CWS has got to be one of the most cunning and malicious
of all trojans in my view,Heres some examples of the
levels they go to and i wanted to add that even hijack
this cannot touch some CWS trojans in some cases.
Like this variant
CWS.Realyellowpage -
Log reference: (not visible in HijackThis log)
Symptoms: IE pages changed to real-yellow-page.com,
drxcount.biz, list2004.com or linklist.cc, hijack
inexplicably returning on reboot with no file seemingly
responsible
Manual removal difficulty: Battle axe or chainsaw
recommended
(not visible in HijackThis)
This variant is a nightmare. If you come across an
infected machine that keeps changing back to the
aforementioned sites over and over again for no visible
reason, you've probably seen this one. It's like whoever
is reponsible for this hired some blackhat coder and told
him to make the most complex, invisible and devious
hijacker he could think of. And he did.
The file is randomly named, and normally hooks into the
IE process, loading itself as a module into it. And then
it hides the host process from the process list. Yes, you
read that right, the process hosting the dll disappears
from the task list and most process viewers/managers.
CWS.Msspi -
Symptoms: Popups with 'enhanced results' when doing
searches on Google, Yahoo and Altavista
Cleverness: 9/10
Manual removal difficulty: Impossible, I kid you not
Users started reporting that when they went to Google,
Yahoo or Altavista to search for something, popups
appeared that (most of the time) advertised
bogus 'enhanced results'. This was the one and only
symptom.
After looking over the log, it was quickly concluded the
msspi.dll file was to blame. One expert took the file
apart and found several key URLs that were monitored, and
when he changed them to bogus URLs the popups were gone.
However, the file hooked into the Winsock LSP chain,
which lies very deep into the bowels of Windows and is
one of the hardest parts of Windows to manipulate. Only a
very small selection of spyware used this method of
infection, and incorrect removal left a computer with a
broken Internet connection that could not be fixed even
by reinstalling Windows.
Luckily there were one tool that could fix a broken
Internet connection due to this problem. LSPFix was the
one used most since it allowed direct editing of the LSP
chain.
http://www.cexx.org/lspfix.zip
I could go on forever naming the various variants and the
effects but this isnt helping you remove it so instead
will list all the known entries that will show in hijack
this logs that are related to cool web search,advise
using the fix these button in safe mode for any you have
on yours(Note this is gonna be a long list so make a
drink and prepare for battle
O19 - User stylesheet: c:\windows\my.css
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page=
http://yourbookmarks.ws/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,
(Default)=
http://www.searchxp.com/search.php?qq=%s
O1 - Hosts: 1123694712 auto.search.msn.com
O4 - HKLM\..\Run: [sysPnP] C:\WINNT\System32\bootconf.exe
O19 - User stylesheet: C:\WINNT\default.css
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://www.coolwwwsearch.com/z/b/x1.cgi?100 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,SearchURL =
http://www.jetseeker.com/ie/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.coolwwwsearch.com/z/c/x1.cgi?100 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://www.coolwwwsearch.com/z/a/x1.cgi?100 (obfuscated)
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.searchv.com/
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,
(Default) =
http://www.jetseeker.com/ffeed.php?term=%s
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local
Page =
http://search.xrenoder.com
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page_bak =
http://search.xrenoder.com
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://www.coolwwwsearch.com/z/b/x1.cgi?656387
(obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.allhyperlinks.com/
redir?lang={S...201058341631385
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://www.coolwwwsearch.com/z/a/ x1.cgi?656387
(obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://www.coolwwwsearch.com/z/b/ x1.cgi?656387
(obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.allhyperlinks.com/ redir?lang=
{S...201058341631385
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://stopxxxpics.com
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://www.allhyperlinks.com/ redir?lang=
{S...201058341631385
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://www.allhyperlinks.com/ redir?lang=
{S...201058341631385
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.allhyperlinks.com/ redir?lang=
{S...201058341631385
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main\,HomeOldSP =
http://www.coolwwwsearch.com/z/a/ x1.cgi?656387
(obfuscated)
O1 - Hosts: 1123694712 auto.search.msn.com
O4 - HKLM\..\Run: [sysPnP] C:\WINNT\System32\bootconf.exe
O15 - Trusted Zone: *.coolwwwsearch.com
O15 - Trusted Zone: *.msn.com
O19 - User stylesheet: C:\WINDOWS\Web\oslogo.bmp
O10 - Unknown file in Winsock LSP: c:\windows\system32
\msspi.dll
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://vrape.hardloved.com/ top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet Explorer,Search
Page = http:// vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Bar = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Page = http://
vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL = http://
vrape.hardloved.com/top/search.php?id=2&s=
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch = http://
vrape.hardloved.com/top/search.php?id=2&s=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local
Page = http:// vrape.hardloved.com/top/search.php?id=2&s=
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local
Page = http:// vrape.hardloved.com/top/search.php?id=2&s=
O1 - Hosts: 65.77.83.222 thehun.com
O1 - Hosts: 65.77.83.222 thehun.net
O1 - Hosts: 65.77.83.222 madthumbs.com
O1 - Hosts: 65.77.83.222 worldsex.com
O1 - Hosts: 65.77.83.222 teeniefiles.com
O1 - Hosts: 65.77.83.222 al4a.com
O1 - Hosts: 65.77.83.222 sublimedirectory.com
O1 - Hosts: 65.77.83.222 thumbzilla.com
O1 - Hosts: 65.77.83.222 sexocean.com
O1 - Hosts: 65.77.83.222 easypic.com
O1 - Hosts: 65.77.83.222 absolut-series.com
O1 - Hosts: 65.77.83.222 jpeg4free.com
O1 - Hosts: 65.77.83.222 thumbnailpost.com
O13 - DefaultPrefix:
http://vrape.hardloved.com/top/search.php?id=2&s=
O13 - WWW Prefix:
http://vrape.hardloved.com/top/search.php?id=2&s=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.adulthyperlinks.com/favorites/8
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.allhyperlinks.com/redir?lang={SUB_RFC1766}
O4 - HKLM\..\Run: [SysPnP] rundll32
setupapi,InstallHinfSection OemVideoPnP 128 oemsyspnp.inf
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page=
http://www.slawsearch.com
O4 - HKLM\..\Run:
[svchost.exe] "C:\WINDOWS\SYSTEM\svchost32.exe"
(the seemingly unsuspicious filename of 'svchost32.exe'
to look like the Windows system file 'svchost.exe'. )
R3 - URLSearchHook: MailTo Class - {01A9EB7D-69BC-11D2-
AB2F-204C4F4F5020} - C:\WINDOWS\System32\dnsrelay.dll
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://out.true-
counter.com/b/?101 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://out.true-
counter.com/a/?101 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://out.true-
counter.com/b/?101 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://out.true-
counter.com/c/?101 (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://out.true-
counter.com/b/?101 (obfuscated)
F1 - win.ini: run=C:\WINDOWS\..\PROGRA~1\COMMON~1\MICROS~1
\MSINFO\msinfo.exe
F1 - win.ini: run=msinfo.exe
O4 - HKLM\..\Run: [Internat Conf] \bootconf.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.slawsearch.com/autosearch.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.slawsearch.com/autosearch.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.slawsearch.com
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.slawsearch.com/autosearch.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch = javascript:window.close
()
O4 - HKLM\..\Run: [CTFMON32.EXE] "C:\WINDOWS\System32
\ctfmon32.exe"
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://acc.count-all.com/--/?oaoca (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://acc.count-all.com/--- /?
oaoca (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://acc.count-all.com/-- /?
