Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Loadingwebsite.com, tvs_b.exe, rranrn.exe [RESOLVED]


  • This topic is locked This topic is locked

#1
youreditor

youreditor

    Member

  • Member
  • PipPip
  • 13 posts
Hi, I've downloaded and run all the programs recommended, but need help determining how to get rid of this remaining junk. Main complaint is constant popup of loadingwebsite.com, addynamix, ad.zserver, etc. ad nauseum.

Here is the Panda Active scan file and following is HTJ log:
Thanks so much in advance!

Status Location

Adware:Adware/ClkOptimizer C:\WINDOWS\system32 rranrn.exe
Adware:Adware/BroadcastPC C:\program files\tvs\tvs_b.exe
Adware:Adware/ClkOptimizer No disinfected C:\WINDOWS\system32\rranrn.exe
Adware:Adware/BroadcastPC No disinfected C:\PROGRA~1\tvs\tvs_b.exe
Adware:Adware/ClkOptimizer No disinfected C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ddct.exe
Adware:Adware/eZula No disinfected Windows Registry
Adware:Adware/VirtualBouncer No disinfected C:\WINDOWS\system32\inneradinstall.log
Adware:Adware/DelFinMedia No disinfected Windows Registry
Adware:Adware/SideSearch No disinfected C:\Documents and Settings\Valued Dell User\Application Data\Lycos
Adware:Adware/IEDriver No disinfected Windows Registry
Adware:Adware/NavHelper No disinfected C:\Program Files\Ares
Adware:Adware/ISearch No disinfected C:\WINDOWS\isrvs
Adware:Adware/IEPlugin No disinfected Windows Registry
Adware:Adware/Transponder No disinfected C:\WINDOWS\inst
Adware:Adware/ClkOptimizer No disinfected C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ddct.exe
Possible Virus. No disinfected C:\Program Files\Qualcomm\Eudora\Attach\Smile Bot.exe
Possible Virus. No disinfected C:\Program Files\Qualcomm\Eudora\Attach\Smile Bot1.exe
Adware:Adware/BroadcastPC No disinfected C:\Program Files\tvs\TVS_B.exe
Adware:Adware/BroadcastPC No disinfected C:\Program Files\tvs\tvs_clean.exe
Adware:Adware/BroadcastPC No disinfected C:\Program Files\tvs\tvs_ln.exe
Adware:Adware/ISearch No disinfected C:\WINDOWS\delprot.ini
Adware:Adware/ISearch No disinfected C:\WINDOWS\deskbar.ini
Adware:Adware/nCase No disinfected C:\WINDOWS\icont.exe
Adware:Adware/SideSearch No disinfected C:\WINDOWS\sepsd.bin
Adware:Adware/SaveNow No disinfected C:\WINDOWS\SYSTEM32\datastore.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\fpns0357e.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\fscfg.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\g804lidq180e.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\gp0ql3d51.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\gpr8l39u1.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\i8060idse8060.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\iCshlpr.dll
Adware:Adware/VirtualBouncer No disinfected C:\WINDOWS\SYSTEM32\INNERADINSTALL.LOG
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\j4n2le5o1h.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\jt4007hme.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\k2lq0c35ef.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\lv2409fqe.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\lvrs0997e.dll
Adware:Adware/ValueAd No disinfected C:\WINDOWS\SYSTEM32\LASS~1.EXE
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\m4ls0e37eh.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\m4po0e73eh.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\m8ju0i19e8.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mbrating.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mddtclog.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mesip32.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mGg_hook.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\movcrt.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mrxbse35.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mvisam11.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\mvj2l91o1.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\myxclu.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\n0p40a7qed.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\ndmsevt.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\nvmkcert.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\o2nslc571f.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\o684lglq16qe.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\oxedlg.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\pMpgraph.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\q268lcju1fo8.dll
Adware:Adware/ClkOptimizer No disinfected C:\WINDOWS\SYSTEM32\qqyvq.dat
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\r48slel71hq.dll
Adware:Adware/ClkOptimizer No disinfected C:\WINDOWS\SYSTEM32\rranrn.exe
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\t48u0el9ehq.dll
Spyware:Spyware/Virtumonde No disinfected C:\WINDOWS\SYSTEM32\TargetSoftSetup.exe
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\vrmdbg.dll
Adware:Adware/Look2Me No disinfected C:\WINDOWS\SYSTEM32\wfvdmod.dll
Logfile of HijackThis v1.99.1
Scan saved at 3:04:07 PM, on 6/7/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\Program Files\WindowBlinds\wbload.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\svchost.exe
C:\Program Files\CW4\cw4.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\rranrn.exe
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\Program Files\WordWeb\wweb32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Crazy Browser\Crazy Browser.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\HPZSTC09.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\HJT\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.foxnews.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,userinit.exe
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\system32\rranrn.exe reg_run
O4 - HKLM\..\Run: [InetCntrl] C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
O4 - HKLM\..\Run: [TVS_B] C:\program files\tvs\tvs_b.exe
O4 - HKLM\..\Run: [second] C:\WINDOWS\system32\second.bat
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: WordWeb.lnk = ?
O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
O8 - Extra context menu item: Add to Power IE &Block List... - C:\Program Files\Power IE\adblocking.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Broken Internet access because of LSP provider 'inetcntrl.dll' missing
O15 - Trusted Zone: http://www.westlaw.com
O16 - DPF: Arcsoft Web Uploader - http://hpphoto.com/d...dFileApplet.cab
O16 - DPF: cpcScanner - http://www.crucial.c.../cpcScanner.cab
O16 - DPF: DigiChat Applet - http://albany.digi-n...s/Client_IE.cab
O16 - DPF: ppctlcab - http://www.pestscan....er/ppctlcab.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {938527D1-CDB7-4147-998A-B20FCA5CC976} (Cdmcco Class) - http://cafeimg.hanma.../cab9/dmcc2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildt...tto/install.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsec...scan/axscan.cab
O16 - DPF: {EC8C56B1-D027-4AB2-AF63-F845CCEE59B5} (DocumentAccessor Class) - https://www.bpm.lowe...loginHelper.cab
O16 - DPF: {F54C1137-5E34-4B95-95A5-BA56D4D8D743} (Secure Delivery) - http://www.gamespot....ownload/kdx.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)
O20 - Winlogon Notify: BITS - C:\WINDOWS\system32\dn6801jue.dll
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\WI559D~1\fastload.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
  • 0

