Detected SPYware! System error #384

Discussion in 'adware, spyware & hijack cleaning' started by AJ777, Apr 5, 2004.

Thread Status:
Not open for further replies.
  1. AJ777

    AJ777 Guest

    PLEASE help me get rid of this spyware. I have spent hours but to no avail :( ANY help anyone can give, i would be so appreciative!
    thankyou!!


    Logfile of HijackThis v1.97.7
    Scan saved at 12:09:27 PM, on 5/04/2004
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

    Running processes:
    C:\WINXP\System32\smss.exe
    C:\WINXP\system32\winlogon.exe
    C:\WINXP\system32\services.exe
    C:\WINXP\system32\lsass.exe
    C:\WINXP\system32\svchost.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\system32\spoolsv.exe
    C:\WINXP\explorer.exe
    C:\Program Files\Winamp\Winampa.exe
    C:\Program Files\SOFTWIN\AVX Professional\avxpop3.exe
    C:\WINXP\msreg.exe
    C:\WINXP\System32\fks.exe
    C:\WINXP\reg33.exe
    C:\WINXP\System32\w32sup.exe
    C:\WINXP\System32\load32.exe
    C:\WINXP\System32\ctfmon.exe
    C:\WINXP\AddCLS.exe
    C:\Program Files\SOFTWIN\AVX Professional\amonnt.exe
    C:\Program Files\SOFTWIN\AVX Live\avxlive.exe
    C:\Program Files\GETRIGHT\getright.exe
    C:\Program Files\SOFTWIN\AVX Professional\xsinknt.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINXP\System32\svchost.exe
    C:\Documents and Settings\Adrian J Carter.SMOOTHMOTION\Desktop\HijackThis.exe

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKCU\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,HomeOldSP = http://axdqtg.t.muxa.cc/h.php?aid=551 (obfuscated)
    R1 - HKLM\Software\Microsoft\Internet Explorer\Search,(Default) = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated)
    R3 - URLSearchHook: (no name) - - (no file)
    F0 - system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe
    F1 - win.ini: run=C:\WINXP\dllreg.exe
    F2 - REG:system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe
    O1 - Hosts: 213.159.117.235 auto.search.msn.com
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINXP\System32\msdxm.ocx
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
    O4 - HKLM\..\Run: [AVX POP3 Proxy] C:\Program Files\SOFTWIN\AVX Professional\avxpop3.exe
    O4 - HKLM\..\Run: [APIMon] C:\WINXP\msreg.exe
    O4 - HKLM\..\Run: [FK] C:\WINXP\System32\fks.exe
    O4 - HKLM\..\Run: [NeroCheck] C:\WINXP\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [Microsoft] C:\fyle.exe
    O4 - HKLM\..\Run: [WinAuth] C:\WINXP\winlogon.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [Reg32] C:\WINXP\reg33.exe
    O4 - HKLM\..\Run: [Online Secuirity] C:\WINXP\svchost.exe
    O4 - HKLM\..\Run: [w32sup] C:\WINXP\System32\w32sup.exe
    O4 - HKLM\..\Run: [load32] C:\WINXP\System32\load32.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINXP\System32\ctfmon.exe
    O4 - Startup: rundllw.exe
    O4 - Global Startup: AVX Shield.lnk = C:\Program Files\SOFTWIN\AVX Professional\amonnt.exe
    O4 - Global Startup: AVX Scheduler.lnk = C:\Program Files\SOFTWIN\AVX Professional\avxsch.exe
    O4 - Global Startup: AVX LIVE!.lnk = C:\Program Files\SOFTWIN\AVX Live\avxlive.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: GetRight - Tray Icon.lnk = C:\Program Files\GETRIGHT\getright.exe
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: Backward &Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Si&milar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
    O9 - Extra button: ICQ Lite (HKLM)
    O9 - Extra 'Tools' menuitem: ICQ Lite (HKLM)
    O9 - Extra button: Related (HKLM)
    O9 - Extra 'Tools' menuitem: Show &Related Links (HKLM)
    O13 - DefaultPrefix: http://%65%68%74%74%70%2E%63%63/?
    O13 - WWW Prefix: http://%65%68%74%74%70%2E%63%63/?
    O16 - DPF: {0BE35204-8F91-11CE-9DE3-00AA004BB851} (CLSID_StdPict) - http://wwwau.kodak.com/AU/en/consumer/printOnline/OPW_25900.cab
    O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} - http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004033001/housecall.antivirus.com/housecall/xscan53.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
     
  2. dvk01

    dvk01 Global Moderator

    Joined:
    Oct 9, 2003
    Posts:
    3,131
    Location:
    Loughton, Essex. UK
    First download CWshredder from http://www.thespykiller.co.uk then Run it
    Close all browser windows, click on the cwshredder.exe then click "FIX" (Not "Scan only") and let it do it's thing.

