range: xxxtoolbar.com
    O15 - Trusted IP range: slotch.com
    O15 - Trusted IP range: blazefind.com
    O15 - Trusted IP range: searchmiracle.com
    O15 - Trusted IP range: static.topconverting.com
    O15 - Trusted IP range: (HKLM)
    O15 - Trusted IP range: static.topconverting.com (HKLM)
    O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
    O15 - Trusted IP range: static.topconverting.com (HKLM)
    O15 - Trusted IP range: frame.crazywinnings.com (HKLM)
    O15 - Trusted IP range: scoobidoo.com (HKLM)
    O15 - Trusted IP range: flingstone.com (HKLM)
    O15 - Trusted IP range: clickspring.net (HKLM)
    O15 - Trusted IP range: 05p.com (HKLM)
    O15 - Trusted IP range: awmdabest.com (HKLM)
    O15 - Trusted IP range: searchbarcash.com (HKLM)
    O15 - Trusted IP range: mt-download.com (HKLM)
    O15 - Trusted IP range: my-internet.info (HKLM)
    O15 - Trusted IP range: xxxtoolbar.com (HKLM)
    O15 - Trusted IP range: slotch.com (HKLM)
    O15 - Trusted IP range: blazefind.com (HKLM)
    O15 - Trusted IP range: searchmiracle.com (HKLM)
    O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-12.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab



    Scanned at: 4:53:22 PM on: 12/26/04

    -- Scan 1
    About:Buster Version 4.0
    Reference List : 16


    ADS not scanned System(FAT)
    Removed! : C:\WINDOWS\qvojx.dat
    Attempted Clean Of Temp folder.
    Removed Uninstall Key (HSA)
    Removed Uninstall Key (SE)
    Removed Uninstall Key (SW)
    Pages Reset... Done!

    -- Scan 2
    About:Buster Version 4.0
    Reference List : 16


    ADS not scanned System(FAT)
    Attempted Clean Of Temp folder.
    Pages Reset... Done!
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited December 2004
    It does look better, but you still have a few things left.

    Place a checkmark next to these entries, close all browsers and windows, and have HijackThis fix them by clicking Fix Checked:

    O4 - HKLM\..\RunServices: [NETSE32.EXE] C:\WINDOWS\SYSTEM\NETSE32.EXE
    O4 - HKLM\..\RunServices: [NETTM32.EXE] C:\WINDOWS\NETTM32.EXE
    O4 - HKLM\..\RunServices: [MFCIN32.EXE] C:\WINDOWS\SYSTEM\MFCIN32.EXE
    O4 - HKLM\..\RunServices: [APPEZ.EXE] C:\WINDOWS\APPEZ.EXE
    O4 - HKLM\..\RunServices: [ATLOU.EXE] C:\WINDOWS\SYSTEM\ATLOU.EXE



    Boot into Safe Mode
    Restart your computer and as soon as it starts booting up again continuously tap F8. A menu should come up where you will be given the option to enter Safe Mode. To get back to normal mode just restart the computer as you normally would.



    Show hidden files
    http://www.short-media.com/forum/showpost.php?p=172588&postcount=3



    Please delete these files using Windows Explorer(if present):
    C:\WINDOWS\SYSTEM\NETSE32.EXE
    C:\WINDOWS\NETTM32.EXE
    C:\WINDOWS\SYSTEM\MFCIN32.EXE
    C:\WINDOWS\APPEZ.EXE
    C:\WINDOWS\SYSTEM\ATLOU.EXE



    Reboot back to normal mode.



    Now to get rid of all those 015 entries.

    Download(right click and select Save file as or Save link as): DelDomains.inf
    http://mvps.org/winhelp2002/DelDomains.inf

    To use: Close all open browsers
    Right-click DelDomains.inf and select: Install



    Post a new hijackthis log.
  • edited December 2004
    Here's the 3rd hijackthis log. Thanks again!