Advertisements


#2
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
Download L2mfix from one of these two locations:
http://www.atribune....oads/l2mfix.exe
http://www.downloads....org/l2mfix.exe
Save the file to your desktop and double click l2mfix.exe. Click the Install button to extract the files and follow the prompts, then open the newly added l2mfix folder on your desktop. Close any programs you have open since this step requires a reboot.
From the l2mfix folder on your desktop, double click l2mfix.bat and select option #2 for Run Fix by typing 2 and then pressing enter, then press any key to reboot your computer. After a reboot, your desktop and icons will appear, then disappear (this is normal). L2mfix will continue to scan your computer and when it's finished, notepad will open with a log. Copy the contents of that log and paste it back into this thread, along with a new hijackthis log.

IMPORTANT: Do NOT run any other files in the l2mfix folder unless you are asked to do so!


Regards,
  • 0

#3
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Thanks Pieter! Here are the new logs, first the L2Mfix:

L2Mfix 1.03

Running From:
C:\Documents and Settings\Valued Dell User\Desktop\Spyware Removal\l2mfix



RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting registry permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Denying C(CI) access for predefined group "Administrators"
- adding new ACCESS DENY entry


Registry Permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(CI) DENY --C------- BUILTIN\Administrators
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER



Setting up for Reboot


Starting Reboot!

C:\Documents and Settings\Valued Dell User\Desktop\Spyware Removal\l2mfix
System Rebooted!

Running From:
C:\Documents and Settings\Valued Dell User\Desktop\Spyware Removal\l2mfix

killing explorer and rundll32.exe

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 2024 'explorer.exe'
Killing PID 2024 'explorer.exe'
Killing PID 2024 'explorer.exe'
Killing PID 2024 'explorer.exe'

Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 996 'rundll32.exe'
Killing PID 996 'rundll32.exe'
Killing PID 996 'rundll32.exe'

Scanning First Pass. Please Wait!

