Adware - about:blank Homepage

HalOfBorgHalOfBorg West Virginia
edited May 2004 in Science & Tech
One of our work PCs has started changing it's homepage to "about:blank" which is some add page.

I put it back to msn, but about an hour later it's back to about:blank.

Also, two shortcuts appear on the desktop. One is for an online pharmacy (so it claims, i'll not try it), and the other SAYS it's a shortcut to a folder, but it opens Internet Explorer (which I close ASAP). I delete the shortcuts but they come back as well.

ALSO - it puts a shortcut to "VIP Porn" or somecrap like that in My Favorites.

ALSO ALSO....... All of my shortcuts to IEXPLORER all have "%HOMEDRIVE%%HOMEPATH%" as the "Start In" line. No idea if they had that before, but the ones I make do not. I know then have the standard "C:\Program Files\Internet Explorer". I deleted those and made new ones, for what it may be worth...

I've run Adaware and Spybot S&D (both fully updated) repeatedly. They both found and removed things, mostly registry entries. These also seem to come back - though there are less now.

Running Windows2000

Ideas??? :loco:

(the page should NOT have that underscore in it...no idea why it's there)

Comments

  • primesuspectprimesuspect Beepin n' Boopin Detroit, MI Icrontian
    edited March 2004
    http://www.short-media.com/article.php?131.0

    read that, it links to all the tools you need.
  • kanezfankanezfan sunny south florida Icrontian
    edited March 2004
    i also recommend running avg antivirus. I had a similar situation once, ran all kinds of adware stuff to remove it all, but it kept coming back. norton didn't find anything either. avg antivirus did find stuff though. it turns out it was a trojan horse virus. i always keep avg around now.
  • verselloversello New
    edited March 2004
    Like kanez mentioned, check for virii.

    Also, Adaware and Spybot do about 90% of the job. The last 10% is manually phishing out stuff.

    Check your registry startup keys by clicking on START -> RUN -> type MSconfig

    Then click on the "startup" tab and disable anything fishy. Most of the time it should be completely clean except for Norton dependent apps (ie - ccApp, ccRegVfy), if applicable, or work-related stuff. Besides, you can always re-enable it if it's something of importance.

    Don't muck in the registry unless you have a backup.
  • HalOfBorgHalOfBorg West Virginia
    edited March 2004
    OK. I've got two more Adware utilities in my arsenal (CW Shredder and Hijack This). THANKS. :thumbsup:

    Also have AVG antiVirus (Free ver). :thumbsup: That found the bastard - js.seeker.

    All of 'em found something. Adaware, Spybot, CW, HJ, even Norton's found a virus.

    No msconfig - it's Win2K, but thanks anyway, it's better now --- until the night crew gets here again! :fu:
  • verselloversello New
    edited March 2004
    HalOfBorg wrote:
    OK. I've got two more Adware utilities in my arsenal (CW Shredder and Hijack This). THANKS. :thumbsup:

    Also have AVG antiVirus (Free ver). :thumbsup: That found the bastard - js.seeker.

    All of 'em found something. Adaware, Spybot, CW, HJ, even Norton's found a virus.

    No msconfig - it's Win2K, but thanks anyway, it's better now --- until the night crew gets here again! :fu:

    aha yea you're right about msconfig. I thought I tried it out one day in win2k and it was there. Must have been the XP box at work. oh well.
  • edited May 2004
    1) Download reglite
    2) install "Reglite" and run it, enter HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs into the address bar.
    3) Double click on AppInit_DLLs to open a "Data Editor" properties window, if the bottom textfield named "Value" contains a .dll file; then this is the hidden file you need to get rid off.
    4) You should not be able to delete this file if you try to clear the value field, IMPORTANT: take note of the path and name of the .dll file. Write it down so you do not forget it.
    5) Rename the Folder "Windows" (This is a purple "highlighted" folder in the left hand window) to NOTWINDOWS. Simply click on the folder, click on "Edit" in the menu bar and select "Rename".
    6) Click AppInit_DLLs again and clear the value containing the .dll and ok it. This should have removed the .dll
    7) Rename the windows folder back to its original name "Windows".
    8) Run SpyBot, Ad-Aware and CWShredder
    9) Check the following three links for instructions on downloading and running the applications listed:
    o How to use Spybot to remove Spyware
    o How to use Ad-Aware to remove Spyware
    o How to Remove CoolWebSearch with CoolWeb Shredder
    10) Next step will be to remove this dll file so make sure you have it noted down.
    11) Step 1
    12) Download KillBox
    13) Unzip and start the application
    14) Paste in the dir <path and name of dll as found in the appinit value box> i.e C:\Windows\System32\nameofdll.dll
    15) Menu Select Action -> Delete on Reboot
    16) Select File -> Add file <It should add the path automatically>
    17) <Same Window> Select Action -> Process and Reboot
    18) If Step 1 didn't work
    19) Step 2
    20) Click "Start" => "Run" and type in "cmd" (Without the quotations) and click on "Okay".
    21) This will open a command window I will assume you have a basic knowledge of DOS if you have any problems at this point just write back I will outline the commands.
    22) Type in dir <path and name of dll as found in the appinit value box> and press "Enter". You should see the name of the file listed.
    23) Go to the system32 folder (This is where the .dll file will typically reside) and type attrib -R "nameofdll".dll
    24) Carry out Step 1 again
    25) Restart your computer in safemode
    26) Open cmd window again as before
    27) Type dir <path and name of dll as found in the appinit value box> and locate the dll name the dll should now have been removed and will not be listed.
    28) While in safe mode (How do I boot into "Safe" mode?), run the 3 ad-removal programs again, just to make sure all traces are gone.
    29) Boot up pc as normal and you should be trouble free.