    Logfile of HijackThis v1.99.0
    Scan saved at 8:42:59 PM, on 12/26/04
    Platform: Windows 98 SE (Win9x 4.10.2222A)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\SYSTEM\MSTASK.EXE
    C:\WINDOWS\EXPLORER.EXE
    C:\WINDOWS\SYSTEM\HIDSERV.EXE
    C:\WINDOWS\SYSTEM\RNAAPP.EXE
    C:\WINDOWS\SYSTEM\TAPISRV.EXE
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\WINDOWS\SYSTEM\HPSYSDRV.EXE
    C:\WINDOWS\SYSTEM\USBMMKBD.EXE
    C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMGR.EXE
    C:\WINDOWS\WUQGUO.EXE
    C:\WINDOWS\RunDLL.exe
    C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\WORKS SHARED\WKCALREM.EXE
    C:\PROGRAM FILES\LEXMARK X74-X75\LXBBBMON.EXE
    C:\PROGRAM FILES\CALLWAVE\IAM.EXE
    C:\WINDOWS\SYSTEM\LEXBCES.EXE
    C:\WINDOWS\SYSTEM\RPCSS.EXE
    C:\WINDOWS\SYSTEM\WMIEXE.EXE
    C:\WINDOWS\SYSTEM\LEXPPS.EXE
    C:\UNZIPPED\HIJACKTHIS\HIJACKTHIS.EXE

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.iland.net/
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
    O4 - HKLM\..\Run: [SystemTray] SysTray.ExE
    O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\Run: [AtiCwd32] Aticwd32.exe
    O4 - HKLM\..\Run: [AtiKey] Atitask.exe
    O4 - HKLM\..\Run: [HPScanPatch] C:\WINDOWS\SYSTEM\HPScanFix.exe
    O4 - HKLM\..\Run: [hpsysdrv] c:\windows\system\hpsysdrv.exe
    O4 - HKLM\..\Run: [USBMMKBD] usbmmkbd.exe
    O4 - HKLM\..\Run: [TCASUTIEXE] TCAUDIAG.EXE -off
    O4 - HKLM\..\Run: [Lexmark X74-X75] "C:\Program Files\Lexmark X74-X75\lxbbbmgr.exe"
    O4 - HKLM\..\Run: [LexStart] lexstart.exe
    O4 - HKLM\..\Run: [CriticalUpdate] c:\windows\SYSTEM\wucrtupd.exe -startup
    O4 - HKLM\..\Run: [Narrator] C:\WINDOWS\wuqguo.exe
    O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
    O4 - HKLM\..\RunServices: [Encompass_ENCMONTR] C:\Program Files\Easy Internet\ENCMONTR.EXE
    O4 - HKLM\..\RunServices: [Hidserv] Hidserv.exe run
    O4 - HKCU\..\Run: [Taskbar Display Controls] RunDLL deskcp16.dll,QUICKRES_RUNDLLENTRY
    O4 - Startup: Microsoft Works Calendar Reminders.lnk = C:\Program Files\Common Files\Microsoft Shared\Works Shared\wkcalrem.exe
    O4 - Startup: Refresh.lnk = C:\Program Files\Iomega\Tools\REFRESH.EXE
    O4 - Startup: Internet Answering Machine.lnk = C:\Program Files\CallWave\IAM.EXE
    O4 - Startup: hgfigp.exe
    O9 - Extra button: RealGuide - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - C:\WINDOWS\SYSTEM\Shdocvw.dll
    O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-12.cab
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} (Symantec RuFSI Utility Class) - http://security.symantec.com/sscv6/SharedContent/common/bin/cabsa.cab
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} (Symantec AntiVirus scanner) - http://security.symantec.com/sscv6/SharedContent/vc/bin/AvSniff.cab
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004061001/housecall.trendmicro.com/housecall/xscan53.cab
  • Buckeye_SamBuckeye_Sam Columbus, Ohio
    edited December 2004
    Please download this Adaware VX2 addon.

    http://download.lavasoft.de.edgesuite.net/public/plvx2cleaner.exe


    Start Ad-Aware
    Go to “Add-ons”
    Select the VX2 Cleaner add-on and click “Run Tool”

    If it finds anything
    Select “Clean System”
    Reboot your computer
    Scan your computer with Ad-Aware
    Remove any VX2 objects detected
    Reboot your computer again
    Run a second scan to make sure the files have been removed from your computer.



    Place a checkmark next to these entries, close all browsers and windows, and have HijackThis fix them by clicking Fix Checked:
    O4 - HKLM\..\Run: [Narrator] C:\WINDOWS\wuqguo.exe



    Delete this file if present:
    C:\WINDOWS\wuqguo.exe



    Reboot and post a new hijackthis log and also let me know if the VX2 tool found anything.
Sign In or Register to comment.