First Pass Completed

Second Pass Scanning

Second pass Completed!
Backing Up: C:\WINDOWS\system32\fpns0357e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\fscfg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\g804lidq180e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\gp0ql3d51.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\gpr8l39u1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\hjzidr12.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\i8060idse8060.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\iCshlpr.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\j4n2le5o1h.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\jt4007hme.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\k2lq0c35ef.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\lv2409fqe.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\lvrs0997e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\m4ls0e37eh.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\m4po0e73eh.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\m8ju0i19e8.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mbrating.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mddtclog.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mesip32.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mGg_hook.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\movcrt.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mrxbse35.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mvisam11.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mvj2l91o1.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mxls31.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mymusd.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\myxclu.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\n0p40a7qed.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\ndmsevt.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\nvmkcert.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\o2nslc571f.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\o684lglq16qe.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\oxedlg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\pMpgraph.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\q268lcju1fo8.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\r48slel71hq.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\t48u0el9ehq.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\t88ulil918q.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\vrmdbg.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wfvdmod.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\wtnsock.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\guard.tmp
1 file(s) copied.
deleting: C:\WINDOWS\system32\fpns0357e.dll
Successfully Deleted: C:\WINDOWS\system32\fpns0357e.dll
deleting: C:\WINDOWS\system32\fscfg.dll
Successfully Deleted: C:\WINDOWS\system32\fscfg.dll
deleting: C:\WINDOWS\system32\g804lidq180e.dll
Successfully Deleted: C:\WINDOWS\system32\g804lidq180e.dll
deleting: C:\WINDOWS\system32\gp0ql3d51.dll
Successfully Deleted: C:\WINDOWS\system32\gp0ql3d51.dll
deleting: C:\WINDOWS\system32\gpr8l39u1.dll
Successfully Deleted: C:\WINDOWS\system32\gpr8l39u1.dll
deleting: C:\WINDOWS\system32\hjzidr12.dll
Successfully Deleted: C:\WINDOWS\system32\hjzidr12.dll
deleting: C:\WINDOWS\system32\i8060idse8060.dll
Successfully Deleted: C:\WINDOWS\system32\i8060idse8060.dll
deleting: C:\WINDOWS\system32\iCshlpr.dll
Successfully Deleted: C:\WINDOWS\system32\iCshlpr.dll
deleting: C:\WINDOWS\system32\j4n2le5o1h.dll
Successfully Deleted: C:\WINDOWS\system32\j4n2le5o1h.dll
deleting: C:\WINDOWS\system32\jt4007hme.dll
Successfully Deleted: C:\WINDOWS\system32\jt4007hme.dll
deleting: C:\WINDOWS\system32\k2lq0c35ef.dll
Successfully Deleted: C:\WINDOWS\system32\k2lq0c35ef.dll
deleting: C:\WINDOWS\system32\lv2409fqe.dll
Successfully Deleted: C:\WINDOWS\system32\lv2409fqe.dll
deleting: C:\WINDOWS\system32\lvrs0997e.dll
Successfully Deleted: C:\WINDOWS\system32\lvrs0997e.dll
deleting: C:\WINDOWS\system32\m4ls0e37eh.dll
Successfully Deleted: C:\WINDOWS\system32\m4ls0e37eh.dll
deleting: C:\WINDOWS\system32\m4po0e73eh.dll
Successfully Deleted: C:\WINDOWS\system32\m4po0e73eh.dll
deleting: C:\WINDOWS\system32\m8ju0i19e8.dll
Successfully Deleted: C:\WINDOWS\system32\m8ju0i19e8.dll
deleting: C:\WINDOWS\system32\mbrating.dll
Successfully Deleted: C:\WINDOWS\system32\mbrating.dll
deleting: C:\WINDOWS\system32\mddtclog.dll
Successfully Deleted: C:\WINDOWS\system32\mddtclog.dll
deleting: C:\WINDOWS\system32\mesip32.dll
Successfully Deleted: C:\WINDOWS\system32\mesip32.dll
deleting: C:\WINDOWS\system32\mGg_hook.dll
Successfully Deleted: C:\WINDOWS\system32\mGg_hook.dll
deleting: C:\WINDOWS\system32\movcrt.dll
Successfully Deleted: C:\WINDOWS\system32\movcrt.dll
deleting: C:\WINDOWS\system32\mrxbse35.dll
Successfully Deleted: C:\WINDOWS\system32\mrxbse35.dll
deleting: C:\WINDOWS\system32\mvisam11.dll
Successfully Deleted: C:\WINDOWS\system32\mvisam11.dll
deleting: C:\WINDOWS\system32\mvj2l91o1.dll
Successfully Deleted: C:\WINDOWS\system32\mvj2l91o1.dll
deleting: C:\WINDOWS\system32\mxls31.dll
Successfully Deleted: C:\WINDOWS\system32\mxls31.dll
deleting: C:\WINDOWS\system32\mymusd.dll
Successfully Deleted: C:\WINDOWS\system32\mymusd.dll
deleting: C:\WINDOWS\system32\myxclu.dll
Successfully Deleted: C:\WINDOWS\system32\myxclu.dll
deleting: C:\WINDOWS\system32\n0p40a7qed.dll
Successfully Deleted: C:\WINDOWS\system32\n0p40a7qed.dll
deleting: C:\WINDOWS\system32\ndmsevt.dll
Successfully Deleted: C:\WINDOWS\system32\ndmsevt.dll
deleting: C:\WINDOWS\system32\nvmkcert.dll
Successfully Deleted: C:\WINDOWS\system32\nvmkcert.dll
deleting: C:\WINDOWS\system32\o2nslc571f.dll
Successfully Deleted: C:\WINDOWS\system32\o2nslc571f.dll
deleting: C:\WINDOWS\system32\o684lglq16qe.dll
Successfully Deleted: C:\WINDOWS\system32\o684lglq16qe.dll
deleting: C:\WINDOWS\system32\oxedlg.dll
Successfully Deleted: C:\WINDOWS\system32\oxedlg.dll
deleting: C:\WINDOWS\system32\pMpgraph.dll
Successfully Deleted: C:\WINDOWS\system32\pMpgraph.dll
deleting: C:\WINDOWS\system32\q268lcju1fo8.dll
Successfully Deleted: C:\WINDOWS\system32\q268lcju1fo8.dll
deleting: C:\WINDOWS\system32\r48slel71hq.dll
Successfully Deleted: C:\WINDOWS\system32\r48slel71hq.dll
deleting: C:\WINDOWS\system32\t48u0el9ehq.dll
Successfully Deleted: C:\WINDOWS\system32\t48u0el9ehq.dll
deleting: C:\WINDOWS\system32\t88ulil918q.dll
Successfully Deleted: C:\WINDOWS\system32\t88ulil918q.dll
deleting: C:\WINDOWS\system32\vrmdbg.dll
Successfully Deleted: C:\WINDOWS\system32\vrmdbg.dll
deleting: C:\WINDOWS\system32\wfvdmod.dll
Successfully Deleted: C:\WINDOWS\system32\wfvdmod.dll
deleting: C:\WINDOWS\system32\wtnsock.dll
Successfully Deleted: C:\WINDOWS\system32\wtnsock.dll
deleting: C:\WINDOWS\system32\guard.tmp
Successfully Deleted: C:\WINDOWS\system32\guard.tmp