    Try this fix if the other one above doesnt work !


    This is a fast way to stop the About:Blank trojan redirector !!


    1. Go to your desktop and click "Start" then "Run"> type in regedit in the address
    bar. and hit OK.\
    2. Once in the registry go up to the first folder (HKEY_CLASSES_ROOT) and click on
    the (+) sign to access the folders. Find the folder BHO.HelperObject click on
    the (+) sign to view the sub folders inside. Look for a folder called: CurVer
    then Right Click on the CurVer folder and choose "Permissions" from the list.

    3. Highlight the Administrator or the first group user in the list at the top of
    the permissions group list. Now go to the bottom area and check the boxes for
    "Deny" for Full Control and Read categories
    4. If there is a second Group user after the Adminstrator then highlight it and
    repeat the same steps as above to "Deny" Full Control and Read privileges for
    it also.
    5. Click "Apply" and "OK" and close out of the registry area

    6. This should stop the About:Blank trojan from setting up .dll files in your
    System32 files

    7. Download and Run Spysweeper and Download Spywareblaster to prevent
    future spyware infections.

    HalOfBorg wrote:
    One of our work PCs has started changing it's homepage to "about:blank" which is some add page.

    I put it back to msn, but about an hour later it's back to about:blank.

    Also, two shortcuts appear on the desktop. One is for an online pharmacy (so it claims, i'll not try it), and the other SAYS it's a shortcut to a folder, but it opens Internet Explorer (which I close ASAP). I delete the shortcuts but they come back as well.

    ALSO - it puts a shortcut to "VIP Porn" or somecrap like that in My Favorites.

    ALSO ALSO....... All of my shortcuts to IEXPLORER all have "%HOMEDRIVE%%HOMEPATH%" as the "Start In" line. No idea if they had that before, but the ones I make do not. I know then have the standard "C:\Program Files\Internet Explorer". I deleted those and made new ones, for what it may be worth...

    I've run Adaware and Spybot S&D (both fully updated) repeatedly. They both found and removed things, mostly registry entries. These also seem to come back - though there are less now.

    Running Windows2000

    Ideas??? :loco:

    (the page should NOT have that underscore in it...no idea why it's there)
  • edited May 2004
    Hi,
    I just have removed that stupid about:blank bug (don't know where I got it from). The information provided here was in part quite helpful.
    However, there are two "something.dll" files in c:/windows/system32 with apparently randomly generated names. Spybot and also AVG could not find them.

    The first one can be found as described above using reglite.

    I have found the second one using a tool called Process Explorer. In principle, it should allow to identify both *.dlls.
    download: http://www.sysinternals.com/ntw2k/freeware/procexp.shtml
    As I understood it (don't know much about it), that piece allows you to find dlls wich have been used recently by a certain program:

    1). Start this program, then start Internet Explorer. Mark "Internet Explorer" in the upper window of Process Explorer.
    2.) Click on the fourth symbol from the left in the shortcut list, to view dll's.
    3.) Search for dll's which are not from Microsoft or have a strange name.. hm, they all have. But you will find ..(When opening with an Editor, you will find some html inside, corresponding in the middle to the code of that ****** about:blank page).
    4.) I have renamed those files to TROJAN1.html and TROJAN2.html
    5.) Then I tried to delete them using Killbox, like described above. Worked after some rebooting and so on.
    6.) Go to START > RUN , type regedit and be CAREFUL now.
    7.) Use EDIT > SEARCH, type about:blank and DELETE (left mouse, DELETE) all entrys containing that value (use SEARCH AGAIN, until finished).

    Possibly you are finished now. It took me about 6 hours, but I don't know much about that stuff.

    PS: Could not use the second method stated above, because I could not find the folder BHO.HelperObject.
  • kryystkryyst Ontario, Canada
    edited May 2004
    You can also set up a policy on a win2k or xp machine in a network environment so that no one can change the homepage. But that's something the net admin has to do through policy manager on the win2k server.
Sign In or Register to comment.