    Now as CWS installs via the byte verifier exploit in M$ JavaVM, just surfing a page with an infected applet can install it with no user participation. So once you’ve run the above, it is vital that you go here, click Scan for updates in the main frame, and download and install all CRITICAL updates recommended.

    then reboot &

    Download and unzip or install these programs/applications if you haven't already got them. If you have them, then make sure they are updated and configured as described

    Spybot - Search & Destroy from http://security.kolla.de
    AdAware 6 from http://www.lavasoft.de/support/download


    Run Sybot S&D

    After installing, first press Online, press search for updates, then tick the updates it finds, then press download updates. Beside the download button is a little down pointed arrow, select one of the servers listed. If it doesn't work or you get an error message then try a different server

    Next, close all Internet Explorer and OE windows, press 'Check for Problems', and have SpyBot remove all it finds that is marked in RED.

    then reboot &

    Run ADAWARE

    Before you scan with AdAware, check for updates of the reference file by using the "webupdate".
    the current ref file should read at least 01R279 31.03.2004 or a higher number/later date

    Then ........

    Make sure the following settings are made and on -------"ON=GREEN"
    From main window :Click "Start" then " Activate in-depth scan"

    then......

    click "Use custom scanning options>Customize" and have these options on: "Scan within archives" ,"Scan active processes","Scan registry", "Deep scan registry" ,"Scan my IE Favorites for banned URL" and "Scan my host-files"

    then.........

    go to settings(the gear on top of AdAware)>Tweak>Scanning engine and tick "Unload recognized processes during scanning" ...........then........"Cleaning engine" and "Let windows remove files in use at next reboot"

    then...... click "proceed" to save your settings.

    Now to scan it´s just to click the "Scan" button.

    When scan is finished, mark everything for removal and get rid of it. (Right-click the window and choose"select all" from the drop down menu) then press next and then say yes to the prompt, do you want to remove all these entries.

    reboot again

    then post a new hijackthis log to check what is left
     
  3. AJ777

    AJ777 Guest

    Hin there, i did everything you said, here is my log!
    Logfile of HijackThis v1.97.7
    Scan saved at 4:25:07 PM, on 5/04/2004
    Platform: Windows XP (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000)

    Running processes:
    C:\WINXP\System32\smss.exe
    C:\WINXP\system32\winlogon.exe
    C:\WINXP\system32\services.exe
    C:\WINXP\system32\lsass.exe
    C:\WINXP\system32\svchost.exe
    C:\WINXP\System32\svchost.exe
    C:\WINXP\Explorer.EXE
    C:\WINXP\system32\spoolsv.exe
    C:\WINXP\dllreg.exe
    C:\Program Files\Winamp\Winampa.exe
    C:\Program Files\SOFTWIN\AVX Professional\avxpop3.exe
    C:\WINXP\msreg.exe
    C:\WINXP\System32\fks.exe
    C:\WINXP\System32\w32sup.exe
    C:\WINXP\System32\ctfmon.exe
    C:\Program Files\SOFTWIN\AVX Professional\amonnt.exe
    C:\Program Files\SOFTWIN\AVX Live\avxlive.exe
    C:\Program Files\GETRIGHT\getright.exe
    C:\Program Files\SOFTWIN\AVX Professional\xsinknt.exe
    C:\Program Files\Common Files\Microsoft Shared\VS7Debug\mdm.exe
    C:\WINXP\System32\svchost.exe
    C:\Documents and Settings\Adrian J Carter.SMOOTHMOTION\Desktop\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R3 - URLSearchHook: (no name) - - (no file)
    F0 - system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe
    F1 - win.ini: run=C:\WINXP\dllreg.exe
    F2 - REG:system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINXP\System32\msdxm.ocx
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [WinampAgent] "C:\Program Files\Winamp\Winampa.exe"
    O4 - HKLM\..\Run: [AVX POP3 Proxy] C:\Program Files\SOFTWIN\AVX Professional\avxpop3.exe
    O4 - HKLM\..\Run: [APIMon] C:\WINXP\msreg.exe
    O4 - HKLM\..\Run: [FK] C:\WINXP\System32\fks.exe
    O4 - HKLM\..\Run: [NeroCheck] C:\WINXP\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [Microsoft] C:\fyle.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [w32sup] C:\WINXP\System32\w32sup.exe
    O4 - HKLM\..\Run: [load32] C:\WINXP\System32\load32.exe
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINXP\System32\ctfmon.exe
    O4 - Startup: rundllw.exe
    O4 - Global Startup: AVX Shield.lnk = C:\Program Files\SOFTWIN\AVX Professional\amonnt.exe
    O4 - Global Startup: AVX Scheduler.lnk = C:\Program Files\SOFTWIN\AVX Professional\avxsch.exe
    O4 - Global Startup: AVX LIVE!.lnk = C:\Program Files\SOFTWIN\AVX Live\avxlive.exe
    O4 - Global Startup: Adobe Gamma Loader.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
    O4 - Global Startup: GetRight - Tray Icon.lnk = C:\Program Files\GETRIGHT\getright.exe
    O8 - Extra context menu item: &Google Search - res://c:\program files\google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: Backward &Links - res://c:\program files\google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cac&hed Snapshot of Page - res://c:\program files\google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Si&milar Pages - res://c:\program files\google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate into English - res://c:\program files\google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra 'Tools' menuitem: Sun Java Console (HKLM)
    O9 - Extra button: ICQ Lite (HKLM)
    O9 - Extra 'Tools' menuitem: ICQ Lite (HKLM)
    O16 - DPF: {0BE35204-8F91-11CE-9DE3-00AA004BB851} (CLSID_StdPict) - http://wwwau.kodak.com/AU/en/consumer/printOnline/OPW_25900.cab
    O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} - http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - http://a840.g.akamai.net/7/840/537/2004033001/housecall.antivirus.com/housecall/xscan53.cab
    O16 - DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} (Update Class) - http://v4.windowsupdate.microsoft.com/CAB/x86/unicode/iuctl.CAB?38082.0413541667
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab



    thanks for your help dvk, what is my next move?
     
  4. dvk01

    dvk01 Global Moderator

    Joined:
    Oct 9, 2003
    Posts:
    3,131
    Location:
    Loughton, Essex. UK
    first we have some new baddies here, some that I haven't seen before, by these names anyway, so please copy these files and zip them and send to me at the email address listed on the spykiller site in my signature as some of them should have been cured by adaware/spybot so are probably new versions
    C:\WINXP\dllreg.exe
    C:\WINXP\msreg.exe
    C:\WINXP\System32\fks.exe
    C:\WINXP\System32\w32sup.exe
    C:\WINXP\System32\vxdmgr32.exe
    C:\WINXP\System32\load32.exe
    C:\fyle.exe
    C:\WINXP\msreg.exe
    C:\WINXP\System32\fks.exe
    search for rundllw.exe and add that one as well

    Run hijackthis, tick these entries listed below and ONLY these entries, double check to make sure, then make sure all browser & email windows are closed and press fix checked

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = C:\WINXP\secure.html
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = C:\WINXP\secure.html
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\WINXP\secure.html
    R3 - URLSearchHook: (no name) - - (no file)
    F0 - system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe
    F1 - win.ini: run=C:\WINXP\dllreg.exe
    F2 - REG:system.ini: Shell=explorer.exe C:\WINXP\System32\vxdmgr32.exe

    O4 - HKLM\..\Run: [APIMon] C:\WINXP\msreg.exe
    O4 - HKLM\..\Run: [FK] C:\WINXP\System32\fks.exe
    O4 - HKLM\..\Run: [Microsoft] C:\fyle.exe
    O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
    O4 - HKLM\..\Run: [w32sup] C:\WINXP\System32\w32sup.exe
    O4 - HKLM\..\Run: [load32] C:\WINXP\System32\load32.exe
    O4 - Startup: rundllw.exe

    Reboot into safe mode by following instructions here: http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2001052409420406
    then as some of the files or folders you need to delete may be hidden do this:
    Open Windows Explorer & Go to Tools > Folder Options. Click on the View tab and make sure that "Show hidden files and folders" is checked. Also uncheck "Hide protected operating system files" and untick "hide extensions for known file types" . Now click "Apply to all folders"
    Click "Apply" then "OK"

    Delete these files
    C:\WINXP\dllreg.exe
    C:\WINXP\msreg.exe
    C:\WINXP\System32\fks.exe
    C:\WINXP\System32\w32sup.exe
    C:\WINXP\System32\load32.exe
    C:\WINXP\System32\vxdmgr32.exe
    C:\WINXP\System32\fks.exe
    C:\WINXP\msreg.exe
    C:\fyle.exe
    search for & delete rundllw.exe

    reboot & post new log please
     
  5. dvk01

    dvk01 Global Moderator

    Joined:
    Oct 9, 2003
    Posts:
    3,131
    Location:
    Loughton, Essex. UK
    also please do this a several of the entries are known viruses that any good amtivirus should have found

    Run an online antivirus check from at least one and preferably 2 of the following sites
    http://security.symantec.com/default.asp?
    http://housecall.trendmicro.com/
    http://www.pandasoftware.com/activescan/
    http://www.ravantivirus.com/scan/
    http://www3.ca.com/virusinfo/
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.