oaoca (obfuscated)
F1 - win.ini: run=C:\WINDOWS\..\PROGRA~1\COMMON~1\MICROS~1
\MSINFO\info32.exe
O1 - Hosts: 3510794918 auto.search.msn.com
O4 - HKLM\..\Run: [Tapicfg.exe]
C:\WINDOWS\SYSTEM\tapicfg.exe
O19 - User stylesheet: C:\WINDOWS\Web\win.def
O19 - User stylesheet: C:\WINDOWS\default.css
Running processes:
C:\WINDOWS\System32\SVCINIT.EXE
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http:///
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http:///
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http:////
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://xwebsearch.biz
F1 - win.ini: run=C:\WINDOWS\svcinit.exe
O4 - HKLM\..\RunServices: [SVC Service]
C:\WINDOWS\SYSTEM\svcinit.exe
O4 - HKLM\..\Run: [mssys] C:\WINDOWS\mssys.exe
Checking Windows NT UserInit:
[HKLM\Software\Microsoft\Windows
NT\CurrentVersion\WinLogon]
UserInit=C:\WINNT\System32\userinit.exe,C:\WINNT\System32
\svcinit.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.searchdot.net
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.searchdot.net
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://www.searchdot.net
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://www.searchdot.net
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.searchdot.net
O4 - HKLM\..\Run: [Msoffice] C:\WINDOWS\Fonts\msoffice.hta
O4 - HKCU\..\Run: [Msoffice]
C:\WINDOWS\Fonts\msoffice.hta
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http:///
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http:///
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http:///
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,HomeOldSP =
http://xwebsearch.biz/
O1 - Hosts: 213.159.117.233 sitefinder.verisign.com
O2 - BHO: HTML Source Editor - {086AE192-23A6-48D6-96EC-
715F53797E85} - C:\WINDOWS\System32\DReplace.dll
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search
Page=
http://www.searchv.com/search.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page=
http://www.searchv.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search
Bar=
http://www.searchv.com/search.html
F0 - system.ini: Shell=explorer.exe mupdate.exe
F1 - win.ini: run=mupdate.exe
F2 - REG:system.ini: Shell=explorer.exe mupdate.exe
O1 - Hosts: 209.66.114.130 sitefinder.verisign.com
O4 - HKLM\..\Run: [sys] regedit -s sys.reg
O15 - Trusted Zone: *.masspass.com
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.rightfinder.net/search/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.rightfinder.net/hp/
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.rightfinder.net/search/
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://www.rightfinder.net/search/
O4 - HKCU\..\Run: [AddClass] C:\WINDOWS\TEMP\ADDCLASS.EXE
O13 - DefaultPrefix:
http://ehttp.cc/?
O13 - WWW Prefix:
http://ehttp.cc/?
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.idgsearch.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.idgsearch.com/
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.idgsearch.com/
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://www.idgsearch.com/
O2 - BHO: GoogleMS Search Helper - {79369D5C-2903-4b7a-
ADE2-D5E0DEE14D24} - C:\Documents and Settings\[username]
\Application Data\GoogleMS.dll
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.alfa-
search.com/search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.alfa-
search.com/home.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.alfa-search.com/home.html
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.alfa-
search.com/search.html
R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,
(Default) =
http://www.alfa-search.com/search.html
O4 - Global Startup: MSupdate.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://ie-
search.com/srchasst.html (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://ie-
search.com/home.html (obfuscated)
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page = c:\windows\hp.htm
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://ie-
search.com/home.html (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://ie-
search.com/srchasst.html (obfuscated)
O1 - Hosts: 206.161.200.105 auto.search.msn.com
O1 - Hosts: 206.161.200.105 sitefinder.verisign.com
O1 - Hosts: 206.161.200.105 sitefinder-idn.verisign.com
O1 - Hosts: 206.161.200.103
www.smutserver.com
O1 - Hosts: 206.161.200.103 www1.smutserver.com
O1 - Hosts: 206.161.200.103 www2.smutserver.com
[...]