Zipping up files for submission:
adding: fpns0357e.dll (164 bytes security) (deflated 5%)
adding: fscfg.dll (164 bytes security) (deflated 5%)
adding: g804lidq180e.dll (164 bytes security) (deflated 5%)
adding: gp0ql3d51.dll (164 bytes security) (deflated 5%)
adding: gpr8l39u1.dll (164 bytes security) (deflated 5%)
adding: hjzidr12.dll (164 bytes security) (deflated 4%)
adding: i8060idse8060.dll (164 bytes security) (deflated 5%)
adding: iCshlpr.dll (164 bytes security) (deflated 4%)
adding: j4n2le5o1h.dll (164 bytes security) (deflated 4%)
adding: jt4007hme.dll (164 bytes security) (deflated 4%)
adding: k2lq0c35ef.dll (164 bytes security) (deflated 5%)
adding: lv2409fqe.dll (164 bytes security) (deflated 5%)
adding: lvrs0997e.dll (164 bytes security) (deflated 4%)
adding: m4ls0e37eh.dll (164 bytes security) (deflated 5%)
adding: m4po0e73eh.dll (164 bytes security) (deflated 4%)
adding: m8ju0i19e8.dll (164 bytes security) (deflated 5%)
adding: mbrating.dll (164 bytes security) (deflated 5%)
adding: mddtclog.dll (164 bytes security) (deflated 5%)
adding: mesip32.dll (164 bytes security) (deflated 4%)
adding: mGg_hook.dll (164 bytes security) (deflated 5%)
adding: movcrt.dll (164 bytes security) (deflated 5%)
adding: mrxbse35.dll (164 bytes security) (deflated 5%)
adding: mvisam11.dll (164 bytes security) (deflated 4%)
adding: mvj2l91o1.dll (164 bytes security) (deflated 4%)
adding: mxls31.dll (164 bytes security) (deflated 4%)
adding: mymusd.dll (164 bytes security) (deflated 5%)
adding: myxclu.dll (164 bytes security) (deflated 5%)
adding: n0p40a7qed.dll (164 bytes security) (deflated 5%)
adding: ndmsevt.dll (164 bytes security) (deflated 5%)
adding: nvmkcert.dll (164 bytes security) (deflated 5%)
adding: o2nslc571f.dll (164 bytes security) (deflated 5%)
adding: o684lglq16qe.dll (164 bytes security) (deflated 4%)
adding: oxedlg.dll (164 bytes security) (deflated 5%)
adding: pMpgraph.dll (164 bytes security) (deflated 5%)
adding: q268lcju1fo8.dll (164 bytes security) (deflated 5%)
adding: r48slel71hq.dll (164 bytes security) (deflated 5%)
adding: t48u0el9ehq.dll (164 bytes security) (deflated 5%)
adding: t88ulil918q.dll (164 bytes security) (deflated 4%)
adding: vrmdbg.dll (164 bytes security) (deflated 4%)
adding: wfvdmod.dll (164 bytes security) (deflated 4%)
adding: wtnsock.dll (164 bytes security) (deflated 4%)
adding: guard.tmp (164 bytes security) (deflated 4%)
adding: clear.reg (164 bytes security) (deflated 37%)
adding: echo.reg (164 bytes security) (deflated 12%)
adding: direct.txt (164 bytes security) (stored 0%)
adding: lo2.txt (164 bytes security) (deflated 86%)
adding: readme.txt (164 bytes security) (deflated 49%)
adding: test.txt (164 bytes security) (deflated 81%)
adding: test2.txt (164 bytes security) (deflated 17%)
adding: test3.txt (164 bytes security) (deflated 17%)
adding: test5.txt (164 bytes security) (deflated 17%)
adding: xfind.txt (164 bytes security) (deflated 76%)
adding: backregs/9122E93A-BCF5-45C3-BE46-40B9DE6DDBA9.reg (164 bytes security) (deflated 70%)
adding: backregs/D3B79894-4A4C-44B0-B97D-3CCD06493BB0.reg (164 bytes security) (deflated 70%)
adding: backregs/shell.reg (164 bytes security) (deflated 73%)

Restoring Registry Permissions:


RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!


Revoking access for predefined group "Administrators"
Inherited ACE can not be revoked here!
Inherited ACE can not be revoked here!


Registry permissions set too:

RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (http://www.heysoft.de)
This program is Freeware, use it on your own risk!

Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(NI) ALLOW Full access NT AUTHORITY\SYSTEM
(IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER


Restoring Sedebugprivilege:

Granting SeDebugPrivilege to Administrators ... successful

deleting local copy: fpns0357e.dll
deleting local copy: fscfg.dll
deleting local copy: g804lidq180e.dll
deleting local copy: gp0ql3d51.dll
deleting local copy: gpr8l39u1.dll
deleting local copy: hjzidr12.dll
deleting local copy: i8060idse8060.dll
deleting local copy: iCshlpr.dll
deleting local copy: j4n2le5o1h.dll
deleting local copy: jt4007hme.dll
deleting local copy: k2lq0c35ef.dll
deleting local copy: lv2409fqe.dll
deleting local copy: lvrs0997e.dll
deleting local copy: m4ls0e37eh.dll
deleting local copy: m4po0e73eh.dll
deleting local copy: m8ju0i19e8.dll
deleting local copy: mbrating.dll
deleting local copy: mddtclog.dll
deleting local copy: mesip32.dll
deleting local copy: mGg_hook.dll
deleting local copy: movcrt.dll
deleting local copy: mrxbse35.dll
deleting local copy: mvisam11.dll
deleting local copy: mvj2l91o1.dll
deleting local copy: mxls31.dll
deleting local copy: mymusd.dll
deleting local copy: myxclu.dll
deleting local copy: n0p40a7qed.dll
deleting local copy: ndmsevt.dll
deleting local copy: nvmkcert.dll
deleting local copy: o2nslc571f.dll
deleting local copy: o684lglq16qe.dll
deleting local copy: oxedlg.dll
deleting local copy: pMpgraph.dll
deleting local copy: q268lcju1fo8.dll
deleting local copy: r48slel71hq.dll
deleting local copy: t48u0el9ehq.dll
deleting local copy: t88ulil918q.dll
deleting local copy: vrmdbg.dll
deleting local copy: wfvdmod.dll
deleting local copy: wtnsock.dll
deleting local copy: guard.tmp

The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\igfxcui]
@=""
"DLLName"="igfxsrvc.dll"
"Asynchronous"=dword:00000001
"Impersonate"=dword:00000001
"Unlock"="WinlogonUnlockEvent"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WB]
"Asynchronous"=dword:00000000
"DllName"="C:\\PROGRA~1\\WI559D~1\\fastload.dll"
"Startup"="StartSys"
"Logon"="StartWB"

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001


The following are the files found:
****************************************************************************
C:\WINDOWS\system32\fpns0357e.dll
C:\WINDOWS\system32\fscfg.dll
C:\WINDOWS\system32\g804lidq180e.dll
C:\WINDOWS\system32\gp0ql3d51.dll
C:\WINDOWS\system32\gpr8l39u1.dll
C:\WINDOWS\system32\hjzidr12.dll
C:\WINDOWS\system32\i8060idse8060.dll
C:\WINDOWS\system32\iCshlpr.dll
C:\WINDOWS\system32\j4n2le5o1h.dll
C:\WINDOWS\system32\jt4007hme.dll
C:\WINDOWS\system32\k2lq0c35ef.dll
C:\WINDOWS\system32\lv2409fqe.dll
C:\WINDOWS\system32\lvrs0997e.dll
C:\WINDOWS\system32\m4ls0e37eh.dll
C:\WINDOWS\system32\m4po0e73eh.dll
C:\WINDOWS\system32\m8ju0i19e8.dll
C:\WINDOWS\system32\mbrating.dll
C:\WINDOWS\system32\mddtclog.dll
C:\WINDOWS\system32\mesip32.dll
C:\WINDOWS\system32\mGg_hook.dll
C:\WINDOWS\system32\movcrt.dll
C:\WINDOWS\system32\mrxbse35.dll
C:\WINDOWS\system32\mvisam11.dll
C:\WINDOWS\system32\mvj2l91o1.dll
C:\WINDOWS\system32\mxls31.dll
C:\WINDOWS\system32\mymusd.dll
C:\WINDOWS\system32\myxclu.dll
C:\WINDOWS\system32\n0p40a7qed.dll
C:\WINDOWS\system32\ndmsevt.dll
C:\WINDOWS\system32\nvmkcert.dll
C:\WINDOWS\system32\o2nslc571f.dll
C:\WINDOWS\system32\o684lglq16qe.dll
C:\WINDOWS\system32\oxedlg.dll
C:\WINDOWS\system32\pMpgraph.dll
C:\WINDOWS\system32\q268lcju1fo8.dll
C:\WINDOWS\system32\r48slel71hq.dll
C:\WINDOWS\system32\t48u0el9ehq.dll
C:\WINDOWS\system32\t88ulil918q.dll
C:\WINDOWS\system32\vrmdbg.dll
C:\WINDOWS\system32\wfvdmod.dll
C:\WINDOWS\system32\wtnsock.dll
C:\WINDOWS\system32\guard.tmp

Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{9122E93A-BCF5-45C3-BE46-40B9DE6DDBA9}"=-
"{D3B79894-4A4C-44B0-B97D-3CCD06493BB0}"=-
[-HKEY_CLASSES_ROOT\CLSID\{9122E93A-BCF5-45C3-BE46-40B9DE6DDBA9}]
[-HKEY_CLASSES_ROOT\CLSID\{D3B79894-4A4C-44B0-B97D-3CCD06493BB0}]
REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"SV1"=""
****************************************************************************
Desktop.ini Contents:
****************************************************************************
****************************************************************************




Logfile of HijackThis v1.99.1
Scan saved at 2:18:23 PM, on 6/13/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WindowBlinds\wbload.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\CW4\cw4.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\rranrn.exe
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\notepad.exe
C:\Program Files\Crazy Browser\Crazy Browser.exe
C:\HJT\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.foxnews.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,userinit.exe
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\system32\rranrn.exe reg_run
O4 - HKLM\..\Run: [InetCntrl] C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: WordWeb.lnk = ?
O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
O8 - Extra context menu item: Add to Power IE &Block List... - C:\Program Files\Power IE\adblocking.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Broken Internet access because of LSP provider 'inetcntrl.dll' missing
O15 - Trusted Zone: http://www.westlaw.com
O16 - DPF: Arcsoft Web Uploader - http://hpphoto.com/d...dFileApplet.cab
O16 - DPF: cpcScanner - http://www.crucial.c.../cpcScanner.cab
O16 - DPF: DigiChat Applet - http://albany.digi-n...s/Client_IE.cab
O16 - DPF: ppctlcab - http://www.pestscan....er/ppctlcab.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {938527D1-CDB7-4147-998A-B20FCA5CC976} (Cdmcco Class) - http://cafeimg.hanma.../cab9/dmcc2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildt...tto/install.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsec...scan/axscan.cab
O16 - DPF: {E67F5856-E2F5-40FE-9CFF-6AEFC9EA0AAA} (EventLogScan Class) - http://www.eventlogs...ATLExplorer.CAB
O16 - DPF: {EC8C56B1-D027-4AB2-AF63-F845CCEE59B5} (DocumentAccessor Class) - https://www.bpm.lowe...loginHelper.cab
O16 - DPF: {F54C1137-5E34-4B95-95A5-BA56D4D8D743} (Secure Delivery) - http://www.gamespot....ownload/kdx.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\WI559D~1\fastload.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
  • 0

#4
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
Good job. :tazz:

That should make a difference.

Download LQ fix from here: http://users.pandora...atchy/LQfix.zip
Run HijackThis and put check marks next to the following entries:

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,userinit.exe

O4 - HKLM\..\Run: [KavSvc] C:\WINDOWS\system32\rranrn.exe reg_run

O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildt...tto/install.cab

O16 - DPF: {F54C1137-5E34-4B95-95A5-BA56D4D8D743} (Secure Delivery) - http://www.gamespot....ownload/kdx.cab
O18 - Filter: text/html - {950238FB-C706-4791-8674-4D429F85897E} - (no file)

Close all Open Windows and click "fix checked"
Boot into Safe Mode by rebooting your computer and tapping f8 during the boot process. Select Safe Mode when it prompts you.
Unzip the file, and run LQFix.bat
Next, Open up My Computer and delete the following files:

C:\WINDOWS\system32\rranrn.exe

Reboot and post a fresh HijackThis log

And can you tell me what this is?
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"

Regards,
  • 0

#5
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Okay, I ran the fix in safe mode, deleted rranrn.exe (what is this?) When I rebooted, Microsoft's antispyware detected that the rranrn.exe was trying to change the registry to add itself to startup. It offered to block it, so I did. Does this mean it is still lingering in the background?