O1 - Hosts: 206.161.200.103 www29.smutserver.com
O4 - HKLM\..\Run: [Windows Shell Library Loader] load
shell.dll /c /set -- by windows setup --
O4 - HKLM\..\Run: [Win64 Compatibility Check] load
win64.drv /c /set -- by windows setup --
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.start-space.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.start-space.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,HomeOldSP =
http://www.start-space.com/
O4 - HKCU\..\Run: [QuickTime Task]
c:\windows\qttasks.exe
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://webcoolsearch.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://webcoolsearch.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://webcoolsearch.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://webcoolsearch.com/
O4 - HKLM\..\RunServices: [Desktop] rundll32.exe
msconfd,Restore ControlPanel
Load/Run keys from Registry:
HKLM\..\Windows NT\CurrentVersion\Windows:
AppInit_DLLs=msconfd.dll
Running processes:
C:\WINDOWS\quicken.exe
C:\WINDOWS\editpad.exe
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://www.therealsearch.com/sp.php
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.therealsearch.com/sp.php
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.therealsearch.com/sp.php
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.therealsearch.com/hp.php
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.therealsearch.com/sp.php
O4 - HKCU\..\Run: [quicken] C:\WINDOWS\quicken.exe
O4 - HKCU\..\Run: [editpad] C:\WINDOWS\editpad.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.windowws.cc/ sp.htm?
id=9
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.windowws.cc/
sp.htm?id=9
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.windowws.cc/ hp.htm?id=9
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,HomeOldSP =
http://super-spider.com
O4 - HKCU\..\Run: [Windows Control] C:\WINDOWS\CONTROL.EXE
O4 - HKCU\..\RunServices: [Windows Control]
C:\WINDOWS\CONTROL.EXE
Running processes:
C:\WINDOWS\OLEHELP.EXE
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://www.omega-search.com/go/panel_search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.omega-search.com/go
panel_search.html
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://www.omega-
search.com/go/panel_search.html
O4 - HKCU\..\Run: [olehelp] C:\WINDOWS\olehelp.exe
O4 - HKCU\..\Run: [svchost] C:\WINDOWS\olehelp.exe
Running processes:
C:\Program Files\directx\directx.exe
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://smartsearch.ws/?q=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://smartsearch.ws/?q=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://smartsearch.ws/?q=
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://smartsearch.ws
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://smartsearch.ws
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://smartsearch.ws/?
q=
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://smartsearch.ws/?
q=
O4 - HKLM\..\Run: [SystemEmergency] C:\Program
Files\directx\directx.exe
O4 - HKLM\..\RunServices: [SystemEmergency] C:\Program
Files\directx\directx.exe
O4 - HKCU\..\Run: [SystemEmergency] C:\Program
Files\directx\directx.exe
O4 - HKLM\..\Run: [UserSystem] C:\Windows\iexplorer.exe
O4 - HKLM\..\RunServices: [UserSystem]
C:\Windows\iexplorer.exe
O4 - HKCU\..\Run: [UserSystem] C:\Windows\iexplorer.exe
O13 - DefaultPrefix:
http://smartsearch.ws/?q=
O13 - WWW Prefix:
http://smartsearch.ws/?q=
F1 - win.ini: run=C:\WINNT\system32\services\y.exe
O2 - BHO: (no name) - {5321E378-FFAD-4999-8C62-
03CA8155F0B3} - C:\WINDOWS\System\services\1.00.07.dll
O4 - HKLM\..\Run: [xpsystem] C:\WINNT\system32
\services\y.exe
O4 - HKCU\..\Run: [xpsystem] C:\WINNT\system32
\services\y.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.gonnasearch.com/
iesearch.php?ref=sb
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.gonnasearch.com/?
ref=sp
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.gonnasearch.com/
iesearch.php?ref=sb
R1 - HKLM\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.gonnasearch.com/?
ref=sp
R0 - HKLM\Software\Microsoft\Internet
Explorer\Search,CustomizeSearch =
http://www.gonnasearch.com/ iesearch.php?ref=sb
O2 - BHO: SearchAddon - {799A370D-5993-4887-9DF7-
0A4756A77D00} - C:\PROGRA~1\INTERN~1\Toolbar\SEARCH~1.DLL
O2 - BHO: AutoSearch - {A55581DC-2CDB-4089-8878-
71A080B22342} - C:\PROGRA~1\INTERN~1\Toolbar\AUTOSE~1.DLL
O2 - BHO: (no name) - {E7AFFF2A-1B57-49C7-BF6B-
E5123394C970} - C:\PROGRA~1\INTERN~1\Toolbar\webinfo.dll
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://www.nkvd.us/s.htm
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://www.nkvd.us/s.htm
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.nkvd.us/s.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.nkvd.us/1507/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL =
http://www.nkvd.us/s.htm
O13 - DefaultPrefix:
http://www.nkvd.us/1507/
O13 - WWW Prefix:
http://www.nkvd.us/1507/
O13 - Home Prefix:
http://www.nkvd.us/1507/
O13 - Mosaic Prefix:
http://www.nkvd.us/1507/
Enumerating ShellServiceObjectDelayLoad items:
DDE Control Module: C:\WINDOWS\SYSTEM\mtwirl32.dll
O2 - BHO: OsbornTech Popup Blocker - {FF1BF4C7-4E08-4A28-
A43F- 9D60A9F7A880} - C:\WINDOWS\System32\mshelper.dll
Running processes:
C:\WINDOWS\SYSTEM32\WINPROC32.EXE
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL
=
http://4-counter.com/?a=2
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://4-counter.com/?a=2
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://4- counter.com/?a=2
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://4-counter.com/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant =
http://4- counter.com/?
a=2
O4 - HKCU\..\Run: [Windows Internet Protocol]
C:\WINDOWS\SYSTEM32\WINPROC32.EXE
Running processes:
C:\WINDOWS\SYSTEM\MSCONFIG.EXE
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.31234.com/www/homepage.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.31234.com/www/homepage.html
O4 - HKLM\..\Run: [msconfig]
C:\WINDOWS\SYSTEM\msconfig.exe
O4 - HKCU\..\Run: [msconfig]
C:\WINDOWS\SYSTEM\msconfig.exe
O8 - Extra context menu item: ?????? - C:\WINDOWS\system32
\openme.htm
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,SearchURL = http://
www.enjoysearch.info/search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar = http://
www.enjoysearch.info/search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page = http://
www.enjoysearch.info/search.html
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start
Page = http://
www.enjoysearch.info/
O4 - HKLM\..\Run: [xxxvid] C:\WINDOWS\system32
\xxxvideo.hta
O4 - HKCU\..\Run: [xxxvid] C:\Documents and
Settings\<username>\My Documents\xxxvideo.hta
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,SearchURL = about:blank
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar = http://
www.2020search.com/search/9884/search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL = about:blank
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page_bak = about:blank
O2 - BHO: Windows Resources - {2D38A51A-23C9-48a1-A33C-
48675AA2B494} - C:\WINDOWS\winres.dll
O15 - Trusted Zone: *.i-lookup.com
O15 - Trusted Zone: *.offshoreclicks.com
O15 - Trusted Zone: *.teensguru.com
O1 - Hosts: 213.159.117.235 auto.search.msn.com
O18 - Protocol: about - {53B95211-7D77-11D2-9F80-
00104B107C96} - C:\WINDOWS\System32\msxmlpp.dll
ABOUT BLANK RELATED FILES :
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,SearchURL =
http://about-blank.ws/page/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://about-blank.ws/page/
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Search_URL =
http://about-
blank.ws/page/
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page_bak =
http://about-blank.ws/
O1 - Hosts: 213.159.118.226 1-se.com
O1 - Hosts: 213.159.118.226 58q.com
O1 - Hosts: 213.159.118.226 aifind.cc
O1 - Hosts: 213.159.118.226 aifind.info
O1 - Hosts: 213.159.118.226 allneedsearch.com
O1 - Hosts: 213.159.118.226 approvedlinks.com
[..]
O1 - Hosts: 213.159.118.226
www.wazzupnet.com
O1 - Hosts: 213.159.118.226
www.websearch.com
O1 - Hosts: 213.159.118.226
www.windowws.cc
O1 - Hosts: 213.159.118.226
www.xgmm.com
O1 - Hosts: 213.159.118.226 xwebsearch.biz
O1 - Hosts: 213.159.118.226 yourbookmarks.ws
O4 - HKLM\..\Run: [Network Service] C:\WINNT\svchost.exe-
sr -0
O4 - HKCU\..\Run: [Network Service] C:\WINNT\svchost.exe-
sr -0
O19 - User stylesheet: C:\WINNT\system32\xea2108l.9zt
End of about blank files
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://www.your-
search.info/search.html
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://www.your- search.info/start.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Default_Page_URL = http://
www.your-
search.info/start.html
O4 - HKLM\..\Run: [system32.dll]
C:\WINDOWS\system\systeminit.exe
O4 - Global Startup: sytem32.exe
O19 - User stylesheet: C:\WINDOWS\sstyle.css
O19 - User stylesheet: C:\WINDOWS\sstyle.css (HKLM)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar =
http://defaultsearching.com/search.html
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://defaultsearching.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://defaultsearching.com
O4 - HKCU\..\RunOnce: [sounddrv]
C:\WINDOWS\SYSTEM\SNDBDRV3104.EXE
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Bar = res://C:\WINDOWS\System32
\gfmnaaa.dll/sp.html (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page = res://C:\WINDOWS\System32
\gfmnaaa.dll/sp.html (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Search,SearchAssistant = res://
C:\WINDOWS\System32\gfmnaaa.dll/sp.html (obfuscated)
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,HomeOldSP = about:blank
O2 - BHO: (no name) - {48918FB4-1FD5-4DF3-87F0-
12C36350039D} - C:\WINDOWS\System32\gfmnaaa.dll
Running processes:
C:\WINDOWS\IEDLL.EXE
C:\WINDOWS\LOADER.EXE
O4 - HKCU\..\Run: [iedll] C:\WINDOWS\iedll.exe
O4 - HKCU\..\Run: [loader] C:\WINDOWS\loader.exe
O2 - BHO: WinShow module - {6CC1C918-AE8B-4373-A5B4-
28BA1851E39A} - C:\WINDOWS\WINSHOW.DLL
O1 - Hosts file: 209.66.114.130 sitefinder.verisign.com
O2 - BHO: WinShow module - {6CC1C918-AE8B-4373-A5B4-
28BA1851E39A} - C:\Documents And
Settings\username\Application Data\winshow\Winshow.dll
O4 - HKLM\..\Run: [sys] regedit /s C:\WINDOWS\sys.reg
O4 - Global Startup: MSUpdater.exe
Running processes:
C:\WINDOWS\System32\svc.exe
O1 - BHO: (no name) - {FCADDC14-BD46-408A-9842-
CDBE1C6D37EB} - C:\WINDOWS\System32\BrowserHelper.dll
O4 - HKCU\..\Run: [svc] C:\WINDOWS\System32\svc.exe
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,Search Page =
http://tooncomics.com/main/sp.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start
Page =
http://tooncomics.com/main/hp.htm
R1 - HKCU\Software\Microsoft\Internet
Explorer\Main,HomeOldSP =
http://66.250.130.194/main/hp.php
O1 - Hosts: 66.40.16.131 livesexlist.com
O1 - Hosts: 66.40.16.131 lanasbigboobs.com
O1 - Hosts: 66.40.16.131 thumbnailpost.com
O1 - Hosts: 66.40.16.131 adult-series.com
O2 - BHO: DNSErr object - {1E1B2879-88FF-11D2-8D96-
D7ACAC95951F} - C:\WINDOWS\DNSErr.dll
I appreciate there is no chance you can manually check
all these files against a hijack this log and alot of
these are automatically dealt with my using cwshredder in
safe mode but this is more to show how much of a parasite
this is and why its causing so many problems to so many
users,I think personally the spybot search & destroy
immunize feature and spware blasters guard is so
important these days as it stops alot of the sites
carrying this trojan even opening but adding 127.0.0.1 to
the website addresses that carry this and other
spyware/trojans etc it can stop the infection ever
getting into the pc,basically it fools the internet into
believing the sites dont exist and you get the error page
is unavailable but Once its there the damage caused can
be huge and manual removal of everyfile is virtually
impossible with alot of the variants Id advise anyone who
doesnt have them to get spybot search & destroy and use
the immunize buttton after updating plus spyware blaster
and enable all protection after updating again
Spybot Search & Destroy
http://www.majorgeeks.com/downloadget.php?
id=2471&file=11&evp=2470f9bfb0cc682334ff8c4459556118
SpywareBlaster
http://majorgeeks.com/downloadget.php?
id=2859&file=11&evp=61b0e8ad41924a03c37615f4682b4cef
For anyone trying to remove these types of things
remember these general tips
ALWAYS do these when trying to remove a bug.
First: Turn off Windows XP System Restore (Start,Right
click my computer,Properties,then system restore and
disable and apply)
Next: Show hidden files and folders. (Start,Search,Then
tools at the top bar,choose folder options then go to the
second page View,and tick show hidden files and folders)
Next to boot into Safe Mode
Reboot the system and tap F8, choose Safe Mode.
Next: Delete Temp Internet files :
Open a internet browser window, click Tools then Internet
Options.
Click on the Delete Cookies and the Delete Files buttons,
then click OK and close the browser window.
Next: Close all open internet browser windows.
Next: Delete Windows Temporary Files - (start,run then
type %temp% delete all files you can in this folder
The Windows temporary directory (usually located at
C:\windows\temp).
This directory should not be confused with the Internet
Explorer "Temporary Internet Files Directory".
The Windows temporary directory stores temporary files
that are used during installation of programs and at
other various times.
Cleaning this directory regularly is generally a good
idea.
Try spy subtract (30day trial CWS added to definitions)
http://download.intermute.com/downloads/spysubtract/2.64/1
005/SpyInstall.exe
CWShredder
http://cwshredder.net/bin/CWShredder.exe
MANUAL REMOVAL INSTRUCTIONS *
Try using Prc view
(Find out detailed information about the processes
running under Windows. This utility gives you the full
list of DLLs for each running application, including full
path and version information. You can also write scripts
and debuggers to more closely examine processes. The
program shows all parent/child relationships to system
processes. This latest version displays all DLLs
currently in use, as well as which processes use a DLL
you select)
Download PrcView here:
http://www.spywareinfo.com/~merijn/files/pv.zip, unzip it
to the desktop.
Be sure to have at least 1 Internet Explorer window open,
then double click on the runme.bat.
Select option '2' from the menu.
Notepad will open with a log in it. Look for a line with
this file, size and beginning to it.
The filename will always be different:
winajbm.dll 61c00000 61440 c:\windows\system32\winajbm.dll
This part indicates the bad file:
61c00000 61440
It will always start with that header.
Write down the filename behind it.
Now download KillBox:
http://www.downloads.subratam.org/KillBox.zip
Unzip and run it.
Don't click any of the buttons though, instead please
click on the Action menu and choose "Delete on Reboot".
On the next screen, click on the File menu and
choose "Add File". The file you copied earlier should now
show up in the window. If that's successful, choose the
Action menu and select "Process and Reboot". You'll be
prompted to reboot, do so.
After rebooting, make sure the file is gone.
Andy