CW4 is Chat Watch 4 by Zemericks Software. I run it with my teenage kids' knowledge so they keep their IM communications within bounds. I wanted them to realize that IMs and emails are really not secure communications (if I can stumble upon AIM logs on my computer full of bad language, sex banter, and [bleep] links, etc, the same traces can also be found on the computers of everyone they chat with, and in the future, on school and company 'nets.)

Here's the hijackthis log! Hope it's clean now! Also, to let you know, while I was waiting for your first reply, I downloaded the recommended hosts file and that seemed to have stopped the popups for the time being. But the internet was really slow and web pages taking forever to load, so this cleanup should help the system run faster! I will let you know and -- thanks. :tazz:


Logfile of HijackThis v1.99.1
Scan saved at 1:04:49 AM, on 6/14/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\WindowBlinds\wbload.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\CW4\cw4.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ddct.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WordWeb\wweb32.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\HJT\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.foxnews.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [InetCntrl] C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
O4 - HKLM\..\Run: [USSShReg] C:\PROGRA~1\ULEADP~1.2\SSaver\Ussshreg.exe /r
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Calendarscope] "C:\Program Files\Calendarscope\cs.exe"
O4 - Startup: AdDestroyer.lnk.disabled
O4 - Startup: WordWeb.lnk = ?
O4 - Global Startup: Kodak EasyShare software.lnk.disabled
O4 - Global Startup: Kodak software updater.lnk.disabled
O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
O8 - Extra context menu item: Add to Power IE &Block List... - C:\Program Files\Power IE\adblocking.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Broken Internet access because of LSP provider 'inetcntrl.dll' missing
O15 - Trusted Zone: http://www.westlaw.com
O16 - DPF: Arcsoft Web Uploader - http://hpphoto.com/d...dFileApplet.cab
O16 - DPF: cpcScanner - http://www.crucial.c.../cpcScanner.cab
O16 - DPF: DigiChat Applet - http://albany.digi-n...s/Client_IE.cab
O16 - DPF: ppctlcab - http://www.pestscan....er/ppctlcab.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {938527D1-CDB7-4147-998A-B20FCA5CC976} (Cdmcco Class) - http://cafeimg.hanma.../cab9/dmcc2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildt...tto/install.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsec...scan/axscan.cab
O16 - DPF: {E67F5856-E2F5-40FE-9CFF-6AEFC9EA0AAA} (EventLogScan Class) - http://www.eventlogs...ATLExplorer.CAB
O16 - DPF: {EC8C56B1-D027-4AB2-AF63-F845CCEE59B5} (DocumentAccessor Class) - https://www.bpm.lowe...loginHelper.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\WI559D~1\fastload.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe
  • 0

#6
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
rranrn.exe was the Qoologic trojan.

In fact. I'd like you to test something if you like.
Your log is clean and te file that is hiding in your system shouldn't bother you anymore, but we have been thinking about a way to find it.

Download and install: http://www.geekstogo...=download&id=50

Use it as described here:
http://home.planet.n...on.html#BOTHLOG

Post the log please.

Regards,
  • 0

#7
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Okay, here is the BOTH log:

Logfile of HijackThis v1.99.1
Scan saved at 7:44:30 AM, on 6/14/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\WindowBlinds\wbload.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\CW4\cw4.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ddct.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WordWeb\wweb32.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\Program Files\Crazy Browser\Crazy Browser.exe
C:\WINDOWS\system32\cmd.exe
C:\HJT\hijackthis.exe
C:\WINDOWS\system32\ping.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.foxnews.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [InetCntrl] C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
O4 - HKLM\..\Run: [USSShReg] C:\PROGRA~1\ULEADP~1.2\SSaver\Ussshreg.exe /r
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Calendarscope] "C:\Program Files\Calendarscope\cs.exe"
O4 - Startup: AdDestroyer.lnk.disabled
O4 - Startup: WordWeb.lnk = ?
O4 - Global Startup: ddct.exe
O4 - Global Startup: Kodak EasyShare software.lnk.disabled
O4 - Global Startup: Kodak software updater.lnk.disabled
O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
O8 - Extra context menu item: Add to Power IE &Block List... - C:\Program Files\Power IE\adblocking.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O10 - Unknown file in Winsock LSP: inetcntrl.dll
O15 - Trusted Zone: http://www.westlaw.com
O16 - DPF: Arcsoft Web Uploader - http://hpphoto.com/d...dFileApplet.cab
O16 - DPF: cpcScanner - http://www.crucial.c.../cpcScanner.cab
O16 - DPF: DigiChat Applet - http://albany.digi-n...s/Client_IE.cab
O16 - DPF: ppctlcab - http://www.pestscan....er/ppctlcab.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {938527D1-CDB7-4147-998A-B20FCA5CC976} (Cdmcco Class) - http://cafeimg.hanma.../cab9/dmcc2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildt...tto/install.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsec...scan/axscan.cab
O16 - DPF: {E67F5856-E2F5-40FE-9CFF-6AEFC9EA0AAA} (EventLogScan Class) - http://www.eventlogs...ATLExplorer.CAB
O16 - DPF: {EC8C56B1-D027-4AB2-AF63-F845CCEE59B5} (DocumentAccessor Class) - https://www.bpm.lowe...loginHelper.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\WI559D~1\fastload.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe


Also. one of the programs had detected the qoologic trojan several times, but I guess couldn't get rid of it. Thanks!
  • 0

#8
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
Was there nothing else under the HijackThis log in the Both.log ? :tazz:

Regards,
  • 0

#9
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Pieter,

Okay, I see I did not wait long enough for the correct scan to finish. Hope this includes everything! Here is a new copy of the both.txt log:


Logfile of HijackThis v1.99.1
Scan saved at 9:33:09 AM, on 6/14/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\WindowBlinds\wbload.exe
C:\Program Files\ewido\security suite\ewidoctrl.exe
C:\WINDOWS\system32\drivers\KodakCCS.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\CW4\cw4.exe
C:\WINDOWS\System32\hkcmd.exe
C:\Program Files\Microsoft AntiSpyware\gcasServ.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\ddct.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WordWeb\wweb32.exe
C:\Program Files\Microsoft AntiSpyware\gcasDtServ.exe
C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
C:\Program Files\Crazy Browser\Crazy Browser.exe
C:\WINDOWS\system32\cmd.exe
C:\HJT\HJT_and_more_1\HJT and more 1\HijackThis.exe
C:\WINDOWS\system32\ping.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.dell.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.foxnews.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O4 - HKLM\..\Run: [CW] "C:\Program Files\CW4\cw4.exe"
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKLM\..\Run: [IgfxTray] C:\WINDOWS\System32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\WINDOWS\System32\hkcmd.exe
O4 - HKLM\..\Run: [ccRegVfy] "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe"
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [gcasServ] "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe"
O4 - HKLM\..\Run: [InetCntrl] C:\WINDOWS\system32\InetCntrl\InetCntrl.exe
O4 - HKLM\..\Run: [USSShReg] C:\PROGRA~1\ULEADP~1.2\SSaver\Ussshreg.exe /r
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Calendarscope] "C:\Program Files\Calendarscope\cs.exe"
O4 - Startup: AdDestroyer.lnk.disabled
O4 - Startup: WordWeb.lnk = ?
O4 - Global Startup: ddct.exe
O4 - Global Startup: Kodak EasyShare software.lnk.disabled
O4 - Global Startup: Kodak software updater.lnk.disabled
O8 - Extra context menu item: &WordWeb... - res://C:\WINDOWS\wweb32.dll/lookup.html
O8 - Extra context menu item: Add to Power IE &Block List... - C:\Program Files\Power IE\adblocking.htm
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_02\bin\npjpi150_02.dll
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: MoneySide - {E023F504-0C5A-4750-A1E7-A9046DEA8A21} - C:\Program Files\Microsoft Money\System\mnyside.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Broken Internet access because of LSP provider 'inetcntrl.dll' missing
O15 - Trusted Zone: http://www.westlaw.com
O16 - DPF: Arcsoft Web Uploader - http://hpphoto.com/d...dFileApplet.cab
O16 - DPF: cpcScanner - http://www.crucial.c.../cpcScanner.cab
O16 - DPF: DigiChat Applet - http://albany.digi-n...s/Client_IE.cab
O16 - DPF: ppctlcab - http://www.pestscan....er/ppctlcab.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft....467&clcid=0x409
O16 - DPF: {62475759-9E84-458E-A1AB-5D2C442ADFDE} - http://a1540.g.akama...meInstaller.exe
O16 - DPF: {77E32299-629F-43C6-AB77-6A1E6D7663F6} - http://www.nick.com/.../GrooveAX27.cab
O16 - DPF: {938527D1-CDB7-4147-998A-B20FCA5CC976} (Cdmcco Class) - http://cafeimg.hanma.../cab9/dmcc2.cab
O16 - DPF: {9A9307A0-7DA4-4DAF-B042-5009F29E09E1} (ActiveScan Installer Class) - http://www.pandasoft.../as5/asinst.cab
O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} (ASquaredScanForm Element) - http://www.windowsec...scan/axscan.cab
O16 - DPF: {E67F5856-E2F5-40FE-9CFF-6AEFC9EA0AAA} (EventLogScan Class) - http://www.eventlogs...ATLExplorer.CAB
O16 - DPF: {EC8C56B1-D027-4AB2-AF63-F845CCEE59B5} (DocumentAccessor Class) - https://www.bpm.lowe...loginHelper.cab
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: WB - C:\PROGRA~1\WI559D~1\fastload.dll
O23 - Service: ewido security suite control - ewido networks - C:\Program Files\ewido\security suite\ewidoctrl.exe
O23 - Service: Kodak Camera Connection Software (KodakCCS) - Eastman Kodak Company - C:\WINDOWS\system32\drivers\KodakCCS.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\System32\HPZipm12.exe

doesn't exist HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iexplorer.exe
doesn't exist HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
doesn't exist HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
doesn't exist HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
doesn't exist HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe
-----------------------
-----------------------
REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx]


[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers]

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\ewido]
@="{57BD36D7-CE32-4600-9B1C-1A0C47EFC02E}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\ggkqgqym]
@="{8095ef30-e237-4dde-98aa-a4d2f165a75a}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Offline Files]
@="{750fdf0e-2a26-11d1-a3ea-080036587f03}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With]
@="{09799AFB-AD67-11d1-ABCD-00C04FC30936}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With EncryptionMenu]
@="{A470F8CF-A1E8-4f65-8335-227475AA5C46}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\StuffIt Compress Menu]
@="{3FBFD0B0-EB46-4797-9101-615610E87DA6}"

[HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}]
@="Start Menu Pin"


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler]
"{438755C2-A8BA-11D1-B96B-00A0C90312E1}"="Browseui preloader"
"{8C7461EF-2B13-11d2-BE35-3078302C2030}"="Component Categories cache daemon"


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"CW"="\"C:\\Program Files\\CW4\\cw4.exe\""
"UserFaultCheck"="%systemroot%\\system32\\dumprep 0 -u"
"IgfxTray"="C:\\WINDOWS\\System32\\igfxtray.exe"
"HotKeysCmds"="C:\\WINDOWS\\System32\\hkcmd.exe"
"ccRegVfy"="\"C:\\Program Files\\Common Files\\Symantec Shared\\ccRegVfy.exe\""
"ccApp"="\"C:\\Program Files\\Common Files\\Symantec Shared\\ccApp.exe\""
"gcasServ"="\"C:\\Program Files\\Microsoft AntiSpyware\\gcasServ.exe\""
"InetCntrl"="C:\\WINDOWS\\system32\\InetCntrl\\InetCntrl.exe"
"USSShReg"="C:\\PROGRA~1\\ULEADP~1.2\\SSaver\\Ussshreg.exe /r"
"QuickTime Task"="\"C:\\Program Files\\QuickTime\\qttask.exe\" -atboottime"


[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\\WINDOWS\\system32\\ctfmon.exe"
"Calendarscope"="\"C:\\Program Files\\Calendarscope\\cs.exe\""


[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Runonce]


[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Runonce]

Scheduled Tasks Folder Contents
*
C:\WINDOWS\Tasks\DESKTOP.INI
C:\WINDOWS\Tasks\SA.DAT
C:\WINDOWS\Tasks\Spybot - Search & Destroy - Scheduled Task.job
C:\WINDOWS\Tasks\Symantec NetDetect.job
  • 0

#10
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
Excellent. We will follow that trail like a hound. :tazz:

First we'll remove this handle. Copy the part in bold below into notepad and save it as notneeded.reg

REGEDIT4

[-HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\ggkqgqym]

Doubleclick it and confirm you want to merge it with the registry.
  • Download the Registry Search Tool.
  • Unzip the contents of RegSrch.zip to a convenient location.
  • Double-click on RegSrch.vbs.
  • If you have an anti-virus installed it might prompt you about a running script. Please ignore this warning and allow the script to run.
  • In the "Enter search string (case insensitive) and click OK..." box paste this string:
    • {8095ef30-e237-4dde-98aa-a4d2f165a75a}
  • Click "OK" to search the registry for that string.
  • Wait for a few minutes while it completes the search.
  • Click "OK" to open the results in WordPad.
  • Copy and paste the entire results into your next post.
Regards,
  • 0

Advertisements


#11
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
[baying hounds] LOL

Just to let you know, regsrch.vbs found it in 660 seconds (I was just giving up).


----------------------------------------------------
REGEDIT4
; RegSrch.vbs © Bill James

; Registry search results for string "{8095ef30-e237-4dde-98aa-a4d2f165a75a}" 6/14/2005 10:25:29 AM

; NOTE: This file will be deleted when you close WordPad.
; You must manually save this file to a new location if you want to refer to it again later.
; (If you save the file with a .reg extension, you can use it to restore any Registry changes you make to these values.)


[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}]

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}\InProcServer32]

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}\ProgId]

------------------------------------------------------------------------

[/baying]
  • 0

#12
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
[sniffing mode]

Click Start > Run > copy&paste regedit /e c:\gonetothedogs.txt "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}" >OK

That will create the file c:\gonetothedogs.txt
Post the content of that file please

[/sniffing mode]

Regards,
  • 0

#13
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Hanging with you on the trail!

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}]
@="rrjirixo.class"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}\InProcServer32]
@="C:\\WINDOWS\\system32\\ccqdc.dll"
"ThreadingModel"="Apartment"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}\ProgId]
@="rrjirixo.class"
  • 0

#14
Metallica

Metallica

    Spyware Veteran

  • GeekU Moderator
  • 31,675 posts
Excellent. Can you do a Find files for rrjirixo.class

And see if C:\WINDOWS\system32\ccqdc.dll is still present

Copy the part in bold below into notepad and save it as trackedyou.reg

REGEDIT4

[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8095ef30-e237-4dde-98aa-a4d2f165a75a}]


Doubleclick the file and confirm you want to merge it with the registry.

Then use regsrch.vbs to look for ccqdc.dll
Although I think we are at the end of the trail.

Regards,
  • 0

#15
youreditor

youreditor

    Member

  • Topic Starter
  • Member
  • PipPip
  • 13 posts
Okay,

1. No files were found for rrjirixo.class

2. No file in C: or in Windows or in SYSTEM32 named ccqdc.dll

3. Did the trackedyou.reg change to the registry.

4. Regsearch did find this:

REGEDIT4
; RegSrch.vbs © Bill James

; Registry search results for string "ccqdc.dll" 6/14/2005 2:23:52 PM

; NOTE: This file will be deleted when you close WordPad.
; You must manually save this file to a new location if you want to refer to it again later.
; (If you save the file with a .reg extension, you can use it to restore any Registry changes you make to these values.)


[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{78bcbb75-3be7-4818-8f0a-27688e347dfd}\InProcServer32]
@="C:\\WINDOWS\\system32\\ccqdc.dll"

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{85248fb3-f340-49d9-8714-04134119b9b4}\InProcServer32]
@="C:\\WINDOWS\\system32\\ccqdc.dll"



Thanks!
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP